Falling Person Detection Using Multi-Sensor Signal Processing
NASA Astrophysics Data System (ADS)
Toreyin, B. Ugur; Soyer, A. Birey; Onaran, Ibrahim; Cetin, E. Enis
2007-12-01
Falls are one of the most important problems for frail and elderly people living independently. Early detection of falls is vital to provide a safe and active lifestyle for elderly. Sound, passive infrared (PIR) and vibration sensors can be placed in a supportive home environment to provide information about daily activities of an elderly person. In this paper, signals produced by sound, PIR and vibration sensors are simultaneously analyzed to detect falls. Hidden Markov Models are trained for regular and unusual activities of an elderly person and a pet for each sensor signal. Decisions of HMMs are fused together to reach a final decision.
NASA Astrophysics Data System (ADS)
Sun, Wei; Ding, Wei; Yan, Huifang; Duan, Shunli
2018-06-01
Shoe-mounted pedestrian navigation systems based on micro inertial sensors rely on zero velocity updates to correct their positioning errors in time, which effectively makes determining the zero velocity interval play a key role during normal walking. However, as walking gaits are complicated, and vary from person to person, it is difficult to detect walking gaits with a fixed threshold method. This paper proposes a pedestrian gait classification method based on a hidden Markov model. Pedestrian gait data are collected with a micro inertial measurement unit installed at the instep. On the basis of analyzing the characteristics of the pedestrian walk, a single direction angular rate gyro output is used to classify gait features. The angular rate data are modeled into a univariate Gaussian mixture model with three components, and a four-state left–right continuous hidden Markov model (CHMM) is designed to classify the normal walking gait. The model parameters are trained and optimized using the Baum–Welch algorithm and then the sliding window Viterbi algorithm is used to decode the gait. Walking data are collected through eight subjects walking along the same route at three different speeds; the leave-one-subject-out cross validation method is conducted to test the model. Experimental results show that the proposed algorithm can accurately detect different walking gaits of zero velocity interval. The location experiment shows that the precision of CHMM-based pedestrian navigation improved by 40% when compared to the angular rate threshold method.
NASA Astrophysics Data System (ADS)
Nikitin, P. V.; Savinov, A. N.; Bazhenov, R. I.; Sivandaev, S. V.
2018-05-01
The article describes the method of identifying a person in distance learning systems based on a keyboard rhythm. An algorithm for the organization of access control is proposed, which implements authentication, identification and verification of a person using the keyboard rhythm. Authentication methods based on biometric personal parameters, including those based on the keyboard rhythm, due to the inexistence of biometric characteristics without a particular person, are able to provide an advanced accuracy and inability to refuse authorship and convenience for operators of automated systems, in comparison with other methods of conformity checking. Methods of permanent hidden keyboard monitoring allow detecting the substitution of a student and blocking the key system.
NASA Astrophysics Data System (ADS)
Manger, Daniel; Metzler, Jürgen
2014-03-01
Military Operations in Urban Terrain (MOUT) require the capability to perceive and to analyze the situation around a patrol in order to recognize potential threats. A permanent monitoring of the surrounding area is essential in order to appropriately react to the given situation, where one relevant task is the detection of objects that can pose a threat. Especially the robust detection of persons is important, as in MOUT scenarios threats usually arise from persons. This task can be supported by image processing systems. However, depending on the scenario, person detection in MOUT can be challenging, e.g. persons are often occluded in complex outdoor scenes and the person detection also suffers from low image resolution. Furthermore, there are several requirements on person detection systems for MOUT such as the detection of non-moving persons, as they can be a part of an ambush. Existing detectors therefore have to operate on single images with low thresholds for detection in order to not miss any person. This, in turn, leads to a comparatively high number of false positive detections which renders an automatic vision-based threat detection system ineffective. In this paper, a hybrid detection approach is presented. A combination of a discriminative and a generative model is examined. The objective is to increase the accuracy of existing detectors by integrating a separate hypotheses confirmation and rejection step which is built by a discriminative and generative model. This enables the overall detection system to make use of both the discriminative power and the capability to detect partly hidden objects with the models. The approach is evaluated on benchmark data sets generated from real-world image sequences captured during MOUT exercises. The extension shows a significant improvement of the false positive detection rate.
Machine Learning for Biological Trajectory Classification Applications
NASA Technical Reports Server (NTRS)
Sbalzarini, Ivo F.; Theriot, Julie; Koumoutsakos, Petros
2002-01-01
Machine-learning techniques, including clustering algorithms, support vector machines and hidden Markov models, are applied to the task of classifying trajectories of moving keratocyte cells. The different algorithms axe compared to each other as well as to expert and non-expert test persons, using concepts from signal-detection theory. The algorithms performed very well as compared to humans, suggesting a robust tool for trajectory classification in biological applications.
NASA Astrophysics Data System (ADS)
Peichl, Markus; Dill, Stephan; Jirousek, Matthias; Süß, Helmut
2009-05-01
Passive microwave imaging allows a daytime independent observation and examination of objects and persons without artificial exposure under nearly all weather conditions. The penetration capability of microwaves allows the detection of hidden objects like weapons and explosive devices under the clothing. In August/September 2008 a comprehensive military experiment was conducted by the German armed forces at the naval base Eckernfoerde, Germany. One activity in the Eckernfoerde trial was the simulation of a military entrance portal by a tent including various imaging and a chemical sensor suite. Besides commercial optical and infrared cameras various passive millimeter-wave imagers have been used from different German research institutions. The DLR Microwaves and Radar Institute, Department for Reconnaissance and Security (HR-AS), provided an imaging radiometer scanner operating at W band. A multitude of situations have been simulated and many persons carrying hidden objects under their clothing have been scanned. Some exemplary results from the trial are shown and discussed in the paper.
Net Shape Technology in Aerospace Structures. Volume 1.
1986-11-01
ofI nIo n- destructive evaluation methods, such a s ult rasonic inspection, in detecting otherwise hidden defects in parts made of the material. Pratt...SCHEDULE 4. PERFORMING ORGANIZATION REPORT NUMBER( S ) 5. MONITORING ORGANIZATION REPORT NUMBER( S ) n/a n/a 6a. NAME OF PERFORMING ORGANIZATION 6b...a n/a n/a 11 TITLE (Include Security Classification) Net Shape Technology in Aerospace Structures, Vol. I (U) 12. PERSONAL AUTHOR( S ) 13a. TYPE OF
Detecting targets hidden in random forests
NASA Astrophysics Data System (ADS)
Kouritzin, Michael A.; Luo, Dandan; Newton, Fraser; Wu, Biao
2009-05-01
Military tanks, cargo or troop carriers, missile carriers or rocket launchers often hide themselves from detection in the forests. This plagues the detection problem of locating these hidden targets. An electro-optic camera mounted on a surveillance aircraft or unmanned aerial vehicle is used to capture the images of the forests with possible hidden targets, e.g., rocket launchers. We consider random forests of longitudinal and latitudinal correlations. Specifically, foliage coverage is encoded with a binary representation (i.e., foliage or no foliage), and is correlated in adjacent regions. We address the detection problem of camouflaged targets hidden in random forests by building memory into the observations. In particular, we propose an efficient algorithm to generate random forests, ground, and camouflage of hidden targets with two dimensional correlations. The observations are a sequence of snapshots consisting of foliage-obscured ground or target. Theoretically, detection is possible because there are subtle differences in the correlations of the ground and camouflage of the rocket launcher. However, these differences are well beyond human perception. To detect the presence of hidden targets automatically, we develop a Markov representation for these sequences and modify the classical filtering equations to allow the Markov chain observation. Particle filters are used to estimate the position of the targets in combination with a novel random weighting technique. Furthermore, we give positive proof-of-concept simulations.
[Becoming doctor: Highlight the hidden curriculum. Medical error as an example].
Galam, Eric
2014-04-01
Medical culture is both individual and collective. It is also implicit, hidden (hidden curriculum) and binding.It spreads and builds from the beginning of the training.It strongly impacts the personalities and professional care practices. Awareness of its existence and identification of its main lines are the first steps for fruitful research. Copyright © 2013 Elsevier Masson SAS. All rights reserved.
Multi-sensor millimeter-wave system for hidden objects detection by non-collaborative screening
NASA Astrophysics Data System (ADS)
Zouaoui, Rhalem; Czarny, Romain; Diaz, Frédéric; Khy, Antoine; Lamarque, Thierry
2011-05-01
In this work, we present the development of a multi-sensor system for the detection of objects concealed under clothes using passive and active millimeter-wave (mmW) technologies. This study concerns both the optimization of a commercial passive mmW imager at 94 GHz using a phase mask and the development of an active mmW detector at 77 GHz based on synthetic aperture radar (SAR). A first wide-field inspection is done by the passive imager while the person is walking. If a suspicious area is detected, the active imager is switched-on and focused on this area in order to obtain more accurate data (shape of the object, nature of the material ...).
Automated Corrosion Detection Program
2001-10-01
More detailed explanations of the methodology development can be found in Hidden Corrosion Detection Technology Assessment, a paper presented at...Detection Program, a paper presented at the Fourth Joint DoD/FAA/NASA Conference on Aging Aircraft, 2000. AS&M PULSE. The PULSE system, developed...selection can be found in The Evaluation of Hidden Corrosion Detection Technologies on the Automated Corrosion Detection Program, a paper presented
StegoWall: blind statistical detection of hidden data
NASA Astrophysics Data System (ADS)
Voloshynovskiy, Sviatoslav V.; Herrigel, Alexander; Rytsar, Yuri B.; Pun, Thierry
2002-04-01
Novel functional possibilities, provided by recent data hiding technologies, carry out the danger of uncontrolled (unauthorized) and unlimited information exchange that might be used by people with unfriendly interests. The multimedia industry as well as the research community recognize the urgent necessity for network security and copyright protection, or rather the lack of adequate law for digital multimedia protection. This paper advocates the need for detecting hidden data in digital and analog media as well as in electronic transmissions, and for attempting to identify the underlying hidden data. Solving this problem calls for the development of an architecture for blind stochastic hidden data detection in order to prevent unauthorized data exchange. The proposed architecture is called StegoWall; its key aspects are the solid investigation, the deep understanding, and the prediction of possible tendencies in the development of advanced data hiding technologies. The basic idea of our complex approach is to exploit all information about hidden data statistics to perform its detection based on a stochastic framework. The StegoWall system will be used for four main applications: robust watermarking, secret communications, integrity control and tamper proofing, and internet/network security.
First Direct-Detection Constraints on eV-Scale Hidden-Photon Dark Matter with DAMIC at SNOLAB
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aguilar-Arevalo, A.; Amidei, D.; Bertou, X.
We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30 eVmore » $$c^{-2}$$ with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter $$\\kappa$$ is competitive with constraints from solar emission, reaching a minimum value of 2.2$$\\times$$$10^{-14}$$ at 17 eV$$c^{-2}$$. These results are the most stringent direct detection constraints on hidden-photon dark matter with masses 3-12 eV$$c^{-2}$$ and the first demonstration of direct experimental sensitivity to ionization signals $<$12 eV from dark matter interactions.« less
Detecting hidden exfoliation corrosion in aircraft wing skins using thermography
NASA Astrophysics Data System (ADS)
Prati, John
2000-03-01
A thermal wave (pulse) thermography inspection technique demonstrated the ability to detect hidden subsurface exfoliation corrosion adjacent to countersunk fasteners in aircraft wing skins. In the wing skin, exfoliation corrosion is the result of the interaction between the steel fastener and the aluminum skin material in the presence of moisture. This interaction results in corrosion cracks that tend to grow parallel to the skin surface. The inspection technique developed allows rapid detection and evaluation of hidden (not visible on the surface) corrosion, which extends beyond the head of fastener countersinks in the aluminum skins.
Detecting Hidden Communications Protocols
2013-02-11
Protocols FA9550-09-1-0173 Richard R Brooks Clemson University PO Box 340915 Clemson, SC 29634-0915 Air Force Office of Scientific Research/RSL 875...two botnet detection methods: centralized botnet traffic detection using HMMs and probabilistic context-free grammars (PCFGs) for centralized and...final report for the Detecting Hidden Communications Protocols AFOSR grant with R. R. Brooks form Clemson University as PI. The work funded by the
Hall, Deborah A; Guest, Hannah; Prendergast, Garreth; Plack, Christopher J; Francis, Susan T
2018-01-01
Background Rodent studies indicate that noise exposure can cause permanent damage to synapses between inner hair cells and high-threshold auditory nerve fibers, without permanently altering threshold sensitivity. These demonstrations of what is commonly known as hidden hearing loss have been confirmed in several rodent species, but the implications for human hearing are unclear. Objective Our Medical Research Council–funded program aims to address this unanswered question, by investigating functional consequences of the damage to the human peripheral and central auditory nervous system that results from cumulative lifetime noise exposure. Behavioral and neuroimaging techniques are being used in a series of parallel studies aimed at detecting hidden hearing loss in humans. The planned neuroimaging study aims to (1) identify central auditory biomarkers associated with hidden hearing loss; (2) investigate whether there are any additive contributions from tinnitus or diminished sound tolerance, which are often comorbid with hearing problems; and (3) explore the relation between subcortical functional magnetic resonance imaging (fMRI) measures and the auditory brainstem response (ABR). Methods Individuals aged 25 to 40 years with pure tone hearing thresholds ≤20 dB hearing level over the range 500 Hz to 8 kHz and no contraindications for MRI or signs of ear disease will be recruited into the study. Lifetime noise exposure will be estimated using an in-depth structured interview. Auditory responses throughout the central auditory system will be recorded using ABR and fMRI. Analyses will focus predominantly on correlations between lifetime noise exposure and auditory response characteristics. Results This paper reports the study protocol. The funding was awarded in July 2013. Enrollment for the study described in this protocol commenced in February 2017 and was completed in December 2017. Results are expected in 2018. Conclusions This challenging and comprehensive study will have the potential to impact diagnostic procedures for hidden hearing loss, enabling early identification of noise-induced auditory damage via the detection of changes in central auditory processing. Consequently, this will generate the opportunity to give personalized advice regarding provision of ear defense and monitoring of further damage, thus reducing the incidence of noise-induced hearing loss. PMID:29523503
Caries diagnosis using laser fluorescence
NASA Astrophysics Data System (ADS)
Zanin, Fatima A. A.; Pinheiro, Antonio L. B.; Souza-Campos, Dilma H.; Brugnera, Aldo, Jr.; Pecora, Jesus D.
2000-03-01
Caries prevention is a goal to be achieved by dentist in order to promote health. There are several methods used to detect dental caries each one presenting advantages and disadvantages, especially regarding hidden occlusal caries. The improvement of laser technology has permitted the use of laser fluorescence for early diagnosis of hidden occlusal caries. The aim of this study was to assess the efficacy of the use of 655 nm laser light on the detection of hidden occlusal caries. Forty molar teeth from patients of both sexes which ages ranging from 10 - 18 years old were used on this study. Following manufacture's instructions regarding the use of the equipment, the teeth had their occlusal surface examined with the DIAGNOdent. Twenty six of 40 teeth had hidden occlusal caries detected by the DIAGNOdent. However only 17 of these 26 teeth showed radiographic signs of caries the other 9 teeth showed no radiological signs of the lesion. Radiographic examination was able to identify 34,61% of false negative cases. This means that many caries would be left untreated due to the lack of diagnosis using both visual and radiographic examination. The use of the DIAGNOdent was effective in successfully detecting hidden occlusal caries.
First Direct-Detection Constraints on eV-Scale Hidden-Photon Dark Matter with DAMIC at SNOLAB.
Aguilar-Arevalo, A; Amidei, D; Bertou, X; Butner, M; Cancelo, G; Castañeda Vázquez, A; Cervantes Vergara, B A; Chavarria, A E; Chavez, C R; de Mello Neto, J R T; D'Olivo, J C; Estrada, J; Fernandez Moroni, G; Gaïor, R; Guardincerri, Y; Hernández Torres, K P; Izraelevitch, F; Kavner, A; Kilminster, B; Lawson, I; Letessier-Selvon, A; Liao, J; Matalon, A; Mello, V B B; Molina, J; Privitera, P; Ramanathan, K; Sarkis, Y; Schwarz, T; Settimo, M; Sofo Haro, M; Thomas, R; Tiffenberg, J; Tiouchichine, E; Torres Machado, D; Trillaud, F; You, X; Zhou, J
2017-04-07
We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30 eV c^{-2} with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter κ is competitive with constraints from solar emission, reaching a minimum value of 2.2×10^{-14} at 17 eV c^{-2}. These results are the most stringent direct detection constraints on hidden-photon dark matter in the galactic halo with masses 3-12 eV c^{-2} and the first demonstration of direct experimental sensitivity to ionization signals <12 eV from dark matter interactions.
Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance
Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos
2016-01-01
In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results. PMID:26861352
Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.
Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos
2016-02-06
In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.
Photoacoustic imaging of hidden dental caries by using a fiber-based probing system
NASA Astrophysics Data System (ADS)
Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji
2017-04-01
Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.
Alanazi, Adwan; Elleithy, Khaled
2016-01-01
Successful transmission of online multimedia streams in wireless multimedia sensor networks (WMSNs) is a big challenge due to their limited bandwidth and power resources. The existing WSN protocols are not completely appropriate for multimedia communication. The effectiveness of WMSNs varies, and it depends on the correct location of its sensor nodes in the field. Thus, maximizing the multimedia coverage is the most important issue in the delivery of multimedia contents. The nodes in WMSNs are either static or mobile. Thus, the node connections change continuously due to the mobility in wireless multimedia communication that causes an additional energy consumption, and synchronization loss between neighboring nodes. In this paper, we introduce an Optimized Hidden Node Detection (OHND) paradigm. The OHND consists of three phases: hidden node detection, message exchange, and location detection. These three phases aim to maximize the multimedia node coverage, and improve energy efficiency, hidden node detection capacity, and packet delivery ratio. OHND helps multimedia sensor nodes to compute the directional coverage. Furthermore, an OHND is used to maintain a continuous node– continuous neighbor discovery process in order to handle the mobility of the nodes. We implement our proposed algorithms by using a network simulator (NS2). The simulation results demonstrate that nodes are capable of maintaining direct coverage and detecting hidden nodes in order to maximize coverage and multimedia node mobility. To evaluate the performance of our proposed algorithms, we compared our results with other known approaches. PMID:27618048
Alanazi, Adwan; Elleithy, Khaled
2016-09-07
Successful transmission of online multimedia streams in wireless multimedia sensor networks (WMSNs) is a big challenge due to their limited bandwidth and power resources. The existing WSN protocols are not completely appropriate for multimedia communication. The effectiveness of WMSNs varies, and it depends on the correct location of its sensor nodes in the field. Thus, maximizing the multimedia coverage is the most important issue in the delivery of multimedia contents. The nodes in WMSNs are either static or mobile. Thus, the node connections change continuously due to the mobility in wireless multimedia communication that causes an additional energy consumption, and synchronization loss between neighboring nodes. In this paper, we introduce an Optimized Hidden Node Detection (OHND) paradigm. The OHND consists of three phases: hidden node detection, message exchange, and location detection. These three phases aim to maximize the multimedia node coverage, and improve energy efficiency, hidden node detection capacity, and packet delivery ratio. OHND helps multimedia sensor nodes to compute the directional coverage. Furthermore, an OHND is used to maintain a continuous node- continuous neighbor discovery process in order to handle the mobility of the nodes. We implement our proposed algorithms by using a network simulator (NS2). The simulation results demonstrate that nodes are capable of maintaining direct coverage and detecting hidden nodes in order to maximize coverage and multimedia node mobility. To evaluate the performance of our proposed algorithms, we compared our results with other known approaches.
Detection of latent fingerprint hidden beneath adhesive tape by optical coherence tomography.
Zhang, Ning; Wang, Chengming; Sun, Zhenwen; Li, Zhigang; Xie, Lanchi; Yan, Yuwen; Xu, Lei; Guo, Jingjing; Huang, Wei; Li, Zhihui; Xue, Jing; Liu, Huan; Xu, Xiaojing
2018-06-01
Adhesive tape is one type of common item which can be encountered in criminal cases involving rape, murder, kidnapping and explosives. It is often the case that a suspect deposits latent fingerprints on the sticky side of adhesive tape material when tying up victims, manufacturing improvised explosive devices or packaging illegal goods. However, the adhesive tapes found at crime scenes are usually stuck together or attached to a certain substrate, and thus the latent fingerprints may be hidden beneath the tapes. Current methods to detect latent fingerprint hidden beneath adhesive tape need to peel it off first and then apply physical or chemical methods to develop the fingerprint, which undergo complicated procedures and would affect the original condition of latent print. Optical coherence tomography (OCT) is a novel applied techniques in forensics which enables obtaining cross-sectional structure with the advantages of non-invasive, in-situ, high resolution and high speed. In this paper, a custom-built spectral-domain OCT (SD-OCT) system with a hand-held probe was employed to detect fingerprints hidden beneath different types of adhesive tapes. Three-dimensional (3D) OCT reconstructions were performed and the en face images were presented to reveal the hidden fingerprints. The results demonstrate that OCT is a promising tool for rapidly detecting and recovering high quality image of latent fingerprint hidden beneath adhesive tape without any changes to the original state and preserve the integrity of the evidence. Copyright © 2018 Elsevier B.V. All rights reserved.
Hidden, Unacknowledged, Acquaintance, and Date Rape: Looking Back, Looking Forward
ERIC Educational Resources Information Center
Koss, Mary P.
2011-01-01
In this commentary, the author reflects on two articles that have been among the most highly cited publications in "Psychology of Women Quarterly" ("PWQ") over its first 35 years, "The Hidden Rape Victim: Personality, Attitudinal, and Situational Characteristics" (Koss, 1985) and "Stranger and Acquaintance Rape: Are There Differences in the…
The Hidden Costs of Outdoor Education/Recreation Academic Training.
ERIC Educational Resources Information Center
Bisson, Christian
Academic training programs in the field of outdoor education and recreation have increased considerably in the past few decades, but their true costs are often hidden. A survey of 15 outdoor college programs in the United States and Canada examined special fees associated with outdoor courses. The cost of necessary personal equipment and clothing…
Hand gesture recognition in confined spaces with partial observability and occultation constraints
NASA Astrophysics Data System (ADS)
Shirkhodaie, Amir; Chan, Alex; Hu, Shuowen
2016-05-01
Human activity detection and recognition capabilities have broad applications for military and homeland security. These tasks are very complicated, however, especially when multiple persons are performing concurrent activities in confined spaces that impose significant obstruction, occultation, and observability uncertainty. In this paper, our primary contribution is to present a dedicated taxonomy and kinematic ontology that are developed for in-vehicle group human activities (IVGA). Secondly, we describe a set of hand-observable patterns that represents certain IVGA examples. Thirdly, we propose two classifiers for hand gesture recognition and compare their performance individually and jointly. Finally, we present a variant of Hidden Markov Model for Bayesian tracking, recognition, and annotation of hand motions, which enables spatiotemporal inference to human group activity perception and understanding. To validate our approach, synthetic (graphical data from virtual environment) and real physical environment video imagery are employed to verify the performance of these hand gesture classifiers, while measuring their efficiency and effectiveness based on the proposed Hidden Markov Model for tracking and interpreting dynamic spatiotemporal IVGA scenarios.
NASA Astrophysics Data System (ADS)
Jelen, Lukasz; Kobel, Joanna; Podbielska, Halina
2003-11-01
This paper discusses the possibility of exploiting of the tennovision registration and artificial neural networks for facial recognition systems. A biometric system that is able to identify people from thermograms is presented. To identify a person we used the Eigenfaces algorithm. For the face detection in the picture the backpropagation neural network was designed. For this purpose thermograms of 10 people in various external conditions were studies. The Eigenfaces algorithm calculated an average face and then the set of characteristic features for each studied person was produced. The neural network has to detect the face in the image before it actually can be identified. We used five hidden layers for that purpose. It was shown that the errors in recognition depend on the feature extraction, for low quality pictures the error was so high as 30%. However, for pictures with a good feature extraction the results of proper identification higher then 90%, were obtained.
Multiple Detector Optimization for Hidden Radiation Source Detection
2015-03-26
important in achieving operationally useful methods for optimizing detector emplacement, the 2-D attenuation model approach promises to speed up the...process of hidden source detection significantly. The model focused on detection of the full energy peak of a radiation source. Methods to optimize... radioisotope identification is possible without using a computationally intensive stochastic model such as the Monte Carlo n-Particle (MCNP) code
Holographic radar imaging privacy techniques utilizing dual-frequency implementation
NASA Astrophysics Data System (ADS)
McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.
2008-04-01
Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhance the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.
Holographic Radar Imaging Privacy Techniques Utilizing Dual-Frequency Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.
2008-04-18
Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhancemore » the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.« less
Hidden Covariation Detection Produces Faster, Not Slower, Social Judgments
ERIC Educational Resources Information Center
Barker, Lynne A.; Andrade, Jackie
2006-01-01
In P. Lewicki's (1986b) demonstration of hidden covariation detection (HCD), responses of participants were slower to faces that corresponded with a covariation encountered previously than to faces with novel covariations. This slowing contrasts with the typical finding that priming leads to faster responding and suggests that HCD is a unique type…
Kauhl, Boris; Heil, Jeanne; Hoebe, Christian J P A; Schweikart, Jürgen; Krafft, Thomas; Dukers-Muijrers, Nicole H T M
2015-01-01
Hepatitis C Virus (HCV) infections are a major cause for liver diseases. A large proportion of these infections remain hidden to care due to its mostly asymptomatic nature. Population-based screening and screening targeted on behavioural risk groups had not proven to be effective in revealing these hidden infections. Therefore, more practically applicable approaches to target screenings are necessary. Geographic Information Systems (GIS) and spatial epidemiological methods may provide a more feasible basis for screening interventions through the identification of hotspots as well as demographic and socio-economic determinants. Analysed data included all HCV tests (n = 23,800) performed in the southern area of the Netherlands between 2002-2008. HCV positivity was defined as a positive immunoblot or polymerase chain reaction test. Population data were matched to the geocoded HCV test data. The spatial scan statistic was applied to detect areas with elevated HCV risk. We applied global regression models to determine associations between population-based determinants and HCV risk. Geographically weighted Poisson regression models were then constructed to determine local differences of the association between HCV risk and population-based determinants. HCV prevalence varied geographically and clustered in urban areas. The main population at risk were middle-aged males, non-western immigrants and divorced persons. Socio-economic determinants consisted of one-person households, persons with low income and mean property value. However, the association between HCV risk and demographic as well as socio-economic determinants displayed strong regional and intra-urban differences. The detection of local hotspots in our study may serve as a basis for prioritization of areas for future targeted interventions. Demographic and socio-economic determinants associated with HCV risk show regional differences underlining that a one-size-fits-all approach even within small geographic areas may not be appropriate. Future screening interventions need to consider the spatially varying association between HCV risk and associated demographic and socio-economic determinants.
Maeda, Katsuhiro; Hirose, Daisuke; Okoshi, Natsuki; Shimomura, Kouhei; Wada, Yuya; Ikai, Tomoyuki; Kanoh, Shigeyoshi; Yashima, Eiji
2018-03-07
We report the first direct chirality sensing of a series of chiral hydrocarbons and isotopically chiral compounds (deuterated isotopomers), which are almost impossible to detect by conventional optical spectroscopic methods, by a stereoregular polyacetylene bearing 2,2'-biphenol-derived pendants. The polyacetylene showed a circular dichroism due to a preferred-handed helix formation in response to the hardly detectable hidden chirality of saturated tertiary or chiroptical quaternary hydrocarbons, and deuterated isotopomers. In sharp contrast to the previously reported sensory systems, the chirality detection by the polyacetylene relies on an excess one-handed helix formation induced by the chiral hydrocarbons and deuterated isotopomers via significant amplification of the chirality followed by its static memory, through which chiral information on the minute and hidden chirality can be stored as an excess of a single-handed helix memory for a long time.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harris, S; Dave Dunn, D
The sensitivity of two specific types of radionuclide detectors for conducting an on-board search in the maritime environment was evaluated using Monte Carlo simulation implemented in AVERT{reg_sign}. AVERT{reg_sign}, short for the Automated Vulnerability Evaluation for Risk of Terrorism, is personal computer based vulnerability assessment software developed by the ARES Corporation. The sensitivity of two specific types of radionuclide detectors for conducting an on-board search in the maritime environment was evaluated using Monte Carlo simulation. The detectors, a RadPack and also a Personal Radiation Detector (PRD), were chosen from the class of Human Portable Radiation Detection Systems (HPRDS). Human Portable Radiationmore » Detection Systems (HPRDS) serve multiple purposes. In the maritime environment, there is a need to detect, localize, characterize, and identify radiological/nuclear (RN) material or weapons. The RadPack is a commercially available broad-area search device used for gamma and also for neutron detection. The PRD is chiefly used as a personal radiation protection device. It is also used to detect contraband radionuclides and to localize radionuclide sources. Neither device has the capacity to characterize or identify radionuclides. The principal aim of this study was to investigate the sensitivity of both the RadPack and the PRD while being used under controlled conditions in a simulated maritime environment for detecting hidden RN contraband. The detection distance varies by the source strength and the shielding present. The characterization parameters of the source are not indicated in this report so the results summarized are relative. The Monte Carlo simulation results indicate the probability of detection of the RN source at certain distances from the detector which is a function of transverse speed and instrument sensitivity for the specified RN source.« less
Dewey, Rebecca Susan; Hall, Deborah A; Guest, Hannah; Prendergast, Garreth; Plack, Christopher J; Francis, Susan T
2018-03-09
Rodent studies indicate that noise exposure can cause permanent damage to synapses between inner hair cells and high-threshold auditory nerve fibers, without permanently altering threshold sensitivity. These demonstrations of what is commonly known as hidden hearing loss have been confirmed in several rodent species, but the implications for human hearing are unclear. Our Medical Research Council-funded program aims to address this unanswered question, by investigating functional consequences of the damage to the human peripheral and central auditory nervous system that results from cumulative lifetime noise exposure. Behavioral and neuroimaging techniques are being used in a series of parallel studies aimed at detecting hidden hearing loss in humans. The planned neuroimaging study aims to (1) identify central auditory biomarkers associated with hidden hearing loss; (2) investigate whether there are any additive contributions from tinnitus or diminished sound tolerance, which are often comorbid with hearing problems; and (3) explore the relation between subcortical functional magnetic resonance imaging (fMRI) measures and the auditory brainstem response (ABR). Individuals aged 25 to 40 years with pure tone hearing thresholds ≤20 dB hearing level over the range 500 Hz to 8 kHz and no contraindications for MRI or signs of ear disease will be recruited into the study. Lifetime noise exposure will be estimated using an in-depth structured interview. Auditory responses throughout the central auditory system will be recorded using ABR and fMRI. Analyses will focus predominantly on correlations between lifetime noise exposure and auditory response characteristics. This paper reports the study protocol. The funding was awarded in July 2013. Enrollment for the study described in this protocol commenced in February 2017 and was completed in December 2017. Results are expected in 2018. This challenging and comprehensive study will have the potential to impact diagnostic procedures for hidden hearing loss, enabling early identification of noise-induced auditory damage via the detection of changes in central auditory processing. Consequently, this will generate the opportunity to give personalized advice regarding provision of ear defense and monitoring of further damage, thus reducing the incidence of noise-induced hearing loss. ©Rebecca Susan Dewey, Deborah A Hall, Hannah Guest, Garreth Prendergast, Christopher J Plack, Susan T Francis. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 09.03.2018.
Heating up the Galaxy with hidden photons
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dubovsky, Sergei; Hernández-Chifflet, Guzmán, E-mail: dubovsky@nyu.edu, E-mail: ghc236@nyu.edu
2015-12-01
We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the waymore » down to the hidden photon masses of order 10{sup −20} eV.« less
Heating up the Galaxy with hidden photons
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dubovsky, Sergei; Hernández-Chifflet, Guzmán; Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300
2015-12-29
We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the waymore » down to the hidden photon masses of order 10{sup −20} eV.« less
Careri, Maria; Elviri, Lisa; Mangia, Alessandro; Mucchino, Claudio
2007-03-01
A novel ICP-MS-based ELISA immunoassay via element-tagged determination was devised for quantitative analysis of hidden allergens in food. The method was able to detect low amounts of peanuts (down to approximately 2 mg peanuts kg(-1) cereal-based matrix) by using a europium-tagged antibody. Selectivity was proved by the lack of detectable cross-reaction with a number of protein-rich raw materials.
Behavioral and Temporal Pattern Detection Within Financial Data With Hidden Information
2012-02-01
probabilistic pattern detector to monitor the pattern. 15. SUBJECT TERMS Runtime verification, Hidden data, Hidden Markov models, Formal specifications...sequences in many other fields besides financial systems [L, TV, LC, LZ ]. Rather, the technique suggested in this paper is positioned as a hybrid...operation of the pattern detector . Section 7 describes the operation of the probabilistic pattern-matching monitor, and section 8 describes three
NASA Astrophysics Data System (ADS)
An, Yun-Kyu; Song, Homin; Sohn, Hoon
2014-09-01
This paper presents a wireless ultrasonic wavefield imaging (WUWI) technique for detecting hidden damage inside a steel box girder bridge. The proposed technique allows (1) complete wireless excitation of piezoelectric transducers and noncontact sensing of the corresponding responses using laser beams, (2) autonomous damage visualization without comparing against baseline data previously accumulated from the pristine condition of a target structure and (3) robust damage diagnosis even for real structures with complex structural geometries. First, a new WUWI hardware system was developed by integrating optoelectronic-based signal transmitting and receiving devices and a scanning laser Doppler vibrometer. Next, a damage visualization algorithm, self-referencing f-k filter (SRF), was introduced to isolate and visualize only crack-induced ultrasonic modes from measured ultrasonic wavefield images. Finally, the performance of the proposed technique was validated through hidden crack visualization at a decommissioned Ramp-G Bridge in South Korea. The experimental results reveal that the proposed technique instantaneously detects and successfully visualizes hidden cracks even in the complex structure of a real bridge.
Discovering Hidden Controlling Parameters using Data Analytics and Dimensional Analysis
NASA Astrophysics Data System (ADS)
Del Rosario, Zachary; Lee, Minyong; Iaccarino, Gianluca
2017-11-01
Dimensional Analysis is a powerful tool, one which takes a priori information and produces important simplifications. However, if this a priori information - the list of relevant parameters - is missing a relevant quantity, then the conclusions from Dimensional Analysis will be incorrect. In this work, we present novel conclusions in Dimensional Analysis, which provide a means to detect this failure mode of missing or hidden parameters. These results are based on a restated form of the Buckingham Pi theorem that reveals a ridge function structure underlying all dimensionless physical laws. We leverage this structure by constructing a hypothesis test based on sufficient dimension reduction, allowing for an experimental data-driven detection of hidden parameters. Both theory and examples will be presented, using classical turbulent pipe flow as the working example. Keywords: experimental techniques, dimensional analysis, lurking variables, hidden parameters, buckingham pi, data analysis. First author supported by the NSF GRFP under Grant Number DGE-114747.
A two particle hidden sector and the oscillations with photons
NASA Astrophysics Data System (ADS)
Alvarez, Pedro D.; Arias, Paola; Maldonado, Carlos
2018-01-01
We present a detailed study of the oscillations and optical properties for vacuum, in a model for the dark sector that contains axion-like particles and hidden photons. We provide bounds for the couplings versus the mass, using current results from ALPS-I and PVLAS. We also discuss the challenges for the detection of models with more than one hidden particle in light shining trough wall-like experiments.
Use of a Parabolic Microphone to Detect Hidden Subjects in Search and Rescue.
Bowditch, Nathaniel L; Searing, Stanley K; Thomas, Jeffrey A; Thompson, Peggy K; Tubis, Jacqueline N; Bowditch, Sylvia P
2018-03-01
This study compares a parabolic microphone to unaided hearing in detecting and comprehending hidden callers at ranges of 322 to 2510 m. Eight subjects were placed 322 to 2510 m away from a central listening point. The subjects were concealed, and their calling volume was calibrated. In random order, subjects were asked to call the name of a state for 5 minutes. Listeners with parabolic microphones and others with unaided hearing recorded the direction of the call (detection) and name of the state (comprehension). The parabolic microphone was superior to unaided hearing in both detecting subjects and comprehending their calls, with an effect size (Cohen's d) of 1.58 for detection and 1.55 for comprehension. For each of the 8 hidden subjects, there were 24 detection attempts with the parabolic microphone and 54 to 60 attempts by unaided listeners. At the longer distances (1529-2510 m), the parabolic microphone was better at detecting callers (83% vs 51%; P<0.00001 by χ 2 ) and comprehension (57% vs 12%; P<0.00001). At the shorter distances (322-1190 m), the parabolic microphone offered advantages in detection (100% vs 83%; P=0.000023) and comprehension (86% vs 51%; P<0.00001), although not as pronounced as at the longer distances. Use of a 66-cm (26-inch) parabolic microphone significantly improved detection and comprehension of hidden calling subjects at distances between 322 and 2510 m when compared with unaided hearing. This study supports the use of a parabolic microphone in search and rescue to locate responsive subjects in favorable weather and terrain. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.
Magneto-Radar Hidden Metal Detector
McEwan, Thomas E.
2005-07-05
A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.
NASA Astrophysics Data System (ADS)
Geltner, I.; Hashimshony, D.; Zigler, A.
2002-07-01
We use a time-domain analysis method to characterize the outer layer of a multilayer structure regardless of the inner ones, thus simplifying the characterization of all the layers. We combine this method with THz reflection spectroscopy to detect nondestructively a hidden aluminum oxide layer under opaque paint and to measure its conductivity and high-frequency dielectric constant in the THz range.
Discriminative latent models for recognizing contextual group activities.
Lan, Tian; Wang, Yang; Yang, Weilong; Robinovitch, Stephen N; Mori, Greg
2012-08-01
In this paper, we go beyond recognizing the actions of individuals and focus on group activities. This is motivated from the observation that human actions are rarely performed in isolation; the contextual information of what other people in the scene are doing provides a useful cue for understanding high-level activities. We propose a novel framework for recognizing group activities which jointly captures the group activity, the individual person actions, and the interactions among them. Two types of contextual information, group-person interaction and person-person interaction, are explored in a latent variable framework. In particular, we propose three different approaches to model the person-person interaction. One approach is to explore the structures of person-person interaction. Differently from most of the previous latent structured models, which assume a predefined structure for the hidden layer, e.g., a tree structure, we treat the structure of the hidden layer as a latent variable and implicitly infer it during learning and inference. The second approach explores person-person interaction in the feature level. We introduce a new feature representation called the action context (AC) descriptor. The AC descriptor encodes information about not only the action of an individual person in the video, but also the behavior of other people nearby. The third approach combines the above two. Our experimental results demonstrate the benefit of using contextual information for disambiguating group activities.
Discriminative Latent Models for Recognizing Contextual Group Activities
Lan, Tian; Wang, Yang; Yang, Weilong; Robinovitch, Stephen N.; Mori, Greg
2012-01-01
In this paper, we go beyond recognizing the actions of individuals and focus on group activities. This is motivated from the observation that human actions are rarely performed in isolation; the contextual information of what other people in the scene are doing provides a useful cue for understanding high-level activities. We propose a novel framework for recognizing group activities which jointly captures the group activity, the individual person actions, and the interactions among them. Two types of contextual information, group-person interaction and person-person interaction, are explored in a latent variable framework. In particular, we propose three different approaches to model the person-person interaction. One approach is to explore the structures of person-person interaction. Differently from most of the previous latent structured models, which assume a predefined structure for the hidden layer, e.g., a tree structure, we treat the structure of the hidden layer as a latent variable and implicitly infer it during learning and inference. The second approach explores person-person interaction in the feature level. We introduce a new feature representation called the action context (AC) descriptor. The AC descriptor encodes information about not only the action of an individual person in the video, but also the behavior of other people nearby. The third approach combines the above two. Our experimental results demonstrate the benefit of using contextual information for disambiguating group activities. PMID:22144516
Detection of Illicit Drugs with the EURITRACK System
NASA Astrophysics Data System (ADS)
Perot, B.; Carasco, C.; Valkovic, V.; Sudac, D.; Franulovic, A.
2009-03-01
The EURopean Illicit TRAfficking Countermeasures Kit (EURITRACK) inspection system has been developed within the 6th EU Framework Program to complement X-ray scanners in the detection of explosives and other illicit materials hidden in cargo containers. Gamma rays are produced inside the cargo materials by 14 MeV tagged neutron beams, which yields information about the chemical composition of the transported goods. In the beginning of year 2007, the EURITRACK system was implemented in the Seaport of Rijeka, Croatia, primarily to carry out a demonstration using real containers to conduct a series of detection tests. This article reports tests performed with real samples of illicit drugs hidden in a metallic cargo with an average density of 0.2 g/cm3. Heroin and cocaine have been distinguished from benign substances based on their chemical composition. Marijuana, which chemical composition is similar to benign materials, cannot be distinguished from common organic goods. However, the detection of an unexpected organic substance inside the metallic cargo indicates that a suspicious object has been hidden in the container.
NASA Astrophysics Data System (ADS)
La Cour, Brian R.
2017-07-01
An experiment has recently been performed to demonstrate quantum nonlocality by establishing contextuality in one of a pair of photons encoding four qubits; however, low detection efficiencies and use of the fair-sampling hypothesis leave these results open to possible criticism due to the detection loophole. In this Letter, a physically motivated local hidden-variable model is considered as a possible mechanism for explaining the experimentally observed results. The model, though not intrinsically contextual, acquires this quality upon post-selection of coincident detections.
Ong, Lee-Ling S; Xinghua Zhang; Kundukad, Binu; Dauwels, Justin; Doyle, Patrick; Asada, H Harry
2016-08-01
An approach to automatically detect bacteria division with temporal models is presented. To understand how bacteria migrate and proliferate to form complex multicellular behaviours such as biofilms, it is desirable to track individual bacteria and detect cell division events. Unlike eukaryotic cells, prokaryotic cells such as bacteria lack distinctive features, causing bacteria division difficult to detect in a single image frame. Furthermore, bacteria may detach, migrate close to other bacteria and may orientate themselves at an angle to the horizontal plane. Our system trains a hidden conditional random field (HCRF) model from tracked and aligned bacteria division sequences. The HCRF model classifies a set of image frames as division or otherwise. The performance of our HCRF model is compared with a Hidden Markov Model (HMM). The results show that a HCRF classifier outperforms a HMM classifier. From 2D bright field microscopy data, it is a challenge to separate individual bacteria and associate observations to tracks. Automatic detection of sequences with bacteria division will improve tracking accuracy.
NASA Astrophysics Data System (ADS)
Wan, Weibing; Yuan, Lingfeng; Zhao, Qunfei; Fang, Tao
2018-01-01
Saliency detection has been applied to the target acquisition case. This paper proposes a two-dimensional hidden Markov model (2D-HMM) that exploits the hidden semantic information of an image to detect its salient regions. A spatial pyramid histogram of oriented gradient descriptors is used to extract features. After encoding the image by a learned dictionary, the 2D-Viterbi algorithm is applied to infer the saliency map. This model can predict fixation of the targets and further creates robust and effective depictions of the targets' change in posture and viewpoint. To validate the model with a human visual search mechanism, two eyetrack experiments are employed to train our model directly from eye movement data. The results show that our model achieves better performance than visual attention. Moreover, it indicates the plausibility of utilizing visual track data to identify targets.
Detect and exploit hidden structure in fatty acid signature data
Budge, Suzanne; Bromaghin, Jeffrey F.; Thiemann, Gregory
2017-01-01
Estimates of predator diet composition are essential to our understanding of their ecology. Although several methods of estimating diet are practiced, methods based on biomarkers have become increasingly common. Quantitative fatty acid signature analysis (QFASA) is a popular method that continues to be refined and extended. Quantitative fatty acid signature analysis is based on differences in the signatures of prey types, often species, which are recognized and designated by investigators. Similarly, predator signatures may be structured by known factors such as sex or age class, and the season or region of sample collection. The recognized structure in signature data inherently influences QFASA results in important and typically beneficial ways. However, predator and prey signatures may contain additional, hidden structure that investigators either choose not to incorporate into an analysis or of which they are unaware, being caused by unknown ecological mechanisms. Hidden structure also influences QFASA results, most often negatively. We developed a new method to explore signature data for hidden structure, called divisive magnetic clustering (DIMAC). Our DIMAC approach is based on the same distance measure used in diet estimation, closely linking methods of data exploration and parameter estimation, and it does not require data transformation or distributional assumptions, as do many multivariate ordination methods in common use. We investigated the potential benefits of the DIMAC method to detect and subsequently exploit hidden structure in signature data using two prey signature libraries with quite different characteristics. We found that the existence of hidden structure in prey signatures can increase the confusion between prey types and thereby reduce the accuracy and precision of QFASA diet estimates. Conversely, the detection and exploitation of hidden structure represent a potential opportunity to improve predator diet estimates and may lead to new insights into the ecology of either predator or prey. The DIMAC algorithm is implemented in the R diet estimation package qfasar.
Su, Ri-Qi; Wang, Wen-Xu; Wang, Xiao; Lai, Ying-Cheng
2016-01-01
Given a complex geospatial network with nodes distributed in a two-dimensional region of physical space, can the locations of the nodes be determined and their connection patterns be uncovered based solely on data? We consider the realistic situation where time series/signals can be collected from a single location. A key challenge is that the signals collected are necessarily time delayed, due to the varying physical distances from the nodes to the data collection centre. To meet this challenge, we develop a compressive-sensing-based approach enabling reconstruction of the full topology of the underlying geospatial network and more importantly, accurate estimate of the time delays. A standard triangularization algorithm can then be employed to find the physical locations of the nodes in the network. We further demonstrate successful detection of a hidden node (or a hidden source or threat), from which no signal can be obtained, through accurate detection of all its neighbouring nodes. As a geospatial network has the feature that a node tends to connect with geophysically nearby nodes, the localized region that contains the hidden node can be identified. PMID:26909187
NASA Astrophysics Data System (ADS)
Dill, Stephan; Peichl, Markus; Jirousek, Matthias; Süß, Helmut
2009-09-01
The contactless control of persons and the remote surveillance of sensitive infrastructures are important tasks in order to provide the required security measures to protect the human population against the threads of international terrorism. Passive microwave imaging allows a daytime independent observation and examination of objects and persons under nearly all adverse ambient conditions without artificial exposure, hence fully avoiding health risks. The penetration capability of microwaves provides the detection of objects through atmospheric obstacles like bad weather, fog or dust, vapour and smoke, as well as through thin non-metallic materials and clothing. For the latter the detection of hidden objects like weapons, explosives, and contraband is possible by monitoring dielectric anomalies. The experiment "Common Shield" is part of a perennial investigation series leaded by the "Center for Transformation of the German armed forces (Bundeswehr)". In 2008 the protection of soldiers and facilities was experimentally investigated under the aspect of a networked operational leadership. In this context as well a harbour protection trial was carried out in August/September 2008 at the naval base Eckernfoerde in Germany. This trial was part of the NATO CNADs program of work for "Defence Against Terrorism (DAT)" starting in 2003, and Germany is the lead nation for item 7 on "Technology for Intelligence, Surveillance, Reconnaissance & Target Acquisition of Terrorists (ISRTA)". One main activity in the Eckernfoerde trial was the simulation of a military entrance control facility by a tent including various imaging and a chemical sensor suite in order to provide security for a military camp. Besides commercial optical and infrared cameras various passive millimeter-wave imagers have been used from different German research institutions. The DLR Microwaves and Radar Institute, Department for Reconnaissance and Security (HR-AS), provided an imaging radiometer scanner operating at W band. A multitude of situations have been simulated and many persons carrying hidden objects under their clothing have been scanned. The ongoing evaluation of the radiometer measurements are shown and discussed in the paper.
Analysis of surface EMG baseline for detection of hidden muscle activity
NASA Astrophysics Data System (ADS)
Zhang, Xu; Zhou, Ping
2014-02-01
Objective. This study explored the feasibility of detecting hidden muscle activity in surface electromyogram (EMG) baseline. Approach. Power spectral density (PSD) analysis and multi-scale entropy (MSE) analysis were used. Both analyses were applied to computer simulations of surface EMG baseline with the presence (representing activity data) or absence (representing reference data) of hidden muscle activity, as well as surface electrode array EMG baseline recordings of healthy control and amyotrophic lateral sclerosis (ALS) subjects. Main results. Although the simulated reference data and the activity data yielded no distinguishable difference in the time domain, they demonstrated a significant difference in the frequency and signal complexity domains with the PSD and MSE analyses. For a comparison using pooled data, such a difference was also observed when the PSD and MSE analyses were applied to surface electrode array EMG baseline recordings of healthy control and ALS subjects, which demonstrated no distinguishable difference in the time domain. Compared with the PSD analysis, the MSE analysis appeared to be more sensitive for detecting the difference in surface EMG baselines between the two groups. Significance. The findings implied the presence of a hidden muscle activity in surface EMG baseline recordings from the ALS subjects. To promote the presented analysis as a useful diagnostic or investigatory tool, future studies are necessary to assess the pathophysiological nature or origins of the hidden muscle activity, as well as the baseline difference at the individual subject level.
Analysis of Surface EMG Baseline for Detection of Hidden Muscle Activity
Zhang, Xu; Zhou, Ping
2014-01-01
Objective This study explored the feasibility of detecting hidden muscle activity in surface electromyogram (EMG) baseline. Approach Power spectral density (PSD) analysis and multi-scale entropy (MSE) analysis were used respectively. Both analyses were applied to computer simulations of surface EMG baseline with presence (representing activity data) or absence (representing reference data) of hidden muscle activity, as well as surface electrode array EMG baseline recordings of healthy control and amyotrophic lateral sclerosis (ALS) subjects. Main results Although the simulated reference data and the activity data yielded no distinguishable difference in the time domain, they demonstrated a significant difference in the frequency and signal complexity domains with the PSD and MSE analyses. For a comparison using pooled data, such a difference was also observed when the PSD and MSE analyses were applied to surface electrode array EMG baseline recordings of healthy control and ALS subjects, which demonstrated no distinguishable difference in the time domain. Compared with the PSD analysis, the MSE analysis appeared to be more sensitive for detecting the difference in surface EMG baselines between the two groups. Significance The findings implied presence of hidden muscle activity in surface EMG baseline recordings from the ALS subjects. To promote the presented analysis as a useful diagnostic or investigatory tool, future studies are necessary to assess the pathophysiological nature or origins of the hidden muscle activity, as well as the baseline difference at the individual subject level. PMID:24445526
Standoff detection of hidden objects using backscattered ultra-intense laser-produced x-rays
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kuwabara, H.; Mori, Y.; Kitagawa, Y.
2013-08-28
Ultra-intense laser-produced sub-ps X-ray pulses can detect backscattered signals from objects hidden in aluminium containers. Coincident measurements using primary X-rays enable differentiation among acrylic, copper, and lead blocks inside the container. Backscattering reveals the shapes of the objects, while their material composition can be identified from the modification methods of the energy spectra of backscattered X-ray beams. This achievement is an important step toward more effective homeland security.
Killing and letting die: hidden value assumptions.
Atkinson, G
1983-01-01
In this paper I argue for several related theses: first, that the distinction between killing and letting die, as it is drawn by ordinary persons in ordinary contexts, is more complex than is generally understood; second, that the key feature of this complexity lies in the presence of a hidden normative component in what appears to be a straightforwardly descriptive distinction; and, third, that this complexity renders the killing/letting die distinction an inadequate and hazardous guide for moral reasoning.
An adaptive Hidden Markov Model for activity recognition based on a wearable multi-sensor device
USDA-ARS?s Scientific Manuscript database
Human activity recognition is important in the study of personal health, wellness and lifestyle. In order to acquire human activity information from the personal space, many wearable multi-sensor devices have been developed. In this paper, a novel technique for automatic activity recognition based o...
Hidden Markov models and neural networks for fault detection in dynamic systems
NASA Technical Reports Server (NTRS)
Smyth, Padhraic
1994-01-01
Neural networks plus hidden Markov models (HMM) can provide excellent detection and false alarm rate performance in fault detection applications, as shown in this viewgraph presentation. Modified models allow for novelty detection. Key contributions of neural network models are: (1) excellent nonparametric discrimination capability; (2) a good estimator of posterior state probabilities, even in high dimensions, and thus can be embedded within overall probabilistic model (HMM); and (3) simple to implement compared to other nonparametric models. Neural network/HMM monitoring model is currently being integrated with the new Deep Space Network (DSN) antenna controller software and will be on-line monitoring a new DSN 34-m antenna (DSS-24) by July, 1994.
NASA Astrophysics Data System (ADS)
Brown, David A.
1994-10-01
In the area of security and surveillance technologies, the problem of the arrival in Canada of illegal and undesirable ship and truck cargo loads is steadily increasing. As the volumes of cargo arrivals increase so do the Immigration and Customs problems related to the determination of the validity of those cargo contents. Of special concern to Immigration Control Authorities around the world is the emerging and increasing trend of illegal smuggling of human beings hidden inside of shipping containers. Beginning in 1992, Immigration Control Authorities in Canada observed an escalation of alien people smuggling through the use of cargo shipping containers arriving in the Port of Montreal. This paper will present to the audience the recently completed Immigration Canada Human Occupancy Detection project by explaining the design, development and testing of human occupancy detectors. The devices are designed to electronically detect the presence of persons hiding inside of shipping containers, without the requirement of opening the container doors. The human occupancy detection concepts are based upon the presence of carbon dioxide or other human waste characteristics commonly found inside of shipping containers.
Photoacoustic imaging of hidden dental caries by using a bundle of hollow optical fibers
NASA Astrophysics Data System (ADS)
Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji
2018-02-01
Photoacoustic imaging system using a bundle of hollow-optical fibers to detect hidden dental caries is proposed. Firstly, we fabricated a hidden caries model with a brown pigment simulating a common color of caries lesion. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating Nd:YAG laser light with a 532 nm wavelength to occlusal surface of model tooth. We calculated by Fourier transform and found that the waveform from the carious part provides frequency components of approximately from 0.5 to 1.2 MHz. Then a photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for clinical applications. From intensity map of frequency components in 0.5-1.2 MHz, photoacoustic images of hidden caries in the simulated samples were successfully obtained.
Tanabe, Soichi; Miyauchi, Eiji; Muneshige, Akemi; Mio, Kazuhiro; Sato, Chikara; Sato, Masahiko
2007-07-01
A PCR method to detect porcine DNA was developed for verifying the allergen labeling of foods and for identifying hidden pork ingredients in processed foods. The primer pair, F2/R1, was designed to detect the gene encoding porcine cytochrome b for the specific detection of pork with high sensitivity. The amplified DNA fragment (130 bp) was specifically detected from porcine DNA, while no amplification occurred with other species such as cattle, chicken, sheep, and horse. When the developed PCR method was used for investigating commercial food products, porcine DNA was clearly detected in those containing pork in the list of ingredients. In addition, 100 ppb of pork in heated gyoza (pork and vegetable dumpling) could be detected by this method. This method is rapid, specific and sensitive, making it applicable for detecting trace amounts of pork in processed foods.
Priming Interpretations: Contextual Impact on the Processing of Garden Path Jokes
ERIC Educational Resources Information Center
Mayerhofer, Bastian; Maier, Katja; Schacht, Annekathrin
2016-01-01
In garden path (GP) jokes, a first dominant interpretation is detected as incoherent and subsequently substituted by a hidden joke interpretation. Two important factors for the processing of GP jokes are salience of the initial interpretation and accessibility of the hidden interpretation. Both factors are assumed to be affected by contextual…
Acoustic vibration test detects intermittent electrical discontinuities
NASA Technical Reports Server (NTRS)
Grieve, S. M.; Roberts, D. E.
1970-01-01
Nondestructive test method detects faulty electrical connections in inaccessible or hidden portions of electronic harness assemblies and connectors. Method employs readily available commercial equipment.
Galaxies Detected by the Dwingeloo Obscured Galaxies Survey
NASA Astrophysics Data System (ADS)
Rivers, A. J.; Henning, P. A.; Kraan-Korteweg, R. C.
1999-04-01
The Dwingeloo Obscured Galaxies Survey (DOGS) is a 21-cm blind survey for galaxies hidden in the northern `Zone of Avoidance' (ZOA): the portion of the optical extragalactic sky which is obscured by dust in the Milky Way. Like the Parkes southern hemisphere ZOA survey, the DOGS project is designed to reveal hidden dynamically important nearby galaxies and to help `fill in the blanks' in the local large scale structure. To date, 36 galaxies have been detected by the Dwingeloo survey; 23 of these were previously unknown [no corresponding sources recorded in the NASA Extragalactic Database (NED)]. Among the interesting detections are three nearby galaxies in the vicinity of NGC 6946 and 11 detections in the Supergalactic plane crossing region. VLA follow-up observations have been conducted for several of the DOGS detections.
Al Hirschfeld's NINA as a prototype search task for studying perceptual error in radiology
NASA Astrophysics Data System (ADS)
Nodine, Calvin F.; Kundel, Harold L.
1997-04-01
Artist Al Hirschfeld has been hiding the word NINA (his daughter's name) in line drawings of theatrical scenes that have appeared in the New York Times for over 50 years. This paper shows how Hirschfeld's search task of finding the name NINA in his drawings illustrates basic perceptual principles of detection, discrimination and decision-making commonly encountered in radiology search tasks. Hirschfeld's hiding of NINA is typically accomplished by camouflaging the letters of the name and blending them into scenic background details such as wisps of hair and folds of clothing. In a similar way, pulmonary nodules and breast lesions are camouflaged by anatomic features of the chest or breast image. Hirschfeld's hidden NINAs are sometimes missed because they are integrated into a Gestalt overview rather than differentiated from background features during focal scanning. This may be similar to overlooking an obvious nodule behind the heart in a chest x-ray image. Because it is a search game, Hirschfeld assigns a number to each drawing to indicate how many NINAs he has hidden so as not to frustrate his viewers. In the radiologists' task, the number of targets detected in a medical image is determined by combining perceptual input with probabilities generated from clinical history and viewing experience. Thus, in the absence of truth, searching for abnormalities in x-ray images creates opportunities for recognition and decision errors (e.g. false positives and false negatives). We illustrate how camouflage decreases the conspicuity of both artistic and radiographic targets, compare detection performance of radiologists with lay persons searching for NINAs, and, show similarities and differences between scanning strategies of the two groups based on eye-position data.
What's Mine Is Mine: Twelve-Month-Olds Use Possessive Pronouns to Identify Referents
ERIC Educational Resources Information Center
Saylor, Megan M.; Ganea, Patricia A.; Vazquez, Maria D.
2011-01-01
This research investigated 12-month-olds' ability to use person-specific language to determine to which of several absent things a person is referring. Infants were introduced to two experimenters who played separately with a different ball. One researcher asked infants to retrieve her object when both balls were hidden. Infants selected the…
Measuring the usefulness of hidden units in Boltzmann machines with mutual information.
Berglund, Mathias; Raiko, Tapani; Cho, Kyunghyun
2015-04-01
Restricted Boltzmann machines (RBMs) and deep Boltzmann machines (DBMs) are important models in deep learning, but it is often difficult to measure their performance in general, or measure the importance of individual hidden units in specific. We propose to use mutual information to measure the usefulness of individual hidden units in Boltzmann machines. The measure is fast to compute, and serves as an upper bound for the information the neuron can pass on, enabling detection of a particular kind of poor training results. We confirm experimentally that the proposed measure indicates how much the performance of the model drops when some of the units of an RBM are pruned away. We demonstrate the usefulness of the measure for early detection of poor training in DBMs. Copyright © 2014 Elsevier Ltd. All rights reserved.
Multispectral THz-VIS passive imaging system for hidden threats visualization
NASA Astrophysics Data System (ADS)
Kowalski, Marcin; Palka, Norbert; Szustakowski, Mieczyslaw
2013-10-01
Terahertz imaging, is the latest entry into the crowded field of imaging technologies. Many applications are emerging for the relatively new technology. THz radiation penetrates deep into nonpolar and nonmetallic materials such as paper, plastic, clothes, wood, and ceramics that are usually opaque at optical wavelengths. The T-rays have large potential in the field of hidden objects detection because it is not harmful to humans. The main difficulty in the THz imaging systems is low image quality thus it is justified to combine THz images with the high-resolution images from a visible camera. An imaging system is usually composed of various subsystems. Many of the imaging systems use imaging devices working in various spectral ranges. Our goal is to build a system harmless to humans for screening and detection of hidden objects using a THz and VIS cameras.
Modelling proteins' hidden conformations to predict antibiotic resistance
NASA Astrophysics Data System (ADS)
Hart, Kathryn M.; Ho, Chris M. W.; Dutta, Supratik; Gross, Michael L.; Bowman, Gregory R.
2016-10-01
TEM β-lactamase confers bacteria with resistance to many antibiotics and rapidly evolves activity against new drugs. However, functional changes are not easily explained by differences in crystal structures. We employ Markov state models to identify hidden conformations and explore their role in determining TEM's specificity. We integrate these models with existing drug-design tools to create a new technique, called Boltzmann docking, which better predicts TEM specificity by accounting for conformational heterogeneity. Using our MSMs, we identify hidden states whose populations correlate with activity against cefotaxime. To experimentally detect our predicted hidden states, we use rapid mass spectrometric footprinting and confirm our models' prediction that increased cefotaxime activity correlates with reduced Ω-loop flexibility. Finally, we design novel variants to stabilize the hidden cefotaximase states, and find their populations predict activity against cefotaxime in vitro and in vivo. Therefore, we expect this framework to have numerous applications in drug and protein design.
Modelling proteins’ hidden conformations to predict antibiotic resistance
Hart, Kathryn M.; Ho, Chris M. W.; Dutta, Supratik; Gross, Michael L.; Bowman, Gregory R.
2016-01-01
TEM β-lactamase confers bacteria with resistance to many antibiotics and rapidly evolves activity against new drugs. However, functional changes are not easily explained by differences in crystal structures. We employ Markov state models to identify hidden conformations and explore their role in determining TEM’s specificity. We integrate these models with existing drug-design tools to create a new technique, called Boltzmann docking, which better predicts TEM specificity by accounting for conformational heterogeneity. Using our MSMs, we identify hidden states whose populations correlate with activity against cefotaxime. To experimentally detect our predicted hidden states, we use rapid mass spectrometric footprinting and confirm our models’ prediction that increased cefotaxime activity correlates with reduced Ω-loop flexibility. Finally, we design novel variants to stabilize the hidden cefotaximase states, and find their populations predict activity against cefotaxime in vitro and in vivo. Therefore, we expect this framework to have numerous applications in drug and protein design. PMID:27708258
Radio for hidden-photon dark matter detection
Chaudhuri, Saptarshi; Graham, Peter W.; Irwin, Kent; ...
2015-10-08
We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled “hidden electric field,” oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that the observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Ourmore » “straw man” setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies, there is an upper limit to the useful size of a single resonator set by 1/ν. However, many resonators may be multiplexed within a hidden-photon coherence length to increase the sensitivity in this regime. Hidden-photon dark matter has an enormous range of possible frequencies, but current experiments search only over a few narrow pieces of that range. As a result, we find the potential sensitivity of our proposal is many orders of magnitude beyond current limits over an extensive range of frequencies, from 100 Hz up to 700 GHz and potentially higher.« less
Motion effects in multistatic millimeter-wave imaging systems
NASA Astrophysics Data System (ADS)
Schiessl, Andreas; Ahmed, Sherif Sayed; Schmidt, Lorenz-Peter
2013-10-01
At airport security checkpoints, authorities are demanding improved personnel screening devices for increased security. Active mm-wave imaging systems deliver the high quality images needed for reliable automatic detection of hidden threats. As mm-wave imaging systems assume static scenarios, motion effects caused by movement of persons during the screening procedure can degrade image quality, so very short measurement time is required. Multistatic imaging array designs and fully electronic scanning in combination with digital beamforming offer short measurement time together with high resolution and high image dynamic range, which are critical parameters for imaging systems used for passenger screening. In this paper, operational principles of such systems are explained, and the performance of the imaging systems with respect to motion within the scenarios is demonstrated using mm-wave images of different test objects and standing as well as moving persons. Electronic microwave imaging systems using multistatic sparse arrays are suitable for next generation screening systems, which will support on the move screening of passengers.
Detecting hidden particles with MATHUSLA
NASA Astrophysics Data System (ADS)
Evans, Jared A.
2018-03-01
A hidden sector containing light long-lived particles provides a well-motivated place to find new physics. The recently proposed MATHUSLA experiment has the potential to be extremely sensitive to light particles originating from rare meson decays in the very long lifetime region. In this work, we illustrate this strength with the specific example of a light scalar mixed with the standard model-like Higgs boson, a model where MATHUSLA can further probe unexplored parameter space from exotic Higgs decays. Design augmentations should be considered in order to maximize the ability of MATHUSLA to discover very light hidden sector particles.
Empowering students with the hidden curriculum.
Neve, Hilary; Collett, Tracey
2017-11-27
The hidden curriculum (HC) refers to unscripted, ad hoc learning that occurs outside the formal, taught curriculum and can have a powerful influence on the professional development of students. While this learning may be positive, it may conflict with that taught in the formal curriculum. Medical schools take a range of steps to address these negative effects; however, the existence and nature of the concept tends to be hidden from students. Since 2007, our medical school has incorporated into its small group programme an educational activity exploring the concept of the hidden curriculum. We undertook a qualitative evaluation of our intervention, conducting a thematic analysis of students' wiki reflections about the HC. We also analysed students' responses to a short questionnaire about the educational approach used. The majority of students felt that the HC session was important and relevant. Most appeared able to identify positive and negative HC experiences and consider how these might influence their learning and development, although a few students found the concept of the HC hard to grasp. Revealing and naming the hidden curriculum can make students aware of its existence and understand its potential impact. The hidden curriculum may also be a useful tool for triggering debate about issues such as power, patient centredness, personal resilience and career stereotypes in medicine. Supporting students to think critically about HC experiences may empower them to make active choices about which messages to take on board. The hidden curriculum can have a powerful influence on the professional development of students. © 2017 John Wiley & Sons Ltd and The Association for the Study of Medical Education.
Kim, Jihun; Kim, Jonghong; Jang, Gil-Jin; Lee, Minho
2017-03-01
Deep learning has received significant attention recently as a promising solution to many problems in the area of artificial intelligence. Among several deep learning architectures, convolutional neural networks (CNNs) demonstrate superior performance when compared to other machine learning methods in the applications of object detection and recognition. We use a CNN for image enhancement and the detection of driving lanes on motorways. In general, the process of lane detection consists of edge extraction and line detection. A CNN can be used to enhance the input images before lane detection by excluding noise and obstacles that are irrelevant to the edge detection result. However, training conventional CNNs requires considerable computation and a big dataset. Therefore, we suggest a new learning algorithm for CNNs using an extreme learning machine (ELM). The ELM is a fast learning method used to calculate network weights between output and hidden layers in a single iteration and thus, can dramatically reduce learning time while producing accurate results with minimal training data. A conventional ELM can be applied to networks with a single hidden layer; as such, we propose a stacked ELM architecture in the CNN framework. Further, we modify the backpropagation algorithm to find the targets of hidden layers and effectively learn network weights while maintaining performance. Experimental results confirm that the proposed method is effective in reducing learning time and improving performance. Copyright © 2016 Elsevier Ltd. All rights reserved.
2009-12-18
cannot be detected with univariate techniques, but require multivariate analysis instead (Kamitani and Tong [2005]). Two other time series analysis ...learning for time series analysis . The historical record of DBNs can be traced back to Dean and Kanazawa [1988] and Dean and Wellman [1991], with...Rev. 8-98) Prescribed by ANSI Std Z39-18 Keywords: Hidden Process Models, probabilistic time series modeling, functional Magnetic Resonance Imaging
Development of adapted GMR-probes for automated detection of hidden defects in thin steel sheets
NASA Astrophysics Data System (ADS)
Pelkner, Matthias; Pohl, Rainer; Kreutzbruck, Marc; Commandeur, Colin
2016-02-01
Thin steel sheets with a thickness of 0.3 mm and less are the base materials of many everyday life products (cans, batteries, etc.). Potential inhomogeneities such as non-metallic inclusions inside the steel can lead to a rupture of the sheets when it is formed into a product such as a beverage can. Therefore, there is a need to develop automated NDT techniques to detect hidden defects and inclusions in thin sheets during production. For this purpose Tata Steel Europe and BAM, the Federal Institute for Materials Research and Testing (Germany), collaborate in order to develop an automated NDT-system. Defect detection systems have to be robust against external influences, especially when used in an industrial environment. In addition, such a facility has to achieve a high sensitivity and a high spatial resolution in terms of detecting small inclusions in the μm-regime. In a first step, we carried out a feasibility study to determine which testing method is promising for detecting hidden defects and inclusions inside ferrous thin steel sheets. Therefore, two methods were investigated in more detail - magnetic flux leakage testing (MFL) using giant magneto resistance sensor arrays (GMR) as receivers [1,2] and eddy current testing (ET). The capabilities of both methods were tested with 0.2 mm-thick steel samples containing small defects with depths ranging from 5 µm up to 60 µm. Only in case of GMR-MFL-testing, we were able to detect parts of the hidden defects with a depth of 10 µm trustworthily with a SNR better than 10 dB. Here, the lift off between sensor and surface was 250 µm. On this basis, we investigated different testing scenarios including velocity tests and different lift offs. In this contribution we present the results of the feasibility study leading to first prototypes of GMR-probes which are now installed as part of a demonstrator inside a production line.
Uncovering the hidden: complexity and strategies for diagnosing latent tuberculosis.
Flores-Valdez, Mario Alberto
2017-10-24
Tuberculosis produces two clinical manifestations: active and latent (non-apparent) disease. The latter is estimated to affect one-third of the world population and constitutes a source of continued transmission should the disease emerge from its hidden state (reactivation). Methods to diagnose latent TB have been evolving and aim to detect the disease in people who are truly infected with M. tuberculosis , versus those where other mycobacteria, or even other pathologies not related to TB, are present. The current use of proteomic and transcriptomic approaches may lead to improved detection methods in the coming years.
Hidden explosives detector employing pulsed neutron and x-ray interrogation
Schultz, F.J.; Caldwell, J.T.
1993-04-06
Methods and systems for the detection of small amounts of modern, highly-explosive nitrogen-based explosives, such as plastic explosives, hidden in airline baggage. Several techniques are employed either individually or combined in a hybrid system. One technique employed in combination is X-ray imaging. Another technique is interrogation with a pulsed neutron source in a two-phase mode of operation to image both nitrogen and oxygen densities. Another technique employed in combination is neutron interrogation to form a hydrogen density image or three-dimensional map. In addition, deliberately-placed neutron-absorbing materials can be detected.
Hidden explosives detector employing pulsed neutron and x-ray interrogation
Schultz, Frederick J.; Caldwell, John T.
1993-01-01
Methods and systems for the detection of small amounts of modern, highly-explosive nitrogen-based explosives, such as plastic explosives, hidden in airline baggage. Several techniques are employed either individually or combined in a hybrid system. One technique employed in combination is X-ray imaging. Another technique is interrogation with a pulsed neutron source in a two-phase mode of operation to image both nitrogen and oxygen densities. Another technique employed in combination is neutron interrogation to form a hydrogen density image or three-dimensional map. In addition, deliberately-placed neutron-absorbing materials can be detected.
Hidden sector dark matter and the Galactic Center gamma-ray excess: a closer look
Escudero, Miguel; Witte, Samuel J.; Hooper, Dan
2017-11-24
Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case,more » we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. Here, we also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.« less
Hidden Sector Dark Matter and the Galactic Center Gamma-Ray Excess: A Closer Look
DOE Office of Scientific and Technical Information (OSTI.GOV)
Escudero, Miguel; Witte, Samuel J.; Hooper, Dan
2017-09-20
Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case,more » we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. We also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.« less
Hidden sector dark matter and the Galactic Center gamma-ray excess: a closer look
NASA Astrophysics Data System (ADS)
Escudero, Miguel; Witte, Samuel J.; Hooper, Dan
2017-11-01
Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case, we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. We also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.
Hidden sector dark matter and the Galactic Center gamma-ray excess: a closer look
DOE Office of Scientific and Technical Information (OSTI.GOV)
Escudero, Miguel; Witte, Samuel J.; Hooper, Dan
Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case,more » we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. Here, we also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.« less
Hideen Markov Models and Neural Networks for Fault Detection in Dynamic Systems
NASA Technical Reports Server (NTRS)
Smyth, Padhraic
1994-01-01
None given. (From conclusion): Neural networks plus Hidden Markov Models(HMM)can provide excellene detection and false alarm rate performance in fault detection applications. Modified models allow for novelty detection. Also covers some key contributions of neural network model, and application status.
Silva, M Z; Gouyon, R; Lepoutre, F
2003-06-01
Preliminary results of hidden corrosion detection in aircraft aluminum structures using a noncontact laser based ultrasonic technique are presented. A short laser pulse focused to a line spot is used as a broadband source of ultrasonic guided waves in an aluminum 2024 sample cut from an aircraft structure and prepared with artificially corroded circular areas on its back surface. The out of plane surface displacements produced by the propagating ultrasonic waves were detected with a heterodyne Mach-Zehnder interferometer. Time-frequency analysis of the signals using a continuous wavelet transform allowed the identification of the generated Lamb modes by comparison with the calculated dispersion curves. The presence of back surface corrosion was detected by noting the loss of the S(1) mode near its cutoff frequency. This method is applicable to fast scanning inspection techniques and it is particularly suited for early corrosion detection.
Identifying hidden common causes from bivariate time series: a method using recurrence plots.
Hirata, Yoshito; Aihara, Kazuyuki
2010-01-01
We propose a method for inferring the existence of hidden common causes from observations of bivariate time series. We detect related time series by excessive simultaneous recurrences in the corresponding recurrence plots. We also use a noncoverage property of a recurrence plot by the other to deny the existence of a directional coupling. We apply the proposed method to real wind data.
The use of neutrons for the detection of explosives in Civil Security Applications
NASA Astrophysics Data System (ADS)
Pesente, S.; Fabris, D.; Lunardon, M.; Moretto, S.; Nebbia, G.; Viesti, G.
2007-02-01
The search for hidden explosives has been simulated in laboratory conditions by using our Tagged Neutron Inspection System (TNIS). Applications of the TNIS concept to Civil Security problems are discussed in the light of our projects for cargo container inspections. Moreover, neutron attenuation and scattering can be used to search in real time for large quantity of explosive hidden in vehicles.
Detection of Objects Hidden in Highly Scattering Media Using Time-Gated Imaging Methods
NASA Technical Reports Server (NTRS)
Galland, Pierre A.; Wang, L.; Liang, X.; Ho, P. P.; Alfano, R. R.
2000-01-01
Non-intrusive and non-invasive optical imaging techniques has generated great interest among researchers for their potential applications to biological study, device characterization, surface defect detection, and jet fuel dynamics. Non-linear optical parametric amplification gate (NLOPG) has been used to detect back-scattered images of objects hidden in diluted Intralipid solutions. To directly detect objects hidden in highly scattering media, the diffusive component of light needs to be sorted out from early arrived ballistic and snake photons. In an optical imaging system, images are collected in transmission or back-scattered geometry. The early arrival photons in the transmission approach, always carry the direct information of the hidden object embedded in the turbid medium. In the back-scattered approach, the result is not so forth coming. In the presence of a scattering host, the first arrival photons in back-scattered approach will be directly photons from the host material. In the presentation, NLOPG was applied to acquire time resolved back-scattered images under the phase matching condition. A time-gated amplified signal was obtained through this NLOPG process. The system's gain was approximately 100 times. The time-gate was achieved through phase matching condition where only coherent photons retain their phase. As a result, the diffusive photons, which were the primary contributor to the background, were removed. With a large dynamic range and high resolution, time-gated early light imaging has the potential for improving rocket/aircraft design by determining jets shape and particle sizes. Refinements to these techniques may enable drop size measurements in the highly scattering, optically dense region of multi-element rocket injectors. These types of measurements should greatly enhance the design of stable, and higher performing rocket engines.
NASA Technical Reports Server (NTRS)
Kemmerer, Catherine C.; Jacoby, Joseph A.; Lomness, Janice K.; Hintze, Paul E.; Russell, Richard W.
2007-01-01
The detection of corrosion beneath Space Shuttle Orbiter thermal protective system is traditionally accomplished by removing the Reusable Surface Insulation tiles and performing a visual inspection of the aluminum substrate and corrosion protection system. This process is time consuming and has the potential to damage high cost tiles. To evaluate non-intrusive NDE methods, a Proof of Concept (PoC) experiment was designed and test panels were manufactured. The objective of the test plan was three-fold: establish the ability to detect corrosion hidden from view by tiles; determine the key factor affecting detectability; roughly quantify the detection threshold. The plan consisted of artificially inducing dimensionally controlled corrosion spots in two panels and rebonding tile over the spots to model the thermal protective system of the orbiter. The corrosion spot diameter ranged from 0.100" to 0.600" inches and the depth ranged from 0.003" to 0.020". One panel consisted of a complete factorial array of corrosion spots with and without tile coverage. The second panel consisted of randomized factorial points replicated and hidden by tile. Conventional methods such as ultrasonics, infrared, eddy current and microwave methods have shortcomings. Ultrasonics and IR cannot sufficiently penetrate the tiles, while eddy current and microwaves have inadequate resolution. As such, the panels were interrogated using Backscatter Radiography and Terahertz Imaging. The terahertz system successfully detected artificially induced corrosion spots under orbiter tile and functional testing is in-work in preparation for implementation.
Mal-Xtract: Hidden Code Extraction using Memory Analysis
NASA Astrophysics Data System (ADS)
Lim, Charles; Syailendra Kotualubun, Yohanes; Suryadi; Ramli, Kalamullah
2017-01-01
Software packer has been used effectively to hide the original code inside a binary executable, making it more difficult for existing signature based anti malware software to detect malicious code inside the executable. A new method of written and rewritten memory section is introduced to to detect the exact end time of unpacking routine and extract original code from packed binary executable using Memory Analysis running in an software emulated environment. Our experiment results show that at least 97% of the original code from the various binary executable packed with different software packers could be extracted. The proposed method has also been successfully extracted hidden code from recent malware family samples.
Pelletier, Mathew G; Viera, Joseph A; Wanjura, John; Holt, Greg
2010-01-01
The use of microwave imaging is becoming more prevalent for detection of interior hidden defects in manufactured and packaged materials. In applications for detection of hidden moisture, microwave tomography can be used to image the material and then perform an inverse calculation to derive an estimate of the variability of the hidden material, such internal moisture, thereby alerting personnel to damaging levels of the hidden moisture before material degradation occurs. One impediment to this type of imaging occurs with nearby objects create strong reflections that create destructive and constructive interference, at the receiver, as the material is conveyed past the imaging antenna array. In an effort to remove the influence of the reflectors, such as metal bale ties, research was conducted to develop an algorithm for removal of the influence of the local proximity reflectors from the microwave images. This research effort produced a technique, based upon the use of ultra-wideband signals, for the removal of spurious reflections created by local proximity reflectors. This improvement enables accurate microwave measurements of moisture in such products as cotton bales, as well as other physical properties such as density or material composition. The proposed algorithm was shown to reduce errors by a 4:1 ratio and is an enabling technology for imaging applications in the presence of metal bale ties.
ECG signal analysis through hidden Markov models.
Andreão, Rodrigo V; Dorizzi, Bernadette; Boudy, Jérôme
2006-08-01
This paper presents an original hidden Markov model (HMM) approach for online beat segmentation and classification of electrocardiograms. The HMM framework has been visited because of its ability of beat detection, segmentation and classification, highly suitable to the electrocardiogram (ECG) problem. Our approach addresses a large panel of topics some of them never studied before in other HMM related works: waveforms modeling, multichannel beat segmentation and classification, and unsupervised adaptation to the patient's ECG. The performance was evaluated on the two-channel QT database in terms of waveform segmentation precision, beat detection and classification. Our waveform segmentation results compare favorably to other systems in the literature. We also obtained high beat detection performance with sensitivity of 99.79% and a positive predictivity of 99.96%, using a test set of 59 recordings. Moreover, premature ventricular contraction beats were detected using an original classification strategy. The results obtained validate our approach for real world application.
NASA Astrophysics Data System (ADS)
Chakraborty, S.; Banerjee, A.; Gupta, S. K. S.; Christensen, P. R.; Papandreou-Suppappola, A.
2017-12-01
Multitemporal observations acquired frequently by satellites with short revisit periods such as the Moderate Resolution Imaging Spectroradiometer (MODIS), is an important source for modeling land cover. Due to the inherent seasonality of the land cover, harmonic modeling reveals hidden state parameters characteristic to it, which is used in classifying different land cover types and in detecting changes due to natural or anthropogenic factors. In this work, we use an eight day MODIS composite to create a Normalized Difference Vegetation Index (NDVI) time-series of ten years. Improved hidden parameter estimates of the nonlinear harmonic NDVI model are obtained using the Particle Filter (PF), a sequential Monte Carlo estimator. The nonlinear estimation based on PF is shown to improve parameter estimation for different land cover types compared to existing techniques that use the Extended Kalman Filter (EKF), due to linearization of the harmonic model. As these parameters are representative of a given land cover, its applicability in near real-time detection of land cover change is also studied by formulating a metric that captures parameter deviation due to change. The detection methodology is evaluated by considering change as a rare class problem. This approach is shown to detect change with minimum delay. Additionally, the degree of change within the change perimeter is non-uniform. By clustering the deviation in parameters due to change, this spatial variation in change severity is effectively mapped and validated with high spatial resolution change maps of the given regions.
Application of a Hidden Bayes Naive Multiclass Classifier in Network Intrusion Detection
ERIC Educational Resources Information Center
Koc, Levent
2013-01-01
With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…
1978-10-01
pulmonary ventilation via the " central chemoreceptors" (6.8) and to regulate cerebral blood flow (8,12). The " central chemoreceptors" for respiration are...decreases in illumination. Progress: The Hidden Shapes Test (I), the Maudsley Personality Inventory (2) and a personal history questionnaire were...hypoglycemia has been encountered occasionally in heatstroke but its pathogenesis is still uncertain. The contribution of central glucopenia to heatstroke coma
An Immunization Strategy for Hidden Populations.
Chen, Saran; Lu, Xin
2017-06-12
Hidden populations, such as injecting drug users (IDUs), sex workers (SWs) and men who have sex with men (MSM), are considered at high risk of contracting and transmitting infectious diseases such as AIDS, gonorrhea, syphilis etc. However, public health interventions to such groups are prohibited due to strong privacy concerns and lack of global information, which is a necessity for traditional strategies such as targeted immunization and acquaintance immunization. In this study, we introduce an innovative intervention strategy to be used in combination with a sampling approach that is widely used for hidden populations, Respondent-driven Sampling (RDS). The RDS strategy is implemented in two steps: First, RDS is used to estimate the average degree (personal network size) and degree distribution of the target population with sample data. Second, a cut-off threshold is calculated and used to screen the respondents to be immunized. Simulations on model networks and real-world networks reveal that the efficiency of the RDS strategy is close to that of the targeted strategy. As the new strategy can be implemented with the RDS sampling process, it provides a cost-efficient and feasible approach for disease intervention and control for hidden populations.
Clinical Holistic Medicine: A Psychological Theory of Dependency to Improve Quality of Life
Ventegodt, Søren; Morad, Mohammed; Kandel, Isack; Merrick, Joav
2004-01-01
In this paper, we suggest a psychological theory of dependency as an escape from feeling existential suffering and a poor quality of life. The ways in which human beings escape hidden existential pains are multiple. The wide range of dependency states seems to be the most common escape strategy used. If the patient can be guided into the hidden existential pain to feel, understand, and integrate it, we believe that dependency can be cured. The problem is that the patient must be highly motivated, sufficiently resourceful, and supported to want such a treatment that is inherently painful. Often, the family and surrounding world is suffering more than the dependent person himself, because the pattern of behavior the patient is dependent on makes him or her rather insensitive and unable to feel. If the patient is motivated, resourceful, and trusts his physician, recovery from even a severe state of dependency is not out of reach, if the holistic medical tools are applied wisely. The patient must find hidden resources to take action, then in therapy confront and feel old emotional pain, understand the source and inner logic of it, and finally learn to let go of negative attitudes and beliefs. In this way, the person can be healed and released of the emotional suffering and no longer be a slave to the dependency pattern. PMID:15349506
Thomas, Livia; Schwaninger, Adrian; Heimgartner, Nadja; Hedinger, Patrik; Hofer, Franziska; Ehlert, Ulrike; Wirtz, Petra H
2014-09-01
Aviation security strongly depends on screeners' performance in the detection of threat objects in x-ray images of passenger bags. We examined for the first time the effects of stress and stress-induced cortisol increases on detection performance of hidden weapons in an x-ray baggage screening task. We randomly assigned 48 participants either to a stress or a nonstress group. The stress group was exposed to a standardized psychosocial stress test (TSST). Before and after stress/nonstress, participants had to detect threat objects in a computer-based object recognition test (X-ray ORT). We repeatedly measured salivary cortisol and X-ray ORT performance before and after stress/nonstress. Cortisol increases in reaction to psychosocial stress induction but not to nonstress independently impaired x-ray detection performance. Our results suggest that stress-induced cortisol increases at peak reactivity impair x-ray screening performance. Copyright © 2014 Society for Psychophysiological Research.
Detection and Localization of Money Bills Concealed Behind Wooden Walls Using Compton Scattering
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wart, Jason A. van; Hussein, Esam M.A.; Waller, Edward J
2005-05-15
This work presents a portable device for detecting visually obscured contraband money bills that may be hidden within conventional household walls for the purpose of avoiding confiscation. The device utilizes the Compton backscattering of photons emitted from a collimated {sup 241}Am source. The scattered photons are detected with a thin NaI(Tl) detector, either over a wide field of view for surface scanning of the wall or within a confined view field for depth scanning. The design of the device was optimized for best density contrast and highest count rate for a given source activity. It was shown that the minimummore » detectable amount of contraband, with >95% confidence level, is 86 paper bills. The contraband was detectable when hidden in household walls made of gyprock or wooden paneling, even when masked by higher density materials such as metallic piping. The device's capability exceeded those of commercially available density-based portable contraband detectors.« less
An ethics of body scanners: requirements and future challenges from an ethical point of view
NASA Astrophysics Data System (ADS)
Rampp, Benjamin; Wolkenstein, Andreas F. X.; Ammicht Quinn, Regina
2011-05-01
At the moment, body scanners based on terahertz and millimeter-wave technologies are implemented at airports around the world. Thus, challenges of acceptance and acceptability become pressing. In this context, we present the results of an ethical research project on the development and implementation of body scanners. We will show which requirements concerning the system, its developers, and its users should be met in order that the scanners can be acceptable from an ethical point of view. These requirements involve, among others, questions of privacy, health, data protection, and security processes. A special ethical challenge for body scanners, however, still remains: Automatic anonymization processes are based on the assumption of "normal" bodies. Certain groups of persons with "deviant bodies" (e.g. persons with hidden disabilities, persons with aberrant sex characteristics, etc.) are affected in a special way: Their deviation from the standard (for instance their disability) is socially hidden, but eventually exposed by body scanners, even (and even more) if the produced pictures are anonymized. Here, we address the question how the possible discrimination against and exclusion of people with "deviant bodies" could be mitigated or prevented.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kercel, S.W.; Baylor, V.M.; Labaj, L.E.
Enclosed Space Detection System (ESDS) is a fast, inexpensive, and reliable device for detecting human occupants hidden in vehicles. Operation requires less than two minutes. ESDS is used to foil attempts at smuggling illegal aliens, terrorists, and escaping prisoners. It is being tested at nuclear weapons facilities and has been operated at several prisons and international border crossings. ESDS is the first practical electronic alternative to physical searches of vehicles for hidden passengers. At critical checkpoints, a thorough physical search of a single fully loaded truck requires a team of from two to six people, and may take as longmore » as eight hours. Despite this level of security, experience has shown that the search can occasionally be foiled. Due to the enormous time and expense of thorough physical searches of vehicles, they are seldom conducted at any but the most critical of locations, simply leaving many sites vulnerable to crime and terrorism. Prior to the development of the ESDS, the only other effective alternative to physical search was the use of specially-trained canines, which can be vastly superior to the physical search in both time and accuracy. However, as discussed in this paper, canine inspection is not really a competitive substitute for ESDS because canine reliability (80% at most) is not as high as that of the ESDS (99%+), while the costs, training requirements, and operator skill needed are significantly higher with canines than with the ESDS. In addition, the ESDS has straightforward self-diagnostic tests to ensure the system is operating correctly; such tests are not currently available with either canine or human inspectors. ESDS offers an attractive supplement or alternative to meet current security requirements for vehicle searches at portals at government, nuclear, industrial, and other facilities where concealed persons may pose a threat either by entering or leaving.« less
Artificial Intelligence Software for Assessing Postural Stability
NASA Technical Reports Server (NTRS)
Lieberman, Erez; Forth, Katharine; Paloski, William
2013-01-01
A software package reads and analyzes pressure distributions from sensors mounted under a person's feet. Pressure data from sensors mounted in shoes, or in a platform, can be used to provide a description of postural stability (assessing competence to deficiency) and enables the determination of the person's present activity (running, walking, squatting, falling). This package has three parts: a preprocessing algorithm for reading input from pressure sensors; a Hidden Markov Model (HMM), which is used to determine the person's present activity and level of sensing-motor competence; and a suite of graphical algorithms, which allows visual representation of the person's activity and vestibular function over time.
ARPA surveillance technology for detection of targets hidden in foliage
NASA Astrophysics Data System (ADS)
Hoff, Lawrence E.; Stotts, Larry B.
1994-02-01
The processing of large quantities of synthetic aperture radar data in real time is a complex problem. Even the image formation process taxes today's most advanced computers. The use of complex algorithms with multiple channels adds another dimension to the computational problem. Advanced Research Projects Agency (ARPA) is currently planning on using the Paragon parallel processor for this task. The Paragon is small enough to allow its use in a sensor aircraft. Candidate algorithms will be implemented on the Paragon for evaluation for real time processing. In this paper ARPA technology developments for detecting targets hidden in foliage are reviewed and examples of signal processing techniques on field collected data are presented.
Cache-Cache Comparison for Supporting Meaningful Learning
ERIC Educational Resources Information Center
Wang, Jingyun; Fujino, Seiji
2015-01-01
The paper presents a meaningful discovery learning environment called "cache-cache comparison" for a personalized learning support system. The processing of seeking hidden relations or concepts in "cache-cache comparison" is intended to encourage learners to actively locate new knowledge in their knowledge framework and check…
ERIC Educational Resources Information Center
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H.
2010-01-01
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Semantic Context Detection Using Audio Event Fusion
NASA Astrophysics Data System (ADS)
Chu, Wei-Ta; Cheng, Wen-Huang; Wu, Ja-Ling
2006-12-01
Semantic-level content analysis is a crucial issue in achieving efficient content retrieval and management. We propose a hierarchical approach that models audio events over a time series in order to accomplish semantic context detection. Two levels of modeling, audio event and semantic context modeling, are devised to bridge the gap between physical audio features and semantic concepts. In this work, hidden Markov models (HMMs) are used to model four representative audio events, that is, gunshot, explosion, engine, and car braking, in action movies. At the semantic context level, generative (ergodic hidden Markov model) and discriminative (support vector machine (SVM)) approaches are investigated to fuse the characteristics and correlations among audio events, which provide cues for detecting gunplay and car-chasing scenes. The experimental results demonstrate the effectiveness of the proposed approaches and provide a preliminary framework for information mining by using audio characteristics.
Dark matter freeze-out in a nonrelativistic sector
NASA Astrophysics Data System (ADS)
Pappadopulo, Duccio; Ruderman, Joshua T.; Trevisan, Gabriele
2016-08-01
A thermally decoupled hidden sector of particles, with a mass gap, generically enters a phase of cannibalism in the early Universe. The Standard Model sector becomes exponentially colder than the hidden sector. We propose the cannibal dark matter framework, where dark matter resides in a cannibalizing sector with a relic density set by 2-to-2 annihilations. Observable signals of cannibal dark matter include a boosted rate for indirect detection, new relativistic degrees of freedom, and warm dark matter.
A Top-down versus a Bottom-up Hidden-variables Description of the Stern-Gerlach Experiment
NASA Astrophysics Data System (ADS)
Arsenijević, M.; Jeknić-Dugić, J.; Dugić, M.
We employ the Stern-Gerlach experiment to highlight the basics of a minimalist, non-interpretational top-down approach to quantum foundations. Certain benefits of the "quantum structural studies" (QSS) highlightedhere are detected and discussed. While the top-down approach can be described without making any reference to the fundamental structure of a closed system, the hidden variables (HV) theory á la Bohm proves to be more subtle than it is typically regarded.
Pelletier, Mathew G.; Viera, Joseph A.; Wanjura, John; Holt, Greg
2010-01-01
The use of microwave imaging is becoming more prevalent for detection of interior hidden defects in manufactured and packaged materials. In applications for detection of hidden moisture, microwave tomography can be used to image the material and then perform an inverse calculation to derive an estimate of the variability of the hidden material, such internal moisture, thereby alerting personnel to damaging levels of the hidden moisture before material degradation occurs. One impediment to this type of imaging occurs with nearby objects create strong reflections that create destructive and constructive interference, at the receiver, as the material is conveyed past the imaging antenna array. In an effort to remove the influence of the reflectors, such as metal bale ties, research was conducted to develop an algorithm for removal of the influence of the local proximity reflectors from the microwave images. This research effort produced a technique, based upon the use of ultra-wideband signals, for the removal of spurious reflections created by local proximity reflectors. This improvement enables accurate microwave measurements of moisture in such products as cotton bales, as well as other physical properties such as density or material composition. The proposed algorithm was shown to reduce errors by a 4:1 ratio and is an enabling technology for imaging applications in the presence of metal bale ties. PMID:22163668
Masserey, Bernard; Raemy, Christian; Fromme, Paul
2014-09-01
Aerospace structures often contain multi-layered metallic components where hidden defects such as fatigue cracks and localized disbonds can develop, necessitating non-destructive testing. Employing standard wedge transducers, high frequency guided ultrasonic waves that penetrate through the complete thickness were generated in a model structure consisting of two adhesively bonded aluminium plates. Interference occurs between the wave modes during propagation along the structure, resulting in a frequency dependent variation of the energy through the thickness with distance. The wave propagation along the specimen was measured experimentally using a laser interferometer. Good agreement with theoretical predictions and two-dimensional finite element simulations was found. Significant propagation distance with a strong, non-dispersive main wave pulse was achieved. The interaction of the high frequency guided ultrasonic waves with small notches in the aluminium layer facing the sealant and on the bottom surface of the multilayer structure was investigated. Standard pulse-echo measurements were conducted to verify the detection sensitivity and the influence of the stand-off distance predicted from the finite element simulations. The results demonstrated the potential of high frequency guided waves for hidden defect detection at critical and difficult to access locations in aerospace structures from a stand-off distance. Copyright © 2014 The Authors. Published by Elsevier B.V. All rights reserved.
Material content of the universe - Introductory survey
NASA Astrophysics Data System (ADS)
Tayler, R. J.
1986-12-01
Matter in the universe can be detected either by the radiation it emits or by its gravitational influence. There is a strong suggestion that the universe contains substantial hidden matter, mass without corresponding light. There are also arguments from elementary particle physics that the universe should have closure density, which would also imply hidden mass. Observations of the chemical composition of the universe interpreted in terms of the hot Big Bang cosmological theory suggest that this hidden matter cannot all be of baryonic form but must consist of weakly interacting elementary particles. A combination of observations and theoretical ideas about the origin of large-scale structure may demand that these particles are of a type which is not yet definitely known to exist.
Hidden SU ( N ) glueball dark matter
Soni, Amarjit; Zhang, Yue
2016-06-21
Here we investigate the possibility that the dark matter candidate is from a pure non-abelian gauge theory of the hidden sector, motivated in large part by its elegance and simplicity. The dark matter is the lightest bound state made of the confined gauge fields, the hidden glueball. We point out this simple setup is capable of providing rich and novel phenomena in the dark sector, especially in the parameter space of large N. They include self-interacting and warm dark matter scenarios, Bose-Einstein condensation leading to massive dark stars possibly millions of times heavier than our sun giving rise to gravitationalmore » lensing effects, and indirect detections through higher dimensional operators as well as interesting collider signatures.« less
Nondestructive detection of infested chestnuts based on NIR spectroscopy
USDA-ARS?s Scientific Manuscript database
Insect feeding is a significant postharvest problem for processors of Chestnuts (Castanea sativa, Miller). In most cases, damage from insects is 'hidden', i.e. not visually detectable on the fruit surface. Consequently, traditional sorting techniques, including manual sorting, are generally inadequa...
NASA Astrophysics Data System (ADS)
Jiang, Feng; Liu, Shulin
2018-03-01
In this paper, we present a feasibility study for detecting cracks with different hidden depths and shapes using information contained in the magnetic field excited by a rectangular coil with a rectangular cross section. First, we solve for the eigenvalues and the unknown coefficients of the magnetic vector potential by imposing artificial and natural boundary conditions. Thus, a semi-analytical solution for the magnetic field distribution around the surface of a conducting plate that contains a long hidden crack is formulated. Next, based on the proposed modelling, the influences of the different hidden depth cracks on the surface magnetic field are analysed. The results show that the horizontal and vertical components of the magnetic field near the crack are becoming weaker and that the phase information of the magnetic field can be used to qualitatively determine the hidden depth of the crack. In addition, the model is optimised to improve its accuracy in classifying crack types. The relationship between signal features and crack shapes is subsequently established. The modified model is validated by using finite element simulations, visually indicating the change in the magnetic field near the crack.
Unsupervised deep learning reveals prognostically relevant subtypes of glioblastoma.
Young, Jonathan D; Cai, Chunhui; Lu, Xinghua
2017-10-03
One approach to improving the personalized treatment of cancer is to understand the cellular signaling transduction pathways that cause cancer at the level of the individual patient. In this study, we used unsupervised deep learning to learn the hierarchical structure within cancer gene expression data. Deep learning is a group of machine learning algorithms that use multiple layers of hidden units to capture hierarchically related, alternative representations of the input data. We hypothesize that this hierarchical structure learned by deep learning will be related to the cellular signaling system. Robust deep learning model selection identified a network architecture that is biologically plausible. Our model selection results indicated that the 1st hidden layer of our deep learning model should contain about 1300 hidden units to most effectively capture the covariance structure of the input data. This agrees with the estimated number of human transcription factors, which is approximately 1400. This result lends support to our hypothesis that the 1st hidden layer of a deep learning model trained on gene expression data may represent signals related to transcription factor activation. Using the 3rd hidden layer representation of each tumor as learned by our unsupervised deep learning model, we performed consensus clustering on all tumor samples-leading to the discovery of clusters of glioblastoma multiforme with differential survival. One of these clusters contained all of the glioblastoma samples with G-CIMP, a known methylation phenotype driven by the IDH1 mutation and associated with favorable prognosis, suggesting that the hidden units in the 3rd hidden layer representations captured a methylation signal without explicitly using methylation data as input. We also found differentially expressed genes and well-known mutations (NF1, IDH1, EGFR) that were uniquely correlated with each of these clusters. Exploring these unique genes and mutations will allow us to further investigate the disease mechanisms underlying each of these clusters. In summary, we show that a deep learning model can be trained to represent biologically and clinically meaningful abstractions of cancer gene expression data. Understanding what additional relationships these hidden layer abstractions have with the cancer cellular signaling system could have a significant impact on the understanding and treatment of cancer.
Supporting undergraduate nursing students through structured personal tutoring: Some reflections.
Watts, Tessa E
2011-02-01
Support is imperative for nursing students worldwide as they face the many challenges associated with learning and working. Moreover enhancing student retention is an increasing concern for institutions across the globe. The personal tutor is a frequently hidden yet potentially significant figure in many students' experience of higher education. This paper offers some critical reflections on a structured approach to personal tutoring within an undergraduate nursing programme in a research focused Welsh university. Structured personal tutoring can provide an organised, coherent and proactive support system throughout students' educational programmes. However the approach changes the shape of personal tutoring and has the potential to increase academics' workloads and with it costs. Copyright © 2010 Elsevier Ltd. All rights reserved.
Hidden charged dark matter and chiral dark radiation
NASA Astrophysics Data System (ADS)
Ko, P.; Nagata, Natsumi; Tang, Yong
2017-10-01
In the light of recent possible tensions in the Hubble constant H0 and the structure growth rate σ8 between the Planck and other measurements, we investigate a hidden-charged dark matter (DM) model where DM interacts with hidden chiral fermions, which are charged under the hidden SU(N) and U(1) gauge interactions. The symmetries in this model assure these fermions to be massless. The DM in this model, which is a Dirac fermion and singlet under the hidden SU(N), is also assumed to be charged under the U(1) gauge symmetry, through which it can interact with the chiral fermions. Below the confinement scale of SU(N), the hidden quark condensate spontaneously breaks the U(1) gauge symmetry such that there remains a discrete symmetry, which accounts for the stability of DM. This condensate also breaks a flavor symmetry in this model and Nambu-Goldstone bosons associated with this flavor symmetry appear below the confinement scale. The hidden U(1) gauge boson and hidden quarks/Nambu-Goldstone bosons are components of dark radiation (DR) above/below the confinement scale. These light fields increase the effective number of neutrinos by δNeff ≃ 0.59 above the confinement scale for N = 2, resolving the tension in the measurements of the Hubble constant by Planck and Hubble Space Telescope if the confinement scale is ≲1 eV. DM and DR continuously scatter with each other via the hidden U(1) gauge interaction, which suppresses the matter power spectrum and results in a smaller structure growth rate. The DM sector couples to the Standard Model sector through the exchange of a real singlet scalar mixing with the Higgs boson, which makes it possible to probe our model in DM direct detection experiments. Variants of this model are also discussed, which may offer alternative ways to investigate this scenario.
Selected control events and reporting odds ratio in signal detection methodology.
Ooba, Nobuhiro; Kubota, Kiyoshi
2010-11-01
To know whether the reporting odds ratio (ROR) using "control events" can detect signals hidden behind striking reports on one or more particular events. We used data of 956 drug use investigations (DUIs) conducted between 1970 and 1998 in Japan and domestic spontaneous reports (SRs) between 1998 and 2008. The event terms in DUIs were converted to the preferred terms in Medical Dictionary for Regulatory Activities (MedDRA). We calculated the incidence proportion for various events and selected 20 "control events" with a relatively constant incidence proportion across DUIs and also reported regularly to the spontaneous reporting system. A "signal" was generated for the drug-event combination when the lower limit of 95% confidence interval of the ROR exceeded 1. We also compared the ROR in SRs with the RR in DUIs. The "control events" accounted for 18.2% of all reports. The ROR using "control events" may detect some hidden signals for a drug with the proportion of "control events" lower than the average. The median of the ratios of the ROR using "control events" to RR was around the unity indicating that "control events" roughly represented the exposure distribution though the range of the ratios was so diverse that the individual ROR might not be regarded as the estimate of RR. The use of the ROR with "control events" may give an adjunctive to the traditional signal detection methods to find a signal hidden behind some major events. Copyright © 2010 John Wiley & Sons, Ltd.
Geologic and Seismologic Investigation
1988-12-01
Descriptions, Hidden and Buchanan Dams 4 1.6.1 Hidden Dam 4 1.6.2 Buchanan Dam 5 2 TECTONIC SETTING 2.1 General 7 2.2 Cretaceous-Cenozoic Tectonic ...Activity 7 2.2.1 Cretaceous-Paleogene 8 2.2.2 Neogene 9 2.2.3 Late Cenozoic Tectonic Model 9 3 REGIONAL GEOLOGY 3.1 General 11 3.2 Geologic Units 11...detected by the imagery analysis which indicates there has been no tectonic movement from about 100,000 to 400,000 years ago to the present. The field
κ-deformed Dirac oscillator in an external magnetic field
NASA Astrophysics Data System (ADS)
Chargui, Y.; Dhahbi, A.; Cherif, B.
2018-04-01
We study the solutions of the (2 + 1)-dimensional κ-deformed Dirac oscillator in the presence of a constant transverse magnetic field. We demonstrate how the deformation parameter affects the energy eigenvalues of the system and the corresponding eigenfunctions. Our findings suggest that this system could be used to detect experimentally the effect of the deformation. We also show that the hidden supersymmetry of the non-deformed system reduces to a hidden pseudo-supersymmetry having the same algebraic structure as a result of the κ-deformation.
Mining the Values in the Curriculum.
ERIC Educational Resources Information Center
Ryan, Kevin
1993-01-01
Schools must provide opportunities for students to discover what is most worth knowing, as they prepare to be citizens, good workers, good private individuals. Formal curriculum is one vehicle for teaching Tao (universal path to becoming a good person). Hidden curriculum can also convey profound teachings, if a spirit of fairness predominates,…
Benefits of Professional Development Schools: The Hidden Message in the Forest.
ERIC Educational Resources Information Center
Kochan, Frances K.
1998-01-01
Investigated the benefits of Professional Development School (PDS) endeavors as perceived by university faculty participating in the Holmes Group. Data from open-ended surveys identified four themes related to PDS benefits: (1) improved teaching/learning environments; (2) improved collegiality in professional relationships; (3) personal and…
Unmasking Abilities Hidden by Developmental Conditions.
ERIC Educational Resources Information Center
Mallik, Kalisankar, Ed.; Shaver, Elaine M., Ed.
This document contains 16 papers that were scheduled to be presented at a conference (which was canceled) on approaches and programs for helping developmentally disabled persons to be more self-sufficient. The book is divided into three sections: (1) unmasking vocational abilities, (2) enhancing functional independence, and (3) medical and…
Hidden Hypnotic Patterns: Implications for Counseling and Supervision.
ERIC Educational Resources Information Center
Gunnison, Hugh; Renick, T. F.
1985-01-01
Examines the hypothesis that subtle hypnotic patterns used by Milton H. Erickson are found in the person-centered approach to counseling of Carl Rogers. Points out that counselors and supervisors should be aware of the possible hypnotic elements in simple suggestions. Presents examples of counselor-client and supervisor-trainee dialogue to…
Analysis of single ion channel data incorporating time-interval omission and sampling
The, Yu-Kai; Timmer, Jens
2005-01-01
Hidden Markov models are widely used to describe single channel currents from patch-clamp experiments. The inevitable anti-aliasing filter limits the time resolution of the measurements and therefore the standard hidden Markov model is not adequate anymore. The notion of time-interval omission has been introduced where brief events are not detected. The developed, exact solutions to this problem do not take into account that the measured intervals are limited by the sampling time. In this case the dead-time that specifies the minimal detectable interval length is not defined unambiguously. We show that a wrong choice of the dead-time leads to considerably biased estimates and present the appropriate equations to describe sampled data. PMID:16849220
ERIC Educational Resources Information Center
Taft, Laritza M.
2010-01-01
In its report "To Err is Human", The Institute of Medicine recommended the implementation of internal and external voluntary and mandatory automatic reporting systems to increase detection of adverse events. Knowledge Discovery in Databases (KDD) allows the detection of patterns and trends that would be hidden or less detectable if analyzed by…
USDA-ARS?s Scientific Manuscript database
Modifications were made to a small laboratory mill to enable the detection of rice kernels infested by immature, hidden stored-grain insects. The mill, which was originally designed for wheat, monitors the electrical conductance through the grain and detects kernels that are infested with live inse...
ERIC Educational Resources Information Center
Li, Dingcheng
2011-01-01
Coreference resolution (CR) and entity relation detection (ERD) aim at finding predefined relations between pairs of entities in text. CR focuses on resolving identity relations while ERD focuses on detecting non-identity relations. Both CR and ERD are important as they can potentially improve other natural language processing (NLP) related tasks…
Adaptive hidden Markov model with anomaly States for price manipulation detection.
Cao, Yi; Li, Yuhua; Coleman, Sonya; Belatreche, Ammar; McGinnity, Thomas Martin
2015-02-01
Price manipulation refers to the activities of those traders who use carefully designed trading behaviors to manually push up or down the underlying equity prices for making profits. With increasing volumes and frequency of trading, price manipulation can be extremely damaging to the proper functioning and integrity of capital markets. The existing literature focuses on either empirical studies of market abuse cases or analysis of particular manipulation types based on certain assumptions. Effective approaches for analyzing and detecting price manipulation in real time are yet to be developed. This paper proposes a novel approach, called adaptive hidden Markov model with anomaly states (AHMMAS) for modeling and detecting price manipulation activities. Together with wavelet transformations and gradients as the feature extraction methods, the AHMMAS model caters to price manipulation detection and basic manipulation type recognition. The evaluation experiments conducted on seven stock tick data from NASDAQ and the London Stock Exchange and 10 simulated stock prices by stochastic differential equation show that the proposed AHMMAS model can effectively detect price manipulation patterns and outperforms the selected benchmark models.
Hypovigilance Detection for UCAV Operators Based on a Hidden Markov Model
Kwon, Namyeon; Shin, Yongwook; Ryo, Chuh Yeop; Park, Jonghun
2014-01-01
With the advance of military technology, the number of unmanned combat aerial vehicles (UCAVs) has rapidly increased. However, it has been reported that the accident rate of UCAVs is much higher than that of manned combat aerial vehicles. One of the main reasons for the high accident rate of UCAVs is the hypovigilance problem which refers to the decrease in vigilance levels of UCAV operators while maneuvering. In this paper, we propose hypovigilance detection models for UCAV operators based on EEG signal to minimize the number of occurrences of hypovigilance. To enable detection, we have applied hidden Markov models (HMMs), two of which are used to indicate the operators' dual states, normal vigilance and hypovigilance, and, for each operator, the HMMs are trained as a detection model. To evaluate the efficacy and effectiveness of the proposed models, we conducted two experiments on the real-world data obtained by using EEG-signal acquisition devices, and they yielded satisfactory results. By utilizing the proposed detection models, the problem of hypovigilance of UCAV operators and the problem of high accident rate of UCAVs can be addressed. PMID:24963338
Detecting structure of haplotypes and local ancestry
USDA-ARS?s Scientific Manuscript database
We present a two-layer hidden Markov model to detect the structure of haplotypes for unrelated individuals. This allows us to model two scales of linkage disequilibrium (one within a group of haplotypes and one between groups), thereby taking advantage of rich haplotype information to infer local an...
Belciug, Smaranda; Gorunescu, Florin
2018-06-08
Methods based on microarrays (MA), mass spectrometry (MS), and machine learning (ML) algorithms have evolved rapidly in recent years, allowing for early detection of several types of cancer. A pitfall of these approaches, however, is the overfitting of data due to large number of attributes and small number of instances -- a phenomenon known as the 'curse of dimensionality'. A potentially fruitful idea to avoid this drawback is to develop algorithms that combine fast computation with a filtering module for the attributes. The goal of this paper is to propose a statistical strategy to initiate the hidden nodes of a single-hidden layer feedforward neural network (SLFN) by using both the knowledge embedded in data and a filtering mechanism for attribute relevance. In order to attest its feasibility, the proposed model has been tested on five publicly available high-dimensional datasets: breast, lung, colon, and ovarian cancer regarding gene expression and proteomic spectra provided by cDNA arrays, DNA microarray, and MS. The novel algorithm, called adaptive SLFN (aSLFN), has been compared with four major classification algorithms: traditional ELM, radial basis function network (RBF), single-hidden layer feedforward neural network trained by backpropagation algorithm (BP-SLFN), and support vector-machine (SVM). Experimental results showed that the classification performance of aSLFN is competitive with the comparison models. Copyright © 2018. Published by Elsevier Inc.
NASA Astrophysics Data System (ADS)
Yu, Jianbo
2017-01-01
This study proposes an adaptive-learning-based method for machine faulty detection and health degradation monitoring. The kernel of the proposed method is an "evolving" model that uses an unsupervised online learning scheme, in which an adaptive hidden Markov model (AHMM) is used for online learning the dynamic health changes of machines in their full life. A statistical index is developed for recognizing the new health states in the machines. Those new health states are then described online by adding of new hidden states in AHMM. Furthermore, the health degradations in machines are quantified online by an AHMM-based health index (HI) that measures the similarity between two density distributions that describe the historic and current health states, respectively. When necessary, the proposed method characterizes the distinct operating modes of the machine and can learn online both abrupt as well as gradual health changes. Our method overcomes some drawbacks of the HIs (e.g., relatively low comprehensibility and applicability) based on fixed monitoring models constructed in the offline phase. Results from its application in a bearing life test reveal that the proposed method is effective in online detection and adaptive assessment of machine health degradation. This study provides a useful guide for developing a condition-based maintenance (CBM) system that uses an online learning method without considerable human intervention.
McEwan, Thomas E.
1995-01-01
An impulse radar studfinder propagates electromagnetic pulses and detects reflected pulses from a fixed range. Unmodulated pulses, about 200 ps wide, are emitted. A large number of reflected pulses are sampled and averaged. Background reflections are subtracted. Reflections from wall studs or other hidden objects are detected and displayed using light emitting diodes.
McEwan, T.E.
1995-10-10
An impulse radar studfinder propagates electromagnetic pulses and detects reflected pulses from a fixed range. Unmodulated pulses, about 200 ps wide, are emitted. A large number of reflected pulses are sampled and averaged. Background reflections are subtracted. Reflections from wall studs or other hidden objects are detected and displayed using light emitting diodes. 9 figs.
Chen, C.; Liu, J.; Xu, S.; Xia, J.; ,
2004-01-01
Geophysical technologies are very effective in environmental, engineering and groundwater applications. Parameters of delineating nature of near-surface materials such as compressional-wave velocity, shear-wave velocity can be obtained using shallow seismic methods. Electric methods are primary approaches for investigating groundwater and detecting leakage. Both of methods are applied to detect embankment in hope of obtaining evidences of the strength and moisture inside the body. A technological experiment has done for detecting and discovering the hidden troubles in the embankment of Yangtze River, Songzi, Hubei, China in 2003. Surface-wave and DC multi-channel array resistivity sounding techniques were used to detect hidden trouble inside and under dike like pipe-seeps. This paper discusses the exploration strategy and the effect of geological characteristics. A practical approach of combining seismic and electric resistivity measurements was applied to locate potential pipe-seeps in embankment in the experiment. The method presents a potential leak factor based on the shear-wave velocity and the resistivity of the medium to evaluate anomalies. An anomaly found in a segment of embankment detected was verified, where occurred a pipe-seep during the 98' flooding.
Detection of cough signals in continuous audio recordings using hidden Markov models.
Matos, Sergio; Birring, Surinder S; Pavord, Ian D; Evans, David H
2006-06-01
Cough is a common symptom of many respiratory diseases. The evaluation of its intensity and frequency of occurrence could provide valuable clinical information in the assessment of patients with chronic cough. In this paper we propose the use of hidden Markov models (HMMs) to automatically detect cough sounds from continuous ambulatory recordings. The recording system consists of a digital sound recorder and a microphone attached to the patient's chest. The recognition algorithm follows a keyword-spotting approach, with cough sounds representing the keywords. It was trained on 821 min selected from 10 ambulatory recordings, including 2473 manually labeled cough events, and tested on a database of nine recordings from separate patients with a total recording time of 3060 min and comprising 2155 cough events. The average detection rate was 82% at a false alarm rate of seven events/h, when considering only events above an energy threshold relative to each recording's average energy. These results suggest that HMMs can be applied to the detection of cough sounds from ambulatory patients. A postprocessing stage to perform a more detailed analysis on the detected events is under development, and could allow the rejection of some of the incorrectly detected events.
Empowerment, Participation, and Democracy? -- The Hong Kong Big Sisters' Guidance Programme.
ERIC Educational Resources Information Center
Bottery, Mike; Siu, Shun-Mei
1996-01-01
Asserts that the Big Sisters Programme in Hong Kong provides a good example of a scheme that transcends personal and school issues and facilitates a more participative and democratic view of society. Characterizes the program as a benign form of a "hidden curriculum" and recommends establishing it in secondary schools. (MJP)
The Influence of Object Conceptions on the Mechanical Intuitions of Children and Adults.
ERIC Educational Resources Information Center
Rosser, Rosemary A.; Chandler, Kacey
1995-01-01
Examined how children's and adults' initial conceptions of objects and space influence predictions about the physical world, but lead the naive person to misconstrue a dynamic event. Found that participants proficiently anticipated where an oscillating screen would contact a hidden object, but underestimated the distance until contact.…
Nature and Education: Learning from the World around Us.
ERIC Educational Resources Information Center
Donckers, Cathy
Our elementary secondary schools have hidden curricula which teach passivity, resistance to change, inflexibility, and submissive behavior in a world which is moving toward faster changes and heightened personal individuality. Class control with the teacher feeding information to the students like data to a computer can no longer be accepted as…
ERIC Educational Resources Information Center
Tal-Or, Nurit
2010-01-01
Most of the literature on impression management considers direct tactics such as self-promoting by mentioning personal achievements and ingratiating by complimenting others. These direct tactics can backfire if the target recognizes the hidden motive behind them. Therefore, people often use indirect impression management tactics. Previous research…
Job Objectives for M60A1A0S Tank Gunnery
1976-04-01
aeasuring the costs of an existing, perhaps ineffective prograa — hidden costs, such «• equipment deaage attributable to ■lause, personal Injury, or for...but for review and deliberation by policy aakers : Do the proposed standards reflect what i» known by eneay gunnery capabllitlee-’ And what
Personality and Occupational Stress in Elite Performers.
ERIC Educational Resources Information Center
Hamilton, Linda H.; Kella, John J.
Performing Arts Psychology has recently emerged as a unique subspecialty comparable to that of Sports Psychology. Attention has been focused on problems common to all performers (e.g., performance anxiety); however, the various stresses within each art form often remain hidden from view. To assess the psychological aspects of different art forms,…
Journal of Undergraduate Psychological Research, Vol. 1, No. 1.
ERIC Educational Resources Information Center
Ladd, Sandra L., Ed.; Hughmanick, Michael, Ed.
1974-01-01
Articles resulting from studies conducted by college undergraduates in all areas of experimental psychology are provided, together with abstracts of other papers authored by students in the field of study. The articles are: The Influence of SET on Solving Hidden-Word Problems by Lana I. Boutacoff; Violation of Personal Space in Deviant Adolescents…
ERIC Educational Resources Information Center
Dakin, Mary Ellen; Eatough, David Lowell; Turchon, Andrew
2011-01-01
There is a need to establish and nurture a relationship between urban and suburban students and the natural world. This relationship needs to be personal and immediate. They need to see the wilder life that survives and sometimes flourishes in "their" world--not miles away in the hills and mountains or hidden beneath the sea, but outside…
Recalling the Letter: The Uses of Oral Testimony in Historical Studies of Literacy
ERIC Educational Resources Information Center
Duffy, John
2007-01-01
This article examines the uses of oral testimony in writing about literacy in historical context, especially about the literacy traditions of populations "hidden from history"--immigrants, refugees, and undocumented persons--who are entering U.S. schools and workplaces, and whose literacy histories may be unknown or lost. Drawing on testimonies…
Hidden Sector Dark Matter Models for the Galactic Center Gamma-Ray Excess
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berlin, Asher; Gratia, Pierre; Hooper, Dan
2014-07-24
The gamma-ray excess observed from the Galactic Center can be interpreted as dark matter particles annihilating into Standard Model fermions with a cross section near that expected for a thermal relic. Although many particle physics models have been shown to be able to account for this signal, the fact that this particle has not yet been observed in direct detection experiments somewhat restricts the nature of its interactions. One way to suppress the dark matter's elastic scattering cross section with nuclei is to consider models in which the dark matter is part of a hidden sector. In such models, themore » dark matter can annihilate into other hidden sector particles, which then decay into Standard Model fermions through a small degree of mixing with the photon, Z, or Higgs bosons. After discussing the gamma-ray signal from hidden sector dark matter in general terms, we consider two concrete realizations: a hidden photon model in which the dark matter annihilates into a pair of vector gauge bosons that decay through kinetic mixing with the photon, and a scenario within the generalized NMSSM in which the dark matter is a singlino-like neutralino that annihilates into a pair of singlet Higgs bosons, which decay through their mixing with the Higgs bosons of the MSSM.« less
Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.
Rajivan, Prashanth; Cooke, Nancy J
2018-03-01
Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.
Detection of vehicle-based improvised explosives using ultra-trace detection equipment
NASA Astrophysics Data System (ADS)
Fisher, Mark; Sikes, John; Prather, Mark; Wichert, Clint
2005-05-01
Vehicle-borne improvised explosive devices (VBIEDs) have become the weapon of choice for insurgents in Iraq. At the same time, these devices are becoming increasingly sophisticated and effective. VBIEDs can be difficult to detect during visual inspection of vehicles. This is especially true when explosives have been hidden behind a vehicle"s panels, inside seat cushions, under floorboards, or behind cargo. Even though the explosive may not be visible, vapors of explosive emanating from the device are often present in the vehicle, but the current generation of trace detection equipment has not been sensitive enough to detect these low concentrations of vapor. This paper presents initial test results using the Nomadics Fido sensor for detection of VBIEDs. The sensor is a small, explosives detector with unprecedented levels of sensitivity for detection of nitroaromatic explosives. Fido utilizes fluorescence quenching of novel polymer materials to detect traces of explosive vapor emanating from targets containing explosives. These materials, developed by collaborators at the Massachusetts Institute of Technology (MIT), amplify the quenching response that occurs when molecules of explosive bind to films of the polymer. These materials have enabled development of sensors with performance approaching that of canines trained to detect explosives. The ability of the sensor to detect explosives in vehicles and on persons who have recently been in close proximity to explosives has recently been demonstrated. In these tests, simulated targets were quickly and easily detected using a Fido sensor in conjunction with both direct vapor and swipe sampling methods. The results of these tests suggest that chemical vapor sensing has utility as a means of screening vehicles for explosives at checkpoints and on patrols.
Diagnosis and Management of Hidden Caries in a Primary Molar Tooth.
Gera, Arwa; Zilberman, Uri
2017-01-01
Hidden caries is a dentinal lesion beneath the dentinoenamel junction, visible on radiographs. A single report described this lesion in primary dentition. This case report describes a case of hidden caries in a mandibular second primary molar, misdiagnosed as malignant swelling. A 3-year-old white girl was referred to the Department of Pediatric Dentistry with a chief complaint of pain and extraoral swelling on the right side of the mandible for the last 3 months. She was earlier referred to the surgical department for biopsy of the lesion. Radiographic and computed tomography scan examination showed a periapical lesion with buccal plate resorption and radiolucency beneath the enamel on the mesial part of tooth 85. The tooth was extracted, and follow-up of 2 years showed normal development of tooth 45. The main problem is early detection and treatment, since the outer surface of enamel may appear intact on tactile examination. Gera A, Zilberman U. Diagnosis and Management of Hidden Caries in a Primary Molar Tooth. Int J Clin Pediatr Dent 2017;10(1):99-102.
New prospects in fixed target searches for dark forces with the SeaQuest experiment at Fermilab
Gardner, S.; Holt, R. J.; Tadepalli, A. S.
2016-06-10
An intense 120 GeV proton beam incident on an extremely long iron target generates enormous numbers of light-mass particles that also decay within that target. If one of these particles decays to a final state with a hidden gauge boson, or if such a particle is produced as a result of the initial collision, then that weakly interacting hidden-sector particle may traverse the remainder of the target and be detected downstream through its possible decay to an e +e –, μ +μ –, or π +π – final state. These conditions can be realized through an extension of the SeaQuestmore » experiment at Fermilab, and in this initial investigation we consider how it can serve as an ultrasensitive probe of hidden vector gauge forces, both Abelian and non-Abelian. Here a light, weakly coupled hidden sector may well explain the dark matter established through astrophysical observations, and the proposed search can provide tangible evidence for its existence—or, alternatively, constrain a “sea” of possibilities.« less
Hidden Markov models and other machine learning approaches in computational molecular biology
DOE Office of Scientific and Technical Information (OSTI.GOV)
Baldi, P.
1995-12-31
This tutorial was one of eight tutorials selected to be presented at the Third International Conference on Intelligent Systems for Molecular Biology which was held in the United Kingdom from July 16 to 19, 1995. Computational tools are increasingly needed to process the massive amounts of data, to organize and classify sequences, to detect weak similarities, to separate coding from non-coding regions, and reconstruct the underlying evolutionary history. The fundamental problem in machine learning is the same as in scientific reasoning in general, as well as statistical modeling: to come up with a good model for the data. In thismore » tutorial four classes of models are reviewed. They are: Hidden Markov models; artificial Neural Networks; Belief Networks; and Stochastic Grammars. When dealing with DNA and protein primary sequences, Hidden Markov models are one of the most flexible and powerful alignments and data base searches. In this tutorial, attention is focused on the theory of Hidden Markov Models, and how to apply them to problems in molecular biology.« less
Detection and Classification of Network Intrusions Using Hidden Markov Models
2002-01-01
31 2.2.3 High-level state machines for misuse detection . . . . . . . 32 2.2.4 EMERALD ...Solaris host audit data to detect Solaris R2L (Remote-to-Local) and U2R (User-to-Root) attacks. 7 login as a legitimate user on a local system and use a...as suspicious rather than the entire login session and it can detect some anomalies that are difficult to detect with traditional approaches. It’s
Ferromagnetic Objects Magnetovision Detection System.
Nowicki, Michał; Szewczyk, Roman
2013-12-02
This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth's field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.
Impact of frequency and polarization diversity on a terahertz radar's imaging performance
NASA Astrophysics Data System (ADS)
Cooper, Ken B.; Dengler, Robert J.; Llombart, Nuria
2011-05-01
The Jet Propulsion Laboratory's 675 GHz, 25 m standoff imaging radar can achieve >1 Hz real time frame rates over 40x40 cm fields of view for rapid detection of person-borne concealed weapons. In its normal mode of operation, the radar generates imagery based solely on the time-of-flight, or range, between the radar and target. With good clothing penetration at 675 GHz, a hidden object will be detectable as an anomaly in the range-to-surface profile of a subject. Here we report on results of two modifications in the radar system that were made to asses its performance using somewhat different detection approaches. First, the radar's operating frequency and bandwidth were cut in half, to 340 GHz and 13 GHz, where there potential system advantages include superior transmit power and clothing penetration, as well as a lower cost of components. In this case, we found that the twofold reduction in range and cross-range resolution sharply limited the quality of through-clothes imagery, although some improvement is observed for detection of large targets concealed by very thick clothing. The second radar modification tested involved operation in a fully polarimetric mode, where enhanced image contrast might occur between surfaces with different material or geometric characteristics. Results from these tests indicated that random speckle dominates polarimetric power imagery, making it an unattractive approach for contrast improvement. Taken together, the experiments described here underscore the primary importance of high resolution imaging in THz radar applications for concealed weapons detection.
Detecting Hidden Diversification Shifts in Models of Trait-Dependent Speciation and Extinction.
Beaulieu, Jeremy M; O'Meara, Brian C
2016-07-01
The distribution of diversity can vary considerably from clade to clade. Attempts to understand these patterns often employ state-dependent speciation and extinction models to determine whether the evolution of a particular novel trait has increased speciation rates and/or decreased extinction rates. It is still unclear, however, whether these models are uncovering important drivers of diversification, or whether they are simply pointing to more complex patterns involving many unmeasured and co-distributed factors. Here we describe an extension to the popular state-dependent speciation and extinction models that specifically accounts for the presence of unmeasured factors that could impact diversification rates estimated for the states of any observed trait, addressing at least one major criticism of BiSSE (Binary State Speciation and Extinction) methods. Specifically, our model, which we refer to as HiSSE (Hidden State Speciation and Extinction), assumes that related to each observed state in the model are "hidden" states that exhibit potentially distinct diversification dynamics and transition rates than the observed states in isolation. We also demonstrate how our model can be used as character-independent diversification models that allow for a complex diversification process that is independent of the evolution of a character. Under rigorous simulation tests and when applied to empirical data, we find that HiSSE performs reasonably well, and can at least detect net diversification rate differences between observed and hidden states and detect when diversification rate differences do not correlate with the observed states. We discuss the remaining issues with state-dependent speciation and extinction models in general, and the important ways in which HiSSE provides a more nuanced understanding of trait-dependent diversification. © The Author(s) 2016. Published by Oxford University Press, on behalf of the Society of Systematic Biologists. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Steele, James S; Bush, Keith; Stowe, Zachary N; James, George A; Smitherman, Sonet; Kilts, Clint D; Cisler, Josh
2018-01-01
Numerous data demonstrate that distracting emotional stimuli cause behavioral slowing (i.e. emotional conflict) and that behavior dynamically adapts to such distractors. However, the cognitive and neural mechanisms that mediate these behavioral findings are poorly understood. Several theoretical models have been developed that attempt to explain these phenomena, but these models have not been directly tested on human behavior nor compared. A potential tool to overcome this limitation is Hidden Markov Modeling (HMM), which is a computational approach to modeling indirectly observed systems. Here, we administered an emotional Stroop task to a sample of healthy adolescent girls (N = 24) during fMRI and used HMM to implement theoretical behavioral models. We then compared the model fits and tested for neural representations of the hidden states of the most supported model. We found that a modified variant of the model posited by Mathews et al. (1998) was most concordant with observed behavior and that brain activity was related to the model-based hidden states. Particularly, while the valences of the stimuli themselves were encoded primarily in the ventral visual cortex, the model-based detection of threatening targets was associated with increased activity in the bilateral anterior insula, while task effort (i.e. adaptation) was associated with reduction in the activity of these areas. These findings suggest that emotional target detection and adaptation are accomplished partly through increases and decreases, respectively, in the perceived immediate relevance of threatening cues and also demonstrate the efficacy of using HMM to apply theoretical models to human behavior.
Bush, Keith; Stowe, Zachary N.; James, George A.; Smitherman, Sonet; Kilts, Clint D.; Cisler, Josh
2018-01-01
Numerous data demonstrate that distracting emotional stimuli cause behavioral slowing (i.e. emotional conflict) and that behavior dynamically adapts to such distractors. However, the cognitive and neural mechanisms that mediate these behavioral findings are poorly understood. Several theoretical models have been developed that attempt to explain these phenomena, but these models have not been directly tested on human behavior nor compared. A potential tool to overcome this limitation is Hidden Markov Modeling (HMM), which is a computational approach to modeling indirectly observed systems. Here, we administered an emotional Stroop task to a sample of healthy adolescent girls (N = 24) during fMRI and used HMM to implement theoretical behavioral models. We then compared the model fits and tested for neural representations of the hidden states of the most supported model. We found that a modified variant of the model posited by Mathews et al. (1998) was most concordant with observed behavior and that brain activity was related to the model-based hidden states. Particularly, while the valences of the stimuli themselves were encoded primarily in the ventral visual cortex, the model-based detection of threatening targets was associated with increased activity in the bilateral anterior insula, while task effort (i.e. adaptation) was associated with reduction in the activity of these areas. These findings suggest that emotional target detection and adaptation are accomplished partly through increases and decreases, respectively, in the perceived immediate relevance of threatening cues and also demonstrate the efficacy of using HMM to apply theoretical models to human behavior. PMID:29489856
Hidden Markov Model-Based CNV Detection Algorithms for Illumina Genotyping Microarrays.
Seiser, Eric L; Innocenti, Federico
2014-01-01
Somatic alterations in DNA copy number have been well studied in numerous malignancies, yet the role of germline DNA copy number variation in cancer is still emerging. Genotyping microarrays generate allele-specific signal intensities to determine genotype, but may also be used to infer DNA copy number using additional computational approaches. Numerous tools have been developed to analyze Illumina genotype microarray data for copy number variant (CNV) discovery, although commonly utilized algorithms freely available to the public employ approaches based upon the use of hidden Markov models (HMMs). QuantiSNP, PennCNV, and GenoCN utilize HMMs with six copy number states but vary in how transition and emission probabilities are calculated. Performance of these CNV detection algorithms has been shown to be variable between both genotyping platforms and data sets, although HMM approaches generally outperform other current methods. Low sensitivity is prevalent with HMM-based algorithms, suggesting the need for continued improvement in CNV detection methodologies.
NASA Astrophysics Data System (ADS)
Attaluri, Pavan K.; Chen, Zhengxin; Weerakoon, Aruna M.; Lu, Guoqing
Multiple criteria decision making (MCDM) has significant impact in bioinformatics. In the research reported here, we explore the integration of decision tree (DT) and Hidden Markov Model (HMM) for subtype prediction of human influenza A virus. Infection with influenza viruses continues to be an important public health problem. Viral strains of subtype H3N2 and H1N1 circulates in humans at least twice annually. The subtype detection depends mainly on the antigenic assay, which is time-consuming and not fully accurate. We have developed a Web system for accurate subtype detection of human influenza virus sequences. The preliminary experiment showed that this system is easy-to-use and powerful in identifying human influenza subtypes. Our next step is to examine the informative positions at the protein level and extend its current functionality to detect more subtypes. The web functions can be accessed at http://glee.ist.unomaha.edu/.
Reading and Writing Difficulties--A Problem? EMIR Education and Research.
ERIC Educational Resources Information Center
Ericson, Britta, Ed.
This collection of essays contains a brief description of the symptoms of dyslexia and a definition of the terminology. The meaning of being the mother of a dyslexic child and how to live with this "hidden handicap" are also described. Suggestions regarding how to treat persons with reading and writing difficulties are put forward. After…
Regional Programming for Differential Needs: Vocational Education in Ohio.
ERIC Educational Resources Information Center
Shoemaker, Byrl R.
People represent the real hidden resource of the nation. In spite of mechanization and technological developments, 'the person' still represents the major facet of productivity, and 'people' comprise the very purpose of education. In Ohio, an attempt has been made to develop a career continuum as a thrust in education to lead youth to a point of…
Writing to Survive: How Teachers and Teens Negotiate the Effects of Abuse, Violence, and Disaster
ERIC Educational Resources Information Center
Alvarez, Deborah M.
2010-01-01
This ethnographic research investigates how adolescents use writing. Deborah M. Alvarez uncovers the hidden abuses and violence that adolescents bore with each school day. In two different research sites, the author follows adolescents through their academic and personal lives to discover how they use writing only to uncover the impact the public…
Learning to Choose: The Hidden Art of the Enthusiastic Reader
ERIC Educational Resources Information Center
Mackey, Margaret
2014-01-01
Often the difference between a successful and unsuccessful reader is that the former is simply better at finding enjoyable books to read. The capacity to select appealing reading is not developed in classrooms where the decision about what book to read is made by someone other than the reader: the teacher, the curriculum planner, the person who…
Undesirable Features of the Medical Learning Environment: A Narrative Review of the Literature
ERIC Educational Resources Information Center
Benbassat, Jochanan
2013-01-01
The objective of this narrative review of the literature is to draw attention to four undesirable features of the medical learning environment (MLE). First, students' fears of personal inadequacy and making errors are enhanced rather than alleviated by the hidden curriculum of the clinical teaching setting; second, the MLE projects a denial…
ERIC Educational Resources Information Center
McCormack, Coralie; Vanags, Thea; Prior, Robyn
2014-01-01
Teaching awards are now common practice in higher education. However, few award applicants and their writing guides have investigated their experience of writing a teaching award application, a writing process recognised as different from that required in research publication. To systematically research and analyse their personal experiences two…
A Story of a Healing Relationship: The Person-Centered Approach in Expressive Arts Therapy
ERIC Educational Resources Information Center
Kim, Sunhee
2010-01-01
In expressive arts therapy, visual art, movement, music, poetry, and creative writing offer clients opportunities to explore their hidden feelings expressed in the art forms. The colors, lines, motions, or sounds expressed during the therapy session promote better understanding of the self with support of the therapist. It is crucial to have a…
Don't Blame ME, Daddy. False Accusations of Child Sexual Abuse: A Hidden National Tragedy.
ERIC Educational Resources Information Center
Tong, Dean
Noting the increase in false accusations of child sexual abuse where divorce and custody litigation is in progress, this book examines the consequences of such accusations for everyone involved and provides defensive strategies for those falsely accused. The book draws on four case studies, including a personal one, to illustrate the chronology…
Religion, Spirituality, and the Hidden Curriculum: Medical Student and Faculty Reflections.
Balboni, Michael J; Bandini, Julia; Mitchell, Christine; Epstein-Peterson, Zachary D; Amobi, Ada; Cahill, Jonathan; Enzinger, Andrea C; Peteet, John; Balboni, Tracy
2015-10-01
Religion and spirituality play an important role in physicians' medical practice, but little research has examined their influence within the socialization of medical trainees and the hidden curriculum. The objective is to explore the role of religion and spirituality as they intersect with aspects of medicine's hidden curriculum. Semiscripted, one-on-one interviews and focus groups (n = 33 respondents) were conducted to assess Harvard Medical School student and faculty experiences of religion/spirituality and the professionalization process during medical training. Using grounded theory, theme extraction was performed with interdisciplinary input (medicine, sociology, and theology), yielding a high inter-rater reliability score (kappa = 0.75). Three domains emerged where religion and spirituality appear as a factor in medical training. First, religion/spirituality may present unique challenges and benefits in relation to the hidden curriculum. Religious/spiritual respondents more often reported to struggle with issues of personal identity, increased self-doubt, and perceived medical knowledge inadequacy. However, religious/spiritual participants less often described relationship conflicts within the medical team, work-life imbalance, and emotional stress arising from patient suffering. Second, religion/spirituality may influence coping strategies during encounters with patient suffering. Religious/spiritual trainees described using prayer, faith, and compassion as means for coping whereas nonreligious/nonspiritual trainees discussed compartmentalization and emotional repression. Third, levels of religion/spirituality appear to fluctuate in relation to medical training, with many trainees experiencing an increase in religiousness/spirituality during training. Religion/spirituality has a largely unstudied but possibly influential role in medical student socialization. Future study is needed to characterize its function within the hidden curriculum. Copyright © 2015 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.
Religion, Spirituality, and the Hidden Curriculum: Medical Student and Faculty Reflections
Balboni, Michael J.; Bandini, Julia; Mitchell, Christine; Epstein-Peterson, Zachary D.; Amobi, Ada; Cahill, Jonathan; Enzinger, Andrea C.; Peteet, John; Balboni, Tracy
2017-01-01
Context Religion and spirituality play an important role in physicians’ medical practice, but little research has examined their influence within the socialization of medical trainees and the hidden curriculum. Objectives The objective is to explore the role of religion and spirituality as they intersect with aspects of medicine’s hidden curriculum. Methods Semiscripted, one-on-one interviews and focus groups (n = 33 respondents) were conducted to assess Harvard Medical School student and faculty experiences of religion/spirituality and the professionalization process during medical training. Using grounded theory, theme extraction was performed with interdisciplinary input (medicine, sociology, and theology), yielding a high inter-rater reliability score (kappa = 0.75). Results Three domains emerged where religion and spirituality appear as a factor in medical training. First, religion/spirituality may present unique challenges and benefits in relation to the hidden curriculum. Religious/spiritual respondents more often reported to struggle with issues of personal identity, increased self-doubt, and perceived medical knowledge inadequacy. However, religious/spiritual participants less often described relationship conflicts within the medical team, work-life imbalance, and emotional stress arising from patient suffering. Second, religion/spirituality may influence coping strategies during encounters with patient suffering. Religious/spiritual trainees described using prayer, faith, and compassion as means for coping whereas nonreligious/nonspiritual trainees discussed compartmentalization and emotional repression. Third, levels of religion/spirituality appear to fluctuate in relation to medical training, with many trainees experiencing an increase in religiousness/spirituality during training. Conclusion Religion/spirituality has a largely unstudied but possibly influential role in medical student socialization. Future study is needed to characterize its function within the hidden curriculum. PMID:26025271
NASA Technical Reports Server (NTRS)
Howell, Patricia A.; Winfree, William P.; Cramer, K. Elliott
2008-01-01
On July 12, 2006, British-born astronaut Piers Sellers became the first person to conduct thermal nondestructive evaluation experiments in space, demonstrating the feasibility of a new tool for detecting damage to the reinforced carbon-carbon (RCC) structures of the Shuttle. This new tool was an EVA (Extravehicular Activity, or spacewalk) compatible infrared camera developed by NASA engineers. Data was collected both on the wing leading edge of the Orbiter and on pre-damaged samples mounted in the Shuttle s cargo bay. A total of 10 infrared movies were collected during the EVA totaling over 250 megabytes of data. Images were downloaded from the orbiting Shuttle to Johnson Space Center for analysis and processing. Results are shown to be comparable to ground-based thermal inspections performed in the laboratory with the same type of camera and simulated solar heating. The EVA camera system detected flat-bottom holes as small as 2.54cm in diameter with 50% material loss from the back (hidden) surface in RCC during this first test of the EVA IR Camera. Data for the time history of the specimen temperature and the capability of the inspection system for imaging impact damage are presented.
QRS complex detection based on continuous density hidden Markov models using univariate observations
NASA Astrophysics Data System (ADS)
Sotelo, S.; Arenas, W.; Altuve, M.
2018-04-01
In the electrocardiogram (ECG), the detection of QRS complexes is a fundamental step in the ECG signal processing chain since it allows the determination of other characteristics waves of the ECG and provides information about heart rate variability. In this work, an automatic QRS complex detector based on continuous density hidden Markov models (HMM) is proposed. HMM were trained using univariate observation sequences taken either from QRS complexes or their derivatives. The detection approach is based on the log-likelihood comparison of the observation sequence with a fixed threshold. A sliding window was used to obtain the observation sequence to be evaluated by the model. The threshold was optimized by receiver operating characteristic curves. Sensitivity (Sen), specificity (Spc) and F1 score were used to evaluate the detection performance. The approach was validated using ECG recordings from the MIT-BIH Arrhythmia database. A 6-fold cross-validation shows that the best detection performance was achieved with 2 states HMM trained with QRS complexes sequences (Sen = 0.668, Spc = 0.360 and F1 = 0.309). We concluded that these univariate sequences provide enough information to characterize the QRS complex dynamics from HMM. Future works are directed to the use of multivariate observations to increase the detection performance.
Detecting 2LSB steganography using extended pairs of values analysis
NASA Astrophysics Data System (ADS)
Khalind, Omed; Aziz, Benjamin
2014-05-01
In this paper, we propose an extended pairs of values analysis to detect and estimate the amount of secret messages embedded with 2LSB replacement in digital images based on chi-square attack and regularity rate in pixel values. The detection process is separated from the estimation of the hidden message length, as it is the main requirement of any steganalysis method. Hence, the detection process acts as a discrete classifier, which classifies a given set of images into stego and clean classes. The method can accurately detect 2LSB replacement even when the message length is about 10% of the total capacity, it also reaches its best performance with an accuracy of higher than 0.96 and a true positive rate of more than 0.997 when the amount of data are 20% to 100% of the total capacity. However, the method puts no assumptions neither on the image nor the secret message, as it tested with two sets of 3000 images, compressed and uncompressed, embedded with a random message for each case. This method of detection could also be used as an automated tool to analyse a bulk of images for hidden contents, which could be used by digital forensics analysts in their investigation process.
Schulz, Vincent; Chen, Min; Tuck, David
2010-01-01
Background Genotyping platforms such as single nucleotide polymorphism (SNP) arrays are powerful tools to study genomic aberrations in cancer samples. Allele specific information from SNP arrays provides valuable information for interpreting copy number variation (CNV) and allelic imbalance including loss-of-heterozygosity (LOH) beyond that obtained from the total DNA signal available from array comparative genomic hybridization (aCGH) platforms. Several algorithms based on hidden Markov models (HMMs) have been designed to detect copy number changes and copy-neutral LOH making use of the allele information on SNP arrays. However heterogeneity in clinical samples, due to stromal contamination and somatic alterations, complicates analysis and interpretation of these data. Methods We have developed MixHMM, a novel hidden Markov model using hidden states based on chromosomal structural aberrations. MixHMM allows CNV detection for copy numbers up to 7 and allows more complete and accurate description of other forms of allelic imbalance, such as increased copy number LOH or imbalanced amplifications. MixHMM also incorporates a novel sample mixing model that allows detection of tumor CNV events in heterogeneous tumor samples, where cancer cells are mixed with a proportion of stromal cells. Conclusions We validate MixHMM and demonstrate its advantages with simulated samples, clinical tumor samples and a dilution series of mixed samples. We have shown that the CNVs of cancer cells in a tumor sample contaminated with up to 80% of stromal cells can be detected accurately using Illumina BeadChip and MixHMM. Availability The MixHMM is available as a Python package provided with some other useful tools at http://genecube.med.yale.edu:8080/MixHMM. PMID:20532221
Fizil, Ádám; Gáspári, Zoltán; Barna, Terézia; Marx, Florentine; Batta, Gyula
2015-01-01
Transition between conformational states in proteins is being recognized as a possible key factor of function. In support of this, hidden dynamic NMR structures were detected in several cases up to populations of a few percent. Here, we show by two- and three-state analysis of thermal unfolding, that the population of hidden states may weight 20–40 % at 298 K in a disulfide-rich protein. In addition, sensitive 15N-CEST NMR experiments identified a low populated (0.15 %) state that was in slow exchange with the folded PAF protein. Remarkably, other techniques failed to identify the rest of the NMR “dark matter”. Comparison of the temperature dependence of chemical shifts from experiments and molecular dynamics calculations suggests that hidden conformers of PAF differ in the loop and terminal regions and are most similar in the evolutionary conserved core. Our observations point to the existence of a complex conformational landscape with multiple conformational states in dynamic equilibrium, with diverse exchange rates presumably responsible for the completely hidden nature of a considerable fraction. PMID:25676351
Writing from Within: A Guide to Creativity and Life Story Writing. Third Edition.
ERIC Educational Resources Information Center
Selling, Bernard
Based on the idea that telling personal life stories can be a voyage of self discovery, freeing up images and memories that have long remained hidden, this book explains techniques to help individuals learn to write vivid autobiographical stories and life narratives. Whether used at home, in a classroom, or in a therapy environment, the techniques…
ERIC Educational Resources Information Center
Fund for the Improvement of Postsecondary Education (ED), Washington, DC.
The pamphlet outlines provisions of Section 504 of the Rehabilitation Act of 1973, which protects the rights of persons with handicaps in programs and activities that receive federal financial assistance, including individuals with disabilities that may not be apparent. The pamphlet answers questions about the civil rights of students with hidden…
The Hidden Classroom of the Workplace: How Employees Learn at Work in Both Formal and Informal Ways
ERIC Educational Resources Information Center
Olson, Richard; Klein-Collins, Rebecca
2014-01-01
Many are accustomed to the idea that we learn at school and that a college education is acquired in college classrooms. In reality, however, learning takes place in all aspects of a person's life--through military experience, raising a family, volunteering, and, perhaps most significantly, in the workplace. Learning that occurs in the workplace…
ERIC Educational Resources Information Center
Hofstra Univ., Hempstead, NY.
This report provides a selection of conference papers which discuss issues concerning minority participation in higher education, beginning with recognition of the many discrepancies between what are expressed as personal and organizational values and what parameters remain hidden. The papers consider the causes for limited minority participation…
NASA Astrophysics Data System (ADS)
Misawa, Tsuyoshi; Takahashi, Yoshiyuki; Yagi, Takahiro; Pyeon, Cheol Ho; Kimura, Masaharu; Masuda, Kai; Ohgaki, Hideaki
2015-10-01
For detection of hidden special nuclear materials (SNMs), we have developed an active neutron-based interrogation system combined with a D-D fusion pulsed neutron source and a neutron detection system. In the detection scheme, we have adopted new measurement techniques simultaneously; neutron noise analysis and neutron energy spectrum analysis. The validity of neutron noise analysis method has been experimentally studied in the Kyoto University Critical Assembly (KUCA), and was applied to a cargo container inspection system by simulation.
Dental hygiene participation in managing incipient and hidden caries.
Barnes, Caren M
2005-10-01
With the advent of new caries detection devices that allow early detection, dental hygienists can intervene in the demineralization process and work with the patient toward remineralization through patient self-care procedures and the professional application of topical fluorides. The focus of this article is on caries detection devices, caries risk assessment, agents used to prevent dental caries, and the development of self-care plans for patients that include prevention, intervention, and therapeutic components.
Autonomous detection of crowd anomalies in multiple-camera surveillance feeds
NASA Astrophysics Data System (ADS)
Nordlöf, Jonas; Andersson, Maria
2016-10-01
A novel approach for autonomous detection of anomalies in crowded environments is presented in this paper. The proposed models uses a Gaussian mixture probability hypothesis density (GM-PHD) filter as feature extractor in conjunction with different Gaussian mixture hidden Markov models (GM-HMMs). Results, based on both simulated and recorded data, indicate that this method can track and detect anomalies on-line in individual crowds through multiple camera feeds in a crowded environment.
Detection of hidden explosives in different scenarios with the use of nuclear probes
NASA Astrophysics Data System (ADS)
Nebbia, G.; Pesente, S.; Lunardon, M.; Moretto, S.; Viesti, G.; Cinausero, M.; Barbui, M.; Fioretto, E.; Filippini, V.; Sudac, D.; Nađ, K.; Blagus, S.; Valković, V.
2005-04-01
The detection of landmines by using available technologies is a time consuming, expensive and extremely dangerous job, so that there is a need for a technological breakthrough in this field. Atomic and nuclear physics based sensors might offer new possibilities in de-mining. Technology and methods derived from the studies applied to the detection of landmines can be successfully applied to the screening of cargo in customs inspections.
Passive Acoustic Leak Detection for Sodium Cooled Fast Reactors Using Hidden Markov Models
NASA Astrophysics Data System (ADS)
Marklund, A. Riber; Kishore, S.; Prakash, V.; Rajan, K. K.; Michel, F.
2016-06-01
Acoustic leak detection for steam generators of sodium fast reactors have been an active research topic since the early 1970s and several methods have been tested over the years. Inspired by its success in the field of automatic speech recognition, we here apply hidden Markov models (HMM) in combination with Gaussian mixture models (GMM) to the problem. To achieve this, we propose a new feature calculation scheme, based on the temporal evolution of the power spectral density (PSD) of the signal. Using acoustic signals recorded during steam/water injection experiments done at the Indira Gandhi Centre for Atomic Research (IGCAR), the proposed method is tested. We perform parametric studies on the HMM+GMM model size and demonstrate that the proposed method a) performs well without a priori knowledge of injection noise, b) can incorporate several noise models and c) has an output distribution that simplifies false alarm rate control.
Revealing hidden covariation detection: evidence for implicit abstraction at study.
Rossnagel, C S
2001-09-01
Four experiments in the brain scans paradigm (P. Lewicki, T. Hill, & I. Sasaki, 1989) investigated hidden covariation detection (HCD). In Experiment 1 HCD was found in an implicit- but not in an explicit-instruction group. In Experiment 2 HCD was impaired by nonholistic perception of stimuli but not by divided attention. In Experiment 3 HCD was eliminated by interspersing stimuli that deviated from the critical covariation. In Experiment 4 a transfer procedure was used. HCD was found with dissimilar test stimuli that preserved the covariation but was almost eliminated with similar stimuli that were neutral as to the covariation. Awareness was assessed both by objective and subjective tests in all experiments. Results suggest that HCD is an effect of implicit rule abstraction and that similarity processing plays only a minor role. HCD might be suppressed by intentional search strategies that induce inappropriate aggregation of stimulus information.
NASA Astrophysics Data System (ADS)
Yuan, Y.; Meng, Y.; Chen, Y. X.; Jiang, C.; Yue, A. Z.
2018-04-01
In this study, we proposed a method to map urban encroachment onto farmland using satellite image time series (SITS) based on the hierarchical hidden Markov model (HHMM). In this method, the farmland change process is decomposed into three hierarchical levels, i.e., the land cover level, the vegetation phenology level, and the SITS level. Then a three-level HHMM is constructed to model the multi-level semantic structure of farmland change process. Once the HHMM is established, a change from farmland to built-up could be detected by inferring the underlying state sequence that is most likely to generate the input time series. The performance of the method is evaluated on MODIS time series in Beijing. Results on both simulated and real datasets demonstrate that our method improves the change detection accuracy compared with the HMM-based method.
A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns
Wilke, Andreas; Minich, Steven; Panis, Megane; Langen, Tom A.; Skufca, Joseph D.; Todd, Peter M.
2015-01-01
Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed) patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching) times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants’ search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings. PMID:26154661
Developmental Trajectory of Rule Detection in Four- to Six-Year-Old Children
ERIC Educational Resources Information Center
Li, Wei; Cao, Bihua; Hu, Lijuan; Li, Fuhong
2017-01-01
Children younger than three years old are able to detect hidden rules in numerical sequences, and this ability matches that of adults by age seven. However, the developmental trajectory of this ability during the ages of four to six remains unknown. The present study adopted a modified Brixton task to address this issue. In this task, children…
Monitoring forests at the speed of light.
Valerie Rapp
2005-01-01
Airborne laser scanning is a technology developed in the last 15 years. Commonly referred to as light detection and ranging, or LIDAR, these systems can map ground with up to a 6-inch elevation accuracy in open, flat terrain. LIDAR is being rapidly adopted for topographical and flood-plain mapping and the detection of earthquake faults hidden by vegetation, among other...
Xiping Wang; R. Bruce Allison
2008-01-01
Arborists are often challenged to identify internal structural defects hidden from view within tree trunks. This article reports the results of a study using a trunk inspection protocol combining visual observation, single-path stress wave testing, acoustic tomography, and resistance microdrilling to detect internal defects. Two century-old red oak (Quercus rubra)...
Detection and diagnosis of bearing and cutting tool faults using hidden Markov models
NASA Astrophysics Data System (ADS)
Boutros, Tony; Liang, Ming
2011-08-01
Over the last few decades, the research for new fault detection and diagnosis techniques in machining processes and rotating machinery has attracted increasing interest worldwide. This development was mainly stimulated by the rapid advance in industrial technologies and the increase in complexity of machining and machinery systems. In this study, the discrete hidden Markov model (HMM) is applied to detect and diagnose mechanical faults. The technique is tested and validated successfully using two scenarios: tool wear/fracture and bearing faults. In the first case the model correctly detected the state of the tool (i.e., sharp, worn, or broken) whereas in the second application, the model classified the severity of the fault seeded in two different engine bearings. The success rate obtained in our tests for fault severity classification was above 95%. In addition to the fault severity, a location index was developed to determine the fault location. This index has been applied to determine the location (inner race, ball, or outer race) of a bearing fault with an average success rate of 96%. The training time required to develop the HMMs was less than 5 s in both the monitoring cases.
Bernstein, Leslie R; Trahiotis, Constantine
2016-11-01
This study assessed whether audiometrically-defined "slight" or "hidden" hearing losses might be associated with degradations in binaural processing as measured in binaural detection experiments employing interaurally delayed signals and maskers. Thirty-one listeners participated, all having no greater than slight hearing losses (i.e., no thresholds greater than 25 dB HL). Across the 31 listeners and consistent with the findings of Bernstein and Trahiotis [(2015). J. Acoust. Soc. Am. 138, EL474-EL479] binaural detection thresholds at 500 Hz and 4 kHz increased with increasing magnitude of interaural delay, suggesting a loss of precision of coding with magnitude of interaural delay. Binaural detection thresholds were consistently found to be elevated for listeners whose absolute thresholds at 4 kHz exceeded 7.5 dB HL. No such elevations were observed in conditions having no binaural cues available to aid detection (i.e., "monaural" conditions). Partitioning and analyses of the data revealed that those elevated thresholds (1) were more attributable to hearing level than to age and (2) result from increased levels of internal noise. The data suggest that listeners whose high-frequency monaural hearing status would be classified audiometrically as being normal or "slight loss" may exhibit substantial and perceptually meaningful losses of binaural processing.
HIPPI: highly accurate protein family classification with ensembles of HMMs.
Nguyen, Nam-Phuong; Nute, Michael; Mirarab, Siavash; Warnow, Tandy
2016-11-11
Given a new biological sequence, detecting membership in a known family is a basic step in many bioinformatics analyses, with applications to protein structure and function prediction and metagenomic taxon identification and abundance profiling, among others. Yet family identification of sequences that are distantly related to sequences in public databases or that are fragmentary remains one of the more difficult analytical problems in bioinformatics. We present a new technique for family identification called HIPPI (Hierarchical Profile Hidden Markov Models for Protein family Identification). HIPPI uses a novel technique to represent a multiple sequence alignment for a given protein family or superfamily by an ensemble of profile hidden Markov models computed using HMMER. An evaluation of HIPPI on the Pfam database shows that HIPPI has better overall precision and recall than blastp, HMMER, and pipelines based on HHsearch, and maintains good accuracy even for fragmentary query sequences and for protein families with low average pairwise sequence identity, both conditions where other methods degrade in accuracy. HIPPI provides accurate protein family identification and is robust to difficult model conditions. Our results, combined with observations from previous studies, show that ensembles of profile Hidden Markov models can better represent multiple sequence alignments than a single profile Hidden Markov model, and thus can improve downstream analyses for various bioinformatic tasks. Further research is needed to determine the best practices for building the ensemble of profile Hidden Markov models. HIPPI is available on GitHub at https://github.com/smirarab/sepp .
Model-independent indirect detection constraints on hidden sector dark matter
DOE Office of Scientific and Technical Information (OSTI.GOV)
Elor, Gilly; Rodd, Nicholas L.; Slatyer, Tracy R.
2016-06-10
If dark matter inhabits an expanded “hidden sector”, annihilations may proceed through sequential decays or multi-body final states. We map out the potential signals and current constraints on such a framework in indirect searches, using a model-independent setup based on multi-step hierarchical cascade decays. While remaining agnostic to the details of the hidden sector model, our framework captures the generic broadening of the spectrum of secondary particles (photons, neutrinos, e{sup +}e{sup −} and p-barp) relative to the case of direct annihilation to Standard Model particles. We explore how indirect constraints on dark matter annihilation limit the parameter space for suchmore » cascade/multi-particle decays. We investigate limits from the cosmic microwave background by Planck, the Fermi measurement of photons from the dwarf galaxies, and positron data from AMS-02. The presence of a hidden sector can change the constraints on the dark matter by up to an order of magnitude in either direction (although the effect can be much smaller). We find that generally the bound from the Fermi dwarfs is most constraining for annihilations to photon-rich final states, while AMS-02 is most constraining for electron and muon final states; however in certain instances the CMB bounds overtake both, due to their approximate independence on the details of the hidden sector cascade. We provide the full set of cascade spectra considered here as publicly available code with examples at http://web.mit.edu/lns/research/CascadeSpectra.html.« less
Model-independent indirect detection constraints on hidden sector dark matter
Elor, Gilly; Rodd, Nicholas L.; Slatyer, Tracy R.; ...
2016-06-10
If dark matter inhabits an expanded ``hidden sector'', annihilations may proceed through sequential decays or multi-body final states. We map out the potential signals and current constraints on such a framework in indirect searches, using a model-independent setup based on multi-step hierarchical cascade decays. While remaining agnostic to the details of the hidden sector model, our framework captures the generic broadening of the spectrum of secondary particles (photons, neutrinos, e +e - andmore » $$\\overline{p}$$ p) relative to the case of direct annihilation to Standard Model particles. We explore how indirect constraints on dark matter annihilation limit the parameter space for such cascade/multi-particle decays. We investigate limits from the cosmic microwave background by Planck, the Fermi measurement of photons from the dwarf galaxies, and positron data from AMS-02. The presence of a hidden sector can change the constraints on the dark matter by up to an order of magnitude in either direction (although the effect can be much smaller). We find that generally the bound from the Fermi dwarfs is most constraining for annihilations to photon-rich final states, while AMS-02 is most constraining for electron and muon final states; however in certain instances the CMB bounds overtake both, due to their approximate independence on the details of the hidden sector cascade. We provide the full set of cascade spectra considered here as publicly available code with examples at http://web.mit.edu/lns/research/CascadeSpectra.html.« less
Lazzaro, Irene; Falavigna, Claudia; Galaverna, Gianni; Dall'Asta, Chiara; Battilani, Paola
2013-08-16
Fusarium verticillioides and F. proliferatum can infect maize ears and produce fumonisins. The fumonisin B (FB) series is the most prolifically produced, followed by fumonisin C (FC), A (FA) and P (FP); moreover hidden forms of fumonisins have been detected in maize and derivatives. There is a lack of information about which maize component may affect fumonisin pattern production. Therefore, in this work we studied the role of cornmeal and corn starch, as the sole source of nutrition, in the production dynamic of all fumonisin series, hidden forms included, in different strains of F. verticillioides and F. proliferatum incubated at 25°C for 7-45days. Both Fusarium species produced high amounts of FB, following the chemotype FB1>FB2>FB3; FC and FA were produced in lesser amounts, showing the chemotypes: FA2+FA3>FA1 and FC1>FC2+FC3>FC4, respectively; while no FP were detected. F. verticillioides was more prolific than F. proliferatum in fumonisin production (ten times more on average) in all the tested conditions. Fumonisin production was higher in cornmeal than in starch based medium in both Fusarium species; FA and FC were detected only in the former medium. An important role of amylopectin as an inducing factor for fumonisin biosynthesis was suggested, as were acid pH conditions. Fumonisin hidden forms may occur in cornmeal medium, whereas they were never found at significant levels in corn starch medium. Copyright © 2013 Elsevier B.V. All rights reserved.
Applications Using High Flux LCS gamma-ray Beams: Nuclear Security and Contributions to Fukushima
NASA Astrophysics Data System (ADS)
Fujiwara, Mamoru
2014-09-01
Nuclear nonproliferation and security are an important issue for the peaceful use of nuclear energy. Many countries now collaborate together for preventing serious accidents from nuclear terrorism. Detection of hidden long-lived radioisotopes and fissionable nuclides in a non-destructive manner is useful for nuclear safeguards and management of nuclear wastes as well as nuclear security. After introducing the present situation concerning the nuclear nonproliferation and security in Japan, we plan to show the present activities of JAEA to detect the hidden nuclear materials by means of the nuclear resonance fluorescence with energy-tunable, monochromatic gamma-rays generated by Laser Compton Scattering (LCS) with an electron beam. The energy recovery linac (ERL) machine is now under development with the KEK-JAEA collaboration for realizing the new generation of gamma-ray sources. The detection technologies of nuclear materials are currently developed using the existing electron beam facilities at Duke University and at NewSubaru. These developments in Japan will contribute to the nuclear security program in Japan and to the assay of melted nuclear fuels in the Fukushima Daiichi nuclear power plants.
Development of a Fault Monitoring Technique for Wind Turbines Using a Hidden Markov Model.
Shin, Sung-Hwan; Kim, SangRyul; Seo, Yun-Ho
2018-06-02
Regular inspection for the maintenance of the wind turbines is difficult because of their remote locations. For this reason, condition monitoring systems (CMSs) are typically installed to monitor their health condition. The purpose of this study is to propose a fault detection algorithm for the mechanical parts of the wind turbine. To this end, long-term vibration data were collected over two years by a CMS installed on a 3 MW wind turbine. The vibration distribution at a specific rotating speed of main shaft is approximated by the Weibull distribution and its cumulative distribution function is utilized for determining the threshold levels that indicate impending failure of mechanical parts. A Hidden Markov model (HMM) is employed to propose the statistical fault detection algorithm in the time domain and the method whereby the input sequence for HMM is extracted is also introduced by considering the threshold levels and the correlation between the signals. Finally, it was demonstrated that the proposed HMM algorithm achieved a greater than 95% detection success rate by using the long-term signals.
Shift-, rotation-, and scale-invariant shape recognition system using an optical Hough transform
NASA Astrophysics Data System (ADS)
Schmid, Volker R.; Bader, Gerhard; Lueder, Ernst H.
1998-02-01
We present a hybrid shape recognition system with an optical Hough transform processor. The features of the Hough space offer a separate cancellation of distortions caused by translations and rotations. Scale invariance is also provided by suitable normalization. The proposed system extends the capabilities of Hough transform based detection from only straight lines to areas bounded by edges. A very compact optical design is achieved by a microlens array processor accepting incoherent light as direct optical input and realizing the computationally expensive connections massively parallel. Our newly developed algorithm extracts rotation and translation invariant normalized patterns of bright spots on a 2D grid. A neural network classifier maps the 2D features via a nonlinear hidden layer onto the classification output vector. We propose initialization of the connection weights according to regions of activity specifically assigned to each neuron in the hidden layer using a competitive network. The presented system is designed for industry inspection applications. Presently we have demonstrated detection of six different machined parts in real-time. Our method yields very promising detection results of more than 96% correctly classified parts.
Terrien, N; Royer, D; Lepoutre, F; Déom, A
2007-06-01
To increase the sensitivity of Lamb waves to hidden corrosion in aircraft structures, a preliminary step is to understand the phenomena governing this interaction. A hybrid model combining a finite element approach and a modal decomposition method is used to investigate the interaction of Lamb modes with corrosion pits. The finite element mesh is used to describe the region surrounding the corrosion pits while the modal decomposition method permits to determine the waves reflected and transmitted by the damaged area. Simulations make easier the interpretation of some parts of the measured waveform corresponding to superposition of waves diffracted by the corroded area. Numerical results permit to extract significant information from the transmitted waveform and thus to optimize the signal processing for the detection of corrosion at an early stage. Now, we are able to detect corrosion pits down to 80-mum depth distributed randomly on a square centimeter of an aluminum plate. Moreover, thickness variations present on aircraft structures can be discriminated from a slightly corroded area. Finally, using this experimental setup, aircraft structures have been tested.
Thermal human phantom for testing of millimeter wave cameras
NASA Astrophysics Data System (ADS)
Palka, Norbert; Ryniec, Radoslaw; Piszczek, Marek; Szustakowski, Mieczyslaw; Zyczkowski, Marek; Kowalski, Marcin
2012-06-01
Screening cameras working in millimetre band gain more and more interest among security society mainly due to their capability of finding items hidden under clothes. Performance of commercially available passive cameras is still limited due to not sufficient resolution and contrast in comparison to other wavelengths (visible or infrared range). Testing of such cameras usually requires some persons carrying guns, bombs or knives. Such persons can have different clothes or body temperature, what makes the measurements even more ambiguous. To avoid such situations we built a moving phantom of human body. The phantom consists of a polystyrene manikin which is covered with a number of small pipes with water. Pipes were next coated with a silicone "skin". The veins (pipes) are filled with water heated up to 37 C degrees to obtain the same temperature as human body. The phantom is made of non-metallic materials and is placed on a moving wirelessly-controlled platform with four wheels. The phantom can be dressed with a set of ordinary clothes and can be equipped with some dangerous (guns, bombs) and non-dangerous items. For tests we used a passive commercially available camera TS4 from ThruVision Systems Ltd. operating at 250 GHz. We compared the images taken from phantom and a man and we obtained good similarity both for naked as well as dressed man/phantom case. We also tested the phantom with different sets of clothes and hidden items and we got good conformity with persons.
Hidden U (1 ) gauge symmetry realizing a neutrinophilic two-Higgs-doublet model with dark matter
NASA Astrophysics Data System (ADS)
Nomura, Takaaki; Okada, Hiroshi
2018-04-01
We propose a neutrinophilic two-Higgs-doublet model with hidden local U (1 ) symmetry, where active neutrinos are Dirac type, and a fermionic dark matter (DM) candidate is naturally induced as a result of remnant symmetry even after the spontaneous symmetry breaking. In addition, a physical Goldstone boson arises as a consequence of two types of gauge singlet bosons and contributes to the DM phenomenologies as well as an additional neutral gauge boson. Then, we analyze the relic density of DM within the safe range of direct detection searches and show the allowed region of dark matter mass.
Prospects for indirect detection of frozen-in dark matter
NASA Astrophysics Data System (ADS)
Heikinheimo, Matti; Tenkanen, Tommi; Tuominen, Kimmo
2018-03-01
We study observational consequences arising from dark matter (DM) of nonthermal origin, produced by dark freeze-out from a hidden sector heat bath. We assume this heat bath was populated by feebly coupled mediator particles, produced via a Higgs portal interaction with the Standard Model (SM). The dark sector then attained internal equilibrium with a characteristic temperature different from the SM photon temperature. We find that even if the coupling between the DM and the SM sectors is very weak, the scenario allows for indirect observational signals. We show how the expected strength of these signals depends on the temperature of the hidden sector at DM freeze-out.
Hidden Markov models of biological primary sequence information.
Baldi, P; Chauvin, Y; Hunkapiller, T; McClure, M A
1994-01-01
Hidden Markov model (HMM) techniques are used to model families of biological sequences. A smooth and convergent algorithm is introduced to iteratively adapt the transition and emission parameters of the models from the examples in a given family. The HMM approach is applied to three protein families: globins, immunoglobulins, and kinases. In all cases, the models derived capture the important statistical characteristics of the family and can be used for a number of tasks, including multiple alignments, motif detection, and classification. For K sequences of average length N, this approach yields an effective multiple-alignment algorithm which requires O(KN2) operations, linear in the number of sequences. PMID:8302831
ERIC Educational Resources Information Center
Flood, Bernadette; Henman, Martin C.
2015-01-01
People with intellectual disabilities may be "invisible" to pharmacists. They are a complex group of patients many of whom have diabetes. Pharmacists may have little experience of the challenges faced by this high risk group of patients who may be prescribed high risk medications. This case report details information supplied by Pat, a…
ERIC Educational Resources Information Center
Sauter, Megan; Uttal, David H.; Alman, Amanda Schaal; Goldin-Meadow, Susan; Levine, Susan C.
2012-01-01
This article examines two issues: the role of gesture in the communication of spatial information and the relation between communication and mental representation. Children (8-10 years) and adults walked through a space to learn the locations of six hidden toy animals and then explained the space to another person. In Study 1, older children and…
ERIC Educational Resources Information Center
Lagattuta, Kristin Hansen; Sayfan, Liat; Harvey, Christina
2014-01-01
Four- to 10-year-olds' and adults' (N = 263) ability to inhibit privileged knowledge and simulate a naïve perspective were examined. Participants viewed pictures that were then occluded aside from a small ambiguous part. They offered suggestions for how a naïve person might interpret the hidden pictures, as well as rated the probability…
NASA Astrophysics Data System (ADS)
Muneyasu, Mitsuji; Odani, Shuhei; Kitaura, Yoshihiro; Namba, Hitoshi
On the use of a surveillance camera, there is a case where privacy protection should be considered. This paper proposes a new privacy protection method by automatically degrading the face region in surveillance images. The proposed method consists of ROI coding of JPEG2000 and a face detection method based on template matching. The experimental result shows that the face region can be detected and hidden correctly.
A new method to detect event-related potentials based on Pearson's correlation.
Giroldini, William; Pederzoli, Luciano; Bilucaglia, Marco; Melloni, Simone; Tressoldi, Patrizio
2016-12-01
Event-related potentials (ERPs) are widely used in brain-computer interface applications and in neuroscience. Normal EEG activity is rich in background noise, and therefore, in order to detect ERPs, it is usually necessary to take the average from multiple trials to reduce the effects of this noise. The noise produced by EEG activity itself is not correlated with the ERP waveform and so, by calculating the average, the noise is decreased by a factor inversely proportional to the square root of N , where N is the number of averaged epochs. This is the easiest strategy currently used to detect ERPs, which is based on calculating the average of all ERP's waveform, these waveforms being time- and phase-locked. In this paper, a new method called GW6 is proposed, which calculates the ERP using a mathematical method based only on Pearson's correlation. The result is a graph with the same time resolution as the classical ERP and which shows only positive peaks representing the increase-in consonance with the stimuli-in EEG signal correlation over all channels. This new method is also useful for selectively identifying and highlighting some hidden components of the ERP response that are not phase-locked, and that are usually hidden in the standard and simple method based on the averaging of all the epochs. These hidden components seem to be caused by variations (between each successive stimulus) of the ERP's inherent phase latency period (jitter), although the same stimulus across all EEG channels produces a reasonably constant phase. For this reason, this new method could be very helpful to investigate these hidden components of the ERP response and to develop applications for scientific and medical purposes. Moreover, this new method is more resistant to EEG artifacts than the standard calculations of the average and could be very useful in research and neurology. The method we are proposing can be directly used in the form of a process written in the well-known Matlab programming language and can be easily and quickly written in any other software language.
Recovery of Spectrally Overlapping QPSK Signals Using a Nonlinear Optoelectronic Filter
2017-03-19
Spectrally Overlapping QPSK Signals Using a Nonlinear Optoelectronic Filter William Loh, Siva Yegnanarayanan, Kenneth E. Kolodziej, and Paul...recovery of a weak QPSK signal buried 35-dB beneath an interfering QPSK signal having an overlapping spectrum. This nonlinear optoelectronic filter ...from increased detection sensitivity. Here, we demonstrate an optoelectronic filter that enables the detection of a desired signal hidden beneath a
Exploiting the hidden symmetry of spinning black holes: conservation laws and numerical tests
NASA Astrophysics Data System (ADS)
Witzany, Vojtěch
2018-01-01
The Kerr black hole is stationary and axisymmetric, which leads to conservation of energy and azimuthal angular momentum along the orbits of free test particles in its vicinity, but also to conservation laws for the evolution of continuum matter fields. However, the Kerr space-time possesses an additional 'hidden symmetry', which exhibits itself in an unexpected conserved quantity along geodesics known as the Carter constant. We investigate the possibility of using this hidden symmetry to obtain conservation laws and other identities that could be used to test astrophysical simulations of the evolution of matter fields near spinning black holes. After deriving such identities, we set up a simple numerical toy model on which we demonstrate how they can detect the violations of evolution equations in a numerical simulation. Even though one of the expressions we derive is in the form of a conservation law, we end up recommending an equivalent but simpler expression that is not in the form of a conservation law for practical implementation.
Robertson, Colin; Sawford, Kate; Gunawardana, Walimunige S. N.; Nelson, Trisalyn A.; Nathoo, Farouk; Stephen, Craig
2011-01-01
Surveillance systems tracking health patterns in animals have potential for early warning of infectious disease in humans, yet there are many challenges that remain before this can be realized. Specifically, there remains the challenge of detecting early warning signals for diseases that are not known or are not part of routine surveillance for named diseases. This paper reports on the development of a hidden Markov model for analysis of frontline veterinary sentinel surveillance data from Sri Lanka. Field veterinarians collected data on syndromes and diagnoses using mobile phones. A model for submission patterns accounts for both sentinel-related and disease-related variability. Models for commonly reported cattle diagnoses were estimated separately. Region-specific weekly average prevalence was estimated for each diagnoses and partitioned into normal and abnormal periods. Visualization of state probabilities was used to indicate areas and times of unusual disease prevalence. The analysis suggests that hidden Markov modelling is a useful approach for surveillance datasets from novel populations and/or having little historical baselines. PMID:21949763
NASA Astrophysics Data System (ADS)
Leviandier, Thierry; Alber, A.; Le Ber, F.; Piégay, H.
2012-02-01
Seven methods designed to delineate homogeneous river segments, belonging to four families, namely — tests of homogeneity, contrast enhancing, spatially constrained classification, and hidden Markov models — are compared, firstly on their principles, then on a case study, and on theoretical templates. These templates contain patterns found in the case study but not considered in the standard assumptions of statistical methods, such as gradients and curvilinear structures. The influence of data resolution, noise and weak satisfaction of the assumptions underlying the methods is investigated. The control of the number of reaches obtained in order to achieve meaningful comparisons is discussed. No method is found that outperforms all the others on all trials. However, the methods with sequential algorithms (keeping at order n + 1 all breakpoints found at order n) fail more often than those running complete optimisation at any order. The Hubert-Kehagias method and Hidden Markov Models are the most successful at identifying subpatterns encapsulated within the templates. Ergodic Hidden Markov Models are, moreover, liable to exhibit transition areas.
Hidden Markov models for estimating animal mortality from anthropogenic hazards
Carcasses searches are a common method for studying the risk of anthropogenic hazards to wildlife, including non-target poisoning and collisions with anthropogenic structures. Typically, numbers of carcasses found must be corrected for scavenging rates and imperfect detection. ...
Kaya, Yılmaz
2015-09-01
This paper proposes a novel approach to detect epilepsy seizures by using Electroencephalography (EEG), which is one of the most common methods for the diagnosis of epilepsy, based on 1-Dimension Local Binary Pattern (1D-LBP) and grey relational analysis (GRA) methods. The main aim of this paper is to evaluate and validate a novel approach, which is a computer-based quantitative EEG analyzing method and based on grey systems, aimed to help decision-maker. In this study, 1D-LBP, which utilizes all data points, was employed for extracting features in raw EEG signals, Fisher score (FS) was employed to select the representative features, which can also be determined as hidden patterns. Additionally, GRA is performed to classify EEG signals through these Fisher scored features. The experimental results of the proposed approach, which was employed in a public dataset for validation, showed that it has a high accuracy in identifying epileptic EEG signals. For various combinations of epileptic EEG, such as A-E, B-E, C-E, D-E, and A-D clusters, 100, 96, 100, 99.00 and 100% were achieved, respectively. Also, this work presents an attempt to develop a new general-purpose hidden pattern determination scheme, which can be utilized for different categories of time-varying signals.
Intelligent classifier for dynamic fault patterns based on hidden Markov model
NASA Astrophysics Data System (ADS)
Xu, Bo; Feng, Yuguang; Yu, Jinsong
2006-11-01
It's difficult to build precise mathematical models for complex engineering systems because of the complexity of the structure and dynamics characteristics. Intelligent fault diagnosis introduces artificial intelligence and works in a different way without building the analytical mathematical model of a diagnostic object, so it's a practical approach to solve diagnostic problems of complex systems. This paper presents an intelligent fault diagnosis method, an integrated fault-pattern classifier based on Hidden Markov Model (HMM). This classifier consists of dynamic time warping (DTW) algorithm, self-organizing feature mapping (SOFM) network and Hidden Markov Model. First, after dynamic observation vector in measuring space is processed by DTW, the error vector including the fault feature of being tested system is obtained. Then a SOFM network is used as a feature extractor and vector quantization processor. Finally, fault diagnosis is realized by fault patterns classifying with the Hidden Markov Model classifier. The importing of dynamic time warping solves the problem of feature extracting from dynamic process vectors of complex system such as aeroengine, and makes it come true to diagnose complex system by utilizing dynamic process information. Simulating experiments show that the diagnosis model is easy to extend, and the fault pattern classifier is efficient and is convenient to the detecting and diagnosing of new faults.
Detection and tracking of drones using advanced acoustic cameras
NASA Astrophysics Data System (ADS)
Busset, Joël.; Perrodin, Florian; Wellig, Peter; Ott, Beat; Heutschi, Kurt; Rühl, Torben; Nussbaumer, Thomas
2015-10-01
Recent events of drones flying over city centers, official buildings and nuclear installations stressed the growing threat of uncontrolled drone proliferation and the lack of real countermeasure. Indeed, detecting and tracking them can be difficult with traditional techniques. A system to acoustically detect and track small moving objects, such as drones or ground robots, using acoustic cameras is presented. The described sensor, is completely passive, and composed of a 120-element microphone array and a video camera. The acoustic imaging algorithm determines in real-time the sound power level coming from all directions, using the phase of the sound signals. A tracking algorithm is then able to follow the sound sources. Additionally, a beamforming algorithm selectively extracts the sound coming from each tracked sound source. This extracted sound signal can be used to identify sound signatures and determine the type of object. The described techniques can detect and track any object that produces noise (engines, propellers, tires, etc). It is a good complementary approach to more traditional techniques such as (i) optical and infrared cameras, for which the object may only represent few pixels and may be hidden by the blooming of a bright background, and (ii) radar or other echo-localization techniques, suffering from the weakness of the echo signal coming back to the sensor. The distance of detection depends on the type (frequency range) and volume of the noise emitted by the object, and on the background noise of the environment. Detection range and resilience to background noise were tested in both, laboratory environments and outdoor conditions. It was determined that drones can be tracked up to 160 to 250 meters, depending on their type. Speech extraction was also experimentally investigated: the speech signal of a person being 80 to 100 meters away can be captured with acceptable speech intelligibility.
NASA Astrophysics Data System (ADS)
Madaras, Eric I.; Anastasi, Robert F.; Smith, Stephen W.; Seebo, Jeffrey P.; Walker, James L.; Lomness, Janice K.; Hintze, Paul E.; Kammerer, Catherine C.; Winfree, William P.; Russell, Richard W.
2008-02-01
There is currently no method for detecting corrosion under Shuttle tiles except for the expensive process of tile removal and replacement; hence NASA is investigating new NDE methods for detecting hidden corrosion. Time domain terahertz radiation has been applied to corrosion detection under tiles in samples ranging from small lab samples to a Shuttle with positive results. Terahertz imaging methods have been able to detect corrosion at thicknesses of 5 mils or greater under 1" thick Shuttle tiles and 7-12 mils or greater under 2" thick Shuttle tiles.
NASA Technical Reports Server (NTRS)
Madaras, Eric I.; Anastasi, Robert F.; Smith, Stephen W.; Seebo, Jeffrey P.; Walker, James L.; Lomness, Janice K.; Hintze, Paul E.; Kammerer, Catherine C.; Winfree, William P.; Russell, Richard W.
2007-01-01
There is currently no method for detecting corrosion under Shuttle tiles except for the expensive process of tile removal and replacement; hence NASA is investigating new NDE methods for detecting hidden corrosion. Time domain terahertz radiation has been applied to corrosion detection under tiles in samples ranging from small lab samples to a Shuttle with positive results. Terahertz imaging methods have been able to detect corrosion at thicknesses of 5 mils or greater under 1" thick Shuttle tiles and 7-12 mils or greater under 2" thick Shuttle tiles.
Toma, Claudia; Butera, Fabrizio
2009-06-01
Two experiments investigated the differential impact of cooperation and competition on strategic information sharing and use in a three-person group decision-making task. Information was distributed in order to create a hidden profile so that disconfirmation of group members' initial preferences was required to solve the task. Experiment 1 revealed that competition, compared to cooperation, led group members to withhold unshared information, a difference that was not significant for shared information. In competition, compared to cooperation, group members were also more reluctant to disconfirm their initial preferences. Decision quality was lower in competition than in cooperation, this effect being mediated by disconfirmation use and not by information sharing. Experiment 2 replicated these findings and revealed the role of mistrust in predicting strategic information sharing and use in competition. These results support a motivated information processing approach of group decision making.
Natural hidden autoantibodies to tissue transglutaminase cross-react with fibrinogen.
Zöller-Utz, Ingrid M; Esslinger, Birgit; Schulze-Krebs, Anja; Dieterich, Walburga
2010-03-01
Patients with celiac disease display autoantibodies against tissue transglutaminase (TG2), and the high sensitivity and specificity of these autoantibodies render them a reliable tool for diagnosis. However, we found that denatured sera from healthy persons also showed reactivity against TG2. To further examine the specificity of this phenomenon, sera of healthy individuals and celiac patients were denatured by heat or pH shift. Denatured sera of all individuals showed autoantibodies against TG2 in ELISA that could be specifically inhibited by TG2, but the biological role of these autoantibodies remains unknown. The alpha fibrinogen precursor could be isolated as serum protein that reacts with TG2 antibodies and treated sera reacted with fibrinogen in Western blotting. Cross-reactivity of TG2 antibodies with fibrinogen and vice versa was observed. We hypothesise that denaturation of sera reveals hidden autoantibodies against TG2, which might be normally masked by fibrinogen.
ERIC Educational Resources Information Center
Racino, Julie Ann; And Others
The paper describes adult homes and room and board homes serving persons with disabilities in Onondaga County, New York. Visits were made to eight adult homes and five room and board homes. Briefly considered are ownership and licensing regulations, referrals, and admission criteria. Observations at the homes are offered. Concerns are raised about…
Artificial neural network-aided image analysis system for cell counting.
Sjöström, P J; Frydel, B R; Wahlberg, L U
1999-05-01
In histological preparations containing debris and synthetic materials, it is difficult to automate cell counting using standard image analysis tools, i.e., systems that rely on boundary contours, histogram thresholding, etc. In an attempt to mimic manual cell recognition, an automated cell counter was constructed using a combination of artificial intelligence and standard image analysis methods. Artificial neural network (ANN) methods were applied on digitized microscopy fields without pre-ANN feature extraction. A three-layer feed-forward network with extensive weight sharing in the first hidden layer was employed and trained on 1,830 examples using the error back-propagation algorithm on a Power Macintosh 7300/180 desktop computer. The optimal number of hidden neurons was determined and the trained system was validated by comparison with blinded human counts. System performance at 50x and lO0x magnification was evaluated. The correlation index at 100x magnification neared person-to-person variability, while 50x magnification was not useful. The system was approximately six times faster than an experienced human. ANN-based automated cell counting in noisy histological preparations is feasible. Consistent histology and computer power are crucial for system performance. The system provides several benefits, such as speed of analysis and consistency, and frees up personnel for other tasks.
Quality of life theory III. Maslow revisited.
Ventegodt, Søren; Merrick, Joav; Andersen, Niels Jørgen
2003-10-13
In 1962, Abraham Maslow published his book Towards a Psychology of Being, and established a theory of quality of life, which still is considered a consistent theory of quality of life. Maslow based his theory for development towards happiness and true being on the concept of human needs. He described his approach as an existentialistic psychology of self-actualization, based on personal growth. When we take more responsibility for our own life, we take more of the good qualities that we have into use, and we become more free, powerful, happy, and healthy. It seems that Maslow's concept of self-actualization can play an important role in modern medicine. As most chronic diseases often do not disappear in spite of the best biomedical treatments, it might be that the real change our patients have for betterment is understanding and living the noble path of personal development. The hidden potential for improving life really lies in helping the patient to acknowledge that his or her lust for life, his or her needs, and his or her wish to contribute, is really deep down in human existence one and the same. But you will only find this hidden meaning of life if you scrutinize your own life and existence closely enough, to come to know your innermost self.
Quality of Life Theory III. Maslow Revisited
Ventegodt, Soren; Merrick, Joav; Andersen, Niels Jorgen
2003-01-01
In 1962, Abraham Maslow published his book Towards a Psychology of Being, and established a theory of quality of life, which still is considered a consistent theory of quality of life. Maslow based his theory for development towards happiness and true being on the concept of human needs. He described his approach as an existentialistic psychology of self-actualization, based on personal growth.When we take more responsibility for our own life, we take more of the good qualities that we have into use, and we become more free, powerful, happy, and healthy. It seems that Maslow's concept of self-actualization can play an important role in modern medicine. As most chronic diseases often do not disappear in spite of the best biomedical treatments, it might be that the real change our patients have for betterment is understanding and living the noble path of personal development. The hidden potential for improving life really lies in helping the patient to acknowledge that his or her lust for life, his or her needs, and his or her wish to contribute, is really deep down in human existence one and the same. But you will only find this hidden meaning of life if you scrutinize your own life and existence closely enough, to come to know your innermost self. PMID:14570995
NASA Astrophysics Data System (ADS)
Avdeeva, D. K.; Ivanov, M. L.; Natalinova, N. M.; Nguyen, D. K.; Rybalka, S. A.; Turushev, N. V.
2017-08-01
Psycho-emotional state is one of the factors effecting human health. Its evaluation allows revealing hidden psychological trauma which can be reason of chronic stress, depression or psychosomatic disorders. Modern techniques of objective psycho-emotional state assessment involve a device which detects electrophysiological parameters of human body connected with emotional reaction and psychological condition. The present study covers development and testing of psycho-emotional state assessment device. The developed implement uses three methods of electrophysiological activity evaluation: electrocardiography, electroencephalography and galvanic skin response detection. The device represents hardware-software complex consisting of nanosensors, measuring unit, lead wires and laptop. Filters are excluded from the measuring circuit due to metrological parameters and noise immunity of implemented nanosensors. This solution minimizes signal distortion and allows measuring signals of 0.3 μV and higher in a wide frequency range (0-10000 Hz) with minimal data loss. In addition, results of preliminary medical studies aimed to find correspondence between different psycho-emotional states and electrophysiological parameters are described. Impact of filters on electrophysiological studies was studied. According to the results conventional filters significantly distort EEG channel information. Further research will be directed to the creation of complete base of electrophysiological parameters related to a particular emotion.
True-personality-assisted self-awareness expert system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Laleuf, M.
Based on psychoanalytic theory, the Who am I expert system explains in simple terms the individual's true personality, even it its unconscious or hidden aspects. Our overt personality traits are deeply rooted. The Who am I expert system gives access to an individual's primary personality, starting from his habitual everyday-life behavior: (1) describes the individual's basic personality, (2) explains this personality through the individual's deeply rooted experience and motivation, and (3) makes links with other people with a similar profile. The following are the primary features of the system: easy individual access, results in <20 minutes, and guaranteed confidentiality. Businessmore » applications include the following: (1) Individual training: Self-awareness improves a person's ability to fit in and to succeed within the group. (2) Communication: a homogeneous team has a better chance of success. (3) Human reliability: A close-knit team remains reliable even when faced with serious difficulties. (4) Recruitment: This technique enables the selection of individuals who will fit an existing homogeneous team. The system also enables a psychological diagnosis to be confirmed.« less
Hidden Semi-Markov Models and Their Application
NASA Astrophysics Data System (ADS)
Beyreuther, M.; Wassermann, J.
2008-12-01
In the framework of detection and classification of seismic signals there are several different approaches. Our choice for a more robust detection and classification algorithm is to adopt Hidden Markov Models (HMM), a technique showing major success in speech recognition. HMM provide a powerful tool to describe highly variable time series based on a double stochastic model and therefore allow for a broader class description than e.g. template based pattern matching techniques. Being a fully probabilistic model, HMM directly provide a confidence measure of an estimated classification. Furthermore and in contrast to classic artificial neuronal networks or support vector machines, HMM are incorporating the time dependence explicitly in the models thus providing a adequate representation of the seismic signal. As the majority of detection algorithms, HMM are not based on the time and amplitude dependent seismogram itself but on features estimated from the seismogram which characterize the different classes. Features, or in other words characteristic functions, are e.g. the sonogram bands, instantaneous frequency, instantaneous bandwidth or centroid time. In this study we apply continuous Hidden Semi-Markov Models (HSMM), an extension of continuous HMM. The duration probability of a HMM is an exponentially decaying function of the time, which is not a realistic representation of the duration of an earthquake. In contrast HSMM use Gaussians as duration probabilities, which results in an more adequate model. The HSMM detection and classification system is running online as an EARTHWORM module at the Bavarian Earthquake Service. Here the signals that are to be classified simply differ in epicentral distance. This makes it possible to easily decide whether a classification is correct or wrong and thus allows to better evaluate the advantages and disadvantages of the proposed algorithm. The evaluation is based on several month long continuous data and the results are additionally compared to the previously published discrete HMM, continuous HMM and a classic STA/LTA. The intermediate evaluation results are very promising.
Prospects for Inflationary B-Mode Detection
NASA Technical Reports Server (NTRS)
Kogut, Alan J.
2011-01-01
Measurements of the linear polarization of the cosmic microwave background provide a direct window into the physics of inflation. The experimental challenges are daunting: not only is the predicted signal faint compared to the photon noise limit, but it is hidden behind competing foregrounds from both local and cosmic sources. I will discuss the experimental response to these challenges and the prospects for eventual detection and characterization of the inflationary signal.
Detection of contraband using microwave radiation
Toth, Richard P.; Loubriel, Guillermo M.; Bacon, Larry D.; Watson, Robert D.
2002-01-01
The present invention relates to a method and system for using microwave radiation to detect contraband hidden inside of a non-metallic container, such as a pneumatic vehicle tire. The method relies on the attenuation, retardation, time delay, or phase shift of microwave radiation as it passes through the container plus the contraband. The method is non-invasive, non-destructive, low power, and does not require physical contact with the container.
Robust Hidden Markov Model based intelligent blood vessel detection of fundus images.
Hassan, Mehdi; Amin, Muhammad; Murtza, Iqbal; Khan, Asifullah; Chaudhry, Asmatullah
2017-11-01
In this paper, we consider the challenging problem of detecting retinal vessel networks. Precise detection of retinal vessel networks is vital for accurate eye disease diagnosis. Most of the blood vessel tracking techniques may not properly track vessels in presence of vessels' occlusion. Owing to problem in sensor resolution or acquisition of fundus images, it is possible that some part of vessel may occlude. In this scenario, it becomes a challenging task to accurately trace these vital vessels. For this purpose, we have proposed a new robust and intelligent retinal vessel detection technique on Hidden Markov Model. The proposed model is able to successfully track vessels in the presence of occlusion. The effectiveness of the proposed technique is evaluated on publically available standard DRIVE dataset of the fundus images. The experiments show that the proposed technique not only outperforms the other state of the art methodologies of retinal blood vessels segmentation, but it is also capable of accurate occlusion handling in retinal vessel networks. The proposed technique offers better average classification accuracy, sensitivity, specificity, and area under the curve (AUC) of 95.7%, 81.0%, 97.0%, and 90.0% respectively, which shows the usefulness of the proposed technique. Copyright © 2017 Elsevier B.V. All rights reserved.
De Angelis, Slivio; Fee, David; Haney, Matthew; Schneider, David
2012-01-01
In Alaska, where many active volcanoes exist without ground-based instrumentation, the use of techniques suitable for distant monitoring is pivotal. In this study we report regional-scale seismic and infrasound observations of volcanic activity at Mt. Cleveland between December 2011 and August 2012. During this period, twenty explosions were detected by infrasound sensors as far away as 1827 km from the active vent, and ground-coupled acoustic waves were recorded at seismic stations across the Aleutian Arc. Several events resulting from the explosive disruption of small lava domes within the summit crater were confirmed by analysis of satellite remote sensing data. However, many explosions eluded initial, automated, analyses of satellite data due to poor weather conditions. Infrasound and seismic monitoring provided effective means for detecting these hidden events. We present results from the implementation of automatic infrasound and seismo-acoustic eruption detection algorithms, and review the challenges of real-time volcano monitoring operations in remote regions. We also model acoustic propagation in the Northern Pacific, showing how tropospheric ducting effects allow infrasound to travel long distances across the Aleutian Arc. The successful results of our investigation provide motivation for expanded efforts in infrasound monitoring across the Aleutians and contributes to our knowledge of the number and style of vulcanian eruptions at Mt. Cleveland.
Post processing of optically recognized text via second order hidden Markov model
NASA Astrophysics Data System (ADS)
Poudel, Srijana
In this thesis, we describe a postprocessing system on Optical Character Recognition(OCR) generated text. Second Order Hidden Markov Model (HMM) approach is used to detect and correct the OCR related errors. The reason for choosing the 2nd order HMM is to keep track of the bigrams so that the model can represent the system more accurately. Based on experiments with training data of 159,733 characters and testing of 5,688 characters, the model was able to correct 43.38 % of the errors with a precision of 75.34 %. However, the precision value indicates that the model introduced some new errors, decreasing the correction percentage to 26.4%.
Reconstruction of pulse noisy images via stochastic resonance
Han, Jing; Liu, Hongjun; Sun, Qibing; Huang, Nan
2015-01-01
We investigate a practical technology for reconstructing nanosecond pulse noisy images via stochastic resonance, which is based on the modulation instability. A theoretical model of this method for optical pulse signal is built to effectively recover the pulse image. The nanosecond noise-hidden images grow at the expense of noise during the stochastic resonance process in a photorefractive medium. The properties of output images are mainly determined by the input signal-to-noise intensity ratio, the applied voltage across the medium, and the correlation length of noise background. A high cross-correlation gain is obtained by optimizing these parameters. This provides a potential method for detecting low-level or hidden pulse images in various imaging applications. PMID:26067911
Implementation of neural network for color properties of polycarbonates
NASA Astrophysics Data System (ADS)
Saeed, U.; Ahmad, S.; Alsadi, J.; Ross, D.; Rizvi, G.
2014-05-01
In present paper, the applicability of artificial neural networks (ANN) is investigated for color properties of plastics. The neural networks toolbox of Matlab 6.5 is used to develop and test the ANN model on a personal computer. An optimal design is completed for 10, 12, 14,16,18 & 20 hidden neurons on single hidden layer with five different algorithms: batch gradient descent (GD), batch variable learning rate (GDX), resilient back-propagation (RP), scaled conjugate gradient (SCG), levenberg-marquardt (LM) in the feed forward back-propagation neural network model. The training data for ANN is obtained from experimental measurements. There were twenty two inputs including resins, additives & pigments while three tristimulus color values L*, a* and b* were used as output layer. Statistical analysis in terms of Root-Mean-Squared (RMS), absolute fraction of variance (R squared), as well as mean square error is used to investigate the performance of ANN. LM algorithm with fourteen neurons on hidden layer in Feed Forward Back-Propagation of ANN model has shown best result in the present study. The degree of accuracy of the ANN model in reduction of errors is proven acceptable in all statistical analysis and shown in results. However, it was concluded that ANN provides a feasible method in error reduction in specific color tristimulus values.
Medical students' professionalism narratives: a window on the informal and hidden curriculum.
Karnieli-Miller, Orit; Vu, T Robert; Holtman, Matthew C; Clyman, Stephen G; Inui, Thomas S
2010-01-01
The aim of this study was to use medical students' critical incident narratives to deepen understanding of the informal and hidden curricula. The authors conducted a thematic analysis of 272 stories of events recorded by 135 third-year medical students that "taught them something about professionalism and professional values." Students wrote these narratives in a "professionalism journal" during their internal medicine clerkships at Indiana University School of Medicine, June through November 2007. The majority of students' recorded experiences involved witnessing positive embodiment of professional values, rather than breaches. Attending physicians and residents were the central figures in the incidents. Analyses revealed two main thematic categories. The first focused on medical-clinical interactions, especially on persons who were role models interacting with patients, families, coworkers, and colleagues. The second focused on events in the teaching-and-learning environment, particularly on students' experiences as learners in the clinical setting. The findings strongly suggest that students' reflective narratives are a rich source of information about the elements of both the informal and hidden curricula, in which medical students learn to become physicians. Experiences with both positive and negative behaviors shaped the students' perceptions of the profession and its values. In particular, interactions that manifest respect and other qualities of good communication with patients, families, and colleagues taught powerfully.
Higher Sensitivity in X-Ray Photography
NASA Technical Reports Server (NTRS)
Buggle, R. N.
1986-01-01
Hidden defects revealed if X-ray energy decreased as exposure progresses. Declining-potential X-ray photography detects fractures in thin metal sheet covered by unbroken sheet of twice thickness. Originally developed to check solder connections on multilayer circuit boards, technique has potential for other nondestructive testing.
Airborne ultrasonic inspection of hides and leather
USDA-ARS?s Scientific Manuscript database
Currently, hides and leather are visually inspected and ranked for quality, sale price and usable area. Visual inspection is not reliable for detecting defects, which are usually hidden inside the material. This manual assessment is non-uniform among operators, and often leads to disputes over fai...
NASA Astrophysics Data System (ADS)
Schoess, Jeffrey N.; Seifert, Greg; Paul, Clare A.
1996-05-01
The smart aircraft fastener evaluation (SAFE) system is an advanced structural health monitoring effort to detect and characterize corrosion in hidden and inaccessible locations of aircraft structures. Hidden corrosion is the number one logistics problem for the U.S. Air Force, with an estimated maintenance cost of $700M per year in 1990 dollars. The SAFE system incorporates a solid-state electrochemical microsensor and smart sensor electronics in the body of a Hi-Lok aircraft fastener to process and autonomously report corrosion status to aircraft maintenance personnel. The long-term payoff for using SAFE technology will be in predictive maintenance for aging aircraft and rotorcraft systems, fugitive emissions applications such as control valves, chemical pipeline vessels, and industrial boilers. Predictive maintenance capability, service, and repair will replace the current practice of scheduled maintenance to substantially reduce operational costs. A summary of the SAFE concept, laboratory test results, and future field test plans is presented.
Hidden slow pulsars in binaries
NASA Technical Reports Server (NTRS)
Tavani, Marco; Brookshaw, Leigh
1993-01-01
The recent discovery of the binary containing the slow pulsar PSR 1718-19 orbiting around a low-mass companion star adds new light on the characteristics of binary pulsars. The properties of the radio eclipses of PSR 1718-19 are the most striking observational characteristics of this system. The surface of the companion star produces a mass outflow which leaves only a small 'window' in orbital phase for the detection of PSR 1718-19 around 400 MHz. At this observing frequency, PSR 1718-19 is clearly observable only for about 1 hr out of the total 6.2 hr orbital period. The aim of this Letter is twofold: (1) to model the hydrodynamical behavior of the eclipsing material from the companion star of PSR 1718-19 and (2) to argue that a population of binary slow pulsars might have escaped detection in pulsar surveys carried out at 400 MHz. The possible existence of a population of partially or totally hidden slow pulsars in binaries will have a strong impact on current theories of binary evolution of neutron stars.
NASA Astrophysics Data System (ADS)
Yang, Li-Kai; Cai, Han; Peng, Tao; Wang, Da-Wei
2018-06-01
The Hong‑Ou‑Mandel (HOM) effect was long believed to be a two-photon interference phenomenon. It describes the fact that two indistinguishable photons mixed at a beam splitter will bunch together to one of the two output modes. Considering the two single-photon emitters such as trapped ions, we explore a hidden scenario of the HOM effect, where entanglement can be generated between the two ions when a single photon is detected by one of the detectors. A second photon emitted by the entangled photon sources will be subsequently detected by the same detector. However, we can also control the fate of the second photon by manipulating the entangled state. Instead of two-photon interference, the phase of the entangled state is responsible for the photon’s path in our proposal. Toward a feasible experimental realization, we conduct a quantum jump simulation on the system to show its robustness against experimental errors.
Passive acoustic leak detection for sodium cooled fast reactors using hidden Markov models
DOE Office of Scientific and Technical Information (OSTI.GOV)
Riber Marklund, A.; Kishore, S.; Prakash, V.
2015-07-01
Acoustic leak detection for steam generators of sodium fast reactors have been an active research topic since the early 1970's and several methods have been tested over the years. Inspired by its success in the field of automatic speech recognition, we here apply hidden Markov models (HMM) in combination with Gaussian mixture models (GMM) to the problem. To achieve this, we propose a new feature calculation scheme, based on the temporal evolution of the power spectral density (PSD) of the signal. Using acoustic signals recorded during steam/water injection experiments done at the Indira Gandhi Centre for Atomic Research (IGCAR), themore » proposed method is tested. We perform parametric studies on the HMM+GMM model size and demonstrate that the proposed method a) performs well without a priori knowledge of injection noise, b) can incorporate several noise models and c) has an output distribution that simplifies false alarm rate control. (authors)« less
Identifying influential user communities on the social network
NASA Astrophysics Data System (ADS)
Hu, Weishu; Gong, Zhiguo; Hou U, Leong; Guo, Jingzhi
2015-10-01
Nowadays social network services have been popularly used in electronic commerce systems. Users on the social network can develop different relationships based on their common interests and activities. In order to promote the business, it is interesting to explore hidden relationships among users developed on the social network. Such knowledge can be used to locate target users for different advertisements and to provide effective product recommendations. In this paper, we define and study a novel community detection problem that is to discover the hidden community structure in large social networks based on their common interests. We observe that the users typically pay more attention to those users who share similar interests, which enable a way to partition the users into different communities according to their common interests. We propose two algorithms to detect influential communities using common interests in large social networks efficiently and effectively. We conduct our experimental evaluation using a data set from Epinions, which demonstrates that our method achieves 4-11.8% accuracy improvement over the state-of-the-art method.
Detecting Seismic Events Using a Supervised Hidden Markov Model
NASA Astrophysics Data System (ADS)
Burks, L.; Forrest, R.; Ray, J.; Young, C.
2017-12-01
We explore the use of supervised hidden Markov models (HMMs) to detect seismic events in streaming seismogram data. Current methods for seismic event detection include simple triggering algorithms, such as STA/LTA and the Z-statistic, which can lead to large numbers of false positives that must be investigated by an analyst. The hypothesis of this study is that more advanced detection methods, such as HMMs, may decreases false positives while maintaining accuracy similar to current methods. We train a binary HMM classifier using 2 weeks of 3-component waveform data from the International Monitoring System (IMS) that was carefully reviewed by an expert analyst to pick all seismic events. Using an ensemble of simple and discrete features, such as the triggering of STA/LTA, the HMM predicts the time at which transition occurs from noise to signal. Compared to the STA/LTA detection algorithm, the HMM detects more true events, but the false positive rate remains unacceptably high. Future work to potentially decrease the false positive rate may include using continuous features, a Gaussian HMM, and multi-class HMMs to distinguish between types of seismic waves (e.g., P-waves and S-waves). Acknowledgement: Sandia National Laboratories is a multi-mission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC., a wholly owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA-0003525.SAND No: SAND2017-8154 A
NASA Astrophysics Data System (ADS)
Naseri Kouzehgarani, Asal
2009-12-01
Most models of aircraft trajectories are non-linear and stochastic in nature; and their internal parameters are often poorly defined. The ability to model, simulate and analyze realistic air traffic management conflict detection scenarios in a scalable, composable, multi-aircraft fashion is an extremely difficult endeavor. Accurate techniques for aircraft mode detection are critical in order to enable the precise projection of aircraft conflicts, and for the enactment of altitude separation resolution strategies. Conflict detection is an inherently probabilistic endeavor; our ability to detect conflicts in a timely and accurate manner over a fixed time horizon is traded off against the increased human workload created by false alarms---that is, situations that would not develop into an actual conflict, or would resolve naturally in the appropriate time horizon-thereby introducing a measure of probabilistic uncertainty in any decision aid fashioned to assist air traffic controllers. The interaction of the continuous dynamics of the aircraft, used for prediction purposes, with the discrete conflict detection logic gives rise to the hybrid nature of the overall system. The introduction of the probabilistic element, common to decision alerting and aiding devices, places the conflict detection and resolution problem in the domain of probabilistic hybrid phenomena. A hidden Markov model (HMM) has two stochastic components: a finite-state Markov chain and a finite set of output probability distributions. In other words an unobservable stochastic process (hidden) that can only be observed through another set of stochastic processes that generate the sequence of observations. The problem of self separation in distributed air traffic management reduces to the ability of aircraft to communicate state information to neighboring aircraft, as well as model the evolution of aircraft trajectories between communications, in the presence of probabilistic uncertain dynamics as well as partially observable and uncertain data. We introduce the Hybrid Hidden Markov Modeling (HHMM) formalism to enable the prediction of the stochastic aircraft states (and thus, potential conflicts), by combining elements of the probabilistic timed input output automaton and the partially observable Markov decision process frameworks, along with the novel addition of a Markovian scheduler to remove the non-deterministic elements arising from the enabling of several actions simultaneously. Comparisons of aircraft in level, climbing/descending and turning flight are performed, and unknown flight track data is evaluated probabilistically against the tuned model in order to assess the effectiveness of the model in detecting the switch between multiple flight modes for a given aircraft. This also allows for the generation of probabilistic distribution over the execution traces of the hybrid hidden Markov model, which then enables the prediction of the states of aircraft based on partially observable and uncertain data. Based on the composition properties of the HHMM, we study a decentralized air traffic system where aircraft are moving along streams and can perform cruise, accelerate, climb and turn maneuvers. We develop a common decentralized policy for conflict avoidance with spatially distributed agents (aircraft in the sky) and assure its safety properties via correctness proofs.
Gómez Navarro, Rafael
2009-01-01
To study the renal function (FR) of the hypertensive patients by means of estimating equations and serum creatinine (Crp). To calculate the percentage of patients with chronic kidney disease (ERC) that present normal values of Crp. To analyze which factors collaborate in the deterioration of the FR. Descriptive cross-sectional study of patients with HTA. Crp and arterial tension (TA) were determined. The glomerular filtration rate was calculated by means of Cockroft-Gault and MDRD's formula. The years of evolution of the HTA were registered. A descriptive study of the variables and the possible dependence among them was completed, using several times linear multiple regression. 52 patients were studied (57,7% women). Average age 72,4 +/- 10,8. 32,6% (Cockcroft-Gault) or 21,5% (MDRD) were fulfilling ERC criterion. The ERC was mainly diagnosed in females. 21,4% (Cockcroft-Gault) and 9,5 % patients (MDRD) with ERC had normal Crp values. We do not find linear dependence between the numbers of TA and the FR. The TA check-up objectives do not suppose less development of ERC. In males we find linear dependence within the FR (MDRD) and the years of evolution of the HTA. The ERC is a frequent pathology in the hypertense persons. The systematical utilization of estimating equations facilitates the detection of hidden ERC in patients with normal Crp.
MacKay, Donald G; James, Lori E
2009-10-01
Two experiments compared the visual cognition performance of amnesic H.M. and memory-normal controls matched for age, background, intelligence, and education. In Experiment 1 H.M. exhibited deficits relative to the controls in detecting "erroneous objects" in complex visual scenes--for example, a bird flying inside a fishbowl. In Experiment 2 H.M. exhibited deficits relative to the controls in standard Hidden-Figure tasks when detecting unfamiliar targets but not when detecting familiar targets--for example, circles, squares, and right-angle triangles. H.M.'s visual cognition deficits were not due to his well-known problems in explicit learning and recall, inability to comprehend or remember the instructions, general slowness, motoric difficulties, low motivation, low IQ relative to the controls, or working-memory limitations. Parallels between H.M.'s selective deficits in visual cognition, language, and memory are discussed. These parallels contradict the standard "systems theory" account of H.M.'s condition but comport with the hypothesis that H.M. has difficulty representing unfamiliar but not familiar information in visual cognition, language, and memory. Implications of our results are discussed for binding theory and the ongoing debate over what counts as "memory" versus "not-memory."
Review of terahertz technology development at INO
NASA Astrophysics Data System (ADS)
Dufour, Denis; Marchese, Linda; Terroux, Marc; Oulachgar, Hassane; Généreux, Francis; Doucet, Michel; Mercier, Luc; Tremblay, Bruno; Alain, Christine; Beaupré, Patrick; Blanchard, Nathalie; Bolduc, Martin; Chevalier, Claude; D'Amato, Dominic; Desroches, Yan; Duchesne, François; Gagnon, Lucie; Ilias, Samir; Jerominek, Hubert; Lagacé, François; Lambert, Julie; Lamontagne, Frédéric; Le Noc, Loïc; Martel, Anne; Pancrati, Ovidiu; Paultre, Jacques-Edmond; Pope, Tim; Provençal, Francis; Topart, Patrice; Vachon, Carl; Verreault, Sonia; Bergeron, Alain
2015-10-01
Over the past decade, INO has leveraged its expertise in the development of uncooled microbolometer detectors for infrared imaging to produce terahertz (THz) imaging systems. By modifying its microbolometer-based focal plane arrays to enhance absorption in the THz bands and by developing custom THz imaging lenses, INO has developed a leading-edge THz imaging system, the IRXCAM-THz-384 camera, capable of exploring novel applications in the emerging field of terahertz imaging and sensing. Using appropriate THz sources, results show that the IRXCAM-THz-384 camera is able to image a variety of concealed objects of interest for applications such as non-destructive testing and weapons detections. By using a longer wavelength (94 GHz) source, it is also capable of sensing the signatures of various objects hidden behind a drywall panel. This article, written as a review of THz research at INO over the past decade, describes the technical components that form the IRXCAM-THz-384 camera and the experimental setup used for active THz imaging. Image results for concealed weapons detection experiments, an exploration of wavelength choice on image quality, and the detection of hidden objects behind drywall are also presented.
Detecting network communities beyond assortativity-related attributes
NASA Astrophysics Data System (ADS)
Liu, Xin; Murata, Tsuyoshi; Wakita, Ken
2014-07-01
In network science, assortativity refers to the tendency of links to exist between nodes with similar attributes. In social networks, for example, links tend to exist between individuals of similar age, nationality, location, race, income, educational level, religious belief, and language. Thus, various attributes jointly affect the network topology. An interesting problem is to detect community structure beyond some specific assortativity-related attributes ρ, i.e., to take out the effect of ρ on network topology and reveal the hidden community structures which are due to other attributes. An approach to this problem is to redefine the null model of the modularity measure, so as to simulate the effect of ρ on network topology. However, a challenge is that we do not know to what extent the network topology is affected by ρ and by other attributes. In this paper, we propose a distance modularity, which allows us to freely choose any suitable function to simulate the effect of ρ. Such freedom can help us probe the effect of ρ and detect the hidden communities which are due to other attributes. We test the effectiveness of distance modularity on synthetic benchmarks and two real-world networks.
Detecting critical state before phase transition of complex systems by hidden Markov model
NASA Astrophysics Data System (ADS)
Liu, Rui; Chen, Pei; Li, Yongjun; Chen, Luonan
Identifying the critical state or pre-transition state just before the occurrence of a phase transition is a challenging task, because the state of the system may show little apparent change before this critical transition during the gradual parameter variations. Such dynamics of phase transition is generally composed of three stages, i.e., before-transition state, pre-transition state, and after-transition state, which can be considered as three different Markov processes. Thus, based on this dynamical feature, we present a novel computational method, i.e., hidden Markov model (HMM), to detect the switching point of the two Markov processes from the before-transition state (a stationary Markov process) to the pre-transition state (a time-varying Markov process), thereby identifying the pre-transition state or early-warning signals of the phase transition. To validate the effectiveness, we apply this method to detect the signals of the imminent phase transitions of complex systems based on the simulated datasets, and further identify the pre-transition states as well as their critical modules for three real datasets, i.e., the acute lung injury triggered by phosgene inhalation, MCF-7 human breast cancer caused by heregulin, and HCV-induced dysplasia and hepatocellular carcinoma.
A blind HI search for galaxies in the northern Zone of Avoidance
NASA Astrophysics Data System (ADS)
Rivers, Andrew James
Searches for galaxies in the nearby and distant universe have long focused in the direction of the Galactic poles, or perpendicular to the plane of the Milky Way. Dust concentrated in the Milky Way's disk absorbs and scatters light and therefore precludes easy optical detection of extragalactic sources in this ``Zone of Avoidance'' (ZOA). The Dwingeloo Obscured Galaxies Survey (DOGS) was a 21-cm blind survey for galaxies hidden in the northern ZOA. Dust is transparent at radio wavelengths and therefore the survey is not biased against detection of galaxies near the Galactic plane. The DOGS project was designed to reveal hidden dynamically important nearby galaxies and to help ``fill in the blanks'' in the local large scale structure. During the survey and subsequent followup observations, 43 galaxies were detected; 28 of these were previously unknown. Obscuration by dust could effectively hide a massive member of the Local Group. This survey rules out the existence of a hidden gas-rich dynamically important source. The possibility of gas-poor elliptical galaxies and low-mass dwarfs remains; the low velocity of one detected dwarf irregular galaxy relative to the Milky Way indicates possible membership in the Local Group. Other nearby galaxies detected by DOGS were linked to the IC 342/Maffei group and to the nearby galaxy NGC 6946. Of the five galaxies in the IC 342/Maffei group, three were unknown at the time of the survey. Derived group properties indicate the group consists of two separate physical groups which appear close together in the sky. The five sources near NGC 6946 support the identification of a new nearby group associated with this large spiral galaxy. The distribution of massive spiral galaxies compared to low-mass dwarf galaxies may be used to test theories of structure formation. In a universe dominated by Cold Dark Matter (CDM) dwarf galaxies are more evenly distributed and are a more accurate tracer of the mass distribution. Open universe models predict approximately equal clustering properties of dwarf and spiral galaxies. A statistical analysis of the DOGS sample argues against the CDM model; no smoothly distributed population of stunted dwarf galaxies is seen.
Vien, Benjamin Steven; Rose, Louis Raymond Francis; Chiu, Wing Kong
2017-07-01
Reliable and quantitative non-destructive evaluation for small fatigue cracks, in particular those in hard-to-inspect locations, is a challenging problem. Guided waves are advantageous for structural health monitoring due to their slow geometrical decay of amplitude with propagating distance, which is ideal for rapid wide-area inspection. This paper presents a 3D laser vibrometry experimental and finite element analysis of the interaction between an edge-guided wave and a small through-thickness hidden edge crack on a racecourse shaped hole that occurs, in practice, as a fuel vent hole. A piezoelectric transducer is bonded on the straight edge of the hole to generate the incident wave. The excitation signal consists of a 5.5 cycle Hann-windowed tone burst of centre frequency 220 kHz, which is below the cut-off frequency for the first order Lamb wave modes (SH1). Two-dimensional fast Fourier transformation (2D FFT) is applied to the incident and scattered wave field along radial lines emanating from the crack mouth, so as to identify the wave modes and determine their angular variation and amplitude. It is shown experimentally and computationally that mid-plane symmetric edge waves can travel around the hole's edge to detect a hidden crack. Furthermore, the scattered wave field due to a small crack length, a , (compared to the wavelength λ of the incident wave) is shown to be equivalent to a point source consisting of a particular combination of body-force doublets. It is found that the amplitude of the scattered field increases quadratically as a function of a/λ , whereas the scattered wave pattern is independent of crack length for small cracks a < λ . This study of the forward scattering problem from a known crack size provides a useful guide for the inverse problem of hidden crack detection and sizing.
Effects of thickness and gain on the amplitude of airborne ultrasonics
USDA-ARS?s Scientific Manuscript database
Currently, hides and leather are visually inspected and ranked for quality, usable area, and sale price. However, visual inspection is not reliable for detecting defects, which are usually hidden inside the material. Development of a non-contact nondestructive method to accurately evaluate the qua...
Steganography: Past, Present, Future
DOE Office of Scientific and Technical Information (OSTI.GOV)
Judge, J C
Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. This paper will explore steganography from its earliest instances through potential future application.
Face Recognition with the Karhunen-Loeve Transform
1991-12-01
anthropometry community? 1-2 Methodology As part of this thesis, face recognition software is developed on the Silicon Graphics 4D Personal Iris...the anthropometry community. Standards The most important performance criteria is classification accuracy which is the per- centage of correct...demonstrated by Tarr (24). Reconstructed Output Image yl y2 ... y64 16 hidden layer units xl x2 ... x64 Input 64 by 64 pixel Image Figure 2.6. After the
Fizil, Ádám; Gáspári, Zoltán; Barna, Terézia; Marx, Florentine; Batta, Gyula
2015-03-23
Transition between conformational states in proteins is being recognized as a possible key factor of function. In support of this, hidden dynamic NMR structures were detected in several cases up to populations of a few percent. Here, we show by two- and three-state analysis of thermal unfolding, that the population of hidden states may weight 20-40 % at 298 K in a disulfide-rich protein. In addition, sensitive (15) N-CEST NMR experiments identified a low populated (0.15 %) state that was in slow exchange with the folded PAF protein. Remarkably, other techniques failed to identify the rest of the NMR "dark matter". Comparison of the temperature dependence of chemical shifts from experiments and molecular dynamics calculations suggests that hidden conformers of PAF differ in the loop and terminal regions and are most similar in the evolutionary conserved core. Our observations point to the existence of a complex conformational landscape with multiple conformational states in dynamic equilibrium, with diverse exchange rates presumably responsible for the completely hidden nature of a considerable fraction. © 2015 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.
Emergence of higher order rotational symmetry in the hidden order phase of URu 2Si 2
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kanchanavatee, N.; Janoschek, M.; Huang, K.
2016-09-30
Electrical resistivity measurements were performed in this paper as functions of temperature, magnetic field, and angle θ between the magnetic field and the c-axis of a URu 2Si 2 single crystal. The resistivity exhibits a two-fold oscillation as a function of θ at high temperatures, which undergoes a 180°-phase shift (sign change) with decreasing temperature at around 35 K. The hidden order transition is manifested as a minimum in the magnetoresistance and amplitude of the two-fold oscillation. Interestingly, the resistivity also showed four-fold, six-fold, and eight-fold symmetries at the hidden order transition. These higher order symmetries were also detected atmore » low temperatures, which could be a sign of the formation of another pseudogap phase above the superconducting transition, consistent with recent evidence for a pseudogap from point-contact spectroscopy measurements and NMR. Measurements of the magnetisation of single crystalline URu 2Si 2 with the magnetic field applied parallel and perpendicular to the crystallographic c-axis revealed regions with linear temperature dependencies between the hidden order transition temperature and about 25 K. Finally, this T-linear behaviour of the magnetisation may be associated with the formation of a precursor phase or ‘pseudogap’ in the density of states in the vicinity of 30–35 K.« less
Muth, Claudia; Raab, Marius H; Carbon, Claus-Christian
2016-01-01
Research in the field of psychological aesthetics points to the appeal of stimuli which defy easy recognition by being "semantically unstable" but which still allow for creating meaning-in the ongoing process of elaborative perception or as an end product of the entire process. Such effects were reported for hidden images (Muth and Carbon, 2013) as well as Cubist artworks concealing detectable-although fragmented-objects (Muth et al., 2013). To test the stability of the relationship between semantic determinacy and appreciation across different episodic contexts, 30 volunteers evaluated an artistic movie continuously on visual determinacy or liking via the Continuous Evaluation Procedure (CEP, Muth et al., 2015b). The movie consisted of five episodes with emerging Gestalts. In the first between-participants condition, the hidden Gestalts in the movie episodes were of increasing determinacy, in the second condition, the episodes showed decreasing determinacies of hidden Gestalts. In the increasing-determinacy group, visual determinacy was rated higher and showed better predictive quality for liking than in the decreasing-determinacy group. Furthermore, when the movie started with low visual determinacy of hidden Gestalts, unexpectedly strong increases in visual determinacy had a bigger effect on liking than in the condition which allowed for weaker Gestalt recognition after having started with highly determinate Gestalts. The resulting pattern calls for consideration of the episodic context when examining art appreciation.
Detection of hidden explosives by using tagged neutron beams: Status and perspectives
NASA Astrophysics Data System (ADS)
Viesti, Giuseppe; Pesente, Silvia; Nebbia, Giancarlo; Lunardon, Marcello; Sudac, Davorin; Nađ, Karlo; Blagus, Sasha; Valković, Vladivoj
2005-12-01
Non-destructive inspections have been simulated in laboratory conditions by using our tagged neutron inspection system (TNIS), using YAP:Ce scintillators to tag the neutron beam and an array of BaF2 crystals to detect the γ-rays. The system has been operated up to 2 × 108 neutron/s. Further developments of the TNIS concept are discussed in the light of our current projects for cargo container inspections.
Gerevich, József
2015-01-01
One of the basic questions of the art psychology is whether a personal motif is to be found behind works of art and if so, how openly or indirectly it appears in the work itself. Analysis of examples and documents from the fine arts and literature allow us to conclude that the personal motif that can be identified by the viewer through symbols, at times easily at others with more difficulty, gives an emotional plus to the artistic product. The personal motif may be found in traumatic experiences, in communication to the model or with other emotionally important persons (mourning, disappointment, revenge, hatred, rivalry, revolt etc.), in self-searching, or self-analysis. The emotions are expressed in artistic activity either directly or indirectly. The intention nourished by the artist's identity (Kunstwollen) may stand in the way of spontaneous self-expression, channelling it into hidden paths. Under the influence of certain circumstances, the artist may arouse in the viewer, consciously or unconsciously, an illusionary, misleading image of himself. An examination of the personal motif is one of the important research areas of art therapy.
Research on gait-based human identification
NASA Astrophysics Data System (ADS)
Li, Youguo
Gait recognition refers to automatic identification of individual based on his/her style of walking. This paper proposes a gait recognition method based on Continuous Hidden Markov Model with Mixture of Gaussians(G-CHMM). First, we initialize a Gaussian mix model for training image sequence with K-means algorithm, then train the HMM parameters using a Baum-Welch algorithm. These gait feature sequences can be trained and obtain a Continuous HMM for every person, therefore, the 7 key frames and the obtained HMM can represent each person's gait sequence. Finally, the recognition is achieved by Front algorithm. The experiments made on CASIA gait databases obtain comparatively high correction identification ratio and comparatively strong robustness for variety of bodily angle.
Data-driven system to predict academic grades and dropout.
Rovira, Sergi; Puertas, Eloi; Igual, Laura
2017-01-01
Nowadays, the role of a tutor is more important than ever to prevent students dropout and improve their academic performance. This work proposes a data-driven system to extract relevant information hidden in the student academic data and, thus, help tutors to offer their pupils a more proactive personal guidance. In particular, our system, based on machine learning techniques, makes predictions of dropout intention and courses grades of students, as well as personalized course recommendations. Moreover, we present different visualizations which help in the interpretation of the results. In the experimental validation, we show that the system obtains promising results with data from the degree studies in Law, Computer Science and Mathematics of the Universitat de Barcelona.
Human Spotted Fever Rickettsial Infections
2005-04-01
Ecological study of Rocky Mountain spotted fever in Costa Rica. Am J Trop Med Hyg. 1986;35:192–6. 6. Calero MC, Munez JM, Silva R. Rocky Mountain spotted fever in...J Jr, McKechnie DB, Treadwell TA, et al. Hidden mortality attributable to Rocky Mountain spotted fever : immunohistochemical detection of fatal
Human Behavior Drift Detection in a Smart Home Environment.
Masciadri, Andrea; Trofimova, Anna A; Matteucci, Matteo; Salice, Fabio
2017-01-01
The proposed system aims at elderly people independent living by providing an early indicator of habits changes which might be relevant for a diagnosis of diseases. It relies on Hidden Markov Model to describe the behavior observing sensors data, while Likelihood Ratio Test gives the variation within different time periods.
Detection of fragments from internal insects in wheat samples using a laboratory entoleter
USDA-ARS?s Scientific Manuscript database
A simple, rapid method was developed for estimating the number of insect fragments in flour caused by hidden, internal-feeding insects in whole grains during storage. The method uses a small mechanical rotary device (entoleter), which accelerates whole wheat kernels to high speeds and projects them...
Belli, Hasan
2014-01-01
Borderline personality disorder, conversion disorder and obsessive compulsive disorder frequently have dissociative symptoms. The literature has demonstrated that the level of dissociation might be correlated with the severity of obsessive compulsive disorder (OCD) and that those not responding to treatment had high dissociative symptoms. The structured clinical interview for DSM-IV dissociative disorders, dissociation questionnaire, somatoform dissociation questionnaire and dissociative experiences scale can be used for screening dissociative symptoms and detecting dissociative disorders in patients with OCD. However, a history of neglect and abuse during childhood is linked to a risk factor in the pathogenesis of dissociative psychopathology in adults. The childhood trauma questionnaire-53 and childhood trauma questionnaire-40 can be used for this purpose. Clinicians should not fail to notice the hidden dissociative symptoms and childhood traumatic experiences in OCD cases with severe symptoms that are resistant to treatment. Symptom screening and diagnostic tools used for this purpose should be known. Knowing how to treat these pathologies in patients who are diagnosed with OCD can be crucial. PMID:25133142
Belli, Hasan
2014-08-16
Borderline personality disorder, conversion disorder and obsessive compulsive disorder frequently have dissociative symptoms. The literature has demonstrated that the level of dissociation might be correlated with the severity of obsessive compulsive disorder (OCD) and that those not responding to treatment had high dissociative symptoms. The structured clinical interview for DSM-IV dissociative disorders, dissociation questionnaire, somatoform dissociation questionnaire and dissociative experiences scale can be used for screening dissociative symptoms and detecting dissociative disorders in patients with OCD. However, a history of neglect and abuse during childhood is linked to a risk factor in the pathogenesis of dissociative psychopathology in adults. The childhood trauma questionnaire-53 and childhood trauma questionnaire-40 can be used for this purpose. Clinicians should not fail to notice the hidden dissociative symptoms and childhood traumatic experiences in OCD cases with severe symptoms that are resistant to treatment. Symptom screening and diagnostic tools used for this purpose should be known. Knowing how to treat these pathologies in patients who are diagnosed with OCD can be crucial.
Progress in passive submillimeter-wave video imaging
NASA Astrophysics Data System (ADS)
Heinz, Erik; May, Torsten; Born, Detlef; Zieger, Gabriel; Peiselt, Katja; Zakosarenko, Vyacheslav; Krause, Torsten; Krüger, André; Schulz, Marco; Bauer, Frank; Meyer, Hans-Georg
2014-06-01
Since 2007 we are developing passive submillimeter-wave video cameras for personal security screening. In contradiction to established portal-based millimeter-wave scanning techniques, these are suitable for stand-off or stealth operation. The cameras operate in the 350GHz band and use arrays of superconducting transition-edge sensors (TES), reflector optics, and opto-mechanical scanners. Whereas the basic principle of these devices remains unchanged, there has been a continuous development of the technical details, as the detector array, the scanning scheme, and the readout, as well as system integration and performance. The latest prototype of this camera development features a linear array of 128 detectors and a linear scanner capable of 25Hz frame rate. Using different types of reflector optics, a field of view of 1×2m2 and a spatial resolution of 1-2 cm is provided at object distances of about 5-25m. We present the concept of this camera and give details on system design and performance. Demonstration videos show its capability for hidden threat detection and illustrate possible application scenarios.
NASA Astrophysics Data System (ADS)
Mukhopadhyay, Sabyasachi; Das, Nandan K.; Kurmi, Indrajit; Pradhan, Asima; Ghosh, Nirmalya; Panigrahi, Prasanta K.
2017-10-01
We report the application of a hidden Markov model (HMM) on multifractal tissue optical properties derived via the Born approximation-based inverse light scattering method for effective discrimination of precancerous human cervical tissue sites from the normal ones. Two global fractal parameters, generalized Hurst exponent and the corresponding singularity spectrum width, computed by multifractal detrended fluctuation analysis (MFDFA), are used here as potential biomarkers. We develop a methodology that makes use of these multifractal parameters by integrating with different statistical classifiers like the HMM and support vector machine (SVM). It is shown that the MFDFA-HMM integrated model achieves significantly better discrimination between normal and different grades of cancer as compared to the MFDFA-SVM integrated model.
A Geometrical Approach to Bell's Theorem
NASA Technical Reports Server (NTRS)
Rubincam, David Parry
2000-01-01
Bell's theorem can be proved through simple geometrical reasoning, without the need for the Psi function, probability distributions, or calculus. The proof is based on N. David Mermin's explication of the Einstein-Podolsky-Rosen-Bohm experiment, which involves Stern-Gerlach detectors which flash red or green lights when detecting spin-up or spin-down. The statistics of local hidden variable theories for this experiment can be arranged in colored strips from which simple inequalities can be deduced. These inequalities lead to a demonstration of Bell's theorem. Moreover, all local hidden variable theories can be graphed in such a way as to enclose their statistics in a pyramid, with the quantum-mechanical result lying a finite distance beneath the base of the pyramid.
Paul, Brandon T; Bruce, Ian C; Roberts, Larry E
2017-02-01
Damage to auditory nerve fibers that expresses with suprathreshold sounds but is hidden from the audiogram has been proposed to underlie deficits in temporal coding ability observed among individuals with otherwise normal hearing, and to be present in individuals experiencing chronic tinnitus with clinically normal audiograms. We tested whether these individuals may have hidden synaptic losses on auditory nerve fibers with low spontaneous rates of firing (low-SR fibers) that are important for coding suprathreshold sounds in noise while high-SR fibers determining threshold responses in quiet remain relatively unaffected. Tinnitus and control subjects were required to detect the presence of amplitude modulation (AM) in a 5 kHz, suprathreshold tone (a frequency in the tinnitus frequency region of the tinnitus subjects, whose audiometric thresholds were normal to 12 kHz). The AM tone was embedded within background noise intended to degrade the contribution of high-SR fibers, such that AM coding was preferentially reliant on low-SR fibers. We also recorded by electroencephalography the "envelope following response" (EFR, generated in the auditory midbrain) to a 5 kHz, 85 Hz AM tone presented in the same background noise, and also in quiet (both low-SR and high-SR fibers contributing to AM coding in the latter condition). Control subjects with EFRs that were comparatively resistant to the addition of background noise had better AM detection thresholds than controls whose EFRs were more affected by noise. Simulated auditory nerve responses to our stimulus conditions using a well-established peripheral model suggested that low-SR fibers were better preserved in the former cases. Tinnitus subjects had worse AM detection thresholds and reduced EFRs overall compared to controls. Simulated auditory nerve responses found that in addition to severe low-SR fiber loss, a degree of high-SR fiber loss that would not be expected to affect audiometric thresholds was needed to explain the results in tinnitus subjects. The results indicate that hidden hearing loss could be sufficient to account for impaired temporal coding in individuals with normal audiograms as well as for cases of tinnitus without audiometric hearing loss. Copyright © 2016 Elsevier B.V. All rights reserved.
Real-Time Adaptive Color Segmentation by Neural Networks
NASA Technical Reports Server (NTRS)
Duong, Tuan A.
2004-01-01
Artificial neural networks that would utilize the cascade error projection (CEP) algorithm have been proposed as means of autonomous, real-time, adaptive color segmentation of images that change with time. In the original intended application, such a neural network would be used to analyze digitized color video images of terrain on a remote planet as viewed from an uninhabited spacecraft approaching the planet. During descent toward the surface of the planet, information on the segmentation of the images into differently colored areas would be updated adaptively in real time to capture changes in contrast, brightness, and resolution, all in an effort to identify a safe and scientifically productive landing site and provide control feedback to steer the spacecraft toward that site. Potential terrestrial applications include monitoring images of crops to detect insect invasions and monitoring of buildings and other facilities to detect intruders. The CEP algorithm is reliable and is well suited to implementation in very-large-scale integrated (VLSI) circuitry. It was chosen over other neural-network learning algorithms because it is better suited to realtime learning: It provides a self-evolving neural-network structure, requires fewer iterations to converge and is more tolerant to low resolution (that is, fewer bits) in the quantization of neural-network synaptic weights. Consequently, a CEP neural network learns relatively quickly, and the circuitry needed to implement it is relatively simple. Like other neural networks, a CEP neural network includes an input layer, hidden units, and output units (see figure). As in other neural networks, a CEP network is presented with a succession of input training patterns, giving rise to a set of outputs that are compared with the desired outputs. Also as in other neural networks, the synaptic weights are updated iteratively in an effort to bring the outputs closer to target values. A distinctive feature of the CEP neural network and algorithm is that each update of synaptic weights takes place in conjunction with the addition of another hidden unit, which then remains in place as still other hidden units are added on subsequent iterations. For a given training pattern, the synaptic weight between (1) the inputs and the previously added hidden units and (2) the newly added hidden unit is updated by an amount proportional to the partial derivative of a quadratic error function with respect to the synaptic weight. The synaptic weight between the newly added hidden unit and each output unit is given by a more complex function that involves the errors between the outputs and their target values, the transfer functions (hyperbolic tangents) of the neural units, and the derivatives of the transfer functions.
NASA Astrophysics Data System (ADS)
Ohgaki, H.; Daito, I.; Zen, H.; Kii, T.; Masuda, K.; Misawa, T.; Hajima, R.; Hayakawa, T.; Shizuma, T.; Kando, M.; Fujimoto, S.
2017-07-01
A Neutron/Gamma-ray combined inspection system for hidden special nuclear materials (SNMs) in cargo containers has been developed under a program of Japan Science and Technology Agency in Japan. This inspection system consists of an active neutron-detection system for fast screening and a laser Compton backscattering gamma-ray source in coupling with nuclear resonance fluorescence (NRF) method for precise inspection. The inertial electrostatic confinement fusion device has been adopted as a neutron source and two neutron-detection methods, delayed neutron noise analysis method and high-energy neutron-detection method, have been developed to realize the fast screening system. The prototype system has been constructed and tested in the Reactor Research Institute, Kyoto University. For the generation of the laser Compton backscattering gamma-ray beam, a race track microtron accelerator has been used to reduce the size of the system. For the NRF measurement, an array of LaBr3(Ce) scintillation detectors has been adopted to realize a low-cost detection system. The prototype of the gamma-ray system has been demonstrated in the Kansai Photon Science Institute, National Institutes for Quantum and Radiological Science and Technology. By using numerical simulations based on the data taken from these prototype systems and the inspection-flow, the system designed by this program can detect 1 kg of highly enriched 235U (HEU) hidden in an empty 20-ft container within several minutes.
Orthostasis test in the practice of the cardiologist
NASA Technical Reports Server (NTRS)
Moskalenko, N. P.; Glezer, M. G.
1980-01-01
The orthostasis test makes it possible to evaluate neurohumoral regulation and reaction of the circulatory system and to detect changes in the function of a number of internal organs (especially the kidney). Simultaneous recording of the ECG in an orthostatic position despite nonspecificity, makes it possible to detect hidden damage (organic or metabolic) or increased sensitivity of the myocardium to stressor sympathetico-adrenal effects, stability of therapeutic effect, and the action mechanism of a number of drugs.
Unveiling the hidden supernova population in local LIRGs with NIR/Radio observations
NASA Astrophysics Data System (ADS)
Herrero-Illana, R.; Pérez-Torres, M. A.; Alberdi, A.
2013-05-01
The dust enshrouded environments of Luminous Infrared Galaxies (LIRGs), and especially of their nuclear regions, prevents the direct detection of supernovae in the optical. Radio observations are unaffected by dust extinction, allowing for the detection of most of these supernovae, thus probing their massive star formation rate. In addition, complementary observations in the near IR can help us to understand the nature of these phenomena and derive properties of the regions where they occur.
Detecting seismic waves using a binary hidden Markov model classifier
NASA Astrophysics Data System (ADS)
Ray, J.; Lefantzi, S.; Brogan, R. A.; Forrest, R.; Hansen, C. W.; Young, C. J.
2016-12-01
We explore the use of Hidden Markov Models (HMM) to detect the arrival of seismic waves using data captured by a seismogram. HMMs define the state of a station as a binary variable based on whether the station is receiving a signal or not. HMMs are simple and fast, allowing them to monitor multiple datastreams arising from a large distributed network of seismographs. In this study we examine the efficacy of HMM-based detectors with respect to their false positive and negative rates as well as the accuracy of the signal onset time as compared to the value determined by an expert analyst. The study uses 3 component International Monitoring System (IMS) data from a carefully analyzed 2 week period from May, 2010, for which our analyst tried to identify every signal. Part of this interval is used for training the HMM to recognize the transition between state from noise to signal, while the other is used for evaluating the effectiveness of our new detection algorithm. We compare our results with the STA/LTA detection processing applied by the IDC to assess potential for operational use. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.
The Genetic Privacy Act and commentary
DOE Office of Scientific and Technical Information (OSTI.GOV)
Annas, G.J.; Glantz, L.H.; Roche, P.A.
1995-02-28
The Genetic Privacy Act is a proposal for federal legislation. The Act is based on the premise that genetic information is different from other types of personal information in ways that require special protection. The DNA molecule holds an extensive amount of currently indecipherable information. The major goal of the Human Genome Project is to decipher this code so that the information it contains is accessible. The privacy question is, accessible to whom? The highly personal nature of the information contained in DNA can be illustrated by thinking of DNA as containing an individual`s {open_quotes}future diary.{close_quotes} A diary is perhapsmore » the most personal and private document a person can create. It contains a person`s innermost thoughts and perceptions, and is usually hidden and locked to assure its secrecy. Diaries describe the past. The information in one`s genetic code can be thought of as a coded probabilistic future diary because it describes an important part of a unique and personal future. This document presents an introduction to the proposal for federal legislation `the Genetic Privacy Act`; a copy of the proposed act; and comment.« less
ERIC Educational Resources Information Center
Anderson, William; Zharkov, D. S.
The first of two papers presents suggestions on library services for the deaf by a British university lecturer, and the second provides an enumeration of Russian achievements in providing the blind with books. Based on an outline of the personal and social implications of deafness and unawareness of the deaf on the part of libraries and the…
Bergren, Martha Dewey
2004-10-01
School nurses access an enormous amount of information through the Internet. Although most avid computer users are savvy to the threat of viruses to the integrity of data, many who surf the Web do not know that their data and the functioning of their computer is at risk to another hidden threat--spyware. This article will describe spyware, why it is a problem, how it is transmitted to a personal or business computer, how to prevent spyware infestation, and how to delete it.
Connectionism and Compositional Semantics
1989-05-01
can use their hidden layers to learn difficult discriminations. such as panty or the Penzias two clumps/three clumps problem, where the output is...sauce." For novel sentences that are similar to the training sentences (e.g., train on "the girl hit the boy," test on -the boy hit the girl "), the...overridden by semantic considerations. as in this example from Wendy Lehnert (personal communicanon): (5) John saw the girl with the telescope in a red
The Detection Method of Fire Abnormal Based on Directional Drilling in Complex Conditions of Mine
NASA Astrophysics Data System (ADS)
Huijun, Duan; Shijun, Hao; Jie, Feng
2018-06-01
In the light of more and more urgent hidden fire abnormal detection problem in complex conditions of mine, a method which is used directional drilling technology is put forward. The method can avoid the obstacles in mine, and complete the fire abnormal detection. This paper based on analyzing the trajectory control of directional drilling, measurement while drilling and the characteristic of open branch process, the project of the directional drilling is formulated combination with a complex condition mine, and the detection of fire abnormal is implemented. This method can provide technical support for fire prevention, which also can provide a new way for fire anomaly detection in the similar mine.
Detection of foliage-obscured vehicle using a multiwavelength polarimetric lidar
Tan, S.; Stoker, J.; Greenlee, S.
2008-01-01
Foliage obscured man-made targets detection and identification is of great interest to many applications. In this paper, the backscattered laser signals from a multiwavelength polarimetric lidar were used to detect a vehicle hidden inside a vegetated area. The Polarimetric reflectance data from the lidar at two separate laser wavelengths at 1064 nm and 532 nm revealed distinct target characteristics from both the vehicle and the vegetation. The results from this case study demonstrated the validity of the proposed lidar detection technique. Furthermore, the results could potentially lead to a lidar detection and identification technique for a wide variety of foliage-obscured man-made targets under various application scenarios. ?? 2007 IEEE.
Functional Neuronal Processing of Human Body Odors
Lundström, Johan N.; Olsson, Mats J.
2013-01-01
Body odors carry informational cues of great importance for individuals across a wide range of species, and signals hidden within the body odor cocktail are known to regulate several key behaviors in animals. For a long time, the notion that humans may be among these species has been dismissed. We now know, however, that each human has a unique odor signature that carries information related to his or her genetic makeup, as well as information about personal environmental variables, such as diet and hygiene. Although a substantial number of studies have investigated the behavioral effects of body odors, only a handful have studied central processing. Recent studies have, however, demonstrated that the human brain responds to fear signals hidden within the body odor cocktail, is able to extract kin specific signals, and processes body odors differently than other perceptually similar odors. In this chapter, we provide an overview of the current knowledge of how the human brain processes body odors and the potential importance these signals have for us in everyday life. PMID:20831940
Face Aging Effect Simulation Using Hidden Factor Analysis Joint Sparse Representation.
Yang, Hongyu; Huang, Di; Wang, Yunhong; Wang, Heng; Tang, Yuanyan
2016-06-01
Face aging simulation has received rising investigations nowadays, whereas it still remains a challenge to generate convincing and natural age-progressed face images. In this paper, we present a novel approach to such an issue using hidden factor analysis joint sparse representation. In contrast to the majority of tasks in the literature that integrally handle the facial texture, the proposed aging approach separately models the person-specific facial properties that tend to be stable in a relatively long period and the age-specific clues that gradually change over time. It then transforms the age component to a target age group via sparse reconstruction, yielding aging effects, which is finally combined with the identity component to achieve the aged face. Experiments are carried out on three face aging databases, and the results achieved clearly demonstrate the effectiveness and robustness of the proposed method in rendering a face with aging effects. In addition, a series of evaluations prove its validity with respect to identity preservation and aging effect generation.
Analyzing Hidden Semantics in Social Bookmarking of Open Educational Resources
NASA Astrophysics Data System (ADS)
Minguillón, Julià
Web 2.0 services such as social bookmarking allow users to manage and share the links they find interesting, adding their own tags for describing them. This is especially interesting in the field of open educational resources, as delicious is a simple way to bridge the institutional point of view (i.e. learning object repositories) with the individual one (i.e. personal collections), thus promoting the discovering and sharing of such resources by other users. In this paper we propose a methodology for analyzing such tags in order to discover hidden semantics (i.e. taxonomies and vocabularies) that can be used to improve descriptions of learning objects and make learning object repositories more visible and discoverable. We propose the use of a simple statistical analysis tool such as principal component analysis to discover which tags create clusters that can be semantically interpreted. We will compare the obtained results with a collection of resources related to open educational resources, in order to better understand the real needs of people searching for open educational resources.
Identifying hidden voice and video streams
NASA Astrophysics Data System (ADS)
Fan, Jieyan; Wu, Dapeng; Nucci, Antonio; Keralapura, Ram; Gao, Lixin
2009-04-01
Given the rising popularity of voice and video services over the Internet, accurately identifying voice and video traffic that traverse their networks has become a critical task for Internet service providers (ISPs). As the number of proprietary applications that deliver voice and video services to end users increases over time, the search for the one methodology that can accurately detect such services while being application independent still remains open. This problem becomes even more complicated when voice and video service providers like Skype, Microsoft, and Google bundle their voice and video services with other services like file transfer and chat. For example, a bundled Skype session can contain both voice stream and file transfer stream in the same layer-3/layer-4 flow. In this context, traditional techniques to identify voice and video streams do not work. In this paper, we propose a novel self-learning classifier, called VVS-I , that detects the presence of voice and video streams in flows with minimum manual intervention. Our classifier works in two phases: training phase and detection phase. In the training phase, VVS-I first extracts the relevant features, and subsequently constructs a fingerprint of a flow using the power spectral density (PSD) analysis. In the detection phase, it compares the fingerprint of a flow to the existing fingerprints learned during the training phase, and subsequently classifies the flow. Our classifier is not only capable of detecting voice and video streams that are hidden in different flows, but is also capable of detecting different applications (like Skype, MSN, etc.) that generate these voice/video streams. We show that our classifier can achieve close to 100% detection rate while keeping the false positive rate to less that 1%.
Chen, Na; Ding, Pan; Shi, Yu; Jin, Tengyu; Su, Yuanyuan; Wang, Houyu; He, Yao
2017-05-02
There is an increasing interest in the development of surface-enhanced Raman scattering (SERS) sensors for rapid and accurate on-site detection of hidden explosives. However, portable SERS methods for trace explosive detection in real systems remain scarce, mainly due to their relatively poor reliability and portability. Herein, we present the first demonstration of a portable silicon-based SERS analytical platform for signal-on detection of trace trinitrotoluene (TNT) explosives, which is made of silver nanoparticle (AgNP)-decorated silicon wafer chip (0.5 cm × 0.5 cm). In principle, under 514 nm excitation, the Raman signals of p-aminobenzenethiol (PABT) modified on the AgNP surface could be largely lit up due to the formation of electronic resonance-active TNT-PABT complex. In addition, the surface of AgNPs and silicon substrate-induced plasmon resonances also contribute the total SERS enhancement. For quantitative evaluation, the as-prepared chip features ultrahigh sensitivity [limit of detection is down to ∼1 pM (∼45.4 fg/cm 2 )] and adaptable reproducibility (relative standard deviation is less than 15%) in the detection of TNT standard solutions. More importantly, the developed chip can couple well with a hand-held Raman spectroscopic device using 785 nm excitation, suitable for qualitative analysis of trace TNT even at ∼10 -8 M level from environmental samples including lake water, soil, envelope, and liquor with a short data acquisition time (∼1 min). Furthermore, TNT vapors diffusing from TNT residues (∼10 -6 M) can be detected by using such a portable device, indicating its feasibility in determination of hidden samples.
NASA Astrophysics Data System (ADS)
Ginzburg, D.; Knafo, Y.; Manor, A.; Seif, R.; Ghelman, M.; Ellenbogen, M.; Pushkarsky, V.; Ifergan, Y.; Semyonov, N.; Wengrowicz, U.; Mazor, T.; Kadmon, Y.; Cohen, Y.; Osovizky, A.
2015-06-01
There is a need to develop new personal radiation detector (PRD) technologies that can be mass produced. On August 2013, DARPA released a request for information (RFI) seeking innovative radiation detection technologies. In addition, on December 2013, a Broad Agency Announcement (BAA) for the SIGMA program was released. The RFI requirements focused on a sensor that should possess three main properties: low cost, high compactness and radioisotope identification capabilities. The identification performances should facilitate the detection of a hidden threat, ranging from special nuclear materials (SNM) to commonly used radiological sources. Subsequently, the BAA presented the specific requirements at an instrument level and provided a comparison between the current market status (state-of-the-art) and the SIGMA program objectives. This work presents an optional alternative for both the detection technology (sensor with communication output and without user interface) for DARPA's initial RFI and for the PRD required by the SIGMA program. A broad discussion is dedicated to the method proposed to fulfill the program objectives and to the selected alternative that is based on the PDS-GO design and technology. The PDS-GO is the first commercially available PRD that is based on a scintillation crystal optically coupled with a silicon photomultiplier (SiPM), a solid-state light sensor. This work presents the current performance of the instrument and possible future upgrades based on recent technological improvements in the SiPM design. The approach of utilizing the SiPM with a commonly available CsI(Tl) crystal is the key for achieving the program objectives. This approach provides the appropriate performance, low cost, mass production and small dimensions; however, it requires a creative approach to overcome the obstacles of the solid-state detector dark current (noise) and gain stabilization over a wide temperature range. Based on the presented results, we presume that the proposed approach of SiPM, with pixel size of 35 μm, coupled to a scintillation material (for gamma and neutron detection) ensures the availability and low cost of the key components. Furthermore, automated manufacturing process enables mass production, thereby fulfilling the SIGMA program requirements, both as a sensor (assimilated with mobile device) and as a full detection device.
Short-term memory in networks of dissociated cortical neurons.
Dranias, Mark R; Ju, Han; Rajaram, Ezhilarasan; VanDongen, Antonius M J
2013-01-30
Short-term memory refers to the ability to store small amounts of stimulus-specific information for a short period of time. It is supported by both fading and hidden memory processes. Fading memory relies on recurrent activity patterns in a neuronal network, whereas hidden memory is encoded using synaptic mechanisms, such as facilitation, which persist even when neurons fall silent. We have used a novel computational and optogenetic approach to investigate whether these same memory processes hypothesized to support pattern recognition and short-term memory in vivo, exist in vitro. Electrophysiological activity was recorded from primary cultures of dissociated rat cortical neurons plated on multielectrode arrays. Cultures were transfected with ChannelRhodopsin-2 and optically stimulated using random dot stimuli. The pattern of neuronal activity resulting from this stimulation was analyzed using classification algorithms that enabled the identification of stimulus-specific memories. Fading memories for different stimuli, encoded in ongoing neural activity, persisted and could be distinguished from each other for as long as 1 s after stimulation was terminated. Hidden memories were detected by altered responses of neurons to additional stimulation, and this effect persisted longer than 1 s. Interestingly, network bursts seem to eliminate hidden memories. These results are similar to those that have been reported from similar experiments in vivo and demonstrate that mechanisms of information processing and short-term memory can be studied using cultured neuronal networks, thereby setting the stage for therapeutic applications using this platform.
Retrieving hydrological connectivity from empirical causality in karst systems
NASA Astrophysics Data System (ADS)
Delforge, Damien; Vanclooster, Marnik; Van Camp, Michel; Poulain, Amaël; Watlet, Arnaud; Hallet, Vincent; Kaufmann, Olivier; Francis, Olivier
2017-04-01
Because of their complexity, karst systems exhibit nonlinear dynamics. Moreover, if one attempts to model a karst, the hidden behavior complicates the choice of the most suitable model. Therefore, both intense investigation methods and nonlinear data analysis are needed to reveal the underlying hydrological connectivity as a prior for a consistent physically based modelling approach. Convergent Cross Mapping (CCM), a recent method, promises to identify causal relationships between time series belonging to the same dynamical systems. The method is based on phase space reconstruction and is suitable for nonlinear dynamics. As an empirical causation detection method, it could be used to highlight the hidden complexity of a karst system by revealing its inner hydrological and dynamical connectivity. Hence, if one can link causal relationships to physical processes, the method should show great potential to support physically based model structure selection. We present the results of numerical experiments using karst model blocks combined in different structures to generate time series from actual rainfall series. CCM is applied between the time series to investigate if the empirical causation detection is consistent with the hydrological connectivity suggested by the karst model.
Lazzaro, Irene; Falavigna, Claudia; Dall'asta, Chiara; Proctor, Robert H; Galaverna, Gianni; Battilani, Paola
2012-10-01
The production of fumonisin B, A and C and hidden and partially hydrolysed fumonisin occurrence was investigated in 3 strains of Fusarium verticillioides isolated from maize, cultured for 21-45days on malt extract medium at 25°C and 0.955-0.990 water activity (a(w)). Fumonisin A-B and C series were produced by all the strains in all conditions studied, with B-fumonisin≫C-fumonisin>A-fumonisin following a similar trend. The dynamic of fumonisin production was significantly influenced by factors considered and their interaction, with a(w)=0.990 as favourable condition in ITEM 10026 and ITEM 10027. All fumonisins were maximised at 30days incubation in ITEM 10027 and ITEM 1744 and at 45days incubation in ITEM 10026. Partially hydrolysed fumonisins were detected only for the B-group. Hidden fumonisins were never observed in Fusarium cultures grown on malt extract medium but were detected in the additional trial on maize-based medium, suggesting that the masking phenomenon can occur only in a complex matrix. Copyright © 2012 Elsevier B.V. All rights reserved.
Direct detection signatures of self-interacting dark matter with a light mediator
Nobile, Eugenio Del; Kaplinghat, Manoj; Yu, Hai-Bo
2015-10-27
Self-interacting dark matter (SIDM) is a simple and well-motivated scenario that could explain long-standing puzzles in structure formation on small scales. If the required self-interaction arises through a light mediator (with mass ~ 10 MeV) in the dark sector, this new particle must be unstable to avoid overclosing the universe. The decay of the light mediator could happen due to a weak coupling of the hidden and visible sectors, providing new signatures for direct detection experiments. The SIDM nuclear recoil spectrum is more peaked towards low energies compared to the usual case of contact interactions, because the mediator mass ismore » comparable to the momentum transfer of nuclear recoils. We show that the SIDM signal could be distinguished from that of DM particles with contact interactions by considering the time-average energy spectrum in experiments employing different target materials, or the average and modulated spectra in a single experiment. Using current limits from LUX and SuperCDMS, we also derive strong bounds on the mixing parameter between hidden and visible sector.« less
Lu, Jun; Bushel, Pierre R.
2013-01-01
RNA sequencing (RNA-Seq) allows for the identification of novel exon-exon junctions and quantification of gene expression levels. We show that from RNA-Seq data one may also detect utilization of alternative polyadenylation (APA) in 3′ untranslated regions (3′ UTRs) known to play a critical role in the regulation of mRNA stability, cellular localization and translation efficiency. Given the dynamic nature of APA, it is desirable to examine the APA on a sample by sample basis. We used a Poisson hidden Markov model (PHMM) of RNA-Seq data to identify potential APA in human liver and brain cortex tissues leading to shortened 3′ UTRs. Over three hundred transcripts with shortened 3′ UTRs were detected with sensitivity >75% and specificity >60%. tissue-specific 3′ UTR shortening was observed for 32 genes with a q-value ≤ 0.1. When compared to alternative isoforms detected by Cufflinks or MISO, our PHMM method agreed on over 100 transcripts with shortened 3′ UTRs. Given the increasing usage of RNA-Seq for gene expression profiling, using PHMM to investigate sample-specific 3′ UTR shortening could be an added benefit from this emerging technology. PMID:23845781
Localization of Hidden Insulinomas with ⁶⁸Ga-DOTA-Exendin-4 PET/CT: A Pilot Study.
Antwi, Kwadwo; Fani, Melpomeni; Nicolas, Guillaume; Rottenburger, Christof; Heye, Tobias; Reubi, Jean Claude; Gloor, Beat; Christ, Emanuel; Wild, Damian
2015-07-01
(111)In-DOTA-exendin-4 SPECT/CT has been shown to be highly efficient in the detection of insulinomas. We aimed at determining whether novel PET/CT imaging with [Nle(14),Lys(40)(Ahx-DOTA-(68)Ga)NH2]exendin-4 ((68)Ga-DOTA-exendin-4) is feasible and sensitive in detecting benign insulinomas. (68)Ga-DOTA-exendin-4 PET/CT and (111)In-DOTA-exendin-4 SPECT/CT were performed in a randomized cross-over order on 5 patients with endogenous hyperinsulinemic hypoglycemia. The gold standard for comparison was the histologic diagnosis after surgery. In 4 patients histologic diagnosis confirmed a benign insulinoma, whereas one patient refused surgery despite a positive (68)Ga-DOTA-exendin-4 PET/CT scan. In 4 of 5 patients, previously performed conventional imaging (CT or MR imaging) was not able to localize the insulinoma. (68)Ga-DOTA-exendin-4 PET/CT correctly identified the insulinoma in 4 of 4 patients, whereas (111)In-DOTA-exendin-4 SPECT/CT correctly identified the insulinoma in only 2 of 4 patients. These preliminary data suggest that the use of (68)Ga-DOTA-exendin-4 PET/CT in detecting hidden insulinomas is feasible. © 2015 by the Society of Nuclear Medicine and Molecular Imaging, Inc.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lowdermilk, W. H.; Brothers, L. J.
This was a collaborative effort by Lawrence Livermore National Security (formerly the University of California)/Lawrence Livermore National Laboratory (LLNL), Valley Forge Composite Technologies, Inc., and the following Russian Institutes: P. N. Lebedev Physical Institute (LPI), Innovative Technologies Center.(AUO CIT), Central Design Bureau-Almas (CDB Almaz), Moscow Instrument Automation Research Institute, and Institute for High Energy Physics (IBEP) to develop equipment and procedures for detecting explosive materials concealed in airline checked baggage and cargo.
Development and application of deep convolutional neural network in target detection
NASA Astrophysics Data System (ADS)
Jiang, Xiaowei; Wang, Chunping; Fu, Qiang
2018-04-01
With the development of big data and algorithms, deep convolution neural networks with more hidden layers have more powerful feature learning and feature expression ability than traditional machine learning methods, making artificial intelligence surpass human level in many fields. This paper first reviews the development and application of deep convolutional neural networks in the field of object detection in recent years, then briefly summarizes and ponders some existing problems in the current research, and the future development of deep convolutional neural network is prospected.
Directed Hidden-Code Extractor for Environment-Sensitive Malwares
NASA Astrophysics Data System (ADS)
Jia, Chunfu; Wang, Zhi; Lu, Kai; Liu, Xinhai; Liu, Xin
Malware writers often use packing technique to hide malicious payload. A number of dynamic unpacking tools are.designed in order to identify and extract the hidden code in the packed malware. However, such unpacking methods.are all based on a highly controlled environment that is vulnerable to various anti-unpacking techniques. If execution.environment is suspicious, malwares may stay inactive for a long time or stop execution immediately to evade.detection. In this paper, we proposed a novel approach that automatically reasons about the environment requirements.imposed by malware, then directs a unpacking tool to change the controlled environment to extract the hide code at.the new environment. The experimental results show that our approach significantly increases the resilience of the.traditional unpacking tools to environment-sensitive malware.
Data-driven system to predict academic grades and dropout
Rovira, Sergi; Puertas, Eloi
2017-01-01
Nowadays, the role of a tutor is more important than ever to prevent students dropout and improve their academic performance. This work proposes a data-driven system to extract relevant information hidden in the student academic data and, thus, help tutors to offer their pupils a more proactive personal guidance. In particular, our system, based on machine learning techniques, makes predictions of dropout intention and courses grades of students, as well as personalized course recommendations. Moreover, we present different visualizations which help in the interpretation of the results. In the experimental validation, we show that the system obtains promising results with data from the degree studies in Law, Computer Science and Mathematics of the Universitat de Barcelona. PMID:28196078
A novel approach for SEMG signal classification with adaptive local binary patterns.
Ertuğrul, Ömer Faruk; Kaya, Yılmaz; Tekin, Ramazan
2016-07-01
Feature extraction plays a major role in the pattern recognition process, and this paper presents a novel feature extraction approach, adaptive local binary pattern (aLBP). aLBP is built on the local binary pattern (LBP), which is an image processing method, and one-dimensional local binary pattern (1D-LBP). In LBP, each pixel is compared with its neighbors. Similarly, in 1D-LBP, each data in the raw is judged against its neighbors. 1D-LBP extracts feature based on local changes in the signal. Therefore, it has high a potential to be employed in medical purposes. Since, each action or abnormality, which is recorded in SEMG signals, has its own pattern, and via the 1D-LBP these (hidden) patterns may be detected. But, the positions of the neighbors in 1D-LBP are constant depending on the position of the data in the raw. Also, both LBP and 1D-LBP are very sensitive to noise. Therefore, its capacity in detecting hidden patterns is limited. To overcome these drawbacks, aLBP was proposed. In aLBP, the positions of the neighbors and their values can be assigned adaptively via the down-sampling and the smoothing coefficients. Therefore, the potential to detect (hidden) patterns, which may express an illness or an action, is really increased. To validate the proposed feature extraction approach, two different datasets were employed. Achieved accuracies by the proposed approach were higher than obtained results by employed popular feature extraction approaches and the reported results in the literature. Obtained accuracy results were brought out that the proposed method can be employed to investigate SEMG signals. In summary, this work attempts to develop an adaptive feature extraction scheme that can be utilized for extracting features from local changes in different categories of time-varying signals.
1992-03-16
34A Hidden U.S. Export: Higher Education ." The WashinQton Post, 16 February 1992, H1 and H4. Brandin , David H., and Michael A. Harrison. The...frequent significant technological change now occurs within the individual person’s working lifespan, life-long education is a necessity to remain...INDUSTRIAL REVOLUTION The phenomenal increase in speed and in raw power of computer processors, the shrinking size and cost of basic computing systems, the
Automatic detection of snow avalanches in continuous seismic data using hidden Markov models
NASA Astrophysics Data System (ADS)
Heck, Matthias; Hammer, Conny; van Herwijnen, Alec; Schweizer, Jürg; Fäh, Donat
2018-01-01
Snow avalanches generate seismic signals as many other mass movements. Detection of avalanches by seismic monitoring is highly relevant to assess avalanche danger. In contrast to other seismic events, signals generated by avalanches do not have a characteristic first arrival nor is it possible to detect different wave phases. In addition, the moving source character of avalanches increases the intricacy of the signals. Although it is possible to visually detect seismic signals produced by avalanches, reliable automatic detection methods for all types of avalanches do not exist yet. We therefore evaluate whether hidden Markov models (HMMs) are suitable for the automatic detection of avalanches in continuous seismic data. We analyzed data recorded during the winter season 2010 by a seismic array deployed in an avalanche starting zone above Davos, Switzerland. We re-evaluated a reference catalogue containing 385 events by grouping the events in seven probability classes. Since most of the data consist of noise, we first applied a simple amplitude threshold to reduce the amount of data. As first classification results were unsatisfying, we analyzed the temporal behavior of the seismic signals for the whole data set and found that there is a high variability in the seismic signals. We therefore applied further post-processing steps to reduce the number of false alarms by defining a minimal duration for the detected event, implementing a voting-based approach and analyzing the coherence of the detected events. We obtained the best classification results for events detected by at least five sensors and with a minimal duration of 12 s. These processing steps allowed identifying two periods of high avalanche activity, suggesting that HMMs are suitable for the automatic detection of avalanches in seismic data. However, our results also showed that more sensitive sensors and more appropriate sensor locations are needed to improve the signal-to-noise ratio of the signals and therefore the classification.
Detecting impossible changes in infancy: a three-system account
Wang, Su-hua; Baillargeon, Renée
2012-01-01
Can infants detect that an object has magically disappeared, broken apart or changed color while briefly hidden? Recent research suggests that infants detect some but not other ‘impossible’ changes; and that various contextual manipulations can induce infants to detect changes they would not otherwise detect. We present an account that includes three systems: a physical-reasoning, an object-tracking, and an object-representation system. What impossible changes infants detect depends on what object information is included in the physical-reasoning system; this information becomes subject to a principle of persistence, which states that objects can undergo no spontaneous or uncaused change. What contextual manipulations induce infants to detect impossible changes depends on complex interplays between the physical-reasoning system and the object-tracking and object-representation systems. PMID:18078778
NASA Astrophysics Data System (ADS)
Aldrin, John C.; Wertz, John N.; Welter, John T.; Wallentine, Sarah; Lindgren, Eric A.; Kramb, Victoria; Zainey, David
2018-04-01
In this study, the use of angled-beam ultrasonic NDE was explored for the potential characterization of the hidden regions of impact damage in composites. Simulated studies using CIVA FIDEL 2D were used to explore this inspection problem. Quasi-shear (qS) modes can be generated over a wide range of angles and used to reflect off the backwall and interrogate under the top delaminations of impact damage. Secondary probe signals that do propagate normal to the surface were found to be significant under certain probe conditions, and can potentially interfere with weakly scattered signals from within the composite panel. Simulations were used to evaluate the source of the multiple paths of reflections from the edge of a delamination; time-of-flight and amplitude will depend on the depth of the delamination and location of neighboring delaminations. For angled-beam inspections, noise from both the top surface roughness and internal features was found to potentially mask the detection of signals from the edge of delaminations. Lastly, the study explored the potential of generating "guided" waves along the backwall using an angled-beam source and subsequently measuring scattered signals from a far surface crack hidden under a delamination.
NASA Astrophysics Data System (ADS)
Carlotti, D.; Collamati, F.; Faccini, R.; Fresch, P.; Iacoangeli, F.; Mancini-Terracciano, C.; Marafini, M.; Mirabelli, R.; Recchia, L.; Russomando, A.; Solfaroli Camillocci, E.; Toppi, M.; Traini, G.; Bocci, V.
2017-11-01
The recent interest in β^- radionuclides for radio-guided surgery derives from the feature of the β radiation to release energy in few millimeters of tissue. Such feature can be used to locate residual tumors with a probe located in its immediate vicinity, determining the resection margins with an accuracy of millimeters. The drawback of this technique is that it does not allow to identify tumors hidden in more than few mm of tissue. Conversely, the bremsstrahlung X-rays emitted by the interaction of the β- radiation with the nuclei of the tissue are relatively penetrating. To complement the β- probes, we have therefore developed a detector based on cadmium telluride, an X-ray detector with a high quantum efficiency working at room temperature. We measured the secondary emission of bremsstrahlung photons in a target of Polymethylmethacrylate (PMMA) with a density similar to living tissue. The results show that this device allows to detect a 1 ml residual or lymph-node with an activity of 1 kBq hidden under a layer of 10 mm of PMMA with a 3:1 signal to noise, i.e. with a five sigma discrimination in less than 5 s.
Evidence of hidden leprosy in a supposedly low endemic area of Brazil.
Bernardes, Fred; Paula, Natália Aparecida de; Leite, Marcel Nani; Abi-Rached, Thania Loyola Cordeiro; Vernal, Sebastian; Silva, Moises Batista da; Barreto, Josafá Gonçalves; Spencer, John Stewart; Frade, Marco Andrey Cipriani
2017-12-01
Show that hidden endemic leprosy exists in a municipality of inner São Paulo state (Brazil) with active surveillance actions based on clinical and immunological evaluations. The study sample was composed by people randomly selected by a dermatologist during medical care in the public emergency department and by active surveillance carried out during two days at a mobile clinic. All subjects received a dermato-neurological examination and blood sampling to determine anti-PGL-I antibody titers by enzyme-linked immunosorbent assay (ELISA). From July to December 2015, 24 new cases of leprosy were diagnosed; all were classified as multibacillary (MB) leprosy, one with severe Lucio's phenomenon. Seventeen (75%) were found with grade-1 or 2 disability at the moment of diagnosis. Anti-PGL-I titer was positive in 31/133 (23.3%) individuals, only 6/24 (25%) were positive in newly diagnosed leprosy cases. During the last ten years before this study, the average new case detection rate (NCDR) in this town was 2.62/100,000 population. After our work, the NCDR was raised to 42.8/100,000. These results indicate a very high number of hidden leprosy cases in this supposedly low endemic area of Brazil.
Ferentinos, Konstantinos P
2005-09-01
Two neural network (NN) applications in the field of biological engineering are developed, designed and parameterized by an evolutionary method based on the evolutionary process of genetic algorithms. The developed systems are a fault detection NN model and a predictive modeling NN system. An indirect or 'weak specification' representation was used for the encoding of NN topologies and training parameters into genes of the genetic algorithm (GA). Some a priori knowledge of the demands in network topology for specific application cases is required by this approach, so that the infinite search space of the problem is limited to some reasonable degree. Both one-hidden-layer and two-hidden-layer network architectures were explored by the GA. Except for the network architecture, each gene of the GA also encoded the type of activation functions in both hidden and output nodes of the NN and the type of minimization algorithm that was used by the backpropagation algorithm for the training of the NN. Both models achieved satisfactory performance, while the GA system proved to be a powerful tool that can successfully replace the problematic trial-and-error approach that is usually used for these tasks.
Steganography anomaly detection using simple one-class classification
NASA Astrophysics Data System (ADS)
Rodriguez, Benjamin M.; Peterson, Gilbert L.; Agaian, Sos S.
2007-04-01
There are several security issues tied to multimedia when implementing the various applications in the cellular phone and wireless industry. One primary concern is the potential ease of implementing a steganography system. Traditionally, the only mechanism to embed information into a media file has been with a desktop computer. However, as the cellular phone and wireless industry matures, it becomes much simpler for the same techniques to be performed using a cell phone. In this paper, two methods are compared that classify cell phone images as either an anomaly or clean, where a clean image is one in which no alterations have been made and an anomalous image is one in which information has been hidden within the image. An image in which information has been hidden is known as a stego image. The main concern in detecting steganographic content with machine learning using cell phone images is in training specific embedding procedures to determine if the method has been used to generate a stego image. This leads to a possible flaw in the system when the learned model of stego is faced with a new stego method which doesn't match the existing model. The proposed solution to this problem is to develop systems that detect steganography as anomalies, making the embedding method irrelevant in detection. Two applicable classification methods for solving the anomaly detection of steganographic content problem are single class support vector machines (SVM) and Parzen-window. Empirical comparison of the two approaches shows that Parzen-window outperforms the single class SVM most likely due to the fact that Parzen-window generalizes less.
Detection of Moving Targets Using Soliton Resonance Effect
NASA Technical Reports Server (NTRS)
Kulikov, Igor K.; Zak, Michail
2013-01-01
The objective of this research was to develop a fundamentally new method for detecting hidden moving targets within noisy and cluttered data-streams using a novel "soliton resonance" effect in nonlinear dynamical systems. The technique uses an inhomogeneous Korteweg de Vries (KdV) equation containing moving-target information. Solution of the KdV equation will describe a soliton propagating with the same kinematic characteristics as the target. The approach uses the time-dependent data stream obtained with a sensor in form of the "forcing function," which is incorporated in an inhomogeneous KdV equation. When a hidden moving target (which in many ways resembles a soliton) encounters the natural "probe" soliton solution of the KdV equation, a strong resonance phenomenon results that makes the location and motion of the target apparent. Soliton resonance method will amplify the moving target signal, suppressing the noise. The method will be a very effective tool for locating and identifying diverse, highly dynamic targets with ill-defined characteristics in a noisy environment. The soliton resonance method for the detection of moving targets was developed in one and two dimensions. Computer simulations proved that the method could be used for detection of singe point-like targets moving with constant velocities and accelerations in 1D and along straight lines or curved trajectories in 2D. The method also allows estimation of the kinematic characteristics of moving targets, and reconstruction of target trajectories in 2D. The method could be very effective for target detection in the presence of clutter and for the case of target obscurations.
The hidden web and the fentanyl problem: Detection of ocfentanil as an adulterant in heroin.
Quintana, Pol; Ventura, Mireia; Grifell, Marc; Palma, Alvaro; Galindo, Liliana; Fornís, Iván; Gil, Cristina; Carbón, Xoán; Caudevilla, Fernando; Farré, Magí; Torrens, Marta
2017-02-01
The popularization of anonymous markets such as Silk Road is challenging current drug policy and may provide a new context for old issues, such as adulteration of heroin with fentanyl derivatives. The aims of this paper are to report the presence of ocfentanil, a novel, potent, non-controlled fentanyl analog, in samples sold as heroin in the hidden web, and to summarize the effects reported by users. In 2015, four samples allegedly bought as heroin in cryptomarkets of the hidden web were sent to Energy Control for analysis. Energy Control is a Spanish harm reduction NGO that offers anonymous drug checking with the purpose of adapting counselling to the specific substances present in the drug and monitor the drug market. Identification was performed by GC/MS and LC/MS/MS. We contacted the submitters of the samples and performed an Internet search to retrieve additional information. One sample contained ocfentanil, caffeine and heroin. Three samples contained the aforementioned substances plus paracetamol. Two out of the four contacted users reported distinct short acting, opioid-like effects. No fora discussion could be found about the effects of ocfentanil, neither web pages nor individuals advertising the substance. We report the presence of a new substance detected in the hidden web as an adulterant of heroin, ocfentanil. It has short acting opioid-like effects, roughly the same potency as fentanyl, and can be injected, snorted or smoked. Severe side effects have been associated with its use, including one death. No discussion about this substance could be found in the Internet, which suggests this substance has not been sold as such. Available data about purities of drugs purchased in cryptomarkets suggest that adulteration is not a severe problem and this agrees with users' perceptions. However, this study suggests that adulteration is a real threat not only at the street level, but also for users that buy substances in cryptomarkets, and suggest the need for harm reduction initiatives in this setting. Copyright © 2016 Elsevier B.V. All rights reserved.
Gerasimova, N S; Pestov, N A; Kulaeva, O I; Clark, D J; Studitsky, V M
2016-05-26
RNA polymerase II (Pol II) transcription through chromatin is accompanied by formation of small intranucleosomal DNA loops. Pol II captured within a small loop drives accumulation of DNA supercoiling, facilitating further transcription. DNA breaks relieve supercoiling and induce Pol II arrest, allowing detection of DNA damage hidden in chromatin structure.
ERIC Educational Resources Information Center
Samar, V.J.; Parasnis, I.
2005-01-01
Prelingual deafness and developmental dyslexia have confounding developmental effects on reading acquisition. Therefore, standard reading assessment methods for diagnosing dyslexia in hearing people are ineffective for use with deaf people. Recently, Samar, Parasnis, and Berent (2002) reported visual evoked potential evidence that deaf poor…
Acoustic tomography for decay detection in red oak trees
Xiping Wang; R. Bruce Allison; Lihai Wang; Robert J. Ross
2007-01-01
The science of tree stability analysis uses both biological and engineering principles in attempting to rate a treeâs structural soundness and make reasonable predictions of potential for failure. In such analysis, arborists are often challenged by internal structural defects hidden from view within the trunks. This paper reports the results of an investigation using...
ERIC Educational Resources Information Center
Williamson, Jack
1995-01-01
Argues that the practice and influence of design history can benefit from new forms of visual and chronological analysis. Identifies and discusses a unique phenomenon, the "historical visual narrative." Examines special instances of this phenomenon in twentieth-century design and visual culture, which are tied to the theme of the…
Hidden momentum of electrons, nuclei, atoms, and molecules
NASA Astrophysics Data System (ADS)
Cameron, Robert P.; Cotter, J. P.
2018-04-01
We consider the positions and velocities of electrons and spinning nuclei and demonstrate that these particles harbour hidden momentum when located in an electromagnetic field. This hidden momentum is present in all atoms and molecules, however it is ultimately canceled by the momentum of the electromagnetic field. We point out that an electron vortex in an electric field might harbour a comparatively large hidden momentum and recognize the phenomenon of hidden hidden momentum.
On-line bolt-loosening detection method of key components of running trains using binocular vision
NASA Astrophysics Data System (ADS)
Xie, Yanxia; Sun, Junhua
2017-11-01
Bolt loosening, as one of hidden faults, affects the running quality of trains and even causes serious safety accidents. However, the developed fault detection approaches based on two-dimensional images cannot detect bolt-loosening due to lack of depth information. Therefore, we propose a novel online bolt-loosening detection method using binocular vision. Firstly, the target detection model based on convolutional neural network (CNN) is used to locate the target regions. And then, stereo matching and three-dimensional reconstruction are performed to detect bolt-loosening faults. The experimental results show that the looseness of multiple bolts can be characterized by the method simultaneously. The measurement repeatability and precision are less than 0.03mm, 0.09mm respectively, and its relative error is controlled within 1.09%.
Francis Bacon's behavioral psychology.
MacDonald, Paul S
2007-01-01
Francis Bacon offers two accounts of the nature and function of the human mind: one is a medical-physical account of the composition and operation of spirits specific to human beings, the other is a behavioral account of the character and activities of individual persons. The medical-physical account is a run-of-the-mill version of the late Renaissance model of elemental constituents and humoral temperaments. The other, less well-known, behavioral account represents an unusual position in early modern philosophy. This theory espouses a form of behavioral psychology according to which (a) supposed mental properties are "hidden forms" best described in dispositional terms, (b) the true character of an individual can be discovered in his observable behavior, and (c) an "informed" understanding of these properties permits the prediction and control of human behavior. Both of Bacon's theories of human nature fall under his general notion of systematic science: his medical-physical theory of vital spirits is theoretical natural philosophy and his behavioral theory of disposition and expression is operative natural philosophy. Because natural philosophy as a whole is "the inquiry of causes and the production of effects," knowledge of human nature falls under the same two-part definition. It is an inquisition of forms that pertains to the patterns of minute motions in the vital spirits and the production of effects that pertains both to the way these hidden motions produce behavioral effects and to the way in which a skillful agent is able to produce desired effects in other persons' behavior. (c) 2007 Wiley Periodicals, Inc.
Optimization of neural network architecture for classification of radar jamming FM signals
NASA Astrophysics Data System (ADS)
Soto, Alberto; Mendoza, Ariadna; Flores, Benjamin C.
2017-05-01
The purpose of this study is to investigate several artificial Neural Network (NN) architectures in order to design a cognitive radar system capable of optimally distinguishing linear Frequency-Modulated (FM) signals from bandlimited Additive White Gaussian Noise (AWGN). The goal is to create a theoretical framework to determine an optimal NN architecture to achieve a Probability of Detection (PD) of 95% or higher and a Probability of False Alarm (PFA) of 1.5% or lower at 5 dB Signal to Noise Ratio (SNR). Literature research reveals that the frequency-domain power spectral densities characterize a signal more efficiently than its time-domain counterparts. Therefore, the input data is preprocessed by calculating the magnitude square of the Discrete Fourier Transform of the digitally sampled bandlimited AWGN and linear FM signals to populate a matrix containing N number of samples and M number of spectra. This matrix is used as input for the NN, and the spectra are divided as follows: 70% for training, 15% for validation, and 15% for testing. The study begins by experimentally deducing the optimal number of hidden neurons (1-40 neurons), then the optimal number of hidden layers (1-5 layers), and lastly, the most efficient learning algorithm. The training algorithms examined are: Resilient Backpropagation, Scaled Conjugate Gradient, Conjugate Gradient with Powell/Beale Restarts, Polak-Ribiére Conjugate Gradient, and Variable Learning Rate Backpropagation. We determine that an architecture with ten hidden neurons (or higher), one hidden layer, and a Scaled Conjugate Gradient for training algorithm encapsulates an optimal architecture for our application.
Depth-resolved ballistic imaging in a low-depth-of-field optical Kerr gated imaging system
NASA Astrophysics Data System (ADS)
Zheng, Yipeng; Tan, Wenjiang; Si, Jinhai; Ren, YuHu; Xu, Shichao; Tong, Junyi; Hou, Xun
2016-09-01
We demonstrate depth-resolved imaging in a ballistic imaging system, in which a heterodyned femtosecond optical Kerr gate is introduced to extract useful imaging photons for detecting an object hidden in turbid media and a compound lens is proposed to ensure both the depth-resolved imaging capability and the long working distance. Two objects of about 15-μm widths hidden in a polystyrene-sphere suspension have been successfully imaged with approximately 600-μm depth resolution. Modulation-transfer-function curves with the object in and away from the object plane have also been measured to confirm the depth-resolved imaging capability of the low-depth-of-field (low-DOF) ballistic imaging system. This imaging approach shows potential for application in research of the internal structure of highly scattering fuel spray.
Hidden Markov models for fault detection in dynamic systems
NASA Technical Reports Server (NTRS)
Smyth, Padhraic J. (Inventor)
1995-01-01
The invention is a system failure monitoring method and apparatus which learns the symptom-fault mapping directly from training data. The invention first estimates the state of the system at discrete intervals in time. A feature vector x of dimension k is estimated from sets of successive windows of sensor data. A pattern recognition component then models the instantaneous estimate of the posterior class probability given the features, p(w(sub i) (vertical bar)/x), 1 less than or equal to i isless than or equal to m. Finally, a hidden Markov model is used to take advantage of temporal context and estimate class probabilities conditioned on recent past history. In this hierarchical pattern of information flow, the time series data is transformed and mapped into a categorical representation (the fault classes) and integrated over time to enable robust decision-making.
Hidden Markov models for fault detection in dynamic systems
NASA Technical Reports Server (NTRS)
Smyth, Padhraic J. (Inventor)
1993-01-01
The invention is a system failure monitoring method and apparatus which learns the symptom-fault mapping directly from training data. The invention first estimates the state of the system at discrete intervals in time. A feature vector x of dimension k is estimated from sets of successive windows of sensor data. A pattern recognition component then models the instantaneous estimate of the posterior class probability given the features, p(w(sub i) perpendicular to x), 1 less than or equal to i is less than or equal to m. Finally, a hidden Markov model is used to take advantage of temporal context and estimate class probabilities conditioned on recent past history. In this hierarchical pattern of information flow, the time series data is transformed and mapped into a categorical representation (the fault classes) and integrated over time to enable robust decision-making.
Fiske, Ian J.; Royle, J. Andrew; Gross, Kevin
2014-01-01
Ecologists and wildlife biologists increasingly use latent variable models to study patterns of species occurrence when detection is imperfect. These models have recently been generalized to accommodate both a more expansive description of state than simple presence or absence, and Markovian dynamics in the latent state over successive sampling seasons. In this paper, we write these multi-season, multi-state models as hidden Markov models to find both maximum likelihood estimates of model parameters and finite-sample estimators of the trajectory of the latent state over time. These estimators are especially useful for characterizing population trends in species of conservation concern. We also develop parametric bootstrap procedures that allow formal inference about latent trend. We examine model behavior through simulation, and we apply the model to data from the North American Amphibian Monitoring Program.
Depth-resolved ballistic imaging in a low-depth-of-field optical Kerr gated imaging system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zheng, Yipeng; Tan, Wenjiang, E-mail: tanwenjiang@mail.xjtu.edu.cn; Si, Jinhai
2016-09-07
We demonstrate depth-resolved imaging in a ballistic imaging system, in which a heterodyned femtosecond optical Kerr gate is introduced to extract useful imaging photons for detecting an object hidden in turbid media and a compound lens is proposed to ensure both the depth-resolved imaging capability and the long working distance. Two objects of about 15-μm widths hidden in a polystyrene-sphere suspension have been successfully imaged with approximately 600-μm depth resolution. Modulation-transfer-function curves with the object in and away from the object plane have also been measured to confirm the depth-resolved imaging capability of the low-depth-of-field (low-DOF) ballistic imaging system. Thismore » imaging approach shows potential for application in research of the internal structure of highly scattering fuel spray.« less
Time series segmentation: a new approach based on Genetic Algorithm and Hidden Markov Model
NASA Astrophysics Data System (ADS)
Toreti, A.; Kuglitsch, F. G.; Xoplaki, E.; Luterbacher, J.
2009-04-01
The subdivision of a time series into homogeneous segments has been performed using various methods applied to different disciplines. In climatology, for example, it is accompanied by the well-known homogenization problem and the detection of artificial change points. In this context, we present a new method (GAMM) based on Hidden Markov Model (HMM) and Genetic Algorithm (GA), applicable to series of independent observations (and easily adaptable to autoregressive processes). A left-to-right hidden Markov model, estimating the parameters and the best-state sequence, respectively, with the Baum-Welch and Viterbi algorithms, was applied. In order to avoid the well-known dependence of the Baum-Welch algorithm on the initial condition, a Genetic Algorithm was developed. This algorithm is characterized by mutation, elitism and a crossover procedure implemented with some restrictive rules. Moreover the function to be minimized was derived following the approach of Kehagias (2004), i.e. it is the so-called complete log-likelihood. The number of states was determined applying a two-fold cross-validation procedure (Celeux and Durand, 2008). Being aware that the last issue is complex, and it influences all the analysis, a Multi Response Permutation Procedure (MRPP; Mielke et al., 1981) was inserted. It tests the model with K+1 states (where K is the state number of the best model) if its likelihood is close to K-state model. Finally, an evaluation of the GAMM performances, applied as a break detection method in the field of climate time series homogenization, is shown. 1. G. Celeux and J.B. Durand, Comput Stat 2008. 2. A. Kehagias, Stoch Envir Res 2004. 3. P.W. Mielke, K.J. Berry, G.W. Brier, Monthly Wea Rev 1981.
Real-time computer treatment of THz passive device images with the high image quality
NASA Astrophysics Data System (ADS)
Trofimov, Vyacheslav A.; Trofimov, Vladislav V.
2012-06-01
We demonstrate real-time computer code improving significantly the quality of images captured by the passive THz imaging system. The code is not only designed for a THz passive device: it can be applied to any kind of such devices and active THz imaging systems as well. We applied our code for computer processing of images captured by four passive THz imaging devices manufactured by different companies. It should be stressed that computer processing of images produced by different companies requires using the different spatial filters usually. The performance of current version of the computer code is greater than one image per second for a THz image having more than 5000 pixels and 24 bit number representation. Processing of THz single image produces about 20 images simultaneously corresponding to various spatial filters. The computer code allows increasing the number of pixels for processed images without noticeable reduction of image quality. The performance of the computer code can be increased many times using parallel algorithms for processing the image. We develop original spatial filters which allow one to see objects with sizes less than 2 cm. The imagery is produced by passive THz imaging devices which captured the images of objects hidden under opaque clothes. For images with high noise we develop an approach which results in suppression of the noise after using the computer processing and we obtain the good quality image. With the aim of illustrating the efficiency of the developed approach we demonstrate the detection of the liquid explosive, ordinary explosive, knife, pistol, metal plate, CD, ceramics, chocolate and other objects hidden under opaque clothes. The results demonstrate the high efficiency of our approach for the detection of hidden objects and they are a very promising solution for the security problem.
Driver drowsiness detection using ANN image processing
NASA Astrophysics Data System (ADS)
Vesselenyi, T.; Moca, S.; Rus, A.; Mitran, T.; Tătaru, B.
2017-10-01
The paper presents a study regarding the possibility to develop a drowsiness detection system for car drivers based on three types of methods: EEG and EOG signal processing and driver image analysis. In previous works the authors have described the researches on the first two methods. In this paper the authors have studied the possibility to detect the drowsy or alert state of the driver based on the images taken during driving and by analyzing the state of the driver’s eyes: opened, half-opened and closed. For this purpose two kinds of artificial neural networks were employed: a 1 hidden layer network and an autoencoder network.
Polarization of the Cosmic Microwave Background: Are These Guys Serious?
NASA Technical Reports Server (NTRS)
Kogut, Alan
2007-01-01
The polarization of the cosmic microwave background (CMB) could contain the oldest information in the universe, dating from an inflationary epoch just after the Big Bang. Detecting this signal presents an experimental challenge, as it is both faint and hidden behind complicated foregrounds. The rewards, however, are great, as a positive detection would not only establish inflation as a physical reality but also provide a model-independent measurement of the relevant energy scale. I will present the scientific motivation behind measurements of the CMB polarization and discuss how recent experimental progress could lead to a detection in the not-very-distant future.
Enhancement of OCT images with vinyl polysiloxane (VPS)
NASA Astrophysics Data System (ADS)
Kang, Hobin; Darling, Cynthia L.; Fried, Daniel
2016-02-01
Several studies have shown that optical coherence tomography (OCT) can be used to measure the remaining enamel thickness and detect the location of subsurface lesions hidden under the sound enamel. Moreover studies have shown that high refractive index liquids can be used to improve the visibility of subsurface lesions in OCT images. In this study, we demonstrate that vinyl polysiloxane (VPS) impression materials which are routinely used in dentistry can be used to enhance the detection of dentinal lesions on tooth occlusal surfaces. Lesion presence was confirmed with polarized light microscopy and microradiography.
Sahin, Yasar Guneri; Ercan, Tuncay
2008-01-01
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted. PMID:27879941
Estimating parameters of hidden Markov models based on marked individuals: use of robust design data
Kendall, William L.; White, Gary C.; Hines, James E.; Langtimm, Catherine A.; Yoshizaki, Jun
2012-01-01
Development and use of multistate mark-recapture models, which provide estimates of parameters of Markov processes in the face of imperfect detection, have become common over the last twenty years. Recently, estimating parameters of hidden Markov models, where the state of an individual can be uncertain even when it is detected, has received attention. Previous work has shown that ignoring state uncertainty biases estimates of survival and state transition probabilities, thereby reducing the power to detect effects. Efforts to adjust for state uncertainty have included special cases and a general framework for a single sample per period of interest. We provide a flexible framework for adjusting for state uncertainty in multistate models, while utilizing multiple sampling occasions per period of interest to increase precision and remove parameter redundancy. These models also produce direct estimates of state structure for each primary period, even for the case where there is just one sampling occasion. We apply our model to expected value data, and to data from a study of Florida manatees, to provide examples of the improvement in precision due to secondary capture occasions. We also provide user-friendly software to implement these models. This general framework could also be used by practitioners to consider constrained models of particular interest, or model the relationship between within-primary period parameters (e.g., state structure) and between-primary period parameters (e.g., state transition probabilities).
Sahin, Yasar Guneri; Ercan, Tuncay
2008-07-25
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.
Eavesdropping on insects hidden in soil and interior structures of plants.
Mankin, R W; Brandhorst-Hubbard, J; Flanders, K L; Zhang, M; Crocker, R L; Lapointe, S L; McCoy, C W; Fisher, J R; Weaver, D K
2000-08-01
Accelerometer, electret microphone, and piezoelectric disk acoustic systems were evaluated for their potential to detect hidden insect infestations in soil and interior structures of plants. Coleopteran grubs (the scarabaeids Phyllophaga spp. and Cyclocephala spp.) and the curculionids Diaprepes abbreviatus (L.) and Otiorhynchus sulcatus (F.) weighing 50-300 mg were detected easily in the laboratory and in the field except under extremely windy or noisy conditions. Cephus cinctus Norton (Hymenoptera: Cephidae) larvae weighing 1-12 mg could be detected in small pots of wheat in the laboratory by taking moderate precautions to eliminate background noise. Insect sounds could be distinguished from background noises by differences in frequency and temporal patterns, but insects of similarly sized species could not be distinguished easily from each other. Insect activity was highly variable among individuals and species, although D. abbreviatus grubs tended to be more active than those of O. sulcatus. Tests were done to compare acoustically predicted infestations with the contents of soil samples taken at recording sites. Under laboratory or ideal field conditions, active insects within approximately 30 cm were identified with nearly 100% reliability. In field tests under adverse conditions, the reliability decreased to approximately 75%. These results indicate that acoustic systems with vibration sensors have considerable potential as activity monitors in the laboratory and as field tools for rapid, nondestructive scouting and mapping of soil insect populations.
Searching for Extragalactic Sources in the VISTA Variables in the Vía Láctea Survey
NASA Astrophysics Data System (ADS)
Baravalle, Laura D.; Alonso, M. Victoria; Nilo Castellón, José Luis; Beamín, Juan Carlos; Minniti, Dante
2018-01-01
We search for extragalactic sources in the VISTA Variables in the Vía Láctea survey that are hidden by the Galaxy. Herein, we describe our photometric procedure to find and characterize extragalactic objects using a combination of SExtractor and PSFEx. It was applied in two tiles of the survey: d010 and d115, without previous extragalactic IR detections, in order to obtain photometric parameters of the detected sources. The adopted criteria to define extragalactic candidates include CLASSSTAR< 0.3; 1.0 < R1/2< 5.0 arcsec; 2.1 < C < 5 and Φ > 0.002 and the colors: 0.5 < (J–K s ) < 2.0 mag; 0.0 < (J–H) < 1.0 mag; 0.0 < (H–K s ) < 2.0 mag and (J–H) + 0.9 (H–K s ) > 0.44 mag. We detected 345 and 185 extragalactic candidates in the d010 and d115 tiles, respectively. All of them were visually inspected and confirmed to be galaxies. In general, they are small and more circular objects, due to the near-IR sensitivity to select more compact objects with higher surface brightness. The procedure will be used to identify extragalactic objects in other tiles of the VVV disk, which will allow us to study the distribution of galaxies and filaments hidden by the Milky Way.
Personal messages reduce vandalism and theft of unattended scientific equipment
Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R
2014-01-01
Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal,neutral or threatening, for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c. 40–60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure. PMID:25866614
Personality predicts the propensity for social learning in a wild primate
Marshall, Harry H.; Heinsohn, Robert; Cowlishaw, Guy
2014-01-01
Social learning can play a critical role in the reproduction and survival of social animals. Individual differences in the propensity for social learning are therefore likely to have important fitness consequences. We asked whether personality might underpin such individual variation in a wild population of chacma baboons (Papio ursinus). We used two field experiments in which individuals had the opportunity to learn how to solve a task from an experienced conspecific demonstrator: exploitation of a novel food and a hidden item of known food. We investigated whether the (1) time spent watching a demonstrator and (2) changes in task-solving behaviour after watching a demonstrator were related to personality. We found that both boldness and anxiety influenced individual performance in social learning. Specifically, bolder and more anxious animals were more likely to show a greater improvement in task solving after watching a demonstrator. In addition, there was also evidence that the acquisition of social information was not always correlated with its use. These findings present new insights into the costs and benefits of different personality types, and have important implications for the evolution of social learning. PMID:24688861
Personal messages reduce vandalism and theft of unattended scientific equipment.
Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R
2014-02-01
Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal , neutral or threatening , for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c . 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.
[A phone survey of prostitute services in homes].
Mravcík, V; Sebáková, H
2002-10-25
Home prostitution is the hidden form of commercial sex network. We had done a phone survey of commercial sexual services provided in the private flats. We had used advertisements in the section "Intim services" of local adnewspaper "Avizo" as the primary source of relevant phone numbers. "Avizo" is sold in Northern Moravia--mainly in Ostrava, Karvina and Frydek-Mistek districts. We accomplished the phone interview with 48 subjects (individual persons or groups working in the particular flat) using the set of prepared questions. Three of these subjects were male, providing commercial sex for women. We estimated the number of such private flats, number of persons working there and number of professional contacts of this type in Karvina, Ostrava districts and whole Czech republic. We constructed an estimate of sexual sex workers for whole Czech republic--10,200 persons, therefrom 5100 persons in 1750 private flats, who accomplish to 1.36 mil sexual contact with customers annually. Regarding the risk behaviour nearly all of interviewed subjects indicated the use of condoms; 80% of subjects reported to be HIV-tested.
Can personality predict individual differences in brook trout spatial learning ability?
White, S.L.; Wagner, Tyler; Gowan, C.; Braithwaite, V.A.
2017-01-01
While differences in individual personality are common in animal populations, understanding the ecological significance of variation has not yet been resolved. Evidence suggests that personality may influence learning and memory; a finding that could improve our understanding of the evolutionary processes that produce and maintain intraspecific behavioural heterogeneity. Here, we tested whether boldness, the most studied personality trait in fish, could predict learning ability in brook trout. After quantifying boldness, fish were trained to find a hidden food patch in a maze environment. Stable landmark cues were provided to indicate the location of food and, at the conclusion of training, cues were rearranged to test for learning. There was a negative relationship between boldness and learning as shy fish were increasingly more successful at navigating the maze and locating food during training trials compared to bold fish. In the altered testing environment, only shy fish continued using cues to search for food. Overall, the learning rate of bold fish was found to be lower than that of shy fish for several metrics suggesting that personality could have widespread effects on behaviour. Because learning can increase plasticity to environmental change, these results have significant implications for fish conservation.
Gerasimova, N. S.; Pestov, N. A.; Kulaeva, O. I.; Clark, D. J.; Studitsky, V. M.
2016-01-01
ABSTRACT RNA polymerase II (Pol II) transcription through chromatin is accompanied by formation of small intranucleosomal DNA loops. Pol II captured within a small loop drives accumulation of DNA supercoiling, facilitating further transcription. DNA breaks relieve supercoiling and induce Pol II arrest, allowing detection of DNA damage hidden in chromatin structure. PMID:27115204
NASA Astrophysics Data System (ADS)
Lipetzky, Kirsten G.; Novack, Michele R.; Perez, Ignacio; Davis, William R.
2001-11-01
Three different innovative nondestructive evaluation technologies were developed and evaluated for the ability to detect fatigue cracks and corrosion hidden under painted aluminum panels. The three technologies included real-time ultrasound imaging, thermal imaging, and near-field microwave imaging. With each of these nondestructive inspection methods, subtasks were performed in order to optimize each methodology.
Human--and anti-Human--Values in Children's Books. Guidelines for the Future.
ERIC Educational Resources Information Center
Council on Interracial Books for Children, Inc., New York, NY.
The criteria developed by the Council on Interracial Books for Children over the ten years that it has spent reviewing the value content of literature for young people is contained in this volume. The book also provides a new and unique content rating instrument designed to help parents, librarians, and teachers detect hidden messages and unstated…
Detection of hidden shot balls in a gas-cooled turbine blade with an NRT gadolinium tagging method
NASA Astrophysics Data System (ADS)
Sim, Cheul Muu; Kim, Yi Kyung; Kim, TaeJoo; Lee, Kye Hong; Kim, Jeong Uk
2009-06-01
This report provides a preliminary insight into the benefits and effectiveness of neutron radiography in identifying alien materials, namely shot balls hidden in a turbine blade that are otherwise undetected using other methods. The detection of 0.2-mm-diameter shot balls in gas-cooled turbine blades is possible for thermal neutron radiography. A tagging processing is more useful for a distinctive image of newer turbine blades. Areas of concern for the tagging process include the solution concentration and the possibility of a slight washing of the blades. The location of the shot balls within the turbine blades tagged with Gd((2%, 5%)+water) was shown. Shot balls were placed externally on a turbine blade (F100-700, F100-200) surface in order to check for a dead zone from a surface examination. The image is produced from neutron radiography after a 5 min exposure time. When the blade is tagged with 2% and 5% Gd with slight washing, the shot can also be effectively seen on the SR-45 film. Shot balls are more obvious on a neutron image SR-45 film than an image plate or a DR film.
Takeda, Yuka; Sano, Hideki; Kawano, Asuka; Mochizuki, Kazuhiro; Takahashi, Nobuhisa; Kobayashi, Shogo; Ohara, Yoshihiro; Tasaki, Kazuhiro; Hosoya, Mitusuaki; Kikuta, Atsushi
2018-05-03
Ganglioneuroblastoma, nodular is defined as a composite tumor of biologically distinct clones. The peripheral neuroblastic tumors in this category are characterized by the presence of grossly visible neuroblastoma nodules coexisting with ganglioneuroblastoma, intermixed, or with ganglioneuroma. Making a correct diagnosis of ganglioneuroblastoma, nodular is often difficult by biopsy or partial tumor resection, because the neuroblastic nodule could be hidden and not sampled for pathological examination. We report a case of a Japanese boy aged 3 years, 8 months, with an unresectable abdominal tumor and elevated vanillylmandelic acid and homovanillic acid levels. The initial biopsy was ganglioneuroma. However, after the second biopsy from a hidden neuroblastoma nodule that was clearly highlighted by fluorodeoxyglucose positron emission tomography/computed tomography, we reached the diagnosis of ganglioneuroblastoma, nodular. Because the nodule demonstrated neuroblastoma, differentiating subtype, with a low mitosis-karyorrhexis index (favorable histology) and nonamplified MYCN, the boy was treated according to the intermediate-risk protocol and is now alive and well 4 years after the diagnosis. This case illustrates the critical role of fluorodeoxyglucose positron emission tomography/computed tomography for detecting a neuroblastoma nodule in a ganglioneuroblastoma.
Application of hidden Markov models to biological data mining: a case study
NASA Astrophysics Data System (ADS)
Yin, Michael M.; Wang, Jason T.
2000-04-01
In this paper we present an example of biological data mining: the detection of splicing junction acceptors in eukaryotic genes. Identification or prediction of transcribed sequences from within genomic DNA has been a major rate-limiting step in the pursuit of genes. Programs currently available are far from being powerful enough to elucidate the gene structure completely. Here we develop a hidden Markov model (HMM) to represent the degeneracy features of splicing junction acceptor sites in eukaryotic genes. The HMM system is fully trained using an expectation maximization (EM) algorithm and the system performance is evaluated using the 10-way cross- validation method. Experimental results show that our HMM system can correctly classify more than 94% of the candidate sequences (including true and false acceptor sites) into right categories. About 90% of the true acceptor sites and 96% of the false acceptor sites in the test data are classified correctly. These results are very promising considering that only the local information in DNA is used. The proposed model will be a very important component of an effective and accurate gene structure detection system currently being developed in our lab.
Black holes and gravitational waves in models of minicharged dark matter
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cardoso, Vitor; Perimeter Institute for Theoretical Physics,31 Caroline Street North Waterloo, Ontario N2L 2Y5; Macedo, Caio F.B.
In viable models of minicharged dark matter, astrophysical black holes might be charged under a hidden U(1) symmetry and are formally described by the same Kerr-Newman solution of Einstein-Maxwell theory. These objects are unique probes of minicharged dark matter and dark photons. We show that the recent gravitational-wave detection of a binary black-hole coalescence by aLIGO provides various observational bounds on the black hole’s charge, regardless of its nature. The pre-merger inspiral phase can be used to constrain the dipolar emission of (ordinary and dark) photons, whereas the detection of the quasinormal modes set an upper limit on the finalmore » black hole’s charge. By using a toy model of a point charge plunging into a Reissner-Nordstrom black hole, we also show that in dynamical processes the (hidden) electromagnetic quasinormal modes of the final object are excited to considerable amplitude in the gravitational-wave spectrum only when the black hole is nearly extremal. The coalescence produces a burst of low-frequency dark photons which might provide a possible electromagnetic counterpart to black-hole mergers in these scenarios.« less
Noise-free accurate count of microbial colonies by time-lapse shadow image analysis.
Ogawa, Hiroyuki; Nasu, Senshi; Takeshige, Motomu; Funabashi, Hisakage; Saito, Mikako; Matsuoka, Hideaki
2012-12-01
Microbial colonies in food matrices could be counted accurately by a novel noise-free method based on time-lapse shadow image analysis. An agar plate containing many clusters of microbial colonies and/or meat fragments was trans-illuminated to project their 2-dimensional (2D) shadow images on a color CCD camera. The 2D shadow images of every cluster distributed within a 3-mm thick agar layer were captured in focus simultaneously by means of a multiple focusing system, and were then converted to 3-dimensional (3D) shadow images. By time-lapse analysis of the 3D shadow images, it was determined whether each cluster comprised single or multiple colonies or a meat fragment. The analytical precision was high enough to be able to distinguish a microbial colony from a meat fragment, to recognize an oval image as two colonies contacting each other, and to detect microbial colonies hidden under a food fragment. The detection of hidden colonies is its outstanding performance in comparison with other systems. The present system attained accuracy for counting fewer than 5 colonies and is therefore of practical importance. Copyright © 2012 Elsevier B.V. All rights reserved.
A hidden Markov model for decoding and the analysis of replay in spike trains.
Box, Marc; Jones, Matt W; Whiteley, Nick
2016-12-01
We present a hidden Markov model that describes variation in an animal's position associated with varying levels of activity in action potential spike trains of individual place cell neurons. The model incorporates a coarse-graining of position, which we find to be a more parsimonious description of the system than other models. We use a sequential Monte Carlo algorithm for Bayesian inference of model parameters, including the state space dimension, and we explain how to estimate position from spike train observations (decoding). We obtain greater accuracy over other methods in the conditions of high temporal resolution and small neuronal sample size. We also present a novel, model-based approach to the study of replay: the expression of spike train activity related to behaviour during times of motionlessness or sleep, thought to be integral to the consolidation of long-term memories. We demonstrate how we can detect the time, information content and compression rate of replay events in simulated and real hippocampal data recorded from rats in two different environments, and verify the correlation between the times of detected replay events and of sharp wave/ripples in the local field potential.
Functional neuronal processing of human body odors.
Lundström, Johan N; Olsson, Mats J
2010-01-01
Body odors carry informational cues of great importance for individuals across a wide range of species, and signals hidden within the body odor cocktail are known to regulate several key behaviors in animals. For a long time, the notion that humans may be among these species has been dismissed. We now know, however, that each human has a unique odor signature that carries information related to his or her genetic makeup, as well as information about personal environmental variables, such as diet and hygiene. Although a substantial number of studies have investigated the behavioral effects of body odors, only a handful have studied central processing. Recent studies have, however, demonstrated that the human brain responds to fear signals hidden within the body odor cocktail, is able to extract kin specific signals, and processes body odors differently than other perceptually similar odors. In this chapter, we provide an overview of the current knowledge of how the human brain processes body odors and the potential importance these signals have for us in everyday life. Copyright © 2010 Elsevier Inc. All rights reserved.
Navarro, Salvador
2014-11-01
Because of its retrogastric location and appearance, which is similar to mesenteric fat, for centuries the pancreas has been a mysterious, hidden organ that has received little attention. However, its importance was intuited and described by Herophilus, Ruphos of Ephesus and Galen. This gland began to appearin distinct medical treatises from the 16th century. There are two important scientists in the history of the pancreas. The fist, Johann Georg Wirsung, described the main pancreatic duct in 1642, a date considered by many to be the start of Pancreatology. The second, Claude Bernard, described pancreatic exocrine function between 1849 and 1856 and is considered the father of pancreatic physiology. Besides these two outstanding figures, there is a constellation of personalities who contributed to improving knowledge of this enigmatic gland with the results of their studies. The aim of this article is to call attention to some of the most notable findings that have enhanced knowledge of this gland over the years. Copyright © 2014 Elsevier España, S.L.U. and AEEH y AEG. All rights reserved.
Detection of hidden objects using a real-time 3-D millimeter-wave imaging system
NASA Astrophysics Data System (ADS)
Rozban, Daniel; Aharon, Avihai; Levanon, Assaf; Abramovich, Amir; Yitzhaky, Yitzhak; Kopeika, N. S.
2014-10-01
Millimeter (mm)and sub-mm wavelengths or terahertz (THz) band have several properties that motivate their use in imaging for security applications such as recognition of hidden objects, dangerous materials, aerosols, imaging through walls as in hostage situations, and also in bad weather conditions. There is no known ionization hazard for biological tissue, and atmospheric degradation of THz radiation is relatively low for practical imaging distances. We recently developed a new technology for the detection of THz radiation. This technology is based on very inexpensive plasma neon indicator lamps, also known as Glow Discharge Detector (GDD), that can be used as very sensitive THz radiation detectors. Using them, we designed and constructed a Focal Plane Array (FPA) and obtained recognizable2-dimensional THz images of both dielectric and metallic objects. Using THz wave it is shown here that even concealed weapons made of dielectric material can be detected. An example is an image of a knife concealed inside a leather bag and also under heavy clothing. Three-dimensional imaging using radar methods can enhance those images since it can allow the isolation of the concealed objects from the body and environmental clutter such as nearby furniture or other people. The GDDs enable direct heterodyning between the electric field of the target signal and the reference signal eliminating the requirement for expensive mixers, sources, and Low Noise Amplifiers (LNAs).We expanded the ability of the FPA so that we are able to obtain recognizable 2-dimensional THz images in real time. We show here that the THz detection of objects in three dimensions, using FMCW principles is also applicable in real time. This imaging system is also shown here to be capable of imaging objects from distances allowing standoff detection of suspicious objects and humans from large distances.
Stop! border ahead: Automatic detection of subthalamic exit during deep brain stimulation surgery.
Valsky, Dan; Marmor-Levin, Odeya; Deffains, Marc; Eitan, Renana; Blackwell, Kim T; Bergman, Hagai; Israel, Zvi
2017-01-01
Microelectrode recordings along preplanned trajectories are often used for accurate definition of the subthalamic nucleus (STN) borders during deep brain stimulation (DBS) surgery for Parkinson's disease. Usually, the demarcation of the STN borders is performed manually by a neurophysiologist. The exact detection of the borders is difficult, especially detecting the transition between the STN and the substantia nigra pars reticulata. Consequently, demarcation may be inaccurate, leading to suboptimal location of the DBS lead and inadequate clinical outcomes. We present machine-learning classification procedures that use microelectrode recording power spectra and allow for real-time, high-accuracy discrimination between the STN and substantia nigra pars reticulata. A support vector machine procedure was tested on microelectrode recordings from 58 trajectories that included both STN and substantia nigra pars reticulata that achieved a 97.6% consistency with human expert classification (evaluated by 10-fold cross-validation). We used the same data set as a training set to find the optimal parameters for a hidden Markov model using both microelectrode recording features and trajectory history to enable real-time classification of the ventral STN border (STN exit). Seventy-three additional trajectories were used to test the reliability of the learned statistical model in identifying the exit from the STN. The hidden Markov model procedure identified the STN exit with an error of 0.04 ± 0.18 mm and detection reliability (error < 1 mm) of 94%. The results indicate that robust, accurate, and automatic real-time electrophysiological detection of the ventral STN border is feasible. © 2016 International Parkinson and Movement Disorder Society. © 2016 International Parkinson and Movement Disorder Society.
NASA Astrophysics Data System (ADS)
Leonov, G. A.; Kuznetsov, N. V.
From a computational point of view, in nonlinear dynamical systems, attractors can be regarded as self-excited and hidden attractors. Self-excited attractors can be localized numerically by a standard computational procedure, in which after a transient process a trajectory, starting from a point of unstable manifold in a neighborhood of equilibrium, reaches a state of oscillation, therefore one can easily identify it. In contrast, for a hidden attractor, a basin of attraction does not intersect with small neighborhoods of equilibria. While classical attractors are self-excited, attractors can therefore be obtained numerically by the standard computational procedure. For localization of hidden attractors it is necessary to develop special procedures, since there are no similar transient processes leading to such attractors. At first, the problem of investigating hidden oscillations arose in the second part of Hilbert's 16th problem (1900). The first nontrivial results were obtained in Bautin's works, which were devoted to constructing nested limit cycles in quadratic systems, that showed the necessity of studying hidden oscillations for solving this problem. Later, the problem of analyzing hidden oscillations arose from engineering problems in automatic control. In the 50-60s of the last century, the investigations of widely known Markus-Yamabe's, Aizerman's, and Kalman's conjectures on absolute stability have led to the finding of hidden oscillations in automatic control systems with a unique stable stationary point. In 1961, Gubar revealed a gap in Kapranov's work on phase locked-loops (PLL) and showed the possibility of the existence of hidden oscillations in PLL. At the end of the last century, the difficulties in analyzing hidden oscillations arose in simulations of drilling systems and aircraft's control systems (anti-windup) which caused crashes. Further investigations on hidden oscillations were greatly encouraged by the present authors' discovery, in 2010 (for the first time), of chaotic hidden attractor in Chua's circuit. This survey is dedicated to efficient analytical-numerical methods for the study of hidden oscillations. Here, an attempt is made to reflect the current trends in the synthesis of analytical and numerical methods.
Detecting ultralight bosonic dark matter via absorption in superconductors
Hochberg, Yonit; Lin, Tongyan; Zurek, Kathryn M.
2016-07-18
Superconducting targets have recently been proposed for the direct detection of dark matter as light as a keV, via elastic scattering off conduction electrons in Cooper pairs. Detecting such light dark matter requires sensitivity to energies as small as the superconducting gap of O(meV). Here we show that these same superconducting devices can detect much lighter DM, of meV to eV mass, via dark matter absorption on a conduction electron, followed by emission of an athermal phonon. Lastly, we demonstrate the power of this setup for relic kinetically mixed hidden photons, pseudoscalars, and scalars, showing that the reach can exceedmore » current astrophysical and terrestrial constraints with only a moderate exposure.« less
NASA Astrophysics Data System (ADS)
Afdala, Adfal; Nuryani, Nuryani; Satrio Nugroho, Anto
2017-01-01
Atrial fibrillation (AF) is a disorder of the heart with fairly high mortality in adults. AF is a common heart arrythmia which is characterized by a missing or irregular contraction of atria. Therefore, finding a method to detect atrial fibrillation is necessary. In this article a system to detect atrial fibrillation has been proposed. Detection system utilized backpropagation artifical neural network. Data input in this method includes power spectrum density of R-peaks interval of electrocardiogram which is selected by wrapping method. This research uses parameter learning rate, momentum, epoch and hidden layer. System produces good performance with accuracy, sensitivity, and specificity of 83.55%, 86.72 % and 81.47 %, respectively.
Engelhardt, Benjamin; Kschischo, Maik; Fröhlich, Holger
2017-06-01
Ordinary differential equations (ODEs) are a popular approach to quantitatively model molecular networks based on biological knowledge. However, such knowledge is typically restricted. Wrongly modelled biological mechanisms as well as relevant external influence factors that are not included into the model are likely to manifest in major discrepancies between model predictions and experimental data. Finding the exact reasons for such observed discrepancies can be quite challenging in practice. In order to address this issue, we suggest a Bayesian approach to estimate hidden influences in ODE-based models. The method can distinguish between exogenous and endogenous hidden influences. Thus, we can detect wrongly specified as well as missed molecular interactions in the model. We demonstrate the performance of our Bayesian dynamic elastic-net with several ordinary differential equation models from the literature, such as human JAK-STAT signalling, information processing at the erythropoietin receptor, isomerization of liquid α -Pinene, G protein cycling in yeast and UV-B triggered signalling in plants. Moreover, we investigate a set of commonly known network motifs and a gene-regulatory network. Altogether our method supports the modeller in an algorithmic manner to identify possible sources of errors in ODE-based models on the basis of experimental data. © 2017 The Author(s).
Colonoscopy video quality assessment using hidden Markov random fields
NASA Astrophysics Data System (ADS)
Park, Sun Young; Sargent, Dusty; Spofford, Inbar; Vosburgh, Kirby
2011-03-01
With colonoscopy becoming a common procedure for individuals aged 50 or more who are at risk of developing colorectal cancer (CRC), colon video data is being accumulated at an ever increasing rate. However, the clinically valuable information contained in these videos is not being maximally exploited to improve patient care and accelerate the development of new screening methods. One of the well-known difficulties in colonoscopy video analysis is the abundance of frames with no diagnostic information. Approximately 40% - 50% of the frames in a colonoscopy video are contaminated by noise, acquisition errors, glare, blur, and uneven illumination. Therefore, filtering out low quality frames containing no diagnostic information can significantly improve the efficiency of colonoscopy video analysis. To address this challenge, we present a quality assessment algorithm to detect and remove low quality, uninformative frames. The goal of our algorithm is to discard low quality frames while retaining all diagnostically relevant information. Our algorithm is based on a hidden Markov model (HMM) in combination with two measures of data quality to filter out uninformative frames. Furthermore, we present a two-level framework based on an embedded hidden Markov model (EHHM) to incorporate the proposed quality assessment algorithm into a complete, automated diagnostic image analysis system for colonoscopy video.
Accurate step-hold tracking of smoothly varying periodic and aperiodic probability.
Ricci, Matthew; Gallistel, Randy
2017-07-01
Subjects observing many samples from a Bernoulli distribution are able to perceive an estimate of the generating parameter. A question of fundamental importance is how the current percept-what we think the probability now is-depends on the sequence of observed samples. Answers to this question are strongly constrained by the manner in which the current percept changes in response to changes in the hidden parameter. Subjects do not update their percept trial-by-trial when the hidden probability undergoes unpredictable and unsignaled step changes; instead, they update it only intermittently in a step-hold pattern. It could be that the step-hold pattern is not essential to the perception of probability and is only an artifact of step changes in the hidden parameter. However, we now report that the step-hold pattern obtains even when the parameter varies slowly and smoothly. It obtains even when the smooth variation is periodic (sinusoidal) and perceived as such. We elaborate on a previously published theory that accounts for: (i) the quantitative properties of the step-hold update pattern; (ii) subjects' quick and accurate reporting of changes; (iii) subjects' second thoughts about previously reported changes; (iv) subjects' detection of higher-order structure in patterns of change. We also call attention to the challenges these results pose for trial-by-trial updating theories.
Detection of possible restriction sites for type II restriction enzymes in DNA sequences.
Gagniuc, P; Cimponeriu, D; Ionescu-Tîrgovişte, C; Mihai, Andrada; Stavarachi, Monica; Mihai, T; Gavrilă, L
2011-01-01
In order to make a step forward in the knowledge of the mechanism operating in complex polygenic disorders such as diabetes and obesity, this paper proposes a new algorithm (PRSD -possible restriction site detection) and its implementation in Applied Genetics software. This software can be used for in silico detection of potential (hidden) recognition sites for endonucleases and for nucleotide repeats identification. The recognition sites for endonucleases may result from hidden sequences through deletion or insertion of a specific number of nucleotides. Tests were conducted on DNA sequences downloaded from NCBI servers using specific recognition sites for common type II restriction enzymes introduced in the software database (n = 126). Each possible recognition site indicated by the PRSD algorithm implemented in Applied Genetics was checked and confirmed by NEBcutter V2.0 and Webcutter 2.0 software. In the sequence NG_008724.1 (which includes 63632 nucleotides) we found a high number of potential restriction sites for ECO R1 that may be produced by deletion (n = 43 sites) or insertion (n = 591 sites) of one nucleotide. The second module of Applied Genetics has been designed to find simple repeats sizes with a real future in understanding the role of SNPs (Single Nucleotide Polymorphisms) in the pathogenesis of the complex metabolic disorders. We have tested the presence of simple repetitive sequences in five DNA sequence. The software indicated exact position of each repeats detected in the tested sequences. Future development of Applied Genetics can provide an alternative for powerful tools used to search for restriction sites or repetitive sequences or to improve genotyping methods.
Hiding earthquakes from scrupulous monitoring eyes of dense local seismic networks
NASA Astrophysics Data System (ADS)
Bogiatzis, P.; Ishii, M.; Kiser, E.
2012-12-01
Accurate and complete cataloguing of aftershocks is essential for a variety of purposes, including the estimation of the mainshock rupture area, the identification of seismic gaps, and seismic hazard assessment. However, immediately following large earthquakes, the seismograms recorded by local networks are noisy, with energy arriving from hundreds of aftershocks, in addition to different seismic phases interfering with one another. This causes deterioration in the performance of detection and location of earthquakes using conventional methods such as the S-P approach. This is demonstrated by results of back-projection analysis of teleseismic data showing that a significant number of events are undetected by the Japan Meteorological Agency, within the first twenty-four hours after the Mw9.0 Tohoku-oki, Japan earthquake. The spatial distribution of the hidden events is not arbitrary. Most of these earthquakes are located close to the trench, while some are located at the outer rise. Furthermore, there is a relatively sharp trench-parallel boundary separating the detected and undetected events. We investigate the cause of these hidden earthquakes using forward modeling. The calculation of raypaths for various source locations and takeoff angles with the "shooting" method suggests that this phenomenon is a consequence of the complexities associated with subducting slab. Laterally varying velocity structure defocuses the seismic energy from shallow earthquakes located near the trench and makes the observation of P and S arrivals difficult at stations situated on mainland Japan. Full waveform simulations confirm these results. Our forward calculations also show that the probability of detection is sensitive to the depth of the event. Shallower events near the trench are more difficult to detect than deeper earthquakes that are located inside the subducting plate for which the shadow-zone effect diminishes. The modeling effort is expanded to include three-dimensional structure in velocity and intrinsic attenuation to evaluate possible laterally varying patterns. Our study suggests that the phenomenon of hidden earthquakes could be present at other regions around the world with active subductions. Considering that many of these subduction zones are not as well monitored as Japan, the number of missed events, especially after large earthquakes, could be significant. The results of this work can help to identify "blind spots" of present seismic networks, and can contribute to improving monitoring activities.
Test results of smart aircraft fastener for KC-135 structural integrity
NASA Astrophysics Data System (ADS)
Schoess, Jeffrey N.; Seifert, Greg
1998-07-01
Hidden and inaccessible corrosion in aircraft structures is the number one logistics problem for the US Air Force, with an estimated maintenance cost in excess of $LR 1.0B per year in 1990-equivalent dollars. The Smart Aircraft Fastener Evaluation (SAFE) system was developed to provide early warning detection of corrosion-related symptoms in hidden locations of aircraft structures. The SAFE system incorporates an in situ measurement approach that measures and autonomously records several environmental conditions within a Hi-Lok aircraft fastener that could cause corrosion. The SAFE system integrates a miniature electrochemical microsensor array and a time-of-wetness sensor with an ultra low power 8-bit microcontroller and 4- Mbyte solid-state FLASH archival memory to measure evidence of active corrosion. A summary of the technical approach and a detailed analysis of the KC-135 lap joint test coupon results are presented.
Smart fastener for KC-135 structural integrity monitoring
NASA Astrophysics Data System (ADS)
Schoess, Jeffrey N.; Seifert, Greg
1997-06-01
Hidden and inaccessible corrosion in aircraft structures is the number-one logistics problem for the U.S. Air Force, with an estimated maintenance cost in excess of $DOL1.0 billion per year in 1990-equivalent dollars. The Smart Aircraft Fastener Evaluation (SAFE) system is being developed to provide early warning detection of corrosion- related symptoms in hidden locations of aircraft structures. The SAFE incorporates an in situ measurement approach that measures and autonomously records several environmental conditions (i.e., pH, temperature, chloride, free potential, time-of-wetness) within a Hi-Lok aircraft fastener that could cause corrosion to occur. The SAFE system integrates a miniature electrochemical microsensor array and a time-of- wetness sensor with an ultra-low-power 8-bit microcontroller and 5-Mbyte solid-state FLASH archival memory to measure the evidence of active corrosion. A summary of the technical approach, system design definition, software architecture, and future field test plans will be presented.
Hidden baryons: The physics of Compton composites
NASA Astrophysics Data System (ADS)
Mayer, Frederick J.
2016-06-01
A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.
Automated Cough Assessment on a Mobile Platform
2014-01-01
The development of an Automated System for Asthma Monitoring (ADAM) is described. This consists of a consumer electronics mobile platform running a custom application. The application acquires an audio signal from an external user-worn microphone connected to the device analog-to-digital converter (microphone input). This signal is processed to determine the presence or absence of cough sounds. Symptom tallies and raw audio waveforms are recorded and made easily accessible for later review by a healthcare provider. The symptom detection algorithm is based upon standard speech recognition and machine learning paradigms and consists of an audio feature extraction step followed by a Hidden Markov Model based Viterbi decoder that has been trained on a large database of audio examples from a variety of subjects. Multiple Hidden Markov Model topologies and orders are studied. Performance of the recognizer is presented in terms of the sensitivity and the rate of false alarm as determined in a cross-validation test. PMID:25506590
NASA Astrophysics Data System (ADS)
Krauter, Johann; Osten, Wolfgang
2018-03-01
There are a wide range of applications for micro-electro-mechanical systems (MEMS). The automotive and consumer market is the strongest driver for the growing MEMS industry. A 100 % test of MEMS is particularly necessary since these are often used for safety-related purposes such as the ESP (Electronic Stability Program) system. The production of MEMS is a fully automated process that generates 90 % of the costs during the packaging and dicing steps. Nowadays, an electrical test is carried out on each individual MEMS component before these steps. However, after encapsulation, MEMS are opaque to visible light and other defects cannot be detected. Therefore, we apply an infrared low-coherence interferometer for the topography measurement of those hidden structures. A lock-in algorithm-based method is shown to calculate the object height and to reduce ghost steps due to the 2π -unambiguity. Finally, measurements of different MEMS-based sensors are presented.
The way to uncover community structure with core and diversity
NASA Astrophysics Data System (ADS)
Chang, Y. F.; Han, S. K.; Wang, X. D.
2018-07-01
Communities are ubiquitous in nature and society. Individuals that share common properties often self-organize to form communities. Avoiding the shortages of computation complexity, pre-given information and unstable results in different run, in this paper, we propose a simple and efficient method to deepen our understanding of the emergence and diversity of communities in complex systems. By introducing the rational random selection, our method reveals the hidden deterministic and normal diverse community states of community structure. To demonstrate this method, we test it with real-world systems. The results show that our method could not only detect community structure with high sensitivity and reliability, but also provide instructional information about the hidden deterministic community world and the real normal diverse community world by giving out the core-community, the real-community, the tide and the diversity. Thizs is of paramount importance in understanding, predicting, and controlling a variety of collective behaviors in complex systems.
Quantum Steering Beyond Instrumental Causal Networks
NASA Astrophysics Data System (ADS)
Nery, R. V.; Taddei, M. M.; Chaves, R.; Aolita, L.
2018-04-01
We theoretically predict, and experimentally verify with entangled photons, that outcome communication is not enough for hidden-state models to reproduce quantum steering. Hidden-state models with outcome communication correspond, in turn, to the well-known instrumental processes of causal inference but in the one-sided device-independent scenario of one black-box measurement device and one well-characterized quantum apparatus. We introduce one-sided device-independent instrumental inequalities to test against these models, with the appealing feature of detecting entanglement even when communication of the black box's measurement outcome is allowed. We find that, remarkably, these inequalities can also be violated solely with steering, i.e., without outcome communication. In fact, an efficiently computable formal quantifier—the robustness of noninstrumentality—naturally arises, and we prove that steering alone is enough to maximize it. Our findings imply that quantum theory admits a stronger form of steering than known until now, with fundamental as well as practical potential implications.
Optimal matching for prostate brachytherapy seed localization with dimension reduction.
Lee, Junghoon; Labat, Christian; Jain, Ameet K; Song, Danny Y; Burdette, Everette C; Fichtinger, Gabor; Prince, Jerry L
2009-01-01
In prostate brachytherapy, x-ray fluoroscopy has been used for intra-operative dosimetry to provide qualitative assessment of implant quality. More recent developments have made possible 3D localization of the implanted radioactive seeds. This is usually modeled as an assignment problem and solved by resolving the correspondence of seeds. It is, however, NP-hard, and the problem is even harder in practice due to the significant number of hidden seeds. In this paper, we propose an algorithm that can find an optimal solution from multiple projection images with hidden seeds. It solves an equivalent problem with reduced dimensional complexity, thus allowing us to find an optimal solution in polynomial time. Simulation results show the robustness of the algorithm. It was validated on 5 phantom and 18 patient datasets, successfully localizing the seeds with detection rate of > or = 97.6% and reconstruction error of < or = 1.2 mm. This is considered to be clinically excellent performance.
Fast Bayesian Inference of Copy Number Variants using Hidden Markov Models with Wavelet Compression
Wiedenhoeft, John; Brugel, Eric; Schliep, Alexander
2016-01-01
By integrating Haar wavelets with Hidden Markov Models, we achieve drastically reduced running times for Bayesian inference using Forward-Backward Gibbs sampling. We show that this improves detection of genomic copy number variants (CNV) in array CGH experiments compared to the state-of-the-art, including standard Gibbs sampling. The method concentrates computational effort on chromosomal segments which are difficult to call, by dynamically and adaptively recomputing consecutive blocks of observations likely to share a copy number. This makes routine diagnostic use and re-analysis of legacy data collections feasible; to this end, we also propose an effective automatic prior. An open source software implementation of our method is available at http://schlieplab.org/Software/HaMMLET/ (DOI: 10.5281/zenodo.46262). This paper was selected for oral presentation at RECOMB 2016, and an abstract is published in the conference proceedings. PMID:27177143
Lauridsen, S M R; Norup, M S; Rossel, P J H
2007-12-01
Rationing healthcare is a difficult task, which includes preventing patients from accessing potentially beneficial treatments. Proponents of implicit rationing argue that politicians cannot resist pressure from strong patient groups for treatments and conclude that physicians should ration without informing patients or the public. The authors subdivide this specific programme of implicit rationing, or "hidden rationing", into local hidden rationing, unsophisticated global hidden rationing and sophisticated global hidden rationing. They evaluate the appropriateness of these methods of rationing from the perspectives of individual and political autonomy and conclude that local hidden rationing and unsophisticated global hidden rationing clearly violate patients' individual autonomy, that is, their right to participate in medical decision-making. While sophisticated global hidden rationing avoids this charge, the authors point out that it nonetheless violates the political autonomy of patients, that is, their right to engage in public affairs as citizens. A defence of any of the forms of hidden rationing is therefore considered to be incompatible with a defence of autonomy.
Studies on the properties of an epithermal-neutron hydrogen analyzer.
Papp, A; Csikai, J
2010-09-01
Systematic investigations have proved the advantages of the Epithermal Neutron Analyzer (ETNA) for bulk hydrogen analysis as compared to the thermal neutron techniques. Results can contribute, for example, to the design and construction of instruments needed for the detection and identification of plastic anti-personnel landmines, explosives hidden in airline baggage and cargo containers via hydrogen contents as an indicator of their presence.
Multi-Observation Continuous Density Hidden Markov Models for Anomaly Detection in Full Motion Video
2012-06-01
response profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 3.5 Method for measuring angular movement versus average direction...of movement 49 3.6 Method for calculating Angular Deviation, Θ . . . . . . . . . . . . . . . . . . 50 4.1 HMM produced by K Means Learning for agent H... Angular Deviation. A random variable, the difference in heading (in degrees) from the overall direction of movement over the sequence • S : Speed. A
ABC: Aging-Based IC Configuration
2014-04-01
Benign Hardware Trojan on FPGA-based Embedded Systems Hardware Trojan Horses (HTHs) are hidden structural and functional alterations of an integrated...or highly damaging hardware Trojans [66] [67] [68]. However, while all these efforts created Trojan horses with the intention to demonstrate their...practical importance and/or to facilitate development of the detection techniques, in our case the purpose of the Trojan horse is to directly enable
Collider detection of dark matter electromagnetic anapole moments
NASA Astrophysics Data System (ADS)
Alves, Alexandre; Santos, A. C. O.; Sinha, Kuver
2018-03-01
Dark matter that interacts with the Standard Model by exchanging photons through higher multipole interactions occurs in a wide range of both strongly and weakly coupled hidden sector models. We study the collider detection prospects of these candidates, with a focus on Majorana dark matter that couples through the anapole moment. The study is conducted at the effective field theory level with the mono-Z signature incorporating varying levels of systematic uncertainties at the high-luminosity LHC. The projected collider reach on the anapole moment is then compared to the reach coming from direct detection experiments like LZ. Finally, the analysis is applied to a weakly coupled completion with leptophilic dark matter.
Macro-motion detection using ultra-wideband impulse radar.
Xin Li; Dengyu Qiao; Ye Li
2014-01-01
Radar has the advantage of being able to detect hidden individuals, which can be used in homeland security, disaster rescue, and healthcare monitoring-related applications. Human macro-motion detection using ultra-wideband impulse radar is studied in this paper. First, a frequency domain analysis is carried out to show that the macro-motion yields a bandpass signal in slow-time. Second, the FTFW (fast-time frequency windowing), which has the advantage of avoiding the measuring range reduction, and the HLF (high-pass linear-phase filter), which can preserve the motion signal effectively, are proposed to preprocess the radar echo. Last, a threshold decision method, based on the energy detector structure, is presented.
Generalised chronic musculoskeletal pain as a rational reaction to a life situation?
Steen, E; Haugli, L
2000-11-01
While the biomedical model is still the leading paradigm within modern medicine and health care, and people with generalised chronic musculoskeletal pain are frequent users of health care services, their diagnoses are rated as having the lowest prestige among health care personnel. An epistemological framework for understanding relations between body, emotions, mind and meaning is presented. An approach based on a phenomenological epistemology is discussed as a supplement to actions based on the biomedical model. Within the phenomenological frame of understanding, the body is viewed as a subject and carrier of meaning, and therefore chronic pain can be interpreted as a rational reaction to the totality of a person's life situation. Search for possible hidden individual meanings in painful muscles presupposes meeting health personnel who view the person within a holistic frame of reference.
The Hidden Curriculum as Emancipatory and Non-Emancipatory Tools.
ERIC Educational Resources Information Center
Kanpol, Barry
Moral values implied in school practices and policies constitute the "hidden curriculum." Because the hidden curriculum may promote certain moral values to students, teachers are partially responsible for the moral education of students. A component of the hidden curriculum, institutional political resistance, concerns teacher opposition to…
A Practical Millimeter-Wave Holographic Imaging System with Tunable IF Attenuator
NASA Astrophysics Data System (ADS)
Zhu, Yu-Kun; Yang, Ming-Hui; Wu, Liang; Sun, Yun; Sun, Xiao-Wei
2017-10-01
A practical millimeter-wave (mmw) holographic imaging system with tunable intermediate frequency (IF) attenuator has been developed. It can be used for the detection of concealed weapons at security checkpoints, especially the airport. The system is utilized to scan the passenger and detect the weapons hidden in the clothes. To reconstruct the three dimensions (3-D) image, a holographic mmw imaging algorithm based on aperture synthesis and back scattering is presented. The system is active and works at 28-33 GHz. Tunable IF attenuator is applied to compensate the intensity and phase differences between multi-channels and multi-frequencies.
Hidden instabilities in the Ti:sapphire Kerr lens mode-locked laser.
Kovalsky, M G; Hnilo, A A; González Inchauspe, C M
1999-11-15
It is experimentally shown that pulse-to-pulse instabilities in the output of Kerr lens mode-locked Ti:sapphire lasers are usual and that they can affect some of the pulse variables (e.g., the spot size) and not others (e.g., pulse duration and energy). These instabilities are not detectable in the averaged signals (such as the autocorrelation of the pulse) that are customarily used for controlling the laser. But, if they are present but are disregarded, these instabilities have undesirable consequences in almost any application. A simple way to detect and eliminate the instabilities is described.
Liquid-Xe detector for contraband detection
NASA Astrophysics Data System (ADS)
Vartsky, D.; Israelashvili, I.; Cortesi, M.; Arazi, L.; Coimbra, A. E.; Moleri, L.; Erdal, E.; Bar, D.; Rappaport, M.; Shchemelinin, S.; Caspi, E. N.; Aviv, O.; Breskin, A.
2016-07-01
We describe progress made with a liquid-Xe (LXe) detector coupled to a gaseous photomultiplier (GPM), for combined imaging and spectroscopy of fast neutrons and gamma-rays in the MeV range. The purpose of this detector is to enable the detection of hidden explosives and fissile materials in cargo and containers. The expected position resolution is about 2 m and 3.5 mm for fast neutrons and gamma-rays, respectively. Experimental results obtained using an 241Am source yielded energy and time resolutions of 11% and 1.2 ns RMS, respectively. Initial results obtained with the position-sensitive GPM are presented.
Malaria Hidden in a Patient with Diffuse Large-B-Cell Lymphoma and Sickle-Cell Trait▿
Linares, María; Albizua, Enriqueta; Méndez, Darío; Rubio, José M.; Martínez-Serna, Alejandra; Martínez, Miguel A.; Salto, Efren; Puyet, Antonio; Diez, Amalia; Martinez-López, Joaquin; Bautista, José M.
2011-01-01
We report a case of an African patient with sickle cell trait who was diagnosed in Spain with B-cell lymphoma. Blood smears were negative for malaria, and no plasmodium antigens were detected in the blood. To treat his lymphoma, the patient underwent chemotherapy and autologous stem cell transplantation. Following a splenectomy due to a worsening condition, he developed clinical malaria with detectable parasitemia. This case suggests that the humoral response and parasite removal by the spleen may afford protection from overt disease and may even help maintain subclinical human reservoirs of the disease. PMID:21976762
Malaria hidden in a patient with diffuse large-B-cell lymphoma and sickle-cell trait.
Linares, María; Albizua, Enriqueta; Méndez, Darío; Rubio, José M; Martínez-Serna, Alejandra; Martínez, Miguel A; Salto, Efren; Puyet, Antonio; Diez, Amalia; Martinez-López, Joaquin; Bautista, José M
2011-12-01
We report a case of an African patient with sickle cell trait who was diagnosed in Spain with B-cell lymphoma. Blood smears were negative for malaria, and no plasmodium antigens were detected in the blood. To treat his lymphoma, the patient underwent chemotherapy and autologous stem cell transplantation. Following a splenectomy due to a worsening condition, he developed clinical malaria with detectable parasitemia. This case suggests that the humoral response and parasite removal by the spleen may afford protection from overt disease and may even help maintain subclinical human reservoirs of the disease.
Low-Complexity Noncoherent Signal Detection for Nanoscale Molecular Communications.
Li, Bin; Sun, Mengwei; Wang, Siyi; Guo, Weisi; Zhao, Chenglin
2016-01-01
Nanoscale molecular communication is a viable way of exchanging information between nanomachines. In this investigation, a low-complexity and noncoherent signal detection technique is proposed to mitigate the inter-symbol-interference (ISI) and additive noise. In contrast to existing coherent detection methods of high complexity, the proposed noncoherent signal detector is more practical when the channel conditions are hard to acquire accurately or hidden from the receiver. The proposed scheme employs the molecular concentration difference to detect the ISI corrupted signals and we demonstrate that it can suppress the ISI effectively. The difference in molecular concentration is a stable characteristic, irrespective of the diffusion channel conditions. In terms of complexity, by excluding matrix operations or likelihood calculations, the new detection scheme is particularly suitable for nanoscale molecular communication systems with a small energy budget or limited computation resource.
2011-01-01
Background Epilepsy is a common neurological disorder characterized by recurrent electrophysiological activities, known as seizures. Without the appropriate detection strategies, these seizure episodes can dramatically affect the quality of life for those afflicted. The rationale of this study is to develop an unsupervised algorithm for the detection of seizure states so that it may be implemented along with potential intervention strategies. Methods Hidden Markov model (HMM) was developed to interpret the state transitions of the in vitro rat hippocampal slice local field potentials (LFPs) during seizure episodes. It can be used to estimate the probability of state transitions and the corresponding characteristics of each state. Wavelet features were clustered and used to differentiate the electrophysiological characteristics at each corresponding HMM states. Using unsupervised training method, the HMM and the clustering parameters were obtained simultaneously. The HMM states were then assigned to the electrophysiological data using expert guided technique. Minimum redundancy maximum relevance (mRMR) analysis and Akaike Information Criterion (AICc) were applied to reduce the effect of over-fitting. The sensitivity, specificity and optimality index of chronic seizure detection were compared for various HMM topologies. The ability of distinguishing early and late tonic firing patterns prior to chronic seizures were also evaluated. Results Significant improvement in state detection performance was achieved when additional wavelet coefficient rates of change information were used as features. The final HMM topology obtained using mRMR and AICc was able to detect non-ictal (interictal), early and late tonic firing, chronic seizures and postictal activities. A mean sensitivity of 95.7%, mean specificity of 98.9% and optimality index of 0.995 in the detection of chronic seizures was achieved. The detection of early and late tonic firing was validated with experimental intracellular electrical recordings of seizures. Conclusions The HMM implementation of a seizure dynamics detector is an improvement over existing approaches using visual detection and complexity measures. The subjectivity involved in partitioning the observed data prior to training can be eliminated. It can also decipher the probabilities of seizure state transitions using the magnitude and rate of change wavelet information of the LFPs. PMID:21504608
Classifying threats with a 14-MeV neutron interrogation system.
Strellis, Dan; Gozani, Tsahi
2005-01-01
SeaPODDS (Sea Portable Drug Detection System) is a non-intrusive tool for detecting concealed threats in hidden compartments of maritime vessels. This system consists of an electronic neutron generator, a gamma-ray detector, a data acquisition computer, and a laptop computer user-interface. Although initially developed to detect narcotics, recent algorithm developments have shown that the system is capable of correctly classifying a threat into one of four distinct categories: narcotic, explosive, chemical weapon, or radiological dispersion device (RDD). Detection of narcotics, explosives, and chemical weapons is based on gamma-ray signatures unique to the chemical elements. Elements are identified by their characteristic prompt gamma-rays induced by fast and thermal neutrons. Detection of RDD is accomplished by detecting gamma-rays emitted by common radioisotopes and nuclear reactor fission products. The algorithm phenomenology for classifying threats into the proper categories is presented here.
Doppler Radar Vital Signs Detection Method Based on Higher Order Cyclostationary.
Yu, Zhibin; Zhao, Duo; Zhang, Zhiqiang
2017-12-26
Due to the non-contact nature, using Doppler radar sensors to detect vital signs such as heart and respiration rates of a human subject is getting more and more attention. However, the related detection-method research meets lots of challenges due to electromagnetic interferences, clutter and random motion interferences. In this paper, a novel third-order cyclic cummulant (TOCC) detection method, which is insensitive to Gaussian interference and non-cyclic signals, is proposed to investigate the heart and respiration rate based on continuous wave Doppler radars. The k -th order cyclostationary properties of the radar signal with hidden periodicities and random motions are analyzed. The third-order cyclostationary detection theory of the heart and respiration rate is studied. Experimental results show that the third-order cyclostationary approach has better estimation accuracy for detecting the vital signs from the received radar signal under low SNR, strong clutter noise and random motion interferences.
A simulation study of gene-by-environment interactions in GWAS implies ample hidden effects
Marigorta, Urko M.; Gibson, Greg
2014-01-01
The switch to a modern lifestyle in recent decades has coincided with a rapid increase in prevalence of obesity and other diseases. These shifts in prevalence could be explained by the release of genetic susceptibility for disease in the form of gene-by-environment (GxE) interactions. Yet, the detection of interaction effects requires large sample sizes, little replication has been reported, and a few studies have demonstrated environmental effects only after summing the risk of GWAS alleles into genetic risk scores (GRSxE). We performed extensive simulations of a quantitative trait controlled by 2500 causal variants to inspect the feasibility to detect gene-by-environment interactions in the context of GWAS. The simulated individuals were assigned either to an ancestral or a modern setting that alters the phenotype by increasing the effect size by 1.05–2-fold at a varying fraction of perturbed SNPs (from 1 to 20%). We report two main results. First, for a wide range of realistic scenarios, highly significant GRSxE is detected despite the absence of individual genotype GxE evidence at the contributing loci. Second, an increase in phenotypic variance after environmental perturbation reduces the power to discover susceptibility variants by GWAS in mixed cohorts with individuals from both ancestral and modern environments. We conclude that a pervasive presence of gene-by-environment effects can remain hidden even though it contributes to the genetic architecture of complex traits. PMID:25101110
NASA Astrophysics Data System (ADS)
Suvorova, S.; Clearwater, P.; Melatos, A.; Sun, L.; Moran, W.; Evans, R. J.
2017-11-01
A hidden Markov model (HMM) scheme for tracking continuous-wave gravitational radiation from neutron stars in low-mass x-ray binaries (LMXBs) with wandering spin is extended by introducing a frequency-domain matched filter, called the J -statistic, which sums the signal power in orbital sidebands coherently. The J -statistic is similar but not identical to the binary-modulated F -statistic computed by demodulation or resampling. By injecting synthetic LMXB signals into Gaussian noise characteristic of the Advanced Laser Interferometer Gravitational-wave Observatory (Advanced LIGO), it is shown that the J -statistic HMM tracker detects signals with characteristic wave strain h0≥2 ×10-26 in 370 d of data from two interferometers, divided into 37 coherent blocks of equal length. When applied to data from Stage I of the Scorpius X-1 Mock Data Challenge organized by the LIGO Scientific Collaboration, the tracker detects all 50 closed injections (h0≥6.84 ×10-26), recovering the frequency with a root-mean-square accuracy of ≤1.95 ×10-5 Hz . Of the 50 injections, 43 (with h0≥1.09 ×10-25) are detected in a single, coherent 10 d block of data. The tracker employs an efficient, recursive HMM solver based on the Viterbi algorithm, which requires ˜105 CPU-hours for a typical broadband (0.5 kHz) LMXB search.
Applications of independent component analysis in SAR images
NASA Astrophysics Data System (ADS)
Huang, Shiqi; Cai, Xinhua; Hui, Weihua; Xu, Ping
2009-07-01
The detection of faint, small and hidden targets in synthetic aperture radar (SAR) image is still an issue for automatic target recognition (ATR) system. How to effectively separate these targets from the complex background is the aim of this paper. Independent component analysis (ICA) theory can enhance SAR image targets and improve signal clutter ratio (SCR), which benefits to detect and recognize faint targets. Therefore, this paper proposes a new SAR image target detection algorithm based on ICA. In experimental process, the fast ICA (FICA) algorithm is utilized. Finally, some real SAR image data is used to test the method. The experimental results verify that the algorithm is feasible, and it can improve the SCR of SAR image and increase the detection rate for the faint small targets.
Magnetic Imaging: a New Tool for UK National Nuclear Security
NASA Astrophysics Data System (ADS)
Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio
2015-01-01
Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.
Magnetic Imaging: a New Tool for UK National Nuclear Security
Darrer, Brendan J.; Watson, Joe C.; Bartlett, Paul; Renzoni, Ferruccio
2015-01-01
Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications. PMID:25608957
Magnetic imaging: a new tool for UK national nuclear security.
Darrer, Brendan J; Watson, Joe C; Bartlett, Paul; Renzoni, Ferruccio
2015-01-22
Combating illicit trafficking of Special Nuclear Material may require the ability to image through electromagnetic shields. This is the case when the trafficking involves cargo containers. Thus, suitable detection techniques are required to penetrate a ferromagnetic enclosure. The present study considers techniques that employ an electromagnetic based principle of detection. It is generally assumed that a ferromagnetic metallic enclosure will effectively act as a Faraday cage to electromagnetic radiation and therefore screen any form of interrogating electromagnetic radiation from penetrating, thus denying the detection of any eventual hidden material. In contrast, we demonstrate that it is actually possible to capture magnetic images of a conductive object through a set of metallic ferromagnetic enclosures. This validates electromagnetic interrogation techniques as a potential detection tool for National Nuclear Security applications.
;height:auto;overflow:hidden}.poc_table .top_row{background-color:#eee;height:auto;overflow:hidden}.poc_table ;background-color:#FFF;height:auto;overflow:hidden;border-top:1px solid #ccc}.poc_table .main_row .name :200px;padding:5px;height:auto;overflow:hidden}.tli_grey_box{background-color:#eaeaea;text-align:center
Natural hidden antibodies reacting with DNA or cardiolipin bind to thymocytes and evoke their death.
Zamulaeva, I A; Lekakh, I V; Kiseleva, V I; Gabai, V L; Saenko, A S; Shevchenko, A S; Poverenny, A M
1997-08-18
Both free and hidden natural antibodies to DNA or cardiolipin were obtained from immunoglobulins of a normal donor. The free antibodies reacting with DNA or cardiolipin were isolated by means of affinity chromatography. Antibodies occurring in an hidden state were disengaged from the depleted immunoglobulins by ion-exchange chromatography and were then affinity-isolated on DNA or cardiolipin sorbents. We used flow cytometry to study the ability of free and hidden antibodies to bind to rat thymocytes. Simultaneously, plasma membrane integrity was tested by propidium iodide (PI) exclusion. The hidden antibodies reacted with 65.2 +/- 10.9% of the thymocytes and caused a fast plasma membrane disruption. Cells (28.7 +/- 7.1%) were stained with PI after incubation with the hidden antibodies for 1 h. The free antibodies bound to a very small fraction of the thymocytes and did not evoke death as compared to control without antibodies. The possible reason for the observed effects is difference in reactivity of the free and hidden antibodies to phospholipids. While free antibodies reacted preferentially with phosphotidylcholine, hidden antibodies reacted with cardiolipin and phosphotidylserine.
Whitcomb, Tiffany L
2014-01-01
The hidden curriculum is characterized by information that is tacitly conveyed to and among students about the cultural and moral environment in which they find themselves. Although the hidden curriculum is often defined as a distinct entity, tacit information is conveyed to students throughout all aspects of formal and informal curricula. This unconsciously communicated knowledge has been identified across a wide spectrum of educational environments and is known to have lasting and powerful impacts, both positive and negative. Recently, medical education research on the hidden curriculum of becoming a doctor has come to the forefront as institutions struggle with inconsistencies between formal and hidden curricula that hinder the practice of patient-centered medicine. Similarly, the complex ethical questions that arise during the practice and teaching of veterinary medicine have the potential to cause disagreement between what the institution sets out to teach and what is actually learned. However, the hidden curriculum remains largely unexplored for this field. Because the hidden curriculum is retained effectively by students, elucidating its underlying messages can be a key component of program refinement. A review of recent literature about the hidden curriculum in a variety of fields, including medical education, will be used to explore potential hidden curricula in veterinary medicine and draw attention to the need for further investigation.
NASA Astrophysics Data System (ADS)
Knapmeyer-Endrun, B.; Hammer, C.
2014-12-01
The seismometers that the Apollo astronauts deployed on the Moon provide the only recordings of seismic events from any extra-terrestrial body so far. These lunar events are significantly different from ones recorded on Earth, in terms of both signal shape and source processes. Thus they are a valuable test case for any experiment in planetary seismology. In this study, we analyze Apollo 16 data with a single-station event detection and classification algorithm in view of NASA's upcoming InSight mission to Mars. InSight, scheduled for launch in early 2016, has the goal to investigate Mars' internal structure by deploying a seismometer on its surface. As the mission does not feature any orbiter, continuous data will be relayed to Earth at a reduced rate. Full range data will only be available by requesting specific time-windows within a few days after the receipt of the original transmission. We apply a recently introduced algorithm based on hidden Markov models that requires only a single example waveform of each event class for training appropriate models. After constructing the prototypes we detect and classify impacts and deep and shallow moonquakes. Initial results for 1972 (year of station installation with 8 months of data) indicate a high detection rate of over 95% for impacts, of which more than 80% are classified correctly. Deep moonquakes, which occur in large amounts, but often show only very weak signals, are detected with less certainty (~70%). As there is only one weak shallow moonquake covered, results for this event class are not statistically significant. Daily adjustments of the background noise model help to reduce false alarms, which are mainly erroneous deep moonquake detections, by about 25%. The algorithm enables us to classify events that were previously listed in the catalog without classification, and, through the combined use of long period and short period data, identify some unlisted local impacts as well as at least two yet unreported deep moonquakes.
Can personality predict individual differences in brook trout spatial learning ability?
White, S L; Wagner, T; Gowan, C; Braithwaite, V A
2017-08-01
While differences in individual personality are common in animal populations, understanding the ecological significance of variation has not yet been resolved. Evidence suggests that personality may influence learning and memory; a finding that could improve our understanding of the evolutionary processes that produce and maintain intraspecific behavioural heterogeneity. Here, we tested whether boldness, the most studied personality trait in fish, could predict learning ability in brook trout. After quantifying boldness, fish were trained to find a hidden food patch in a maze environment. Stable landmark cues were provided to indicate the location of food and, at the conclusion of training, cues were rearranged to test for learning. There was a negative relationship between boldness and learning as shy fish were increasingly more successful at navigating the maze and locating food during training trials compared to bold fish. In the altered testing environment, only shy fish continued using cues to search for food. Overall, the learning rate of bold fish was found to be lower than that of shy fish for several metrics suggesting that personality could have widespread effects on behaviour. Because learning can increase plasticity to environmental change, these results have significant implications for fish conservation. Copyright © 2016 Elsevier B.V. All rights reserved.
1989-04-01
corrosion of rebar Spalling of concrete surface IIl Detect hidden and beginning Location of rebar damage Beginning corrosion of rebar ...honeycombs MD Moderate defects: spalling of concrete minor corrosion of exposed rebar rust stains along rebar with or without visible cracking softening of...velocity. . Replenishment of the attacking chemical hgents. h. Higher temperatures. i. Corrosion of reinforcing steel. 46. Note that concrete which
Steganography Detection Using Entropy Measures
2012-08-19
embedded steganography . For this research freely available software for embedding hidden messages will be used to create sample image files to... LSB ) is a simple approach to modify an image , while at the same time, making the change imperceptible to the human eye. By considering the redundant...to 00001110, we have applied the least significant bit technique. 2.4 Significant Bit Image Depiction Steganography fails to comply in its purpose, at
Harvey, Scott D [Kennewick, WA
2011-06-21
A process and sensor device are disclosed that employ metal .beta.-diketonate polymers to selectively capture gas-phase explosives and weaponized chemical agents in a sampling area or volume. The metal .beta.-diketonate polymers can be applied to surfaces in various analytical formats for detection of: improvised explosive devices, unexploded ordinance, munitions hidden in cargo holds, explosives, and chemical weapons in public areas.
Power Aware Distributed Systems
2004-01-01
detection or threshold functions to trigger the main CPU. The main processor can sleep and either wakeup on a schedule or by a positive threshold event...the RTOS must determine if wake-up latency can be tolerated (or, if it could be hidden by pre- wakeup ). The prediction accuracy for scheduling ...and processor shutdown/ wakeup . This analysis can be used to accurately analyze the schedulability of non-concrete periodic task sets, scheduled using
New Bottom Roughness Calculation from Multibeam Echo Sounders for Mine Warfare
2012-09-01
complex including craters, gullies, seaweed , rocks, sand ridges, tall obstructions, deep holes and sloping regions. Underwater mines can be hidden...and shadows for detecting objects lying on the seafloor. The seafloor is rather complex including craters, gullies, seaweed , rocks, sand ridges, tall...roughness as craters, gullies, seaweed , sand ridges, tall obstructions, deep holes, or steeply sloping regions. Slopes can make it possible for mines to
A Context-Recognition-Aided PDR Localization Method Based on the Hidden Markov Model
Lu, Yi; Wei, Dongyan; Lai, Qifeng; Li, Wen; Yuan, Hong
2016-01-01
Indoor positioning has recently become an important field of interest because global navigation satellite systems (GNSS) are usually unavailable in indoor environments. Pedestrian dead reckoning (PDR) is a promising localization technique for indoor environments since it can be implemented on widely used smartphones equipped with low cost inertial sensors. However, the PDR localization severely suffers from the accumulation of positioning errors, and other external calibration sources should be used. In this paper, a context-recognition-aided PDR localization model is proposed to calibrate PDR. The context is detected by employing particular human actions or characteristic objects and it is matched to the context pre-stored offline in the database to get the pedestrian’s location. The Hidden Markov Model (HMM) and Recursive Viterbi Algorithm are used to do the matching, which reduces the time complexity and saves the storage. In addition, the authors design the turn detection algorithm and take the context of corner as an example to illustrate and verify the proposed model. The experimental results show that the proposed localization method can fix the pedestrian’s starting point quickly and improves the positioning accuracy of PDR by 40.56% at most with perfect stability and robustness at the same time. PMID:27916922
2003-08-25
KENNEDY SPACE CENTER, FLA. - NASA's Space Infrared Telescope Facility (SIRTF) lifts off from Launch Pad 17-B, Cape Canaveral Air Force Station, on Aug. 25 at 1:35:39 a.m. EDT. SIRTF will obtain images and spectra by detecting the infrared energy, or heat, radiated by objects in space. Consisting of a 0.85-meter telescope and three cryogenically cooled science instruments, SIRTF will be the largest infrared telescope ever launched into space. It is the fourth and final element in NASA’s family of orbiting “Great Observatories.” Its highly sensitive instruments will give a unique view of the Universe and peer into regions of space that are hidden from optical telescopes.
2003-08-14
KENNEDY SPACE CENTER, FLA. - In the mobile service tower on Launch Pad 17-B, Cape Canaveral Air Force Station, the Space Infrared Telescope Facility (SIRTF) waits for encapsulation. SIRTF will obtain images and spectra by detecting the infrared energy, or heat, radiated by objects in space. Consisting of a 0.85-meter telescope and three cryogenically cooled science instruments, SIRTF will be the largest infrared telescope ever launched into space. It is the fourth and final element in NASA’s family of orbiting “Great Observatories.” Its highly sensitive instruments will give a unique view of the Universe and peer into regions of space that are hidden from optical telescopes.
Li, Ao; Liu, Zongzhi; Lezon-Geyda, Kimberly; Sarkar, Sudipa; Lannin, Donald; Schulz, Vincent; Krop, Ian; Winer, Eric; Harris, Lyndsay; Tuck, David
2011-01-01
There is an increasing interest in using single nucleotide polymorphism (SNP) genotyping arrays for profiling chromosomal rearrangements in tumors, as they allow simultaneous detection of copy number and loss of heterozygosity with high resolution. Critical issues such as signal baseline shift due to aneuploidy, normal cell contamination, and the presence of GC content bias have been reported to dramatically alter SNP array signals and complicate accurate identification of aberrations in cancer genomes. To address these issues, we propose a novel Global Parameter Hidden Markov Model (GPHMM) to unravel tangled genotyping data generated from tumor samples. In contrast to other HMM methods, a distinct feature of GPHMM is that the issues mentioned above are quantitatively modeled by global parameters and integrated within the statistical framework. We developed an efficient EM algorithm for parameter estimation. We evaluated performance on three data sets and show that GPHMM can correctly identify chromosomal aberrations in tumor samples containing as few as 10% cancer cells. Furthermore, we demonstrated that the estimation of global parameters in GPHMM provides information about the biological characteristics of tumor samples and the quality of genotyping signal from SNP array experiments, which is helpful for data quality control and outlier detection in cohort studies. PMID:21398628
The inability to mourn and the inability to love in Shakespeare's Hamlet.
Bergmann, Martin S
2009-04-01
The author discusses the special role played by Shakespeare's masterpiece Hamlet in the history of psychoanalysis. Freud and many of his followers have treated Hamlet as if he were a real person inhibited by the Oedipus complex. In this presentation, Hamlet is understood as the embodiment of a brilliant artistic endeavor aimed at both revealing and concealing the power of this complex. The author proposes that, if Hamlet is autobiographical, it expresses Shakespeare's inability to mourn and love until a childhood homosexual memory has emerged. Hidden in Hamlet is a cure through the recall of a childhood memory.
Nawroth, Christian; Prentice, Pamela M; McElligott, Alan G
2017-01-01
Variation in common personality traits, such as boldness or exploration, is often associated with risk-reward trade-offs and behavioural flexibility. To date, only a few studies have examined the effects of consistent behavioural traits on both learning and cognition. We investigated whether certain personality traits ('exploration' and 'sociability') of individuals were related to cognitive performance, learning flexibility and learning style in a social ungulate species, the goat (Capra hircus). We also investigated whether a preference for feature cues rather than impaired learning abilities can explain performance variation in a visual discrimination task. We found that personality scores were consistent across time and context. Less explorative goats performed better in a non-associative cognitive task, in which subjects had to follow the trajectory of a hidden object (i.e. testing their ability for object permanence). We also found that less sociable subjects performed better compared to more sociable goats in a visual discrimination task. Good visual learning performance was associated with a preference for feature cues, indicating personality-dependent learning strategies in goats. Our results suggest that personality traits predict the outcome in visual discrimination and non-associative cognitive tasks in goats and that impaired performance in a visual discrimination tasks does not necessarily imply impaired learning capacities, but rather can be explained by a varying preference for feature cues. Copyright © 2016 Elsevier B.V. All rights reserved.
Confocal non-line-of-sight imaging based on the light-cone transform
NASA Astrophysics Data System (ADS)
O’Toole, Matthew; Lindell, David B.; Wetzstein, Gordon
2018-03-01
How to image objects that are hidden from a camera’s view is a problem of fundamental importance to many fields of research, with applications in robotic vision, defence, remote sensing, medical imaging and autonomous vehicles. Non-line-of-sight (NLOS) imaging at macroscopic scales has been demonstrated by scanning a visible surface with a pulsed laser and a time-resolved detector. Whereas light detection and ranging (LIDAR) systems use such measurements to recover the shape of visible objects from direct reflections, NLOS imaging reconstructs the shape and albedo of hidden objects from multiply scattered light. Despite recent advances, NLOS imaging has remained impractical owing to the prohibitive memory and processing requirements of existing reconstruction algorithms, and the extremely weak signal of multiply scattered light. Here we show that a confocal scanning procedure can address these challenges by facilitating the derivation of the light-cone transform to solve the NLOS reconstruction problem. This method requires much smaller computational and memory resources than previous reconstruction methods do and images hidden objects at unprecedented resolution. Confocal scanning also provides a sizeable increase in signal and range when imaging retroreflective objects. We quantify the resolution bounds of NLOS imaging, demonstrate its potential for real-time tracking and derive efficient algorithms that incorporate image priors and a physically accurate noise model. Additionally, we describe successful outdoor experiments of NLOS imaging under indirect sunlight.
NASA Astrophysics Data System (ADS)
Cassisi, Carmelo; Prestifilippo, Michele; Cannata, Andrea; Montalto, Placido; Patanè, Domenico; Privitera, Eugenio
2016-07-01
From January 2011 to December 2015, Mt. Etna was mainly characterized by a cyclic eruptive behavior with more than 40 lava fountains from New South-East Crater. Using the RMS (Root Mean Square) of the seismic signal recorded by stations close to the summit area, an automatic recognition of the different states of volcanic activity (QUIET, PRE-FOUNTAIN, FOUNTAIN, POST-FOUNTAIN) has been applied for monitoring purposes. Since values of the RMS time series calculated on the seismic signal are generated from a stochastic process, we can try to model the system generating its sampled values, assumed to be a Markov process, using Hidden Markov Models (HMMs). HMMs analysis seeks to recover the sequence of hidden states from the observations. In our framework, observations are characters generated by the Symbolic Aggregate approXimation (SAX) technique, which maps RMS time series values with symbols of a pre-defined alphabet. The main advantages of the proposed framework, based on HMMs and SAX, with respect to other automatic systems applied on seismic signals at Mt. Etna, are the use of multiple stations and static thresholds to well characterize the volcano states. Its application on a wide seismic dataset of Etna volcano shows the possibility to guess the volcano states. The experimental results show that, in most of the cases, we detected lava fountains in advance.
Confocal non-line-of-sight imaging based on the light-cone transform.
O'Toole, Matthew; Lindell, David B; Wetzstein, Gordon
2018-03-15
How to image objects that are hidden from a camera's view is a problem of fundamental importance to many fields of research, with applications in robotic vision, defence, remote sensing, medical imaging and autonomous vehicles. Non-line-of-sight (NLOS) imaging at macroscopic scales has been demonstrated by scanning a visible surface with a pulsed laser and a time-resolved detector. Whereas light detection and ranging (LIDAR) systems use such measurements to recover the shape of visible objects from direct reflections, NLOS imaging reconstructs the shape and albedo of hidden objects from multiply scattered light. Despite recent advances, NLOS imaging has remained impractical owing to the prohibitive memory and processing requirements of existing reconstruction algorithms, and the extremely weak signal of multiply scattered light. Here we show that a confocal scanning procedure can address these challenges by facilitating the derivation of the light-cone transform to solve the NLOS reconstruction problem. This method requires much smaller computational and memory resources than previous reconstruction methods do and images hidden objects at unprecedented resolution. Confocal scanning also provides a sizeable increase in signal and range when imaging retroreflective objects. We quantify the resolution bounds of NLOS imaging, demonstrate its potential for real-time tracking and derive efficient algorithms that incorporate image priors and a physically accurate noise model. Additionally, we describe successful outdoor experiments of NLOS imaging under indirect sunlight.
Composite Bending Box Section Modal Vibration Fault Detection
NASA Technical Reports Server (NTRS)
Werlink, Rudy
2002-01-01
One of the primary concerns with Composite construction in critical structures such as wings and stabilizers is that hidden faults and cracks can develop operationally. In the real world, catastrophic sudden failure can result from these undetected faults in composite structures. Vibration data incorporating a broad frequency modal approach, could detect significant changes prior to failure. The purpose of this report is to investigate the usefulness of frequency mode testing before and after bending and torsion loading on a composite bending Box Test section. This test article is representative of construction techniques being developed for the recent NASA Blended Wing Body Low Speed Vehicle Project. The Box section represents the construction technique on the proposed blended wing aircraft. Modal testing using an impact hammer provides an frequency fingerprint before and after bending and torsional loading. If a significant structural discontinuity develops, the vibration response is expected to change. The limitations of the data will be evaluated for future use as a non-destructive in-situ method of assessing hidden damage in similarly constructed composite wing assemblies. Modal vibration fault detection sensitivity to band-width, location and axis will be investigated. Do the sensor accelerometers need to be near the fault and or in the same axis? The response data used in this report was recorded at 17 locations using tri-axial accelerometers. The modal tests were conducted following 5 independent loading conditions before load to failure and 2 following load to failure over a period of 6 weeks. Redundant data was used to minimize effects from uncontrolled variables which could lead to incorrect interpretations. It will be shown that vibrational modes detected failure at many locations when skin de-bonding failures occurred near the center section. Important considerations are the axis selected and frequency range.
Arthofer, Wolfgang; Riegler, Markus; Schneider, Daniela; Krammer, Martin; Miller, Wolfgang J; Stauffer, Christian
2009-09-01
The European cherry fruit fly Rhagoletis cerasi has been a field model for cytoplasmic incompatibility since the mid 1970s. Two Wolbachia strains were detected in this tephritid species and wCer2 was described as the CI inducing agent dividing European populations into two unidirectional incompatible groups, i.e. southern females produce viable offspring with northern males, whereas the reciprocal cross results in incompatibility. We detected three new Wolbachia strains by sequencing a multitude of plasmids derived from Wolbachia surface protein gene (wsp) polymerase chain reaction (PCR) products. Strain-specific primers were developed allowing individual diagnosis without need for cloning. Hybridization of specific PCR products with a wsp oligonucleotide enhanced the detection limit significantly and revealed the presence of low-titre infections in some strains, in different ontogenetic stages and in adults of different age. We then performed a survey of strain prevalence and infection frequency in eight European regions. wCer1 was fixed in all populations, whereas wCer2 was detected only in the South. wCer3 frequency was the lowest without a clear distribution pattern. The abundance of wCer4 was homogenous across Europe. Like wCer2, wCer5 showed significant differences in spatial distribution. Our new findings of previously undetected and recombinant Wolbachia strains in R. cerasi reveal a major caveat to the research community not to overlook hidden Wolbachia diversity in field populations. Low-titres and geographical variability in Wolbachia diversity are expected to influence the outcome of Wolbachia population dynamics and Wolbachia-based insect population control and may create invasion barriers for expanding and artificially introduced Wolbachia strains.
Looking for the WIMP next door
NASA Astrophysics Data System (ADS)
Evans, Jared A.; Gori, Stefania; Shelton, Jessie
2018-02-01
We comprehensively study experimental constraints and prospects for a class of minimal hidden sector dark matter (DM) models, highlighting how the cosmological history of these models informs the experimental signals. We study simple `secluded' models, where the DM freezes out into unstable dark mediator states, and consider the minimal cosmic history of this dark sector, where coupling of the dark mediator to the SM was sufficient to keep the two sectors in thermal equilibrium at early times. In the well-motivated case where the dark mediators couple to the Standard Model (SM) via renormalizable interactions, the requirement of thermal equilibrium provides a minimal, UV-insensitive, and predictive cosmology for hidden sector dark matter. We call DM that freezes out of a dark radiation bath in thermal equilibrium with the SM a WIMP next door, and demonstrate that the parameter space for such WIMPs next door is sharply defined, bounded, and in large part potentially accessible. This parameter space, and the corresponding signals, depend on the leading interaction between the SM and the dark mediator; we establish it for both Higgs and vector portal interactions. In particular, there is a cosmological lower bound on the portal coupling strength necessary to thermalize the two sectors in the early universe. We determine this thermalization floor as a function of equilibration temperature for the first time. We demonstrate that direct detection experiments are currently probing this cosmological lower bound in some regions of parameter space, while indirect detection signals and terrestrial searches for the mediator cut further into the viable parameter space. We present regions of interest for both direct detection and dark mediator searches, including motivated parameter space for the direct detection of sub-GeV DM.
Active Detection for Exposing Intelligent Attacks in Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weerakkody, Sean; Ozel, Omur; Griffioen, Paul
In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detectmore » the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.« less
"It's Not Always What It Seems": Exploring the Hidden Curriculum within a Doctoral Program
ERIC Educational Resources Information Center
Foot, Rachel Elizabeth
2017-01-01
The purpose of this qualitative, naturalistic study was to explore the ways in which hidden curriculum might influence doctoral student success. Two questions guided the study: (a) How do doctoral students experience the hidden curriculum? (b) What forms of hidden curricula can be identified in a PhD program? Data were collected from twelve…
Doja, Asif; Bould, M Dylan; Clarkin, Chantalle; Eady, Kaylee; Sutherland, Stephanie; Writer, Hilary
2016-04-01
The hidden and informal curricula refer to learning in response to unarticulated processes and constraints, falling outside the formal medical curriculum. The hidden curriculum has been identified as requiring attention across all levels of learning. We sought to assess the knowledge and perceptions of the hidden and informal curricula across the continuum of learning at a single institution. Focus groups were held with undergraduate and postgraduate learners and faculty to explore knowledge and perceptions relating to the hidden and informal curricula. Thematic analysis was conducted both inductively by research team members and deductively using questions structured by the existing literature. Participants highlighted several themes related to the presence of the hidden and informal curricula in medical training and practice, including: the privileging of some specialties over others; the reinforcement of hierarchies within medicine; and a culture of tolerance towards unprofessional behaviors. Participants acknowledged the importance of role modeling in the development of professional identities and discussed the deterioration in idealism that occurs. Common issues pertaining to the hidden curriculum exist across all levels of learners, including faculty. Increased awareness of these issues could allow for the further development of methods to address learning within the hidden curriculum.
Doja, Asif; Bould, M Dylan; Clarkin, Chantalle; Eady, Kaylee; Sutherland, Stephanie; Writer, Hilary
2016-01-01
The hidden and informal curricula refer to learning in response to unarticulated processes and constraints, falling outside the formal medical curriculum. The hidden curriculum has been identified as requiring attention across all levels of learning. We sought to assess the knowledge and perceptions of the hidden and informal curricula across the continuum of learning at a single institution. Focus groups were held with undergraduate and postgraduate learners and faculty to explore knowledge and perceptions relating to the hidden and informal curricula. Thematic analysis was conducted both inductively by research team members and deductively using questions structured by the existing literature. Participants highlighted several themes related to the presence of the hidden and informal curricula in medical training and practice, including: the privileging of some specialties over others; the reinforcement of hierarchies within medicine; and a culture of tolerance towards unprofessional behaviors. Participants acknowledged the importance of role modeling in the development of professional identities and discussed the deterioration in idealism that occurs. Common issues pertaining to the hidden curriculum exist across all levels of learners, including faculty. Increased awareness of these issues could allow for the further development of methods to address learning within the hidden curriculum.
Hidden Farmworker Labor Camps in North Carolina: An Indicator of Structural Vulnerability
Summers, Phillip; Quandt, Sara A.; Talton, Jennifer W.; Galván, Leonardo
2015-01-01
Objectives. We used geographic information systems (GIS) to delineate whether farmworker labor camps were hidden and to determine whether hidden camps differed from visible camps in terms of physical and resident characteristics. Methods. We collected data using observation, interview, and public domain GIS data for 180 farmworker labor camps in east central North Carolina. A hidden camp was defined as one that was at least 0.15 miles from an all-weather road or located behind natural or manufactured objects. Hidden camps were compared with visible camps in terms of physical and resident characteristics. Results. More than one third (37.8%) of the farmworker labor camps were hidden. Hidden camps were significantly larger (42.7% vs 17.0% with 21 or more residents; P ≤ .001; and 29.4% vs 13.5% with 3 or more dwellings; P = .002) and were more likely to include barracks (50% vs 19.6%; P ≤ .001) than were visible camps. Conclusions. Poor housing conditions in farmworker labor camps often go unnoticed because they are hidden in the rural landscape, increasing farmworker vulnerability. Policies that promote greater community engagement with farmworker labor camp residents to reduce structural vulnerability should be considered. PMID:26469658
Radioimmunoassays of hidden viral antigens
DOE Office of Scientific and Technical Information (OSTI.GOV)
Neurath, A.R.; Strick, N.; Baker, L.
1982-07-01
Antigens corresponding to infectious agents may be present in biological specimens only in a cryptic form bound to antibodies and, thus, may elude detection. We describe a solid-phase technique for separation of antigens from antibodies. Immune complexes are precipitated from serum by polyethylene glycol, dissociated with NaSCN, and adsorbed onto nitrocellulose or polystyrene supports. Antigens remain topographically separated from antibodies after removal of NaSCN and can be detected with radiolabeled antibodies. Genomes from viruses immobilized on nitrocellulose can be identified by nucleic acid hybridization. Nanogram quantities of sequestered hepatitis B surface and core antigens and picogram amounts of hepatitis Bmore » virus DNA were detected. Antibody-bound adenovirus, herpesvirus, and measles virus antigens were discerned by the procedure.« less
Preliminary clinical nursing leadership competency model: a qualitative study from Thailand.
Supamanee, Treeyaphan; Krairiksh, Marisa; Singhakhumfu, Laddawan; Turale, Sue
2011-12-01
This qualitative study explored the clinical nursing leadership competency perspectives of Thai nurses working in a university hospital. To collect data, in-depth interviews were undertaken with 23 nurse administrators, and focus groups were used with 31 registered nurses. Data were analyzed using content analysis, and theory development was guided by the Iceberg model. Nurses' clinical leadership competencies emerged, comprising hidden characteristics and surface characteristics. The hidden characteristics composed three elements: motive (respect from the nursing and healthcare team and being secure in life), self-concept (representing positive attitudes and values), and traits (personal qualities necessary for leadership). The surface characteristics comprised specific knowledge of nurse leaders about clinical leadership, management and nursing informatics, and clinical skills, such as coordination, effective communication, problem solving, and clinical decision-making. The study findings help nursing to gain greater knowledge of the essence of clinical nursing leadership competencies, a matter critical for theory development in leadership. This study's results later led to the instigation of a training program for registered nurse leaders at the study site, and the formation of a preliminary clinical nursing leadership competency model. © 2011 Blackwell Publishing Asia Pty Ltd.
Characterization of bioelectric potentials
NASA Technical Reports Server (NTRS)
Jorgensen, Charles C. (Inventor); Wheeler, Kevin R. (Inventor)
2004-01-01
Method and system for recognizing and characterizing bioelectric potential or electromyographic (EMG) signals associated with at least one of a coarse gesture and a fine gesture that is performed by a person, and use of the bioelectric potentials to enter data and/or commands into an electrical and/or mechanical instrument. As a gesture is performed, bioelectric signals that accompany the gesture are subjected to statistical averaging, within selected time intervals. Hidden Markov model analysis is applied to identify hidden, gesture-related states that are present. A metric is used to compare signals produced by a volitional gesture (not yet identified) with corresponding signals associated with each of a set of reference gestures, and the reference gesture that is closest to the volitional gesture is identified. Signals representing the volitional gesture are analyzed and compared with a database of reference gestures to determine if the volitional gesture is likely to be one of the reference gestures. Electronic and/or mechanical commands needed to carry out the gesture may be implemented at an interface to control an instrument. Applications include control of an aircraft, entry of data from a keyboard or other data entry device, and entry of data and commands in extreme environments that interfere with accurate entry.
Stroke: a Hidden Danger of Margin Trading in Stock Markets.
Lin, Shu-Hui; Wang, Chien-Ho; Liu, Tsai-Ching; Chen, Chin-Shyan
2015-10-01
Using 10-year population data from 2000 through 2009 in Taiwan, this is the first paper to analyze the relationship between margin trading in stock markets and stroke hospitalizations. The results show that 3 and 6 days after an increase of margin trading in the Taiwan stock markets are associated with greater stoke hospitalizations. In general, a 1 % increase in total margin trading positions is associated with an increment of 2.5 in the total number of stroke hospitalizations, where the mean number of hospital admissions is 233 cases a day. We further examine the effects of margin trading by gender and age groups and find that the effects of margin trading are significant for males and those who are 45-74 years old only. In summary, buying stocks with money you do not have is quite risky, especially if the prices of those stocks fall past a certain level or if there is a sudden and severe drop in the stock market. There is also a hidden danger to one's health from margin trading. A person should be cautious before conducting margin trading, because while it can be quite profitable, danger always lurks just around the corner.
Richardson, L.A.; Champ, P.A.; Loomis, J.B.
2012-01-01
There is a growing concern that human health impacts from exposure to wildfire smoke are ignored in estimates of monetized damages from wildfires. Current research highlights the need for better data collection and analysis of these impacts. Using unique primary data, this paper quantifies the economic cost of health effects from the largest wildfire in Los Angeles County's modern history. A cost of illness estimate is $9.50 per exposed person per day. However, theory and empirical research consistently find that this measure largely underestimates the true economic cost of health effects from exposure to a pollutant in that it ignores the cost of defensive actions taken as well as disutility. For the first time, the defensive behavior method is applied to calculate the willingness to pay for a reduction in one wildfire smoke induced symptom day, which is estimated to be $84.42 per exposed person per day. ?? 2011.
The Irrelevance Narrative: Queer (In)Visibility in Medical Education and Practice.
Robertson, William J
2017-06-01
How might heteronormativity be reproduced and become internalized through biomedical practices? Based on in-depth, person-centered interviews, this article explores the ways heteronormativity works into medical education through the hidden curriculum. As experienced by my informants, case studies often reinforce unconscious heteronormative orientations and heterosexist/homophobic stereotypes about queer patients among straight and queer medical students alike. I introduce the concept of the irrelevance narrative to make sense of how queer medical students take up a heteronormative medical gaze. Despite recognizing that being queer affects how they interact with patients, my informants describe being queer as irrelevant to their delivery of care. I conclude with a discussion of how these preliminary findings can inform research on knowledge production in biomedical education and practice with an eye toward the tensions between personal and professional identity among biomedical practitioners. © 2017 by the American Anthropological Association.
Fast, Cynthia D; Flesher, M Melissa; Nocera, Nathanial A; Fanselow, Michael S; Blaisdell, Aaron P
2016-06-01
Identifying statistical patterns between environmental stimuli enables organisms to respond adaptively when cues are later observed. However, stimuli are often obscured from detection, necessitating behavior under conditions of ambiguity. Considerable evidence indicates decisions under ambiguity rely on inference processes that draw on past experiences to generate predictions under novel conditions. Despite the high demand for this process and the observation that it deteriorates disproportionately with age, the underlying mechanisms remain unknown. We developed a rodent model of decision-making during ambiguity to examine features of experience that contribute to inference. Rats learned either a simple (positive patterning) or complex (negative patterning) instrumental discrimination between the illumination of one or two lights. During test, only one light was lit while the other relevant light was blocked from physical detection (covered by an opaque shield, rendering its status ambiguous). We found experience with the complex negative patterning discrimination was necessary for rats to behave sensitively to the ambiguous test situation. These rats behaved as if they inferred the presence of the hidden light, responding differently than when the light was explicitly absent (uncovered and unlit). Differential expression profiles of the immediate early gene cFos indicated hippocampal involvement in the inference process while localized microinfusions of the muscarinic antagonist, scopolamine, into the dorsal hippocampus caused rats to behave as if only one light was present. That is, blocking cholinergic modulation prevented the rat from inferring the presence of the hidden light. Collectively, these results suggest cholinergic modulation mediates recruitment of hippocampal processes related to past experiences and transfer of these processes to make decisions during ambiguous situations. Our results correspond with correlations observed between human brain function and inference abilities, suggesting our experiments may inform interventions to alleviate or prevent cognitive dysfunction. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.
Zipf exponent of trajectory distribution in the hidden Markov model
NASA Astrophysics Data System (ADS)
Bochkarev, V. V.; Lerner, E. Yu
2014-03-01
This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.
Providing data science support for systems pharmacology and its implications to drug discovery.
Hart, Thomas; Xie, Lei
2016-01-01
The conventional one-drug-one-target-one-disease drug discovery process has been less successful in tracking multi-genic, multi-faceted complex diseases. Systems pharmacology has emerged as a new discipline to tackle the current challenges in drug discovery. The goal of systems pharmacology is to transform huge, heterogeneous, and dynamic biological and clinical data into interpretable and actionable mechanistic models for decision making in drug discovery and patient treatment. Thus, big data technology and data science will play an essential role in systems pharmacology. This paper critically reviews the impact of three fundamental concepts of data science on systems pharmacology: similarity inference, overfitting avoidance, and disentangling causality from correlation. The authors then discuss recent advances and future directions in applying the three concepts of data science to drug discovery, with a focus on proteome-wide context-specific quantitative drug target deconvolution and personalized adverse drug reaction prediction. Data science will facilitate reducing the complexity of systems pharmacology modeling, detecting hidden correlations between complex data sets, and distinguishing causation from correlation. The power of data science can only be fully realized when integrated with mechanism-based multi-scale modeling that explicitly takes into account the hierarchical organization of biological systems from nucleic acid to proteins, to molecular interaction networks, to cells, to tissues, to patients, and to populations.
Obschonka, Martin; Stuetzer, Michael; Gosling, Samuel D; Rentfrow, Peter J; Lamb, Michael E; Potter, Jeff; Audretsch, David B
2015-01-01
In recent years, modern economies have shifted away from being based on physical capital and towards being based on new knowledge (e.g., new ideas and inventions). Consequently, contemporary economic theorizing and key public policies have been based on the assumption that resources for generating knowledge (e.g., education, diversity of industries) are essential for regional economic vitality. However, policy makers and scholars have discovered that, contrary to expectations, the mere presence of, and investments in, new knowledge does not guarantee a high level of regional economic performance (e.g., high entrepreneurship rates). To date, this "knowledge paradox" has resisted resolution. We take an interdisciplinary perspective to offer a new explanation, hypothesizing that "hidden" regional culture differences serve as a crucial factor that is missing from conventional economic analyses and public policy strategies. Focusing on entrepreneurial activity, we hypothesize that the statistical relation between knowledge resources and entrepreneurial vitality (i.e., high entrepreneurship rates) in a region will depend on "hidden" regional differences in entrepreneurial culture. To capture such "hidden" regional differences, we derive measures of entrepreneurship-prone culture from two large personality datasets from the United States (N = 935,858) and Great Britain (N = 417,217). In both countries, the findings were consistent with the knowledge-culture-interaction hypothesis. A series of nine additional robustness checks underscored the robustness of these results. Naturally, these purely correlational findings cannot provide direct evidence for causal processes, but the results nonetheless yield a remarkably consistent and robust picture in the two countries. In doing so, the findings raise the idea of regional culture serving as a new causal candidate, potentially driving the knowledge paradox; such an explanation would be consistent with research on the psychological characteristics of entrepreneurs.
Maguire, D
1998-01-01
In this commentary, a Roman Catholic professor of moral theory recounts how, during his doctoral work in Rome, he was taught that abortion was intrinsically evil and could never be justified. He was also taught, however, about Probabilism, a Roman Catholic teaching that held that "where there is doubt, there is freedom." In other words, serious doubts based on a person's own insights allow a person moral freedom to choose a course of action in cases of debated moral issues. This moral teaching, a triumph for the rights of personal conscience, which was formulated in the 16th and 17th centuries, has been well-hidden from the laity and neglected by the clergy during the past 100 years. He also learned about Thomas Aquinas who taught that practical moral principals are valid most of the time but can have exceptions depending on circumstances. In addition, early 17th-century church leaders justified abortions performed to save the life of the women. Thus, the Supreme Court's decision in Roe seems to reflect Catholic thinking more accurately than the Vatican's new-found absolutism against abortion.
PCA method for automated detection of mispronounced words
NASA Astrophysics Data System (ADS)
Ge, Zhenhao; Sharma, Sudhendu R.; Smith, Mark J. T.
2011-06-01
This paper presents a method for detecting mispronunciations with the aim of improving Computer Assisted Language Learning (CALL) tools used by foreign language learners. The algorithm is based on Principle Component Analysis (PCA). It is hierarchical with each successive step refining the estimate to classify the test word as being either mispronounced or correct. Preprocessing before detection, like normalization and time-scale modification, is implemented to guarantee uniformity of the feature vectors input to the detection system. The performance using various features including spectrograms and Mel-Frequency Cepstral Coefficients (MFCCs) are compared and evaluated. Best results were obtained using MFCCs, achieving up to 99% accuracy in word verification and 93% in native/non-native classification. Compared with Hidden Markov Models (HMMs) which are used pervasively in recognition application, this particular approach is computational efficient and effective when training data is limited.
Online Phase Detection Using Wearable Sensors for Walking with a Robotic Prosthesis
Goršič, Maja; Kamnik, Roman; Ambrožič, Luka; Vitiello, Nicola; Lefeber, Dirk; Pasquini, Guido; Munih, Marko
2014-01-01
This paper presents a gait phase detection algorithm for providing feedback in walking with a robotic prosthesis. The algorithm utilizes the output signals of a wearable wireless sensory system incorporating sensorized shoe insoles and inertial measurement units attached to body segments. The principle of detecting transitions between gait phases is based on heuristic threshold rules, dividing a steady-state walking stride into four phases. For the evaluation of the algorithm, experiments with three amputees, walking with the robotic prosthesis and wearable sensors, were performed. Results show a high rate of successful detection for all four phases (the average success rate across all subjects >90%). A comparison of the proposed method to an off-line trained algorithm using hidden Markov models reveals a similar performance achieved without the need for learning dataset acquisition and previous model training. PMID:24521944
Target Detection of Quantum Illumination Receiver Based on Photon-subtracted Entanglement State
NASA Astrophysics Data System (ADS)
Chi, Jiao; Liu, HongJun; Huang, Nan; Wang, ZhaoLu
2017-12-01
We theoretically propose a quantum illumination receiver based on the ideal photon-subtracted two-mode squeezed state (PSTMSS) to efficiently detect the noise-hidden target. This receiver is generated by applying an optical parametric amplifier (OPA) to the cross correlation detection. With analyzing the output performance, it is found that OPA as a preposition technology of the receiver can contribute to the PSTMSS by significantly reducing the error probability than that of the general two-mode squeezed state (TMSS). Comparing with TMSS, the signal-to-noise ratio of quantum illumination based on ideal PSTMSS and OPA is improved more than 4 dB under an optimal gain of OPA. This work may provide a potential improvement in the application of accurate target detection when two kinds of resource have the identical real squeezing parameter.
Detecting Malicious Tweets in Twitter Using Runtime Monitoring With Hidden Information
2016-06-01
text mining using Twitter streaming API and python [Online]. Available: http://adilmoujahid.com/posts/2014/07/twitter-analytics/ [22] M. Singh, B...sites with 645,750,000 registered users [3] and has open source public tweets for data mining . 2. Malicious Users and Tweets In the modern world...want to data mine in Twitter, and presents the natural language assertions and corresponding rule patterns. It then describes the steps performed using
2016 Research Final Presentation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Koskelo, EliseAnne Corinne
These are slides which show an example of research at Los Alamos National Laboratory done by E.C. Koskelo to show college professors in the hopes of earning a research position or fellowship position. In summary, this researcher developed a new in-situ technique for the inspection of additively manufactured parts, created an algorithm which can correct "skewed" scans of angular parts/taken at oblique angles, and used AWS to detect hidden defects and thickness changes in aerospace composites.
Terahertz: the Far-Ir Challenge
NASA Astrophysics Data System (ADS)
Dispenza, Massimiliano; Fiorello, Annamaria; Secchi, Alberto; Varasi, Mauro
This chapter is an overview on terahertz technologies and applications for sensing. The most advanced imaging and spectroscopy techniques are described, considering current opportunities and limitations in comparison to probes in the adjacent regions of the e.m. spectrum. Potential applications are highlighted, with a specific focus on security for detection of illicit substances and revealing of hidden objects. The technological status and current bottlenecks on sources and detectors are reviewed and future trends discussed.
Augmenting Latent Dirichlet Allocation and Rank Threshold Detection with Ontologies
2010-03-01
Probabilistic Latent Semantic Indexing (PLSI) is an automated indexing information retrieval model [20]. It is based on a statistical latent class model which is...uses a statistical foundation that is more accurate in finding hidden semantic relationships [20]. The model uses factor analysis of count data, number...principle of statistical infer- ence which asserts that all of the information in a sample is contained in the likelihood function [20]. The statistical
2012-07-01
units made from the various sensors. This was because the different types of ME laminates have different electrical properties ( resistance and...DC resistance of a sensor (Rdc) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT: SAR 18. NUMBER OF PAGES 338 19a. NAME OF...3.3.6. Electric -field tuning effect ..................................................................70 A.3.4. Dielectric loss noise reduction
A composite model for the 750 GeV diphoton excess
Harigaya, Keisuke; Nomura, Yasunori
2016-03-14
We study a simple model in which the recently reported 750 GeV diphoton excess arises from a composite pseudo Nambu-Goldstone boson — hidden pion — produced by gluon fusion and decaying into two photons. The model only introduces an extra hidden gauge group at the TeV scale with a vectorlike quark in the bifundamental representation of the hidden and standard model gauge groups. We calculate the masses of all the hidden pions and analyze their experimental signatures and constraints. We find that two colored hidden pions must be near the current experimental limits, and hence are probed in the nearmore » future. We study physics of would-be stable particles — the composite states that do not decay purely by the hidden and standard model gauge dynamics — in detail, including constraints from cosmology. We discuss possible theoretical structures above the TeV scale, e.g. conformal dynamics and supersymmetry, and their phenomenological implications. We also discuss an extension of the minimal model in which there is an extra hidden quark that is singlet under the standard model and has a mass smaller than the hidden dynamical scale. This provides two standard model singlet hidden pions that can both be viewed as diphoton/diboson resonances produced by gluon fusion. We discuss several scenarios in which these (and other) resonances can be used to explain various excesses seen in the LHC data.« less
Quantum Detection and Invisibility in Coherent Nanostructures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fransson, J.
2010-04-28
We address quantum invisibility in the context of electronics in nanoscale quantum structures. In analogy with metamaterials, we use the freedom of design that quantum corrals provide and show that quantum mechanical objects can be hidden inside the corral, with respect to inelastic electron scattering spectroscopy in combination with scanning tunneling microscopy, and we propose a design strategy. A simple illustration of the invisibility is given in terms of an elliptic quantum corral containing a molecule, with a local vibrational mode, at one of the foci. Our work has implications to quantum information technology and presents new tools for nonlocalmore » quantum detection and distinguishing between different molecules.« less
Water Ice in 2060 Chiron and Its Implications for Centaurs and Kuiper Belt Objects.
Luu; Jewitt; Trujillo
2000-03-10
We report the detection of water ice in the Centaur 2060 Chiron, based on near-infrared spectra (1.0-2.5 µm) taken with the 3.8 m United Kingdom Infrared Telescope and the 10 m Keck Telescope. The appearance of this ice is correlated with the recent decline in Chiron's cometary activity: the decrease in the coma cross section allows previously hidden solid-state surface features to be seen. We predict that water ice is ubiquitous among Centaurs and Kuiper Belt objects, but its surface coverage varies from object to object and thus determines its detectability and the occurrence of cometary activity.
The reported effects of bullying on burn-surviving children.
Rimmer, Ruth B; Foster, Kevin N; Bay, Curtis R; Floros, Jim; Rutter, Cindy; Bosch, Jim; Wadsworth, Michelle M; Caruso, Daniel M
2007-01-01
There is a trend of increasing childhood aggression in America, which has been tied to bullying. Although there is growing research concerning bullying in the general pediatric population, there are limited data on bullying and its effects on children with disfigurements and physical limitations. This study was conducted to assess burned children's experience with bullying. A pretest was administered regarding experience with bullying and teasing. A curriculum regarding bullying, which incorporated the Harry Potter and the Sorcerer's Stone movie, was presented. After reviewing bullying depicted in the film and participating in a class regarding bullying, children were invited to complete a survey regarding their experience with bullying. A total of 61% of these children reported being bullied at school; 25% reported experiencing headaches or stomachaches due to bullying, and 12% reported staying home from school. Nearly 25% reported bullying as a big problem. Of those with visible scars (55%), a full 68% reported bullying as a problem, versus 54% with hidden scars (P < .05). However, those with visible scars were no more likely to tell an adult (54%) than those without (56%). Children were much more willing to disclose personal bullying experiences after participating in the class (57%) than before (45%) (P < .01). This study revealed that bullying impacts many burn-injured children and has negative effects on their physical and mental well-being. Many children (with visible or hidden scars) did not seek adult intervention for the problem. Participation in a bullying course appears to give children a forum that increases their willingness to disclose personal bullying experiences and can provide them with prevention information and a safe place to seek help.
Synthetic consciousness: the distributed adaptive control perspective
2016-01-01
Understanding the nature of consciousness is one of the grand outstanding scientific challenges. The fundamental methodological problem is how phenomenal first person experience can be accounted for in a third person verifiable form, while the conceptual challenge is to both define its function and physical realization. The distributed adaptive control theory of consciousness (DACtoc) proposes answers to these three challenges. The methodological challenge is answered relative to the hard problem and DACtoc proposes that it can be addressed using a convergent synthetic methodology using the analysis of synthetic biologically grounded agents, or quale parsing. DACtoc hypothesizes that consciousness in both its primary and secondary forms serves the ability to deal with the hidden states of the world and emerged during the Cambrian period, affording stable multi-agent environments to emerge. The process of consciousness is an autonomous virtualization memory, which serializes and unifies the parallel and subconscious simulations of the hidden states of the world that are largely due to other agents and the self with the objective to extract norms. These norms are in turn projected as value onto the parallel simulation and control systems that are driving action. This functional hypothesis is mapped onto the brainstem, midbrain and the thalamo-cortical and cortico-cortical systems and analysed with respect to our understanding of deficits of consciousness. Subsequently, some of the implications and predictions of DACtoc are outlined, in particular, the prediction that normative bootstrapping of conscious agents is predicated on an intentionality prior. In the view advanced here, human consciousness constitutes the ultimate evolutionary transition by allowing agents to become autonomous with respect to their evolutionary priors leading to a post-biological Anthropocene. This article is part of the themed issue ‘The major synthetic evolutionary transitions’. PMID:27431526
Menger, Richard P; Storey, Christopher M; Guthikonda, Bharat; Missios, Symeon; Nanda, Anil; Cooper, John M
2015-07-01
World War I catapulted the United States from traditional isolationism to international involvement in a major European conflict. Woodrow Wilson envisaged a permanent American imprint on democracy in world affairs through participation in the League of Nations. Amid these defining events, Wilson suffered a major ischemic stroke on October 2, 1919, which left him incapacitated. What was probably his fourth and most devastating stroke was diagnosed and treated by his friend and personal physician, Admiral Cary Grayson. Grayson, who had tremendous personal and professional loyalty to Wilson, kept the severity of the stroke hidden from Congress, the American people, and even the president himself. During a cabinet briefing, Grayson formally refused to sign a document of disability and was reluctant to address the subject of presidential succession. Wilson was essentially incapacitated and hemiplegic, yet he remained an active president and all messages were relayed directly through his wife, Edith. Patient-physician confidentiality superseded national security amid the backdrop of friendship and political power on the eve of a pivotal juncture in the history of American foreign policy. It was in part because of the absence of Woodrow Wilson's vocal and unwavering support that the United States did not join the League of Nations and distanced itself from the international stage. The League of Nations would later prove powerless without American support and was unable to thwart the rise and advance of Adolf Hitler. Only after World War II did the United States assume its global leadership role and realize Wilson's visionary, yet contentious, groundwork for a Pax Americana. The authors describe Woodrow Wilson's stroke, the historical implications of his health decline, and its impact on United States foreign policy.
Synthetic consciousness: the distributed adaptive control perspective.
Verschure, Paul F M J
2016-08-19
Understanding the nature of consciousness is one of the grand outstanding scientific challenges. The fundamental methodological problem is how phenomenal first person experience can be accounted for in a third person verifiable form, while the conceptual challenge is to both define its function and physical realization. The distributed adaptive control theory of consciousness (DACtoc) proposes answers to these three challenges. The methodological challenge is answered relative to the hard problem and DACtoc proposes that it can be addressed using a convergent synthetic methodology using the analysis of synthetic biologically grounded agents, or quale parsing. DACtoc hypothesizes that consciousness in both its primary and secondary forms serves the ability to deal with the hidden states of the world and emerged during the Cambrian period, affording stable multi-agent environments to emerge. The process of consciousness is an autonomous virtualization memory, which serializes and unifies the parallel and subconscious simulations of the hidden states of the world that are largely due to other agents and the self with the objective to extract norms. These norms are in turn projected as value onto the parallel simulation and control systems that are driving action. This functional hypothesis is mapped onto the brainstem, midbrain and the thalamo-cortical and cortico-cortical systems and analysed with respect to our understanding of deficits of consciousness. Subsequently, some of the implications and predictions of DACtoc are outlined, in particular, the prediction that normative bootstrapping of conscious agents is predicated on an intentionality prior. In the view advanced here, human consciousness constitutes the ultimate evolutionary transition by allowing agents to become autonomous with respect to their evolutionary priors leading to a post-biological Anthropocene.This article is part of the themed issue 'The major synthetic evolutionary transitions'. © 2016 The Author(s).
The Hidden Lives of Nurses' Cognitive Artifacts.
Blaz, Jacquelyn W; Doig, Alexa K; Cloyes, Kristin G; Staggers, Nancy
2016-09-07
Standardizing nursing handoffs at shift change is recommended to improve communication, with electronic tools as the primary approach. However, nurses continue to rely on personally created paper-based cognitive artifacts - their "paper brains" - to support handoffs, indicating a deficiency in available electronic versions. The purpose of this qualitative study was to develop a deep understanding of nurses' paper-based cognitive artifacts in the context of a cancer specialty hospital. After completing 73 hours of hospital unit field observations, 13 medical oncology nurses were purposively sampled, shadowed for a single shift and interviewed using a semi-structured technique. An interpretive descriptive study design guided analysis of the data corpus of field notes, transcribed interviews, images of nurses' paper-based cognitive artifacts, and analytic memos. Findings suggest nurses' paper brains are personal, dynamic, living objects that undergo a life cycle during each shift and evolve over the course of a nurse's career. The life cycle has four phases: Creation, Application, Reproduction, and Destruction. Evolution in a nurse's individually styled, paper brain is triggered by a change in the nurse's environment that reshapes cognitive needs. If a paper brain no longer provides cognitive support in the new environment, it is modified into (adapted) or abandoned (made extinct) for a different format that will provide the necessary support. The "hidden lives" - the life cycle and evolution - of paper brains have implications for the design of successful electronic tools to support nursing practice, including handoff. Nurses' paper brains provide cognitive support beyond the context of handoff. Information retrieval during handoff is undoubtedly an important function of nurses' paper brains, but tools designed to standardize handoff communication without accounting for cognitive needs during all phases of the paper brain life cycle or the ability to evolve with changes to those cognitive needs will be underutilized.
Recognizing visual focus of attention from head pose in natural meetings.
Ba, Sileye O; Odobez, Jean-Marc
2009-02-01
We address the problem of recognizing the visual focus of attention (VFOA) of meeting participants based on their head pose. To this end, the head pose observations are modeled using a Gaussian mixture model (GMM) or a hidden Markov model (HMM) whose hidden states correspond to the VFOA. The novelties of this paper are threefold. First, contrary to previous studies on the topic, in our setup, the potential VFOA of a person is not restricted to other participants only. It includes environmental targets as well (a table and a projection screen), which increases the complexity of the task, with more VFOA targets spread in the pan as well as tilt gaze space. Second, we propose a geometric model to set the GMM or HMM parameters by exploiting results from cognitive science on saccadic eye motion, which allows the prediction of the head pose given a gaze target. Third, an unsupervised parameter adaptation step not using any labeled data is proposed, which accounts for the specific gazing behavior of each participant. Using a publicly available corpus of eight meetings featuring four persons, we analyze the above methods by evaluating, through objective performance measures, the recognition of the VFOA from head pose information obtained either using a magnetic sensor device or a vision-based tracking system. The results clearly show that in such complex but realistic situations, the VFOA recognition performance is highly dependent on how well the visual targets are separated for a given meeting participant. In addition, the results show that the use of a geometric model with unsupervised adaptation achieves better results than the use of training data to set the HMM parameters.
Ito, Sosuke
2016-01-01
The transfer entropy is a well-established measure of information flow, which quantifies directed influence between two stochastic time series and has been shown to be useful in a variety fields of science. Here we introduce the transfer entropy of the backward time series called the backward transfer entropy, and show that the backward transfer entropy quantifies how far it is from dynamics to a hidden Markov model. Furthermore, we discuss physical interpretations of the backward transfer entropy in completely different settings of thermodynamics for information processing and the gambling with side information. In both settings of thermodynamics and the gambling, the backward transfer entropy characterizes a possible loss of some benefit, where the conventional transfer entropy characterizes a possible benefit. Our result implies the deep connection between thermodynamics and the gambling in the presence of information flow, and that the backward transfer entropy would be useful as a novel measure of information flow in nonequilibrium thermodynamics, biochemical sciences, economics and statistics. PMID:27833120
45,X/47,XXX/47,XX, del(Y)(p?)/46,XX mosaicism causing true hermaphroditism.
Nieto, Karem; Peña, Rocío; Palma, Icela; Dorantes, Luis M; Eraña, Luis; Alvarez, Rebeca; García-Cavazos, Ricardo; Kofman-Alfaro, Susana; Queipo, Gloria
2004-10-15
Sex differentiation in humans depends on the presence of the Y-linked gene SRY, which is activated in the pre-Sertoli cells of the developing gonadal primordium to trigger testicular differentiation. Occasionally testicular formation can take place in subjects lacking a Y chromosome resulting in a 46,XX sex reversal condition. True hermaphroditism (TH) is a rare form of intersexuality characterized by the presence of testicular and ovarian tissue in the same individual. Genetic heterogeneity has been proposed as a cause of dual gonadal development in some cases and recently, hidden mosaicism was reported to cause TH in some 46,XX SRY negative patients. Here we report a TH case in which hidden mosaicism for the Y and X chromosome was detected by PCR and FISH in peripheral blood and gonadal tissue, supporting the fact that mosaicism may cause TH and that molecular analysis of gonadal tissue should be performed in all 46,XX cases.
NASA Astrophysics Data System (ADS)
Ito, Sosuke
2016-11-01
The transfer entropy is a well-established measure of information flow, which quantifies directed influence between two stochastic time series and has been shown to be useful in a variety fields of science. Here we introduce the transfer entropy of the backward time series called the backward transfer entropy, and show that the backward transfer entropy quantifies how far it is from dynamics to a hidden Markov model. Furthermore, we discuss physical interpretations of the backward transfer entropy in completely different settings of thermodynamics for information processing and the gambling with side information. In both settings of thermodynamics and the gambling, the backward transfer entropy characterizes a possible loss of some benefit, where the conventional transfer entropy characterizes a possible benefit. Our result implies the deep connection between thermodynamics and the gambling in the presence of information flow, and that the backward transfer entropy would be useful as a novel measure of information flow in nonequilibrium thermodynamics, biochemical sciences, economics and statistics.
LHC searches for dark sector showers
NASA Astrophysics Data System (ADS)
Cohen, Timothy; Lisanti, Mariangela; Lou, Hou Keong; Mishra-Sharma, Siddharth
2017-11-01
This paper proposes a new search program for dark sector parton showers at the Large Hadron Collider (LHC). These signatures arise in theories characterized by strong dynamics in a hidden sector, such as Hidden Valley models. A dark parton shower can be composed of both invisible dark matter particles as well as dark sector states that decay to Standard Model particles via a portal. The focus here is on the specific case of `semi-visible jets,' jet-like collider objects where the visible states in the shower are Standard Model hadrons. We present a Simplified Model-like parametrization for the LHC observables and propose targeted search strategies for regions of parameter space that are not covered by existing analyses. Following the `mono- X' literature, the portal is modeled using either an effective field theoretic contact operator approach or with one of two ultraviolet completions; sensitivity projections are provided for all three cases. We additionally highlight that the LHC has a unique advantage over direct detection experiments in the search for this class of dark matter theories.
Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization
NASA Astrophysics Data System (ADS)
Bajaj, Ruchika; Bedi, Punam; Pal, S. K.
Steganography is an art of hiding information in such a way that prevents the detection of hidden messages. Besides security of data, the quantity of data that can be hidden in a single cover medium, is also very important. We present a secure data hiding scheme with high embedding capacity for messages of variable length based on Particle Swarm Optimization. This technique gives the best pixel positions in the cover image, which can be used to hide the secret data. In the proposed scheme, k bits of the secret message are substituted into k least significant bits of the image pixel, where k varies from 1 to 4 depending on the message length. The proposed scheme is tested and results compared with simple LSB substitution, uniform 4-bit LSB hiding (with PSO) for the test images Nature, Baboon, Lena and Kitty. The experimental study confirms that the proposed method achieves high data hiding capacity and maintains imperceptibility and minimizes the distortion between the cover image and the obtained stego image.
Projecting sensations to external objects: evidence from skin conductance response.
Armel, K Carrie; Ramachandran, V S
2003-07-22
Subjects perceived touch sensations as arising from a table (or a rubber hand) when both the table (or the rubber hand) and their own real hand were repeatedly tapped and stroked in synchrony with the real hand hidden from view. If the table or rubber hand was then 'injured', subjects displayed a strong skin conductance response (SCR) even though nothing was done to the real hand. Sensations could even be projected to anatomically impossible locations. The illusion was much less vivid, as indicated by subjective reports and SCR, if the real hand was simultaneously visible during stroking, or if the real hand was hidden but touched asynchronously. The fact that the illusion could be significantly diminished when the real hand was simultaneously visible suggests that the illusion and associated SCRs were due to perceptual assimilation of the table (or rubber hand) into one's body image rather than associative conditioning. These experiments demonstrate the malleability of body image and the brain's remarkable capacity for detecting statistical correlations in the sensory input.
Projecting sensations to external objects: evidence from skin conductance response.
Armel, K Carrie; Ramachandran, V S
2003-01-01
Subjects perceived touch sensations as arising from a table (or a rubber hand) when both the table (or the rubber hand) and their own real hand were repeatedly tapped and stroked in synchrony with the real hand hidden from view. If the table or rubber hand was then 'injured', subjects displayed a strong skin conductance response (SCR) even though nothing was done to the real hand. Sensations could even be projected to anatomically impossible locations. The illusion was much less vivid, as indicated by subjective reports and SCR, if the real hand was simultaneously visible during stroking, or if the real hand was hidden but touched asynchronously. The fact that the illusion could be significantly diminished when the real hand was simultaneously visible suggests that the illusion and associated SCRs were due to perceptual assimilation of the table (or rubber hand) into one's body image rather than associative conditioning. These experiments demonstrate the malleability of body image and the brain's remarkable capacity for detecting statistical correlations in the sensory input. PMID:12965016
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buffalo, Cosmo Z.; Bahn-Suh, Adrian J.; Hirakis, Sophia P.
No vaccine exists against group A Streptococcus (GAS), a leading cause of worldwide morbidity and mortality. A severe hurdle is the hypervariability of its major antigen, the M protein, with >200 different M types known. Neutralizing antibodies typically recognize M protein hypervariable regions (HVRs) and confer narrow protection. In stark contrast, human C4b-binding protein (C4BP), which is recruited to the GAS surface to block phagocytic killing, interacts with a remarkably large number of M protein HVRs (apparently ~90%). Such broad recognition is rare, and we discovered a unique mechanism for this through the structure determination of four sequence-diverse M proteinsmore » in complexes with C4BP. The structures revealed a uniform and tolerant ‘reading head’ in C4BP, which detected conserved sequence patterns hidden within hypervariability. Our results open up possibilities for rational therapies that target the M–C4BP interaction, and also inform a path towards vaccine design.« less
NASA Technical Reports Server (NTRS)
Hague, D. S.; Vanderburg, J. D.
1977-01-01
A vehicle geometric definition based upon quadrilateral surface elements to produce realistic pictures of an aerospace vehicle. The PCSYS programs can be used to visually check geometric data input, monitor geometric perturbations, and to visualize the complex spatial inter-relationships between the internal and external vehicle components. PCSYS has two major component programs. The between program, IMAGE, draws a complex aerospace vehicle pictorial representation based on either an approximate but rapid hidden line algorithm or without any hidden line algorithm. The second program, HIDDEN, draws a vehicle representation using an accurate but time consuming hidden line algorithm.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Farina, Marco; Pappadopulo, Duccio; Ruderman, Joshua T.
A hidden sector with a mass gap undergoes an epoch of cannibalism if number changing interactions are active when the temperature drops below the mass of the lightest hidden particle. During cannibalism, the hidden sector temperature decreases only logarithmically with the scale factor. We consider the possibility that dark matter resides in a hidden sector that underwent cannibalism, and has relic density set by the freeze-out of two-to-two annihilations. We identify three novel phases, depending on the behavior of the hidden sector when dark matter freezes out. During the cannibal phase, dark matter annihilations decouple while the hidden sector ismore » cannibalizing. During the chemical phase, only two-to-two interactions are active and the total number of hidden particles is conserved. During the one way phase, the dark matter annihilation products decay out of equilibrium, suppressing the production of dark matter from inverse annihilations. We map out the distinct phenomenology of each phase, which includes a boosted dark matter annihilation rate, new relativistic degrees of freedom, warm dark matter, and observable distortions to the spectrum of the cosmic microwave background.« less
Phases of cannibal dark matter
NASA Astrophysics Data System (ADS)
Farina, Marco; Pappadopulo, Duccio; Ruderman, Joshua T.; Trevisan, Gabriele
2016-12-01
A hidden sector with a mass gap undergoes an epoch of cannibalism if number changing interactions are active when the temperature drops below the mass of the lightest hidden particle. During cannibalism, the hidden sector temperature decreases only logarithmically with the scale factor. We consider the possibility that dark matter resides in a hidden sector that underwent cannibalism, and has relic density set by the freeze-out of two-to-two annihilations. We identify three novel phases, depending on the behavior of the hidden sector when dark matter freezes out. During the cannibal phase, dark matter annihilations decouple while the hidden sector is cannibalizing. During the chemical phase, only two-to-two interactions are active and the total number of hidden particles is conserved. During the one way phase, the dark matter annihilation products decay out of equilibrium, suppressing the production of dark matter from inverse annihilations. We map out the distinct phenomenology of each phase, which includes a boosted dark matter annihilation rate, new relativistic degrees of freedom, warm dark matter, and observable distortions to the spectrum of the cosmic microwave background.
Phases of cannibal dark matter
Farina, Marco; Pappadopulo, Duccio; Ruderman, Joshua T.; ...
2016-12-13
A hidden sector with a mass gap undergoes an epoch of cannibalism if number changing interactions are active when the temperature drops below the mass of the lightest hidden particle. During cannibalism, the hidden sector temperature decreases only logarithmically with the scale factor. We consider the possibility that dark matter resides in a hidden sector that underwent cannibalism, and has relic density set by the freeze-out of two-to-two annihilations. We identify three novel phases, depending on the behavior of the hidden sector when dark matter freezes out. During the cannibal phase, dark matter annihilations decouple while the hidden sector ismore » cannibalizing. During the chemical phase, only two-to-two interactions are active and the total number of hidden particles is conserved. During the one way phase, the dark matter annihilation products decay out of equilibrium, suppressing the production of dark matter from inverse annihilations. We map out the distinct phenomenology of each phase, which includes a boosted dark matter annihilation rate, new relativistic degrees of freedom, warm dark matter, and observable distortions to the spectrum of the cosmic microwave background.« less
Generalization and capacity of extensively large two-layered perceptrons.
Rosen-Zvi, Michal; Engel, Andreas; Kanter, Ido
2002-09-01
The generalization ability and storage capacity of a treelike two-layered neural network with a number of hidden units scaling as the input dimension is examined. The mapping from the input to the hidden layer is via Boolean functions; the mapping from the hidden layer to the output is done by a perceptron. The analysis is within the replica framework where an order parameter characterizing the overlap between two networks in the combined space of Boolean functions and hidden-to-output couplings is introduced. The maximal capacity of such networks is found to scale linearly with the logarithm of the number of Boolean functions per hidden unit. The generalization process exhibits a first-order phase transition from poor to perfect learning for the case of discrete hidden-to-output couplings. The critical number of examples per input dimension, alpha(c), at which the transition occurs, again scales linearly with the logarithm of the number of Boolean functions. In the case of continuous hidden-to-output couplings, the generalization error decreases according to the same power law as for the perceptron, with the prefactor being different.
Experimental evaluation of penetration capabilities of a Geiger-mode APD array laser radar system
NASA Astrophysics Data System (ADS)
Jonsson, Per; Tulldahl, Michael; Hedborg, Julia; Henriksson, Markus; Sjöqvist, Lars
2017-10-01
Laser radar 3D imaging has the potential to improve target recognition in many scenarios. One case that is challenging for most optical sensors is to recognize targets hidden in vegetation or behind camouflage. The range resolution of timeof- flight 3D sensors allows segmentation of obscuration and target if the surfaces are separated far enough so that they can be resolved as two distances. Systems based on time-correlated single-photon counting (TCSPC) have the potential to resolve surfaces closer to each other compared to laser radar systems based on proportional mode detection technologies and is therefore especially interesting. Photon counting detection is commonly performed with Geigermode Avalanche Photodiodes (GmAPD) that have the disadvantage that they can only detect one photon per laser pulse per pixel. A strong return from an obscuring object may saturate the detector and thus limit the possibility to detect the hidden target even if photons from the target reach the detector. The operational range where good foliage penetration is observed is therefore relatively narrow for GmAPD systems. In this paper we investigate the penetration capability through semi-transparent surfaces for a laser radar with a 128×32 pixel GmAPD array and a 1542 nm wavelength laser operating at a pulse repetition frequency of 90 kHz. In the evaluation a screen was placed behind different canvases with varying transmissions and the detected signals from the surfaces for different laser intensities were measured. The maximum return from the second surface occurs when the total detection probability is around 0.65-0.75 per pulse. At higher laser excitation power the signal from the second surface decreases. To optimize the foliage penetration capability it is thus necessary to adaptively control the laser power to keep the returned signal within this region. In addition to the experimental results, simulations to study the influence of the pulse energy on penetration through foliage in a scene with targets behind vegetation are presented. The optimum detection of targets occurs here at a slightly higher total photon count rate probability because a number of pixel have no obscuration in front the target in their field of view.
DoS detection in IEEE 802.11 with the presence of hidden nodes
Soryal, Joseph; Liu, Xijie; Saadawi, Tarek
2013-01-01
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm. PMID:25685510
DoS detection in IEEE 802.11 with the presence of hidden nodes.
Soryal, Joseph; Liu, Xijie; Saadawi, Tarek
2014-07-01
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.
A hidden-process model for estimating prespawn mortality using carcass survey data
DeWeber, J. Tyrell; Peterson, James T.; Sharpe, Cameron; Kent, Michael L.; Colvin, Michael E.; Schreck, Carl B.
2017-01-01
After returning to spawning areas, adult Pacific salmon Oncorhynchus spp. often die without spawning successfully, which is commonly referred to as prespawn mortality. Prespawn mortality reduces reproductive success and can thereby hamper conservation, restoration, and reintroduction efforts. The primary source of information used to estimate prespawn mortality is collected through carcass surveys, but estimation can be difficult with these data due to imperfect detection and carcasses with unknown spawning status. To facilitate unbiased estimation of prespawn mortality and associated uncertainty, we developed a hidden-process mark–recovery model to estimate prespawn mortality rates from carcass survey data while accounting for imperfect detection and unknown spawning success. We then used the model to estimate prespawn mortality and identify potential associated factors for 3,352 adult spring Chinook Salmon O. tshawytscha that were transported above Foster Dam on the South Santiam River (Willamette River basin, Oregon) from 2009 to 2013. Estimated prespawn mortality was relatively low (≤13%) in most years (interannual mean = 28%) but was especially high (74%) in 2013. Variation in prespawn mortality estimates among outplanted groups of fish within each year was also very high, and some of this variation was explained by a trend toward lower prespawn mortality among fish that were outplanted later in the year. Numerous efforts are being made to monitor and, when possible, minimize prespawn mortality in salmon populations; this model can be used to provide unbiased estimates of spawning success that account for unknown fate and imperfect detection, which are common to carcass survey data.
Mochalski, Paweł; Wiesenhofer, Helmut; Allers, Maria; Zimmermann, Stefan; Güntner, Andreas T; Pineau, Nicolay J; Lederer, Wolfgang; Agapiou, Agapios; Mayhew, Christopher A; Ruzsanyi, Veronika
2018-02-15
Human smuggling and associated cross-border crimes have evolved as a major challenge for the European Union in recent years. Of particular concern is the increasing trend of smuggling migrants hidden inside shipping containers or trucks. Therefore, there is a growing demand for portable security devices for the non-intrusive and rapid monitoring of containers to detect people hiding inside. In this context, chemical analysis of volatiles organic compounds (VOCs) emitted from the human body is proposed as a locating tool. In the present study, an in-house made ion mobility spectrometer coupled with gas chromatography (GC-IMS) was used to monitor the volatile moieties released from the human body under conditions that mimic entrapment. A total of 17 omnipresent volatile compounds were identified and quantified from 35 ion mobility peaks corresponding to human presence. These are 7 aldehydes (acrolein, 2-methylpropanal, 3-methylbutanal, 2-ethacrolein, n-hexanal, n-heptanal, benzaldehyde), 3 ketones (acetone, 2-pentanone, 4-methyl-2-pentanone), 5 esters (ethyl formate, ethyl propionate, vinyl butyrate, butyl acetate, ethyl isovalerate), one alcohol (2-methyl-1-propanol) and one organic acid (acetic acid). The limits of detection (0.05-7.2 ppb) and relative standard deviations (0.6-11%) should be sufficient for detecting these markers of human presence in field conditions. This study shows that GC-IMS can be used as a portable field detector of hidden or entrapped people. Copyright © 2018 Elsevier B.V. All rights reserved.
Nayak, Deepak Ranjan; Dash, Ratnakar; Majhi, Banshidhar
2017-12-07
Pathological brain detection has made notable stride in the past years, as a consequence many pathological brain detection systems (PBDSs) have been proposed. But, the accuracy of these systems still needs significant improvement in order to meet the necessity of real world diagnostic situations. In this paper, an efficient PBDS based on MR images is proposed that markedly improves the recent results. The proposed system makes use of contrast limited adaptive histogram equalization (CLAHE) to enhance the quality of the input MR images. Thereafter, two-dimensional PCA (2DPCA) strategy is employed to extract the features and subsequently, a PCA+LDA approach is used to generate a compact and discriminative feature set. Finally, a new learning algorithm called MDE-ELM is suggested that combines modified differential evolution (MDE) and extreme learning machine (ELM) for segregation of MR images as pathological or healthy. The MDE is utilized to optimize the input weights and hidden biases of single-hidden-layer feed-forward neural networks (SLFN), whereas an analytical method is used for determining the output weights. The proposed algorithm performs optimization based on both the root mean squared error (RMSE) and norm of the output weights of SLFNs. The suggested scheme is benchmarked on three standard datasets and the results are compared against other competent schemes. The experimental outcomes show that the proposed scheme offers superior results compared to its counterparts. Further, it has been noticed that the proposed MDE-ELM classifier obtains better accuracy with compact network architecture than conventional algorithms.
Out of Reach, Out of Mind? Infants' Comprehension of References to Hidden Inaccessible Objects.
Osina, Maria A; Saylor, Megan M; Ganea, Patricia A
2017-09-01
This study investigated the nature of infants' difficulty understanding references to hidden inaccessible objects. Twelve-month-old infants (N = 32) responded to the mention of objects by looking at, pointing at, or approaching them when the referents were visible or accessible, but not when they were hidden and inaccessible (Experiment I). Twelve-month-olds (N = 16) responded robustly when a container with the hidden referent was moved from a previously inaccessible position to an accessible position before the request, but failed to respond when the reverse occurred (Experiment II). This suggests that infants might be able to track the hidden object's dislocations and update its accessibility as it changes. Knowing the hidden object is currently inaccessible inhibits their responding. Older, 16-month-old (N = 17) infants' performance was not affected by object accessibility. © 2016 The Authors. Child Development © 2016 Society for Research in Child Development, Inc.
Learning and inference in a nonequilibrium Ising model with hidden nodes.
Dunn, Benjamin; Roudi, Yasser
2013-02-01
We study inference and reconstruction of couplings in a partially observed kinetic Ising model. With hidden spins, calculating the likelihood of a sequence of observed spin configurations requires performing a trace over the configurations of the hidden ones. This, as we show, can be represented as a path integral. Using this representation, we demonstrate that systematic approximate inference and learning rules can be derived using dynamical mean-field theory. Although naive mean-field theory leads to an unstable learning rule, taking into account Gaussian corrections allows learning the couplings involving hidden nodes. It also improves learning of the couplings between the observed nodes compared to when hidden nodes are ignored.
Sundler, Annelie J; Höglander, Jessica; Eklund, Jakob Håkansson; Eide, Hilde; Holmström, Inger K
2017-02-01
This study aims to a) explore to what extent older persons express emotional cues and concerns during home care visits; b) describe what cues and concerns these older persons expressed, and c) explore who initiated these cues and concerns. A descriptive and cross-sectional study was conducted. Data consisted of 188 audio recorded home care visits with older persons and registered nurses or nurse assistants, coded with the Verona coding definitions on emotional sequences (VR-CoDES). Emotional expressions of cues and concerns occurred in 95 (51%) of the 188 recorded home care visits. Most frequent were implicit expressions of cues (n=292) rather than explicit concerns (n=24). Utterances with hints to hidden concerns (63,9%, n=202) were most prevalent, followed by vague or unspecific expressions of emotional worries (15,8%, n=50). Most of these were elicited by the nursing staff (63%, n=200). Emotional needs expressed by the older persons receiving home care were mainly communicated implicitly. To be attentive to such vaguely expressed emotions may demand nursing staff to be sensitive and open. The VR-CoDES can be applied on audio recorded home care visits to analyse verbal and emotional communication, and may allow comparative research. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Deep Learning Method for Denial of Service Attack Detection Based on Restricted Boltzmann Machine.
Imamverdiyev, Yadigar; Abdullayeva, Fargana
2018-06-01
In this article, the application of the deep learning method based on Gaussian-Bernoulli type restricted Boltzmann machine (RBM) to the detection of denial of service (DoS) attacks is considered. To increase the DoS attack detection accuracy, seven additional layers are added between the visible and the hidden layers of the RBM. Accurate results in DoS attack detection are obtained by optimization of the hyperparameters of the proposed deep RBM model. The form of the RBM that allows application of the continuous data is used. In this type of RBM, the probability distribution of the visible layer is replaced by a Gaussian distribution. Comparative analysis of the accuracy of the proposed method with Bernoulli-Bernoulli RBM, Gaussian-Bernoulli RBM, deep belief network type deep learning methods on DoS attack detection is provided. Detection accuracy of the methods is verified on the NSL-KDD data set. Higher accuracy from the proposed multilayer deep Gaussian-Bernoulli type RBM is obtained.
Munchausen syndrome by proxy: identification and diagnosis.
Thomas, Kathy
2003-06-01
Child abuse claims the lives of three children daily in the United States; however, one form of child abuse frequently goes undiagnosed-the true incidence is not known. Munchausen Syndrome by Proxy (MSBP) is a hidden and deceitful abuse whereby a caretaker of a child, usually the mother, fabricates information concerning the child's health or intentionally makes the child ill for personal attention and psychologic gain. Because health care professionals are the child's first line of defense against MSBP, they must know all about the disorder to be able to identify MSBP and protect children from disability or death. Copyright 2003, Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Pop, P. P.; Pop-Vădean, A.; Barz, C.; Latinovic, T.
2016-08-01
This paper aims to address more confident mathematical laws to explain a literary phenomenon. For this we studied the play "O scrisoare pierduta (Lost Letter)" written by Ion Luca Caragiale, in order to establish some connection between the characters but also to show certain aspects hidden by the author under the personality of the characters. We use transdisciplinary research to get from measurements and calculations results who will demonstrate objective of the proposed research. The challenge is to find those favorite characters by the author. Information and communications technology is a tool for research that will integrate this knowledge for modeling and interfacing.
Fingerprint image enhancement by differential hysteresis processing.
Blotta, Eduardo; Moler, Emilce
2004-05-10
A new method to enhance defective fingerprints images through image digital processing tools is presented in this work. When the fingerprints have been taken without any care, blurred and in some cases mostly illegible, as in the case presented here, their classification and comparison becomes nearly impossible. A combination of spatial domain filters, including a technique called differential hysteresis processing (DHP), is applied to improve these kind of images. This set of filtering methods proved to be satisfactory in a wide range of cases by uncovering hidden details that helped to identify persons. Dactyloscopy experts from Policia Federal Argentina and the EAAF have validated these results.
Dincâ, V; Wiklund, C; Lukhtanov, V A; Kodandaramaiah, U; Norén, K; Dapporto, L; Wahlberg, N; Vila, R; Friberg, M
2013-01-01
Molecular studies of natural populations are often designed to detect and categorize hidden layers of cryptic diversity, and an emerging pattern suggests that cryptic species are more common and more widely distributed than previously thought. However, these studies are often decoupled from ecological and behavioural studies of species divergence. Thus, the mechanisms by which the cryptic diversity is distributed and maintained across large spatial scales are often unknown. In 1988, it was discovered that the common Eurasian Wood White butterfly consisted of two species (Leptidea sinapis and Leptidea reali), and the pair became an emerging model for the study of speciation and chromosomal evolution. In 2011, the existence of a third cryptic species (Leptidea juvernica) was proposed. This unexpected discovery raises questions about the mechanisms preventing gene flow and about the potential existence of additional species hidden in the complex. Here, we compare patterns of genetic divergence across western Eurasia in an extensive data set of mitochondrial and nuclear DNA sequences with behavioural data on inter- and intraspecific reproductive isolation in courtship experiments. We show that three species exist in accordance with both the phylogenetic and biological species concepts and that additional hidden diversity is unlikely to occur in Europe. The Leptidea species are now the best studied cryptic complex of butterflies in Europe and a promising model system for understanding the formation of cryptic species and the roles of local processes, colonization patterns and heterospecific interactions for ecological and evolutionary divergence. PMID:23909947
3.55 keV line from exciting dark matter without a hidden sector
Berlin, Asher; DiFranzo, Anthony; Hooper, Dan
2015-04-24
In this study, models in which dark matter particles can scatter into a slightly heavier state which promptly decays to the lighter state and a photon (known as eXciting Dark Matter, or XDM) have been shown to be capable of generating the 3.55 keV line observed from galaxy clusters, while suppressing the flux of such a line from smaller halos, including dwarf galaxies. In most of the XDM models discussed in the literature, this up-scattering is mediated by a new light particle, and dark matter annihilations proceed into pairs of this same light state. In these models, the dark matter andmore » the mediator effectively reside within a hidden sector, without sizable couplings to the Standard Model. In this paper, we explore a model of XDM that does not include a hidden sector. Instead, the dark matter both up-scatters and annihilates through the near resonant exchange of an O(10 2) GeV pseudoscalar with large Yukawa couplings to the dark matter and smaller, but non-neglibile, couplings to Standard Model fermions. The dark matter and the mediator are each mixtures of Standard Model singlets and SU(2) W doublets. We identify parameter space in which this model can simultaneously generate the 3.55 keV line and the gamma-ray excess observed from the Galactic center, without conflicting with constraints from colliders, direct detection experiments, or observations of dwarf galaxies.« less
Sequential Pattern Detection and Time Series Models for Predicting IED Attacks
2009-03-01
customer purchases spaghetti sauce at the grocery store, do they also purchase some kind of meat and pasta noodles ? Knowing what items a shopper tends...such as the mileage, the number of passengers that can fit in the car, and the year the car was manufactured . The number of hidden nodes are...technology weapons that are inexpensive to manufacture and do not require extensive training to deploy. An improvised explosive device (IED) 28 is a
An Approach for Detecting Malicious Emails Using Runtime Monitoring with Hidden Data
2016-09-01
demonstrating that a system meets the user’s true requirements--often called ‘building the right system’” [14]. To select a validation and verification...requirements [18]. For example, we give a generalization of how natural language can be ambiguous. No restaurants will allow smoking inside. Here no...can qualify the rest of the sentence, meaning thereby there is not a restaurant that will allow smoking inside. On the other hand, it can qualify only
Health literacy and its importance for effective communication. Part 2.
Lambert, Veronica; Keogh, Deborah
2014-05-01
This is the second of two articles exploring the concept of health literacy, an often hidden barrier to effective healthcare communication. Part 1 was published in April ( Lambert and Keogh 2014 ). This article explains how to detect low levels of health literacy among parents and children, and outlines the challenges to assessing health literacy levels, including the stigma and discrimination some people experience. Some basic healthcare communication strategies for supporting health literacy in practice are suggested.
Galactic Observations of Terahertz C+ (GOT C+): [CII] Detection of Warm "Dark Gas" in the ISM
NASA Astrophysics Data System (ADS)
Langer, W. D.; Velusamy, T.; Pineda, J.; Goldsmith, P.; Li, D.; Yorke, H. W.
2011-11-01
The Herschel HIFI Key Program, Galactic Observations of Terahertz C+ (GOT C+) is a survey of [CII] 1.9 THz emission throughout the Galaxy. Comparison of the first results of this survey with HI and CO isotopomer emission reveals excess [CII] emission beyond that expected from HI and CO layers alone, and is best explained as coming from a hidden layer of H2 gas, the so-called ISM "dark gas".
A hidden view of wildlife conservation: How camera traps aid science, research and management
O'Connell, Allan F.
2015-01-01
Camera traps — remotely activated cameras with infrared sensors — first gained measurable popularity in wildlife conservation in the early 1990s. Today, they’re used for a variety of activities, from species-specific research to broad-scale inventory or monitoring programs that, in some cases, attempt to detect biodiversity across vast landscapes. As this modern tool continues to evolve, it’s worth examining its uses and benefits for wildlife management and conservation.
Novel methods for aircraft corrosion monitoring
NASA Astrophysics Data System (ADS)
Bossi, Richard H.; Criswell, Thomas L.; Ikegami, Roy; Nelson, James; Normand, Eugene; Rutherford, Paul S.; Shrader, John E.
1995-07-01
Monitoring aging aircraft for hidden corrosion is a significant problem for both military and civilian aircraft. Under a Wright Laboratory sponsored program, Boeing Defense & Space Group is investigating three novel methods for detecting and monitoring hidden corrosion: (1) atmospheric neutron radiography, (2) 14 MeV neutron activation analysis and (3) fiber optic corrosion sensors. Atmospheric neutron radiography utilizes the presence of neutrons in the upper atmosphere as a source for interrogation of the aircraft structure. Passive track-etch neutron detectors, which have been previously placed on the aircraft, are evaluated during maintenance checks to assess the presence of corrosion. Neutrons generated by an accelerator are used via activation analysis to assess the presence of distinctive elements in corrosion products, particularly oxygen. By using fast (14 MeV) neutrons for the activation, portable, high intensity sources can be employed for field testing of aircraft. The third novel method uses fiber optics as part of a smart structure technology for corrosion detection and monitoring. Fiber optic corrosion sensors are placed in the aircraft at locations known to be susceptible to corrosion. Periodic monitoring of the sensors is used to alert maintenance personnel to the presence and degree of corrosion at specific locations on the aircraft. During the atmospheric neutron experimentation, we identified a fourth method referred to as secondary emission radiography (SER). This paper discusses the development of these methods.
Conesa, D; Martínez-Beneito, M A; Amorós, R; López-Quílez, A
2015-04-01
Considerable effort has been devoted to the development of statistical algorithms for the automated monitoring of influenza surveillance data. In this article, we introduce a framework of models for the early detection of the onset of an influenza epidemic which is applicable to different kinds of surveillance data. In particular, the process of the observed cases is modelled via a Bayesian Hierarchical Poisson model in which the intensity parameter is a function of the incidence rate. The key point is to consider this incidence rate as a normal distribution in which both parameters (mean and variance) are modelled differently, depending on whether the system is in an epidemic or non-epidemic phase. To do so, we propose a hidden Markov model in which the transition between both phases is modelled as a function of the epidemic state of the previous week. Different options for modelling the rates are described, including the option of modelling the mean at each phase as autoregressive processes of order 0, 1 or 2. Bayesian inference is carried out to provide the probability of being in an epidemic state at any given moment. The methodology is applied to various influenza data sets. The results indicate that our methods outperform previous approaches in terms of sensitivity, specificity and timeliness. © The Author(s) 2011 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.
Prediction Study on Anti-Slide Control of Railway Vehicle Based on RBF Neural Networks
NASA Astrophysics Data System (ADS)
Yang, Lijun; Zhang, Jimin
While railway vehicle braking, Anti-slide control system will detect operating status of each wheel-sets e.g. speed difference and deceleration etc. Once the detected value on some wheel-set is over pre-defined threshold, brake effort on such wheel-set will be adjusted automatically to avoid blocking. Such method takes effect on guarantee safety operation of vehicle and avoid wheel-set flatness, however it cannot adapt itself to the rail adhesion variation. While wheel-sets slide, the operating status is chaotic time series with certain law, and can be predicted with the law and experiment data in certain time. The predicted values can be used as the input reference signals of vehicle anti-slide control system, to judge and control the slide status of wheel-sets. In this article, the RBF neural networks is taken to predict wheel-set slide status in multi-step with weight vector adjusted based on online self-adaptive algorithm, and the center & normalizing parameters of active function of the hidden unit of RBF neural networks' hidden layer computed with K-means clustering algorithm. With multi-step prediction simulation, the predicted signal with appropriate precision can be used by anti-slide system to trace actively and adjust wheel-set slide tendency, so as to adapt to wheel-rail adhesion variation and reduce the risk of wheel-set blocking.
Devarajan, Karthik; Parsons, Theodore; Wang, Qiong; O'Neill, Raymond; Solomides, Charalambos; Peiper, Stephen C.; Testa, Joseph R.; Uzzo, Robert; Yang, Haifeng
2017-01-01
Intratumoral heterogeneity (ITH) is a prominent feature of kidney cancer. It is not known whether it has utility in finding associations between protein expression and clinical parameters. We used ITH that is detected by immunohistochemistry (IHC) to aid the association analysis between the loss of SWI/SNF components and clinical parameters.160 ccRCC tumors (40 per tumor stage) were used to generate tissue microarray (TMA). Four foci from different regions of each tumor were selected. IHC was performed against PBRM1, ARID1A, SETD2, SMARCA4, and SMARCA2. Statistical analyses were performed to correlate biomarker losses with patho-clinical parameters. Categorical variables were compared between groups using Fisher's exact tests. Univariate and multivariable analyses were used to correlate biomarker changes and patient survivals. Multivariable analyses were performed by constructing decision trees using the classification and regression trees (CART) methodology. IHC detected widespread ITH in ccRCC tumors. The statistical analysis of the “Truncal loss” (root loss) found additional correlations between biomarker losses and tumor stages than the traditional “Loss in tumor (total)”. Losses of SMARCA4 or SMARCA2 significantly improved prognosis for overall survival (OS). Losses of PBRM1, ARID1A or SETD2 had the opposite effect. Thus “Truncal Loss” analysis revealed hidden links between protein losses and patient survival in ccRCC. PMID:28445125
Quantitative metal magnetic memory reliability modeling for welded joints
NASA Astrophysics Data System (ADS)
Xing, Haiyan; Dang, Yongbin; Wang, Ben; Leng, Jiancheng
2016-03-01
Metal magnetic memory(MMM) testing has been widely used to detect welded joints. However, load levels, environmental magnetic field, and measurement noises make the MMM data dispersive and bring difficulty to quantitative evaluation. In order to promote the development of quantitative MMM reliability assessment, a new MMM model is presented for welded joints. Steel Q235 welded specimens are tested along the longitudinal and horizontal lines by TSC-2M-8 instrument in the tensile fatigue experiments. The X-ray testing is carried out synchronously to verify the MMM results. It is found that MMM testing can detect the hidden crack earlier than X-ray testing. Moreover, the MMM gradient vector sum K vs is sensitive to the damage degree, especially at early and hidden damage stages. Considering the dispersion of MMM data, the K vs statistical law is investigated, which shows that K vs obeys Gaussian distribution. So K vs is the suitable MMM parameter to establish reliability model of welded joints. At last, the original quantitative MMM reliability model is first presented based on the improved stress strength interference theory. It is shown that the reliability degree R gradually decreases with the decreasing of the residual life ratio T, and the maximal error between prediction reliability degree R 1 and verification reliability degree R 2 is 9.15%. This presented method provides a novel tool of reliability testing and evaluating in practical engineering for welded joints.
2003-08-14
KENNEDY SPACE CENTER, FLA. - In the mobile service tower on Launch Pad 17-B, Cape Canaveral Air Force Station, workers move the first half of the fairing around the Space Infrared Telescope Facility (SIRTF) behind it for encapsulation. SIRTF will obtain images and spectra by detecting the infrared energy, or heat, radiated by objects in space. Consisting of a 0.85-meter telescope and three cryogenically cooled science instruments, SIRTF will be the largest infrared telescope ever launched into space. It is the fourth and final element in NASA’s family of orbiting “Great Observatories.” Its highly sensitive instruments will give a unique view of the Universe and peer into regions of space that are hidden from optical telescopes.
2003-08-14
KENNEDY SPACE CENTER, FLA. - In the mobile service tower on Launch Pad 17-B, Cape Canaveral Air Force Station, the top of the fairing is seen as it moves into place around the Space Infrared Telescope Facility (SIRTF). SIRTF will obtain images and spectra by detecting the infrared energy, or heat, radiated by objects in space. Consisting of a 0.85-meter telescope and three cryogenically cooled science instruments, SIRTF will be the largest infrared telescope ever launched into space. It is the fourth and final element in NASA’s family of orbiting “Great Observatories.” Its highly sensitive instruments will give a unique view of the Universe and peer into regions of space that are hidden from optical telescopes.
2003-08-14
KENNEDY SPACE CENTER, FLA. - In the mobile service tower on Launch Pad 17-B, Cape Canaveral Air Force Station, the first half of the fairing is moved around the Space Infrared Telescope Facility (SIRTF). SIRTF will obtain images and spectra by detecting the infrared energy, or heat, radiated by objects in space. Consisting of a 0.85-meter telescope and three cryogenically cooled science instruments, SIRTF will be the largest infrared telescope ever launched into space. It is the fourth and final element in NASA’s family of orbiting “Great Observatories.” Its highly sensitive instruments will give a unique view of the Universe and peer into regions of space that are hidden from optical telescopes.
2003-08-14
KENNEDY SPACE CENTER, FLA. - In the mobile service tower on Launch Pad 17-B, Cape Canaveral Air Force Station, the first half of the fairing (background) moves toward the Space Infrared Telescope Facility (foreground) for encapsulation. SIRTF will obtain images and spectra by detecting the infrared energy, or heat, radiated by objects in space. Consisting of a 0.85-meter telescope and three cryogenically cooled science instruments, SIRTF will be the largest infrared telescope ever launched into space. It is the fourth and final element in NASA’s family of orbiting “Great Observatories.” Its highly sensitive instruments will give a unique view of the Universe and peer into regions of space that are hidden from optical telescopes.
2003-08-14
KENNEDY SPACE CENTER, FLA. - In the mobile service tower on Launch Pad 17-B, Cape Canaveral Air Force Station, workers watch as the first half of the fairing moves closer around the Space Infrared Telescope Facility (SIRTF). SIRTF will obtain images and spectra by detecting the infrared energy, or heat, radiated by objects in space. Consisting of a 0.85-meter telescope and three cryogenically cooled science instruments, SIRTF will be the largest infrared telescope ever launched into space. It is the fourth and final element in NASA’s family of orbiting “Great Observatories.” Its highly sensitive instruments will give a unique view of the Universe and peer into regions of space that are hidden from optical telescopes.
A Study of Lane Detection Algorithm for Personal Vehicle
NASA Astrophysics Data System (ADS)
Kobayashi, Kazuyuki; Watanabe, Kajiro; Ohkubo, Tomoyuki; Kurihara, Yosuke
By the word “Personal vehicle”, we mean a simple and lightweight vehicle expected to emerge as personal ground transportation devices. The motorcycle, electric wheelchair, motor-powered bicycle, etc. are examples of the personal vehicle and have been developed as the useful for transportation for a personal use. Recently, a new types of intelligent personal vehicle called the Segway has been developed which is controlled and stabilized by using on-board intelligent multiple sensors. The demand for needs for such personal vehicles are increasing, 1) to enhance human mobility, 2) to support mobility for elderly person, 3) reduction of environmental burdens. Since rapidly growing personal vehicles' market, a number of accidents caused by human error is also increasing. The accidents are caused by it's drive ability. To enhance or support drive ability as well as to prevent accidents, intelligent assistance is necessary. One of most important elemental functions for personal vehicle is robust lane detection. In this paper, we develop a robust lane detection method for personal vehicle at outdoor environments. The proposed lane detection method employing a 360 degree omni directional camera and unique robust image processing algorithm. In order to detect lanes, combination of template matching technique and Hough transform are employed. The validity of proposed lane detection algorithm is confirmed by actual developed vehicle at various type of sunshined outdoor conditions.
Life imitating art: depictions of the hidden curriculum in medical television programs.
Stanek, Agatha; Clarkin, Chantalle; Bould, M Dylan; Writer, Hilary; Doja, Asif
2015-09-26
The hidden curriculum represents influences occurring within the culture of medicine that indirectly alter medical professionals' interactions, beliefs and clinical practices throughout their training. One approach to increase medical student awareness of the hidden curriculum is to provide them with readily available examples of how it is enacted in medicine; as such the purpose of this study was to examine depictions of the hidden curriculum in popular medical television programs. One full season of ER, Grey's Anatomy and Scrubs were selected for review. A summative content analysis was performed to ascertain the presence of depictions of the hidden curriculum, as well as to record the type, frequency and quality of examples. A second reviewer also viewed a random selection of episodes from each series to establish coding reliability. The most prevalent themes across all television programs were: the hierarchical nature of medicine; challenges during transitional stages in medicine; the importance of role modeling; patient dehumanization; faking or overstating one's capabilities; unprofessionalism; the loss of idealism; and difficulties with work-life balance. The hidden curriculum is frequently depicted in popular medical television shows. These examples of the hidden curriculum could serve as a valuable teaching resource in undergraduate medical programs.
Uncovering hidden nodes in complex networks in the presence of noise
Su, Ri-Qi; Lai, Ying-Cheng; Wang, Xiao; Do, Younghae
2014-01-01
Ascertaining the existence of hidden objects in a complex system, objects that cannot be observed from the external world, not only is curiosity-driven but also has significant practical applications. Generally, uncovering a hidden node in a complex network requires successful identification of its neighboring nodes, but a challenge is to differentiate its effects from those of noise. We develop a completely data-driven, compressive-sensing based method to address this issue by utilizing complex weighted networks with continuous-time oscillatory or discrete-time evolutionary-game dynamics. For any node, compressive sensing enables accurate reconstruction of the dynamical equations and coupling functions, provided that time series from this node and all its neighbors are available. For a neighboring node of the hidden node, this condition cannot be met, resulting in abnormally large prediction errors that, counterintuitively, can be used to infer the existence of the hidden node. Based on the principle of differential signal, we demonstrate that, when strong noise is present, insofar as at least two neighboring nodes of the hidden node are subject to weak background noise only, unequivocal identification of the hidden node can be achieved. PMID:24487720
NASA Astrophysics Data System (ADS)
Yoon, Hong-Jun; Carmichael, Tandy R.; Tourassi, Georgia
2014-03-01
Two people may analyze a visual scene in two completely different ways. Our study sought to determine whether human gaze may be used to establish the identity of an individual. To accomplish this objective we investigated the gaze pattern of twelve individuals viewing still images with different spatial relationships. Specifically, we created 5 visual "dotpattern" tests to be shown on a standard computer monitor. These tests challenged the viewer's capacity to distinguish proximity, alignment, and perceptual organization. Each test included 50 images of varying difficulty (total of 250 images). Eye-tracking data were collected from each individual while taking the tests. The eye-tracking data were converted into gaze velocities and analyzed with Hidden Markov Models to develop personalized gaze profiles. Using leave-one-out cross-validation, we observed that these personalized profiles could differentiate among the 12 users with classification accuracy ranging between 53% and 76%, depending on the test. This was statistically significantly better than random guessing (i.e., 8.3% or 1 out of 12). Classification accuracy was higher for the tests where the users' average gaze velocity per case was lower. The study findings support the feasibility of using gaze as a biometric or personalized biomarker. These findings could have implications in Radiology training and the development of personalized e-learning environments.
Marrow, Jocelyn; Luhrmann, Tanya Marie
2012-09-01
This essay examines the spaces across societies in which persons with severe mental illness lose meaningful social roles and are reduced to "bare life." Comparing ethnographic and interview data from the United States and India, we suggest that these processes of exclusion take place differently: on the street in the United States, and in the family household in India. We argue that cultural, historical, and economic factors determine which spaces become zones of social abandonment across societies. We compare strategies for managing and treating persons with psychosis across the United States and India, and demonstrate that the relative efficiency of state surveillance of populations and availability of public social and psychiatric services, the relative importance of family honor, the extent to which a culture of psychopharmaceutical use has penetrated social life, and other historical features, contribute to circumstances in which disordered Indian persons are more likely to be forcefully "hidden" in domestic space, whereas mentally ill persons in the United States are more likely to be expelled to the street. However, in all locations, social marginalization takes place by stripping away the subject's efficacy in social communication. That is, the socially "dead" lose communicative efficacy, a predicament, following Agamben, we describe as "bare voice."
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yoon, Hong-Jun; Carmichael, Tandy; Tourassi, Georgia
Two people may analyze a visual scene in two completely different ways. Our study sought to determine whether human gaze may be used to establish the identity of an individual. To accomplish this objective we investigated the gaze pattern of twelve individuals viewing different still images with different spatial relationships. Specifically, we created 5 visual dot-pattern tests to be shown on a standard computer monitor. These tests challenged the viewer s capacity to distinguish proximity, alignment, and perceptual organization. Each test included 50 images of varying difficulty (total of 250 images). Eye-tracking data were collected from each individual while takingmore » the tests. The eye-tracking data were converted into gaze velocities and analyzed with Hidden Markov Models to develop personalized gaze profiles. Using leave-one-out cross-validation, we observed that these personalized profiles could differentiate among the 12 users with classification accuracy ranging between 53% and 76%, depending on the test. This was statistically significantly better than random guessing (i.e., 8.3% or 1 out of 12). Classification accuracy was higher for the tests where the users average gaze velocity per case was lower. The study findings support the feasibility of using gaze as a biometric or personalized biomarker. These findings could have implications in Radiology training and the development of personalized e-learning environments.« less
The Politics of the Hidden Curriculum
ERIC Educational Resources Information Center
Giroux, Henry A.
1977-01-01
Schools teach much more than the traditional curriculum. They also teach a "hidden curriculum"--those unstated norms, values, and beliefs promoting hierarchic and authoritarian social relations that are transmitted to students through the underlying educational structure. Discusses the effects of the "hidden curriculum" on the…
Birefringence and hidden photons
NASA Astrophysics Data System (ADS)
Arza, Ariel; Gamboa, J.
2018-05-01
We study a model where photons interact with hidden photons and millicharged particles through a kinetic mixing term. Particularly, we focus on vacuum birefringence effects and we find a bound for the millicharged parameter assuming that hidden photons are a piece of the local dark matter density.