Sample records for personal identification based

  1. Adding Personality to Gifted Identification: Relationships among Traditional and Personality-Based Constructs

    ERIC Educational Resources Information Center

    Carman, Carol A.

    2011-01-01

    One of the underutilized tools in gifted identification is personality-based measures. A multiple confirmatory factor analysis was utilized to examine the relationships between traditional identification methods and personality-based measures. The pattern of correlations indicated this model could be measuring two constructs, one related to…

  2. Feasibility of CRISPR-Cas9-Based In Vitro Drug Target Identification for Personalized Prostate Cancer Medicine

    DTIC Science & Technology

    2017-09-01

    AWARD NUMBER: W81XWH-16-1-0502 TITLE: Feasibility of CRISPR -Cas9-Based In Vitro Drug Target Identification for Personalized Prostate Cancer Medicine...CONTRACT NUMBER Feasibility of CRISPR -Cas9-Based In Vitro Drug Target Identification for Personalized Prostate Cancer Medicine 5b. GRANT NUMBER...Approved for Public Release; Distribution Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT This study tests the feasibility of using CRISPR -Cas9 to

  3. Personal identification by eyes.

    PubMed

    Marinović, Dunja; Njirić, Sanja; Coklo, Miran; Muzić, Vedrana

    2011-09-01

    Identification of persons through the eyes is in the field of biometrical science. Many security systems are based on biometric methods of personal identification, to determine whether a person is presenting itself truly. The human eye contains an extremely large number of individual characteristics that make it particularly suitable for the process of identifying a person. Today, the eye is considered to be one of the most reliable body parts for human identification. Systems using iris recognition are among the most secure biometric systems.

  4. Algorithm for personal identification in distance learning system based on registration of keyboard rhythm

    NASA Astrophysics Data System (ADS)

    Nikitin, P. V.; Savinov, A. N.; Bazhenov, R. I.; Sivandaev, S. V.

    2018-05-01

    The article describes the method of identifying a person in distance learning systems based on a keyboard rhythm. An algorithm for the organization of access control is proposed, which implements authentication, identification and verification of a person using the keyboard rhythm. Authentication methods based on biometric personal parameters, including those based on the keyboard rhythm, due to the inexistence of biometric characteristics without a particular person, are able to provide an advanced accuracy and inability to refuse authorship and convenience for operators of automated systems, in comparison with other methods of conformity checking. Methods of permanent hidden keyboard monitoring allow detecting the substitution of a student and blocking the key system.

  5. A Study of Hand Back Skin Texture Patterns for Personal Identification and Gender Classification

    PubMed Central

    Xie, Jin; Zhang, Lei; You, Jane; Zhang, David; Qu, Xiaofeng

    2012-01-01

    Human hand back skin texture (HBST) is often consistent for a person and distinctive from person to person. In this paper, we study the HBST pattern recognition problem with applications to personal identification and gender classification. A specially designed system is developed to capture HBST images, and an HBST image database was established, which consists of 1,920 images from 80 persons (160 hands). An efficient texton learning based method is then presented to classify the HBST patterns. First, textons are learned in the space of filter bank responses from a set of training images using the l1 -minimization based sparse representation (SR) technique. Then, under the SR framework, we represent the feature vector at each pixel over the learned dictionary to construct a representation coefficient histogram. Finally, the coefficient histogram is used as skin texture feature for classification. Experiments on personal identification and gender classification are performed by using the established HBST database. The results show that HBST can be used to assist human identification and gender classification. PMID:23012512

  6. WiFi-based person identification

    NASA Astrophysics Data System (ADS)

    Yuan, Jing

    2016-10-01

    There has been increased interest in WIFI devices equipped with multiple antennas, which brings various wireless sensing applications such as localization, gesture identification and motion tracking. WIFI-based sensing has a lot of benefits such as device Free, which has shown great potential in smart scenarios. In this paper, we present WIP, a system that can distinguish a person from a small group of people. We prove that Channel State Information (CSI) can identify a person's gait. From the related-work, different people have different gait features. Thus the CSI-based gait features can be used to identify a person. We then proposed a machine-learning model-ANN to classify different person. The results show that ANN has a good performance in our scenario.

  7. Resting State EEG-based biometrics for individual identification using convolutional neural networks.

    PubMed

    Lan Ma; Minett, James W; Blu, Thierry; Wang, William S-Y

    2015-08-01

    Biometrics is a growing field, which permits identification of individuals by means of unique physical features. Electroencephalography (EEG)-based biometrics utilizes the small intra-personal differences and large inter-personal differences between individuals' brainwave patterns. In the past, such methods have used features derived from manually-designed procedures for this purpose. Another possibility is to use convolutional neural networks (CNN) to automatically extract an individual's best and most unique neural features and conduct classification, using EEG data derived from both Resting State with Open Eyes (REO) and Resting State with Closed Eyes (REC). Results indicate that this CNN-based joint-optimized EEG-based Biometric System yields a high degree of accuracy of identification (88%) for 10-class classification. Furthermore, rich inter-personal difference can be found using a very low frequency band (0-2Hz). Additionally, results suggest that the temporal portions over which subjects can be individualized is less than 200 ms.

  8. Social Identification in Sports Teams: The Role of Personal, Social, and Collective Identity Motives.

    PubMed

    Thomas, William E; Brown, Rupert; Easterbrook, Matthew J; Vignoles, Vivian L; Manzi, Claudia; D'Angelo, Chiara; Holt, Jeremy J

    2017-04-01

    Based on motivated identity construction theory (MICT; Vignoles, 2011), we offer an integrative approach examining the combined roles of six identity motives (self-esteem, distinctiveness, belonging, meaning, continuity, and efficacy) instantiated at three different motivational levels (personal, social, and collective identity) as predictors of group identification. These identity processes were investigated among 369 members of 45 sports teams from England and Italy in a longitudinal study over 6 months with four time points. Multilevel change modeling and cross-lagged analyses showed that satisfaction of four personal identity motives (individuals' personal feelings of self-esteem, distinctiveness, meaning, and efficacy derived from team membership), three social identity motives (individuals' feelings that the team identity carries a sense of belonging, meaning, and continuity), and one collective identity motive (a shared belief in group distinctiveness) significantly predicted group identification. Motivational processes underlying group identification are complex, multilayered, and not reducible to personal needs.

  9. Person identification by using 3D palmprint data

    NASA Astrophysics Data System (ADS)

    Bai, Xuefei; Huang, Shujun; Gao, Nan; Zhang, Zonghua

    2016-11-01

    Person identification based on biometrics is drawing more and more attentions in identity and information safety. This paper presents a biometric system to identify person using 3D palmprint data, including a non-contact system capturing 3D palmprint quickly and a method identifying 3D palmprint fast. In order to reduce the effect of slight shaking of palm on the data accuracy, a DLP (Digital Light Processing) projector is utilized to trigger a CCD camera based on structured-light and triangulation measurement and 3D palmprint data could be gathered within 1 second. Using the obtained database and the PolyU 3D palmprint database, feature extraction and matching method is presented based on MCI (Mean Curvature Image), Gabor filter and binary code list. Experimental results show that the proposed method can identify a person within 240 ms in the case of 4000 samples. Compared with the traditional 3D palmprint recognition methods, the proposed method has high accuracy, low EER (Equal Error Rate), small storage space, and fast identification speed.

  10. Index case finding facilitates identification and linkage to care of children and young persons living with HIV/AIDS in Malawi.

    PubMed

    Ahmed, Saeed; Sabelli, Rachael A; Simon, Katie; Rosenberg, Nora E; Kavuta, Elijah; Harawa, Mwelura; Dick, Spencer; Linzie, Frank; Kazembe, Peter N; Kim, Maria H

    2017-08-01

    Evaluation of a novel index case finding and linkage-to-care programme to identify and link HIV-infected children (1-15 years) and young persons (>15-24 years) to care. HIV-infected patients enrolled in HIV services were screened and those who reported untested household members (index cases) were offered home- or facility-based HIV testing and counselling (HTC) of their household by a community health worker (CHW). HIV-infected household members identified were enrolled in a follow-up programme offering home and facility-based follow-up by CHWs. Of the 1567 patients enrolled in HIV services, 1030 (65.7%) were screened and 461 (44.8%) identified as index cases; 93.5% consented to HIV testing of their households and of those, 279 (64.7%) reported an untested child or young person. CHWs tested 711 children and young persons, newly diagnosed 28 HIV-infected persons (yield 4.0%; 95% CI: 2.7-5.6), and identified an additional two HIV-infected persons not enrolled in care. Of the 30 HIV-infected persons identified, 23 (76.6%) were linked to HIV services; 18 of the 20 eligible for ART (90.0%) were initiated. Median time (IQR) from identification to enrolment into HIV services was 4 days (1-8) and from identification to ART start was 6 days (1-8). Almost half of HIV-infected patients enrolled in treatment services had untested household members, many of whom were children and young persons. Index case finding, coupled with home-based testing and tracked follow-up, is acceptable, feasible and facilitates the identification and timely linkage to care of HIV-infected children and young persons. © 2017 The Authors. Tropical Medicine & International Health Published by John Wiley & Sons Ltd.

  11. Towards Open-World Person Re-Identification by One-Shot Group-Based Verification.

    PubMed

    Zheng, Wei-Shi; Gong, Shaogang; Xiang, Tao

    2016-03-01

    Solving the problem of matching people across non-overlapping multi-camera views, known as person re-identification (re-id), has received increasing interests in computer vision. In a real-world application scenario, a watch-list (gallery set) of a handful of known target people are provided with very few (in many cases only a single) image(s) (shots) per target. Existing re-id methods are largely unsuitable to address this open-world re-id challenge because they are designed for (1) a closed-world scenario where the gallery and probe sets are assumed to contain exactly the same people, (2) person-wise identification whereby the model attempts to verify exhaustively against each individual in the gallery set, and (3) learning a matching model using multi-shots. In this paper, a novel transfer local relative distance comparison (t-LRDC) model is formulated to address the open-world person re-identification problem by one-shot group-based verification. The model is designed to mine and transfer useful information from a labelled open-world non-target dataset. Extensive experiments demonstrate that the proposed approach outperforms both non-transfer learning and existing transfer learning based re-id methods.

  12. Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation.

    PubMed

    Marcel, Sébastien; Millán, José Del R

    2007-04-01

    In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is unique and that the electroencephalogram (EEG) can be used for biometric identification. EEG-based biometry is an emerging research topic and we believe that it may open new research directions and applications in the future. However, very little work has been done in this area and was focusing mainly on person identification but not on person authentication. Person authentication aims to accept or to reject a person claiming an identity, i.e., comparing a biometric data to one template, while the goal of person identification is to match the biometric data against all the records in a database. We propose the use of a statistical framework based on Gaussian Mixture Models and Maximum A Posteriori model adaptation, successfully applied to speaker and face authentication, which can deal with only one training session. We perform intensive experimental simulations using several strict train/test protocols to show the potential of our method. We also show that there are some mental tasks that are more appropriate for person authentication than others.

  13. Choosing relatives for DNA identification of missing persons.

    PubMed

    Ge, Jianye; Budowle, Bruce; Chakraborty, Ranajit

    2011-01-01

    DNA-based analysis is integral to missing person identification cases. When direct references are not available, indirect relative references can be used to identify missing persons by kinship analysis. Generally, more reference relatives render greater accuracy of identification. However, it is costly to type multiple references. Thus, at times, decisions may need to be made on which relatives to type. In this study, pedigrees for 37 common reference scenarios with 13 CODIS STRs were simulated to rank the information content of different combinations of relatives. The results confirm that first-order relatives (parents and fullsibs) are the most preferred relatives to identify missing persons; fullsibs are also informative. Less genetic dependence between references provides a higher on average likelihood ratio. Distant relatives may not be helpful solely by autosomal markers. But lineage-based Y chromosome and mitochondrial DNA markers can increase the likelihood ratio or serve as filters to exclude putative relationships. © 2010 American Academy of Forensic Sciences.

  14. Age Identification in the Framework of Successful Aging: A Study of Older Finnish People

    ERIC Educational Resources Information Center

    Uotinen, Virpi; Suutama, Timo; Ruoppila, Isto

    2003-01-01

    A person-oriented approach was used in a study of age identification among community-dwelling older people. The study was based on 8-year follow-up data; 843 persons aged 65-84 were involved in the first phase of the study, and 426 persons aged 73-92, in the second phase. Loosely, on the basis of the distinction between successful, usual, and…

  15. Systems and methods for remote long standoff biometric identification using microwave cardiac signals

    NASA Technical Reports Server (NTRS)

    McGrath, William R. (Inventor); Talukder, Ashit (Inventor)

    2012-01-01

    Systems and methods for remote, long standoff biometric identification using microwave cardiac signals are provided. In one embodiment, the invention relates to a method for remote biometric identification using microwave cardiac signals, the method including generating and directing first microwave energy in a direction of a person, receiving microwave energy reflected from the person, the reflected microwave energy indicative of cardiac characteristics of the person, segmenting a signal indicative of the reflected microwave energy into a waveform including a plurality of heart beats, identifying patterns in the microwave heart beats waveform, and identifying the person based on the identified patterns and a stored microwave heart beats waveform.

  16. Research on gait-based human identification

    NASA Astrophysics Data System (ADS)

    Li, Youguo

    Gait recognition refers to automatic identification of individual based on his/her style of walking. This paper proposes a gait recognition method based on Continuous Hidden Markov Model with Mixture of Gaussians(G-CHMM). First, we initialize a Gaussian mix model for training image sequence with K-means algorithm, then train the HMM parameters using a Baum-Welch algorithm. These gait feature sequences can be trained and obtain a Continuous HMM for every person, therefore, the 7 key frames and the obtained HMM can represent each person's gait sequence. Finally, the recognition is achieved by Front algorithm. The experiments made on CASIA gait databases obtain comparatively high correction identification ratio and comparatively strong robustness for variety of bodily angle.

  17. Personal Identification by Keystroke Dynamics in Japanese Free Text Typing

    NASA Astrophysics Data System (ADS)

    Samura, Toshiharu; Nishimura, Haruhiko

    Biometrics is classified into verification and identification. Many researchers on the keystroke dynamics have treated the verification of a fixed short password which is used for the user login. In this research, we pay attention to the identification and investigate several characteristics of the keystroke dynamics in Japanese free text typing. We developed Web-based typing software in order to collect the keystroke data on the Local Area Network and performed experiments on a total of 112 subjects, from which three groups of typing level, the beginner's level and above, the normal level and above and the middle level and above were constructed. Based on the identification methods by the weighted Euclid distance and the neural network for the extracted feature indexes in Japanese texts, we evaluated identification performances for the three groups. As a result, high accuracy of personal identification was confirmed in both methods, in proportion to the typing level of the group.

  18. Personalized medicine and chronic obstructive pulmonary disease.

    PubMed

    Wouters, E F M; Wouters, B B R A F; Augustin, I M L; Franssen, F M E

    2017-05-01

    The current review summarizes ongoing developments in personalized medicine and precision medicine in chronic obstructive pulmonary disease (COPD). Our current approach is far away of personalized management algorithms as current recommendations for COPD are largely based on a reductionist disease description, operationally defined by results of spirometry. Besides precision medicine developments, a personalized medicine approach in COPD is described based on a holistic approach of the patient and considering illness as the consequence of dynamic interactions within and between multiple interacting and self-adjusting systems. Pulmonary rehabilitation is described as a model of personalized medicine. Largely based on current understanding of inflammatory processes in COPD, targeted interventions in COPD are reviewed. Augmentation therapy for α-1-antitrypsine deficiency is described as model of precision medicine in COPD based in profound understanding of the related genetic endotype. Future developments of precision medicine in COPD require identification of relevant endotypes combined with proper identification of phenotypes involved in the complex and heterogeneous manifestations of COPD.

  19. Providing Agility in C2 Environments Through Networked Information Processing: A Model of Expertise

    DTIC Science & Technology

    2014-06-01

    personal benefits promoting self-esteem, pride, self-efficacy, personal identification with colleagues and organizations, obtaining a better...studies based on staged-event methods with “target-present” and “target-absent” lineups . The results show that when choosers make positive... identification , the correlation between confidence and accuracy was consistently high. Besides correct choosers have a higher mean confidence level than

  20. Employees' responses to an organizational merger: Intraindividual change in organizational identification, attachment, and turnover.

    PubMed

    Sung, Wookje; Woehler, Meredith L; Fagan, Jesse M; Grosser, Travis J; Floyd, Theresa M; Labianca, Giuseppe Joe

    2017-06-01

    The authors used pre-post merger data from 599 employees experiencing a major corporate merger to compare 3 conceptual models based on the logic of social identity theory (SIT) and exchange theory to explain employees' merger responses. At issue is how perceived change in employees' own jobs and roles (i.e., personal valence) and perceived change in their organization's status and merger appropriateness (i.e., organizational valence) affect their changing organizational identification, attachment attitudes, and voluntary turnover. The first model suggests that organizational identification and organizational attachment develop independently and have distinct antecedents. The second model posits that organizational identification mediates the relationships between change in organizational and personal valence and change in attachment and turnover. The third model posits that change in personal valence moderates the relationship between changes in organizational valence and in organizational identification and attachment. Using latent difference score (LDS) modeling in an SEM framework and survival analysis, the results suggest an emergent fourth model that integrates the first and second models: Although change in organizational identification during the merger mediates the relationship between change in personal status and organizational valence and change in attachment, there is a direct and unmediated relationship between change in personal valence and attachment. This integrated model has implications for M&A theory and practice. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. Explaining reactions to normative information about alcohol consumption: a test of an extended social identity model.

    PubMed

    Livingstone, Andrew G; McCafferty, Stephanie

    2015-04-01

    To test the role of group identification and the perceived importance of alcohol consumption to a group identity in shaping reactions to normative information about alcohol consumption. The study had a 2 (behaviour: identity-defining/alcohol vs. non-identity defining/caffeine) × 2 (norm: low vs. heavy consumption) between-subjects factorial design. Group identification and personal attitudes towards alcohol/caffeine consumption were included as measured predictors. Participants were 83 undergraduate students (44 female, 38 male, one unspecified) at a University in Scotland. Predictor and outcome variables included questionnaire measures of group (student) identification, personal attitudes to alcohol/caffeine consumption, the perceived importance of alcohol/caffeine consumption to group identity, and behavioral intentions to consume alcohol/caffeine. Personal attitude and group identification moderated the impact of norm information on consumption intentions, but only for alcohol consumption, and not caffeine consumption. For alcohol, norm information did affect intended consumption (ps ≤ .034), with the crucial exception of high identifiers who had favourable personal attitudes towards alcohol consumption. Instead, these individuals resist norm information (ps = .458 and .174), showing no decrease in intentions in the face of norm information that emphasised relatively 'low' levels of consumption. The impact of norm information on alcohol consumption intentions depends on group-based factors such as group identification and the perceived importance of alcohol to a group identity. When both of these factors are high, and an individual also personally favours the behaviour, the potential for norm-based interventions to fail is increased. Copyright © 2014 Elsevier B.V. All rights reserved.

  2. Anthropometric correlations between parts of the upper and lower limb: models for personal identification in a Sudanese population.

    PubMed

    Ahmed, Altayeb Abdalla

    2016-09-01

    Identification of a deceased individual is an essential component of medicolegal practice. However, personal identification based on commingled limbs or parts of limbs, necessary in investigations of mass disasters or some crimes, is a difficult task. Limb measurements have been utilized in the development of biological parameters for personal identification, but the possibility to estimate the dimensions of parts of limbs other than hands and feet has not been assessed. The present study proposes an approach to estimate the dimensions of various parts of limbs based on other limb measurements. The study included 320 Sudanese adults, with equal representation of men and women. Nine limb dimensions were measured (five based on the upper limb, four based on the lower limb), and extensive statistical analysis of the distribution of values was performed. The results showed that all of the measured dimensions were sexually dimorphic and that there was a significant positive correlation between the dimensions of various parts of limbs. Regression models (direct and stepwise) were developed to estimate the dimensions of parts of limbs based on measurements pertaining to one or more other parts of limbs. The study revealed that the dimensions of parts of the upper and lower limb can be estimated from one another. These findings can be used in medicolegal practice and extended to constructive surgery, orthopedics, and prosthesis design for lost limbs.

  3. Identification Problems in Personality Psychology1

    PubMed Central

    Borghans, Lex; Golsteyn, Bart H. H.; Heckman, James; Humphries, John Eric

    2011-01-01

    This paper discusses and illustrates identification problems in personality psychology. The measures used by psychologists to infer traits are based on behaviors, broadly defined. These behaviors are produced from multiple traits interacting with incentives in situations. In general, measures are determined by these multiple traits and do not identify any particular trait unless incentives and other traits are controlled for. Using two data sets, we show, as an example, that substantial portions of the variance in achievement test scores and grades, which are often used as measures of cognition, are explained by personality variables. PMID:21731170

  4. Distance Metric Learning Using Privileged Information for Face Verification and Person Re-Identification.

    PubMed

    Xu, Xinxing; Li, Wen; Xu, Dong

    2015-12-01

    In this paper, we propose a new approach to improve face verification and person re-identification in the RGB images by leveraging a set of RGB-D data, in which we have additional depth images in the training data captured using depth cameras such as Kinect. In particular, we extract visual features and depth features from the RGB images and depth images, respectively. As the depth features are available only in the training data, we treat the depth features as privileged information, and we formulate this task as a distance metric learning with privileged information problem. Unlike the traditional face verification and person re-identification tasks that only use visual features, we further employ the extra depth features in the training data to improve the learning of distance metric in the training process. Based on the information-theoretic metric learning (ITML) method, we propose a new formulation called ITML with privileged information (ITML+) for this task. We also present an efficient algorithm based on the cyclic projection method for solving the proposed ITML+ formulation. Extensive experiments on the challenging faces data sets EUROCOM and CurtinFaces for face verification as well as the BIWI RGBD-ID data set for person re-identification demonstrate the effectiveness of our proposed approach.

  5. A bimodal biometric identification system

    NASA Astrophysics Data System (ADS)

    Laghari, Mohammad S.; Khuwaja, Gulzar A.

    2013-03-01

    Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Physicals are related to the shape of the body. Behavioral are related to the behavior of a person. However, biometric authentication systems suffer from imprecision and difficulty in person recognition due to a number of reasons and no single biometrics is expected to effectively satisfy the requirements of all verification and/or identification applications. Bimodal biometric systems are expected to be more reliable due to the presence of two pieces of evidence and also be able to meet the severe performance requirements imposed by various applications. This paper presents a neural network based bimodal biometric identification system by using human face and handwritten signature features.

  6. Personal identification based on prescription eyewear.

    PubMed

    Berg, Gregory E; Collins, Randall S

    2007-03-01

    This study presents a web-based tool that can be used to assist in identification of unknown individuals using spectacle prescriptions. Currently, when lens prescriptions are used in forensic identifications, investigators are constrained to a simple "match" or "no-match" judgment with an antemortem prescription. It is not possible to evaluate the strength of the conclusion, or rather, the potential or real error rates associated with the conclusion. Three databases totaling over 385,000 individual prescriptions are utilized in this study to allow forensic analysts to easily determine the strength of individuation of a spectacle match to antemortem records by calculating the frequency at which the observed prescription occurs in various U.S. populations. Optical refractive errors are explained, potential states and combinations of refractive errors are described, measuring lens corrections is discussed, and a detailed description of the databases is presented. The practical application of this system is demonstrated using two recent forensic identifications. This research provides a valuable personal identification tool that can be used in cases where eyeglass portions are recovered in forensic contexts.

  7. Personal Identification of Deceased Persons: An Overview of the Current Methods Based on Physical Appearance.

    PubMed

    Caplova, Zuzana; Obertova, Zuzana; Gibelli, Daniele M; De Angelis, Danilo; Mazzarelli, Debora; Sforza, Chiarella; Cattaneo, Cristina

    2018-05-01

    The use of the physical appearance of the deceased has become more important because the available antemortem information for comparisons may consist only of a physical description and photographs. Twenty-one articles dealing with the identification based on the physiognomic features of the human body were selected for review and were divided into four sections: (i) visual recognition, (ii) specific facial/body areas, (iii) biometrics, and (iv) dental superimposition. While opinions about the reliability of the visual recognition differ, the search showed that it has been used in mass disasters, even without testing its objectivity and reliability. Specific facial areas being explored for the identification of dead; however, their practical use is questioned, similarly to soft biometrics. The emerging dental superimposition seems to be the only standardized and successfully applied method for identification so far. More research is needed into a potential use of the individualizing features, considering that postmortem changes and technical difficulties may affect the identification. © 2017 American Academy of Forensic Sciences.

  8. Asymmetric cultural effects on perceptual expertise underlie an own-race bias for voices

    PubMed Central

    Perrachione, Tyler K.; Chiao, Joan Y.; Wong, Patrick C.M.

    2009-01-01

    The own-race bias in memory for faces has been a rich source of empirical work on the mechanisms of person perception. This effect is thought to arise because the face-perception system differentially encodes the relevant structural dimensions of features and their configuration based on experiences with different groups of faces. However, the effects of sociocultural experiences on person perception abilities in other identity-conveying modalities like audition have not been explored. Investigating an own-race bias in the auditory domain provides a unique opportunity for studying whether person identification is a modality-independent construct and how it is sensitive to asymmetric cultural experiences. Here we show that an own-race bias in talker identification arises from asymmetric experience with different spoken dialects. When listeners categorized voices by race (White or Black), a subset of the Black voices were categorized as sounding White, while the opposite case was unattested. Acoustic analyses indicated listeners' perceptions about race were consistent with differences in specific phonetic and phonological features. In a subsequent person-identification experiment, the Black voices initially categorized as sounding White elicited an own-race bias from White listeners, but not from Black listeners. These effects are inconsistent with person-perception models that strictly analogize faces and voices based on recognition from only structural features. Our results demonstrate that asymmetric exposure to spoken dialect, independent from talkers' physical characteristics, affects auditory perceptual expertise for talker identification. Person perception thus additionally relies on socioculturally-acquired dynamic information, which may be represented by different mechanisms in different sensory modalities. PMID:19782970

  9. [Two cases of personal identification from dental information].

    PubMed

    Yamaguchi, T; Yamada, Y; Ohtani, S; Kogure, T; Nagao, M; Takatori, T; Ohira, H; Yamamoto, I; Watanabe, A

    1997-08-01

    We describe two cases in which unknown bodies were positively identified from dental information and biochemical examination using tooth materials. In one case, a charred body was positively identified with little effort by comparison of antemortem dental records (dental chart and dental X-ray film) with postmortem data. In the other case, although the unknown individual had dental treatment, the police were unable to obtain the antemortem dental records of the victim. We then conducted biochemical analysis of teeth, facilitating personal identification using DNA analysis and age estimation based on aspartic acid racemization. The mutation obtained from the sequence of mtDNA and the genotypes of HLADQ alpha, HPRTB and ABO blood groups including the data for estimated age supported the kinship between the unknown individual and his mother. The data for maternally inherited mtDNA were of great importance in this case, since it was possible to obtain DNA from the mother. Dental identification in one of the most accurate methods of personal identification if suitable antemortem records are available. In the absence of such records, biochemical analysis of teeth also makes it possible to increase the probability of correct personal identification.

  10. Principal Components Analyses of the MMPI-2 PSY-5 Scales. Identification of Facet Subscales

    ERIC Educational Resources Information Center

    Arnau, Randolph C.; Handel, Richard W.; Archer, Robert P.

    2005-01-01

    The Personality Psychopathology Five (PSY-5) is a five-factor personality trait model designed for assessing personality pathology using quantitative dimensions. Harkness, McNulty, and Ben-Porath developed Minnesota Multiphasic Personality Inventory-2 (MMPI-2) scales based on the PSY-5 model, and these scales were recently added to the standard…

  11. Lights, Camera…Citizen Science: Assessing the Effectiveness of Smartphone-Based Video Training in Invasive Plant Identification

    PubMed Central

    Starr, Jared; Schweik, Charles M.; Bush, Nathan; Fletcher, Lena; Finn, Jack; Fish, Jennifer; Bargeron, Charles T.

    2014-01-01

    The rapid growth and increasing popularity of smartphone technology is putting sophisticated data-collection tools in the hands of more and more citizens. This has exciting implications for the expanding field of citizen science. With smartphone-based applications (apps), it is now increasingly practical to remotely acquire high quality citizen-submitted data at a fraction of the cost of a traditional study. Yet, one impediment to citizen science projects is the question of how to train participants. The traditional “in-person” training model, while effective, can be cost prohibitive as the spatial scale of a project increases. To explore possible solutions, we analyze three training models: 1) in-person, 2) app-based video, and 3) app-based text/images in the context of invasive plant identification in Massachusetts. Encouragingly, we find that participants who received video training were as successful at invasive plant identification as those trained in-person, while those receiving just text/images were less successful. This finding has implications for a variety of citizen science projects that need alternative methods to effectively train participants when in-person training is impractical. PMID:25372597

  12. Suspect/foil identification in actual crimes and in the laboratory: a reality monitoring analysis.

    PubMed

    Behrman, Bruce W; Richards, Regina E

    2005-06-01

    Four reality monitoring variables were used to discriminate suspect from foil identifications in 183 actual criminal cases. Four hundred sixty-one identification attempts based on five and six-person lineups were analyzed. These identification attempts resulted in 238 suspect identifications and 68 foil identifications. Confidence, automatic processing, eliminative processing and feature use comprised the set of reality monitoring variables. Thirty-five verbal confidence phrases taken from police reports were assigned numerical values on a 10-point confidence scale. Automatic processing identifications were those that occurred "immediately" or "without hesitation." Eliminative processing identifications occurred when witnesses compared or eliminated persons in the lineups. Confidence, automatic processing and eliminative processing were significant predictors, but feature use was not. Confidence was the most effective discriminator. In cases that involved substantial evidence extrinsic to the identification 43% of the suspect identifications were made with high confidence, whereas only 10% of the foil identifications were made with high confidence. The results of a laboratory study using the same predictors generally paralleled the archival results. Forensic implications are discussed.

  13. Automatic Molar Extraction from Dental Panoramic Radiographs for Forensic Personal Identification

    NASA Astrophysics Data System (ADS)

    Samopa, Febriliyan; Asano, Akira; Taguchi, Akira

    Measurement of an individual molar provides rich information for forensic personal identification. We propose a computer-based system for extracting an individual molar from dental panoramic radiographs. A molar is obtained by extracting the region-of-interest, separating the maxilla and mandible, and extracting the boundaries between teeth. The proposed system is almost fully automatic; all that the user has to do is clicking three points on the boundary between the maxilla and the mandible.

  14. Personal identification based on blood vessels of retinal fundus images

    NASA Astrophysics Data System (ADS)

    Fukuta, Keisuke; Nakagawa, Toshiaki; Hayashi, Yoshinori; Hatanaka, Yuji; Hara, Takeshi; Fujita, Hiroshi

    2008-03-01

    Biometric technique has been implemented instead of conventional identification methods such as password in computer, automatic teller machine (ATM), and entrance and exit management system. We propose a personal identification (PI) system using color retinal fundus images which are unique to each individual. The proposed procedure for identification is based on comparison of an input fundus image with reference fundus images in the database. In the first step, registration between the input image and the reference image is performed. The step includes translational and rotational movement. The PI is based on the measure of similarity between blood vessel images generated from the input and reference images. The similarity measure is defined as the cross-correlation coefficient calculated from the pixel values. When the similarity is greater than a predetermined threshold, the input image is identified. This means both the input and the reference images are associated to the same person. Four hundred sixty-two fundus images including forty-one same-person's image pairs were used for the estimation of the proposed technique. The false rejection rate and the false acceptance rate were 9.9×10 -5% and 4.3×10 -5%, respectively. The results indicate that the proposed method has a higher performance than other biometrics except for DNA. To be used for practical application in the public, the device which can take retinal fundus images easily is needed. The proposed method is applied to not only the PI but also the system which warns about misfiling of fundus images in medical facilities.

  15. Dangers resulting from DNA profiling of biological materials derived from patients after allogeneic hematopoietic stem cell transplantation (allo-HSCT) with regard to forensic genetic analysis.

    PubMed

    Jacewicz, R; Lewandowski, K; Rupa-Matysek, J; Jędrzejczyk, M; Berent, J

    The study documents the risk that comes with DNA analysis of materials derived from patients after allogeneic hematopoietic stem cell transplantation (allo-HSCT) in forensic genetics. DNA chimerism was studied in 30 patients after allo-HSCT, based on techniques applied in contemporary forensic genetics, i.e. real-time PCR and multiplex PCR-STR with the use of autosomal DNA as well as Y-DNA markers. The results revealed that the DNA profile of the recipient's blood was identical with the donor's in the majority of cases. Therefore, blood analysis can lead to false conclusions in personal identification as well as kinship analysis. An investigation of buccal swabs revealed a mixture of DNA in the majority of recipients. Consequently, personal identification on the basis of stain analysis of the same origin may be impossible. The safest (but not ideal) material turned out to be the hair root. Its analysis based on autosomal DNA revealed 100% of the recipient's profile. However, an analysis based on Y-chromosome markers performed in female allo-HSCT recipients with male donors demonstrated the presence of donor DNA in hair cells - similarly to the blood and buccal swabs. In the light of potential risks arising from DNA profiling of biological materials derived from persons after allotransplantation in judicial aspects, certain procedures were proposed to eliminate such dangers. The basic procedures include abandoning the approach based exclusively on blood collection, both for kinship analysis and personal identification; asking persons who are to be tested about their history of allo-HSCT before sample collection and profile entry in the DNA database, and verification of DNA profiling based on hair follicles in uncertain cases.

  16. Brute-Force Approach for Mass Spectrometry-Based Variant Peptide Identification in Proteogenomics without Personalized Genomic Data

    NASA Astrophysics Data System (ADS)

    Ivanov, Mark V.; Lobas, Anna A.; Levitsky, Lev I.; Moshkovskii, Sergei A.; Gorshkov, Mikhail V.

    2018-02-01

    In a proteogenomic approach based on tandem mass spectrometry analysis of proteolytic peptide mixtures, customized exome or RNA-seq databases are employed for identifying protein sequence variants. However, the problem of variant peptide identification without personalized genomic data is important for a variety of applications. Following the recent proposal by Chick et al. (Nat. Biotechnol. 33, 743-749, 2015) on the feasibility of such variant peptide search, we evaluated two available approaches based on the previously suggested "open" search and the "brute-force" strategy. To improve the efficiency of these approaches, we propose an algorithm for exclusion of false variant identifications from the search results involving analysis of modifications mimicking single amino acid substitutions. Also, we propose a de novo based scoring scheme for assessment of identified point mutations. In the scheme, the search engine analyzes y-type fragment ions in MS/MS spectra to confirm the location of the mutation in the variant peptide sequence.

  17. Song Recognition without Identification: When People Cannot "Name that Tune" but Can Recognize It as Familiar

    ERIC Educational Resources Information Center

    Kostic, Bogdan; Cleary, Anne M.

    2009-01-01

    Recognition without identification (RWI) is a common day-to-day experience (as when recognizing a face or a tune as familiar without being able to identify the person or the song). It is also a well-established laboratory-based empirical phenomenon: When identification of recognition test items is prevented, participants can discriminate between…

  18. Intelligent person identification system using stereo camera-based height and stride estimation

    NASA Astrophysics Data System (ADS)

    Ko, Jung-Hwan; Jang, Jae-Hun; Kim, Eun-Soo

    2005-05-01

    In this paper, a stereo camera-based intelligent person identification system is suggested. In the proposed method, face area of the moving target person is extracted from the left image of the input steros image pair by using a threshold value of YCbCr color model and by carrying out correlation between the face area segmented from this threshold value of YCbCr color model and the right input image, the location coordinates of the target face can be acquired, and then these values are used to control the pan/tilt system through the modified PID-based recursive controller. Also, by using the geometric parameters between the target face and the stereo camera system, the vertical distance between the target and stereo camera system can be calculated through a triangulation method. Using this calculated vertical distance and the angles of the pan and tilt, the target's real position data in the world space can be acquired and from them its height and stride values can be finally extracted. Some experiments with video images for 16 moving persons show that a person could be identified with these extracted height and stride parameters.

  19. Development of biometric DNA ink for authentication security.

    PubMed

    Hashiyada, Masaki

    2004-10-01

    Among the various types of biometric personal identification systems, DNA provides the most reliable personal identification. It is intrinsically digital and unchangeable while the person is alive, and even after his/her death. Increasing the number of DNA loci examined can enhance the power of discrimination. This report describes the development of DNA ink, which contains synthetic DNA mixed with printing inks. Single-stranded DNA fragments encoding a personalized set of short tandem repeats (STR) were synthesized. The sequence was defined as follows. First, a decimal DNA personal identification (DNA-ID) was established based on the number of STRs in the locus. Next, this DNA-ID was encrypted using a binary, 160-bit algorithm, using a hashing function to protect privacy. Since this function is irreversible, no one can recover the original information from the encrypted code. Finally, the bit series generated above is transformed into base sequences, and double-stranded DNA fragments are amplified by the polymerase chain reaction (PCR) to protect against physical attacks. Synthesized DNA was detected successfully after samples printed in DNA ink were subjected to several resistance tests used to assess the stability of printing inks. Endurance test results showed that this DNA ink would be suitable for practical use as a printing ink and was resistant to 40 hours of ultraviolet exposure, performance commensurate with that of photogravure ink. Copyright 2004 Tohoku University Medical Press

  20. The role of patient personality in the identification of depression in older primary care patients.

    PubMed

    McCray, Laura W; Bogner, Hillary R; Sammel, Mary D; Gallo, Joseph J

    2007-11-01

    Our aim was to evaluate whether personality factors significantly contribute to the identification of depression in older primary care patients, even after controlling for depressive symptoms. We examined the association between personality factors and the identification of depression among 318 older adults who participated in the Spectrum study. High neuroticism (unadjusted Odds Ratio (OR) 2.36, 95% Confidence Interval (CI) [1.42, 3.93]) and low extraversion (adjusted OR 2.24, CI [1.26, 4.00]) were associated with physician identification of depression. Persons with high conscientiousness were less likely to be identified as depressed by the doctor (adjusted OR 0.45, CI [0.22, 0.91]). Personality factors influence the identification of depression among older persons in primary care over and above the relationship of depressive symptoms with physician identification. Knowledge of personality may influence the diagnosis and treatment of depression in primary care. Copyright 2007 John Wiley & Sons, Ltd.

  1. The desire to belong: Social identification as a predictor of treatment outcome in social anxiety disorder.

    PubMed

    Meuret, Alicia E; Chmielewski, Michael; Steele, Ashton M; Rosenfield, David; Petersen, Sibylle; Smits, Jasper A J; Simon, Naomi M; Otto, Michael W; Marques, Luana; Pollack, Mark H; Hofmann, Stefan G

    2016-06-01

    Perception of personal identity cannot be separated from the perception of the social context and one's social identity. Full involvement in group psychotherapy may require not only the awareness of personal impairment, but also social identification. The aim of the current study was to examine the association between social identification and symptom improvement in group-based psychotherapy. 169 participants received 12 sessions of group-based cognitive behavioral therapy for social anxiety disorder. Social identification, the extent to which a person identifies with those who suffer from the same psychological problem as themselves and/or with those lacking psychopathology (non-sufferers), and clinical outcome were assessed at baseline, mid-and posttreatment, and 1, 3, and 6-months follow-up. At baseline, patients aspired for closeness with non-sufferers, and viewed themselves as distant from fellow sufferers and non-sufferers. After treatment, participants viewed not only themselves, but also other individuals with social anxiety, as closer to both non-sufferers and fellow sufferers. These ratings were related to clinical outcomes. The increase in closeness to both sufferers and non-sufferers across treatment may reflect a movement towards a more tolerant, less dichotomous and rigid, separation of ill and healthy that occurs with successful social anxiety treatment. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. The desire to belong: Social identification as a predictor of treatment outcome in social anxiety disorder

    PubMed Central

    Meuret, Alicia E.; Chmielewski, Michael; Steele, Ashton M.; Rosenfield, David; Petersen, Sibylle; Smits, Jasper A.J.; Simon, Naomi M.; Otto, Michael W.; Marques, Luana; Pollack, Mark H.; Hofmann, Stefan G.

    2017-01-01

    Objective Perception of personal identity cannot be separated from the perception of the social context and one's social identity. Full involvement in group psychotherapy may require not only the awareness of personal impairment, but also social identification. The aim of the current study was to examine the association between social identification and symptom improvement in group-based psychotherapy. Method 169 participants received 12 sessions of group-based cognitive behavioral therapy for social anxiety disorder. Social identification, the extent to which a person identifies with those who suffer from the same psychological problem as themselves and/or with those lacking psychopathology (non-sufferers), and clinical outcome were assessed at baseline, mid-and posttreatment, and 1, 3, and 6-months follow-up. Results At baseline, patients aspired for closeness with non-sufferers, and viewed themselves as distant from fellow sufferers and non-sufferers. After treatment, participants viewed not only themselves, but also other individuals with social anxiety, as closer to both non-sufferers and fellow sufferers. These ratings were related to clinical outcomes. Conclusions The increase in closeness to both sufferers and non-sufferers across treatment may reflect a movement towards a more tolerant, less dichotomous and rigid, separation of ill and healthy that occurs with successful social anxiety treatment. PMID:27070526

  3. Model of Emotional Expressions in Movements

    ERIC Educational Resources Information Center

    Rozaliev, Vladimir L.; Orlova, Yulia A.

    2013-01-01

    This paper presents a new approach to automated identification of human emotions based on analysis of body movements, a recognition of gestures and poses. Methodology, models and automated system for emotion identification are considered. To characterize the person emotions in the model, body movements are described with linguistic variables and a…

  4. Optical security system for the protection of personal identification information.

    PubMed

    Doh, Yang-Hoi; Yoon, Jong-Soo; Choi, Kyung-Hyun; Alam, Mohammad S

    2005-02-10

    A new optical security system for the protection of personal identification information is proposed. First, authentication of the encrypted personal information is carried out by primary recognition of a personal identification number (PIN) with the proposed multiplexed minimum average correlation energy phase-encrypted (MMACE_p) filter. The MMACE_p filter, synthesized with phase-encrypted training images, can increase the discrimination capability and prevent the leak of personal identification information. After the PIN is recognized, speedy authentication of personal information can be achieved through one-to-one optical correlation by means of the optical wavelet filter. The possibility of information counterfeiting can be significantly decreased with the double-identification process. Simulation results demonstrate the effectiveness of the proposed technique.

  5. Robust Speaker Authentication Based on Combined Speech and Voiceprint Recognition

    NASA Astrophysics Data System (ADS)

    Malcangi, Mario

    2009-08-01

    Personal authentication is becoming increasingly important in many applications that have to protect proprietary data. Passwords and personal identification numbers (PINs) prove not to be robust enough to ensure that unauthorized people do not use them. Biometric authentication technology may offer a secure, convenient, accurate solution but sometimes fails due to its intrinsically fuzzy nature. This research aims to demonstrate that combining two basic speech processing methods, voiceprint identification and speech recognition, can provide a very high degree of robustness, especially if fuzzy decision logic is used.

  6. The identification of living persons on images: A literature review.

    PubMed

    Gibelli, D; Obertová, Z; Ritz-Timme, S; Gabriel, P; Arent, T; Ratnayake, M; De Angelis, D; Cattaneo, C

    2016-03-01

    Personal identification in the forensic context commonly concerns unknown decedents. However, recently there has been an increase in cases which require identification of living persons, especially from surveillance systems. These cases bring about a relatively new challenge for forensic anthropologists and pathologists concerning the selection of the most suitable methodological approaches with regard to the limitations of the photographic representation of a given person for individualization and identity. Facial features are instinctively the primary focus for identification approaches. However, other body parts (e.g. hands), and body height and gait (on videos) have been considered in cases of personal identification. This review aims at summarizing the state-of-the-art concerning the identification of the living on images and videos, including a critical evaluation of the advantages and limitations of different methods. Recommendations are given in order to aid forensic practitioners who face cases of identification of living persons. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  7. The confidence-accuracy relationship in eyewitness identification: effects of lineup instructions, foil similarity, and target-absent base rates.

    PubMed

    Brewer, Neil; Wells, Gary L

    2006-03-01

    Discriminating accurate from mistaken eyewitness identifications is a major issue facing criminal justice systems. This study examined whether eyewitness confidence assists such decisions under a variety of conditions using a confidence-accuracy (CA) calibration approach. Participants (N = 1,200) viewed a simulated crime and attempted 2 separate identifications from 8-person target-present or target-absent lineups. Confidence and accuracy were calibrated for choosers (but not nonchoosers) for both targets under all conditions. Lower overconfidence was associated with higher diagnosticity, lower target-absent base rates, and shorter identification latencies. Although researchers agree that courtroom expressions of confidence are uninformative, our findings indicate that confidence assessments obtained immediately after a positive identification can provide a useful guide for investigators about the likely accuracy of an identification.

  8. Frontal sinus recognition for human identification

    NASA Astrophysics Data System (ADS)

    Falguera, Juan Rogelio; Falguera, Fernanda Pereira Sartori; Marana, Aparecido Nilceu

    2008-03-01

    Many methods based on biometrics such as fingerprint, face, iris, and retina have been proposed for person identification. However, for deceased individuals, such biometric measurements are not available. In such cases, parts of the human skeleton can be used for identification, such as dental records, thorax, vertebrae, shoulder, and frontal sinus. It has been established in prior investigations that the radiographic pattern of frontal sinus is highly variable and unique for every individual. This has stimulated the proposition of measurements of the frontal sinus pattern, obtained from x-ray films, for skeletal identification. This paper presents a frontal sinus recognition method for human identification based on Image Foresting Transform and shape context. Experimental results (ERR = 5,82%) have shown the effectiveness of the proposed method.

  9. Life at Both Ends of the Ladder: Education-Based Identification and Its Association With Well-Being and Social Attitudes.

    PubMed

    Kuppens, Toon; Easterbrook, Matthew J; Spears, Russell; Manstead, Antony S R

    2015-09-01

    Level of formal education is an important divide in contemporary societies; it is positively related to health, well-being, and social attitudes such as tolerance for minorities and interest in politics. We investigated whether education-based identification is a common underlying factor of these education effects. Indeed, education-based identification was stronger among the higher educated, especially for identification aspects that encompass education-based group esteem (i.e., the belief that one's educational group is worthy and that others think so, too). Furthermore, while group esteem had beneficial effects across educational levels, aspects of identification that were unrelated to group esteem had positive effects for the higher educated but not for the less educated. Thus, the less educated do not benefit from the psychologically nourishing effect of identification that exists for other groups. The stigma and responsibility related to low education could be a common explanation for a wide range of outcomes. © 2015 by the Society for Personality and Social Psychology, Inc.

  10. Personal Verification/Identification via Analysis of the Peripheral ECG Leads: Influence of the Personal Health Status on the Accuracy

    PubMed Central

    Bortolan, Giovanni

    2015-01-01

    Traditional means for identity validation (PIN codes, passwords), and physiological and behavioral biometric characteristics (fingerprint, iris, and speech) are susceptible to hacker attacks and/or falsification. This paper presents a method for person verification/identification based on correlation of present-to-previous limb ECG leads: I (r I), II (r II), calculated from them first principal ECG component (r PCA), linear and nonlinear combinations between r I, r II, and r PCA. For the verification task, the one-to-one scenario is applied and threshold values for r I, r II, and r PCA and their combinations are derived. The identification task supposes one-to-many scenario and the tested subject is identified according to the maximal correlation with a previously recorded ECG in a database. The population based ECG-ILSA database of 540 patients (147 healthy subjects, 175 patients with cardiac diseases, and 218 with hypertension) has been considered. In addition a common reference PTB dataset (14 healthy individuals) with short time interval between the two acquisitions has been taken into account. The results on ECG-ILSA database were satisfactory with healthy people, and there was not a significant decrease in nonhealthy patients, demonstrating the robustness of the proposed method. With PTB database, the method provides an identification accuracy of 92.9% and a verification sensitivity and specificity of 100% and 89.9%. PMID:26568954

  11. Use of prior odds for missing persons identifications.

    PubMed

    Budowle, Bruce; Ge, Jianye; Chakraborty, Ranajit; Gill-King, Harrell

    2011-06-27

    Identification of missing persons from mass disasters is based on evaluation of a number of variables and observations regarding the combination of features derived from these variables. DNA typing now is playing a more prominent role in the identification of human remains, and particularly so for highly decomposed and fragmented remains. The strength of genetic associations, by either direct or kinship analyses, is often quantified by calculating a likelihood ratio. The likelihood ratio can be multiplied by prior odds based on nongenetic evidence to calculate the posterior odds, that is, by applying Bayes' Theorem, to arrive at a probability of identity. For the identification of human remains, the path creating the set and intersection of variables that contribute to the prior odds needs to be appreciated and well defined. Other than considering the total number of missing persons, the forensic DNA community has been silent on specifying the elements of prior odds computations. The variables include the number of missing individuals, eyewitness accounts, anthropological features, demographics and other identifying characteristics. The assumptions, supporting data and reasoning that are used to establish a prior probability that will be combined with the genetic data need to be considered and justified. Otherwise, data may be unintentionally or intentionally manipulated to achieve a probability of identity that cannot be supported and can thus misrepresent the uncertainty with associations. The forensic DNA community needs to develop guidelines for objectively computing prior odds.

  12. Personal Verification/Identification via Analysis of the Peripheral ECG Leads: Influence of the Personal Health Status on the Accuracy.

    PubMed

    Jekova, Irena; Bortolan, Giovanni

    2015-01-01

    Traditional means for identity validation (PIN codes, passwords), and physiological and behavioral biometric characteristics (fingerprint, iris, and speech) are susceptible to hacker attacks and/or falsification. This paper presents a method for person verification/identification based on correlation of present-to-previous limb ECG leads: I (r I), II (r II), calculated from them first principal ECG component (r PCA), linear and nonlinear combinations between r I, r II, and r PCA. For the verification task, the one-to-one scenario is applied and threshold values for r I, r II, and r PCA and their combinations are derived. The identification task supposes one-to-many scenario and the tested subject is identified according to the maximal correlation with a previously recorded ECG in a database. The population based ECG-ILSA database of 540 patients (147 healthy subjects, 175 patients with cardiac diseases, and 218 with hypertension) has been considered. In addition a common reference PTB dataset (14 healthy individuals) with short time interval between the two acquisitions has been taken into account. The results on ECG-ILSA database were satisfactory with healthy people, and there was not a significant decrease in nonhealthy patients, demonstrating the robustness of the proposed method. With PTB database, the method provides an identification accuracy of 92.9% and a verification sensitivity and specificity of 100% and 89.9%.

  13. Idols as Sunshine or Road Signs: Comparing Absorption-Addiction Idolatry With Identification-Emulation Idolatry.

    PubMed

    Cheung, Chau-Kiu; Yue, Xiao Dong

    2018-01-01

    This study seeks to contrast absorption-addiction idolatry and identification-emulation idolatry. Whereas absorption-addiction idolatry progresses from entertainment/socializing to personalizing and obsession about the idol, identification-emulation idolatry unfolds in terms of identification, attachment, romantization, idealization, and consumption about the idol or his or her derivatives. Based on a sample of 1310 secondary school and university students in Hong Kong, the study verified the original factor model composed of five first-order identification-emulation idolatry and three first-order absorption-addiction idolatry factors, with the latter more predictable by fans' club membership.

  14. Orientation-modulated attention effect on visual evoked potential: Application for PIN system using brain-computer interface.

    PubMed

    Wilaiprasitporn, Theerawit; Yagi, Tohru

    2015-01-01

    This research demonstrates the orientation-modulated attention effect on visual evoked potential. We combined this finding with our previous findings about the motion-modulated attention effect and used the result to develop novel visual stimuli for a personal identification number (PIN) application based on a brain-computer interface (BCI) framework. An electroencephalography amplifier with a single electrode channel was sufficient for our application. A computationally inexpensive algorithm and small datasets were used in processing. Seven healthy volunteers participated in experiments to measure offline performance. Mean accuracy was 83.3% at 13.9 bits/min. Encouraged by these results, we plan to continue developing the BCI-based personal identification application toward real-time systems.

  15. A biometric identification system based on eigenpalm and eigenfinger features.

    PubMed

    Ribaric, Slobodan; Fratric, Ivan

    2005-11-01

    This paper presents a multimodal biometric identification system based on the features of the human hand. We describe a new biometric approach to personal identification using eigenfinger and eigenpalm features, with fusion applied at the matching-score level. The identification process can be divided into the following phases: capturing the image; preprocessing; extracting and normalizing the palm and strip-like finger subimages; extracting the eigenpalm and eigenfinger features based on the K-L transform; matching and fusion; and, finally, a decision based on the (k, l)-NN classifier and thresholding. The system was tested on a database of 237 people (1,820 hand images). The experimental results showed the effectiveness of the system in terms of the recognition rate (100 percent), the equal error rate (EER = 0.58 percent), and the total error rate (TER = 0.72 percent).

  16. Identifying with fictive characters: structural brain correlates of the personality trait ‘fantasy’

    PubMed Central

    Hänggi, Jürgen; Jancke, Lutz

    2014-01-01

    The perception of oneself as absorbed in the thoughts, feelings and happenings of a fictive character (e.g. in a novel or film) as if the character’s experiences were one’s own is referred to as identification. We investigated whether individual variation in the personality trait of identification is associated with individual variation in the structure of specific brain regions, using surface and volume-based morphometry. The hypothesized regions of interest were selected on the basis of their functional role in subserving the cognitive processing domains considered important for identification (i.e. mental imagery, empathy, theory of mind and merging) and for the immersive experience called ‘presence’. Controlling for age, sex, whole-brain volume and other traits, identification covaried significantly with the left hippocampal volume, cortical thickness in the right anterior insula and the left dorsal medial prefrontal cortex, and with gray matter volume in the dorsolateral prefrontal cortex. These findings show that trait identification is associated with structural variation in specific brain regions. The findings are discussed in relation to the potential functional contribution of these regions to identification. PMID:24464847

  17. Two-dimensional PCA-based human gait identification

    NASA Astrophysics Data System (ADS)

    Chen, Jinyan; Wu, Rongteng

    2012-11-01

    It is very necessary to recognize person through visual surveillance automatically for public security reason. Human gait based identification focus on recognizing human by his walking video automatically using computer vision and image processing approaches. As a potential biometric measure, human gait identification has attracted more and more researchers. Current human gait identification methods can be divided into two categories: model-based methods and motion-based methods. In this paper a two-Dimensional Principal Component Analysis and temporal-space analysis based human gait identification method is proposed. Using background estimation and image subtraction we can get a binary images sequence from the surveillance video. By comparing the difference of two adjacent images in the gait images sequence, we can get a difference binary images sequence. Every binary difference image indicates the body moving mode during a person walking. We use the following steps to extract the temporal-space features from the difference binary images sequence: Projecting one difference image to Y axis or X axis we can get two vectors. Project every difference image in the difference binary images sequence to Y axis or X axis difference binary images sequence we can get two matrixes. These two matrixes indicate the styles of one walking. Then Two-Dimensional Principal Component Analysis(2DPCA) is used to transform these two matrixes to two vectors while at the same time keep the maximum separability. Finally the similarity of two human gait images is calculated by the Euclidean distance of the two vectors. The performance of our methods is illustrated using the CASIA Gait Database.

  18. Three dimensional identification card and applications

    NASA Astrophysics Data System (ADS)

    Zhou, Changhe; Wang, Shaoqing; Li, Chao; Li, Hao; Liu, Zhao

    2016-10-01

    Three dimensional Identification Card, with its three-dimensional personal image displayed and stored for personal identification, is supposed be the advanced version of the present two-dimensional identification card in the future [1]. Three dimensional Identification Card means that there are three-dimensional optical techniques are used, the personal image on ID card is displayed to be three-dimensional, so we can see three dimensional personal face. The ID card also stores the three-dimensional face information in its inside electronics chip, which might be recorded by using two-channel cameras, and it can be displayed in computer as three-dimensional images for personal identification. Three-dimensional ID card might be one interesting direction to update the present two-dimensional card in the future. Three-dimension ID card might be widely used in airport custom, entrance of hotel, school, university, as passport for on-line banking, registration of on-line game, etc...

  19. House-Tree-Person Drawings and Sex Offenders: A Pilot Study.

    ERIC Educational Resources Information Center

    Lopez, Jennifer R.; Carolan, Richard

    2001-01-01

    Investigates whether or not specific indicators appear more frequently in the House-Tree-Person drawings of sex offenders when compared to drawings of a control group. The goal of the research is to explore the use of an art-based assessment as a tool for the early identification of sex offenders. (BF)

  20. E-Learning Personalization Based on Hybrid Recommendation Strategy and Learning Style Identification

    ERIC Educational Resources Information Center

    Klasnja-Milicevic, Aleksandra; Vesin, Boban; Ivanovic, Mirjana; Budimac, Zoran

    2011-01-01

    Personalized learning occurs when e-learning systems make deliberate efforts to design educational experiences that fit the needs, goals, talents, and interests of their learners. Researchers had recently begun to investigate various techniques to help teachers improve e-learning systems. In this paper, we describe a recommendation module of a…

  1. College Writing, Identification, and the Production of Intellectual Property: Voices from the Stanford Study of Writing

    ERIC Educational Resources Information Center

    Lunsford, Andrea A.; Fishman, Jenn; Liew, Warren M.

    2013-01-01

    When, why, and how do college students come to value their writing as intellectual property? How do their conceptions of intellectual property reflect broader understandings and personal engagements with concepts of authorship, collaboration, identification, and capital? We address these questions based on findings from the Stanford Study of…

  2. 49 CFR 238.229 - Safety appliances-general.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... person (QMP) with at least 4 hours of training specific to the identification of weld defects and the... section. (2) The date, time, location, and identification of the person performing the initial and... section. This includes the identification of the person making any final determination as to the existence...

  3. [The state legal and expert identification aspects of protecting the right of the person for citizens of the Russian Federation].

    PubMed

    Bykov, I Iu; Kolkutin, V V; Tolmachev, I A; Dmitriev, E G

    2000-04-01

    The article deals with the questions concerning the problem of person identification, different extreme situations. This problem is closely connected with ensuring of national security of Russia. The authors give the definition of person's right in contact with constant threat to violate this right. Two categories of person's properties are analysed (material and not material) with the help of which it is possible to establish identity of man and his personality. It is noted that protection of person's rights is carried out in six forms. For the first time the possibilities to create organisational system of person identification in the form of Federal service are discussed that must be legislatively secured. Scientific investigation of this problem allowed the authors to submit concrete proposals concerning the question of organisation of state service for person identification.

  4. Identification of terpenes and essential oils by means of static headspace gas chromatography-ion mobility spectrometry.

    PubMed

    Rodríguez-Maecker, Roman; Vyhmeister, Eduardo; Meisen, Stefan; Rosales Martinez, Antonio; Kuklya, Andriy; Telgheder, Ursula

    2017-11-01

    Static headspace gas chromatography-ion mobility spectrometry (SHS GC-IMS) is a relatively new analytical technique that has considerable potential for analysis of volatile organic compounds (VOCs). In this study, SHS GC-IMS was used for the identification of the major terpene components of various essential oils (EOs). Based on the data obtained from 25 terpene standards and 50 EOs, a database for fingerprint identification of characteristic terpenes and EOs was generated utilizing SHS GC-IMS for authenticity testing of fragrances in foods, cosmetics, and personal care products. This database contains specific normalized IMS drift times and GC retention indices for 50 terpene components of EOs. Initially, the SHS GC-IMS parameters, e.g., drift gas and carrier gas flow rates, drift tube, and column temperatures, were evaluated to determine suitable operating conditions for terpene separation and identification. Gas chromatography-mass spectrometry (GC-MS) was used as a reference method for the identification of terpenes in EOs. The fingerprint pattern based on the normalized IMS drift times and retention indices of 50 terpenes is presented for 50 EOs. The applicability of the method was proven on examples of ten commercially available food, cosmetic, and personal care product samples. The results confirm the suitability of SHS GC-IMS as a powerful analytical technique for direct identification of terpene components in solid and liquid samples without any pretreatment. Graphical abstract Fingerprint pattern identification of terpenes and essential oils using static headspace gas chromatography-ion mobility spectrometry.

  5. Forensic Odontology: Automatic Identification of Persons Comparing Antemortem and Postmortem Panoramic Radiographs Using Computer Vision.

    PubMed

    Heinrich, Andreas; Güttler, Felix; Wendt, Sebastian; Schenkl, Sebastian; Hubig, Michael; Wagner, Rebecca; Mall, Gita; Teichgräber, Ulf

    2018-06-18

     In forensic odontology the comparison between antemortem and postmortem panoramic radiographs (PRs) is a reliable method for person identification. The purpose of this study was to improve and automate identification of unknown people by comparison between antemortem and postmortem PR using computer vision.  The study includes 43 467 PRs from 24 545 patients (46 % females/54 % males). All PRs were filtered and evaluated with Matlab R2014b including the toolboxes image processing and computer vision system. The matching process used the SURF feature to find the corresponding points between two PRs (unknown person and database entry) out of the whole database.  From 40 randomly selected persons, 34 persons (85 %) could be reliably identified by corresponding PR matching points between an already existing scan in the database and the most recent PR. The systematic matching yielded a maximum of 259 points for a successful identification between two different PRs of the same person and a maximum of 12 corresponding matching points for other non-identical persons in the database. Hence 12 matching points are the threshold for reliable assignment.  Operating with an automatic PR system and computer vision could be a successful and reliable tool for identification purposes. The applied method distinguishes itself by virtue of its fast and reliable identification of persons by PR. This Identification method is suitable even if dental characteristics were removed or added in the past. The system seems to be robust for large amounts of data.   · Computer vision allows an automated antemortem and postmortem comparison of panoramic radiographs (PRs) for person identification.. · The present method is able to find identical matching partners among huge datasets (big data) in a short computing time.. · The identification method is suitable even if dental characteristics were removed or added.. · Heinrich A, Güttler F, Wendt S et al. Forensic Odontology: Automatic Identification of Persons Comparing Antemortem and Postmortem Panoramic Radiographs Using Computer Vision. Fortschr Röntgenstr 2018; DOI: 10.1055/a-0632-4744. © Georg Thieme Verlag KG Stuttgart · New York.

  6. Biometric sample extraction using Mahalanobis distance in Cardioid based graph using electrocardiogram signals.

    PubMed

    Sidek, Khairul; Khali, Ibrahim

    2012-01-01

    In this paper, a person identification mechanism implemented with Cardioid based graph using electrocardiogram (ECG) is presented. Cardioid based graph has given a reasonably good classification accuracy in terms of differentiating between individuals. However, the current feature extraction method using Euclidean distance could be further improved by using Mahalanobis distance measurement producing extracted coefficients which takes into account the correlations of the data set. Identification is then done by applying these extracted features to Radial Basis Function Network. A total of 30 ECG data from MITBIH Normal Sinus Rhythm database (NSRDB) and MITBIH Arrhythmia database (MITDB) were used for development and evaluation purposes. Our experimentation results suggest that the proposed feature extraction method has significantly increased the classification performance of subjects in both databases with accuracy from 97.50% to 99.80% in NSRDB and 96.50% to 99.40% in MITDB. High sensitivity, specificity and positive predictive value of 99.17%, 99.91% and 99.23% for NSRDB and 99.30%, 99.90% and 99.40% for MITDB also validates the proposed method. This result also indicates that the right feature extraction technique plays a vital role in determining the persistency of the classification accuracy for Cardioid based person identification mechanism.

  7. Diagnostic Efficiency among Psychiatric Outpatients of a Self-Report Version of a Subset of Screen Items of the Structured Clinical Interview for DSM-IV-TR Personality Disorders (SCID-II)

    ERIC Educational Resources Information Center

    Germans, Sara; Van Heck, Guus L.; Masthoff, Erik D.; Trompenaars, Fons J. W. M.; Hodiamont, Paul P. G.

    2010-01-01

    This article describes the identification of a 10-item set of the Structured Clinical Interview for DSM-IV Personality Disorders (SCID-II) items, which proved to be effective as a self-report assessment instrument in screening personality disorders. The item selection was based on the retrospective analyses of 495 SCID-II interviews. The…

  8. An iris recognition algorithm based on DCT and GLCM

    NASA Astrophysics Data System (ADS)

    Feng, G.; Wu, Ye-qing

    2008-04-01

    With the enlargement of mankind's activity range, the significance for person's status identity is becoming more and more important. So many different techniques for person's status identity were proposed for this practical usage. Conventional person's status identity methods like password and identification card are not always reliable. A wide variety of biometrics has been developed for this challenge. Among those biologic characteristics, iris pattern gains increasing attention for its stability, reliability, uniqueness, noninvasiveness and difficult to counterfeit. The distinct merits of the iris lead to its high reliability for personal identification. So the iris identification technique had become hot research point in the past several years. This paper presents an efficient algorithm for iris recognition using gray-level co-occurrence matrix(GLCM) and Discrete Cosine transform(DCT). To obtain more representative iris features, features from space and DCT transformation domain are extracted. Both GLCM and DCT are applied on the iris image to form the feature sequence in this paper. The combination of GLCM and DCT makes the iris feature more distinct. Upon GLCM and DCT the eigenvector of iris extracted, which reflects features of spatial transformation and frequency transformation. Experimental results show that the algorithm is effective and feasible with iris recognition.

  9. Comparing Correlations between Four-Quadrant and Five-Factor Personality Assessments

    ERIC Educational Resources Information Center

    Jones, Cathleen S.; Hartley, Nell T.

    2013-01-01

    For decades,some of the most popular devices used in educating students and employees to the values of diversity are those that are based on a four-grid identification of behavior style. The results from the scoring of the instruments provide individual profiles in terms of a person's assertiveness, responsiveness, and preferred tone of…

  10. Personality based clusters as predictors of aviator attitudes and performance

    NASA Technical Reports Server (NTRS)

    Gregorich, Steve; Helmreich, Robert L.; Wilhelm, John A.; Chidester, Thomas

    1989-01-01

    The feasibility of identification of personality-based population clusters was investigated along with the relationships of these subpopulations to relevant attitude and performance measures. The results of instrumental and expressive personality tests, using the Personal Characteristics Inventory (PCI) test battery and the Cockpit Management Attitudes Questionnaire, suggest that theoretically meaningful subpopulations exist among aviators, and that these groupings are useful in understanding of personality factors acting as moderator variables in the determination of aviator attitudes and performance. Out of the three clusters most easily described in terms of their relative elevations on the PCI subscales ('the right stuff', the 'wrong stuff', and the 'no stuff'), the members of the right stuff cluster tended to have more desirable patterns of responses along relevant attitudinal dimensions.

  11. Laser micro-etching of metal prostheses for personal identification

    PubMed Central

    Ganapathy, Dhanraj; Sivaswamy, Vinay; Sekhar, Prathap

    2017-01-01

    Denture marking techniques play a vital role in establishing personal identification in suitable clinical and forensic situations. The denture marking techniques are categorized broadly into additive and ablative methods. Additive methods involve embedding or impregnation of markers for establishing personal identity. Ablative methods involve partial removal of the denture surface thereby providing a marking for identification. Engraving and etching methods are the commonly used ablative methods. Ablative methods can be of contact and noncontact subtypes. Laser micro-etching is a precise noncontact ablative denture marking technique that could be used for prostheses-guided personal identification. PMID:28584473

  12. Laser micro-etching of metal prostheses for personal identification.

    PubMed

    Ganapathy, Dhanraj; Sivaswamy, Vinay; Sekhar, Prathap

    2017-01-01

    Denture marking techniques play a vital role in establishing personal identification in suitable clinical and forensic situations. The denture marking techniques are categorized broadly into additive and ablative methods. Additive methods involve embedding or impregnation of markers for establishing personal identity. Ablative methods involve partial removal of the denture surface thereby providing a marking for identification. Engraving and etching methods are the commonly used ablative methods. Ablative methods can be of contact and noncontact subtypes. Laser micro-etching is a precise noncontact ablative denture marking technique that could be used for prostheses-guided personal identification.

  13. Bifocal Stereo for Multipath Person Re-Identification

    NASA Astrophysics Data System (ADS)

    Blott, G.; Heipke, C.

    2017-11-01

    This work presents an approach for the task of person re-identification by exploiting bifocal stereo cameras. Present monocular person re-identification approaches show a decreasing working distance, when increasing the image resolution to obtain a higher reidentification performance. We propose a novel 3D multipath bifocal approach, containing a rectilinear lens with larger focal length for long range distances and a fish eye lens of a smaller focal length for the near range. The person re-identification performance is at least on par with 2D re-identification approaches but the working distance of the approach is increased and on average 10% more re-identification performance can be achieved in the overlapping field of view compared to a single camera. In addition, the 3D information is exploited from the overlapping field of view to solve potential 2D ambiguities.

  14. Oral mark in the application of an individual identification: From ashes to truth.

    PubMed

    Chugh, Anshul; Narwal, Anumeha

    2017-01-01

    Forensic odontology is the branch of dentistry which deals with the proper handling, examination, evaluation and presentation of dental findings in the interest of justice. After major disasters and perimortem assaults such as earthquakes, fires, severe head and neck trauma or gross decomposition, accurate and early identification of dead and injured becomes important. In the absence of other records in such cases, identification is based on restorations, missing teeth and prosthetic devices such as partial and complete removable/fixed prosthesis or implant retained devices. This brings out the major role of prosthodontics to investigate the identity of suspects in the criminal cases as well as the deceased human beings in traumatic injuries or in disasters. Denture identification systems are being used as means of postmortem identification of edentulous persons which has evolved from the inclusion of some form of printed label in a denture to more high-tech methods. The provision of implant retained complete lower denture, antemortem, and postmortem radiographs of edentulous persons and correlation of bite marks using special impression techniques provide another potential source of evidence for human identification. Hence, this literature review throws some light on the role played by prosthodontist in forensic odontology.

  15. Identifying with fictive characters: structural brain correlates of the personality trait 'fantasy'.

    PubMed

    Cheetham, Marcus; Hänggi, Jürgen; Jancke, Lutz

    2014-11-01

    The perception of oneself as absorbed in the thoughts, feelings and happenings of a fictive character (e.g. in a novel or film) as if the character's experiences were one's own is referred to as identification. We investigated whether individual variation in the personality trait of identification is associated with individual variation in the structure of specific brain regions, using surface and volume-based morphometry. The hypothesized regions of interest were selected on the basis of their functional role in subserving the cognitive processing domains considered important for identification (i.e. mental imagery, empathy, theory of mind and merging) and for the immersive experience called 'presence'. Controlling for age, sex, whole-brain volume and other traits, identification covaried significantly with the left hippocampal volume, cortical thickness in the right anterior insula and the left dorsal medial prefrontal cortex, and with gray matter volume in the dorsolateral prefrontal cortex. These findings show that trait identification is associated with structural variation in specific brain regions. The findings are discussed in relation to the potential functional contribution of these regions to identification. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  16. Person Re-Identification via Distance Metric Learning With Latent Variables.

    PubMed

    Sun, Chong; Wang, Dong; Lu, Huchuan

    2017-01-01

    In this paper, we propose an effective person re-identification method with latent variables, which represents a pedestrian as the mixture of a holistic model and a number of flexible models. Three types of latent variables are introduced to model uncertain factors in the re-identification problem, including vertical misalignments, horizontal misalignments and leg posture variations. The distance between two pedestrians can be determined by minimizing a given distance function with respect to latent variables, and then be used to conduct the re-identification task. In addition, we develop a latent metric learning method for learning the effective metric matrix, which can be solved via an iterative manner: once latent information is specified, the metric matrix can be obtained based on some typical metric learning methods; with the computed metric matrix, the latent variables can be determined by searching the state space exhaustively. Finally, extensive experiments are conducted on seven databases to evaluate the proposed method. The experimental results demonstrate that our method achieves better performance than other competing algorithms.

  17. Human Trafficking Identification and Service Provision in the Medical and Social Service Sectors.

    PubMed

    Schwarz, Corinne; Unruh, Erik; Cronin, Katie; Evans-Simpson, Sarah; Britton, Hannah; Ramaswamy, Megha

    2016-06-01

    The medical sector presents a unique opportunity for identification and service to victims of human trafficking. In this article, we describe local and site-specific efforts to develop an intervention tool to be used in an urban hospital's emergency department in the midwestern United States. In the development of our tool, we focused on both identification and intervention to assist trafficked persons, through a largely collaborative process in which we engaged local stakeholders for developing site-specific points of intervention. In the process of developing our intervention, we highlight the importance of using existing resources and services in a specific community to address critical gaps in coverage for trafficked persons. For example, we focus on those who are victims of labor trafficking, in addition to those who are victims of sex trafficking. We offer a framework informed by rights-based approaches to anti-trafficking efforts that addresses the practical challenges of human trafficking victim identification while simultaneously working to provide resources and disseminate services to those victims.

  18. Hierarchical minutiae matching for fingerprint and palmprint identification.

    PubMed

    Chen, Fanglin; Huang, Xiaolin; Zhou, Jie

    2013-12-01

    Fingerprints and palmprints are the most common authentic biometrics for personal identification, especially for forensic security. Previous research have been proposed to speed up the searching process in fingerprint and palmprint identification systems, such as those based on classification or indexing, in which the deterioration of identification accuracy is hard to avert. In this paper, a novel hierarchical minutiae matching algorithm for fingerprint and palmprint identification systems is proposed. This method decomposes the matching step into several stages and rejects many false fingerprints or palmprints on different stages, thus it can save much time while preserving a high identification rate. Experimental results show that the proposed algorithm can save almost 50% searching time compared with traditional methods and illustrate its effectiveness.

  19. Identification with groups: the role of personality and context.

    PubMed

    Sagiv, Lilach; Roccas, Sonia; Hazan, Osnat

    2012-04-01

    Is identification a product of personality or of the context? We examine this question by adopting a multidimensional conceptualization of identification (the CIDS model) that integrates research perspectives on personality and contextual effects. We investigate (Study 1) the relationships of traits to identification with the nation (students, N = 77), the army (soldiers, N = 220), and a business school (students, N = 123). Then we show that the modes of identification vary in their stability across social contexts and in their susceptibility to contextual change. Idealizing groups' symbols ("deference" identification) is especially stable across different foci of identification (Study 2): the military and former high school (soldiers, N = 188), the business school and the nation (students, = 62), and the military and one's ethnic group (soldiers, N = 95). Perceiving the group as a central part of the self ("importance" identification) is the most susceptible to contextual effects of priming values (Study 3; students, N = 80, 60) and the group's status (Study 4; students, N = 68). © 2011 The Authors. Journal of Personality © 2012, Wiley Periodicals, Inc.

  20. Classification models for identification of at-risk groups for incident memory complaints.

    PubMed

    van den Kommer, Tessa N; Comijs, Hannie C; Rijs, Kelly J; Heymans, Martijn W; van Boxtel, Martin P J; Deeg, Dorly J H

    2014-02-01

    Memory complaints in older adults may be a precursor of measurable cognitive decline. Causes for these complaints may vary across age groups. The goal of this study was to develop classification models for the early identification of persons at risk for memory complaints using a broad range of characteristics. Two age groups were studied, 55-65 years old (N = 1,416.8) and 65-75 years old (N = 471) using data from the Longitudinal Aging Study Amsterdam. Participants reporting memory complaints at baseline were excluded. Data on predictors of memory complaints were collected at baseline and analyzed using logistic regression analyses. Multiple imputation was applied to handle the missing data; missing data due to mortality were not imputed. In persons aged 55-65 years, 14.4% reported memory complaints after three years of follow-up. Persons using medication, who were former smokers and had insufficient/poor hearing, were at the highest risk of developing memory complaints, i.e., a predictive value of 33.3%. In persons 65-75 years old, the incidence of memory complaints was 22.5%. Persons with a low sense of mastery, who reported having pain, were at the highest risk of memory complaints resulting in a final predictive value of 56.9%. In the subsample of persons without a low sense of mastery who (almost) never visited organizations and had a low level of memory performance, 46.8% reported memory complaints at follow-up. The classification models led to the identification of specific target groups at risk for memory complaints. Suggestions for person-tailored interventions may be based on these risk profiles.

  1. Technologies for developing an advanced intelligent ATM with self-defence capabilities

    NASA Astrophysics Data System (ADS)

    Sako, Hiroshi

    2010-01-01

    We have developed several technologies for protecting automated teller machines. These technologies are based mainly on pattern recognition and are used to implement various self-defence functions. They include (i) banknote recognition and information retrieval for preventing machines from accepting counterfeit and damaged banknotes and for retrieving information about detected counterfeits from a relational database, (ii) form processing and character recognition for preventing machines from accepting remittance forms without due dates and/or insufficient payment, (iii) person identification to prevent machines from transacting with non-customers, and (iv) object recognition to guard machines against foreign objects such as spy cams that might be surreptitiously attached to them and to protect users against someone attempting to peek at their user information such as their personal identification number. The person identification technology has been implemented in most ATMs in Japan, and field tests have demonstrated that the banknote recognition technology can recognise more then 200 types of banknote from 30 different countries. We are developing an "advanced intelligent ATM" that incorporates all of these technologies.

  2. Texture-based approach to palmprint retrieval for personal identification

    NASA Astrophysics Data System (ADS)

    Li, Wenxin; Zhang, David; Xu, Z.; You, J.

    2000-12-01

    This paper presents a new approach to palmprint retrieval for personal identification. Three key issues in image retrieval are considered - feature selection, similarity measures and dynamic search for the best matching of the sample in the image database. We propose a texture-based method for palmprint feature representation. The concept of texture energy is introduced to define a palm print's global and local features, which are characterized with high convergence of inner-palm similarities and good dispersion of inter-palm discrimination. The search is carried out in a layered fashion: first global features are used to guide the fast selection of a small set of similar candidates from the database from the database and then local features are used to decide the final output within the candidate set. The experimental results demonstrate the effectiveness and accuracy of the proposed method.

  3. Texture-based approach to palmprint retrieval for personal identification

    NASA Astrophysics Data System (ADS)

    Li, Wenxin; Zhang, David; Xu, Z.; You, J.

    2001-01-01

    This paper presents a new approach to palmprint retrieval for personal identification. Three key issues in image retrieval are considered - feature selection, similarity measures and dynamic search for the best matching of the sample in the image database. We propose a texture-based method for palmprint feature representation. The concept of texture energy is introduced to define a palm print's global and local features, which are characterized with high convergence of inner-palm similarities and good dispersion of inter-palm discrimination. The search is carried out in a layered fashion: first global features are used to guide the fast selection of a small set of similar candidates from the database from the database and then local features are used to decide the final output within the candidate set. The experimental results demonstrate the effectiveness and accuracy of the proposed method.

  4. [The application of cybernetic modeling methods for the forensic medical personality identification based on the voice and sounding speech characteristics].

    PubMed

    Kaganov, A Sh; Kir'yanov, P A

    2015-01-01

    The objective of the present publication was to discuss the possibility of application of cybernetic modeling methods to overcome the apparent discrepancy between two kinds of the speech records, viz. initial ones (e.g. obtained in the course of special investigation activities) and the voice prints obtained from the persons subjected to the criminalistic examination. The paper is based on the literature sources and the materials of original criminalistics expertises performed by the authors.

  5. Super-Resolution Person Re-Identification With Semi-Coupled Low-Rank Discriminant Dictionary Learning.

    PubMed

    Jing, Xiao-Yuan; Zhu, Xiaoke; Wu, Fei; Hu, Ruimin; You, Xinge; Wang, Yunhong; Feng, Hui; Yang, Jing-Yu

    2017-03-01

    Person re-identification has been widely studied due to its importance in surveillance and forensics applications. In practice, gallery images are high resolution (HR), while probe images are usually low resolution (LR) in the identification scenarios with large variation of illumination, weather, or quality of cameras. Person re-identification in this kind of scenarios, which we call super-resolution (SR) person re-identification, has not been well studied. In this paper, we propose a semi-coupled low-rank discriminant dictionary learning (SLD 2 L) approach for SR person re-identification task. With the HR and LR dictionary pair and mapping matrices learned from the features of HR and LR training images, SLD 2 L can convert the features of the LR probe images into HR features. To ensure that the converted features have favorable discriminative capability and the learned dictionaries can well characterize intrinsic feature spaces of the HR and LR images, we design a discriminant term and a low-rank regularization term for SLD 2 L. Moreover, considering that low resolution results in different degrees of loss for different types of visual appearance features, we propose a multi-view SLD 2 L (MVSLD 2 L) approach, which can learn the type-specific dictionary pair and mappings for each type of feature. Experimental results on multiple publicly available data sets demonstrate the effectiveness of our proposed approaches for the SR person re-identification task.

  6. Young siblings of children with cancer deserve care and a personalized approach.

    PubMed

    Massimo, Luisa M; Wiley, Thomas J

    2008-03-01

    The youngest siblings may be both emotionally vulnerable and often neglected members of the family of a childhood cancer patient. The prompt identification of signs of distress in these subjects allows trained caregivers to intervene with personalized, age-appropriate, attention, and care. A narrative approach, based on personalized listening, writings, and spontaneous drawings, can provide the means to elicit markers of psychological maladjustment in even the youngest of siblings. Two exemplary cases are reported to illustrate this approach. (c) 2007 Wiley-Liss, Inc.

  7. Skeletal idiopathic osteosclerosis helps to perform personal identification of unknown decedents: A novel contribution from anatomical variants through CT scan.

    PubMed

    De Angelis, D; Gibelli, D; Palazzo, E; Sconfienza, L; Obertova, Z; Cattaneo, C

    2016-07-01

    Personal identification consists of the comparison of ante-mortem information from a missing person with post-mortem data obtained from an unidentified corpse. Such procedure is based on the assessment of individualizing features which may help in providing a conclusive identification between ante-mortem and post-mortem material. Anatomical variants may provide important clues to correctly identify human remains. Areas of idiopathic osteosclerosis (IO), or dense bone islands (DBIs) characterized by radiopaque areas of dense, trabeculated, non-inflamed vital bone represent one of these, potentially individualizing, anatomical features. This study presents a case where the finding of DBI was crucial for a positive identification through CT-scan. A decomposed body was found in an apartment in June 2014 in advanced decomposition and no dental records were available to perform a comparison for positive identification. Genetic tests were not applicable because of the lack of relatives in a direct line. The analysis of the only ante-mortem documentation, a CT-scan to the deceased dating back to August 2009, showed the presence of three DBIs within the trabecular bone of the proximal portion of the right femur. The same bony district was removed from the corpse during the autopsy and analysed by CT-scan, which verified the presence of the same features. Forensic practitioners should therefore be aware of the great importance of anatomical bone variants, such as dense bone islands for identification purposes, and the importance of advanced radiological technique for addressing the individualizing potential of such variants. We propose that anatomical variants of the human skeleton should be considered as being "primary identification characteristics" similar to dental status, fingerprints and DNA. Copyright © 2016 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.

  8. Learning Efficient Spatial-Temporal Gait Features with Deep Learning for Human Identification.

    PubMed

    Liu, Wu; Zhang, Cheng; Ma, Huadong; Li, Shuangqun

    2018-02-06

    The integration of the latest breakthroughs in bioinformatics technology from one side and artificial intelligence from another side, enables remarkable advances in the fields of intelligent security guard computational biology, healthcare, and so on. Among them, biometrics based automatic human identification is one of the most fundamental and significant research topic. Human gait, which is a biometric features with the unique capability, has gained significant attentions as the remarkable characteristics of remote accessed, robust and security in the biometrics based human identification. However, the existed methods cannot well handle the indistinctive inter-class differences and large intra-class variations of human gait in real-world situation. In this paper, we have developed an efficient spatial-temporal gait features with deep learning for human identification. First of all, we proposed a gait energy image (GEI) based Siamese neural network to automatically extract robust and discriminative spatial gait features for human identification. Furthermore, we exploit the deep 3-dimensional convolutional networks to learn the human gait convolutional 3D (C3D) as the temporal gait features. Finally, the GEI and C3D gait features are embedded into the null space by the Null Foley-Sammon Transform (NFST). In the new space, the spatial-temporal features are sufficiently combined with distance metric learning to drive the similarity metric to be small for pairs of gait from the same person, and large for pairs from different persons. Consequently, the experiments on the world's largest gait database show our framework impressively outperforms state-of-the-art methods.

  9. The Statistical Meaning of Kurtosis and Its New Application to Identification of Persons Based on Seismic Signals

    PubMed Central

    Liang, Zhiqiang; Wei, Jianming; Zhao, Junyu; Liu, Haitao; Li, Baoqing; Shen, Jie; Zheng, Chunlei

    2008-01-01

    This paper presents a new algorithm making use of kurtosis, which is a statistical parameter, to distinguish the seismic signal generated by a person's footsteps from other signals. It is adaptive to any environment and needs no machine study or training. As persons or other targets moving on the ground generate continuous signals in the form of seismic waves, we can separate different targets based on the seismic waves they generate. The parameter of kurtosis is sensitive to impulsive signals, so it's much more sensitive to the signal generated by person footsteps than other signals generated by vehicles, winds, noise, etc. The parameter of kurtosis is usually employed in the financial analysis, but rarely used in other fields. In this paper, we make use of kurtosis to distinguish person from other targets based on its different sensitivity to different signals. Simulation and application results show that this algorithm is very effective in distinguishing person from other targets. PMID:27873804

  10. 20 CFR 404.988 - Conditions for reopening.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... person previously determined to be dead, and on whose earnings record your entitlement is based, is later... identification of his or her body; (5) The Railroad Retirement Board has awarded duplicate benefits on the same...

  11. 20 CFR 404.988 - Conditions for reopening.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... person previously determined to be dead, and on whose earnings record your entitlement is based, is later... identification of his or her body; (5) The Railroad Retirement Board has awarded duplicate benefits on the same...

  12. 20 CFR 404.988 - Conditions for reopening.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... person previously determined to be dead, and on whose earnings record your entitlement is based, is later... identification of his or her body; (5) The Railroad Retirement Board has awarded duplicate benefits on the same...

  13. 20 CFR 404.988 - Conditions for reopening.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... person previously determined to be dead, and on whose earnings record your entitlement is based, is later... identification of his or her body; (5) The Railroad Retirement Board has awarded duplicate benefits on the same...

  14. 20 CFR 404.988 - Conditions for reopening.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... person previously determined to be dead, and on whose earnings record your entitlement is based, is later... identification of his or her body; (5) The Railroad Retirement Board has awarded duplicate benefits on the same...

  15. Biometric identification based on novel frequency domain facial asymmetry measures

    NASA Astrophysics Data System (ADS)

    Mitra, Sinjini; Savvides, Marios; Vijaya Kumar, B. V. K.

    2005-03-01

    In the modern world, the ever-growing need to ensure a system's security has spurred the growth of the newly emerging technology of biometric identification. The present paper introduces a novel set of facial biometrics based on quantified facial asymmetry measures in the frequency domain. In particular, we show that these biometrics work well for face images showing expression variations and have the potential to do so in presence of illumination variations as well. A comparison of the recognition rates with those obtained from spatial domain asymmetry measures based on raw intensity values suggests that the frequency domain representation is more robust to intra-personal distortions and is a novel approach for performing biometric identification. In addition, some feature analysis based on statistical methods comparing the asymmetry measures across different individuals and across different expressions is presented.

  16. Processing Words Varying in Personal Familiarity (Based on Reading and Spelling) by Poor Readers and Age-Matched and Reading-Matched Controls

    ERIC Educational Resources Information Center

    Corcos, Evelyne; Willows, Dale M.

    2009-01-01

    To evaluate whether performance differences between good and poor readers relate to reading-specific cognitive factors that result from engaging in reading activities and other experiential factors, the authors gave students in Grades 4 and 6 a perceptual identification test of words not only drawn from their personal lexicon but also varying in…

  17. Person identification from aerial footage by a remote-controlled drone.

    PubMed

    Bindemann, Markus; Fysh, Matthew C; Sage, Sophie S K; Douglas, Kristina; Tummon, Hannah M

    2017-10-19

    Remote-controlled aerial drones (or unmanned aerial vehicles; UAVs) are employed for surveillance by the military and police, which suggests that drone-captured footage might provide sufficient information for person identification. This study demonstrates that person identification from drone-captured images is poor when targets are unfamiliar (Experiment 1), when targets are familiar and the number of possible identities is restricted by context (Experiment 2), and when moving footage is employed (Experiment 3). Person information such as sex, race and age is also difficult to access from drone-captured footage (Experiment 4). These findings suggest that such footage provides a particularly poor medium for person identification. This is likely to reflect the sub-optimal quality of such footage, which is subject to factors such as the height and velocity at which drones fly, viewing distance, unfavourable vantage points, and ambient conditions.

  18. Visual Persons Behavior Diary Generation Model based on Trajectories and Pose Estimation

    NASA Astrophysics Data System (ADS)

    Gang, Chen; Bin, Chen; Yuming, Liu; Hui, Li

    2018-03-01

    The behavior pattern of persons was the important output of the surveillance analysis. This paper focus on the generation model of visual person behavior diary. The pipeline includes the person detection, tracking, and the person behavior classify. This paper adopts the deep convolutional neural model YOLO (You Only Look Once)V2 for person detection module. Multi person tracking was based on the detection framework. The Hungarian assignment algorithm was used to the matching. The person appearance model was integrated by HSV color model and Hash code model. The person object motion was estimated by the Kalman Filter. The multi objects were matching with exist tracklets through the appearance and motion location distance by the Hungarian assignment method. A long continuous trajectory for one person was get by the spatial-temporal continual linking algorithm. And the face recognition information was used to identify the trajectory. The trajectories with identification information can be used to generate the visual diary of person behavior based on the scene context information and person action estimation. The relevant modules are tested in public data sets and our own capture video sets. The test results show that the method can be used to generate the visual person behavior pattern diary with certain accuracy.

  19. Striving for group agency: threat to personal control increases the attractiveness of agentic groups.

    PubMed

    Stollberg, Janine; Fritsche, Immo; Bäcker, Anna

    2015-01-01

    When their sense of personal control is threatened people try to restore perceived control through the social self. We propose that it is the perceived agency of ingroups that provides the self with a sense of control. In three experiments, we for the first time tested the hypothesis that threat to personal control increases the attractiveness of being part or joining those groups that are perceived as coherent entities engaging in coordinated group goal pursuit (agentic groups) but not of those groups whose agency is perceived to be low. Consistent with this hypothesis we found in Study 1 (N = 93) that threat to personal control increased ingroup identification only with task groups, but not with less agentic types of ingroups that were made salient simultaneously. Furthermore, personal control threat increased a sense of collective control and support within the task group, mediated through task-group identification (indirect effects). Turning to groups people are not (yet) part of, Study 2 (N = 47) showed that personal control threat increased relative attractiveness ratings of small groups as possible future ingroups only when the relative agency of small groups was perceived to be high. Perceived group homogeneity or social power did not moderate the effect. Study 3 (N = 78) replicated the moderating role of perceived group agency for attractiveness ratings of entitative groups, whereas perceived group status did not moderate the effect. These findings extend previous research on group-based control, showing that perceived agency accounts for group-based responses to threatened control.

  20. Personality Characteristics of Undergraduates with Career Interests in Forensic Identification

    ERIC Educational Resources Information Center

    Roberti, Jonathan W.

    2004-01-01

    The author assessed personality scores for 47 undergraduates enrolled in a forensic identification program. Results revealed no difference between men and women enrolled in the Forensic Identification Program on subscales of the Sensation Seeking Scale (SSS-V), with the exception of Experience Seeking. Participants had lower Disinhibition scores…

  1. Human Trafficking Identification and Service Provision in the Medical and Social Service Sectors

    PubMed Central

    Unruh, Erik; Cronin, Katie; Evans-Simpson, Sarah; Britton, Hannah; Ramaswamy, Megha

    2016-01-01

    Abstract The medical sector presents a unique opportunity for identification and service to victims of human trafficking. In this article, we describe local and site-specific efforts to develop an intervention tool to be used in an urban hospital’s emergency department in the midwestern United States. In the development of our tool, we focused on both identification and intervention to assist trafficked persons, through a largely collaborative process in which we engaged local stakeholders for developing site-specific points of intervention. In the process of developing our intervention, we highlight the importance of using existing resources and services in a specific community to address critical gaps in coverage for trafficked persons. For example, we focus on those who are victims of labor trafficking, in addition to those who are victims of sex trafficking. We offer a framework informed by rights-based approaches to anti-trafficking efforts that addresses the practical challenges of human trafficking victim identification while simultaneously working to provide resources and disseminate services to those victims. PMID:27781009

  2. Pose invariant face recognition: 3D model from single photo

    NASA Astrophysics Data System (ADS)

    Napoléon, Thibault; Alfalou, Ayman

    2017-02-01

    Face recognition is widely studied in the literature for its possibilities in surveillance and security. In this paper, we report a novel algorithm for the identification task. This technique is based on an optimized 3D modeling allowing to reconstruct faces in different poses from a limited number of references (i.e. one image by class/person). Particularly, we propose to use an active shape model to detect a set of keypoints on the face necessary to deform our synthetic model with our optimized finite element method. Indeed, in order to improve our deformation, we propose a regularization by distances on graph. To perform the identification we use the VanderLugt correlator well know to effectively address this task. On the other hand we add a difference of Gaussian filtering step to highlight the edges and a description step based on the local binary patterns. The experiments are performed on the PHPID database enhanced with our 3D reconstructed faces of each person with an azimuth and an elevation ranging from -30° to +30°. The obtained results prove the robustness of our new method with 88.76% of good identification when the classic 2D approach (based on the VLC) obtains just 44.97%.

  3. Role of forensic odontologist in post mortem person identification

    PubMed Central

    Pramod, Jahagirdar B.; Marya, Anand; Sharma, Vidhii

    2012-01-01

    The natural teeth are the most durable organs in the bodies of vertebrates, and humankind's understanding of their own past and evolution relies heavily upon remnant dental evidence found as fossils. The use of features unique to the human dentition as an aid to personal identification is widely accepted within the forensic field. Comparative dental identifications play a major role in identifying the victims of violence, disaster or other mass tragedies. The comparison of ante-mortem and postmortem dental records to determine human identity has long been established. Indeed, it is still a major identification method in criminal investigations, mass disasters, grossly decomposed or traumatized bodies, and in other situations where visual identification is neither possible nor desirable. This article has comprehensively described some of the methods, and additional factors aiding in postmortem person identification. PMID:23559914

  4. A network identity authentication system based on Fingerprint identification technology

    NASA Astrophysics Data System (ADS)

    Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan

    2005-10-01

    Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.

  5. The effects of authentic leadership, organizational identification, and occupational coping self-efficacy on new graduate nurses' job turnover intentions in Canada.

    PubMed

    Fallatah, Fatmah; Laschinger, Heather K S; Read, Emily A

    Nurses' turnover has a costly impact on organizations, patients, and nurses. Numerous studies have highlighted the critical role of nursing leadership in enhancing new nurses' retention. To examine the influence of authentic leadership on new nurses' job turnover intentions through their personal identification with the leader, organizational identification, and occupational coping self-efficacy. Secondary data analysis of a cross-sectional national study of Canadian new graduate nurses was conducted using structural equation modeling. Authentic leadership had a significant positive effect on nurses' personal identification with their leader and their organization. Personal identification mediated the relationship between authentic leadership and organizational identification. Organizational identification had a significant positive effect on occupational coping self-efficacy, which, in turn, had a negative effect on new graduate nurses' job turnover intentions. The findings demonstrate the vital role authentic leadership plays in retaining new graduate nurses. Authentic leaders foster personal and organizational identification among new graduate nurses, leading to increase in the confidence in their ability to manage work-related challenges, which subsequently results in positive outcomes in both new graduate nurses and the organization. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. Triboelectric-Based Transparent Secret Code.

    PubMed

    Yuan, Zuqing; Du, Xinyu; Li, Nianwu; Yin, Yingying; Cao, Ran; Zhang, Xiuling; Zhao, Shuyu; Niu, Huidan; Jiang, Tao; Xu, Weihua; Wang, Zhong Lin; Li, Congju

    2018-04-01

    Private and security information for personal identification requires an encrypted tool to extend communication channels between human and machine through a convenient and secure method. Here, a triboelectric-based transparent secret code (TSC) that enables self-powered sensing and information identification simultaneously in a rapid process method is reported. The transparent and hydrophobic TSC can be conformed to any cambered surface due to its high flexibility, which extends the application scenarios greatly. Independent of the power source, the TSC can induce obvious electric signals only by surface contact. This TSC is velocity-dependent and capable of achieving a peak voltage of ≈4 V at a resistance load of 10 MΩ and a sliding speed of 0.1 m s -1 , according to a 2 mm × 20 mm rectangular stripe. The fabricated TSC can maintain its performance after reciprocating rolling for about 5000 times. The applications of TSC as a self-powered code device are demonstrated, and the ordered signals can be recognized through the height of the electric peaks, which can be further transferred into specific information by the processing program. The designed TSC has great potential in personal identification, commodity circulation, valuables management, and security defense applications.

  7. Elaboration and formalization of current scientific knowledge of risks and preventive measures illustrated by colorectal cancer.

    PubMed

    Giorgi, R; Gouvernet, J; Dufour, J; Degoulet, P; Laugier, R; Quilichini, F; Fieschi, M

    2001-01-01

    Present the method used to elaborate and formalize current scientific knowledge to provide physicians with tools available on the Internet, that enable them to evaluate individual patient risk, give personalized preventive recommendations or early screening measures. The approach suggested in this article is in line with medical procedures based on levels of evidence (Evidence-based Medicine). A cyclical process for developing recommendations allows us to quickly incorporate current scientific information. At each phase, the analysis is reevaluated by experts in the field collaborating on the project. The information is formalized through the use of levels of evidence and grades of recommendations. GLIF model is used to implement recommendations for clinical practice guidelines. The most current scientific evidence incorporated in a cyclical process includes several steps: critical analysis according to the Evidence-based Medicine method; identification of predictive factors; setting-up risk levels; identification of prevention measures; elaboration of personalized recommendation. The information technology implementation of the clinical practice guideline enables physicians to quickly obtain personalized information for their patients. Cases of colorectal prevention illustrate our approach. Integration of current scientific knowledge is an important process. The delay between the moment new information arrives and the moment the practitioner applies it, is thus reduced.

  8. Motion capture based identification of the human body inertial parameters.

    PubMed

    Venture, Gentiane; Ayusawa, Ko; Nakamura, Yoshihiko

    2008-01-01

    Identification of body inertia, masses and center of mass is an important data to simulate, monitor and understand dynamics of motion, to personalize rehabilitation programs. This paper proposes an original method to identify the inertial parameters of the human body, making use of motion capture data and contact forces measurements. It allows in-vivo painless estimation and monitoring of the inertial parameters. The method is described and then obtained experimental results are presented and discussed.

  9. Persuasive Effects of Point of View, Protagonist Competence, and Similarity in a Health Narrative About Type 2 Diabetes.

    PubMed

    Chen, Meng; Bell, Robert A; Taylor, Laramie D

    2017-08-01

    We examined the persuasive effects of three narrative features in a message about type 2 diabetes: narrative point of view (first- vs. third-person perspective), protagonist competence (positive role model who prevents diabetes vs. negative role model who develops diabetes), and protagonist-reader similarity (demographically similar vs. dissimilar). We posited that a first-person point of view would elevate people's identification levels more than a third-person point of view, especially when the protagonist was depicted as a positive role model. We also expected a similar protagonist to foster greater levels of identification than a dissimilar one. In addition, the positive effect of a competent role model on identification was expected to be enhanced under the condition of reader-protagonist similarity. Finally, we hypothesized that the effects of identification on persuasion would be mediated by self-referencing. Participants 30 years of age or younger (N = 489) were randomly assigned to read a story about a person with a family history of type 2 diabetes that was altered with regard to the experimental factors. Thereafter they completed a questionnaire incorporating measures of study variables. Greater levels of identification were found to foster self-referencing, leading to persuasion. Identification was strongest with a first-person point of view and when the narrator was a positive role model. The effect of identification on persuasion was mediated by self-referencing. Contrary to expectations, protagonist-reader demographic similarity did not affect identification or self-referencing. There was no support for the two moderation hypotheses.

  10. Striving for group agency: threat to personal control increases the attractiveness of agentic groups

    PubMed Central

    Stollberg, Janine; Fritsche, Immo; Bäcker, Anna

    2015-01-01

    When their sense of personal control is threatened people try to restore perceived control through the social self. We propose that it is the perceived agency of ingroups that provides the self with a sense of control. In three experiments, we for the first time tested the hypothesis that threat to personal control increases the attractiveness of being part or joining those groups that are perceived as coherent entities engaging in coordinated group goal pursuit (agentic groups) but not of those groups whose agency is perceived to be low. Consistent with this hypothesis we found in Study 1 (N = 93) that threat to personal control increased ingroup identification only with task groups, but not with less agentic types of ingroups that were made salient simultaneously. Furthermore, personal control threat increased a sense of collective control and support within the task group, mediated through task-group identification (indirect effects). Turning to groups people are not (yet) part of, Study 2 (N = 47) showed that personal control threat increased relative attractiveness ratings of small groups as possible future ingroups only when the relative agency of small groups was perceived to be high. Perceived group homogeneity or social power did not moderate the effect. Study 3 (N = 78) replicated the moderating role of perceived group agency for attractiveness ratings of entitative groups, whereas perceived group status did not moderate the effect. These findings extend previous research on group-based control, showing that perceived agency accounts for group-based responses to threatened control. PMID:26074832

  11. Selecting lineup foils in eyewitness identification experiments: experimental control and real-world simulation.

    PubMed

    Clark, S E; Tunnicliff, J L

    2001-06-01

    Experimental research on eyewitness identification follows a standard principle of experimental design. Perpetrator-present and perpetrator-absent lineups are constructed with the same foils, so that the two conditions are identical except for the presence or absence ofthe trueperpetrator ofthe crime. However, this aspect of the design simulates conditions that do not correspond to those of real criminal investigations. Specifically, these conditions can create perp-absent lineups in which the foils are selected based on their similarity to an unknown person--the real perpetrator. Analysis of the similarity relations predicts that when foils for perp-absent lineups are selected based on their match to the perpetrator the false identification rate will be lower than if the foils are selected based on their match to the innocent suspect. This prediction was confirmed in an experiment that compared these two perp-absent lineup conditions. These results suggest that false identification rates in previous experiments would have been higher if the foils had been selected based on their match to the innocent suspect, rather than the absent perpetrator.

  12. Seeing meaning in action: a bidirectional link between visual perspective and action identification level.

    PubMed

    Libby, Lisa K; Shaeffer, Eric M; Eibach, Richard P

    2009-11-01

    Actions do not have inherent meaning but rather can be interpreted in many ways. The interpretation a person adopts has important effects on a range of higher order cognitive processes. One dimension on which interpretations can vary is the extent to which actions are identified abstractly--in relation to broader goals, personal characteristics, or consequences--versus concretely, in terms of component processes. The present research investigated how visual perspective (own 1st-person vs. observer's 3rd-person) in action imagery is related to action identification level. A series of experiments measured and manipulated visual perspective in mental and photographic images to test the connection with action identification level. Results revealed a bidirectional causal relationship linking 3rd-person images and abstract action identifications. These findings highlight the functional role of visual imagery and have implications for understanding how perspective is involved in action perception at the social, cognitive, and neural levels. Copyright 2009 APA

  13. Personalized translational epilepsy research - Novel approaches and future perspectives: Part I: Clinical and network analysis approaches.

    PubMed

    Rosenow, Felix; van Alphen, Natascha; Becker, Albert; Chiocchetti, Andreas; Deichmann, Ralf; Deller, Thomas; Freiman, Thomas; Freitag, Christine M; Gehrig, Johannes; Hermsen, Anke M; Jedlicka, Peter; Kell, Christian; Klein, Karl Martin; Knake, Susanne; Kullmann, Dimitri M; Liebner, Stefan; Norwood, Braxton A; Omigie, Diana; Plate, Karlheinz; Reif, Andreas; Reif, Philipp S; Reiss, Yvonne; Roeper, Jochen; Ronellenfitsch, Michael W; Schorge, Stephanie; Schratt, Gerhard; Schwarzacher, Stephan W; Steinbach, Joachim P; Strzelczyk, Adam; Triesch, Jochen; Wagner, Marlies; Walker, Matthew C; von Wegner, Frederic; Bauer, Sebastian

    2017-11-01

    Despite the availability of more than 15 new "antiepileptic drugs", the proportion of patients with pharmacoresistant epilepsy has remained constant at about 20-30%. Furthermore, no disease-modifying treatments shown to prevent the development of epilepsy following an initial precipitating brain injury or to reverse established epilepsy have been identified to date. This is likely in part due to the polyetiologic nature of epilepsy, which in turn requires personalized medicine approaches. Recent advances in imaging, pathology, genetics and epigenetics have led to new pathophysiological concepts and the identification of monogenic causes of epilepsy. In the context of these advances, the First International Symposium on Personalized Translational Epilepsy Research (1st ISymPTER) was held in Frankfurt on September 8, 2016, to discuss novel approaches and future perspectives for personalized translational research. These included new developments and ideas in a range of experimental and clinical areas such as deep phenotyping, quantitative brain imaging, EEG/MEG-based analysis of network dysfunction, tissue-based translational studies, innate immunity mechanisms, microRNA as treatment targets, functional characterization of genetic variants in human cell models and rodent organotypic slice cultures, personalized treatment approaches for monogenic epilepsies, blood-brain barrier dysfunction, therapeutic focal tissue modification, computational modeling for target and biomarker identification, and cost analysis in (monogenic) disease and its treatment. This report on the meeting proceedings is aimed at stimulating much needed investments of time and resources in personalized translational epilepsy research. Part I includes the clinical phenotyping and diagnostic methods, EEG network-analysis, biomarkers, and personalized treatment approaches. In Part II, experimental and translational approaches will be discussed (Bauer et al., 2017) [1]. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Personalized translational epilepsy research - Novel approaches and future perspectives: Part II: Experimental and translational approaches.

    PubMed

    Bauer, Sebastian; van Alphen, Natascha; Becker, Albert; Chiocchetti, Andreas; Deichmann, Ralf; Deller, Thomas; Freiman, Thomas; Freitag, Christine M; Gehrig, Johannes; Hermsen, Anke M; Jedlicka, Peter; Kell, Christian; Klein, Karl Martin; Knake, Susanne; Kullmann, Dimitri M; Liebner, Stefan; Norwood, Braxton A; Omigie, Diana; Plate, Karlheinz; Reif, Andreas; Reif, Philipp S; Reiss, Yvonne; Roeper, Jochen; Ronellenfitsch, Michael W; Schorge, Stephanie; Schratt, Gerhard; Schwarzacher, Stephan W; Steinbach, Joachim P; Strzelczyk, Adam; Triesch, Jochen; Wagner, Marlies; Walker, Matthew C; von Wegner, Frederic; Rosenow, Felix

    2017-11-01

    Despite the availability of more than 15 new "antiepileptic drugs", the proportion of patients with pharmacoresistant epilepsy has remained constant at about 20-30%. Furthermore, no disease-modifying treatments shown to prevent the development of epilepsy following an initial precipitating brain injury or to reverse established epilepsy have been identified to date. This is likely in part due to the polyetiologic nature of epilepsy, which in turn requires personalized medicine approaches. Recent advances in imaging, pathology, genetics, and epigenetics have led to new pathophysiological concepts and the identification of monogenic causes of epilepsy. In the context of these advances, the First International Symposium on Personalized Translational Epilepsy Research (1st ISymPTER) was held in Frankfurt on September 8, 2016, to discuss novel approaches and future perspectives for personalized translational research. These included new developments and ideas in a range of experimental and clinical areas such as deep phenotyping, quantitative brain imaging, EEG/MEG-based analysis of network dysfunction, tissue-based translational studies, innate immunity mechanisms, microRNA as treatment targets, functional characterization of genetic variants in human cell models and rodent organotypic slice cultures, personalized treatment approaches for monogenic epilepsies, blood-brain barrier dysfunction, therapeutic focal tissue modification, computational modeling for target and biomarker identification, and cost analysis in (monogenic) disease and its treatment. This report on the meeting proceedings is aimed at stimulating much needed investments of time and resources in personalized translational epilepsy research. This Part II includes the experimental and translational approaches and a discussion of the future perspectives, while the diagnostic methods, EEG network analysis, biomarkers, and personalized treatment approaches were addressed in Part I [1]. Copyright © 2017. Published by Elsevier Inc.

  15. Joint influences of individual and work unit abusive supervision on ethical intentions and behaviors: a moderated mediation model.

    PubMed

    Hannah, Sean T; Schaubroeck, John M; Peng, Ann C; Lord, Robert G; Trevino, Linda K; Kozlowski, Steve W J; Avolio, Bruce J; Dimotakis, Nikolaos; Doty, Joseph

    2013-07-01

    We develop and test a model based on social cognitive theory (Bandura, 1991) that links abusive supervision to followers' ethical intentions and behaviors. Results from a sample of 2,572 military members show that abusive supervision was negatively related to followers' moral courage and their identification with the organization's core values. In addition, work unit contexts with varying degrees of abusive supervision, reflected by the average level of abusive supervision reported by unit members, moderated relationships between the level of abusive supervision personally experienced by individuals and both their moral courage and their identification with organizational values. Moral courage and identification with organizational values accounted for the relationship between abusive supervision and followers' ethical intentions and unethical behaviors. These findings suggest that abusive supervision may undermine moral agency and that being personally abused is not required for abusive supervision to negatively influence ethical outcomes. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  16. Systematic comparison of variant calling pipelines using gold standard personal exome variants

    PubMed Central

    Hwang, Sohyun; Kim, Eiru; Lee, Insuk; Marcotte, Edward M.

    2015-01-01

    The success of clinical genomics using next generation sequencing (NGS) requires the accurate and consistent identification of personal genome variants. Assorted variant calling methods have been developed, which show low concordance between their calls. Hence, a systematic comparison of the variant callers could give important guidance to NGS-based clinical genomics. Recently, a set of high-confident variant calls for one individual (NA12878) has been published by the Genome in a Bottle (GIAB) consortium, enabling performance benchmarking of different variant calling pipelines. Based on the gold standard reference variant calls from GIAB, we compared the performance of thirteen variant calling pipelines, testing combinations of three read aligners—BWA-MEM, Bowtie2, and Novoalign—and four variant callers—Genome Analysis Tool Kit HaplotypeCaller (GATK-HC), Samtools mpileup, Freebayes and Ion Proton Variant Caller (TVC), for twelve data sets for the NA12878 genome sequenced by different platforms including Illumina2000, Illumina2500, and Ion Proton, with various exome capture systems and exome coverage. We observed different biases toward specific types of SNP genotyping errors by the different variant callers. The results of our study provide useful guidelines for reliable variant identification from deep sequencing of personal genomes. PMID:26639839

  17. A Platform for Designing Genome-Based Personalized Immunotherapy or Vaccine against Cancer

    PubMed Central

    Gupta, Sudheer; Chaudhary, Kumardeep; Dhanda, Sandeep Kumar; Kumar, Rahul; Kumar, Shailesh; Sehgal, Manika; Nagpal, Gandharva

    2016-01-01

    Due to advancement in sequencing technology, genomes of thousands of cancer tissues or cell-lines have been sequenced. Identification of cancer-specific epitopes or neoepitopes from cancer genomes is one of the major challenges in the field of immunotherapy or vaccine development. This paper describes a platform Cancertope, developed for designing genome-based immunotherapy or vaccine against a cancer cell. Broadly, the integrated resources on this platform are apportioned into three precise sections. First section explains a cancer-specific database of neoepitopes generated from genome of 905 cancer cell lines. This database harbors wide range of epitopes (e.g., B-cell, CD8+ T-cell, HLA class I, HLA class II) against 60 cancer-specific vaccine antigens. Second section describes a partially personalized module developed for predicting potential neoepitopes against a user-specific cancer genome. Finally, we describe a fully personalized module developed for identification of neoepitopes from genomes of cancerous and healthy cells of a cancer-patient. In order to assist the scientific community, wide range of tools are incorporated in this platform that includes screening of epitopes against human reference proteome (http://www.imtech.res.in/raghava/cancertope/). PMID:27832200

  18. Effectiveness of a Web-Based Intervention to Reduce Alcohol Consumption among French Hazardous Drinkers: A Randomized Controlled Trial

    ERIC Educational Resources Information Center

    Guillemont, Juliette; Cogordan, Chloé; Nalpas, Bertrand; Nguyen-Thanh, Vi?t; Richard, Jean-Baptiste; Arwidson, Pierre

    2017-01-01

    This study aims to evaluate the effectiveness of a web-based intervention to reduce alcohol consumption among hazardous drinkers. A two-group parallel randomized controlled trial was conducted among adults identified as hazardous drinkers according to the Alcohol Use Disorders Identification Test. The intervention delivers personalized normative…

  19. Disaster dentistry.

    PubMed

    Hinchliffe, J A

    2007-04-28

    This article gives a brief glimpse of some of the issues involved with dental identification of fatalities in disaster situations. It is based on the personal views and experiences of the author as a forensic dentist in the aftermath of the Asian tsunami and the Sharm el Sheikh bombings.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neocleous, C.C.; Esat, I.I.; Schizas, C.N.

    The creativity phase is identified as an integral part of the design phase. The characteristics of creative persons which are relevant to designing artificial neural networks manifesting aspects of creativity, are identified. Based on these identifications, a general framework of artificial neural network characteristics to implement such a goal are proposed.

  1. [Factors related to nurses' patient identification behavior and the moderating effect of person-organization value congruence climate within nursing units].

    PubMed

    Kim, Young Mee; Kang, Seung Wan; Kim, Se Young

    2014-04-01

    This research was an empirical study designed to identify precursors and interaction effects related to nurses' patient identification behavior. A multilevel analysis methodology was used. A self-report survey was administered to registered nurses (RNs) of a university hospital in South Korea. Of the questionnaires, 1114 were analyzed. The individual-level factors that had a significantly positive association with patient identification behavior were person-organization value congruence, organizational commitment, occupational commitment, tenure at the hospital, and tenure at the unit. Significantly negative group-level precursors of patient identification behavior were burnout climate and the number of RNs. Two interaction effects of the person-organization value congruence climate were identified. The first was a group-level moderating effect in which the negative relationship between the number of RNs and patient identification behavior was weaker when the nursing unit's value congruence climate was high. The second was a cross-level moderating effect in which the positive relationship between tenure at the unit and patient identification behavior was weaker when value congruence climate was high. This study simultaneously tested both individual-level and group-level factors that potentially influence patient identification behavior and identified the moderating role of person-organization value congruence climate. Implications of these results are discussed.

  2. Proposing national identification number on dental prostheses as universal personal identification code - A revolution in forensic odontology

    PubMed Central

    Baad, Rajendra K.; Belgaumi, Uzma; Vibhute, Nupura; Kadashetti, Vidya; Chandrappa, Pramod Redder; Gugwad, Sushma

    2015-01-01

    The proper identification of a decedent is not only important for humanitarian and emotional reasons, but also for legal and administrative purposes. During the reconstructive identification process, all necessary information is gathered from the unknown body of the victim and hence that an objective reconstructed profile can be established. Denture marking systems are being used in various situations, and a number of direct and indirect methods are reported. We propose that national identification numbers be incorporated in all removable and fixed prostheses, so as to adopt a single and definitive universal personal identification code with the aim of achieving a uniform, standardized, easy, and fast identification method worldwide for forensic identification. PMID:26005294

  3. Eyewitness identification: Bayesian information gain, base-rate effect equivalency curves, and reasonable suspicion.

    PubMed

    Wells, Gary L; Yang, Yueran; Smalarz, Laura

    2015-04-01

    We provide a novel Bayesian treatment of the eyewitness identification problem as it relates to various system variables, such as instruction effects, lineup presentation format, lineup-filler similarity, lineup administrator influence, and show-ups versus lineups. We describe why eyewitness identification is a natural Bayesian problem and how numerous important observations require careful consideration of base rates. Moreover, we argue that the base rate in eyewitness identification should be construed as a system variable (under the control of the justice system). We then use prior-by-posterior curves and information-gain curves to examine data obtained from a large number of published experiments. Next, we show how information-gain curves are moderated by system variables and by witness confidence and we note how information-gain curves reveal that lineups are consistently more proficient at incriminating the guilty than they are at exonerating the innocent. We then introduce a new type of analysis that we developed called base rate effect-equivalency (BREE) curves. BREE curves display how much change in the base rate is required to match the impact of any given system variable. The results indicate that even relatively modest changes to the base rate can have more impact on the reliability of eyewitness identification evidence than do the traditional system variables that have received so much attention in the literature. We note how this Bayesian analysis of eyewitness identification has implications for the question of whether there ought to be a reasonable-suspicion criterion for placing a person into the jeopardy of an identification procedure. (c) 2015 APA, all rights reserved).

  4. Wavelet-based associative memory

    NASA Astrophysics Data System (ADS)

    Jones, Katharine J.

    2004-04-01

    Faces provide important characteristics of a person"s identification. In security checks, face recognition still remains the method in continuous use despite other approaches (i.e. fingerprints, voice recognition, pupil contraction, DNA scanners). With an associative memory, the output data is recalled directly using the input data. This can be achieved with a Nonlinear Holographic Associative Memory (NHAM). This approach can also distinguish between strongly correlated images and images that are partially or totally enclosed by others. Adaptive wavelet lifting has been used for Content-Based Image Retrieval. In this paper, adaptive wavelet lifting will be applied to face recognition to achieve an associative memory.

  5. Developing a multimodal biometric authentication system using soft computing methods.

    PubMed

    Malcangi, Mario

    2015-01-01

    Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.

  6. Capturing the vital vascular fingerprint with optical coherence tomography

    PubMed Central

    Liu, Gangjun; Chen, Zhongping

    2014-01-01

    Using fingerprints as a method to identify an individual has been accepted in forensics since the nineteenth century, and the fingerprint has become one of the most widely used biometric characteristics. Most of the modern fingerprint recognition systems are based on the print pattern of the finger surface and are not robust against spoof attaching. We demonstrate a novel vital vascular fingerprint system using Doppler optical coherence tomography that provides highly sensitive and reliable personal identification. Because the system is based on blood flow, which only exists in a livng person, the technique is robust against spoof attaching. PMID:23913068

  7. Privacy-protected biometric templates: acoustic ear identification

    NASA Astrophysics Data System (ADS)

    Tuyls, Pim T.; Verbitskiy, Evgeny; Ignatenko, Tanya; Schobben, Daniel; Akkermans, Ton H.

    2004-08-01

    Unique Biometric Identifiers offer a very convenient way for human identification and authentication. In contrast to passwords they have hence the advantage that they can not be forgotten or lost. In order to set-up a biometric identification/authentication system, reference data have to be stored in a central database. As biometric identifiers are unique for a human being, the derived templates comprise unique, sensitive and therefore private information about a person. This is why many people are reluctant to accept a system based on biometric identification. Consequently, the stored templates have to be handled with care and protected against misuse [1, 2, 3, 4, 5, 6]. It is clear that techniques from cryptography can be used to achieve privacy. However, as biometric data are noisy, and cryptographic functions are by construction very sensitive to small changes in their input, and hence one can not apply those crypto techniques straightforwardly. In this paper we show the feasibility of the techniques developed in [5], [6] by applying them to experimental biometric data. As biometric identifier we have choosen the shape of the inner ear-canal, which is obtained by measuring the headphone-to-ear-canal Transfer Functions (HpTFs) which are known to be person dependent [7].

  8. The Numbers Game: A Values Clarification Strategy

    ERIC Educational Resources Information Center

    Ognibene, Richard; Winter, Cynthia

    1976-01-01

    After completing personal identification forms consisting only of numbers (phone number, Social Security number, etc.), students discuss the need for more personal means of identification within society in order for people to feel a useful sense of identity. (AV)

  9. Biometric template revocation

    NASA Astrophysics Data System (ADS)

    Arndt, Craig M.

    2004-08-01

    Biometric are a powerful technology for identifying humans both locally and at a distance. In order to perform identification or verification biometric systems capture an image of some biometric of a user or subject. The image is then converted mathematical to representation of the person call a template. Since we know that every human in the world is different each human will have different biometric images (different fingerprints, or faces, etc.). This is what makes biometrics useful for identification. However unlike a credit card number or a password to can be given to a person and later revoked if it is compromised and biometric is with the person for life. The problem then is to develop biometric templates witch can be easily revoked and reissued which are also unique to the user and can be easily used for identification and verification. In this paper we develop and present a method to generate a set of templates which are fully unique to the individual and also revocable. By using bases set compression algorithms in an n-dimensional orthogonal space we can represent a give biometric image in an infinite number of equally valued and unique ways. The verification and biometric matching system would be presented with a given template and revocation code. The code will then representing where in the sequence of n-dimensional vectors to start the recognition.

  10. Personal value preferences, group identifications, and cultural practices of Palestinian Israelis working in close contact with Jewish Israelis.

    PubMed

    Tartakovsky, Eugene; Abu Kheit, Ayat

    2017-01-01

    The present study investigates the connection between personal value preferences, group identifications, and cultural practices among Palestinian Israelis working in close contact with the Jewish population in Israel. One hundred twenty-two Palestinian Israelis participated in the study. The participants were employed in different professional positions in the Tel Aviv Metropolitan area and were recruited to the study using the snowball technique. A stronger national identification was associated with a higher preference for the security and conformity values, and a lower preference for the humility values. A stronger ethnic identification was associated with a lower preference for the security, power, and stimulation values. Group identifications mediated the connection between personal value preferences and cultural practices. A longer time working in close contact with the majority group and less frequent visits home were associated with a greater adherence to the majority group's cultural practices but not with adherence to the ethnic group's practices and not with the group identifications.

  11. Definitions of database files and fields of the Personal Computer-Based Water Data Sources Directory

    USGS Publications Warehouse

    Green, J. Wayne

    1991-01-01

    This report describes the data-base files and fields of the personal computer-based Water Data Sources Directory (WDSD). The personal computer-based WDSD was derived from the U.S. Geological Survey (USGS) mainframe computer version. The mainframe version of the WDSD is a hierarchical data-base design. The personal computer-based WDSD is a relational data- base design. This report describes the data-base files and fields of the relational data-base design in dBASE IV (the use of brand names in this abstract is for identification purposes only and does not constitute endorsement by the U.S. Geological Survey) for the personal computer. The WDSD contains information on (1) the type of organization, (2) the major orientation of water-data activities conducted by each organization, (3) the names, addresses, and telephone numbers of offices within each organization from which water data may be obtained, (4) the types of data held by each organization and the geographic locations within which these data have been collected, (5) alternative sources of an organization's data, (6) the designation of liaison personnel in matters related to water-data acquisition and indexing, (7) the volume of water data indexed for the organization, and (8) information about other types of data and services available from the organization that are pertinent to water-resources activities.

  12. De-identification of unstructured paper-based health records for privacy-preserving secondary use.

    PubMed

    Fenz, Stefan; Heurix, Johannes; Neubauer, Thomas; Rella, Antonio

    2014-07-01

    Abstract Whenever personal data is processed, privacy is a serious issue. Especially in the document-centric e-health area, the patients' privacy must be preserved in order to prevent any negative repercussions for the patient. Clinical research, for example, demands structured health records to carry out efficient clinical trials, whereas legislation (e.g. HIPAA) regulates that only de-identified health records may be used for research. However, unstructured and often paper-based data dominates information technology, especially in the healthcare sector. Existing approaches are geared towards data in English-language documents only and have not been designed to handle the recognition of erroneous personal data which is the result of the OCR-based digitization of paper-based health records.

  13. Context-based handover of persons in crowd and riot scenarios

    NASA Astrophysics Data System (ADS)

    Metzler, Jürgen

    2015-02-01

    In order to control riots in crowds, it is helpful to get ringleaders under control and pull them out of the crowd if one has become an offender. A great support to achieve these tasks is the capability of observing the crowd and ringleaders automatically by using cameras. It also allows a better conservation of evidence in riot control. A ringleader who has become an offender should be tracked across and recognized by several cameras, regardless of whether overlapping camera's fields of view exist or not. We propose a context-based approach for handover of persons between different camera fields of view. This approach can be applied for overlapping as well as for non-overlapping fields of view, so that a fast and accurate identification of individual persons in camera networks is feasible. Within the scope of this paper, the approach is applied to a handover of persons between single images without having any temporal information. It is particularly developed for semiautomatic video editing and a handover of persons between cameras in order to improve conservation of evidence. The approach has been developed on a dataset collected during a Crowd and Riot Control (CRC) training of the German armed forces. It consists of three different levels of escalation. First, the crowd started with a peaceful demonstration. Later, there were violent protests, and third, the riot escalated and offenders bumped into the chain of guards. One result of the work is a reliable context-based method for person re-identification between single images of different camera fields of view in crowd and riot scenarios. Furthermore, a qualitative assessment shows that the use of contextual information can support this task additionally. It can decrease the needed time for handover and the number of confusions which supports the conservation of evidence in crowd and riot scenarios.

  14. 29 CFR 1611.4 - Times, places, and requirements for identification of individuals making requests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... present sufficient personal identification (e.g., driver's license, employee identification card, social security card, credit cards). If the requester is unable to provide such identification, the requester...

  15. Biometric and Emotion Identification: An ECG Compression Based Method.

    PubMed

    Brás, Susana; Ferreira, Jacqueline H T; Soares, Sandra C; Pinho, Armando J

    2018-01-01

    We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG). The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1) conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2) conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3) identification of the ECG record class, using a 1-NN (nearest neighbor) classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model.

  16. Biometric and Emotion Identification: An ECG Compression Based Method

    PubMed Central

    Brás, Susana; Ferreira, Jacqueline H. T.; Soares, Sandra C.; Pinho, Armando J.

    2018-01-01

    We present an innovative and robust solution to both biometric and emotion identification using the electrocardiogram (ECG). The ECG represents the electrical signal that comes from the contraction of the heart muscles, indirectly representing the flow of blood inside the heart, it is known to convey a key that allows biometric identification. Moreover, due to its relationship with the nervous system, it also varies as a function of the emotional state. The use of information-theoretic data models, associated with data compression algorithms, allowed to effectively compare ECG records and infer the person identity, as well as emotional state at the time of data collection. The proposed method does not require ECG wave delineation or alignment, which reduces preprocessing error. The method is divided into three steps: (1) conversion of the real-valued ECG record into a symbolic time-series, using a quantization process; (2) conditional compression of the symbolic representation of the ECG, using the symbolic ECG records stored in the database as reference; (3) identification of the ECG record class, using a 1-NN (nearest neighbor) classifier. We obtained over 98% of accuracy in biometric identification, whereas in emotion recognition we attained over 90%. Therefore, the method adequately identify the person, and his/her emotion. Also, the proposed method is flexible and may be adapted to different problems, by the alteration of the templates for training the model. PMID:29670564

  17. Insect Keepers

    ERIC Educational Resources Information Center

    Moore, Virginia J.; Chessin, Debby A.; Theobald, Becky

    2010-01-01

    Insects are fascinating creatures--especially when you and your students get up close and personal with them! To that end, the authors facilitated an inquiry-based investigation with an emphasis on identification of the different types of insects found in the school yard, their characteristics, their habitat, and what they eat, while engaging the…

  18. International Co-Operation in Control Engineering Education Using Online Experiments

    ERIC Educational Resources Information Center

    Henry, Jim; Schaedel, Herbert M.

    2005-01-01

    This paper describes the international co-operation experience in teaching control engineering with laboratories being conducted remotely by students via the Internet. This paper describes how the students ran the experiments and their personal experiences with the laboratory. A tool for process identification and controller tuning based on…

  19. Identification and Characterization of Unique Subgroups of Chronic Pain Individuals with Dispositional Personality Traits.

    PubMed

    Mehta, S; Rice, D; McIntyre, A; Getty, H; Speechley, M; Sequeira, K; Shapiro, A P; Morley-Forster, P; Teasell, R W

    2016-01-01

    Objective. The current study attempted to identify and characterize distinct CP subgroups based on their level of dispositional personality traits. The secondary objective was to compare the difference among the subgroups in mood, coping, and disability. Methods. Individuals with chronic pain were assessed for demographic, psychosocial, and personality measures. A two-step cluster analysis was conducted in order to identify distinct subgroups of patients based on their level of personality traits. Differences in clinical outcomes were compared using the multivariate analysis of variance based on cluster membership. Results. In 229 participants, three clusters were formed. No significant difference was seen among the clusters on patient demographic factors including age, sex, relationship status, duration of pain, and pain intensity. Those with high levels of dispositional personality traits had greater levels of mood impairment compared to the other two groups (p < 0.05). Significant difference in disability was seen between the subgroups. Conclusions. The study identified a high risk group of CP individuals whose level of personality traits significantly correlated with impaired mood and coping. Use of pharmacological treatment alone may not be successful in improving clinical outcomes among these individuals. Instead, a more comprehensive treatment involving psychological treatments may be important in managing the personality traits that interfere with recovery.

  20. Person identification in irregular cardiac conditions using electrocardiogram signals.

    PubMed

    Sidek, Khairul Azami; Khalil, Ibrahim

    2011-01-01

    This paper presents a person identification mechanism in irregular cardiac conditions using ECG signals. A total of 30 subjects were used in the study from three different public ECG databases containing various abnormal heart conditions from the Paroxysmal Atrial Fibrillation Predicition Challenge database (AFPDB), MIT-BIH Supraventricular Arrthymia database (SVDB) and T-Wave Alternans Challenge database (TWADB). Cross correlation (CC) was used as the biometric matching algorithm with defined threshold values to evaluate the performance. In order to measure the efficiency of this simple yet effective matching algorithm, two biometric performance metrics were used which are false acceptance rate (FAR) and false reject rate (FRR). Our experimentation results suggest that ECG based biometric identification with irregular cardiac condition gives a higher recognition rate of different ECG signals when tested for three different abnormal cardiac databases yielding false acceptance rate (FAR) of 2%, 3% and 2% and false reject rate (FRR) of 1%, 2% and 0% for AFPDB, SVDB and TWADB respectively. These results also indicate the existence of salient biometric characteristics in the ECG morphology within the QRS complex that tends to differentiate individuals.

  1. Body identification, biometrics and medicine: ethical and social considerations.

    PubMed

    Mordini, Emilio; Ottolini, Corinna

    2007-01-01

    Identity is important when it is weak. This apparent paradox is the core of the current debate on identity. Traditionally, verification of identity has been based upon authentication of attributed and biographical characteristics. After small scale societies and large scale, industrial societies, globalization represents the third period of personal identification. The human body lies at the heart of all strategies for identity management. The tension between human body and personal identity is critical in the health care sector. The health care sector is second only to the financial sector in term of the number of biometric users. Many hospitals and healthcare organizations are in progress to deploy biometric security architecture. Secure identification is critical in the health care system, both to control logic access to centralized archives of digitized patients' data, and to limit physical access to buildings and hospital wards, and to authenticate medical and social support personnel. There is also an increasing need to identify patients with a high degree of certainty. Finally there is the risk that biometric authentication devices can significantly reveal any health information. All these issues require a careful ethical and political scrutiny.

  2. Application of 3D models of palatal rugae to personal identification: hints at identification from 3D-3D superimposition techniques.

    PubMed

    Gibelli, Daniele; De Angelis, Danilo; Pucciarelli, Valentina; Riboli, Francesco; Ferrario, Virgilio F; Dolci, Claudia; Sforza, Chiarella; Cattaneo, Cristina

    2017-11-20

    Palatal rugae are known in literature as individualizing anatomical structures with a strong potential for personal identification. However, a 3D assessment of their uniqueness has not yet been performed. The present study aims at verifying the uniqueness of 3D models of the palate. Twenty-six subjects were recruited among the orthodontic patients of a private dental office; from every patient, at least two dental casts were taken in different time periods, for a total of 62 casts. Dental casts were digitized by a 3D laser scanner (iSeries, Dental Wings©, Montreal, Canada). The palatal area was identified, and a series of 250 superimpositions was then performed automatically through VAM©software in order to reach the minimum point-to point distance between two models. In 36 matches the models belonged to the same individual, whereas in 214 mismatches they came from different subjects. The RMS (root mean square) of point-to-point distances was then calculated by 3D software. Possible statistically significant differences were assessed through Mann-Whitney test (p < 0.05). Results showed a statistically significant difference in RMS mean point-to-point distance between matches (mean 0.26 mm; SD 0.12) and mismatches (mean 1.30; SD 0.44) (p < 0.0001).All matches reached an RMS value below 0.50 mm. This study first provided an assessment of uniqueness of palatal rugae, based on their anatomical 3D conformations, with consequent applications to personal identification.

  3. The influence of regional deprivation index on personal happiness using multilevel analysis

    PubMed Central

    Kim, Kil Hun; Chun, Jin-Ho; Sohn, Hae Sook

    2015-01-01

    OBJECTIVES: The objective of the present study was to identify the factors that influence the happiness index of community residents, by considering personal and regional aspects, and to use as evidence of efforts for improvement of the happiness index. METHODS: The study was conducted based on information from 16,270 participants who met the data requirement among those who participated in the 2011 South Gyeongsang Community Health Survey. Of the factors that can influence the happiness index, socioeconomic characteristics, health behavior, morbidity, and healthcare use, social contact, and participation in social activities were classified as personal factors; for regional factors, data from the 2010 census were used to extrapolate the regional deprivation indices at the submunicipal-level (eup, myeon, and dong) in South Gyeongsang Province. The happiness index for each characteristic was compared to that for others via t-test and ANOVA, and multilevel analysis was performed, using four models: a basic model for identification of only random effects, model 1 for identification of personal factors, model 2 for identification of regional factors, and model 3 for simultaneous consideration of both personal and regional factors. RESULTS: The mean happiness index was 63.2 points (64.6 points in males and 62.0 points in females), while the mean deprivation index was -1.58 points. In the multilevel analysis, the regional-level variance ratio of the basic model was 10.8%, confirming interregional differences. At the personal level, higher happiness indices were seen in groups consisting of males with high educational level, high income, high degree of physical activity, sufficient sleep, active social contact, and participation in social activities; whereas lower happiness indices were seen in people who frequently skipped breakfast, had unmet healthcare needs, and had accompanying diseases, as well as those with higher deprivation index. CONCLUSIONS: The study confirmed that the happiness index of community residents was influenced by not only personal aspects but also various regional characteristics. To increase the happiness index, interests at both personal and regional levels, as well as community emphasis on creating social rapport and engaging in selective efforts, are needed in vulnerable regions with relatively high deprivation index. PMID:26725223

  4. The influence of regional deprivation index on personal happiness using multilevel analysis.

    PubMed

    Kim, Kil Hun; Chun, Jin-Ho; Sohn, Hae Sook

    2015-01-01

    The objective of the present study was to identify the factors that influence the happiness index of community residents, by considering personal and regional aspects, and to use as evidence of efforts for improvement of the happiness index. The study was conducted based on information from 16,270 participants who met the data requirement among those who participated in the 2011 South Gyeongsang Community Health Survey. Of the factors that can influence the happiness index, socioeconomic characteristics, health behavior, morbidity, and healthcare use, social contact, and participation in social activities were classified as personal factors; for regional factors, data from the 2010 census were used to extrapolate the regional deprivation indices at the submunicipal-level (eup, myeon, and dong) in South Gyeongsang Province. The happiness index for each characteristic was compared to that for others via t-test and ANOVA, and multilevel analysis was performed, using four models: a basic model for identification of only random effects, model 1 for identification of personal factors, model 2 for identification of regional factors, and model 3 for simultaneous consideration of both personal and regional factors. The mean happiness index was 63.2 points (64.6 points in males and 62.0 points in females), while the mean deprivation index was -1.58 points. In the multilevel analysis, the regional-level variance ratio of the basic model was 10.8%, confirming interregional differences. At the personal level, higher happiness indices were seen in groups consisting of males with high educational level, high income, high degree of physical activity, sufficient sleep, active social contact, and participation in social activities; whereas lower happiness indices were seen in people who frequently skipped breakfast, had unmet healthcare needs, and had accompanying diseases, as well as those with higher deprivation index. The study confirmed that the happiness index of community residents was influenced by not only personal aspects but also various regional characteristics. To increase the happiness index, interests at both personal and regional levels, as well as community emphasis on creating social rapport and engaging in selective efforts, are needed in vulnerable regions with relatively high deprivation index.

  5. HFIP Extraction Followed by 2D CTAB/SDS-PAGE Separation: A New Methodology for Protein Identification from Tissue Sections after MALDI Mass Spectrometry Profiling for Personalized Medicine Research

    PubMed Central

    Longuespée, Rémi; Tastet, Christophe; Desmons, Annie; Kerdraon, Olivier; Day, Robert

    2014-01-01

    Abstract Matrix-assisted laser desorption ionization mass spectrometry imaging (MALDI-MSI) and profiling technology have become the easiest methods for quickly accessing the protein composition of a tissue area. Unfortunately, the demand for the identification of these proteins remains unmet. To overcome this bottleneck, we combined several strategies to identify the proteins detected via MALDI profiling including on-tissue protein extraction using hexafluoroIsopropanol (1,1,1,3,3,3-hexafluoro-2-propanol, HFIP) coupled with two-dimensional cetyl trimethylammonium bromide/sodium dodecyl sulfate–polyacrylamide gel electrophoresis (2D CTAB/SDS-PAGE) for separation followed by trypsin digestion and MALDI-MS analyses for identification. This strategy was compared with an on-tissue bottom-up strategy that we previously developed. The data reflect the complementarity of the approaches. An increase in the number of specific proteins identified has been established. This approach demonstrates the potential of adapted extraction procedures and the combination of parallel identification approaches for personalized medicine applications. The anatomical context provides important insight into identifying biomarkers and may be considered a first step for tissue-based biomarker research, as well as the extemporaneous examination of biopsies during surgery. PMID:24841221

  6. 42 CFR 3.212 - Nonidentification of patient safety work product.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., characteristic, or code except as permitted for re-identification; and (ii) The provider, PSO or responsible... identify the particular provider or reporter. (3) Re-identification. A provider, PSO, or responsible person... under this section to be re-identified by such provider, PSO, or responsible person, provided that: (i...

  7. Who is who: Italian norms for visual recognition and identification of celebrities.

    PubMed

    Bizzozero, I; Ferrari, F; Pozzoli, S; Saetti, M C; Spinnler, H

    2005-06-01

    Age-, education- and sex-adjusted norms are provided for two new neuropsychological tests, namely (i) Face Recognition (guess of familiarity) and (ii) Person Identification (biographical contextualisation). Sixty-three pictures of celebrities and 63 of unknown people were selected following two interwoven criteria(1): the realm of their celebrity (i.e., entertainment, culture and politics) and the period of celebrity acquisition (i.e., pre-war, post-war and contemporary). Both media- and education-dependent knowledge of celebrity were considered. Ninety-eight unpaid healthy participants aged between 50 and 93 years and with at least 8 years of formal education took part in this study. Reference is made to serial models of familiar face/persons processing. Recognition is held to tackle the activity of Personal Identity Nodes (PINs) and identification of the Exemplar Semantics Archives. Given the seriality of the reference model, the Identification Test is embedded in the Recognition test. This entailed that only previously recognised faces were employed to achieve norms for identification.

  8. What is it like to be a person with Schizophrenia in the social world? A first-person perspective study on Schizophrenic Dissociality--part 2: methodological issues and empirical findings.

    PubMed

    Stanghellini, Giovanni; Ballerini, Massimo

    2011-01-01

    This is an empirical study exploring the personal level of experience of social dysfunction in persons with schizophrenia. We adopted a qualitative method of inquiry based on a review of transcripts of individual therapy sessions conducted for 52 persons with chart diagnoses of schizophrenia or schizotypal disorder. In our interviews, the experience of the social world in persons with schizophrenia emerged as an overall crisis of immediate, prepredicative, prereflexive attunement, typically accompanied by feelings of invasiveness and abnormalities in bodily and emotional sensations; a hyperreflexive mode for understanding the intentions of other persons, and a sceptical, aversive and sometimes utopian attitude towards sociality. Social dysfunction in persons with schizophrenia may reflect a disorder of the process of corporeal identification/differentiation that allows both for the intersubjective understanding through body-to-body attunement and for the demarcation between self and other. Copyright © 2011 S. Karger AG, Basel.

  9. Feeling global, acting ethically: global identification and fairtrade consumption.

    PubMed

    Reese, Gerhard; Kohlmann, Fabienne

    2015-01-01

    Global identification has become a popular construct in recent psychological debate as it relates to harmonious intergroup relations and a caring for all humanity. Based on social identity theorizing, the current research tests whether global identification can also predict consumer choices, at the expense of lower personal benefit. Importantly, we assumed that concerns about global injustice represent a crucial component of that relation. We predicted that participants who identified strongly with all humanity would rather choose a Fairtrade product alternative over a conventional one, compared with low identifiers. In addition, we assumed that this effect be mediated by perceived global injustice. Both predictions were confirmed in a consumer choice study (N = 68). Overall, global identification and globally relevant consumer behavior seem meaningfully interconnected, and we discuss these findings with regard to recent theoretical developments in Fairtrade consumption research.

  10. The Trade-Off Between Privacy and Geographic Data Resolution. a Case of GPS Trajectories Combined with the Social Survey Results

    NASA Astrophysics Data System (ADS)

    Sila-Nowicka, K.; Thakuriah, P.

    2016-06-01

    Trajectory datasets are being generated in great volumes due to high levels of Global Positioning System (GPS) and Location-Based Services (LBS) use. Such data are increasingly being collected for a variety of academic, industrial and recreational reasons, sometimes together with other strands of personal data such as socio-demographic, social survey and other sensor data carried/worn by the person. In such cases, not only are movement data of a person available but also data on potentially a wide variety of other personal and household attributes. Making such person-level data available for analytics opens up the possibility of new directions in analysing, studying and understanding human behaviour, which is typically not possible with GPS trajectory datasets alone. At the same time, the GPS data should be released in a privacy-preserving way that takes into account the possibility of re-identification of individuals from quasi-identifiers available from other data strands. De-identification in these strands may be risked due to uniquely identifiable information on significant locations and other spatial behaviours and choices detected from GPS trajectories. Using a multimodal dataset that includes a GPS archive from 358 individuals, and by considering a number of alternative privacy-enhancing approaches, we look at the potential for privacy preservation when personally-identifiable data are available from multiple data strands, for the specific purpose of data to be released for transport research.

  11. Analysis of cosmetic residues on a single human hair by ATR FT-IR microspectroscopy

    NASA Astrophysics Data System (ADS)

    Pienpinijtham, Prompong; Thammacharoen, Chuchaat; Naranitad, Suwimol; Ekgasit, Sanong

    2018-05-01

    In this work, ATR FT-IR spectra of single human hair and cosmetic residues on hair surface are successfully collected using a homemade dome-shaped Ge μIRE accessary installed on an infrared microscope. By collecting ATR spectra of hairs from the same person, the spectral patterns are identical and superimposed while different spectral features are observed from ATR spectra of hairs collected from different persons. The spectral differences depend on individual hair characteristics, chemical treatments, and cosmetics on hair surface. The "Contact-and-Collect" technique that transfers remarkable materials on the hair surface to the tip of the Ge μIRE enables an identification of cosmetics on a single hair. Moreover, the differences between un-split and split hairs are also studied in this report. These highly specific spectral features can be employed for unique identification or for differentiation of hairs based on the molecular structures of hairs and cosmetics on hairs.

  12. Friendship group identification, multidimensional self-concept, and experience of developmental tasks in adolescence.

    PubMed

    Tarrant, Mark; MacKenzie, Liam; Hewitt, Lisa A

    2006-08-01

    This study applied a social identity perspective to the study of adolescent self-concept and social development. British adolescents aged 14-15 years (N=114) completed a questionnaire which asked them to: (i) rate their degree of identification with a school-based friendship group; (ii) complete a measure of multi-dimensional self-concept; and (iii) report their experiences of a variety of personal, relational and socio-institutional (e.g., achieving economic independence) developmental tasks. Compared to low identifiers, participants who were highly identified with a friendship group reported highest levels of self-esteem; and these differences were most marked in non-academic domains of self. High identifiers also displayed higher levels of general self-esteem and reported more positive experiences of personal and relational developmental tasks. The discussion focuses on the potential benefits to understanding of social developmental processes that can be derived from a consideration of adolescents' subjective appraisals of their peer relations.

  13. Proposal for internet-based Digital Dental Chart for personal dental identification in forensics.

    PubMed

    Hanaoka, Yoichi; Ueno, Asao; Tsuzuki, Tamiyuki; Kajiwara, Masahiro; Minaguchi, Kiyoshi; Sato, Yoshinobu

    2007-05-03

    A dental chart is very useful as a standard source of evidence in the personal identification of bodies. However, the kind of dental chart available will often vary as a number of types of odontogram have been developed where the visual representation of dental conditions has relied on hand-drawn representation. We propose the Digital Dental Chart (DDC) as a new style of dental chart, especially for open investigations aimed at establishing the identity of unknown bodies. Each DDC is constructed using actual oral digital images and dental data, and is easy to upload onto an Internet website. The DDC is a more useful forensic resource than the standard types of dental chart in current use as it has several advantages, among which are its ability to carry a large volume of information and reproduce dental conditions clearly and in detail on a cost-effective basis.

  14. The Use of Humor in a CBI Science Lesson To Enhance Retention.

    ERIC Educational Resources Information Center

    Snetsinger, Wendy; Grabowski, Barbara

    This research experiment studied the effect of humor versus non-humor on learning and retention of a computer-based instructional (CBI) lesson on tick identification. The experiment also surveyed the subjects' enjoyment of the lesson material, their personal experiences with ticks, and their concerns about ticks and tick-borne diseases.…

  15. Outcome-Based School-to-Work Transition Planning for Students with Severe Disabilities.

    ERIC Educational Resources Information Center

    Steere, Daniel E.; And Others

    1990-01-01

    A transition planning process that focuses on quality-of-life outcomes is presented. The process, which views employment not as an outcome but as a vehicle for the attainment of quality of life, involves six steps: orientation, personal profile development, identification of employment outcomes, measurement system, compatibility process, and…

  16. Teaching for Social Values in Social Studies.

    ERIC Educational Resources Information Center

    Dunfee, Maxine; Crump, Claudia

    A guide for teaching values in social studies takes a positive stand with regard to the importance of values education in the elementary school based on the belief that many personal and societal problems are the results of unresolved value conflicts. It is hypothesized that children who have continuing experiences in value identification,…

  17. Constrained dictionary learning and probabilistic hypergraph ranking for person re-identification

    NASA Astrophysics Data System (ADS)

    He, You; Wu, Song; Pu, Nan; Qian, Li; Xiao, Guoqiang

    2018-04-01

    Person re-identification is a fundamental and inevitable task in public security. In this paper, we propose a novel framework to improve the performance of this task. First, two different types of descriptors are extracted to represent a pedestrian: (1) appearance-based superpixel features, which are constituted mainly by conventional color features and extracted from the supepixel rather than a whole picture and (2) due to the limitation of discrimination of appearance features, the deep features extracted by feature fusion Network are also used. Second, a view invariant subspace is learned by dictionary learning constrained by the minimum negative sample (termed as DL-cMN) to reduce the noise in appearance-based superpixel feature domain. Then, we use deep features and sparse codes transformed by appearancebased features to establish the hyperedges respectively by k-nearest neighbor, rather than jointing different features simply. Finally, a final ranking is performed by probabilistic hypergraph ranking algorithm. Extensive experiments on three challenging datasets (VIPeR, PRID450S and CUHK01) demonstrate the advantages and effectiveness of our proposed algorithm.

  18. Online fingerprint verification.

    PubMed

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  19. Demographic management in a federated healthcare environment.

    PubMed

    Román, I; Roa, L M; Reina-Tosina, J; Madinabeitia, G

    2006-09-01

    The purpose of this paper is to provide a further step toward the decentralization of identification and demographic information about persons by solving issues related to the integration of demographic agents in a federated healthcare environment. The aim is to identify a particular person in every system of a federation and to obtain a unified view of his/her demographic information stored in different locations. This work is based on semantic models and techniques, and pursues the reconciliation of several current standardization works including ITU-T's Open Distributed Processing, CEN's prEN 12967, OpenEHR's dual and reference models, CEN's General Purpose Information Components and CORBAmed's PID service. We propose a new paradigm for the management of person identification and demographic data, based on the development of an open architecture of specialized distributed components together with the incorporation of techniques for the efficient management of domain ontologies, in order to have a federated demographic service. This new service enhances previous correlation solutions sharing ideas with different standards and domains like semantic techniques and database systems. The federation philosophy enforces us to devise solutions to the semantic, functional and instance incompatibilities in our approach. Although this work is based on several models and standards, we have improved them by combining their contributions and developing a federated architecture that does not require the centralization of demographic information. The solution is thus a good approach to face integration problems and the applied methodology can be easily extended to other tasks involved in the healthcare organization.

  20. Mathematical and information maintenance of biometric systems

    NASA Astrophysics Data System (ADS)

    Boriev, Z.; Sokolov, S.; Nyrkov, A.; Nekrasova, A.

    2016-04-01

    This article describes the different mathematical methods for processing biometric data. A brief overview of methods for personality recognition by means of a signature is conducted. Mathematical solutions of a dynamic authentication method are considered. Recommendations on use of certain mathematical methods, depending on specific tasks, are provided. Based on the conducted analysis of software and the choice made in favor of the wavelet analysis, a brief basis for its use in the course of software development for biometric personal identification is given for the purpose of its practical application.

  1. 29 CFR 1915.89 - Control of hazardous energy (lockout/tags-plus).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... employee: (A) Sign a group tag (or a group tag equivalent), attach a personal identification device to a... group tag (or the group tag equivalent), remove the personal identification device, or perform a... safe exposure status of each authorized employee, and (b) signs a group tag (or a group tag equivalent...

  2. 29 CFR 1915.89 - Control of hazardous energy (lockout/tags-plus).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... employee: (A) Sign a group tag (or a group tag equivalent), attach a personal identification device to a... group tag (or the group tag equivalent), remove the personal identification device, or perform a... safe exposure status of each authorized employee, and (b) signs a group tag (or a group tag equivalent...

  3. 29 CFR 1915.89 - Control of hazardous energy (lockout/tags-plus).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... employee: (A) Sign a group tag (or a group tag equivalent), attach a personal identification device to a... group tag (or the group tag equivalent), remove the personal identification device, or perform a... safe exposure status of each authorized employee, and (b) signs a group tag (or a group tag equivalent...

  4. 50 CFR 300.64 - Fishing by U.S. treaty Indian tribes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... under this section must have on his or her person a valid treaty Indian identification card issued... this section, treaty Indians may take and retain not more than two halibut per person per day. (g... identification requirements of Final Decision No. 1 and subsequent orders in United States v. Washington 384 F...

  5. Human identification based on cranial computed tomography scan — a case report

    PubMed Central

    Silva, RF; Botelho, TL; Prado, FB; Kawagushi, JT; Daruge Júnior, E; Bérzin, F

    2011-01-01

    Today, there is increasing use of CT scanning on a clinical basis, aiding in the diagnosis of diseases or injuries. This exam also provides important information that allows identification of individuals. This paper reports the use of a CT scan on the skull, taken when the victim was alive, for the positive identification of a victim of a traffic accident in which the fingerprint analysis was impossible. The authors emphasize that the CT scan is a tool primarily used in clinical diagnosis and may contribute significantly to forensic purpose, allowing the exploration of virtual corpses before the classic autopsy. The use of CT scans might increase the quantity and quality of information involved in the death of the person examined. PMID:21493883

  6. Candidate change agent identification among men at risk for HIV infection

    PubMed Central

    Schneider, John A.; McFadden, Rachel B.; Laumann, Edward O.; Kumar, SG Prem; Gandham, Sabitha R.; Oruganti, Ganesh

    2012-01-01

    Despite limited HIV prevention potency, peer-based programs have become one of the most often used HIV prevention approaches internationally. These programs demonstrate a need for greater specificity in peer change agent (PCA) recruitment and social network evaluation. In the present three-phase study based in India (2009–2010), we first explored the nature of friendship among truck-drivers, a group of men at high risk for HIV infection, in order to develop a thorough understanding of the social forces that contribute to and maintain their personal networks. This was accomplished in the first two study phases, through a combination of focus group discussions (n=5 groups), in-depth qualitative interviews (n=20), and personal network analyses (n=25) of truck-drivers to define friendship and deepen our understanding of friendship across geographic spaces. Measures collected in phases I and II included friend typologies, discussion topics, social network influences, advice-giving, and risk reduction. Outcomes were assessed through an iterative process of qualitative textual analysis and social network analysis. The networks of truck-drivers were found to comprise three typologies: close friends, parking lot friends, and other friends. From these data, we developed an algorithmic approach to the identification of a candidate PCA within a high-risk man’s personal network. In stage III we piloted field-use of this approach to identify and recruit PCAs, and further evaluated their potential for intervention through preliminary analysis of the PCA’s own personal networks. An instrument was developed to translate what social network theory and analysis has taught us about egocentric network dynamics into a real-world methodology for identifying intervention-appropriate peers within an individual’s personal network. Our approach can be tailored to the specifications of any high-risk population, and may serve to enhance current peer-based HIV interventions. PMID:22762951

  7. Cancer Transcriptome Dataset Analysis: Comparing Methods of Pathway and Gene Regulatory Network-Based Cluster Identification.

    PubMed

    Nam, Seungyoon

    2017-04-01

    Cancer transcriptome analysis is one of the leading areas of Big Data science, biomarker, and pharmaceutical discovery, not to forget personalized medicine. Yet, cancer transcriptomics and postgenomic medicine require innovation in bioinformatics as well as comparison of the performance of available algorithms. In this data analytics context, the value of network generation and algorithms has been widely underscored for addressing the salient questions in cancer pathogenesis. Analysis of cancer trancriptome often results in complicated networks where identification of network modularity remains critical, for example, in delineating the "druggable" molecular targets. Network clustering is useful, but depends on the network topology in and of itself. Notably, the performance of different network-generating tools for network cluster (NC) identification has been little investigated to date. Hence, using gastric cancer (GC) transcriptomic datasets, we compared two algorithms for generating pathway versus gene regulatory network-based NCs, showing that the pathway-based approach better agrees with a reference set of cancer-functional contexts. Finally, by applying pathway-based NC identification to GC transcriptome datasets, we describe cancer NCs that associate with candidate therapeutic targets and biomarkers in GC. These observations collectively inform future research on cancer transcriptomics, drug discovery, and rational development of new analysis tools for optimal harnessing of omics data.

  8. A visual surveillance system for person re-identification

    NASA Astrophysics Data System (ADS)

    El-Alfy, Hazem; Muramatsu, Daigo; Teranishi, Yuuichi; Nishinaga, Nozomu; Makihara, Yasushi; Yagi, Yasushi

    2017-03-01

    We attempt the problem of autonomous surveillance for person re-identification. This is an active research area, where most recent work focuses on the open challenges of re-identification, independently of prerequisites of detection and tracking. In this paper, we are interested in designing a complete surveillance system, joining all the pieces of the puzzle together. We start by collecting our own dataset from multiple cameras. Then, we automate the process of detection and tracking of human subjects in the scenes, followed by performing the re-identification task. We evaluate the recognition performance of our system, report its strengths, discuss open challenges and suggest ways to address them.

  9. Human Identification by Cross-Correlation and Pattern Matching of Personalized Heartbeat: Influence of ECG Leads and Reference Database Size.

    PubMed

    Jekova, Irena; Krasteva, Vessela; Schmid, Ramun

    2018-01-27

    Human identification (ID) is a biometric task, comparing single input sample to many stored templates to identify an individual in a reference database. This paper aims to present the perspectives of personalized heartbeat pattern for reliable ECG-based identification. The investigations are using a database with 460 pairs of 12-lead resting electrocardiograms (ECG) with 10-s durations recorded at time-instants T1 and T2 > T1 + 1 year. Intra-subject long-term ECG stability and inter-subject variability of personalized PQRST (500 ms) and QRS (100 ms) patterns is quantified via cross-correlation, amplitude ratio and pattern matching between T1 and T2 using 7 features × 12-leads. Single and multi-lead ID models are trained on the first 230 ECG pairs. Their validation on 10, 20, ... 230 reference subjects (RS) from the remaining 230 ECG pairs shows: (i) two best single-lead ID models using lead II for a small population RS = (10-140) with identification accuracy AccID = (89.4-67.2)% and aVF for a large population RS = (140-230) with AccID = (67.2-63.9)%; (ii) better performance of the 6-lead limb vs. the 6-lead chest ID model-(91.4-76.1)% vs. (90.9-70)% for RS = (10-230); (iii) best performance of the 12-lead ID model-(98.4-87.4)% for RS = (10-230). The tolerable reference database size, keeping AccID > 80%, is RS = 30 in the single-lead ID scenario (II); RS = 50 (6 chest leads); RS = 100 (6 limb leads), RS > 230-maximal population in this study (12-lead ECG).

  10. Designing for expansive science learning and identification across settings

    NASA Astrophysics Data System (ADS)

    Stromholt, Shelley; Bell, Philip

    2017-10-01

    In this study, we present a case for designing expansive science learning environments in relation to neoliberal instantiations of standards-based implementation projects in education. Using ethnographic and design-based research methods, we examine how the design of coordinated learning across settings can engage youth from non-dominant communities in scientific and engineering practices, resulting in learning experiences that are more relevant to youth and their communities. Analyses highlight: (a) transformative moments of identification for one fifth-grade student across school and non-school settings; (b) the disruption of societal, racial stereotypes on the capabilities of and expectations for marginalized youth; and (c) how youth recognized themselves as members of their community and agents of social change by engaging in personally consequential science investigations and learning.

  11. Preschoolers' Person Description and Identification Accuracy: A Comparison of the Simultaneous and Elimination Lineup Procedures

    ERIC Educational Resources Information Center

    Pozzulo, Joanna D.; Dempsey, Julie; Crescini, Charmagne

    2009-01-01

    Preschoolers' (3- to 6-year-olds) person description and identification abilities were examined using the simultaneous and elimination lineup procedures. Participants (N = 100) were exposed to a 20-minute mask-making session conducted by a female confederate who acted as the mask-making teacher. After a brief delay (20 min), participants were…

  12. 26 CFR 1.197-1T - Certain elections for intangible property (temporary).

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... retroactive election under paragraph (c)(6) of this section, identification of such persons and certification...) Identification of the property affected by the binding contract election, the name and TIN of the person from... purposes of re-applying the rule of this paragraph (c)(1)(ii) to any other taxpayer. (iii) On former...

  13. Death with a Story: How Story Impacts Emotional, Motivational, and Physiological Responses to First-Person Shooter Video Games

    ERIC Educational Resources Information Center

    Schneider, Edward F.; Lang, Annie; Shin, Mija; Bradley, Samuel D.

    2004-01-01

    This study investigates how game playing experience changes when a story is added to a first-person shooter game. Dependent variables include identification, presence, emotional experiences and motivations. When story was present, game players felt greater identification, sense of presence, and physiological arousal. The presence of story did not…

  14. Personality profiles of Australian anaesthetists.

    PubMed

    Kluger, M T; Laidlaw, T; Khursandi, D S

    1999-06-01

    Identification of personality traits in anaesthetists has potential implications for selection of trainees, assessment of coping strategies during times of stress and may have a role in the analysis of critical incidents. A 24 question postal questionnaire based on the Cattell 16PF inventory was sent to specialist anaesthetists in Australia. One hundred and sixty-seven replies were received (33% response rate). Personality traits did not differ when the anaesthetists were grouped for age, number of years qualified and country of qualification. City practitioners rated themselves more inquisitive than country practitioners did (P = 0.052). Female anaesthetists self-reported they were calm (P = 0.02), patient (P = 0.02) and tolerant (P = 0.02) more often than their male counterparts, whilst more males reported themselves as highly conscientious (P = 0.01). Although some traits were consistent, personality profiles showed significant heterogeneity. Further examination of how personality and coping mechanisms interact may be central to the management of stress and critical incident generation.

  15. Disability pride protects self-esteem through the rejection-identification model.

    PubMed

    Bogart, Kathleen R; Lund, Emily M; Rottenstein, Adena

    2018-02-01

    The rejection-identification model (RIM) argues that the negative impacts of stigma, such as decreased self-esteem, may be mitigated when members of the stigmatized group choose to identify with each other rather than with the majority culture. A previously unstudied potential RIM stigma-reduction mechanism is disability pride, which views disability as a source of valuable, enriching, and positive experience. Impairment, personal, and environmental factors based on the International Classification of Functioning, Disability and Health (ICF) predict whether people will categorize themselves as disabled, but predictors of pride have received little examination. The purpose of this study was to (a) explore whether ICF factors predict disability pride, and (b) assess whether disability pride mediates a relationship between stigma and self-esteem, supporting RIM. Research Method/Design: Participants completed an Internet-based survey assessing pride, self-esteem, and ICF factors. Disability was not mentioned in recruitment materials to prevent selection biases. People who reported at least 1 impairment (n = 710) were included in analyses. ICF personal and environmental factors (stigma, social support, and being a person of color), but not impairment factors, predicted disability pride. Supporting RIM, disability pride partially mediated the relationship between stigma and self-esteem. Disability pride is a promising way to protect self-esteem against stigma. Disability pride is still a rare phenomenon. Given that pride is associated with social support, stigma, and, to a lesser extent, ethnicity, but not impairment characteristics, interventions might focus on personal and environmental factors like these to promote pride. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  16. Conceptualizing the Dynamics between Bicultural Identification and Personal Social Networks

    PubMed Central

    Repke, Lydia; Benet-Martínez, Verónica

    2017-01-01

    An adequate understanding of the acculturation processes affecting immigrants and their descendants involves ascertaining the dynamic interplay between the way these individuals manage their multiple (and sometimes conflictual) cultural value systems and identifications and possible changes in their social networks. To fill this gap, the present research examines how key acculturation variables (e.g., strength of ethnic/host cultural identifications, bicultural identity integration or BII) relate to the composition and structure of bicultural individuals’ personal social networks. In Study 1, we relied on a generationally and culturally diverse community sample of 123 Latinos residing in the US. Participants nominated eight individuals (i.e., alters) from their habitual social networks and across two relational domains: friendships and colleagues. Results indicated that the interconnection of same ethnicity alters across different relationship domains is linked to cultural identifications, while the amount of coethnic and host individuals in the network is not. In particular, higher interconnection between Latino friends and colleagues was linked to lower levels of U.S. identification. Conversely, the interconnection of non-Latino friends and colleagues was associated with lower levels of Latino identification. This pattern of results suggests that the relational context for each type of cultural identification works in a subtractive and inverse manner. Further, time spent in the US was linked to both Latino and U.S. cultural identifications, but this relationship was moderated by the level of BII. Specifically, the association between time in the US and strength of both cultural identities was stronger for individuals reporting low levels of BII. Taking the findings from Study 1 as departure point, Study 2 used an agent-based model data simulation approach to explore the dynamic ways in which the content and the structure of an immigrant’s social network might matter over time in predicting three possible identity patterns: coexisting cultural identifications, conflicting cultural identifications, and a mixture of the two. These simulations allowed us to detect network constellations, which lead to identification or disidentification with both cultures. We showed that distinct patterns of social relations do not lead to identity outcomes in a deterministic fashion, but that often many different outcomes are probable. PMID:28408892

  17. Evaluating the statistical power of DNA-based identification, exemplified by 'The missing grandchildren of Argentina'.

    PubMed

    Kling, Daniel; Egeland, Thore; Piñero, Mariana Herrera; Vigeland, Magnus Dehli

    2017-11-01

    Methods and implementations of DNA-based identification are well established in several forensic contexts. However, assessing the statistical power of these methods has been largely overlooked, except in the simplest cases. In this paper we outline general methods for such power evaluation, and apply them to a large set of family reunification cases, where the objective is to decide whether a person of interest (POI) is identical to the missing person (MP) in a family, based on the DNA profile of the POI and available family members. As such, this application closely resembles database searching and disaster victim identification (DVI). If parents or children of the MP are available, they will typically provide sufficient statistical evidence to settle the case. However, if one must resort to more distant relatives, it is not a priori obvious that a reliable conclusion is likely to be reached. In these cases power evaluation can be highly valuable, for instance in the recruitment of additional family members. To assess the power in an identification case, we advocate the combined use of two statistics: the Probability of Exclusion, and the Probability of Exceedance. The former is the probability that the genotypes of a random, unrelated person are incompatible with the available family data. If this is close to 1, it is likely that a conclusion will be achieved regarding general relatedness, but not necessarily the specific relationship. To evaluate the ability to recognize a true match, we use simulations to estimate exceedance probabilities, i.e. the probability that the likelihood ratio will exceed a given threshold, assuming that the POI is indeed the MP. All simulations are done conditionally on available family data. Such conditional simulations have a long history in medical linkage analysis, but to our knowledge this is the first systematic forensic genetics application. Also, for forensic markers mutations cannot be ignored and therefore current models and implementations must be extended. All the tools are freely available in Familias (http://www.familias.no) empowered by the R library paramlink. The above approach is applied to a large and important data set: 'The missing grandchildren of Argentina'. We evaluate the power of 196 families from the DNA reference databank (Banco Nacional de Datos Genéticos, http://www.bndg.gob.ar. As a result we show that 58 of the families have poor statistical power and require additional genetic data to enable a positive identification. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Cloud Privacy Audit Framework: A Value-Based Design

    ERIC Educational Resources Information Center

    Coss, David Lewis

    2013-01-01

    The rapid expansion of cloud technology provides enormous capacity, which allows for the collection, dissemination and re-identification of personal information. It is the cloud's resource capabilities such as these that fuel the concern for privacy. The impetus of these concerns are not to far removed from those expressed by Mason in 1986…

  19. 78 FR 41428 - In the Matter of Licensee Identified in Attachment 1 and All Other Persons Who Obtain Safeguards...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-10

    ... mail copies on electronic storage media. Participants may not submit paper copies of their filings...-415-1677, to request (1) a digital identification (ID) certificate, which allows the participant (or... representative, already holds an NRC- issued digital ID certificate). Based upon this information, the Secretary...

  20. Identification of Streptococcus suis Meningitis through Population-Based Surveillance, Togo, 2010-2014.

    PubMed

    Tall, Haoua; Njanpop-Lafourcade, Berthe-Marie; Mounkoro, Didier; Tidjani, Loukoumane; Agbenoko, Kodjo; Alassani, Issifou; Amidou, Moussa; Tamekloe, Stanislas; Laing, Kenneth G; Witney, Adam A; Hinds, Jason; van der Linden, Mark P G; Gessner, Bradford D; Moïsi, Jennifer C

    2016-07-01

    During 2010-2014, we enrolled 511 patients with suspected bacterial meningitis into surveillance in 2 districts of northern Togo. We identified 15 persons with Streptococcus suis infection; 10 had occupational contact with pigs, and 12 suffered neurologic sequelae. S. suis testing should be considered in rural areas of the African meningitis belt.

  1. An Examination of State and Trait Anxiety Levels among College Students Based on the Students' Alcohol Usage

    ERIC Educational Resources Information Center

    Kovalesky, Richard

    2010-01-01

    This study examines anxiety and level of alcohol consumption among college freshman and sophomore student's to determine if state and trait anxiety are significant factors in high risk alcohol consumption or binge drinking. The State Trait Personality Inventory (STPI) and the Alcohol Use Disorders Identification Test (AUDIT) were administered to…

  2. Performance evaluation of wavelet-based face verification on a PDA recorded database

    NASA Astrophysics Data System (ADS)

    Sellahewa, Harin; Jassim, Sabah A.

    2006-05-01

    The rise of international terrorism and the rapid increase in fraud and identity theft has added urgency to the task of developing biometric-based person identification as a reliable alternative to conventional authentication methods. Human Identification based on face images is a tough challenge in comparison to identification based on fingerprints or Iris recognition. Yet, due to its unobtrusive nature, face recognition is the preferred method of identification for security related applications. The success of such systems will depend on the support of massive infrastructures. Current mobile communication devices (3G smart phones) and PDA's are equipped with a camera which can capture both still and streaming video clips and a touch sensitive display panel. Beside convenience, such devices provide an adequate secure infrastructure for sensitive & financial transactions, by protecting against fraud and repudiation while ensuring accountability. Biometric authentication systems for mobile devices would have obvious advantages in conflict scenarios when communication from beyond enemy lines is essential to save soldier and civilian life. In areas of conflict or disaster the luxury of fixed infrastructure is not available or destroyed. In this paper, we present a wavelet-based face verification scheme that have been specifically designed and implemented on a currently available PDA. We shall report on its performance on the benchmark audio-visual BANCA database and on a newly developed PDA recorded audio-visual database that take include indoor and outdoor recordings.

  3. [QR-Code based patient tracking: a cost-effective option to improve patient safety].

    PubMed

    Fischer, M; Rybitskiy, D; Strauß, G; Dietz, A; Dressler, C R

    2013-03-01

    Hospitals are implementing a risk management system to avoid patient or surgery mix-ups. The trend is to use preoperative checklists. This work deals specifically with a type of patient identification, which is realized by storing patient data on a patient-fixed medium. In 127 ENT surgeries data relevant for patient identification were encrypted in a 2D-QR-Code. The code, as a separate document coming with the patient chart or as a patient wristband, has been decrypted in the OR and the patient data were presented visible for all persons. The decoding time, the compliance of the patient data, as well as the duration of the patient identification was compared with the traditional patient identification by inspection of the patient chart. A total of 125 QR codes were read. The time for the decrypting of QR-Code was 5.6 s, the time for the screen view for patient identification was 7.9 s, and for a comparison group of 75 operations traditional patient identification was 27.3 s. Overall, there were 6 relevant information errors in the two parts of the experiment. This represents a ratio of 0.6% for 8 relevant classes per each encrypted QR code. This work allows a cost effective way to technically support patient identification based on electronic patient data. It was shown that the use in the clinical routine is possible. The disadvantage is a potential misinformation from incorrect or missing information in the HIS, or due to changes of the data after the code was created. The QR-code-based patient tracking is seen as a useful complement to the already widely used identification wristband. © Georg Thieme Verlag KG Stuttgart · New York.

  4. A new mathematical modelling based shape extraction technique for Forensic Odontology.

    PubMed

    G, Jaffino; A, Banumathi; Gurunathan, Ulaganathan; B, Vijayakumari; J, Prabin Jose

    2017-04-01

    Forensic Odontology is a specific means for identifying a person in which deceased, and particularly in fatality incidents. The algorithm can be proposed to identify a person by comparing both postmortem (PM) and antemortem (AM) dental radiographs and photographs. This work aims to introduce a new mathematical algorithm for photographs in addition with radiographs. Isoperimetric graph partitioning method is used to extract the shape of dental images in forensic identification. Shape matching is done by comparing AM and PM dental images using both similarity and distance measures. Experimental results prove that the higher matching distance is observed by distance metric rather than similarity measures. The results of this algorithm show that a high hit rate is observed for distance based performance measures and it is well suited for forensic odontologist to identify a person. Copyright © 2017 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  5. Tracking by Identification Using Computer Vision and Radio

    PubMed Central

    Mandeljc, Rok; Kovačič, Stanislav; Kristan, Matej; Perš, Janez

    2013-01-01

    We present a novel system for detection, localization and tracking of multiple people, which fuses a multi-view computer vision approach with a radio-based localization system. The proposed fusion combines the best of both worlds, excellent computer-vision-based localization, and strong identity information provided by the radio system, and is therefore able to perform tracking by identification, which makes it impervious to propagated identity switches. We present comprehensive methodology for evaluation of systems that perform person localization in world coordinate system and use it to evaluate the proposed system as well as its components. Experimental results on a challenging indoor dataset, which involves multiple people walking around a realistically cluttered room, confirm that proposed fusion of both systems significantly outperforms its individual components. Compared to the radio-based system, it achieves better localization results, while at the same time it successfully prevents propagation of identity switches that occur in pure computer-vision-based tracking. PMID:23262485

  6. Compressed ECG biometric: a fast, secured and efficient method for identification of CVD patient.

    PubMed

    Sufi, Fahim; Khalil, Ibrahim; Mahmood, Abdun

    2011-12-01

    Adoption of compression technology is often required for wireless cardiovascular monitoring, due to the enormous size of Electrocardiography (ECG) signal and limited bandwidth of Internet. However, compressed ECG must be decompressed before performing human identification using present research on ECG based biometric techniques. This additional step of decompression creates a significant processing delay for identification task. This becomes an obvious burden on a system, if this needs to be done for a trillion of compressed ECG per hour by the hospital. Even though the hospital might be able to come up with an expensive infrastructure to tame the exuberant processing, for small intermediate nodes in a multihop network identification preceded by decompression is confronting. In this paper, we report a technique by which a person can be identified directly from his / her compressed ECG. This technique completely obviates the step of decompression and therefore upholds biometric identification less intimidating for the smaller nodes in a multihop network. The biometric template created by this new technique is lower in size compared to the existing ECG based biometrics as well as other forms of biometrics like face, finger, retina etc. (up to 8302 times lower than face template and 9 times lower than existing ECG based biometric template). Lower size of the template substantially reduces the one-to-many matching time for biometric recognition, resulting in a faster biometric authentication mechanism.

  7. Different groups, different motives: identity motives underlying changes in identification with novel groups.

    PubMed

    Easterbrook, Matt; Vignoles, Vivian L

    2012-08-01

    Social identification is known to have wide-reaching implications, but theorists disagree about the underlying motives. Integrating motivated identity construction theory with recent social identity research, the authors predicted which motives underlie identification with two types of groups: interpersonal networks and social categories. In a five-wave longitudinal study of social identity processes among 268 new university residents, multilevel analyses showed that motives involved in identity enactment processes--self-esteem, belonging, and efficacy--significantly predicted within-person changes in identification with flatmates (an interpersonal network group), whereas motives involved in identity definition processes--meaning, self-esteem, and distinctiveness--significantly predicted within-person changes in identification with halls of residence (an abstract social category). This article discusses implications for research into identity motives and social identity.

  8. A facial reconstruction and identification technique for seriously devastating head wounds.

    PubMed

    Joukal, Marek; Frišhons, Jan

    2015-07-01

    Many authors have focused on facial identification techniques, and facial reconstructions for cases when skulls have been found are especially well known. However, a standardized facial identification technique for an unknown body with seriously devastating head injuries has not yet been developed. A reconstruction and identification technique was used in 7 cases of accidents involving trains striking pedestrians. This identification technique is based on the removal of skull bone fragments, subsequent fixation of soft tissue onto a universal commercial polystyrene head model, precise suture of dermatomuscular flaps, and definitive adjustment using cosmetic treatments. After reconstruction, identifying marks such as scars, eyebrows, facial lines, facial hair and partly hairstyle become evident. It is then possible to present a modified picture of the reconstructed face to relatives. After comparing the results with photos of the person before death, this technique has proven to be very useful for identifying unknown bodies when other identification techniques are not available. This technique is useful for its being rather quick and especially for its results. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  9. Incorporation of Radio Frequency Identification Tag in Dentures to Facilitate Recognition and Forensic Human Identification

    PubMed Central

    Nuzzolese, E; Marcario, V; Di Vella, G

    2010-01-01

    Forensic identification using odontology is based on the comparison of ante-mortem and post mortem dental records. The insertion of a radio frequency identification (RFId) tag into dentures could be used as an aid to identify decomposed bodies, by storing personal identification data in a small transponder that can be radio-transmitted to a reader connected to a computer. A small passive, 12 x 2,1 mm, read-only RFId-tag was incorporated into the manufacture of three trial complete upper dentures and tested for a signal. The aim of this article is to demonstrate the feasibility of manufacturing such a dental prosthesis, the technical protocols for its implantation in the denture resin and its working principles. Future research and tests are required in order to verify human compatibility of the tagged denture and also to evaluate any potential deterioration in strength when subjected to high temperatures, or for damage resulting from everyday wear and tear. It should also be able to withstand the extreme conditions resulting from major accidents or mass disasters and procedures used to perform a forensic identification. PMID:20657641

  10. TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones

    NASA Astrophysics Data System (ADS)

    Nauman, Mohammad; Ali, Tamleek

    Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device - such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services.

  11. Experimental studies of forensic odontology to aid in the identification process

    PubMed Central

    Saxena, Susmita; Sharma, Preeti; Gupta, Nitin

    2010-01-01

    The importance of dental identification is on the increase year after year. With the passage of time, the role of forensic odontology has increased as very often teeth and dental restorations are the only means of identification. Forensic odontology has played a key role in identification of persons in mass disasters (aviation, earthquakes, Tsunamis), in crime investigations, in ethnic studies, and in identification of decomposed and disfigured bodies like that of drowned persons, fire victims, and victims of motor vehicle accidents. The various methods employed in forensic odontology include tooth prints, radiographs, photographic study, rugoscopy, cheiloscopy and molecular methods. Investigative methods applied in forensic odontology are reasonably reliable, yet the shortcomings must be accounted for to make it a more meaningful and relevant procedure. This paper gives an overview of the various experimental studies to aid in the identification processes, discussing their feasibilities and limitations in day-to-day practice. PMID:21731343

  12. 16 CFR 301.26 - Registered identification numbers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Registered identification numbers. 301.26... numbers. (a) Registered numbers for use as the required identification in lieu of the name on fur product... (d) of this section. (b)(1) Registered identification numbers shall be used only by the person or...

  13. Person-Centered Transition Planning.

    ERIC Educational Resources Information Center

    Miner, Craig A.; Bates, Paul E.

    1997-01-01

    Describes a person-centered planning approach for involving students with disabilities and their families in the transition planning process. Components of person-centered planning are discussed, including development of a personal profile, identification of future lifestyle preferences, action steps and responsible parties, and necessary changes…

  14. Finding Needles in Haystacks: Identity Mismatch Frequency and Facial Identity Verification

    ERIC Educational Resources Information Center

    Bindemann, Markus; Avetisyan, Meri; Blackwell, Kristy-Ann

    2010-01-01

    Accurate person identification is central to all security, police, and judicial systems. A commonplace method to achieve this is to compare a photo-ID and the face of its purported owner. The critical aspect of this task is to spot cases in which these two instances of a face do not match. Studies of person identification show that these instances…

  15. Voice Identification: Levels-of-Processing and the Relationship between Prior Description Accuracy and Recognition Accuracy.

    ERIC Educational Resources Information Center

    Walter, Todd J.

    A study examined whether a person's ability to accurately identify a voice is influenced by factors similar to those proposed by the Supreme Court for eyewitness identification accuracy. In particular, the Supreme Court has suggested that a person's prior description accuracy of a suspect, degree of attention to a suspect, and confidence in…

  16. The role of serotonin in personality inference: tryptophan depletion impairs the identification of neuroticism in the face.

    PubMed

    Ward, Robert; Sreenivas, Shubha; Read, Judi; Saunders, Kate E A; Rogers, Robert D

    2017-07-01

    Serotonergic mechanisms mediate the expression of personality traits (such as impulsivity, aggression and anxiety) that are linked to vulnerability to psychological illnesses, and modulate the identification of emotional expressions in the face as well as learning about broader classes of appetitive and aversive signals. Faces with neutral expressions signal a variety of socially relevant information, such that inferences about the big five personality traits, including Neuroticism, Extraversion and Agreeableness, can be accurately made on the basis of emotionally neutral facial photographs. Given the close link between Neuroticism and psychological distress, we investigated the effects of diminished central serotonin activity (achieved by tryptophan depletion) upon the accuracy of 52 healthy (non-clinical) adults' discriminations of personality from facial characteristics. All participants were able to discriminate reliably four of the big five traits. However, the tryptophan-depleted participants were specifically less accurate in discriminating Neuroticism than the matched non-depleted participants. These data suggest that central serotonin activity modulates the identification of not only negative facial emotional expression but also a broader class of signals about personality characteristics linked to psychological distress.

  17. Perceived Personality Traits of Individuals with Anorexia Nervosa

    ERIC Educational Resources Information Center

    Watters, Jessica E.; Malouff, John M.

    2012-01-01

    Background: Prior research has found evidence of a general negative personality stereotype for individuals who have anorexia nervosa (AN). Methods: This study examined the expected personality characteristics of individuals with AN using the Five-Factor Model of personality to allow identification of specific personality traits that are part of…

  18. The role of identification in dynamic psychiatry and psychotherapy.

    PubMed

    Corradi, Richard B

    2011-01-01

    Identification-a psychic process in which a person takes on characteristics of another-is a concept important to the understanding of human nature. It plays an important role in how our personalities develop, in our ability to deal with life's stresses, and in how we interact with other people. Knowledge of its manifestations is essential to dynamic psychiatry and to its applications in psychotherapy. This article defines identification and reviews its role in development and as a defense. It discusses its role in the psychopathology of disorders commonly encountered in psychotherapy practice-depression and anxiety states reactive to losses in life, and borderline states. Clinical vignettes illustrate how identification functions in these conditions, and also how identifications reveal themselves in the transference and are utilized in psychotherapy. A teaching vignette illustrates how important it is that residents learning the art of psychotherapy appreciate the therapeutic potential of identification. The article maintains that, although it often goes unrecognized, identification with the therapist is one of the most effective therapeutic devices in the transference.

  19. Laser identification system based on acousto-optical barcode scanner principles

    NASA Astrophysics Data System (ADS)

    Khansuvarov, Ruslan A.; Korol, Georgy I.; Preslenev, Leonid N.; Bestugin, Aleksandr R.; Paraskun, Arthur S.

    2016-09-01

    The main purpose of the bar code in the modern world is the unique identification of the product, service, or any of their features, so personal and stationary barcode scanners so widely used. One of the important parameters of bar code scanners is their reliability, accuracy of the barcode recognition, response time and performance. Nowadays, the most popular personal barcode scanners contain a mechanical part, which extremely impairs the reliability indices. Group of SUAI engineers has proposed bar code scanner based on laser beam acoustic deflection effect in crystals [RU patent No 156009 issued 4/16/2015] Through the use of an acousto-optic deflector element in barcode scanner described by a group of engineers SUAI, it can be implemented in the manual form factor, and the stationary form factor of a barcode scanner. Being a wave electronic device, an acousto-optic element in the composition of the acousto-optic barcode scanner allows you to clearly establish a mathematical link between the encoded function of the bar code with the accepted input photodetector intensities function that allows you to speak about the great probability of a bar code clear definition. This paper provides a description of the issued patent, the description of the principles of operation based on the mathematical analysis, a description of the layout of the implemented scanner.

  20. Cross-domain latent space projection for person re-identification

    NASA Astrophysics Data System (ADS)

    Pu, Nan; Wu, Song; Qian, Li; Xiao, Guoqiang

    2018-04-01

    In this paper, we research the problem of person re-identification and propose a cross-domain latent space projection (CDLSP) method to address the problems of the absence or insufficient labeled data in the target domain. Under the assumption that the visual features in the source domain and target domain share the similar geometric structure, we transform the visual features from source domain and target domain to a common latent space by optimizing the object function defined in the manifold alignment method. Moreover, the proposed object function takes into account the specific knowledge in the re-id with the aim to improve the performance of re-id under complex situations. Extensive experiments conducted on four benchmark datasets show the proposed CDLSP outperforms or is competitive with stateof- the-art methods for person re-identification.

  1. Content-based video indexing and searching with wavelet transformation

    NASA Astrophysics Data System (ADS)

    Stumpf, Florian; Al-Jawad, Naseer; Du, Hongbo; Jassim, Sabah

    2006-05-01

    Biometric databases form an essential tool in the fight against international terrorism, organised crime and fraud. Various government and law enforcement agencies have their own biometric databases consisting of combination of fingerprints, Iris codes, face images/videos and speech records for an increasing number of persons. In many cases personal data linked to biometric records are incomplete and/or inaccurate. Besides, biometric data in different databases for the same individual may be recorded with different personal details. Following the recent terrorist atrocities, law enforcing agencies collaborate more than before and have greater reliance on database sharing. In such an environment, reliable biometric-based identification must not only determine who you are but also who else you are. In this paper we propose a compact content-based video signature and indexing scheme that can facilitate retrieval of multiple records in face biometric databases that belong to the same person even if their associated personal data are inconsistent. We shall assess the performance of our system using a benchmark audio visual face biometric database that has multiple videos for each subject but with different identity claims. We shall demonstrate that retrieval of relatively small number of videos that are nearest, in terms of the proposed index, to any video in the database results in significant proportion of that individual biometric data.

  2. Multi-Task Learning with Low Rank Attribute Embedding for Multi-Camera Person Re-Identification.

    PubMed

    Su, Chi; Yang, Fan; Zhang, Shiliang; Tian, Qi; Davis, Larry Steven; Gao, Wen

    2018-05-01

    We propose Multi-Task Learning with Low Rank Attribute Embedding (MTL-LORAE) to address the problem of person re-identification on multi-cameras. Re-identifications on different cameras are considered as related tasks, which allows the shared information among different tasks to be explored to improve the re-identification accuracy. The MTL-LORAE framework integrates low-level features with mid-level attributes as the descriptions for persons. To improve the accuracy of such description, we introduce the low-rank attribute embedding, which maps original binary attributes into a continuous space utilizing the correlative relationship between each pair of attributes. In this way, inaccurate attributes are rectified and missing attributes are recovered. The resulting objective function is constructed with an attribute embedding error and a quadratic loss concerning class labels. It is solved by an alternating optimization strategy. The proposed MTL-LORAE is tested on four datasets and is validated to outperform the existing methods with significant margins.

  3. Character Recognition Method by Time-Frequency Analyses Using Writing Pressure

    NASA Astrophysics Data System (ADS)

    Watanabe, Tatsuhito; Katsura, Seiichiro

    With the development of information and communication technology, personal verification becomes more and more important. In the future ubiquitous society, the development of terminals handling personal information requires the personal verification technology. The signature is one of the personal verification methods; however, the number of characters is limited in the case of the signature and therefore false signature is used easily. Thus, personal identification is difficult from handwriting. This paper proposes a “haptic pen” that extracts the writing pressure, and shows a character recognition method by time-frequency analyses. Although the figures of characters written by different amanuenses are similar, the differences appear in the time-frequency domain. As a result, it is possible to use the proposed character recognition for personal identification more exactly. The experimental results showed the viability of the proposed method.

  4. Efficient Fingercode Classification

    NASA Astrophysics Data System (ADS)

    Sun, Hong-Wei; Law, Kwok-Yan; Gollmann, Dieter; Chung, Siu-Leung; Li, Jian-Bin; Sun, Jia-Guang

    In this paper, we present an efficient fingerprint classification algorithm which is an essential component in many critical security application systems e. g. systems in the e-government and e-finance domains. Fingerprint identification is one of the most important security requirements in homeland security systems such as personnel screening and anti-money laundering. The problem of fingerprint identification involves searching (matching) the fingerprint of a person against each of the fingerprints of all registered persons. To enhance performance and reliability, a common approach is to reduce the search space by firstly classifying the fingerprints and then performing the search in the respective class. Jain et al. proposed a fingerprint classification algorithm based on a two-stage classifier, which uses a K-nearest neighbor classifier in its first stage. The fingerprint classification algorithm is based on the fingercode representation which is an encoding of fingerprints that has been demonstrated to be an effective fingerprint biometric scheme because of its ability to capture both local and global details in a fingerprint image. We enhance this approach by improving the efficiency of the K-nearest neighbor classifier for fingercode-based fingerprint classification. Our research firstly investigates the various fast search algorithms in vector quantization (VQ) and the potential application in fingerprint classification, and then proposes two efficient algorithms based on the pyramid-based search algorithms in VQ. Experimental results on DB1 of FVC 2004 demonstrate that our algorithms can outperform the full search algorithm and the original pyramid-based search algorithms in terms of computational efficiency without sacrificing accuracy.

  5. Identification of Streptococcus suis Meningitis through Population-Based Surveillance, Togo, 2010–2014

    PubMed Central

    Tall, Haoua; Njanpop-Lafourcade, Berthe-Marie; Mounkoro, Didier; Tidjani, Loukoumane; Agbenoko, Kodjo; Alassani, Issifou; Amidou, Moussa; Tamekloe, Stanislas; Laing, Kenneth G.; Witney, Adam A.; Hinds, Jason; van der Linden, Mark P.G.; Gessner, Bradford D.

    2016-01-01

    During 2010–2014, we enrolled 511 patients with suspected bacterial meningitis into surveillance in 2 districts of northern Togo. We identified 15 persons with Streptococcus suis infection; 10 had occupational contact with pigs, and 12 suffered neurologic sequelae. S. suis testing should be considered in rural areas of the African meningitis belt. PMID:27314251

  6. Disability in U. S. Medical Education: Disparities, Programmes and Future Directions

    ERIC Educational Resources Information Center

    Santoro, Jonathan D.; Yedla, Manisha; Lazzareschi, Daniel V.; Whitgob, Emily E.

    2017-01-01

    As of 2010, 19% of the US population lives with a disability, and with the average lifespan of persons with disability increasing, this number is expected to rise. This has prompted the identification of a need for disability-based education by the US Institute of Medicine, the Surgeon General of the United States, the Association of American…

  7. 47 CFR 95.1127 - Station identification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Station identification. 95.1127 Section 95.1127 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Wireless Medical Telemetry Service (WMTS) General Provisions § 95.1127 Station identification. A...

  8. Fission gas bubble identification using MATLAB's image processing toolbox

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Collette, R.; King, J.; Keiser, Jr., D.

    Automated image processing routines have the potential to aid in the fuel performance evaluation process by eliminating bias in human judgment that may vary from person-to-person or sample-to-sample. In addition, this study presents several MATLAB based image analysis routines designed for fission gas void identification in post-irradiation examination of uranium molybdenum (U–Mo) monolithic-type plate fuels. Frequency domain filtration, enlisted as a pre-processing technique, can eliminate artifacts from the image without compromising the critical features of interest. This process is coupled with a bilateral filter, an edge-preserving noise removal technique aimed at preparing the image for optimal segmentation. Adaptive thresholding provedmore » to be the most consistent gray-level feature segmentation technique for U–Mo fuel microstructures. The Sauvola adaptive threshold technique segments the image based on histogram weighting factors in stable contrast regions and local statistics in variable contrast regions. Once all processing is complete, the algorithm outputs the total fission gas void count, the mean void size, and the average porosity. The final results demonstrate an ability to extract fission gas void morphological data faster, more consistently, and at least as accurately as manual segmentation methods.« less

  9. Fission gas bubble identification using MATLAB's image processing toolbox

    DOE PAGES

    Collette, R.; King, J.; Keiser, Jr., D.; ...

    2016-06-08

    Automated image processing routines have the potential to aid in the fuel performance evaluation process by eliminating bias in human judgment that may vary from person-to-person or sample-to-sample. In addition, this study presents several MATLAB based image analysis routines designed for fission gas void identification in post-irradiation examination of uranium molybdenum (U–Mo) monolithic-type plate fuels. Frequency domain filtration, enlisted as a pre-processing technique, can eliminate artifacts from the image without compromising the critical features of interest. This process is coupled with a bilateral filter, an edge-preserving noise removal technique aimed at preparing the image for optimal segmentation. Adaptive thresholding provedmore » to be the most consistent gray-level feature segmentation technique for U–Mo fuel microstructures. The Sauvola adaptive threshold technique segments the image based on histogram weighting factors in stable contrast regions and local statistics in variable contrast regions. Once all processing is complete, the algorithm outputs the total fission gas void count, the mean void size, and the average porosity. The final results demonstrate an ability to extract fission gas void morphological data faster, more consistently, and at least as accurately as manual segmentation methods.« less

  10. Identification of recently handled materials by analysis of latent human fingerprints using infrared spectromicroscopy.

    PubMed

    Grant, Ashleigh; Wilkinson, T J; Holman, Derek R; Martin, Michael C

    2005-09-01

    Analysis of fingerprints has predominantly focused on matching the pattern of ridges to a specific person as a form of identification. The present work focuses on identifying extrinsic materials that are left within a person's fingerprint after recent handling of such materials. Specifically, we employed infrared spectromicroscopy to locate and positively identify microscopic particles from a mixture of common materials in the latent human fingerprints of volunteer subjects. We were able to find and correctly identify all test substances based on their unique infrared spectral signatures. Spectral imaging is demonstrated as a method for automating recognition of specific substances in a fingerprint. We also demonstrate the use of attenuated total reflectance (ATR) and synchrotron-based infrared spectromicroscopy for obtaining high-quality spectra from particles that were too thick or too small, respectively, for reflection/absorption measurements. We believe the application of this rapid, nondestructive analytical technique to the forensic study of latent human fingerprints has the potential to add a new layer of information available to investigators. Using fingerprints to not only identify who was present at a crime scene, but also to link who was handling key materials, will be a powerful investigative tool.

  11. Palm-Vein Classification Based on Principal Orientation Features

    PubMed Central

    Zhou, Yujia; Liu, Yaqin; Feng, Qianjin; Yang, Feng; Huang, Jing; Nie, Yixiao

    2014-01-01

    Personal recognition using palm–vein patterns has emerged as a promising alternative for human recognition because of its uniqueness, stability, live body identification, flexibility, and difficulty to cheat. With the expanding application of palm–vein pattern recognition, the corresponding growth of the database has resulted in a long response time. To shorten the response time of identification, this paper proposes a simple and useful classification for palm–vein identification based on principal direction features. In the registration process, the Gaussian-Radon transform is adopted to extract the orientation matrix and then compute the principal direction of a palm–vein image based on the orientation matrix. The database can be classified into six bins based on the value of the principal direction. In the identification process, the principal direction of the test sample is first extracted to ascertain the corresponding bin. One-by-one matching with the training samples is then performed in the bin. To improve recognition efficiency while maintaining better recognition accuracy, two neighborhood bins of the corresponding bin are continuously searched to identify the input palm–vein image. Evaluation experiments are conducted on three different databases, namely, PolyU, CASIA, and the database of this study. Experimental results show that the searching range of one test sample in PolyU, CASIA and our database by the proposed method for palm–vein identification can be reduced to 14.29%, 14.50%, and 14.28%, with retrieval accuracy of 96.67%, 96.00%, and 97.71%, respectively. With 10,000 training samples in the database, the execution time of the identification process by the traditional method is 18.56 s, while that by the proposed approach is 3.16 s. The experimental results confirm that the proposed approach is more efficient than the traditional method, especially for a large database. PMID:25383715

  12. Aged Stereotypes and Their Effects on Older Persons' Self-Esteem. A Seminar Paper.

    ERIC Educational Resources Information Center

    Beaver, Jodie L.

    This literature review explores societal attitudes about older individuals and the influence of these attitudes on the self-esteem of older persons. These topics are examined: identification of common stereotypes and myths about older persons; media depiction of older persons; influence of stereotypical images on older persons' self-perceptions;…

  13. Reconstructing Face Image from the Thermal Infrared Spectrum to the Visible Spectrum †

    PubMed Central

    Kresnaraman, Brahmastro; Deguchi, Daisuke; Takahashi, Tomokazu; Mekada, Yoshito; Ide, Ichiro; Murase, Hiroshi

    2016-01-01

    During the night or in poorly lit areas, thermal cameras are a better choice instead of normal cameras for security surveillance because they do not rely on illumination. A thermal camera is able to detect a person within its view, but identification from only thermal information is not an easy task. The purpose of this paper is to reconstruct the face image of a person from the thermal spectrum to the visible spectrum. After the reconstruction, further image processing can be employed, including identification/recognition. Concretely, we propose a two-step thermal-to-visible-spectrum reconstruction method based on Canonical Correlation Analysis (CCA). The reconstruction is done by utilizing the relationship between images in both thermal infrared and visible spectra obtained by CCA. The whole image is processed in the first step while the second step processes patches in an image. Results show that the proposed method gives satisfying results with the two-step approach and outperforms comparative methods in both quality and recognition evaluations. PMID:27110781

  14. 7 CFR 1400.402 - Notification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... social security number or taxpayer identification number of such a person or legal entity, if known, and... SUBSEQUENT CROP, PROGRAM, OR FISCAL YEARS Foreign Persons § 1400.402 Notification. (a) Any legal entity... legal entity conducts its farming operation if: (1) Any person, group of persons, legal entity, or group...

  15. 49 CFR 24.205 - Relocation planning, advisory services, and coordination.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... include a personal interview with each business. At a minimum, interviews with displaced business owners... obtaining such assistance. This shall include a personal interview with each residential displaced person... reinstallation of machinery and/or other personal property. (C) For businesses, an identification and resolution...

  16. Finger-vein and fingerprint recognition based on a feature-level fusion method

    NASA Astrophysics Data System (ADS)

    Yang, Jinfeng; Hong, Bofeng

    2013-07-01

    Multimodal biometrics based on the finger identification is a hot topic in recent years. In this paper, a novel fingerprint-vein based biometric method is proposed to improve the reliability and accuracy of the finger recognition system. First, the second order steerable filters are used here to enhance and extract the minutiae features of the fingerprint (FP) and finger-vein (FV). Second, the texture features of fingerprint and finger-vein are extracted by a bank of Gabor filter. Third, a new triangle-region fusion method is proposed to integrate all the fingerprint and finger-vein features in feature-level. Thus, the fusion features contain both the finger texture-information and the minutiae triangular geometry structure. Finally, experimental results performed on the self-constructed finger-vein and fingerprint databases are shown that the proposed method is reliable and precise in personal identification.

  17. Not just fun and games: applications of virtual reality in the identification and rehabilitation of cognitive disorders of the elderly.

    PubMed

    Cherniack, E Paul

    2011-01-01

    To outline the evidence in the published medical literature suggesting the potential applications of virtual reality (VR) for the identification and rehabilitation of cognitive disorders of the elderly. Non-systematic literature review. VR, despite its more common usage by younger persons, is a potentially promising source of techniques useful in the identification and rehabilitation of cognitive disorders of the elderly. Systems employing VR can include desktop and head-mounted visual displays among other devices. Thus far, published studies have described VR-based applications in the identification and treatment of deficits in navigational skills in ambulation and driving. In addition, VR has been utilised to enhance the ability to perform activities of daily living in patients with dementia, stroke, and Parkinson's Disease. Such investigations have thus far been small, and unblinded. VR-based applications can potentially offer more versatile, comprehensive, and safer assessments of function. However, they also might be more expensive, complex and more difficult to use by elderly patients. Side effects of head-mounted visual displays include nausea and disorientation, but, have not been reported specifically in older subjects.

  18. A new atlas for the evaluation of facial features: advantages, limits, and applicability.

    PubMed

    Ritz-Timme, Stefanie; Gabriel, Peter; Obertovà, Zuzana; Boguslawski, Melanie; Mayer, F; Drabik, A; Poppa, Pasquale; De Angelis, Danilo; Ciaffi, Romina; Zanotti, Benedetta; Gibelli, Daniele; Cattaneo, Cristina

    2011-03-01

    Methods for the verification of the identity of offenders in cases involving video-surveillance images in criminal investigation events are currently under scrutiny by several forensic experts around the globe. The anthroposcopic, or morphological, approach based on facial features is the most frequently used by international forensic experts. However, a specific set of applicable features has not yet been agreed on by the experts. Furthermore, population frequencies of such features have not been recorded, and only few validation tests have been published. To combat and prevent crime in Europe, the European Commission funded an extensive research project dedicated to the optimization of methods for facial identification of persons on photographs. Within this research project, standardized photographs of 900 males between 20 and 31 years of age from Germany, Italy, and Lithuania were acquired. Based on these photographs, 43 facial features were described and evaluated in detail. These efforts led to the development of a new model of a morphologic atlas, called DMV atlas ("Düsseldorf Milan Vilnius," from the participating cities). This study is the first attempt at verifying the feasibility of this atlas as a preliminary step to personal identification by exploring the intra- and interobserver error. The analysis yielded mismatch percentages from 19% to 39%, which reflect the subjectivity of the approach and suggest caution in verifying personal identity only from the classification of facial features. Nonetheless, the use of the atlas leads to a significant improvement of consistency in the evaluation.

  19. [Circulating tumor cells: cornerstone of personalized medicine].

    PubMed

    Rafii, A; Vidal, F; Rathat, G; Alix-Panabières, C

    2014-11-01

    Cancer treatment has evolved toward personalized medicine. It is mandatory for clinicians to ascertain tumor biological features in order to optimize patients' treatment. Identification and characterization of circulating tumor cells demonstrated a prognostic value in many solid tumors. Here, we describe the main technologies for identification and characterization of circulating tumor cells and their clinical application in gynecologic and breast cancers. Copyright © 2014. Published by Elsevier Masson SAS.

  20. Reply to Budowle, Ge, Chakraborty and Gill-King: use of prior odds for missing persons identifications.

    PubMed

    Biedermann, Alex; Taroni, Franco; Margot, Pierre

    2012-01-31

    Prior probabilities represent a core element of the Bayesian probabilistic approach to relatedness testing. This letter opinions on the commentary Use of prior odds for missing persons identifications by Budowle et al., published recently in this journal. Contrary to Budowle et al., we argue that the concept of prior probabilities (i) is not endowed with the notion of objectivity, (ii) is not a case for computation, and (iii) does not require new guidelines edited by the forensic DNA community--as long as probability is properly considered as an expression of personal belief.

  1. 27 CFR 17.22 - Employer identification number.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... number. 17.22 Section 17.22 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... NONBEVERAGE PRODUCTS Registration § 17.22 Employer identification number. Every person who claims drawback..., and Firearms Taxes, the employer identification number (EIN) assigned by the Internal Revenue Service...

  2. Optical correlators for recognition of human face thermal images

    NASA Astrophysics Data System (ADS)

    Bauer, Joanna; Podbielska, Halina; Suchwalko, Artur; Mazurkiewicz, Jacek

    2005-09-01

    In this paper, the application of the optical correlators for face thermograms recognition is described. The thermograms were colleted from 27 individuals. For each person 10 pictures in different conditions were recorded and the data base composed of 270 images was prepared. Two biometric systems based on joint transform correlator and 4f correlator were built. Each system was designed for realizing two various tasks: verification and identification. The recognition systems were tested and evaluated according to the Face Recognition Vendor Tests (FRVT).

  3. [Measures to prevent patient identification errors in blood collection/physiological function testing utilizing a laboratory information system].

    PubMed

    Shimazu, Chisato; Hoshino, Satoshi; Furukawa, Taiji

    2013-08-01

    We constructed an integrated personal identification workflow chart using both bar code reading and an all in-one laboratory information system. The information system not only handles test data but also the information needed for patient guidance in the laboratory department. The reception terminals at the entrance, displays for patient guidance and patient identification tools at blood-sampling booths are all controlled by the information system. The number of patient identification errors was greatly reduced by the system. However, identification errors have not been abolished in the ultrasound department. After re-evaluation of the patient identification process in this department, we recognized that the major reason for the errors came from excessive identification workflow. Ordinarily, an ultrasound test requires patient identification 3 times, because 3 different systems are required during the entire test process, i.e. ultrasound modality system, laboratory information system and a system for producing reports. We are trying to connect the 3 different systems to develop a one-time identification workflow, but it is not a simple task and has not been completed yet. Utilization of the laboratory information system is effective, but is not yet perfect for patient identification. The most fundamental procedure for patient identification is to ask a person's name even today. Everyday checks in the ordinary workflow and everyone's participation in safety-management activity are important for the prevention of patient identification errors.

  4. Narrator Point of View and Persuasion in Health Narratives: The Role of Protagonist-Reader Similarity, Identification, and Self-Referencing.

    PubMed

    Chen, Meng; Bell, Robert A; Taylor, Laramie D

    2016-08-01

    Narratives are often used in messages about health threats. We posited that a 1st-person point of view (POV) narrative would have a greater effect than a 3rd-person POV on the mediators identification and self-referencing-an effect moderated by protagonist-reader similarity. Higher levels of identification and self-referencing were expected to elevate susceptibility and severity perceptions, leading to persuasion. Participants ages ≤30 years were recruited from a crowdsource website and randomly assigned to read one version of a faux magazine article about caffeine overdose. Article versions were defined by a 2 (1st- or 3rd-person POV) × 2 (similar or dissimilar protagonist) design. To manipulate similarity, we had respondents read an article in which the protagonist was also young (24 years of age) and of the same sex or much older (54 years of age) and of the opposite sex. Participants then completed a questionnaire measuring study variables. Contrary to expectations, POV did not affect identification or self-referencing. However, similarity directly impacted identification, which in turn influenced severity perceptions. Self-referencing was not affected by the experimental manipulations but had a direct effect on susceptibility and also mediated the identification → susceptibility relationship. Susceptibility and severity perceptions were associated with greater levels of persuasion. Implications for message design are discussed.

  5. Visualisation Enhancement of HoloCatT Matrix

    NASA Astrophysics Data System (ADS)

    Rosli, Nor Azlin; Mohamed, Azlinah; Khan, Rahmattullah

    Graphology and personality psychology are two different analyses approach perform by two different groups of people, but addresses the personality of the person that were analyzed. It is of interest to visualize a system that would aid personality identification given information visualization of these two domains. Therefore, a research in identifying the relationship between those two domains has been carried out by producing the HoloCatT Matrix, a combination of graphology features and a selected personality traits approach. The objectives of this research are to identify new features of the existing HoloCatT Matrix and validate the new version of matrix with two (2) related group of experts. A set of questionnaire has been distributed to a group of Personologist to identify the relationship and an interview has been done with a Graphologist in validating the matrix. Based on the analysis, 87.5% of the relation confirmed by both group of experts and subsequently the third (3rd) version of HoloCatT Matrix is obtained.

  6. Feature Extraction with GMDH-Type Neural Networks for EEG-Based Person Identification.

    PubMed

    Schetinin, Vitaly; Jakaite, Livija; Nyah, Ndifreke; Novakovic, Dusica; Krzanowski, Wojtek

    2018-08-01

    The brain activity observed on EEG electrodes is influenced by volume conduction and functional connectivity of a person performing a task. When the task is a biometric test the EEG signals represent the unique "brain print", which is defined by the functional connectivity that is represented by the interactions between electrodes, whilst the conduction components cause trivial correlations. Orthogonalization using autoregressive modeling minimizes the conduction components, and then the residuals are related to features correlated with the functional connectivity. However, the orthogonalization can be unreliable for high-dimensional EEG data. We have found that the dimensionality can be significantly reduced if the baselines required for estimating the residuals can be modeled by using relevant electrodes. In our approach, the required models are learnt by a Group Method of Data Handling (GMDH) algorithm which we have made capable of discovering reliable models from multidimensional EEG data. In our experiments on the EEG-MMI benchmark data which include 109 participants, the proposed method has correctly identified all the subjects and provided a statistically significant ([Formula: see text]) improvement of the identification accuracy. The experiments have shown that the proposed GMDH method can learn new features from multi-electrode EEG data, which are capable to improve the accuracy of biometric identification.

  7. Psychological aspects of political tolerance among adolescents.

    PubMed

    Sotelo, M J; Sangrador, J L

    1997-12-01

    This study concerns 273 Spanish adolescents, aged between 14 and 17, 125 boys and 148 girls. The measured variables were political tolerance, liking for several groups, political experience, cognitive moral reasoning, support for democratic norms, support for violent groups, identification with a group of friends, identification with a religious group, and identification with a soccer team. The objectives of this work were (a) to establish groups of adolescents based on the relationship between their willingness to extend rights to several groups and their liking of these groups, (b) to know the personality characteristics of tolerant and intolerant adolescents, and (c) to set up correlations between age and total tolerance, total liking, and the variables correlated with tolerance. The main findings are that older and younger adolescents belong to different groups, with respect to tolerance, and something similar can be said about boys and girls. Intolerant adolescents perceive themselves as anxious, insecure, solitary, and obstinate. Significant positive correlations between age and political experience, rated support for democratic norms and ratings for identification with a group of friends were found. On the contrary, there were significant negative correlations between age and rated support for violent groups, identification with a religious group, and identification with a soccer team.

  8. 40 CFR 279.43 - Used oil transportation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... identification number; (2) A used oil processing/re-refining facility who has obtained an EPA identification number; (3) An off-specification used oil burner facility who has obtained an EPA identification number... parts 171 through 180. Persons transporting used oil that meets the definition of a hazardous material...

  9. 40 CFR 279.43 - Used oil transportation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... identification number; (2) A used oil processing/re-refining facility who has obtained an EPA identification number; (3) An off-specification used oil burner facility who has obtained an EPA identification number... parts 171 through 180. Persons transporting used oil that meets the definition of a hazardous material...

  10. Missed diagnosis: The emerging crisis of borderline personality disorder in older people.

    PubMed

    Beatson, Josephine; Broadbear, Jillian Helen; Sivakumaran, Hemalatha; George, Kuruvilla; Kotler, Eli; Moss, Francine; Rao, Sathya

    2016-12-01

    Clinical experience suggests a growing prevalence of borderline personality disorder in aged residential care and psychiatric facilities with attendant difficulties in their management. This paper reviews the literature concerning the prevalence, phenomenology and diagnosis of borderline personality disorder in old age. The aim is to elucidate the phenomenological differences in old age and thus improve identification of the disorder. A systematic search was conducted using MEDLINE, PubMed, EMBASE and PsycINFO databases, employing the search terms including 'personality disorder', 'borderline personality disorder', 'aged care', 'gerontology', 'geriatric psychiatry' and 'life span'. The search included articles in English involving participants 65+ years. Long-term prospective studies of borderline personality disorder, long-term follow-up studies and studies involving older adults from 50+ years were also examined. There is a paucity of literature on borderline personality disorder in the elderly. No diagnostic or rating instruments have been developed for borderline personality disorder in the elderly. The phenomenology of borderline personality disorder in the aged population differs in several respects from that seen in younger adults, causing some of the difficulties in reaching a diagnosis. Escalations of symptoms and maladaptive behaviours usually occur when the diagnosis of borderline personality disorder is either not made or delayed. Improved identification of borderline personality disorder in older patients, together with staff education concerning the phenomenology, aetiology and management of these patients, is urgently needed. Diagnostic instruments for borderline personality disorder in the elderly need to be developed. In the interim, suggestions are offered concerning patient symptoms and behaviours that could trigger psychiatric assessment and advice concerning management. A screening tool is proposed to assist in the timely diagnosis of borderline personality disorder in older people. Timely identification of these patients is needed so that they can receive the skilled help, understanding and treatment needed to alleviate suffering in the twilight of their lives. © The Royal Australian and New Zealand College of Psychiatrists 2016.

  11. Breast cancer and personal environmental risk factors in Marin County - Pilot study

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Erdmann, C.A.; Farren, G.; Baltzell, K.

    The purpose of the Personal Environmental Risk Factor Study (PERFS) pilot project was to develop methodologies and a questionnaire for a future population-based case-control study to investigate the role of selected environmental exposures in breast cancer development. Identification of etiologically relevant exposures during a period of potential vulnerability proximate to disease onset offers the possibility of clinical disease prevention even when disease initiation may have already occurred many years earlier. Certain personal environmental agents or combinations of agents may influence disease promotion. Therefore, this pilot study focused on exposures that occurred during the ten-year period prior to diagnosis for casesmore » and the last ten years for controls, rather than more historic exposures. For this pilot study, they used a community-based research approach. In the collaborative efforts, community members participated with academic researchers in all phases of the research, including research question identification, study design, development of research tools, development of the human subjects protocol, and report writing. Community member inclusion was based upon the concept that community participation could improve the relevance of scientific studies and ultimate success of the research by encouraging an ongoing dialogue between community members and academic representatives. Early activities of this project focused on the collection of input from the community regarding the possible role of environmental factors in the incidence of breast cancer in Marin County. The intent was to inform the scientists of community concerns, enhance the research team's understanding of the community being studied, and provide interested community members with a better understanding of the strengths and weaknesses of traditional research methods through active participation in the research process.« less

  12. Sex determination using cheiloscopy and mandibular canine index as a tool in forensic dentistry.

    PubMed

    Singh, Jaspal; Gupta, Kapil D; Sardana, Varun; Balappanavar, Ashwini Y; Malhotra, Garima

    2012-07-01

    Establishment of a person's individuality is important for legal as well as humanitarian purpose and gender determination is an essential step in identifying an individual. In forensic odontology the sum total of all the characteristics of teeth and their associated structures provide a unique totality and forms the basis for personal identification. To investigate the accuracy of various methods employed in sex determination such as cheiloscopy and mandibular canine index (MCI). The study group comprises adults between 20 and 25 years of age, who were assessed for gender identification using lip prints and MCI. The results were subjected to statistical analysis. MCI and lip prints were found to be accurate and specific for sex determination. There is scope for use of these methods in criminal investigations, personal identification, and genetic studies. Thus, dental tissues make good witnesses although they speak softly, they never lie and they never forget.

  13. The Stigma of Mental Illness as a Barrier to Self Labeling as Having a Mental Illness.

    PubMed

    Stolzenburg, Susanne; Freitag, Simone; Evans-Lacko, Sara; Muehlan, Holger; Schmidt, Silke; Schomerus, Georg

    2017-12-01

    The aim of this study was to investigate whether personal stigma decreases self-identification as having a mental illness in individuals with untreated mental health problems. We interviewed 207 persons with a currently untreated mental health problem as confirmed by a structured diagnostic interview. Measures included symptom appraisal, self-identification as having a mental illness (SELFI), self-labeling (open-ended question on the nature of their problem) stigma-related variables (explicit and implicit), as well as sociodemographics, current symptom severity, and previous treatment. Support for discrimination and implicit stigmatizing attitude were both associated with lower likelihood of self-identification. More social distance and support for discrimination were associated with less self-labeling. Previous treatment was the strongest predictor of symptom appraisal, SELFI, and self-labeling. Destigmatizing mental illness could increase awareness of personal mental health problems, potentially leading to lower rates of untreated mental illness.

  14. [Dispute over the multiple personality disorder: theoretical or practical dilemma?].

    PubMed

    Stankiewicz, Sylwia; Golczyńska, Maria

    2006-01-01

    Dissociative identity disorder (DID) could also be referred to as multiple personality disorder (MPD). Due to rare occurrence and difficulty in its' identification it is infrequently diagnosed in Poland. The indicated disorder has been portrayed by the authors throughout the historical context, referring to initial 18th century's references concerning dissociation. A typical dissociatively disordered person has been characterized along with his individual personality categories such as: original personality, altered personality, host and personality fragment. Moreover various diagnosis criterions of DID have been introduced. DID has also been differentiated with other disorders: PTSD (post-traumatic stress disorder) and BPD (borderline personality disorder). A hypothesis has been set up, stating that DID is directly correlated with the trauma experienced during childhood, while PTSD is linked with traumatic lived-through events in the later period of ones' life. The most contemporary and frequently used research tools for DID have been indicated: dissociative experience scale (DES) and somatoform dissociation questionnaire (SDQ-20). Based upon the known literature, the authors have presented treatment methods such as hypnotherapy and recorded therapy sessions. It is the view of the authors that the switching in dissociative identity disorder is of adaptive character (it occurrs depending upon adaptive needs).

  15. [Pharmacogenomics in neuro-oncology].

    PubMed

    Riese-Jorda, H H; Baez, J M

    Chemotherapy protocols for treatment of brain tumors use toxic molecules for killing cancer cells in a similar way that protocols for treating other cancers. Therefore, secondary effects and poor response are the major handicaps. Technological developments based on pharmacogenomics and pharmacoproteomics will predict response and toxicity giving rise to a personalized medicine. However, there are only few studies that correlate chemotherapeutical molecules for brain tumor treatment and prediction of response and toxicity. The development of new technologies based on high-density microarrays allows the progressive identification of genes whose presence will predict the efficacy of therapeutic protocols. Once identified, specific equipments based on low-density arrays will detect exclusively in an easy and fast way the presence of genes in order to predict patient's response and avoid toxicity. Other more sophisticated techniques at present still at an experimental step based on proteomics as MALDI (Matrix-Assisted Laser Desorption Ionization) and SELDI (Surface-Enhanced Laser Desorption Ionization) will allow the identification of proteins that could predict response and toxicity.

  16. Face recognition accuracy of forensic examiners, superrecognizers, and face recognition algorithms.

    PubMed

    Phillips, P Jonathon; Yates, Amy N; Hu, Ying; Hahn, Carina A; Noyes, Eilidh; Jackson, Kelsey; Cavazos, Jacqueline G; Jeckeln, Géraldine; Ranjan, Rajeev; Sankaranarayanan, Swami; Chen, Jun-Cheng; Castillo, Carlos D; Chellappa, Rama; White, David; O'Toole, Alice J

    2018-06-12

    Achieving the upper limits of face identification accuracy in forensic applications can minimize errors that have profound social and personal consequences. Although forensic examiners identify faces in these applications, systematic tests of their accuracy are rare. How can we achieve the most accurate face identification: using people and/or machines working alone or in collaboration? In a comprehensive comparison of face identification by humans and computers, we found that forensic facial examiners, facial reviewers, and superrecognizers were more accurate than fingerprint examiners and students on a challenging face identification test. Individual performance on the test varied widely. On the same test, four deep convolutional neural networks (DCNNs), developed between 2015 and 2017, identified faces within the range of human accuracy. Accuracy of the algorithms increased steadily over time, with the most recent DCNN scoring above the median of the forensic facial examiners. Using crowd-sourcing methods, we fused the judgments of multiple forensic facial examiners by averaging their rating-based identity judgments. Accuracy was substantially better for fused judgments than for individuals working alone. Fusion also served to stabilize performance, boosting the scores of lower-performing individuals and decreasing variability. Single forensic facial examiners fused with the best algorithm were more accurate than the combination of two examiners. Therefore, collaboration among humans and between humans and machines offers tangible benefits to face identification accuracy in important applications. These results offer an evidence-based roadmap for achieving the most accurate face identification possible. Copyright © 2018 the Author(s). Published by PNAS.

  17. Lessons Learned from Development of De-identification System for Biomedical Research in a Korean Tertiary Hospital.

    PubMed

    Shin, Soo-Yong; Lyu, Yongman; Shin, Yongdon; Choi, Hyo Joung; Park, Jihyun; Kim, Woo-Sung; Lee, Jae Ho

    2013-06-01

    The Korean government has enacted two laws, namely, the Personal Information Protection Act and the Bioethics and Safety Act to prevent the unauthorized use of medical information. To protect patients' privacy by complying with governmental regulations and improve the convenience of research, Asan Medical Center has been developing a de-identification system for biomedical research. We reviewed Korean regulations to define the scope of the de-identification methods and well-known previous biomedical research platforms to extract the functionalities of the systems. Based on these review results, we implemented necessary programs based on the Asan Medical Center Information System framework which was built using the Microsoft. NET Framework and C#. The developed de-identification system comprises three main components: a de-identification tool, a search tool, and a chart review tool. The de-identification tool can substitute a randomly assigned research ID for a hospital patient ID, remove the identifiers in the structured format, and mask them in the unstructured format, i.e., texts. This tool achieved 98.14% precision and 97.39% recall for 6,520 clinical notes. The search tool can find the number of patients which satisfies given search criteria. The chart review tool can provide de-identified patient's clinical data for review purposes. We found that a clinical data warehouse was essential for successful implementation of the de-identification system, and this system should be tightly linked to an electronic Institutional Review Board system for easy operation of honest brokers. Additionally, we found that a secure cloud environment could be adopted to protect patients' privacy more thoroughly.

  18. 30 CFR 75.1715 - Identification check system.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... system. [Statutory Provisions] Each operator of a coal mine shall establish a check-in and check-out system which will provide positive identification of every person underground, and will provide an... 30 Mineral Resources 1 2011-07-01 2011-07-01 false Identification check system. 75.1715 Section 75...

  19. 30 CFR 75.1715 - Identification check system.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... system. [Statutory Provisions] Each operator of a coal mine shall establish a check-in and check-out system which will provide positive identification of every person underground, and will provide an... 30 Mineral Resources 1 2012-07-01 2012-07-01 false Identification check system. 75.1715 Section 75...

  20. 30 CFR 75.1715 - Identification check system.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... system. [Statutory Provisions] Each operator of a coal mine shall establish a check-in and check-out system which will provide positive identification of every person underground, and will provide an... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Identification check system. 75.1715 Section 75...

  1. 30 CFR 75.1715 - Identification check system.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... system. [Statutory Provisions] Each operator of a coal mine shall establish a check-in and check-out system which will provide positive identification of every person underground, and will provide an... 30 Mineral Resources 1 2013-07-01 2013-07-01 false Identification check system. 75.1715 Section 75...

  2. 30 CFR 75.1715 - Identification check system.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... system. [Statutory Provisions] Each operator of a coal mine shall establish a check-in and check-out system which will provide positive identification of every person underground, and will provide an... 30 Mineral Resources 1 2014-07-01 2014-07-01 false Identification check system. 75.1715 Section 75...

  3. 27 CFR 70.113 - Penalty for failure to supply taxpayer identification number.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... supply taxpayer identification number. 70.113 Section 70.113 Alcohol, Tobacco Products and Firearms..., Additional Amounts, and Assessable Penalties § 70.113 Penalty for failure to supply taxpayer identification... notice and demand therefor. (b) Reasonable cause. If any person who is required by the regulations under...

  4. 9 CFR 590.419 - Reuse of containers bearing official identification prohibited.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Reuse of containers bearing official... INSPECTION ACT) Identifying and Marking Product § 590.419 Reuse of containers bearing official identification prohibited. The reuse, by any person, of containers bearing official identification is prohibited unless such...

  5. Heritability estimates of the Big Five personality traits based on common genetic variants.

    PubMed

    Power, R A; Pluess, M

    2015-07-14

    According to twin studies, the Big Five personality traits have substantial heritable components explaining 40-60% of the variance, but identification of associated genetic variants has remained elusive. Consequently, knowledge regarding the molecular genetic architecture of personality and to what extent it is shared across the different personality traits is limited. Using genomic-relatedness-matrix residual maximum likelihood analysis (GREML), we here estimated the heritability of the Big Five personality factors (extraversion, agreeableness, conscientiousness, neuroticism and openness for experience) in a sample of 5011 European adults from 527,469 single-nucleotide polymorphisms across the genome. We tested for the heritability of each personality trait, as well as for the genetic overlap between the personality factors. We found significant and substantial heritability estimates for neuroticism (15%, s.e. = 0.08, P = 0.04) and openness (21%, s.e. = 0.08, P < 0.01), but not for extraversion, agreeableness and conscientiousness. The bivariate analyses showed that the variance explained by common variants entirely overlapped between neuroticism and openness (rG = 1.00, P < 0.001), despite low phenotypic correlation (r = - 0.09, P < 0.001), suggesting that the remaining unique heritability may be determined by rare or structural variants. As far as we are aware of, this is the first study estimating the shared and unique heritability of all Big Five personality traits using the GREML approach. Findings should be considered exploratory and suggest that detectable heritability estimates based on common variants is shared between neuroticism and openness to experiences.

  6. Community participation of persons with disabilities: volunteering, donations and involvement in groups and organisations.

    PubMed

    Rak, Eniko C; Spencer, Lauren

    2016-08-01

    This study examined similarities and differences between persons with and without disabilities on volunteering, donations and group participation. A sample of 1548 individuals participated and 60% of the sample were persons with disabilities. Data for this research was drawn from a major statewide survey in a Midwestern state in the United States. Community participation was measured through involvement with civic, religious and other community-based groups, volunteering activities and donations. Logistic regression was pursued to test the effect of disability on community participation. Findings support different trends in participation between persons with and without disabilities. Individuals without disabilities are more likely to volunteer, donate money and participate in civic organisations (e.g. clubs) and other groups. Employment and household income have a significant contribution in explaining these differences. This study found significant differences in community participation between persons with disabilities and persons without disabilities. Regression analysis outcomes underscore the importance of employment and income in eliminating disparities in community involvement between persons with and without disabilities. Implications for Rehabilitation Policy change in rehabilitation agencies to fund supported volunteering services. Improve the representation of persons with disabilities in volunteering pursuits by making volunteering positions accessible to them (educate persons with disabilities to be more aware of these opportunities, provide reasonable accommodations at work sites, etc.). Educate stakeholders about the benefits of volunteering and being part of civic, and other community based groups in improving the quality of life of persons with disabilities. Identification of barriers for persons with disabilities in these pursuits (physical and attitudinal barriers, lack of resources). Identifying and utilising natural supports in the work site for persons with disabilities to receive peer support on the job from full-time employees.

  7. I and Us: A Longitudinal Study on the Interplay of Personal and Social Identity in Adolescence.

    PubMed

    Albarello, Flavia; Crocetti, Elisabetta; Rubini, Monica

    2018-04-01

    The development of personal and social identity is crucial in adolescence. On the one hand, adolescents face the task of forming and consolidating their personal identity in multiple domains, with educational and interpersonal domains particularly salient. On the other hand, they enlarge their social horizon and increasingly define themselves as members of multiple peer groups, such as groups of classmates and friends met outside school. There is however a lack of integrative research on the interplay among and between personal and social identity processes. Hence the purpose of this study was threefold. First, we examined how personal identity processes in the educational and interpersonal domains are associated longitudinally. Second, we investigated to what extent social identifications with classmates and with the group of friends are associated over time. Third, with an original approach we examined the longitudinal interplay between personal and social identity processes, to connect theoretical contributions that have so far proceeded largely in parallel. Participants were 304 adolescents (61.84% female, M age  = 17.49) involved in a three-wave longitudinal study. We found that (a) the ways in which adolescents develop their identity in the educational and interpersonal domains become more closely intertwined over time; (b) identifications with classmates and with the group of friends are interconnected; and (c) personal and social identity processes are associated both concurrently and longitudinally, with most cross-lagged effects showing that social identifications influence personal identity formation and consolidation in the interpersonal identity domain. Theoretical implications are discussed.

  8. 45 CFR 164.508 - Uses and disclosures for which an authorization is required.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... is in the form of: (A) A face-to-face communication made by a covered entity to an individual; or (B... meaningful fashion. (ii) The name or other specific identification of the person(s), or class of persons...

  9. 45 CFR 164.508 - Uses and disclosures for which an authorization is required.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... is in the form of: (A) A face-to-face communication made by a covered entity to an individual; or (B... meaningful fashion. (ii) The name or other specific identification of the person(s), or class of persons...

  10. Transhomosexuality, or the dissociation of sexual orientation and sex object choice.

    PubMed

    Clare, D; Tully, B

    1989-12-01

    Subjects whose sexual orientation and identification is with homosexual persons of the opposite biological sex were studied. "Transhomosexual" has been coined to describe such persons. Forms of transhomosexual expression vary with different emphases found in regard to orientation to, idealization of, and wish to participate in activities of homosexuals of the opposite biological sex. Where identification is strong or overriding, such persons become "transsexual." However, there are important differences between these and conventionally diagnosed transsexuals. Sexual orientation then is not defined entirely or always by the sex of the sexual object choice, but sometimes additionally by references to preferred heterosexual or homosexual styles of relationship.

  11. Microbiological risk assessment for personal care products.

    PubMed

    Stewart, S E; Parker, M D; Amézquita, A; Pitt, T L

    2016-12-01

    Regulatory decisions regarding microbiological safety of cosmetics and personal care products are primarily hazard-based, where the presence of a potential pathogen determines decision-making. This contrasts with the Food industry where it is a commonplace to use a risk-based approach for ensuring microbiological safety. A risk-based approach allows consideration of the degree of exposure to assess unacceptable health risks. As there can be a number of advantages in using a risk-based approach to safety, this study explores the Codex Alimentarius (Codex) four-step Microbiological Risk Assessment (MRA) framework frequently used in the Food industry and examines how it can be applied to the safety assessment of personal care products. The hazard identification and hazard characterization steps (one and two) of the Codex MRA framework consider the main microorganisms of concern. These are addressed by reviewing the current industry guidelines for objectionable organisms and analysing reports of contaminated products notified by government agencies over a recent 5-year period, together with examples of reported outbreaks. Data related to estimation of exposure (step three) are discussed, and examples of possible calculations and references are included. The fourth step, performed by the risk assessor (risk characterization), is specific to each assessment and brings together the information from the first three steps to assess the risk. Although there are very few documented uses of the MRA approach for personal care products, this study illustrates that it is a practicable and sound approach for producing products that are safe by design. It can be helpful in the context of designing products and processes going to market and with setting of microbiological specifications. Additionally, it can be applied reactively to facilitate decision-making when contaminated products are released on to the marketplace. Currently, the knowledge available may only allow a qualitative or semi-quantitative rather than fully quantitative risk assessment, but an added benefit is that the disciplined structuring of available knowledge enables clear identification of gaps to target resources and if appropriate, instigate data generation. © 2016 Society of Cosmetic Scientists and the Société Française de Cosmétologie.

  12. Prevalence of and antecedents to dementia-related missing incidents in the community.

    PubMed

    Bowen, Mary Elizabeth; McKenzie, Barbara; Steis, Melinda; Rowe, Meredeth

    2011-01-01

    The primary aim of this study is to examine the prevalence of and antecedents to missing incidents among community-dwelling persons with dementia. This prospective study used mailed surveys and telephone interviews. The prevalence of having any incident was 0.46/year; the overall prevalence for missing incidents in this study was 0.65/year. Missing incidents had few antecedents and occurred largely when persons with dementia were performing everyday activities that they normally completed without incident. Given that a missing incident is relatively common among persons with dementia, health care professionals should assist caregivers with a missing incident plan early in the disease process. Also, as missing persons are found by persons other than the caregiver and caregivers underutilize identification devices, health care professionals may recommend the use of identification devices to facilitate a safe return. Copyright © 2011 S. Karger AG, Basel.

  13. Unaware person recognition from the body when face identification fails.

    PubMed

    Rice, Allyson; Phillips, P Jonathon; Natu, Vaidehi; An, Xiaobo; O'Toole, Alice J

    2013-11-01

    How does one recognize a person when face identification fails? Here, we show that people rely on the body but are unaware of doing so. State-of-the-art face-recognition algorithms were used to select images of people with almost no useful identity information in the face. Recognition of the face alone in these cases was near chance level, but recognition of the person was accurate. Accuracy in identifying the person without the face was identical to that in identifying the whole person. Paradoxically, people reported relying heavily on facial features over noninternal face and body features in making their identity decisions. Eye movements indicated otherwise, with gaze duration and fixations shifting adaptively toward the body and away from the face when the body was a better indicator of identity than the face. This shift occurred with no cost to accuracy or response time. Human identity processing may be partially inaccessible to conscious awareness.

  14. Endophenotypes in the personality disorders

    PubMed Central

    Siever, Larry J.

    2005-01-01

    The identification of endophenotypes in the personality disorders may provide a basis for the identification of underlying genotypes that influence the traits and dimensions of the personality disorders, as well as susceptibility to major psychiatric illnesses. Clinical dimensions of personality disorders that lend themselves to the study of corresponding endophenotypes include affective instability impulsiwity aggression, emotional information processing, cognitive disorganization, social deficits, and psychosis. For example, the propensity to aggression can be evaluated by psychometric measures, interview, laboratory paradigms, neurochemical imaging, and pharmacological studies. These suggest that aggression is a measurable trait that may be related to reduced serotonergic activity. Hyperresponsiveness of amygdala and other limbic structures may be related to affective instability, while structural and functional brain alterations underlie the cognitive disorganization in psychoticlike symptoms of schizotypal personality disorder. Thus, an endophenotypic approach not only provides clues to underlying candidate genes contributing to these behavioral dimensions, but may also point the way to a better understanding of pathophysiological mechanisms. PMID:16262209

  15. Predicting Player Position for Talent Identification in Association Football

    NASA Astrophysics Data System (ADS)

    Razali, Nazim; Mustapha, Aida; Yatim, Faiz Ahmad; Aziz, Ruhaya Ab

    2017-08-01

    This paper is set to introduce a new framework from the perspective of Computer Science for identifying talents in the sport of football based on the players’ individual qualities; physical, mental, and technical. The combination of qualities as assessed by coaches are then used to predict the players’ position in a match that suits the player the best in a particular team formation. Evaluation of the proposed framework is two-fold; quantitatively via classification experiments to predict player position, and qualitatively via a Talent Identification Site developed to achieve the same goal. Results from the classification experiments using Bayesian Networks, Decision Trees, and K-Nearest Neighbor have shown an average of 98% accuracy, which will promote consistency in decision-making though elimination of personal bias in team selection. The positive reviews on the Football Identification Site based on user acceptance evaluation also indicates that the framework is sufficient to serve as the basis of developing an intelligent team management system in different sports, whereby growth and performance of sport players can be monitored and identified.

  16. 41 CFR 109-1.5203 - Management of subcontractor-held personal property.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Identification as Government-owned personal property. (d) Physical inventories. (e) Proper care, maintenance, and..., destroyed, stolen, abandoned, or worn out. (i) Periodic reports, including physical inventory results and... reviews, to ensure that personal property is being managed in accordance with established procedures. ...

  17. 48 CFR 1852.245-78 - Physical inventory of capital personal property.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., responsibility for maintenance, or responsibility for posting to the property record. The Contractor may request... for property identification, such as a laser bar-code reader or radio frequency identification reader...

  18. 48 CFR 1852.245-78 - Physical inventory of capital personal property.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., responsibility for maintenance, or responsibility for posting to the property record. The Contractor may request... for property identification, such as a laser bar-code reader or radio frequency identification reader...

  19. 48 CFR 1852.245-78 - Physical inventory of capital personal property.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., responsibility for maintenance, or responsibility for posting to the property record. The Contractor may request... for property identification, such as a laser bar-code reader or radio frequency identification reader...

  20. Attendance fingerprint identification system using arduino and single board computer

    NASA Astrophysics Data System (ADS)

    Muchtar, M. A.; Seniman; Arisandi, D.; Hasanah, S.

    2018-03-01

    Fingerprint is one of the most unique parts of the human body that distinguishes one person from others and is easily accessed. This uniqueness is supported by technology that can automatically identify or recognize a person called fingerprint sensor. Yet, the existing Fingerprint Sensor can only do fingerprint identification on one machine. For the mentioned reason, we need a method to be able to recognize each user in a different fingerprint sensor. The purpose of this research is to build fingerprint sensor system for fingerprint data management to be centralized so identification can be done in each Fingerprint Sensor. The result of this research shows that by using Arduino and Raspberry Pi, data processing can be centralized so that fingerprint identification can be done in each fingerprint sensor with 98.5 % success rate of centralized server recording.

  1. A New Concept Map Model for E-Learning Environments

    NASA Astrophysics Data System (ADS)

    Dattolo, Antonina; Luccio, Flaminia L.

    Web-based education enables learners and teachers to access a wide quantity of continuously updated educational sources. In order to support the learning process, a system has to provide some fundamental features, such as simple mechanisms for the identification of the collection of “interesting” documents, adequate structures for storing, organizing and visualizing these documents, and appropriate mechanisms for creating personalized adaptive paths and views for learners.

  2. Examining How Media Literacy and Personality Factors Predict Skepticism Toward Alcohol Advertising.

    PubMed

    Austin, Erica Weintraub; Muldrow, Adrienne; Austin, Bruce W

    2016-05-01

    To examine the potential effectiveness of media literacy education in the context of well-established personality factors, a survey of 472 young adults, focused on the issue of alcohol marketing messages, examined how individual differences in personality associate with constructs representing aspects of media literacy. The results showed that need for cognition predicted social expectancies and wishful identification with media portrayals in alcohol advertising only through critical thinking about media sources and media content, which are foci of media literacy education. Need for affect did not associate with increased or diminished levels of critical thinking. Critical thinking about sources and messages affected skepticism, represented by expectancies through wishful identification, consistent with the message interpretation process model. The results support the view that critical thinking about media sources is an important precursor to critical thinking about media messages. The results also suggest that critical thinking about media (i.e., media literacy) reflects more than personality characteristics and can affect wishful identification with role models observed in media, which appears to be a key influence on decision making. This adds support to the view that media literacy education can improve decision making across personality types regarding alcohol use by decreasing the potential influence of alcohol marketing messages.

  3. Identification of unwanted photoproducts of cosmetic preservatives in personal care products under ultraviolet-light using solid-phase microextraction and micro-matrix solid-phase dispersion.

    PubMed

    Alvarez-Rivera, Gerardo; Llompart, Maria; Garcia-Jares, Carmen; Lores, Marta

    2015-04-17

    The photochemical transformation of widely used cosmetic preservatives including benzoates, parabens, BHA, BHT and triclosan has been investigated in this work applying an innovative double-approach strategy: identification of transformation products in aqueous photodegradation experiments (UV-light, 254nm), followed by targeted screening analysis of such photoproducts in UV-irradiated cosmetic samples. Solid-phase microextraction (SPME) was applied, using different fiber coatings, in order to widen the range of detectable photoproducts in water, whereas UV-irradiated personal care products (PCPs) containing the target preservatives were extracted by micro-matrix solid-phase dispersion (micro-MSPD). Both SPME and micro-MSPD-based methodologies were successfully optimized and validated. Degradation kinetics of parent species, and photoformation of their transformation by-products were monitored by gas chromatography coupled to mass spectrometry (GC-MS). Thirty nine photoproducts were detected in aqueous photodegradation experiments, being tentatively identified based on their mass spectra. Transformation pathways between structurally related by-products, consistent with their kinetic behavior were postulated. The photoformation of unexpected photoproducts such as 2- and 4-hydroxybenzophenones, and 2,8-dichlorodibenzo-p-dioxin in PCPs are reported in this work for the first time. Copyright © 2015 Elsevier B.V. All rights reserved.

  4. Genome-wide screening for highly discriminative SNPs for personal identification and their assessment in world populations.

    PubMed

    Li, Liming; Wang, Yi; Yang, Shuping; Xia, Mingying; Yang, Yajun; Wang, Jiucun; Lu, Daru; Pan, Xingwei; Ma, Teng; Jiang, Pei; Yu, Ge; Zhao, Ziqin; Ping, Yuan; Zhou, Huaigu; Zhao, Xueying; Sun, Hui; Liu, Bing; Jia, Dongtao; Li, Chengtao; Hu, Rile; Lu, Hongzhou; Liu, Xiaoyang; Chen, Wenqing; Mi, Qin; Xue, Fuzhong; Su, Yongdong; Jin, Li; Li, Shilin

    2017-05-01

    The applications of DNA profiling aim to identify perpetrators, missing family members and disaster victims in forensic investigations. Single nucleotide polymorphisms (SNPs) based forensic applications are emerging rapidly with a potential to replace short tandem repeats (STRs) based panels which are now being used widely, and there is a need for a well-designed SNP panel to meet such challenge for this transition. Here we present a panel of 175 SNP markers (referred to as Fudan ID Panel or FID), selected from ∼3.6 million SNPs, for the application of personal identification. We optimized and validated FID panel using 729 Chinese individuals using a next generation sequencing (NGS) technology. We showed that the SNPs in the panel possess very high heterozygosity as well as low within- and among-continent differentiations, enabling FID panel exhibit discrimination power in both regional and worldwide populations, with the average match probabilities ranging from 4.77×10 -71 to 1.06×10 -64 across 54 world populations. With the advent of biomedical research, the SNPs connecting physical anthropological, physiological, behavioral and phenotypic traits will be eventually added to the forensic panels that will revolutionize criminal investigation. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. 16 CFR 303.20 - Registered identification numbers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... identification numbers. (a) Registered numbers for use as the required identification in lieu of the name on.... When so used by the person or firm to whom assigned, the use of the numbers shall be construed as..., Federal Trade Commission, 600 Pennsylvania Avenue, NW., Washington, DC 20580, or on the Internet at http...

  6. Testing Delays Resulting in Increased Identification Accuracy in Line-Ups and Show-Ups.

    ERIC Educational Resources Information Center

    Dekle, Dawn J.

    1997-01-01

    Investigated time delays (immediate, two-three days, one week) between viewing a staged theft and attempting an eyewitness identification. Compared lineups to one-person showups in a laboratory analogue involving 412 subjects. Results show that across all time delays, participants maintained a higher identification accuracy with the showup…

  7. 10 CFR 39.15 - Agreement with well owner or operator.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... sealed source becomes lodged in the well, a reasonable effort will be made to recover it. (2) A person... identification plaque, constructed of long lasting material such as stainless steel, brass, bronze, or monel... appropriate; (E) The well name and well identification number(s) or other designation; (F) An identification...

  8. 10 CFR 39.15 - Agreement with well owner or operator.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... sealed source becomes lodged in the well, a reasonable effort will be made to recover it. (2) A person... identification plaque, constructed of long lasting material such as stainless steel, brass, bronze, or monel... appropriate; (E) The well name and well identification number(s) or other designation; (F) An identification...

  9. Results of the ESA study on psychological selection of astronaut candidates for Columbus missions II: Personality assessment

    NASA Astrophysics Data System (ADS)

    Goeters, Klaus-Martin; Fassbender, Christoph

    A unique composition of personality assessment methods was applied to a group of 97 ESA scientists and engineers. This group is highly comparable to real astronaut candidates with respect to age and education. The list of used tests includes personality questionnaires, problem solving in groups as well as a projective technique. The study goals were: 1. Verification of psychometric qualities and applicability of tests to the target group; 2. Search for culture-fair tests by which multi-national European groups can be examined; 3. Identification of test methods by which the adaptability of the candidates to the psycho-social stress of long-duration space flights can be assessed. Based on the empirical findings, a test battery was defined which can be used in the selection of ESA space personnel.

  10. Inclusive education and personal development.

    PubMed

    Leigh, I

    1999-01-01

    Open-ended questionnaires covering mainstream educational experiences and personal development of deaf and hard-of-hearing adults were analyzed. Half of the 34 deaf and hard-of-hearing respondents altered self-labels based on changes in personal definitions rather than audiological changes. Supportive school environments and coping skills contributed to positive perceptions; nonsupportive school environments and being treated as 'different' were viewed negatively. Everyone valued contact with hearing peers. Contact with deaf peers depended on finding those with similar values. Identification with Deaf culture was nonexistent. Most noteworthy, 24 of 34 participants felt caught between the deaf and hearing worlds, indicating the need for niches in both. Implications for educators are that development of self-confidence and comfort with identity may be enhanced by validating the deafness dimension through opportunities for contact with deaf adults and positive relationships with both deaf and hearing peers.

  11. The Reliability of Facial Recognition of Deceased Persons on Photographs.

    PubMed

    Caplova, Zuzana; Obertova, Zuzana; Gibelli, Daniele M; Mazzarelli, Debora; Fracasso, Tony; Vanezis, Peter; Sforza, Chiarella; Cattaneo, Cristina

    2017-09-01

    In humanitarian emergencies, such as the current deceased migrants in the Mediterranean, antemortem documentation needed for identification may be limited. The use of visual identification has been previously reported in cases of mass disasters such as Thai tsunami. This pilot study explores the ability of observers to match unfamiliar faces of living and dead persons and whether facial morphology can be used for identification. A questionnaire was given to 41 students and five professionals in the field of forensic identification with the task to choose whether a facial photograph corresponds to one of the five photographs in a lineup and to identify the most useful features used for recognition. Although the overall recognition score did not significantly differ between professionals and students, the median scores of 78.1% and 80.0%, respectively, were too low to consider this method as a reliable identification method and thus needs to be supported by other means. © 2017 American Academy of Forensic Sciences.

  12. A cost effective FBG-based security fence with fire alarm function

    NASA Astrophysics Data System (ADS)

    Wu, H. J.; Li, S. S.; Lu, X. L.; Wu, Y.; Rao, Y. J.

    2012-02-01

    Fiber Bragg Grating (FBG) is sensitive to the temperature as well when it is measuring the strain change, which is always avoided in most measurement applications. However, in this paper strain/temperature dual sensitivity is utilized to construct a special security fence with a second function of fire threat prediction. In an FBG-based fiber fence configuration, only by characteristics analysis and identification method, it can intelligently distinguish the different effects of personal threats and fires from their different trends of the wavelength drifts. Thus without any additional temperature sensing fittings or other fire alarm systems integrated, a normal perimeter security system can possess a second function of fire prediction, which can not only monitor the intrusion induced by personal actions but also predict fire threats in advance. The experimental results show the effectiveness of the method.

  13. 21 CFR 880.6300 - Implantable radiofrequency transponder system for patient identification and health information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... USE DEVICES General Hospital and Personal Use Miscellaneous Devices § 880.6300 Implantable... identification code is used to access patient identity and corresponding health information stored in a database...

  14. 77 FR 20889 - Proposed Information Collection (Request One-VA Identification Verification Card) Activity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-06

    ... solicits comments on information needed to issue a Personal Identity Verification (PIV) identification card... Personnel Security and Identity Management (07C), Department of Veterans Affairs, 810 Vermont Avenue NW...

  15. 28 CFR 0.85 - General functions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... fingerprints and identification records from criminal justice and other governmental agencies, including fingerprints voluntarily submitted by individuals for personal identification purposes; provide expert testimony in Federal, State and local courts as to fingerprint examinations; and provide fingerprint...

  16. 28 CFR 0.85 - General functions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... fingerprints and identification records from criminal justice and other governmental agencies, including fingerprints voluntarily submitted by individuals for personal identification purposes; provide expert testimony in Federal, State and local courts as to fingerprint examinations; and provide fingerprint...

  17. 28 CFR 0.85 - General functions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... fingerprints and identification records from criminal justice and other governmental agencies, including fingerprints voluntarily submitted by individuals for personal identification purposes; provide expert testimony in Federal, State and local courts as to fingerprint examinations; and provide fingerprint...

  18. 28 CFR 0.85 - General functions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... fingerprints and identification records from criminal justice and other governmental agencies, including fingerprints voluntarily submitted by individuals for personal identification purposes; provide expert testimony in Federal, State and local courts as to fingerprint examinations; and provide fingerprint...

  19. [Problems in organization of medical criminological registration and personality identification for subjects occupationally exposed to life risk].

    PubMed

    Shcherbakov, V V

    2000-01-01

    The paper discusses problems in organization of identification studies under conditions of mass deaths as exemplified by forensic medical records of medical criminological identification studies of subjects killed during war conflict in Chechnya. The evolution of the organization model of identification studies is shown transformation of organization philosophy, formation of expert algorithms, formalization and technologic realization of expert solutions.

  20. Geovisualization of Local and Regional Migration Using Web-mined Demographics

    NASA Astrophysics Data System (ADS)

    Schuermann, R. T.; Chow, T. E.

    2014-11-01

    The intent of this research was to augment and facilitate analyses, which gauges the feasibility of web-mined demographics to study spatio-temporal dynamics of migration. As a case study, we explored the spatio-temporal dynamics of Vietnamese Americans (VA) in Texas through geovisualization of mined demographic microdata from the World Wide Web. Based on string matching across all demographic attributes, including full name, address, date of birth, age and phone number, multiple records of the same entity (i.e. person) over time were resolved and reconciled into a database. Migration trajectories were geovisualized through animated sprites by connecting the different addresses associated with the same person and segmenting the trajectory into small fragments. Intra-metropolitan migration patterns appeared at the local scale within many metropolitan areas. At the scale of metropolitan area, varying degrees of immigration and emigration manifest different types of migration clusters. This paper presents a methodology incorporating GIS methods and cartographic design to produce geovisualization animation, enabling the cognitive identification of migration patterns at multiple scales. Identification of spatio-temporal patterns often stimulates further research to better understand the phenomenon and enhance subsequent modeling.

  1. Usefullness of palatal rugae patterns in establishing identity: Preliminary results from Bengaluru city, India.

    PubMed

    Indira, Ap; Gupta, Manish; David, Maria Priscilla

    2012-01-01

    Palatal rugoscopy is the name given to the study of palatal rugae. Rugae pattern are widely considered to remain unchanged during an individual's lifetime. The rugae pattern has the potential to remain intact by virtue of their internal position in the head when most other anatomical structures are destroyed or burned. Moreover, rugae pattern are considered to be unique similar to fingerprints and are advocated in personal identification. The purpose of the study is to establish, individual identity using palatal rugae patterns. The study group consisted of 100 study models all of whom were subjects above 14 years old. Martin dos Santos' classification was followed based on form and position to assess the individuality of rugae pattern. Each individual had different rugae patterns including dizygous twins and the rugae patterns were not symmetrical, both in number and in its distribution. The preliminary study undertaken here shows no two palates are alike in terms of their rugae pattern. Palatal rugae possess unique characteristics as they are absolutely individualistic and therefore, can be used as a personal soft-tissue 'oral' print for identification in forensic cases.

  2. De-identification of health records using Anonym: effectiveness and robustness across datasets.

    PubMed

    Zuccon, Guido; Kotzur, Daniel; Nguyen, Anthony; Bergheim, Anton

    2014-07-01

    Evaluate the effectiveness and robustness of Anonym, a tool for de-identifying free-text health records based on conditional random fields classifiers informed by linguistic and lexical features, as well as features extracted by pattern matching techniques. De-identification of personal health information in electronic health records is essential for the sharing and secondary usage of clinical data. De-identification tools that adapt to different sources of clinical data are attractive as they would require minimal intervention to guarantee high effectiveness. The effectiveness and robustness of Anonym are evaluated across multiple datasets, including the widely adopted Integrating Biology and the Bedside (i2b2) dataset, used for evaluation in a de-identification challenge. The datasets used here vary in type of health records, source of data, and their quality, with one of the datasets containing optical character recognition errors. Anonym identifies and removes up to 96.6% of personal health identifiers (recall) with a precision of up to 98.2% on the i2b2 dataset, outperforming the best system proposed in the i2b2 challenge. The effectiveness of Anonym across datasets is found to depend on the amount of information available for training. Findings show that Anonym compares to the best approach from the 2006 i2b2 shared task. It is easy to retrain Anonym with new datasets; if retrained, the system is robust to variations of training size, data type and quality in presence of sufficient training data. Crown Copyright © 2014. Published by Elsevier B.V. All rights reserved.

  3. [The coordination of the forensic medical service with the medical criminology subdivisions of internal affairs organs in the personal identification of unidentified corpses].

    PubMed

    Pashinian, G A; Tuchik, E S

    1997-01-01

    In order to improve the cooperation between medical criminology departments of the organs of home affairs and forensic medical service in personality identification of unidentified corpses, the authors propose amendments to the routine procedure regulated by documents of the Ministry of Home Affairs of the Russian Federation, for these documents are in need of serious correction and revision, so that they conform to the judicial legislation and other documents.

  4. Implant bone integration importance in forensic identification.

    PubMed

    De Angelis, Danilo; Cattaneo, Cristina

    2015-03-01

    Odontological identification consists of the comparison of antemortem dental information regarding a missing person with postmortem data from an unidentified corpse or human remains. Usually, the comparison concerns morphologic features that the operator chooses among all the visible characteristics because of inter-individual uniqueness; for this reason, implants can be of enormous assistance. A case concerning the recovery of a burnt oral implant, connected to a bone fragment, among 2780 charred bone fragments, suspected to have belonged to a victim of homicide, is presented to demonstrate that dental implants and their site of bone integration represent a very precious element for personal forensic identification. Because of their morphological invariability in time and because of their morphologic uniqueness, they were used as evidence to associate unidentified human charred remains to a missing person where DNA analysis failed to do so. The case illustrates the fundamental contribution, not yet described in literature, given by the clinical aspects of tooth replacement with dental implants to a forensic discipline. Clinical practitioners should therefore be aware of the great importance of their work and of dental records in a forensic identification scenario. © 2014 American Academy of Forensic Sciences.

  5. Identification and human condition analysis based on the human voice analysis

    NASA Astrophysics Data System (ADS)

    Mieshkov, Oleksandr Yu.; Novikov, Oleksandr O.; Novikov, Vsevolod O.; Fainzilberg, Leonid S.; Kotyra, Andrzej; Smailova, Saule; Kozbekova, Ainur; Imanbek, Baglan

    2017-08-01

    The paper presents a two-stage biotechnical system for human condition analysis that is based on analysis of human voice signal. At the initial stage, the voice signal is pre-processed and its characteristics in time domain are determined. At the first stage, the developed system is capable of identifying the person in the database on the basis of the extracted characteristics. At the second stage, the model of a human voice is built on the basis of the real voice signals after clustering the whole database.

  6. 19 CFR 207.11 - Contents of petition.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., phone number, and contact person(s) for each producer; (iii) A listing of all U.S. importers of the subject merchandise, including street addresses and phone numbers for each importer; (iv) Identification...

  7. Personal Identification Using Fingernail Image Based on Correlation of Density Block

    NASA Astrophysics Data System (ADS)

    Noda, Mayumi; Saitoh, Fumihiko

    This paper proposes an authentication using fingernail images by using the block segmentation matching. A fingernail is assumed to be a new physical character that is used for biometrics authentication. The proposed system is more effective than fingerprint authentication where psychological resistance and conformability are required. Since the block segmentation matching is useful for occlusion of an object, it is assumed to be robust to a partial change of fingernail. It is expected to enhance the difference of fingernails between persons. The experimental images of various lengths of fingernail and painted manicure were used for evaluation of system performance. The experimental results show that the proposed system obtains the sufficient accuracy to certificate individuals.

  8. Deep Gaze Velocity Analysis During Mammographic Reading for Biometric Identification of Radiologists

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yoon, Hong-Jun; Alamudun, Folami T.; Hudson, Kathy

    Several studies have confirmed that the gaze velocity of the human eye can be utilized as a behavioral biometric or personalized biomarker. In this study, we leverage the local feature representation capacity of convolutional neural networks (CNNs) for eye gaze velocity analysis as the basis for biometric identification of radiologists performing breast cancer screening. Using gaze data collected from 10 radiologists reading 100 mammograms of various diagnoses, we compared the performance of a CNN-based classification algorithm with two deep learning classifiers, deep neural network and deep belief network, and a previously presented hidden Markov model classifier. The study showed thatmore » the CNN classifier is superior compared to alternative classification methods based on macro F1-scores derived from 10-fold cross-validation experiments. Our results further support the efficacy of eye gaze velocity as a biometric identifier of medical imaging experts.« less

  9. Identity configurations: a new perspective on identity formation in contemporary society.

    PubMed

    Schachter, Elli P

    2004-02-01

    This paper deals with the theoretical construct of "identity configuration." It portrays the different possible ways in which individuals configure the relationship among potentially conflicting identifications in the process of identity formation. In order to explicate these configurations, I analyzed narratives of identity development retold by individuals describing personal identity conflicts that arise within a larger context of sociocultural conflict. Thirty Jewish modern orthodox young adults were interviewed regarding a potentially conflictual identity issue (i.e. their religious and sexual development). Their deliberations, as described in the interviews, were examined, and four different configurations were identified: a configuration based on choice and suppression; an assimilative and synthesizing configuration; a confederacy of identifications; and a configuration based on the thrill of dissonance. The different configurations are illustrated through exemplars, and the possible implications of the concept of "configuration" for identity theory are discussed.

  10. Deep Gaze Velocity Analysis During Mammographic Reading for Biometric Identification of Radiologists

    DOE PAGES

    Yoon, Hong-Jun; Alamudun, Folami T.; Hudson, Kathy; ...

    2018-01-24

    Several studies have confirmed that the gaze velocity of the human eye can be utilized as a behavioral biometric or personalized biomarker. In this study, we leverage the local feature representation capacity of convolutional neural networks (CNNs) for eye gaze velocity analysis as the basis for biometric identification of radiologists performing breast cancer screening. Using gaze data collected from 10 radiologists reading 100 mammograms of various diagnoses, we compared the performance of a CNN-based classification algorithm with two deep learning classifiers, deep neural network and deep belief network, and a previously presented hidden Markov model classifier. The study showed thatmore » the CNN classifier is superior compared to alternative classification methods based on macro F1-scores derived from 10-fold cross-validation experiments. Our results further support the efficacy of eye gaze velocity as a biometric identifier of medical imaging experts.« less

  11. 31 CFR 359.31 - What definitive Series I savings bonds are included in the computation?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... registered in the name of and bearing the taxpayer identification number (TIN) of that person alone or as co... bearing that person's TIN; and (c) All gift bonds registered in the name of that person but bearing the TIN of the purchaser. ...

  12. 31 CFR 359.31 - What definitive Series I savings bonds are included in the computation?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... registered in the name of and bearing the taxpayer identification number (TIN) of that person alone or as co... bearing that person's TIN; and (c) All gift bonds registered in the name of that person but bearing the TIN of the purchaser. ...

  13. Stigma as a barrier to recognizing personal mental illness and seeking help: a prospective study among untreated persons with mental illness.

    PubMed

    Schomerus, Georg; Stolzenburg, Susanne; Freitag, Simone; Speerforck, Sven; Janowitz, Deborah; Evans-Lacko, Sara; Muehlan, Holger; Schmidt, Silke

    2018-04-20

    It is unclear to what extent failure to recognize symptoms as potential sign of a mental illness is impeding service use, and how stigmatizing attitudes interfere with this process. In a prospective study, we followed a community sample of 188 currently untreated persons with mental illness (predominantly depression) over 6 months. We examined how lack of knowledge, prejudice and discrimination impacted on self-identification as having a mental illness, perceived need, intention to seek help, and help-seeking, both with respect to primary care (visiting a general practitioner, GP) and specialist care (seeing a mental health professional, MHP). 67% sought professional help within 6 months. Fully saturated path models accounting for baseline depressive symptoms, previous treatment experience, age and gender showed that self-identification predicted need (beta 0.32, p < 0.001), and need predicted intention (GP: beta 0.45, p < 0.001; MHP: beta 0.38, p < 0.001). Intention predicted service use with a MHP after 6 months (beta 0.31, p < 0.01; GP: beta 0.17, p = 0.093). More knowledge was associated with more self-identification (beta 0.21, p < 0.01), while support for discrimination was associated with lower self-identification (beta - 0.14, p < 0.05). Blaming persons with mental illness for their problem was associated with lower perceived need (beta - 0.16, p < 0.05). Our models explained 37% of the variance of seeking help with a MHP, and 33% of help-seeking with a GP. Recognizing one's own mental illness and perceiving a need for help are impaired by lack of knowledge, prejudice, and discrimination. Self-identification is a relevant first step when seeking help for mental disorders.

  14. FEASIBILITY STUDY FOR IDENTIFICATION OF STATIC AND DYNAMIC EXPOSURE USING CCD IMAGING TECHNIQUE FOR Caso4:Dy TL DOSEMETERS.

    PubMed

    Srivastava, Kshama; Soin, Seepika; Sapra, B K; Ratna, P; Datta, D

    2017-11-01

    The occupational exposure incurred by the radiation workers due to the external radiation is estimated using personal dosemeter placed on the human body during the monitoring period. In certain situations, it is required to determine whether the dosemeter alone was exposed accidentally/intentionally in radiation field (static exposure) or was exposed while being worn by a worker moving in his workplace (dynamic exposure). The present thermoluminscent (TL) based personnel monitoring systems are not capable of distinguishing between the above stated (static and dynamic) exposure conditions. The feasibility of a new methodology developed using the charge coupled device based imaging technique for identification of the static/dynamic exposure of CaSO4:Dy based TL detectors for low energy photons has been investigated. The techniques for the qualitative and the quantitative assessments of the exposure conditions are presented in this paper. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  15. Lessons Learned from Development of De-identification System for Biomedical Research in a Korean Tertiary Hospital

    PubMed Central

    Shin, Soo-Yong; Lyu, Yongman; Shin, Yongdon; Choi, Hyo Joung; Park, Jihyun; Kim, Woo-Sung

    2013-01-01

    Objectives The Korean government has enacted two laws, namely, the Personal Information Protection Act and the Bioethics and Safety Act to prevent the unauthorized use of medical information. To protect patients' privacy by complying with governmental regulations and improve the convenience of research, Asan Medical Center has been developing a de-identification system for biomedical research. Methods We reviewed Korean regulations to define the scope of the de-identification methods and well-known previous biomedical research platforms to extract the functionalities of the systems. Based on these review results, we implemented necessary programs based on the Asan Medical Center Information System framework which was built using the Microsoft. NET Framework and C#. Results The developed de-identification system comprises three main components: a de-identification tool, a search tool, and a chart review tool. The de-identification tool can substitute a randomly assigned research ID for a hospital patient ID, remove the identifiers in the structured format, and mask them in the unstructured format, i.e., texts. This tool achieved 98.14% precision and 97.39% recall for 6,520 clinical notes. The search tool can find the number of patients which satisfies given search criteria. The chart review tool can provide de-identified patient's clinical data for review purposes. Conclusions We found that a clinical data warehouse was essential for successful implementation of the de-identification system, and this system should be tightly linked to an electronic Institutional Review Board system for easy operation of honest brokers. Additionally, we found that a secure cloud environment could be adopted to protect patients' privacy more thoroughly. PMID:23882415

  16. 21 CFR 880.5025 - I.V. container.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... GENERAL HOSPITAL AND PERSONAL USE DEVICES General Hospital and Personal Use Therapeutic Devices § 880.5025 I.V. container. (a) Identification. An I.V. container is a container made of plastic or glass used...

  17. Connecting Self-Esteem and Achievement: Diversity in Academic Identification and Dis-Identification Patterns among Black College Students

    ERIC Educational Resources Information Center

    Hope, Elan C.; Chavous, Tabbye M.; Jagers, Robert J.; Sellers, Robert M.

    2013-01-01

    Using a person-oriented approach, we explored patterns of self-esteem and achievement among 324 Black college students across the freshman college year and identified four academic identification profiles. Multivariate analyses revealed profile differences in academic and psychological outcomes at beginning and end of freshman year (academic…

  18. RFID applications in transportation operation and intelligent transportation systems (ITS).

    DOT National Transportation Integrated Search

    2009-06-01

    Radio frequency identification (RFID) transmits the identity of an object or a person wirelessly. It is grouped under : the broad category of automatic identification technologies with corresponding standards and established protocols. : RFID is suit...

  19. Identification of Intellectually Able Disadvantaged Filipino Children.

    ERIC Educational Resources Information Center

    Naval-Severino, Teresita

    1992-01-01

    Preschool Filipino children from disadvantaged urban communities were assessed for giftedness. This article describes the identification procedures and tools used and presents a profile of the children in terms of socioeconomic, intellectual, and personality variables. (Author/JDD)

  20. 21 CFR 880.6300 - Implantable radiofrequency transponder system for patient identification and health information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL... identification code is used to access patient identity and corresponding health information stored in a database...

  1. 21 CFR 880.6300 - Implantable radiofrequency transponder system for patient identification and health information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL... identification code is used to access patient identity and corresponding health information stored in a database...

  2. 21 CFR 880.6300 - Implantable radiofrequency transponder system for patient identification and health information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL... identification code is used to access patient identity and corresponding health information stored in a database...

  3. 21 CFR 880.6300 - Implantable radiofrequency transponder system for patient identification and health information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL... identification code is used to access patient identity and corresponding health information stored in a database...

  4. How variations in distance affect eyewitness reports and identification accuracy.

    PubMed

    Lindsay, R C L; Semmler, Carolyn; Weber, Nathan; Brewer, Neil; Lindsay, Marilyn R

    2008-12-01

    Witnesses observe crimes at various distances and the courts have to interpret their testimony given the likely quality of witnesses' views of events. We examined how accurately witnesses judged the distance between themselves and a target person, and how distance affected description accuracy, choosing behavior, and identification test accuracy. Over 1,300 participants were approached during normal daily activities, and asked to observe a target person at one of a number of possible distances. Under a Perception, Immediate Memory, or Delayed Memory condition, witnesses provided a brief description of the target, estimated the distance to the target, and then examined a 6-person target-present or target-absent lineup to see if they could identify the target. Errors in distance judgments were often substantial. Description accuracy was mediocre and did not vary systematically with distance. Identification choosing rates were not affected by distance, but decision accuracy declined with distance. Contrary to previous research, a 15-m viewing distance was not critical for discriminating accurate from inaccurate decisions.

  5. Toward a Personalized Science of Emotion Regulation

    PubMed Central

    Doré, Bruce P.; Silvers, Jennifer A.; Ochsner, Kevin N.

    2018-01-01

    The ability to successfully regulate emotion plays a key role in healthy development and the maintenance of psychological well-being. Although great strides have been made in understanding the nature of regulatory processes and the consequences of deploying them, a comprehensive understanding of emotion regulation that can specify what strategies are most beneficial for a given person in a given situation is still a far-off goal. In this review, we argue that moving toward this goal represents a central challenge for the future of the field. As an initial step, we propose a concrete framework that (i) explicitly considers emotion regulation as an interaction of person, situation, and strategy, (ii) assumes that regulatory effects vary according to these factors, and (iii) sets as a primary scientific goal the identification of person-, situation-, and strategy-based contingencies for successful emotion regulation. Guided by this framework, we review current questions facing the field, discuss examples of contextual variation in emotion regulation success, and offer practical suggestions for continued progress in this area. PMID:29750085

  6. The potential of a self-assessment tool to identify healthcare professionals' strengths and areas in need of professional development to aid effective facilitation of group-based, person-centered diabetes education.

    PubMed

    Stenov, Vibeke; Wind, Gitte; Skinner, Timothy; Reventlow, Susanne; Hempler, Nana Folmann

    2017-09-18

    Healthcare professionals' person-centered communication skills are pivotal for successful group-based diabetes education. However, healthcare professionals are often insufficiently equipped to facilitate person-centeredness and many have never received post-graduate training. Currently, assessing professionals' skills in conducting group-based, person-centered diabetes education primarily focus on experts measuring and coding skills on various scales. However, learner-centered approaches such as adequate self-reflective tools have been shown to emphasize professional autonomy and promote engagement. The aim of this study was to explore the potential of a self-assessment tool to identify healthcare professionals' strengths and areas in need of professional development to aid effective facilitation of group-based, person-centered diabetes education. The study entails of two components: 1) Field observations of five different educational settings including 49 persons with diabetes and 13 healthcare professionals, followed by interviews with 5 healthcare professionals and 28 persons with type 2 diabetes. 2) One professional development workshop involving 14 healthcare professionals. Healthcare professionals were asked to assess their person-centered communication skills using a self-assessment tool based on challenges and skills related to four educator roles: Embracer, Facilitator, Translator, and Initiator. Data were analyzed by hermeneutic analysis. Theories derived from theoretical model 'The Health Education Juggler' and techniques from 'Motivational Interviewing in Groups' were used as a framework to analyze data. Subsequently, the analysis from the field notes and interview transcript were compared with healthcare professionals' self-assessments of strengths and areas in need to effectively facilitate group-based, person-centered diabetes education. Healthcare professionals self-assessed the Translator and the Embracer to be the two most skilled roles whereas the Facilitator and the Initiator were identified to be the most challenged roles. Self-assessments corresponded to observations of professional skills in educational programs and were confirmed in the interviews. Healthcare professionals self-assessed the same professional skills as observed in practice. Thus, a tool to self-assess professional skills in facilitating group-based diabetes education seems to be useful as a starting point to promote self-reflections and identification of healthcare professionals' strengths and areas of need of professional development.

  7. Hyperspectral Based Skin Detection for Person of Interest Identification

    DTIC Science & Technology

    2015-03-01

    burns, tans minimally. Type III 14-20 Cream white; fair with any hair or eye color ; quite common. Sometimes mild burn, tans uniformly. Type IV 21-27...90 viii List of Figures Figure Page 2.1 Hyperspectral Cube: The colors underneath the image are the different layers. Each...and 1348 nm). Group one has the melanin concentration distribution of 8% or less. Each color line is a sample of a class

  8. Missing people, migrants, identification and human rights.

    PubMed

    Nuzzolese, E

    2012-11-30

    The increasing volume and complexities of migratory flow has led to a range of problems such as human rights issues, public health, disease and border control, and also the regulatory processes. As result of war or internal conflicts missing person cases and management have to be regarded as a worldwide issue. On the other hand, even in peace, the issue of a missing person is still relevant. In 2007 the Italian Ministry of Interior nominated an extraordinary commissar in order to analyse and assess the total number of unidentified recovered bodies and verify the extent of the phenomena of missing persons, reported as 24,912 people in Italy (updated 31 December 2011). Of these 15,632 persons are of foreigner nationalities and are still missing. The census of the unidentified bodies revealed a total of 832 cases recovered in Italy since the year 1974. These bodies/human remains received a regular autopsy and were buried as 'corpse without name". In Italy judicial autopsy is performed to establish cause of death and identity, but odontology and dental radiology is rarely employed in identification cases. Nevertheless, odontologists can substantiate the identification through the 'biological profile' providing further information that can narrow the search to a smaller number of missing individuals even when no ante mortem dental data are available. The forensic dental community should put greater emphasis on the role of the forensic odontology as a tool for humanitarian action of unidentified individuals and best practise in human identification.

  9. Simulation of target interpretation based on infrared image features and psychology principle

    NASA Astrophysics Data System (ADS)

    Lin, Wei; Chen, Yu-hua; Gao, Hong-sheng; Wang, Zhan-feng; Wang, Ji-jun; Su, Rong-hua; Huang, Yan-ping

    2009-07-01

    It's an important and complicated process in target interpretation that target features extraction and identification, which effect psychosensorial quantity of interpretation person to target infrared image directly, and decide target viability finally. Using statistical decision theory and psychology principle, designing four psychophysical experiment, the interpretation model of the infrared target is established. The model can get target detection probability by calculating four features similarity degree between target region and background region, which were plotted out on the infrared image. With the verification of a great deal target interpretation in practice, the model can simulate target interpretation and detection process effectively, get the result of target interpretation impersonality, which can provide technique support for target extraction, identification and decision-making.

  10. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    NASA Astrophysics Data System (ADS)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  11. Development of a biochip-based assay integrated in a global strategy for identification of fusion transcripts in acute myeloid leukemia: a work flow for acute myeloid leukemia diagnosis.

    PubMed

    Giusiano, S; Formisano-Tréziny, C; Benziane, A; Maroc, N; Picard, C; Hermitte, F; Taranger-Charpin, C; Gabert, J

    2010-08-01

    Three major types of rearrangements are involved in acute myeloid leukemias (AML): t(8;21)(q22;q22), inv(16)(p13q22), and 11q23/MLL abnormalities. Their precise identification becomes essential for diagnosis, prognosis, and therapeutic choices. Resulting fusion transcripts (FT) are also powerful markers for monitoring the efficacy of treatment, the minimal residual disease (MRD) and could become therapeutic targets. Today, the challenge is to propose an individual follow-up for each patient even for those with a rare fusion event. In this study, we propose a biochip-based assay integrated in a global strategy for identification of rare FT in AML, after fluorescence in situ hybridization detection, as described by the World Health Organization classification. Using cell lines, we developed and validated a biochip-based assay called the AMLFusionChip that identifies every FT of AML1-ETO, CBFbeta-MYH11 as well as MLL-AF9, MLL-ENL, MLL-AF6, and MLL-AF10. The original design of our AMLFusionChip.v01 enables the identification of these FT wherever the breakpoint on the partner gene may be. In case of biochip negative result, our 3'RACE amplification strategy enables to clone and then sequence the new translocation partner. This AMLFusionChip strategy fits into the concept of personalized medicine for the largest number of patients.

  12. [The details of clinical examination of elders].

    PubMed

    Proshchaev, K I; Il'nitskiĭ, A N; Krivetskiĭ, V V; Varavina, L Iu; Kolpina, L V; Gorelik, S G; Fesenko, V V; Krivtsunov, A N

    2013-01-01

    At present, the ever-increasing number of persons of elderly and senile age does not receive from health and social care agencies sufficient volume of health services and social care they require. This article reveals the essence of such a concept as the phenomenon of senile asthenia. It also describes the characteristic of the algorithm of the specialized geriatric examination of elderly patients, which includes not only traditional but also very important for an elderly person special part, in particular, balance and gait assessment, identification of nutritional status to objectify the syndrome of malnutrition, assessment of mental function, activity level of an elderly person, the state of movement, a detailed identification of the social features of life of an elderly person, the quality of his life. The application of this algorithm will significantly improve the quality of geriatric care provided through the objectification of the pathology in the elderly person and assessment of the volume of medical and social care he needs.

  13. Personalized lifestyle medicine: relevance for nutrition and lifestyle recommendations.

    PubMed

    Minich, Deanna M; Bland, Jeffrey S

    2013-01-01

    Public health recommendations for lifestyle modification, including diet and physical activity, have been widely disseminated for the prevention and treatment of disease. These guidelines are intended for the overall population without significant consideration for the individual with respect to one's genes and environment. Personalized lifestyle medicine is a newly developed term that refers to an approach to medicine in which an individual's health metrics from point-of-care diagnostics are used to develop lifestyle medicine-oriented therapeutic strategies for improving individual health outcomes in managing chronic disease. Examples of the application of personalized lifestyle medicine to patient care include the identification of genetic variants through laboratory tests and/or functional biomarkers for the purpose of designing patient-specific prescriptions for diet, exercise, stress, and environment. Personalized lifestyle medicine can provide solutions to chronic health problems by harnessing innovative and evolving technologies based on recent discoveries in genomics, epigenetics, systems biology, life and behavioral sciences, and diagnostics and clinical medicine. A comprehensive, personalized approach to medicine is required to promote the safety of therapeutics and reduce the cost of chronic disease. Personalized lifestyle medicine may provide a novel means of addressing a patient's health by empowering them with information they need to regain control of their health.

  14. 50 CFR 216.22 - Taking by State or local government officials.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) Identification and curation. The Regional Director will assign a single unique number to each carcass, and the... person if: (i) The person transferring the marine mammal specimen does not receive remuneration for the... person within the United States unless the Regional Director of the appropriate Regional Office of the...

  15. 11 CFR 102.9 - Accounting for contributions and expenditures (2 U.S.C. 432(c)).

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... (ii) A digital image of each check or written instrument. The political committee or other person... of receipt and amount of such contribution. (2) For contributions from any person whose contributions aggregate more than $200 during a calendar year, such account shall include the identification of the person...

  16. Convergence of Personality and Interests: Meta-Analysis of the Multidimensional Personality Questionnaire and the Strong Interest Inventory

    ERIC Educational Resources Information Center

    Staggs, Gena D.; Larson, Lisa M.; Borgen, Fred H.

    2007-01-01

    Using meta-analysis, we revised Ackerman and Heggestad's (1997) identification of four trait complexes that propose personality and interest (P-I) linkages. Studies that had reported correlations between general and specific measures of vocational interests (Strong Interest Inventory [Strong; Hansen & Campbell, 1985; Harmon, Hansen, Borgen,…

  17. Identification of Personality Differences among Various Swimming Ability Groups by Sex. Final Report. CORD Project.

    ERIC Educational Resources Information Center

    Davis, Michael G.; Stewart, Charles W.

    This study investigates 16 personality factors and their relevance to the swimming proficiency of physical education students at Wisconsin State University-River Falls. Two instruments, a swimming skills test and the Cattell Sixteen Personality Factor Questionnaire, were utilized. The major hypotheses tested include: (1) there is no difference…

  18. Colors Identification for Blind People using Cell Phone

    NASA Astrophysics Data System (ADS)

    Dominguez, A. L.; Graffigna, J. P.

    2011-12-01

    Assistive Technology (AT) is an interdisciplinary research area that allows finding solutions to the individual with disability [1] by easing or improving the functions or the skills for accomplishing daily activities. A technology can be considered "assistive" if it is fit for the needs, skills and capabilities of the person, taking into account mainly the intended activity and the limitations of the context and environs where the person performs such activity. The current work intends to solve the problems of vision impaired persons to recognize colors. To this aim, a Java application for cell phones has been made which lets complement the mobiles' technology with that of image processing. The means to obtain the colors from a view are based on analysing the different color models join to a mechanism to reduce the collected data. This paper describes preliminary experiences, methodology and results considering the user perception.

  19. Finger vein recognition with personalized feature selection.

    PubMed

    Xi, Xiaoming; Yang, Gongping; Yin, Yilong; Meng, Xianjing

    2013-08-22

    Finger veins are a promising biometric pattern for personalized identification in terms of their advantages over existing biometrics. Based on the spatial pyramid representation and the combination of more effective information such as gray, texture and shape, this paper proposes a simple but powerful feature, called Pyramid Histograms of Gray, Texture and Orientation Gradients (PHGTOG). For a finger vein image, PHGTOG can reflect the global spatial layout and local details of gray, texture and shape. To further improve the recognition performance and reduce the computational complexity, we select a personalized subset of features from PHGTOG for each subject by using the sparse weight vector, which is trained by using LASSO and called PFS-PHGTOG. We conduct extensive experiments to demonstrate the promise of the PHGTOG and PFS-PHGTOG, experimental results on our databases show that PHGTOG outperforms the other existing features. Moreover, PFS-PHGTOG can further boost the performance in comparison with PHGTOG.

  20. Finger Vein Recognition with Personalized Feature Selection

    PubMed Central

    Xi, Xiaoming; Yang, Gongping; Yin, Yilong; Meng, Xianjing

    2013-01-01

    Finger veins are a promising biometric pattern for personalized identification in terms of their advantages over existing biometrics. Based on the spatial pyramid representation and the combination of more effective information such as gray, texture and shape, this paper proposes a simple but powerful feature, called Pyramid Histograms of Gray, Texture and Orientation Gradients (PHGTOG). For a finger vein image, PHGTOG can reflect the global spatial layout and local details of gray, texture and shape. To further improve the recognition performance and reduce the computational complexity, we select a personalized subset of features from PHGTOG for each subject by using the sparse weight vector, which is trained by using LASSO and called PFS-PHGTOG. We conduct extensive experiments to demonstrate the promise of the PHGTOG and PFS-PHGTOG, experimental results on our databases show that PHGTOG outperforms the other existing features. Moreover, PFS-PHGTOG can further boost the performance in comparison with PHGTOG. PMID:23974154

  1. A passive RFID-based location system for personnel and asset monitoring.

    PubMed

    Hsiao, Rong-Shue; Kao, Chun-Hao; Chen, Tian-Xiang; Chen, Jui-Lun

    2018-01-01

    Typical radio frequency identification (RFID) access control system can be ineffective if an unauthorized person tailgates an authorized person through an access area. To propose a system by using indoor locating and tracking techniques address this problem, which is to prevent unauthorized Alzheimer's and dementia patients from getting lost including by tailgating. To achieve accurate target location, passive RFID deployment strategy is studied and a fingerprinting based passive RFID localization algorithm is proposed. The proposed system was evaluated in a building environment to simulate the performance of access control. RFID reader was installed on ceiling near the access area and tags were stitched on both shoulders of the experiment subject's garments. The probability of the error distance within 0.3 m achieved 97% in the warning area; the location precision achieved 97% within 0.4 m in the monitoring area. The result showed that if an unauthorized person enters the restricted area, the system can initiate an alert signal accurately. Therefore, the proposed system is very suitable to be used in nursing home or hospital to prevent unauthorized personnel and assets entering/exiting a confined location.

  2. A Typology of Social Workers in Long-Term Care Facilities in Israel.

    PubMed

    Lev, Sagit; Ayalon, Liat

    2018-04-01

    This article explores moral distress among long-term care facility (LTCF) social workers by examining the relationships between moral distress and environmental and personal features. Based on these features, authors identified a typology of LTCF social workers and how they handle moral distress. Such a typology can assist in the identification of social workers who are in a particular need for assistance. Overall, 216 LTCF social workers took part in the study. A two-step cluster analysis was conducted to identify a typology of LTCF social workers based on features such as ethical environment, support in workplace, mastery, and resilience. The variance of the identified clusters and their associations with moral distress were examined, and four clusters of LTCF social workers were identified. The clusters varied from each other in relation to their personal and environmental features and in relation to their experience of moral distress. The article concludes with a discussion of the importance of developing programs for LTCF social workers that provide support and enhancement of personal resources and an adequate and ethical environment for practice.

  3. The Importance of the Eye Area in Face Identification Abilities and Visual Search Strategies in Persons with Asperger Syndrome

    ERIC Educational Resources Information Center

    Falkmer, Marita; Larsson, Matilda; Bjallmark, Anna; Falkmer, Torbjorn

    2010-01-01

    Partly claimed to explain social difficulties observed in people with Asperger syndrome, face identification and visual search strategies become important. Previous research findings are, however, disparate. In order to explore face identification abilities and visual search strategies, with special focus on the importance of the eye area, 24…

  4. Assessment of response consistency and respective participant profiles in the Internet-based NutriNet-Santé Cohort.

    PubMed

    Andreeva, Valentina A; Galan, Pilar; Julia, Chantal; Castetbon, Katia; Kesse-Guyot, Emmanuelle; Hercberg, Serge

    2014-04-01

    Whereas the feasibility and effectiveness of Internet-based epidemiologic research have been established, methodological support for the quality of such data is still accumulating. We aimed to identify sociodemographic differences among members of a French cohort according to willingness to provide part of one's 15-digit national identification number (personal Social Security number (PSSN)) and to assess response consistency based on information reported on the sociodemographic questionnaire and that reflected in the PSSN. We studied 100,118 persons enrolled in an Internet-based prospective cohort study, the NutriNet-Santé Study, between 2009 and 2013. Persons aged 18 years or more who resided in France and had Internet access were eligible for enrollment. The sociodemographic profiles of participants with discordant data were compared against those of participants with concordant data via 2-sided polytomous logistic regression. In total, 84,442 participants (84.3%) provided the first 7 digits of their PSSN, and among them 5,141 (6.1%) had discordant data. Our multivariate analysis revealed differences by sex, age, education, and employment as regards response consistency patterns. The results support the quality of sociodemographic data obtained online from a large and diverse volunteer sample. The quantitative description of participant profiles according to response consistency patterns could inform future methodological work in e-epidemiology.

  5. When I equals we: exploring the relation between social and personal identity of extreme right-wing political party members.

    PubMed

    Baray, Gamze; Postmes, Tom; Jetten, Jolanda

    2009-12-01

    This paper introduces the concept of self-defining groups to explain how personal and social aspects of identity relate to each other among members of an extreme right-wing political party. Two studies were conducted. Study 1 examined how affiliation with a social group that has clear-cut, rigid norms and values affects the personal and social self-concept. Participants were members of a (self-defining) Turkish nationalist organisation (N=66) and a control group of Turkish university students (N=58). Paradoxically, high levels of national identification were associated with stronger personal identity. Study 2 used the same participant population (N=177) and manipulated self-focused attention by means of a mirror. Self-aware members reported the highest levels of identification with the nationalist organisation. Results suggest that members of this groups show no signs of 'vanishing individuality': although boundaries between personal and social identities are blurred, extremist group members retain a distinct and strengthened sense of personal identity. This raises some interesting questions for the concept of personal identity and how it can be informed by the content of one's social identity.

  6. Evaluating the Implementation and Feasibility of a Web-Based Tool to Support Timely Identification and Care for the Frail Population in Primary Healthcare Settings.

    PubMed

    Lawson, Beverley; Sampalli, Tara; Wood, Stephanie; Warner, Grace; Moorhouse, Paige; Gibson, Rick; Mallery, Laurie; Burge, Fred; Bedford, Lisa G

    2017-03-07

    Understanding and addressing the needs of frail persons is an emerging health priority for Nova Scotia and internationally. Primary healthcare (PHC) providers regularly encounter frail persons in their daily clinical work. However, routine identification and measurement of frailty is not standard practice and, in general, there is a lack of awareness about how to identify and respond to frailty. A web-based tool called the Frailty Portal was developed to aid in identifying, screening, and providing care for frail patients in PHC settings. In this study, we will assess the implementation feasibility and impact of the Frailty Portal to: (1) support increased awareness of frailty among providers and patients, (2) identify the degree of frailty within individual patients, and (3) develop and deliver actions to respond to frailtyl in community PHC practice. This study will be approached using a convergent mixed method design where quantitative and qualitative data are collected concurrently, in this case, over a 9-month period, analyzed separately, and then merged to summarize, interpret and produce a more comprehensive understanding of the initiative's feasibility and scalability. Methods will be informed by the 'Implementing the Frailty Portal in Community Primary Care Practice' logic model and questions will be guided by domains and constructs from an implementation science framework, the Consolidated Framework for Implementation Research (CFIR). The 'Frailty Portal' aims to improve access to, and coordination of, primary care services for persons experiencing frailty. It also aims to increase primary care providers' ability to care for patients in the context of their frailty. Our goal is to help optimize care in the community by helping community providers gain the knowledge they may lack about frailty both in general and in their practice, support improved identification of frailty with the use of screening tools, offer evidence based severity-specific care goals and connect providers with local available community supports. © 2017 The Author(s); Published by Kerman University of Medical Sciences. This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

  7. 47 CFR 2.954 - Identification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Identification. 2.954 Section 2.954 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL... subject only to verification shall be uniquely identified by the person responsible for marketing or...

  8. 47 CFR 2.954 - Identification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Identification. 2.954 Section 2.954 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL... subject only to verification shall be uniquely identified by the person responsible for marketing or...

  9. Anorexia Nervosa and First-Person Perspective: Altruism, Family System, and Body Experience.

    PubMed

    Englebert, Jérôme; Follet, Valérie; Valentiny, Caroline

    2018-01-01

    Based on the case study of Jeanne, the objective of this article is to study patterns of specific subjectivity in anorexic subjects. We seek to identify, in a first-person perspective, the core vulnerability features of anorexic existence, beyond the dimension of food alone. The identification of a psychopathological structure results in a better understanding of Jeanne's clinical situation and helps formulate psychotherapeutic and prophylactic recommendations. We suggest that so-called "denial" is a psychological mechanism that should be reconsidered. Denial is not a mechanism pertaining to anorexic subjects alone, but is also a process encountered both in the patient's family and in the therapeutic environment. Anorexic denial is based on anosognosia and the refusal to see one's own thinness, while other people's denial consists in a widespread inability to perceive the altruism and intersubjective problematic on which the existence of an anorexic subject fundamentally depends. © 2017 S. Karger AG, Basel.

  10. First steps in designing an all-in-one ICT-based device for persons with cognitive impairment: evaluation of the first mock-up.

    PubMed

    Boman, Inga-Lill; Persson, Ann-Christine; Bartfai, Aniko

    2016-03-07

    This project Smart Assisted Living involving Informal careGivers++ (SALIG) intends to develop an ICT-based device for persons with cognitive impairment combined with remote support possibilities for significant others and formal caregivers. This paper presents the identification of the target groups' needs and requirements of such device and the evaluation of the first mock-up, demonstrated in a tablet. The inclusive design method that includes end-users in the design process was chosen. First, a scoping review was conducted in order to examine the target group's need of an ICT-based device, and to gather recommendations regarding its design and functionalities. In order to capture the users' requirements of the design and functionalities of the device three targeted focus groups were conducted. Based on the findings from the publications and the focus groups a user requirement specification was developed. After that a design concept and a first mock-up was developed in an iterative process. The mock-up was evaluated through interviews with persons with cognitive impairment, health care professionals and significant others. Data were analysed using content analysis. Several useful recommendations of the design and functionalities of the SALIG device for persons with cognitive impairment were identified. The main benefit of the mock-up was that it was a single device with a set of functionalities installed on a tablet and designed for persons with cognitive impairment. An additional benefit was that it could be used remotely by significant others and formal caregivers. The SALIG device has the potentials to facilitate everyday life for persons with cognitive impairment, their significant others and the work situation for formal caregivers. The results may provide guidance in the development of different types of technologies for the target population and for people with diverse disabilities. Further work will focus on developing a prototype to be empirically tested by persons with cognitive impairment, their significant others and formal caregivers.

  11. Automatic de-identification of textual documents in the electronic health record: a review of recent research

    PubMed Central

    2010-01-01

    Background In the United States, the Health Insurance Portability and Accountability Act (HIPAA) protects the confidentiality of patient data and requires the informed consent of the patient and approval of the Internal Review Board to use data for research purposes, but these requirements can be waived if data is de-identified. For clinical data to be considered de-identified, the HIPAA "Safe Harbor" technique requires 18 data elements (called PHI: Protected Health Information) to be removed. The de-identification of narrative text documents is often realized manually, and requires significant resources. Well aware of these issues, several authors have investigated automated de-identification of narrative text documents from the electronic health record, and a review of recent research in this domain is presented here. Methods This review focuses on recently published research (after 1995), and includes relevant publications from bibliographic queries in PubMed, conference proceedings, the ACM Digital Library, and interesting publications referenced in already included papers. Results The literature search returned more than 200 publications. The majority focused only on structured data de-identification instead of narrative text, on image de-identification, or described manual de-identification, and were therefore excluded. Finally, 18 publications describing automated text de-identification were selected for detailed analysis of the architecture and methods used, the types of PHI detected and removed, the external resources used, and the types of clinical documents targeted. All text de-identification systems aimed to identify and remove person names, and many included other types of PHI. Most systems used only one or two specific clinical document types, and were mostly based on two different groups of methodologies: pattern matching and machine learning. Many systems combined both approaches for different types of PHI, but the majority relied only on pattern matching, rules, and dictionaries. Conclusions In general, methods based on dictionaries performed better with PHI that is rarely mentioned in clinical text, but are more difficult to generalize. Methods based on machine learning tend to perform better, especially with PHI that is not mentioned in the dictionaries used. Finally, the issues of anonymization, sufficient performance, and "over-scrubbing" are discussed in this publication. PMID:20678228

  12. Automatic de-identification of textual documents in the electronic health record: a review of recent research.

    PubMed

    Meystre, Stephane M; Friedlin, F Jeffrey; South, Brett R; Shen, Shuying; Samore, Matthew H

    2010-08-02

    In the United States, the Health Insurance Portability and Accountability Act (HIPAA) protects the confidentiality of patient data and requires the informed consent of the patient and approval of the Internal Review Board to use data for research purposes, but these requirements can be waived if data is de-identified. For clinical data to be considered de-identified, the HIPAA "Safe Harbor" technique requires 18 data elements (called PHI: Protected Health Information) to be removed. The de-identification of narrative text documents is often realized manually, and requires significant resources. Well aware of these issues, several authors have investigated automated de-identification of narrative text documents from the electronic health record, and a review of recent research in this domain is presented here. This review focuses on recently published research (after 1995), and includes relevant publications from bibliographic queries in PubMed, conference proceedings, the ACM Digital Library, and interesting publications referenced in already included papers. The literature search returned more than 200 publications. The majority focused only on structured data de-identification instead of narrative text, on image de-identification, or described manual de-identification, and were therefore excluded. Finally, 18 publications describing automated text de-identification were selected for detailed analysis of the architecture and methods used, the types of PHI detected and removed, the external resources used, and the types of clinical documents targeted. All text de-identification systems aimed to identify and remove person names, and many included other types of PHI. Most systems used only one or two specific clinical document types, and were mostly based on two different groups of methodologies: pattern matching and machine learning. Many systems combined both approaches for different types of PHI, but the majority relied only on pattern matching, rules, and dictionaries. In general, methods based on dictionaries performed better with PHI that is rarely mentioned in clinical text, but are more difficult to generalize. Methods based on machine learning tend to perform better, especially with PHI that is not mentioned in the dictionaries used. Finally, the issues of anonymization, sufficient performance, and "over-scrubbing" are discussed in this publication.

  13. Benefits of using culturally unfamiliar stimuli in ambiguous emotion identification: A cross-cultural study.

    PubMed

    Koelkebeck, Katja; Kohl, Waldemar; Luettgenau, Julia; Triantafillou, Susanna; Ohrmann, Patricia; Satoh, Shinji; Minoshita, Seiko

    2015-07-30

    A novel emotion recognition task that employs photos of a Japanese mask representing a highly ambiguous stimulus was evaluated. As non-Asians perceive and/or label emotions differently from Asians, we aimed to identify patterns of task-performance in non-Asian healthy volunteers with a view to future patient studies. The Noh mask test was presented to 42 adult German participants. Reaction times and emotion attribution patterns were recorded. To control for emotion identification abilities, a standard emotion recognition task was used among others. Questionnaires assessed personality traits. Finally, results were compared to age- and gender-matched Japanese volunteers. Compared to other tasks, German participants displayed slowest reaction times on the Noh mask test, indicating higher demands of ambiguous emotion recognition. They assigned more positive emotions to the mask than Japanese volunteers, demonstrating culture-dependent emotion identification patterns. As alexithymic and anxious traits were associated with slower reaction times, personality dimensions impacted on performance, as well. We showed an advantage of ambiguous over conventional emotion recognition tasks. Moreover, we determined emotion identification patterns in Western individuals impacted by personality dimensions, suggesting performance differences in clinical samples. Due to its properties, the Noh mask test represents a promising tool in the differential diagnosis of psychiatric disorders, e.g. schizophrenia. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  14. [Dermatoglyphics in the prognostication of constitutional and physical traits in humans].

    PubMed

    Mazur, E S; Sidorenko, A G

    2009-01-01

    The present study was designed to elucidate the relationship between palmar and digital dermatoglyphic patterns and descriptive signs of human appearance based on the results of comprehensive anthropometric examination of 2620 men and 380 women. A battery of different methods were used to statistically treat the results of dactyloscopic records. They demonstrated correlation between skin patterns and external body features that can be used to construct diagnostic models for the purpose of personality identification.

  15. Open source tools for standardized privacy protection of medical images

    NASA Astrophysics Data System (ADS)

    Lien, Chung-Yueh; Onken, Michael; Eichelberg, Marco; Kao, Tsair; Hein, Andreas

    2011-03-01

    In addition to the primary care context, medical images are often useful for research projects and community healthcare networks, so-called "secondary use". Patient privacy becomes an issue in such scenarios since the disclosure of personal health information (PHI) has to be prevented in a sharing environment. In general, most PHIs should be completely removed from the images according to the respective privacy regulations, but some basic and alleviated data is usually required for accurate image interpretation. Our objective is to utilize and enhance these specifications in order to provide reliable software implementations for de- and re-identification of medical images suitable for online and offline delivery. DICOM (Digital Imaging and Communications in Medicine) images are de-identified by replacing PHI-specific information with values still being reasonable for imaging diagnosis and patient indexing. In this paper, this approach is evaluated based on a prototype implementation built on top of the open source framework DCMTK (DICOM Toolkit) utilizing standardized de- and re-identification mechanisms. A set of tools has been developed for DICOM de-identification that meets privacy requirements of an offline and online sharing environment and fully relies on standard-based methods.

  16. Single classifier, OvO, OvA and RCC multiclass classification method in handheld based smartphone gait identification

    NASA Astrophysics Data System (ADS)

    Raziff, Abdul Rafiez Abdul; Sulaiman, Md Nasir; Mustapha, Norwati; Perumal, Thinagaran

    2017-10-01

    Gait recognition is widely used in many applications. In the application of the gait identification especially in people, the number of classes (people) is many which may comprise to more than 20. Due to the large amount of classes, the usage of single classification mapping (direct classification) may not be suitable as most of the existing algorithms are mostly designed for the binary classification. Furthermore, having many classes in a dataset may result in the possibility of having a high degree of overlapped class boundary. This paper discusses the application of multiclass classifier mappings such as one-vs-all (OvA), one-vs-one (OvO) and random correction code (RCC) on handheld based smartphone gait signal for person identification. The results is then compared with a single J48 decision tree for benchmark. From the result, it can be said that using multiclass classification mapping method thus partially improved the overall accuracy especially on OvO and RCC with width factor more than 4. For OvA, the accuracy result is worse than a single J48 due to a high number of classes.

  17. 49 CFR 391.23 - Investigation and inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... following investigations and inquiries with respect to each driver it employs, other than a person who has... previous motor carrier employers should send the information requested. (1) General driver identification... data, including the driver identification information and dates of employment. (2) Take all precautions...

  18. 78 FR 26244 - Updating of Employer Identification Numbers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-06

    ... (including updated application information regarding the name and taxpayer identifying number of the... require these persons to update application information regarding the name and taxpayer identifying number..., Application for Employer Identification Number, requires entities to disclose the name of the EIN applicant's...

  19. Personal Factors in Organizational Identification

    ERIC Educational Resources Information Center

    Hall, Douglas T.; And Others

    1970-01-01

    Results of a study suggested possibility of a process whereby (1) service-oriented individuals are attracted to and recruited by the Forest Service, (2) service-oriented members are likely to identify strongly with the Service, and (3) this identification results in intrinsic need satisfactions. (Author/KJ)

  20. Paper based diagnostics for personalized health care: Emerging technologies and commercial aspects.

    PubMed

    Mahato, Kuldeep; Srivastava, Ananya; Chandra, Pranjal

    2017-10-15

    Personalized health care (PHC) is being appreciated globally to combat clinical complexities underlying various metabolic or infectious disorders including diabetes, cardiovascular, communicable diseases etc. Effective diagnoses majorly depend on initial identification of the causes which are nowadays being practiced in disease-oriented approach, where personal health profile is often overlooked. The adoption of PHC has shown significantly improved diagnoses in various conditions including emergency, ambulatory, and remote area. PHC includes personalized health monitoring (PHM), which is its integral part and may provide valuable information's on various clinical conditions. In PHC, bio-fluids are analyzed using various diagnostic devices including lab based equipment and biosensors. Among all types of biosensing systems, paper based biosensors are commercially attracted due to its portability, easy availability, cheaper manufacturing cost, and transportability. Not only these, various intrinsic properties of paper has facilitated the development of paper based miniaturized sensors, which has recently gained ASSURED (Affordable, Sensitive, Specific, User-friendly, Rapid and Robust, Equipment free, Deliverable to all end-users) status for point of care diagnosis in miniaturized settings. In this review, importance of paper based biosensors and their compatibility for affordable and low cost diagnostics has been elaborated with various examples. Limitations and strategies to overcome the challenges of paper biosensor have also been discussed. We have provided elaborated tables which describe the types, model specifications, sensing mechanisms, target biomarkers, and analytical performance of the paper biosensors with their respective applications in real sample matrices. Different commercial aspects of paper biosensor have also been explained using SWOT (Strength, Weakness, Opportunities, Threats) analysis. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. Issues in Personality Conceptualizations of Addictive Behaviors.

    ERIC Educational Resources Information Center

    Sutker, Patricia B.; Allain, Albert N., Jr.

    1988-01-01

    Describes issues and implications associated with personality conceptualizations of addictive behaviors. Directs attention toward characterizing the sociopolitical climate's effect on identification, evaluation, and management of substance abuse disorders. Explores alcohol and drug use in conceptual schemata encompassing multifactorial,…

  2. Vocational Rehabilitation for Persons with Rheumatoid Arthritis.

    ERIC Educational Resources Information Center

    Allaire, Saralynn H.

    1998-01-01

    Useful vocational rehabilitation strategies for persons with rheumatoid arthritis include (1) management of symptoms and reduction of energy demand; (2) reasonable job accommodations; (3) identification of suitable jobs and necessary training; and (4) enhancement of self-advocacy skills. (SK)

  3. Disarming the Threat to Feminist Identification: An Application of Personal Construct Theory to Measurement and Intervention

    ERIC Educational Resources Information Center

    Moradi, Bonnie; Martin, Annelise; Brewster, Melanie E.

    2012-01-01

    Many individuals endorse feminist values but do not identify as feminist. The present set of studies tests the concept of threat, grounded in G. A. Kelly's personal construct theory of personality, as a potential factor in feminist nonidentification. Study 1 introduces the theoretically grounded "Feminist Threat Index" and evaluates its…

  4. 26 CFR 301.6723-1 - Failure to comply with other information reporting requirements.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... that a person— (A) Include his or her taxpayer identification number (“TIN”) on any return, statement... another person the TIN of such person, or (C) Furnish his or her TIN to another person; (iii) Any requirement contained in the regulations under section 215 that a person— (A) Furnish his or her TIN to...

  5. 26 CFR 301.6723-1 - Failure to comply with other information reporting requirements.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... that a person— (A) Include his or her taxpayer identification number (“TIN”) on any return, statement... another person the TIN of such person, or (C) Furnish his or her TIN to another person; (iii) Any requirement contained in the regulations under section 215 that a person— (A) Furnish his or her TIN to...

  6. 26 CFR 301.6723-1 - Failure to comply with other information reporting requirements.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... that a person— (A) Include his or her taxpayer identification number (“TIN”) on any return, statement... another person the TIN of such person, or (C) Furnish his or her TIN to another person; (iii) Any requirement contained in the regulations under section 215 that a person— (A) Furnish his or her TIN to...

  7. 26 CFR 301.6723-1 - Failure to comply with other information reporting requirements.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... that a person— (A) Include his or her taxpayer identification number (“TIN”) on any return, statement... another person the TIN of such person, or (C) Furnish his or her TIN to another person; (iii) Any requirement contained in the regulations under section 215 that a person— (A) Furnish his or her TIN to...

  8. 26 CFR 301.6723-1 - Failure to comply with other information reporting requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... that a person— (A) Include his or her taxpayer identification number (“TIN”) on any return, statement... another person the TIN of such person, or (C) Furnish his or her TIN to another person; (iii) Any requirement contained in the regulations under section 215 that a person— (A) Furnish his or her TIN to...

  9. 78 FR 39021 - Privacy Act of 1974; Privacy and Civil Liberties Oversight Board; System of Records Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-28

    ... requests or appeals on behalf of other persons or entities; individuals who are the subjects of FOIA or PA... number) information, and proof of identification; names and other information about persons who are the... oversight function. E. To appropriate agencies, entities, and persons when: 1. The Board suspects or has...

  10. A Personalized Risk Stratification Platform for Population Lifetime Healthcare.

    PubMed

    Daowd, Ali; Abidi, Samina Raza; Abusharekh, Ashraf; Abidi, Syed Sibte Raza

    2018-01-01

    Chronic diseases are the leading cause of death worldwide. It is well understood that if modifiable risk factors are targeted, most chronic diseases can be prevented. Lifetime health is an emerging health paradigm that aims to assist individuals to achieve desired health targets, and avoid harmful lifecycle choices to mitigate the risk of chronic diseases. Early risk identification is central to lifetime health. In this paper, we present a digital health-based platform (PRISM) that leverages artificial intelligence, data visualization and mobile health technologies to empower citizens to self-assess, self-monitor and self-manage their overall risk of major chronic diseases and pursue personalized chronic disease prevention programs. PRISM offers risk assessment tools for 5 chronic conditions, 2 psychiatric disorders and 8 different cancers.

  11. Apolipoprotein e4 Is Associated with More Rapid Decline in Odor Identification than in Odor Threshold or Dementia Rating Scale Scores

    ERIC Educational Resources Information Center

    Calhoun-Haney, R.; Murphy, C.

    2005-01-01

    Individuals with the apolipoprotein E e4 genetic risk factor for Alzheimer's disease (AD) show deficits in olfactory function. The purpose of the present study was to examine longitudinally odor identification (odor ID), odor threshold, picture identification, and global cognitive status in allele positive (e4+) and negative (e4-) persons.…

  12. Determination of the biometric characteristics of palatine rugae patterns in Uttar Pradesh population: a cross-sectional study.

    PubMed

    Sekhon, Harjeet Kaur; Sircar, Keya; Singh, Sanjeet; Jawa, Deepti; Sharma, Priyanka

    2014-01-01

    Identification is the establishment of identity of an individual. The basis of dental identification is based on the observation that no two individuals can have same dentition. Palatal rugae are irregular, asymmetric ridges of the mucous membrane extending laterally from the incisive papilla and the anterior part of the palatal raphe. The location of palatal rugae inside the oral cavity confers them with stability even when exposed to high temperatures or trauma. Their resistance to trauma and their apparent unique appearance has suggested their use as a tool for forensic identification. To record the biometric characteristics of shape, size, direction, number and position of palatal rugae and analyze whether palatal rugoscopy can be used as a tool for personal identification and for sex determination. A cross-sectional study. The sample consisted of 100 subjects (50 males, 50 females) between 18 and 25 years. Maxillary impressions were made with elastomeric impression material and dental stone was used to make models. The palatal rugae patterns were traced and analyzed with a magnifying hand lens. The biometric characteristics of number, size, shape, and direction were analyzed using Thomaz and Kotz classification (1983). The casts were coded to blind the examiners about the identity of the subjects. Unpaired t-test and one-way ANOVA using SPSS 19.0 statistical program for Windows. The average number of rugae was slightly more in females. Wavy (44.9%) and curved (41.8%) shapes were more prevalent. Maximum number of rugae was found in E quadrant (40.73%). The average size was 9.221 mm. Most rugae were forwardly directed in both groups. This study concluded that rugae pattern are highly individualistic and can be used as a supplementary method for personal identification and sex determination. Further inter-observer and intra-observer variability were not found to be significant, which further validates the use of rugoscopy as a forensic tool.

  13. High Resolution Ultrasonic Method for 3D Fingerprint Recognizable Characteristics in Biometrics Identification

    NASA Astrophysics Data System (ADS)

    Maev, R. Gr.; Bakulin, E. Yu.; Maeva, A.; Severin, F.

    Biometrics is a rapidly evolving scientific and applied discipline that studies possible ways of personal identification by means of unique biological characteristics. Such identification is important in various situations requiring restricted access to certain areas, information and personal data and for cases of medical emergencies. A number of automated biometric techniques have been developed, including fingerprint, hand shape, eye and facial recognition, thermographic imaging, etc. All these techniques differ in the recognizable parameters, usability, accuracy and cost. Among these, fingerprint recognition stands alone since a very large database of fingerprints has already been acquired. Also, fingerprints are key evidence left at a crime scene and can be used to indentify suspects. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. We introduce a newer development of the ultrasonic fingerprint imaging. The proposed method obtains a scan only once and then varies the C-scan gate position and width to visualize acoustic reflections from any appropriate depth inside the skin. Also, B-scans and A-scans can be recreated from any position using such data array, which gives the control over the visualization options. By setting the C-scan gate deeper inside the skin, distribution of the sweat pores (which are located along the ridges) can be easily visualized. This distribution should be unique for each individual so this provides a means of personal identification, which is not affected by any changes (accidental or intentional) of the fingers' surface conditions. This paper discusses different setups, acoustic parameters of the system, signal and image processing options and possible ways of 3-dimentional visualization that could be used as a recognizable characteristic in biometric identification.

  14. The Things You Do: Internal Models of Others’ Expected Behaviour Guide Action Observation

    PubMed Central

    Schenke, Kimberley C.; Wyer, Natalie A.; Bach, Patric

    2016-01-01

    Predictions allow humans to manage uncertainties within social interactions. Here, we investigate how explicit and implicit person models–how different people behave in different situations–shape these predictions. In a novel action identification task, participants judged whether actors interacted with or withdrew from objects. In two experiments, we manipulated, unbeknownst to participants, the two actors action likelihoods across situations, such that one actor typically interacted with one object and withdrew from the other, while the other actor showed the opposite behaviour. In Experiment 2, participants additionally received explicit information about the two individuals that either matched or mismatched their actual behaviours. The data revealed direct but dissociable effects of both kinds of person information on action identification. Implicit action likelihoods affected response times, speeding up the identification of typical relative to atypical actions, irrespective of the explicit knowledge about the individual’s behaviour. Explicit person knowledge, in contrast, affected error rates, causing participants to respond according to expectations instead of observed behaviour, even when they were aware that the explicit information might not be valid. Together, the data show that internal models of others’ behaviour are routinely re-activated during action observation. They provide first evidence of a person-specific social anticipation system, which predicts forthcoming actions from both explicit information and an individuals’ prior behaviour in a situation. These data link action observation to recent models of predictive coding in the non-social domain where similar dissociations between implicit effects on stimulus identification and explicit behavioural wagers have been reported. PMID:27434265

  15. Gabor filter based fingerprint image enhancement

    NASA Astrophysics Data System (ADS)

    Wang, Jin-Xiang

    2013-03-01

    Fingerprint recognition technology has become the most reliable biometric technology due to its uniqueness and invariance, which has been most convenient and most reliable technique for personal authentication. The development of Automated Fingerprint Identification System is an urgent need for modern information security. Meanwhile, fingerprint preprocessing algorithm of fingerprint recognition technology has played an important part in Automatic Fingerprint Identification System. This article introduces the general steps in the fingerprint recognition technology, namely the image input, preprocessing, feature recognition, and fingerprint image enhancement. As the key to fingerprint identification technology, fingerprint image enhancement affects the accuracy of the system. It focuses on the characteristics of the fingerprint image, Gabor filters algorithm for fingerprint image enhancement, the theoretical basis of Gabor filters, and demonstration of the filter. The enhancement algorithm for fingerprint image is in the windows XP platform with matlab.65 as a development tool for the demonstration. The result shows that the Gabor filter is effective in fingerprint image enhancement technology.

  16. Analysis of enamel rod end patterns on tooth surface for personal identification--ameloglyphics.

    PubMed

    Manjunath, Krishnappa; Sivapathasundharam, Balasundharam; Saraswathi, Thillai R

    2012-05-01

    Ameloglyphics is the study of enamel rod end patterns on a tooth surface. Our aim was to study the in vivo analysis of enamel rod end patterns on tooth surfaces for personal identification. In this study, the maxillary left canine and 1st premolar of 30 men and 30 women were included. The cellulose acetate peel technique was used to record enamel rod endings on tooth surfaces. Photomicrographs of the acetate peel imprint were subjected to VeriFinger Standard SDK v5.0 software for obtaining enamel rod end patterns. All 120 enamel rod end patterns were subjected to visual analysis and biometric analysis. Biometric analysis revealed that the enamel rod end pattern is unique for each tooth in an individual. It shows both intra- and interindividual variation. Enamel rod end patterns were unique between the male and female subjects. Visual analysis showed that wavy branched subpattern was the predominant subpattern observed among examined teeth. Hence, ameloglyphics is a reliable technique for personal identification. © 2012 American Academy of Forensic Sciences.

  17. 45 CFR 3.22 - Request for identification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CONDUCT OF PERSONS AND TRAFFIC ON THE NATIONAL INSTITUTES OF HEALTH FEDERAL ENCLAVE Traffic Regulations § 3.22 Request for... identification card or driver's license): (a) A traffic accident within the enclave; (b) The police officer...

  18. 45 CFR 3.22 - Request for identification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CONDUCT OF PERSONS AND TRAFFIC ON THE NATIONAL INSTITUTES OF HEALTH FEDERAL ENCLAVE Traffic Regulations § 3.22 Request for... identification card or driver's license): (a) A traffic accident within the enclave; (b) The police officer...

  19. 45 CFR 3.22 - Request for identification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Public Welfare Department of Health and Human Services GENERAL ADMINISTRATION CONDUCT OF PERSONS AND TRAFFIC ON THE NATIONAL INSTITUTES OF HEALTH FEDERAL ENCLAVE Traffic Regulations § 3.22 Request for... identification card or driver's license): (a) A traffic accident within the enclave; (b) The police officer...

  20. 45 CFR 3.22 - Request for identification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CONDUCT OF PERSONS AND TRAFFIC ON THE NATIONAL INSTITUTES OF HEALTH FEDERAL ENCLAVE Traffic Regulations § 3.22 Request for... identification card or driver's license): (a) A traffic accident within the enclave; (b) The police officer...

  1. 8 CFR 1235.10 - U.S. Citizen Identification Card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Section 1235.10 Aliens and Nationality EXECUTIVE OFFICE FOR IMMIGRATION REVIEW, DEPARTMENT OF JUSTICE IMMIGRATION REGULATIONS INSPECTION OF PERSONS APPLYING FOR ADMISSION § 1235.10 U.S. Citizen Identification... applicant objects and demands an opportunity to see and rebut the adverse evidence. Any rebuttal...

  2. Best practices for the implementation of the REAL ID Act.

    DOT National Transportation Integrated Search

    2015-10-01

    The REAL ID Act specifies the minimum standards that must be used to produce and issue drivers license and : identification cards that are REAL ID compliant. Beginning in 2020, if a person does not possess a form of : identification that meets REA...

  3. 50 CFR 660.334 - Limited entry permits-endorsements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... status. (iii) After review of the evidence submitted under paragraph (ii), and any additional information... through review of the Identification of Ownership Interest Form that an individual person, partnership, or... discovers through review of the Identification of Ownership Interest Form that a partnership or corporation...

  4. 75 FR 9435 - Agency Information Collection Activities: Existing collection, Comments Requested

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-02

    ... collection for renewal. Three Fingerprint Cards: Arrest and Institution; Applicant; Personal Identification...-0046. (2) The title of the form/collection: Three Fingerprint Cards: Arrest and Institution; Applicant... Integrated Automated Fingerprint Identification System (IAFIS) of the FBI. (5) An estimate of the total...

  5. 14 CFR 45.10 - Marking.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 1 2011-01-01 2011-01-01 false Marking. 45.10 Section 45.10 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT IDENTIFICATION AND REGISTRATION MARKING Identification of Aircraft and Related Products § 45.10 Marking. No person may mark a...

  6. The development and practice of forensic podiatry.

    PubMed

    Vernon, Wesley

    2006-01-01

    Forensic podiatry is a small, but potentially useful specialty using clinical podiatric knowledge for the purpose of person identification. The practice of forensic podiatry began in the early 1970s in Canada and the UK, although supportive research commenced later in the 1990s. Techniques of forensic podiatry include identification from podiatry records, the human footprint, footwear, and the analysis of gait forms captured on Closed Circuit Television Cameras. The most valuable techniques relate to the comparison of the foot impressions inside shoes. Tools to describe, measure and compare foot impressions with footwear wear marks have been developed through research with potential for further development. The role of forensic podiatrists is of particular value when dealing with variable factors relating to the functioning and the shod foot. Case studies demonstrate the approach of podiatrists, in footwear identification, when comparing exemplar with questioned foot impressions. Forensic podiatry practice should be approached cautiously and it is essential for podiatrists undertaking this type of work to understand the context within which the process of person identification takes place.

  7. Party Identification, Contact, Contexts, and Public Attitudes toward Illegal Immigration

    PubMed Central

    Gravelle, Timothy B.

    2016-01-01

    Illegal immigration is a contentious issue on the American policy agenda. To understand the sources of public attitudes toward immigration, social scientists have focused attention on political factors such as party identification; they have also drawn on theories of intergroup contact to argue that contact with immigrants shapes immigration attitudes. Absent direct measures, contextual measures such as respondents’ ethnic milieu or proximity to salient geographic features (such as borders) have been used as proxies of contact. Such a research strategy still leaves the question unanswered – is it contact or context that really matters? Further, which context, and for whom? This article evaluates the effects of party identification, personal contact with undocumented immigrants, and contextual measures (county Hispanic population and proximity to the US–Mexico border) on American attitudes toward illegal immigration. It finds that contextual factors moderate the effects of political party identification on attitudes toward illegal immigration; personal contact has no effect. These findings challenge the assumption that contextual measures act as proxies for interpersonal contact. PMID:27257305

  8. Tongue prints: A novel biometric and potential forensic tool.

    PubMed

    Radhika, T; Jeddy, Nadeem; Nithya, S

    2016-01-01

    Tongue is a vital internal organ well encased within the oral cavity and protected from the environment. It has unique features which differ from individual to individual and even between identical twins. The color, shape, and surface features are characteristic of every individual, and this serves as a tool for identification. Many modes of biometric systems have come into existence such as fingerprint, iris scan, skin color, signature verification, voice recognition, and face recognition. The search for a new personal identification method secure has led to the use of the lingual impression or the tongue print as a method of biometric authentication. Tongue characteristics exhibit sexual dimorphism thus aiding in the identification of the person. Emerging as a novel biometric tool, tongue prints also hold the promise of a potential forensic tool. This review highlights the uniqueness of tongue prints and its superiority over other biometric identification systems. The various methods of tongue print collection and the classification of tongue features are also elucidated.

  9. QuickCash: Secure Transfer Payment Systems

    PubMed Central

    Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen

    2017-01-01

    Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users’ needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties. PMID:28608846

  10. QuickCash: Secure Transfer Payment Systems.

    PubMed

    Alhothaily, Abdulrahman; Alrawais, Arwa; Song, Tianyi; Lin, Bin; Cheng, Xiuzhen

    2017-06-13

    Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users' needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties.

  11. Identification of a Group's Physiological Synchronization with Earth's Magnetic Field.

    PubMed

    Timofejeva, Inga; McCraty, Rollin; Atkinson, Mike; Joffe, Roza; Vainoras, Alfonsas; Alabdulgader, Abdullah A; Ragulskis, Minvydas

    2017-09-01

    A new analysis technique for the evaluation of the degree of synchronization between the physiological state of a group of people and changes in the Earth's magnetic field based on their cardiac inter-beat intervals was developed and validated. The new analysis method was then used to identify clusters of similar synchronization patterns in a group of 20 individuals over a two-week period. The algorithm for the identification of slow wave dynamics for every person was constructed in order to determine meaningful interrelationships between the participants and the local magnetic field data. The results support the hypothesis that the slow wave rhythms in heart rate variability can synchronize with changes in local magnetic field data, and that the degree of synchronization is affected by the quality of interpersonal relationships.

  12. [Literature review of the influences on error rates when identifying equids with transponder and hot-iron branding].

    PubMed

    Campe, Amely; Schulz, Sophia; Bohnet, Willa

    2016-01-01

    Although equids have had to be tagged with a transponder since 2009, breeding associations in Germany disagree as to which method is best suited for identification (with or without hot iron branding). Therefore, the aim of this systematic literature review was to gain an overview of how effective identification is using transponders and hot iron branding and as to which factors influence the success of identification. Existing literature showed that equids can be identified by means of transponders with a probability of 85-100%, whereas symbol brandings could be identified correctly in 78-89%, whole number brandings in 0-87% and single figures in 37-92% of the readings, respectively. The successful reading of microchips can be further optimised by a correctly operated implantation process and thorough training of the applying persons. affect identification with a scanner. The removal of transponders for manipulation purposes is virtually impossible. Influences during the application of branding marks can hardly, if at all, be standardised, but influence the subsequent readability relevantly. Therefore, identification by means of hot branding cannot be considered sufficiently reliable. Impaired quality of identification can be reduced during reading but cannot be counteracted. Based on the existing studies it can be concluded that the transponder method is the best suited of the investigated methods for clearly identifying equids, being forgery-proof and permanent. It is not to be expected that applying hot branding in addition to microchips would optimise the probability of identification relevantly.

  13. The Effect of Descriptive Norms on Pregaming Frequency: Tests of Five Moderators.

    PubMed

    Merrill, Jennifer E; Kenney, Shannon R; Carey, Kate B

    2016-07-02

    Pregaming is highly prevalent on college campuses and associated with heightened levels of intoxication and risk of alcohol consequences. However, research examining the correlates of pregaming behavior is limited. Descriptive norms (i.e., perceptions about the prevalence or frequency of a behavior) are reliable and comparatively strong predictors of general drinking behavior, with recent evidence indicating that they are also associated with pregaming. We tested the hypothesis that higher descriptive norms for pregaming frequency would be associated with personal pregaming frequency. We also tested whether this effect would be stronger in the context of several theory-based moderators: female gender, higher injunctive norms (i.e., perceptions of others' attitudes toward a particular behavior), a more positive attitude toward pregaming, a stronger sense of identification with the drinking habits of other students, and stronger social comparison tendencies. College student drinkers (N = 198, 63% female) participated in an online survey assessing frequency of pregaming, descriptive norms, and hypothesized moderators. A multiple regression model revealed that higher descriptive norms, a more positive attitude toward pregaming, and stronger peer identification were significantly associated with greater pregaming frequency among drinkers. However, no moderators of the association between descriptive norms and pregaming frequency were observed. Descriptive norms are robust predictors of pregaming behavior, for both genders and across levels of several potential moderators. Future research seeking to understand pregaming behavior should consider descriptive norms, as well as personal attitudes and identification with student peers, as targets of interventions designed to reduce pregaming.

  14. Forensic genetic informativeness of an SNP panel consisting of 19 multi-allelic SNPs.

    PubMed

    Gao, Zehua; Chen, Xiaogang; Zhao, Yuancun; Zhao, Xiaohong; Zhang, Shu; Yang, Yiwen; Wang, Yufang; Zhang, Ji

    2018-05-01

    Current research focusing on forensic personal identification, phenotype inference and ancestry information on single-nucleotide polymorphisms (SNPs) has been widely reported. In the present study, we focused on tetra-allelic SNPs in the Chinese Han population. A total of 48 tetra-allelic SNPs were screened out from the Chinese Han population of the 1000 Genomes Database, including Chinese Han in Beijing (CHB) and Chinese Han South (CHS). Considering the forensic genetic requirement for the polymorphisms, only 11 tetra-allelic SNPs with a heterozygosity >0.06 were selected for further multiplex panel construction. In order to meet the demands of personal identification and parentage identification, an additional 8 tri-allelic SNPs were combined into the final multiplex panel. To ensure application in the degraded DNA analysis, all the PCR products were designed to be 87-188 bp. Employing multiple PCR reactions and SNaPshot minisequencing, 511 unrelated Chinese Han individuals from Sichuan were genotyped. The combined match probability (CMP), combined discrimination power (CDP), and cumulative probability of exclusion (CPE) of the panel were 6.07 × 10 -11 , 0.9999999999393 and 0.996764, respectively. Based on the population data retrieved from the 1000 Genomes Project, Fst values between Chinese Han in Sichuan (SCH) and all the populations included in the 1000 Genomes Project were calculated. The results indicated that two SNPs in this panel may contain ancestry information and may be used as markers of forensic biogeographical ancestry inference. Copyright © 2018 Elsevier B.V. All rights reserved.

  15. Genomic analysis and selected molecular pathways in rare cancers

    NASA Astrophysics Data System (ADS)

    Liu, Stephen V.; Lenkiewicz, Elizabeth; Evers, Lisa; Holley, Tara; Kiefer, Jeffrey; Ruiz, Christian; Glatz, Katharina; Bubendorf, Lukas; Demeure, Michael J.; Eng, Cathy; Ramanathan, Ramesh K.; Von Hoff, Daniel D.; Barrett, Michael T.

    2012-12-01

    It is widely accepted that many cancers arise as a result of an acquired genomic instability and the subsequent evolution of tumor cells with variable patterns of selected and background aberrations. The presence and behaviors of distinct neoplastic cell populations within a patient's tumor may underlie multiple clinical phenotypes in cancers. A goal of many current cancer genome studies is the identification of recurring selected driver events that can be advanced for the development of personalized therapies. Unfortunately, in the majority of rare tumors, this type of analysis can be particularly challenging. Large series of specimens for analysis are simply not available, allowing recurring patterns to remain hidden. In this paper, we highlight the use of DNA content-based flow sorting to identify and isolate DNA-diploid and DNA-aneuploid populations from tumor biopsies as a strategy to comprehensively study the genomic composition and behaviors of individual cancers in a series of rare solid tumors: intrahepatic cholangiocarcinoma, anal carcinoma, adrenal leiomyosarcoma, and pancreatic neuroendocrine tumors. We propose that the identification of highly selected genomic events in distinct tumor populations within each tumor can identify candidate driver events that can facilitate the development of novel, personalized treatment strategies for patients with cancer.

  16. Genomic analysis and selected molecular pathways in rare cancers.

    PubMed

    Liu, Stephen V; Lenkiewicz, Elizabeth; Evers, Lisa; Holley, Tara; Kiefer, Jeffrey; Ruiz, Christian; Glatz, Katharina; Bubendorf, Lukas; Demeure, Michael J; Eng, Cathy; Ramanathan, Ramesh K; Von Hoff, Daniel D; Barrett, Michael T

    2012-12-01

    It is widely accepted that many cancers arise as a result of an acquired genomic instability and the subsequent evolution of tumor cells with variable patterns of selected and background aberrations. The presence and behaviors of distinct neoplastic cell populations within a patient's tumor may underlie multiple clinical phenotypes in cancers. A goal of many current cancer genome studies is the identification of recurring selected driver events that can be advanced for the development of personalized therapies. Unfortunately, in the majority of rare tumors, this type of analysis can be particularly challenging. Large series of specimens for analysis are simply not available, allowing recurring patterns to remain hidden. In this paper, we highlight the use of DNA content-based flow sorting to identify and isolate DNA-diploid and DNA-aneuploid populations from tumor biopsies as a strategy to comprehensively study the genomic composition and behaviors of individual cancers in a series of rare solid tumors: intrahepatic cholangiocarcinoma, anal carcinoma, adrenal leiomyosarcoma, and pancreatic neuroendocrine tumors. We propose that the identification of highly selected genomic events in distinct tumor populations within each tumor can identify candidate driver events that can facilitate the development of novel, personalized treatment strategies for patients with cancer.

  17. Usefullness of palatal rugae patterns in establishing identity: Preliminary results from Bengaluru city, India

    PubMed Central

    Indira, AP; Gupta, Manish; David, Maria Priscilla

    2012-01-01

    Introduction: Palatal rugoscopy is the name given to the study of palatal rugae. Rugae pattern are widely considered to remain unchanged during an individual's lifetime. The rugae pattern has the potential to remain intact by virtue of their internal position in the head when most other anatomical structures are destroyed or burned. Moreover, rugae pattern are considered to be unique similar to fingerprints and are advocated in personal identification. Objectives: The purpose of the study is to establish, individual identity using palatal rugae patterns. Materials and Methods: The study group consisted of 100 study models all of whom were subjects above 14 years old. Martin dos Santos’ classification was followed based on form and position to assess the individuality of rugae pattern. Results: Each individual had different rugae patterns including dizygous twins and the rugae patterns were not symmetrical, both in number and in its distribution. Conclusion: The preliminary study undertaken here shows no two palates are alike in terms of their rugae pattern. Palatal rugae possess unique characteristics as they are absolutely individualistic and therefore, can be used as a personal soft-tissue ‘oral’ print for identification in forensic cases. PMID:23087574

  18. 40 CFR 171.11 - Federal certification of pesticide applicators in States or on Indian Reservations where there is...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... license or other State, county, or Tribal identification document issued to the uncertified person to whom... in effect. (a) Applicability. This section applies to persons in any State and on any Indian... applicable, any person who uses or supervises the use of any pesticide classified for restricted use must be...

  19. 40 CFR 171.11 - Federal certification of pesticide applicators in States or on Indian Reservations where there is...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... license or other State, county, or Tribal identification document issued to the uncertified person to whom... in effect. (a) Applicability. This section applies to persons in any State and on any Indian... applicable, any person who uses or supervises the use of any pesticide classified for restricted use must be...

  20. Deep classification hashing for person re-identification

    NASA Astrophysics Data System (ADS)

    Wang, Jiabao; Li, Yang; Zhang, Xiancai; Miao, Zhuang; Tao, Gang

    2018-04-01

    As the development of surveillance in public, person re-identification becomes more and more important. The largescale databases call for efficient computation and storage, hashing technique is one of the most important methods. In this paper, we proposed a new deep classification hashing network by introducing a new binary appropriation layer in the traditional ImageNet pre-trained CNN models. It outputs binary appropriate features, which can be easily quantized into binary hash-codes for hamming similarity comparison. Experiments show that our deep hashing method can outperform the state-of-the-art methods on the public CUHK03 and Market1501 datasets.

  1. Fast Open-World Person Re-Identification.

    PubMed

    Zhu, Xiatian; Wu, Botong; Huang, Dongcheng; Zheng, Wei-Shi

    2018-05-01

    Existing person re-identification (re-id) methods typically assume that: 1) any probe person is guaranteed to appear in the gallery target population during deployment (i.e., closed-world) and 2) the probe set contains only a limited number of people (i.e., small search scale). Both assumptions are artificial and breached in real-world applications, since the probe population in target people search can be extremely vast in practice due to the ambiguity of probe search space boundary. Therefore, it is unrealistic that any probe person is assumed as one target people, and a large-scale search in person images is inherently demanded. In this paper, we introduce a new person re-id search setting, called large scale open-world (LSOW) re-id, characterized by huge size probe images and open person population in search thus more close to practical deployments. Under LSOW, the under-studied problem of person re-id efficiency is essential in addition to that of commonly studied re-id accuracy. We, therefore, develop a novel fast person re-id method, called Cross-view Identity Correlation and vErification (X-ICE) hashing, for joint learning of cross-view identity representation binarisation and discrimination in a unified manner. Extensive comparative experiments on three large-scale benchmarks have been conducted to validate the superiority and advantages of the proposed X-ICE method over a wide range of the state-of-the-art hashing models, person re-id methods, and their combinations.

  2. Participants' Identification and Recall of Important Events in Counseling.

    ERIC Educational Resources Information Center

    Martin, Jack; Stelmaczonek, Karl

    1988-01-01

    Two studies examined counselor and client identification and recall of important events in counseling. Both counselors and clients identified events involving expressions of insight and understanding, provisions of personal material, descriptions and explorations of feelings, and expressions of new ways of being. Clients also identified events…

  3. An Overview of Dementia in Older Persons: Identification, Diagnosis, Assessment, and Treatment.

    ERIC Educational Resources Information Center

    Hinkle, J. Scott

    1990-01-01

    Notes that, as American population ages and mental health counselors focus services on older adults, the identification, diagnosis, assessment, and treatment of dementia will become valuable clinical skill. Presents nontechnical information regarding dementia, including Alzheimer's disease, multi-infarct dementia, testing, and therapeutic…

  4. Copper vapour laser ID labelling on metal dentures and restorations.

    PubMed

    Ling, B C; Nambiar, P; Low, K S; Lee, C K

    2003-06-01

    Denture marking is accepted as a means of identifying dentures and persons in geriatric institutions, or post-mortem during war, crimes, civil unrest, natural and mass disasters. Labelling on the acrylic resin component of the denture can easily be damaged or destroyed by fire but on cobalt-chromium components it would be more resistant. A copper vapour laser (CVL) can be used to label the cobalt-chromium components of dentures and metal restorations easily, and legibly, and miniaturised for the incorporation of more personal particulars necessary for the identification of the deceased person. The CVL beam is focussed by its optics and delivered to the material surface by the two-axis scanner mounted with mirrors. A personal computer controls the movement of the scanner and the firing of the CVL. The high peak power of the pulsed CVL is focussed to very high energy density producing plasma ablation of the alloy surface. Very fine markings of a few microns width can be produced enabling the storage of detailed information of the deceased person on a metal surface for the purpose of rapid identification.

  5. 5 CFR 1201.72 - Explanation and scope of discovery.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... obtain relevant information, including the identification of potential witnesses, from another person or a party, that the other person or party has not otherwise provided. Relevant information includes information that appears reasonably calculated to lead to the discovery of admissible evidence. This...

  6. 33 CFR 125.21 - Applications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) WATERFRONT FACILITIES IDENTIFICATION CREDENTIALS FOR PERSONS REQUIRING ACCESS TO WATERFRONT FACILITIES OR... applicant. It shall portray the largest image of the head and upper shoulders possible within the dimensions... mail. Under special circumstances the applicant may arrange to call in person for the Coast Guard Port...

  7. 33 CFR 125.21 - Applications.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) WATERFRONT FACILITIES IDENTIFICATION CREDENTIALS FOR PERSONS REQUIRING ACCESS TO WATERFRONT FACILITIES OR... applicant. It shall portray the largest image of the head and upper shoulders possible within the dimensions... mail. Under special circumstances the applicant may arrange to call in person for the Coast Guard Port...

  8. 78 FR 43277 - Designation and Identification of Two (2) Individuals and Two (2) Entities Pursuant to Executive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-19

    ... Property of Certain Persons With Respect to Human Rights Abuses in Syria'' and 13582 of August 17, 2011... 29, 2011, ``Blocking Property of Certain Persons with Respect to Human Rights Abuses in Syria'' and...

  9. Personality traits and educational identity formation in late adolescents: longitudinal associations and academic progress.

    PubMed

    Klimstra, Theo A; Luyckx, Koen; Germeijs, Veerle; Meeus, Wim H J; Goossens, Luc

    2012-03-01

    Changes in personality traits in late adolescence and young adulthood are believed to co-occur with changes in identity, but little research is available that supports this hypothesis. The present study addressed this relatively understudied area of research by examining longitudinal associations of Big Five personality traits (i.e., Neuroticism, Extraversion, Openness, Agreeableness, and Conscientiousness) with dimensions of identity formation (i.e., identification with commitment and exploration in depth) in the domain of education. For this purpose, we used four annual waves of longitudinal data on 485 Belgian late adolescents (87.4% female; mean age at T1 = 18.6 years) covering a 3-year period. Multivariate growth models revealed that changes in Big Five personality traits were related to changes in identification with commitment and exploration in depth. Cross-lagged panel models uncovered that, except for Openness, all Big Five traits predicted educational identity dimensions. Educational identity dimensions only predicted Neuroticism. In addition, adolescents with higher levels on the personality trait of Conscientiousness faced fewer study delays. In sum, the present study adds to the growing literature that explores the antecedents, correlates, and consequences of personality trait development by uncovering the interplay of personality traits, educational identity dimensions, and academic progress in late adolescents.

  10. Identification of Hypertension Management-related Errors in a Personal Digital Assistant-based Clinical Log for Nurses in Advanced Practice Nurse Training.

    PubMed

    Lee, Nam-Ju; Cho, Eunhee; Bakken, Suzanne

    2010-03-01

    The purposes of this study were to develop a taxonomy for detection of errors related to hypertension management and to apply the taxonomy to retrospectively analyze the documentation of nurses in Advanced Practice Nurse (APN) training. We developed the Hypertension Diagnosis and Management Error Taxonomy and applied it in a sample of adult patient encounters (N = 15,862) that were documented in a personal digital assistant-based clinical log by registered nurses in APN training. We used Standard Query Language queries to retrieve hypertension-related data from the central database. The data were summarized using descriptive statistics. Blood pressure was documented in 77.5% (n = 12,297) of encounters; 21% had high blood pressure values. Missed diagnosis, incomplete diagnosis and misdiagnosis rates were 63.7%, 6.8% and 7.5% respectively. In terms of treatment, the omission rates were 17.9% for essential medications and 69.9% for essential patient teaching. Contraindicated anti-hypertensive medications were documented in 12% of encounters with co-occurring diagnoses of hypertension and asthma. The Hypertension Diagnosis and Management Error Taxonomy was useful for identifying errors based on documentation in a clinical log. The results provide an initial understanding of the nature of errors associated with hypertension diagnosis and management of nurses in APN training. The information gained from this study can contribute to educational interventions that promote APN competencies in identification and management of hypertension as well as overall patient safety and informatics competencies. Copyright © 2010 Korean Society of Nursing Science. Published by . All rights reserved.

  11. Semantic Web, Reusable Learning Objects, Personal Learning Networks in Health: Key Pieces for Digital Health Literacy.

    PubMed

    Konstantinidis, Stathis Th; Wharrad, Heather; Windle, Richard; Bamidis, Panagiotis D

    2017-01-01

    The knowledge existing in the World Wide Web is exponentially expanding, while continuous advancements in health sciences contribute to the creation of new knowledge. There are a lot of efforts trying to identify how the social connectivity can endorse patients' empowerment, while other studies look at the identification and the quality of online materials. However, emphasis has not been put on the big picture of connecting the existing resources with the patients "new habits" of learning through their own Personal Learning Networks. In this paper we propose a framework for empowering patients' digital health literacy adjusted to patients' currents needs by utilizing the contemporary way of learning through Personal Learning Networks, existing high quality learning resources and semantics technologies for interconnecting knowledge pieces. The framework based on the concept of knowledge maps for health as defined in this paper. Health Digital Literacy needs definitely further enhancement and the use of the proposed concept might lead to useful tools which enable use of understandable health trusted resources tailored to each person needs.

  12. Automatic identification of the reference system based on the fourth ventricular landmarks in T1-weighted MR images.

    PubMed

    Fu, Yili; Gao, Wenpeng; Chen, Xiaoguang; Zhu, Minwei; Shen, Weigao; Wang, Shuguo

    2010-01-01

    The reference system based on the fourth ventricular landmarks (including the fastigial point and ventricular floor plane) is used in medical image analysis of the brain stem. The objective of this study was to develop a rapid, robust, and accurate method for the automatic identification of this reference system on T1-weighted magnetic resonance images. The fully automated method developed in this study consisted of four stages: preprocessing of the data set, expectation-maximization algorithm-based extraction of the fourth ventricle in the region of interest, a coarse-to-fine strategy for identifying the fastigial point, and localization of the base point. The method was evaluated on 27 Brain Web data sets qualitatively and 18 Internet Brain Segmentation Repository data sets and 30 clinical scans quantitatively. The results of qualitative evaluation indicated that the method was robust to rotation, landmark variation, noise, and inhomogeneity. The results of quantitative evaluation indicated that the method was able to identify the reference system with an accuracy of 0.7 +/- 0.2 mm for the fastigial point and 1.1 +/- 0.3 mm for the base point. It took <6 seconds for the method to identify the related landmarks on a personal computer with an Intel Core 2 6300 processor and 2 GB of random-access memory. The proposed method for the automatic identification of the reference system based on the fourth ventricular landmarks was shown to be rapid, robust, and accurate. The method has potentially utility in image registration and computer-aided surgery.

  13. Detection of people in military and security context imagery

    NASA Astrophysics Data System (ADS)

    Shannon, Thomas M. L.; Spier, Emmet H.; Wiltshire, Ben

    2014-10-01

    A high level of manual visual surveillance of complex scenes is dependent solely on the awareness of human operators whereas an autonomous person detection solution could assist by drawing their attention to potential issues, in order to reduce cognitive burden and achieve more with less manpower. Our research addressed the challenge of the reliable identification of persons in a scene who may be partially obscured by structures or by handling weapons or tools. We tested the efficacy of a recently published computer vision approach based on the construction of cascaded, non-linear classifiers from part-based deformable models by assessing performance using imagery containing infantrymen in the open or when obscured, undertaking low level tactics or acting as civilians using tools. Results were compared with those obtained from published upright pedestrian imagery. The person detector yielded a precision of approximately 65% for a recall rate of 85% for military context imagery as opposed to a precision of 85% for the upright pedestrian image cases. These results compared favorably with those reported by the authors when applied to a range of other on-line imagery databases. Our conclusion is that the deformable part-based model method may be a potentially useful people detection tool in the challenging environment of military and security context imagery.

  14. Computer-assisted bar-coding system significantly reduces clinical laboratory specimen identification errors in a pediatric oncology hospital.

    PubMed

    Hayden, Randall T; Patterson, Donna J; Jay, Dennis W; Cross, Carl; Dotson, Pamela; Possel, Robert E; Srivastava, Deo Kumar; Mirro, Joseph; Shenep, Jerry L

    2008-02-01

    To assess the ability of a bar code-based electronic positive patient and specimen identification (EPPID) system to reduce identification errors in a pediatric hospital's clinical laboratory. An EPPID system was implemented at a pediatric oncology hospital to reduce errors in patient and laboratory specimen identification. The EPPID system included bar-code identifiers and handheld personal digital assistants supporting real-time order verification. System efficacy was measured in 3 consecutive 12-month time frames, corresponding to periods before, during, and immediately after full EPPID implementation. A significant reduction in the median percentage of mislabeled specimens was observed in the 3-year study period. A decline from 0.03% to 0.005% (P < .001) was observed in the 12 months after full system implementation. On the basis of the pre-intervention detected error rate, it was estimated that EPPID prevented at least 62 mislabeling events during its first year of operation. EPPID decreased the rate of misidentification of clinical laboratory samples. The diminution of errors observed in this study provides support for the development of national guidelines for the use of bar coding for laboratory specimens, paralleling recent recommendations for medication administration.

  15. Personalized Lifestyle Medicine: Relevance for Nutrition and Lifestyle Recommendations

    PubMed Central

    Minich, Deanna M.; Bland, Jeffrey S.

    2013-01-01

    Public health recommendations for lifestyle modification, including diet and physical activity, have been widely disseminated for the prevention and treatment of disease. These guidelines are intended for the overall population without significant consideration for the individual with respect to one's genes and environment. Personalized lifestyle medicine is a newly developed term that refers to an approach to medicine in which an individual's health metrics from point-of-care diagnostics are used to develop lifestyle medicine-oriented therapeutic strategies for improving individual health outcomes in managing chronic disease. Examples of the application of personalized lifestyle medicine to patient care include the identification of genetic variants through laboratory tests and/or functional biomarkers for the purpose of designing patient-specific prescriptions for diet, exercise, stress, and environment. Personalized lifestyle medicine can provide solutions to chronic health problems by harnessing innovative and evolving technologies based on recent discoveries in genomics, epigenetics, systems biology, life and behavioral sciences, and diagnostics and clinical medicine. A comprehensive, personalized approach to medicine is required to promote the safety of therapeutics and reduce the cost of chronic disease. Personalized lifestyle medicine may provide a novel means of addressing a patient's health by empowering them with information they need to regain control of their health. PMID:23878520

  16. Current trends in the empirical study of cognitive remediation for schizophrenia.

    PubMed

    Saperstein, Alice M; Kurtz, Matthew M

    2013-06-01

    Cognitive remediation (CR) for schizophrenia is a learning-based behavioural skills training intervention designed to enhance neuro and (or) social cognitive skills, with the ultimate goal of generalization to improve psychosocial outcomes. This review summarizes conceptual approaches to CR for schizophrenia and the evidence for efficacy in clinical research settings. Four issues are at the forefront of ongoing research: the identification of techniques that produce the largest cognitive change, delineation of techniques that enhance transfer of cognitive skills to functional skills, the identification of CR methods that can be personalized to meet the specific cognitive and functional needs of each individual, and, all the while, ensuring that when CR methods are developed in a research setting, they remain scalable for delivery in the larger clinical community. In response to these issues, 3 prominent research trends have emerged: the rise of a new generation of computerized restorative cognitive training, the integration of CR with skills training to promote generalization, and the application of techniques to enhance motivation and learning during CR. As data on the neural basis of learning in people with schizophrenia become available, new technologies that harness the ability of the brain to make sustainable, functional changes may be integrated within a therapeutic context that promotes a personalized approach to learning. The development of transportable and scalable methods of CR that maximize the ability of people with schizophrenia to improve cognition will help them achieve personal goals for recovery.

  17. Patient identification using a near-infrared laser scanner

    NASA Astrophysics Data System (ADS)

    Manit, Jirapong; Bremer, Christina; Schweikard, Achim; Ernst, Floris

    2017-03-01

    We propose a new biometric approach where the tissue thickness of a person's forehead is used as a biometric feature. Given that the spatial registration of two 3D laser scans of the same human face usually produces a low error value, the principle of point cloud registration and its error metric can be applied to human classification techniques. However, by only considering the spatial error, it is not possible to reliably verify a person's identity. We propose to use a novel near-infrared laser-based head tracking system to determine an additional feature, the tissue thickness, and include this in the error metric. Using MRI as a ground truth, data from the foreheads of 30 subjects was collected from which a 4D reference point cloud was created for each subject. The measurements from the near-infrared system were registered with all reference point clouds using the ICP algorithm. Afterwards, the spatial and tissue thickness errors were extracted, forming a 2D feature space. For all subjects, the lowest feature distance resulted from the registration of a measurement and the reference point cloud of the same person. The combined registration error features yielded two clusters in the feature space, one from the same subject and another from the other subjects. When only the tissue thickness error was considered, these clusters were less distinct but still present. These findings could help to raise safety standards for head and neck cancer patients and lays the foundation for a future human identification technique.

  18. Metric and morphological assessment of facial features: a study on three European populations.

    PubMed

    Ritz-Timme, S; Gabriel, P; Tutkuviene, J; Poppa, P; Obertová, Z; Gibelli, D; De Angelis, D; Ratnayake, M; Rizgeliene, R; Barkus, A; Cattaneo, C

    2011-04-15

    Identification from video surveillance systems is becoming more and more frequent in the forensic practice. In this field, different techniques have been improved such as height estimation and gait analysis. However, the most natural approach for identifying a person in everyday life is based on facial characteristics. Scientifically, faces can be described using morphological and metric assessment of facial features. The morphological approach is largely affected by the subjective opinion of the observer, which can be mitigated by the application of descriptive atlases. In addition, this approach requires one to investigate which are the most common and rare facial characteristics in different populations. For the metric approach further studies are necessary in order to point out possible metric differences within and between different populations. The acquisition of statistically adequate population data may provide useful information for the reconstruction of biological profiles of unidentified individuals, particularly concerning ethnic affiliation, and possibly also for personal identification. This study presents the results of the morphological and metric assessment of the head and face of 900 male subjects between 20 and 31 years from Italy, Germany and Lithuania. The evaluation of the morphological traits was performed using the DMV atlas with 43 pre-defined facial characteristics. The frequencies of the types of facial features were calculated for each population in order to establish the rarest characteristics which may be used for the purpose of a biological profile and consequently for personal identification. Metric analysis performed in vivo included 24 absolute measurements and 24 indices of the head and face, including body height and body weight. The comparison of the frequencies of morphological facial features showed many similarities between the samples from Germany, Italy and Lithuania. However, several characteristics were rare or significantly more or less common in one population compared to the other two. On the other hand, all measurements and indices, except for labial width and intercanthal-mouth index showed significant differences between the three populations. As far as comparisons with other samples are concerned, the three European Caucasian samples differed from North American Caucasian, African and Asian groups as concerns the frequency of the morphological traits and the mean values of the metric analysis. The metric and morphological data collected from three European populations may be useful for forensic purposes in the construction of biological profiles and in screening for personal identification. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  19. An Overview of Some Electronic Identification Use Cases in Europe

    NASA Astrophysics Data System (ADS)

    Mattatia, Fabrice

    As online services become more and more widely used, and as the exchanges of personal data become more and more widespread, electronic identification appears to be a key function for the security of the process and for the protection of privacy. It is the sole means of ensuring only authorized people have access to the data. In France and throughout Europe, e-government services, as well as private services, already use different means of electronic identification. Among the different technical solutions stand the electronic identity card: around 20 million eID cards have already been issued in Europe. The question of their interoperability is now open, in order that all European citizens may access the e-services of any Member State. With the development of electronic administration comes the need for the citizen to be able to prove his or her identity. This is essential if the citizen wants access to her personal data or administrative files, or if he wants to claim a right attached to his very identity. On the other hand, administrations have the obligation to ensure the personal data they store are not displayed to people who are not entitled to see them. They also have the need to detect fraudsters. Electronic identification, which is the ability to prove someone's identity on the Internet, thus becomes a central matter.

  20. Criminal Prohibition of Wrongful Re‑identification: Legal Solution or Minefield for Big Data?

    PubMed

    Phillips, Mark; Dove, Edward S; Knoppers, Bartha M

    2017-12-01

    The collapse of confidence in anonymization (sometimes also known as de-identification) as a robust approach for preserving the privacy of personal data has incited an outpouring of new approaches that aim to fill the resulting trifecta of technical, organizational, and regulatory privacy gaps left in its wake. In the latter category, and in large part due to the growth of Big Data-driven biomedical research, falls a growing chorus of calls for criminal and penal offences to sanction wrongful re-identification of "anonymized" data. This chorus cuts across the fault lines of polarized privacy law scholarship that at times seems to advocate privacy protection at the expense of Big Data research or vice versa. Focusing on Big Data in the context of biomedicine, this article surveys the approaches that criminal or penal law might take toward wrongful re-identification of health data. It contextualizes the strategies within their respective legal regimes as well as in relation to emerging privacy debates focusing on personal data use and data linkage and assesses the relative merit of criminalization. We conclude that this approach suffers from several flaws and that alternative social and legal strategies to deter wrongful re-identification may be preferable.

  1. 49 CFR 1549.3 - TSA inspection authority.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... transportation facilities; (vi) Review security plans; and (vii) Carry out such other duties, and exercise such... access media or identification media issued or approved by a certified cargo screening facility or other person, except that the TSA and DHS officials will have identification media issued by TSA or DHS. ...

  2. 36 CFR 13.45 - Unattended or abandoned property.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... prohibited. The Superintendent may authorize property to be left in place for more than 4 months. (2) Identification information is required for all personal property left in park areas. Identification information consists of the owner's name, home address, telephone number, date that the property was left, and the type...

  3. 36 CFR 13.45 - Unattended or abandoned property.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... prohibited. The Superintendent may authorize property to be left in place for more than 4 months. (2) Identification information is required for all personal property left in park areas. Identification information consists of the owner's name, home address, telephone number, date that the property was left, and the type...

  4. 36 CFR 13.45 - Unattended or abandoned property.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... prohibited. The Superintendent may authorize property to be left in place for more than 4 months. (2) Identification information is required for all personal property left in park areas. Identification information consists of the owner's name, home address, telephone number, date that the property was left, and the type...

  5. 36 CFR 13.45 - Unattended or abandoned property.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... prohibited. The Superintendent may authorize property to be left in place for more than 4 months. (2) Identification information is required for all personal property left in park areas. Identification information consists of the owner's name, home address, telephone number, date that the property was left, and the type...

  6. 36 CFR 13.45 - Unattended or abandoned property.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... prohibited. The Superintendent may authorize property to be left in place for more than 4 months. (2) Identification information is required for all personal property left in park areas. Identification information consists of the owner's name, home address, telephone number, date that the property was left, and the type...

  7. 40 CFR 85.1706 - Pre-certification exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... identification or engine serial number, indicate the use of the vehicle or engine on exempt status and indicate... identification and model year of vehicle or engine; or person or office to be contacted for further information... (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and Motor...

  8. 40 CFR 85.1706 - Pre-certification exemption.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... identification or engine serial number, indicate the use of the vehicle or engine on exempt status and indicate... identification and model year of vehicle or engine; or person or office to be contacted for further information... (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and Motor...

  9. 40 CFR 85.1706 - Pre-certification exemption.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... identification or engine serial number, indicate the use of the vehicle or engine on exempt status and indicate... identification and model year of vehicle or engine; or person or office to be contacted for further information... (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and Motor...

  10. 40 CFR 85.1706 - Pre-certification exemption.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... identification or engine serial number, indicate the use of the vehicle or engine on exempt status and indicate... identification and model year of vehicle or engine; or person or office to be contacted for further information... (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and Motor...

  11. 40 CFR 85.1706 - Pre-certification exemption.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... identification or engine serial number, indicate the use of the vehicle or engine on exempt status and indicate... identification and model year of vehicle or engine; or person or office to be contacted for further information... (CONTINUED) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Exclusion and Exemption of Motor Vehicles and Motor...

  12. 40 CFR 82.62 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... consisting of the following types of foam: (1) Closed cell rigid polyurethane foam; (2) Closed cell rigid... identification numbers: (1) A federal employer identification number; (2) A state sales tax exemption number; (3... means: (1) The seller of a product to a consumer or another distributor; or (2) A person who sells or...

  13. Assimilation, Ethnic Competition, and Ethnic Identities of U.S.-Born Persons of Mexican Origin.

    ERIC Educational Resources Information Center

    Ono, Hiromi

    2002-01-01

    Explores processes governing the ethnic identification of second and later generations of Mexican immigrant descendants using the Latino National Political Survey. Ethnic identification arises directly from cultural continuity and lower levels of assimilation, experiences with ethnic competition, and a combination of both processes. Experiences…

  14. Three Thousand Years of Talent Searching.

    ERIC Educational Resources Information Center

    Wing, Cliff W., Jr.

    An overview is presented of current issues in the assessment of gifted and talented persons, with an emphasis on generalizable and universal talents and the operational methods used in their identification. The Chinese were seeking out talented individuals through formal identification procedures as early as 2200 BC. In the Western world, the use…

  15. 76 FR 18706 - Fisheries in the Eastern Pacific Ocean; Pelagic Fisheries; Vessel Identification Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-05

    ...; Vessel Identification Requirements AGENCY: National Marine Fisheries Service (NMFS), National Oceanic and... be required to display its official number, preceded by the characters ``USA-''. The intent of the... and will generally be posted to http://www.regulations.gov without change. All Personal Identifying...

  16. Remote, non-contacting personnel bio-identification using microwave radiation

    NASA Technical Reports Server (NTRS)

    McGrath, William R. (Inventor); Talukder, Ashit (Inventor)

    2011-01-01

    A system to remotely identify a person by utilizing a microwave cardiogram, where some embodiments segment a signal representing cardiac beats into segments, extract features from the segments, and perform pattern identification of the segments and features with a pre-existing data set. Other embodiments are described and claimed.

  17. 49 CFR 172.334 - Identification numbers; prohibited display.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... or 1.6, DANGEROUS, or subsidiary hazard placard. (b) No person may display an identification number on a placard, orange panel or white square-on-point display configuration unless— (1) The... the placard, orange panel or white square-on-point configuration authorized by § 172.332 or § 172.336...

  18. 49 CFR 172.334 - Identification numbers; prohibited display.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... or 1.6, DANGEROUS, or subsidiary hazard placard. (b) No person may display an identification number on a placard, orange panel or white square-on-point display configuration unless— (1) The... the placard, orange panel or white square-on-point configuration authorized by § 172.332 or § 172.336...

  19. 49 CFR 172.334 - Identification numbers; prohibited display.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... or 1.6, DANGEROUS, or subsidiary hazard placard. (b) No person may display an identification number on a placard, orange panel or white square-on-point display configuration unless— (1) The... the placard, orange panel or white square-on-point configuration authorized by § 172.332 or § 172.336...

  20. 49 CFR 172.334 - Identification numbers; prohibited display.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... or 1.6, DANGEROUS, or subsidiary hazard placard. (b) No person may display an identification number on a placard, orange panel or white square-on-point display configuration unless— (1) The... the placard, orange panel or white square-on-point configuration authorized by § 172.332 or § 172.336...

  1. 49 CFR 172.334 - Identification numbers; prohibited display.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... or 1.6, DANGEROUS, or subsidiary hazard placard. (b) No person may display an identification number on a placard, orange panel or white square-on-point display configuration unless— (1) The... the placard, orange panel or white square-on-point configuration authorized by § 172.332 or § 172.336...

  2. 15 CFR 325.3 - Applying for a certificate of review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... delivery method that provides evidence of receipt. (b) Contents of application. Any person may submit an.... Some information, in particular the identification of goods or services that the applicant exports or... services. (ii) If it is reasonably available, an identification of the goods or services according to the...

  3. Personal Name Identification in the Practice of Digital Repositories

    ERIC Educational Resources Information Center

    Xia, Jingfeng

    2006-01-01

    Purpose: To propose improvements to the identification of authors' names in digital repositories. Design/methodology/approach: Analysis of current name authorities in digital resources, particularly in digital repositories, and analysis of some features of existing repository applications. Findings: This paper finds that the variations of authors'…

  4. Identification as a Mediator of Celebrity Effects.

    ERIC Educational Resources Information Center

    Basil, Michael D.

    1996-01-01

    This study examined personal concern, perceived risk, and sexual behavior of 147 college students a year after Magic Johnson announced he tested positive for HIV (Human Immunodeficiency Virus). It found that identification mediates message effects, suggesting that a spokesperson with whom an audience can identify insures the greatest likelihood of…

  5. 15 CFR 2009.1 - Information required in representation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... country's government representing that country's interest, the person(s) within the division who is (are... issues, including, whenever possible, copies of the standards-related activity's provisions. (3) Identification of the foreign goods or services affected by the standards-related activity at issue. (4) A...

  6. 15 CFR 2009.1 - Information required in representation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... country's government representing that country's interest, the person(s) within the division who is (are... issues, including, whenever possible, copies of the standards-related activity's provisions. (3) Identification of the foreign goods or services affected by the standards-related activity at issue. (4) A...

  7. 15 CFR 2009.1 - Information required in representation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... country's government representing that country's interest, the person(s) within the division who is (are... issues, including, whenever possible, copies of the standards-related activity's provisions. (3) Identification of the foreign goods or services affected by the standards-related activity at issue. (4) A...

  8. 15 CFR 2009.1 - Information required in representation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... country's government representing that country's interest, the person(s) within the division who is (are... issues, including, whenever possible, copies of the standards-related activity's provisions. (3) Identification of the foreign goods or services affected by the standards-related activity at issue. (4) A...

  9. 15 CFR 2009.1 - Information required in representation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... country's government representing that country's interest, the person(s) within the division who is (are... issues, including, whenever possible, copies of the standards-related activity's provisions. (3) Identification of the foreign goods or services affected by the standards-related activity at issue. (4) A...

  10. 40 CFR 79.59 - Reporting requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Tier 1. (i) Literature Search. Pursuant to § 79.52(d), the literature search shall include a text summary of the methods and results of the literature search, including the following: (A) Identification of person(s) performing the literature search, (B) Description of data sources accessed, search...

  11. 40 CFR 79.59 - Reporting requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Tier 1. (i) Literature Search. Pursuant to § 79.52(d), the literature search shall include a text summary of the methods and results of the literature search, including the following: (A) Identification of person(s) performing the literature search, (B) Description of data sources accessed, search...

  12. 21 CFR 880.6025 - Absorbent tipped applicator.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... stick. The device is used to apply medications to, or to take specimens from, a patient. (b...) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL USE DEVICES General Hospital and Personal Use Miscellaneous Devices § 880.6025 Absorbent tipped applicator. (a) Identification. An absorbent tipped applicator is a...

  13. 21 CFR 880.6820 - Medical disposable scissors.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Medical disposable scissors. 880.6820 Section 880...) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL USE DEVICES General Hospital and Personal Use Miscellaneous Devices § 880.6820 Medical disposable scissors. (a) Identification. Medical disposable scissors are...

  14. 21 CFR 880.6820 - Medical disposable scissors.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Medical disposable scissors. 880.6820 Section 880...) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL USE DEVICES General Hospital and Personal Use Miscellaneous Devices § 880.6820 Medical disposable scissors. (a) Identification. Medical disposable scissors are...

  15. A social ecological approach to investigating relationships between housing and adaptive functioning for persons with serious mental illness.

    PubMed

    Kloos, Bret; Shah, Seema

    2009-12-01

    This paper seeks to advance mental health-housing research regarding which factors of housing and neighborhood environments are critical for adaptive functioning, health, and recovery for persons with serious mental illness (SMI). Housing and neighborhood environments are particularly important for persons with SMI because of the prevalence of poor housing conditions among this population. Most mental health-housing research has been limited by a focus on problems in environments and functioning. The paper seeks to expand the mental health-housing research agenda to consider protective factors that promote community integration and adaptive functioning. We provide an account of how social ecology theory transformed a research program, from examining individual risk factors to investigating the functioning of persons in the contexts of their housing and neighborhood experiences. The resulting housing environment framework-physical aspects of housing and neighborhoods, social environment of neighborhoods, and interpersonal relationships tied to housing-allows for identification of opportunities for health promotion and facilitation of participation in community-based settings. This program of research draws upon several methods to understand the social experience of persons with SMI living in community settings-survey research, qualitative interviews, Geographic Information Systems, participatory research, and visual ethnography. In this paper, we present how social ecology theory was instrumental in the development of new housing environment measures, the selection of appropriate research methods, and framing research questions that are building a new empirical base of knowledge about promoting adaptive functioning, health, and recovery for persons with SMI living in community settings.

  16. A physiome interoperability roadmap for personalized drug development

    PubMed Central

    2016-01-01

    The goal of developing therapies and dosage regimes for characterized subgroups of the general population can be facilitated by the use of simulation models able to incorporate information about inter-individual variability in drug disposition (pharmacokinetics), toxicity and response effect (pharmacodynamics). Such observed variability can have multiple causes at various scales, ranging from gross anatomical differences to differences in genome sequence. Relevant data for many of these aspects, particularly related to molecular assays (known as ‘-omics’), are available in online resources, but identification and assignment to appropriate model variables and parameters is a significant bottleneck in the model development process. Through its efforts to standardize annotation with consequent increase in data usability, the human physiome project has a vital role in improving productivity in model development and, thus, the development of personalized therapy regimes. Here, we review the current status of personalized medicine in clinical practice, outline some of the challenges that must be overcome in order to expand its applicability, and discuss the relevance of personalized medicine to the more widespread challenges being faced in drug discovery and development. We then review some of (i) the key data resources available for use in model development and (ii) the potential areas where advances made within the physiome modelling community could contribute to physiologically based pharmacokinetic and physiologically based pharmacokinetic/pharmacodynamic modelling in support of personalized drug development. We conclude by proposing a roadmap to further guide the physiome community in its on-going efforts to improve data usability, and integration with modelling efforts in the support of personalized medicine development. PMID:27051513

  17. [Measurement of intracranial hematoma volume by personal computer].

    PubMed

    DU, Wanping; Tan, Lihua; Zhai, Ning; Zhou, Shunke; Wang, Rui; Xue, Gongshi; Xiao, An

    2011-01-01

    To explore the method for intracranial hematoma volume measurement by the personal computer. Forty cases of various intracranial hematomas were measured by the computer tomography with quantitative software and personal computer with Photoshop CS3 software, respectively. the data from the 2 methods were analyzed and compared. There was no difference between the data from the computer tomography and the personal computer (P>0.05). The personal computer with Photoshop CS3 software can measure the volume of various intracranial hematomas precisely, rapidly and simply. It should be recommended in the clinical medicolegal identification.

  18. Implications of User Identification Devices (UIDS) for the United States Navy

    DTIC Science & Technology

    2001-09-01

    radio technology, and this includes all mobile and cordless telecommunication devices . “Total worldwide sales of RFID systems for the year 2000 have... theft . A person who has stolen the user identification device of another and uses it to impersonate him or her, serves as a common example. Since user...IDENTIFICATION DEVICES (UIDS) FOR THE UNITED STATES NAVY by Letitia D. Haynes September 2001 Thesis Advisor: Cynthia Irvine Associate

  19. Methods for using a biometric parameter in the identification of persons

    DOEpatents

    Hively, Lee M [Philadelphia, TN

    2011-11-22

    Brain waves are used as a biometric parameter to provide for authentication and identification of personnel. The brain waves are sampled using EEG equipment and are processed using phase-space distribution functions to compare digital signature data from enrollment of authorized individuals to data taken from a test subject to determine if the data from the test subject matches the signature data to a degree to support positive identification.

  20. 26 CFR 1.936-7 - Manner of making election under section 936 (h)(5); special election for export sales; revocation...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... corporation must set forth on the form the name and the taxpayer identification number or address of all... export sale only if resold or otherwise transferred abroad to a foreign person (including a foreign... exported to a foreign person when the income derived by such foreign person on the resale of such products...

  1. Return to Work After Lumbar Microdiscectomy - Personalizing Approach Through Predictive Modeling.

    PubMed

    Papić, Monika; Brdar, Sanja; Papić, Vladimir; Lončar-Turukalo, Tatjana

    2016-01-01

    Lumbar disc herniation (LDH) is the most common disease among working population requiring surgical intervention. This study aims to predict the return to work after operative treatment of LDH based on the observational study including 153 patients. The classification problem was approached using decision trees (DT), support vector machines (SVM) and multilayer perception (MLP) combined with RELIEF algorithm for feature selection. MLP provided best recall of 0.86 for the class of patients not returning to work, which combined with the selected features enables early identification and personalized targeted interventions towards subjects at risk of prolonged disability. The predictive modeling indicated at the most decisive risk factors in prolongation of work absence: psychosocial factors, mobility of the spine and structural changes of facet joints and professional factors including standing, sitting and microclimate.

  2. An investigation of the clinical use of the house-tree-person projective drawings in the psychological evaluation of child sexual abuse.

    PubMed

    Palmer, L; Farrar, A R; Valle, M; Ghahary, N; Panella, M; DeGraw, D

    2000-05-01

    Identification and evaluation of child sexual abuse is an integral task for clinicians. To aid these processes, it is necessary to have reliable and valid psychological measures. This is an investigation of the clinical validity and use of the House-Tree-Person (HTP) projective drawing, a widely used diagnostic tool, in the assessment of child sexual abuse. HTP drawings were collected archivally from a sample of sexually abused children (n = 47) and a nonabused comparison sample (n = 82). The two samples were grossly matched for gender, ethnicity, age, and socioeconomic status. The protocols were scored using a quantitative scoring system. The data were analyzed using a discriminant function analysis. Group membership could not be predicted based on a total HTP score.

  3. Eliminating barriers to personalized medicine

    PubMed Central

    2014-01-01

    With the emergence of high-throughput discovery platforms, robust preclinical small-animal models, and efficient clinical trial pipelines, it is becoming possible to envision a time when the treatment of human neurologic diseases will become personalized. The emergence of precision medicine will require the identification of subgroups of patients most likely to respond to specific biologically based therapies. This stratification only becomes possible when the determinants that contribute to disease heterogeneity become more fully elucidated. This review discusses the defining factors that underlie disease heterogeneity relevant to the potential for individualized brain tumor (optic pathway glioma) treatments arising in the common single-gene cancer predisposition syndrome, neurofibromatosis type 1 (NF1). In this regard, NF1 is posited as a model genetic condition to establish a workable paradigm for actualizing precision therapeutics for other neurologic disorders. PMID:24975854

  4. Treating frailty-a practical guide

    PubMed Central

    2011-01-01

    Frailty is a common syndrome that is associated with vulnerability to poor health outcomes. Frail older people have increased risk of morbidity, institutionalization and death, resulting in burden to individuals, their families, health care services and society. Assessment and treatment of the frail individual provide many challenges to clinicians working with older people. Despite frailty being increasingly recognized in the literature, there is a paucity of direct evidence to guide interventions to reduce frailty. In this paper we review methods for identification of frailty in the clinical setting, propose a model for assessment of the frail older person and summarize the current best evidence for treating the frail older person. We provide an evidence-based framework that can be used to guide the diagnosis, assessment and treatment of frail older people. PMID:21733149

  5. Terms used for isolation practices by nurses at an academic medical center

    PubMed Central

    Landers, Timothy; McWalters, Jessica; Behta, Maryam; Bufe, Gina; Ross, Barbara; Vawdrey, David K.; Larson, Elaine

    2010-01-01

    Aim This paper is a report of a study to determine if the terms used by nurses to describe isolation precautions are associated with correct identification of required personal protective equipment. Background Isolation measures are important in the prevention of health care-associated infections. The terms used to describe categories of isolation have changed in response to new pathogens and with advances in infection prevention. Methods For three months in2009, nurses from an academic medical center on the East Coast of the United States of America completed a survey consisting of ten clinical scenarios which asked about recommended personal protective equipment and for the name of the recommended isolation type. Correct identification of required personal protective equipment was compared to use of an approved isolation category term, controlling for infection knowledge and demographic variables. Results Three hundred and seventeen nurses gave responses to2, 215 clinical scenarios. Use of non-approved category terms was associated with statistically significantly lower rates of correct personal protective equipment identification compared to use of an approved term (62.2% vs. 77.8%; p<.001). Specific PPE was also selected for use when not indicated--including gowns (42%), N-95 respirators (13%), fluid shield masks(13%) and sterile gloves (6%). Conclusion Inconsistent terminology for isolation precautions may contribute to variations in practice. Adoption of internationally-accepted and standardized category terms may improve adherence to these precautions. PMID:20722801

  6. Neural Representations of Personally Familiar and Unfamiliar Faces in the Anterior Inferior Temporal Cortex of Monkeys

    PubMed Central

    Eifuku, Satoshi; De Souza, Wania C.; Nakata, Ryuzaburo; Ono, Taketoshi; Tamura, Ryoi

    2011-01-01

    To investigate the neural representations of faces in primates, particularly in relation to their personal familiarity or unfamiliarity, neuronal activities were chronically recorded from the ventral portion of the anterior inferior temporal cortex (AITv) of macaque monkeys during the performance of a facial identification task using either personally familiar or unfamiliar faces as stimuli. By calculating the correlation coefficients between neuronal responses to the faces for all possible pairs of faces given in the task and then using the coefficients as neuronal population-based similarity measures between the faces in pairs, we analyzed the similarity/dissimilarity relationship between the faces, which were potentially represented by the activities of a population of the face-responsive neurons recorded in the area AITv. The results showed that, for personally familiar faces, different identities were represented by different patterns of activities of the population of AITv neurons irrespective of the view (e.g., front, 90° left, etc.), while different views were not represented independently of their facial identities, which was consistent with our previous report. In the case of personally unfamiliar faces, the faces possessing different identities but presented in the same frontal view were represented as similar, which contrasts with the results for personally familiar faces. These results, taken together, outline the neuronal representations of personally familiar and unfamiliar faces in the AITv neuronal population. PMID:21526206

  7. Serving Gifted and Talented Students: A Resource for School Personnel.

    ERIC Educational Resources Information Center

    Genshaft, Judy L., Ed.; And Others

    This collection considers the personal and educational needs of the student who is gifted, with emphasis on the roles of support staff. It covers developmental perspectives; assessment, identification, and evaluation issues; educational services; personal, interpersonal, and cultural issues; intervention strategies; and gifted education issues.…

  8. 32 CFR 537.6 - Identification of recovery incidents.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., inpatient or outpatient care resulting from injuries (such as broken bones or burns arising from automobile accidents, gas explosions, falls, civilian malpractice, and similar incidents) that do not involve...) Personal injury to persons whose primary care for an accident-related injury is furnished at an Army MTF...

  9. 32 CFR 537.6 - Identification of recovery incidents.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., inpatient or outpatient care resulting from injuries (such as broken bones or burns arising from automobile accidents, gas explosions, falls, civilian malpractice, and similar incidents) that do not involve...) Personal injury to persons whose primary care for an accident-related injury is furnished at an Army MTF...

  10. 32 CFR 537.6 - Identification of recovery incidents.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., inpatient or outpatient care resulting from injuries (such as broken bones or burns arising from automobile accidents, gas explosions, falls, civilian malpractice, and similar incidents) that do not involve...) Personal injury to persons whose primary care for an accident-related injury is furnished at an Army MTF...

  11. 32 CFR 537.6 - Identification of recovery incidents.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., inpatient or outpatient care resulting from injuries (such as broken bones or burns arising from automobile accidents, gas explosions, falls, civilian malpractice, and similar incidents) that do not involve...) Personal injury to persons whose primary care for an accident-related injury is furnished at an Army MTF...

  12. 32 CFR 537.6 - Identification of recovery incidents.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., inpatient or outpatient care resulting from injuries (such as broken bones or burns arising from automobile accidents, gas explosions, falls, civilian malpractice, and similar incidents) that do not involve...) Personal injury to persons whose primary care for an accident-related injury is furnished at an Army MTF...

  13. 48 CFR 252.209-7010 - Critical Safety Items.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... personal injury or loss of life; or (iii) An uncommanded engine shutdown that jeopardizes safety. Design... personal injury or loss of life. (b) Identification of critical safety items. One or more of the items... control activity: (Insert additional lines as necessary) (c) Heightened quality assurance surveillance...

  14. 48 CFR 252.209-7010 - Critical Safety Items.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... personal injury or loss of life; or (iii) An uncommanded engine shutdown that jeopardizes safety. Design... personal injury or loss of life. (b) Identification of critical safety items. One or more of the items... control activity: (Insert additional lines as necessary) (c) Heightened quality assurance surveillance...

  15. 48 CFR 252.209-7010 - Critical Safety Items.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... personal injury or loss of life; or (iii) An uncommanded engine shutdown that jeopardizes safety. Design... personal injury or loss of life. (b) Identification of critical safety items. One or more of the items... control activity: (Insert additional lines as necessary) (c) Heightened quality assurance surveillance...

  16. 48 CFR 252.209-7010 - Critical Safety Items.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... personal injury or loss of life; or (iii) An uncommanded engine shutdown that jeopardizes safety. Design... personal injury or loss of life. (b) Identification of critical safety items. One or more of the items... control activity: (Insert additional lines as necessary) (c) Heightened quality assurance surveillance...

  17. 21 CFR 880.6060 - Medical disposable bedding.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Medical disposable bedding. 880.6060 Section 880...) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL USE DEVICES General Hospital and Personal Use Miscellaneous Devices § 880.6060 Medical disposable bedding. (a) Identification. Medical disposable bedding is a device...

  18. 21 CFR 880.6060 - Medical disposable bedding.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Medical disposable bedding. 880.6060 Section 880...) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL USE DEVICES General Hospital and Personal Use Miscellaneous Devices § 880.6060 Medical disposable bedding. (a) Identification. Medical disposable bedding is a device...

  19. 21 CFR 880.5160 - Therapeutic medical binder.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Therapeutic medical binder. 880.5160 Section 880...) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL USE DEVICES General Hospital and Personal Use Therapeutic Devices § 880.5160 Therapeutic medical binder. (a) Identification. A therapeutic medical binder is a...

  20. 21 CFR 880.5160 - Therapeutic medical binder.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Therapeutic medical binder. 880.5160 Section 880...) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL USE DEVICES General Hospital and Personal Use Therapeutic Devices § 880.5160 Therapeutic medical binder. (a) Identification. A therapeutic medical binder is a...

  1. Personal Educational Tools (PETs) for Type II Learning

    ERIC Educational Resources Information Center

    Christensen, Rhonda; Overall, Theresa; Knezek, Gerald

    2006-01-01

    This article introduces the concept of Personal Educational Tools (PETs) and places these tools within the context of existing rationales for using technology for teaching, learning, and instruction. An identification of the distinguishing characteristics of these devices is followed by the conjecture that these types of classifying…

  2. 19 CFR 142.42 - Application for Line Release processing.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Company Information: name, address, city, state, contact person, phone number of contact person, and... identification number of the shipper or manufacturer. (f) Importer information (if importer is different than filer): Name, address, city, state and country, zip code, importer number, bond number, and surety code...

  3. 19 CFR 142.42 - Application for Line Release processing.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Company Information: name, address, city, state, contact person, phone number of contact person, and... identification number of the shipper or manufacturer. (f) Importer information (if importer is different than filer): Name, address, city, state and country, zip code, importer number, bond number, and surety code...

  4. 19 CFR 142.42 - Application for Line Release processing.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Company Information: name, address, city, state, contact person, phone number of contact person, and... identification number of the shipper or manufacturer. (f) Importer information (if importer is different than filer): Name, address, city, state and country, zip code, importer number, bond number, and surety code...

  5. 19 CFR 142.42 - Application for Line Release processing.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Company Information: name, address, city, state, contact person, phone number of contact person, and... identification number of the shipper or manufacturer. (f) Importer information (if importer is different than filer): Name, address, city, state and country, zip code, importer number, bond number, and surety code...

  6. 75 FR 82575 - Federal Acquisition Regulation; Personal Identity Verification of Contractor Personnel

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-30

    ... 9000-AL60 Federal Acquisition Regulation; Personal Identity Verification of Contractor Personnel AGENCY... requirement of collecting from contractors all forms of Government-provided identification once they are no...D Inspector General Audit Report No. D-2009-005, entitled ``Controls Over the Contractor Common...

  7. 77 FR 75702 - Supplemental Identification Information for 1 Individual Designated Pursuant to Executive Order...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-21

    ... of Persons Undermining the Sovereignty of Lebanon or Its Democratic Processes and Institutions... persons to undermine Lebanon's legitimate and democratically elected government or democratic institutions, to contribute to the deliberate breakdown in the rule of law in Lebanon, including through...

  8. The impact of chimerism in DNA-based forensic sex determination analysis.

    PubMed

    George, Renjith; Donald, Preethy Mary; Nagraj, Sumanth Kumbargere; Idiculla, Jose Joy; Hj Ismail, Rashid

    2013-01-01

    Sex determination is the most important step in personal identification in forensic investigations. DNA-based sex determination analysis is comparatively more reliable than the other conventional methods of sex determination analysis. Advanced technology like real-time polymerase chain reaction (PCR) offers accurate and reproducible results and is at the level of legal acceptance. But still there are situations like chimerism where an individual possess both male and female specific factors together in their body. Sex determination analysis in such cases can give erroneous results. This paper discusses the phenomenon of chimerism and its impact on sex determination analysis in forensic investigations.

  9. Effect of cataract surgery and pupil dilation on iris pattern recognition for personal authentication.

    PubMed

    Dhir, L; Habib, N E; Monro, D M; Rakshit, S

    2010-06-01

    The purpose of this study was to investigate the effect of cataract surgery and pupil dilation on iris pattern recognition for personal authentication. Prospective non-comparative cohort study. Images of 15 subjects were captured before (enrolment), and 5, 10, and 15 min after instillation of mydriatics before routine cataract surgery. After cataract surgery, images were captured 2 weeks thereafter. Enrolled and test images (after pupillary dilation and after cataract surgery) were segmented to extract the iris. This was then unwrapped onto a rectangular format for normalization and a novel method using the Discrete Cosine Transform was applied to encode the image into binary bits. The numerical difference between two iris codes (Hamming distance, HD) was calculated. The HD between identification and enrolment codes was used as a score and was compared with a confidence threshold for specific equipment, giving a match or non-match result. The Correct Recognition Rate (CRR) and Equal Error Rates (EERs) were calculated to analyse overall system performance. After cataract surgery, perfect identification and verification was achieved, with zero false acceptance rate, zero false rejection rate, and zero EER. After pupillary dilation, non-elastic deformation occurs and a CRR of 86.67% and EER of 9.33% were obtained. Conventional circle-based localization methods are inadequate. Matching reliability decreases considerably with increase in pupillary dilation. Cataract surgery has no effect on iris pattern recognition, whereas pupil dilation may be used to defeat an iris-based authentication system.

  10. Virtual anthropology: useful radiological tools for age assessment in clinical forensic medicine and thanatology.

    PubMed

    Dedouit, Fabrice; Saint-Martin, Pauline; Mokrane, Fatima-Zohra; Savall, Frédéric; Rousseau, Hervé; Crubézy, Eric; Rougé, Daniel; Telmon, Norbert

    2015-09-01

    Virtual anthropology consists of the introduction of modern slice imaging to biological and forensic anthropology. Thanks to this non-invasive scientific revolution, some classifications and staging systems, first based on dry bone analysis, can be applied to cadavers with no need for specific preparation, as well as to living persons. Estimation of bone and dental age is one of the possibilities offered by radiology. Biological age can be estimated in clinical forensic medicine as well as in living persons. Virtual anthropology may also help the forensic pathologist to estimate a deceased person's age at death, which together with sex, geographical origin and stature, is one of the important features determining a biological profile used in reconstructive identification. For this forensic purpose, the radiological tools used are multislice computed tomography and, more recently, X-ray free imaging techniques such as magnetic resonance imaging and ultrasound investigations. We present and discuss the value of these investigations for age estimation in anthropology.

  11. [The medical community's perceptions of management of the layoff process].

    PubMed

    Monreal-Bosch, Pilar; Perera, Santiago; González, Maite Martínez; Selva, Clara

    2017-08-21

    The definition and process of layoff are evolving rapidly. This study focuses on the perceptions of physicians in Catalonia, Spain, concerning layoff and the identification of strategies and proposals that allow more satisfactory adjustment to the process. A qualitative approach was used with 16 in-depth interviews with key persons in the healthcare setting (phase 1) and 6 focus groups with 72 persons, according to sampling criteria (phase 2). The analysis was interpretative, based on Grounded Theory. Comparison and triangulation of the results generated by the different techniques and researchers revealed the social representation of the current healthcare organization (immersed in a new public management model) on the medical community and the layoff process. In this sense, retirement is seen as a personal issue, separate from human resources policies, which are more interested in staff turnover at a lower "cost". Given this situation, the article proposes alternatives that value physicians' experience and expertise before they leave the healthcare organization.

  12. Effects of organizational safety on employees' proactivity safety behaviors and occupational health and safety management systems in Chinese high-risk small-scale enterprises.

    PubMed

    Mei, Qiang; Wang, Qiwei; Liu, Suxia; Zhou, Qiaomei; Zhang, Jingjing

    2018-06-07

    Based on the characteristics of small-scale enterprises, the improvement of occupational health and safety management systems (OHS MS) needs an effective intervention. This study proposed a structural equation model and examined the relationships of perceived organization support for safety (POSS), person-organization safety fit (POSF) and proactivity safety behaviors with safety management, safety procedures and safety hazards identification. Data were collected from 503 employees of 105 Chinese high-risk small-scale enterprises over 6 months. The results showed that both POSS and POSF were positively related to improvement in safety management, safety procedures and safety hazards identification through proactivity safety behaviors. Our findings provide a new perspective on organizational safety for improving OHS MS for small-scale enterprises and extend the application of proactivity safety behaviors.

  13. Intelligent Systems Approach for Automated Identification of Individual Control Behavior of a Human Operator

    NASA Technical Reports Server (NTRS)

    Zaychik, Kirill B.; Cardullo, Frank M.

    2012-01-01

    Results have been obtained using conventional techniques to model the generic human operator?s control behavior, however little research has been done to identify an individual based on control behavior. The hypothesis investigated is that different operators exhibit different control behavior when performing a given control task. Two enhancements to existing human operator models, which allow personalization of the modeled control behavior, are presented. One enhancement accounts for the testing control signals, which are introduced by an operator for more accurate control of the system and/or to adjust the control strategy. This uses the Artificial Neural Network which can be fine-tuned to model the testing control. Another enhancement takes the form of an equiripple filter which conditions the control system power spectrum. A novel automated parameter identification technique was developed to facilitate the identification process of the parameters of the selected models. This utilizes a Genetic Algorithm based optimization engine called the Bit-Climbing Algorithm. Enhancements were validated using experimental data obtained from three different sources: the Manual Control Laboratory software experiments, Unmanned Aerial Vehicle simulation, and NASA Langley Research Center Visual Motion Simulator studies. This manuscript also addresses applying human operator models to evaluate the effectiveness of motion feedback when simulating actual pilot control behavior in a flight simulator.

  14. Metabolomic profiles in individuals with negative affectivity and social inhibition: a population-based study of Type D personality.

    PubMed

    Altmaier, Elisabeth; Emeny, Rebecca T; Krumsiek, Jan; Lacruz, Maria E; Lukaschek, Karoline; Häfner, Sibylle; Kastenmüller, Gabi; Römisch-Margl, Werner; Prehn, Cornelia; Mohney, Robert P; Evans, Anne M; Milburn, Michael V; Illig, Thomas; Adamski, Jerzy; Theis, Fabian; Suhre, Karsten; Ladwig, Karl-Heinz

    2013-08-01

    Individuals with negative affectivity who are inhibited in social situations are characterized as distressed, or Type D, and have an increased risk of cardiovascular disease (CVD). The underlying biomechanisms that link this psychological affect to a pathological state are not well understood. This study applied a metabolomic approach to explore biochemical pathways that may contribute to the Type D personality. Type D personality was determined by the Type D Scale-14. Small molecule biochemicals were measured using two complementary mass-spectrometry based metabolomics platforms. Metabolic profiles of Type D and non-Type D participants within a population-based study in Southern Germany were compared in cross-sectional regression analyses. The PHQ-9 and GAD-7 instruments were also used to assess symptoms of depression and anxiety, respectively, within this metabolomic study. 668 metabolites were identified in the serum of 1502 participants (age 32-77); 386 of these individuals were classified as Type D. While demographic and biomedical characteristics were equally distributed between the groups, a higher level of depression and anxiety was observed in Type D individuals. Significantly lower levels of the tryptophan metabolite kynurenine were associated with Type D (p-value corrected for multiple testing=0.042), while no significant associations could be found for depression and anxiety. A Gaussian graphical model analysis enabled the identification of four potentially interesting metabolite networks that are enriched in metabolites (androsterone sulfate, tyrosine, indoxyl sulfate or caffeine) that associate nominally with Type D personality. This study identified novel biochemical pathways associated with Type D personality and demonstrates that the application of metabolomic approaches in population studies can reveal mechanisms that may contribute to psychological health and disease. Copyright © 2012 Elsevier Ltd. All rights reserved.

  15. Personal suicidality in reception and identification with suicidal film characters.

    PubMed

    Till, Benedikt; Vitouch, Peter; Herberth, Arno; Sonneck, Gernot; Niederkrotenthaler, Thomas

    2013-04-01

    The authors investigated the impact of suicidality on identity work during film exposure. Adults with low suicidality (n = 150) watched either It's My Party or The Fire Within, censored versions of these films not depicting the suicide, or the control film that concluded with a non-suicidal death. Baseline suicidality was measured with questionnaires before the movie. Identity work and identification with the protagonist were measured after the movie. Suicidality was directly associated with identity work during film dramas depicting suicide methods. The reception of suicide-related media content seems to partially depend on personal suicidality. Potential implications for suicide prevention are discussed.

  16. Factors for radical creativity, incremental creativity, and routine, noncreative performance.

    PubMed

    Madjar, Nora; Greenberg, Ellen; Chen, Zheng

    2011-07-01

    This study extends theory and research by differentiating between routine, noncreative performance and 2 distinct types of creativity: radical and incremental. We also use a sensemaking perspective to examine the interplay of social and personal factors that may influence a person's engagement in a certain level of creative action versus routine, noncreative work. Results demonstrate that willingness to take risks, resources for creativity, and career commitment are associated primarily with radical creativity; that the presence of creative coworkers and organizational identification are associated with incremental creativity; and that conformity and organizational identification are linked with routine performance. Theoretical and managerial implications are discussed.

  17. The cognitive neuroscience of person identification.

    PubMed

    Biederman, Irving; Shilowich, Bryan E; Herald, Sarah B; Margalit, Eshed; Maarek, Rafael; Meschke, Emily X; Hacker, Catrina M

    2018-02-14

    We compare and contrast five differences between person identification by voice and face. 1. There is little or no cost when a familiar face is to be recognized from an unrestricted set of possible faces, even at Rapid Serial Visual Presentation (RSVP) rates, but the accuracy of familiar voice recognition declines precipitously when the set of possible speakers is increased from one to a mere handful. 2. Whereas deficits in face recognition are typically perceptual in origin, those with normal perception of voices can manifest severe deficits in their identification. 3. Congenital prosopagnosics (CPros) and congenital phonagnosics (CPhon) are generally unable to imagine familiar faces and voices, respectively. Only in CPros, however, is this deficit a manifestation of a general inability to form visual images of any kind. CPhons report no deficit in imaging non-voice sounds. 4. The prevalence of CPhons of 3.2% is somewhat higher than the reported prevalence of approximately 2.0% for CPros in the population. There is evidence that CPhon represents a distinct condition statistically and not just normal variation. 5. Face and voice recognition proficiency are uncorrelated rather than reflecting limitations of a general capacity for person individuation. Copyright © 2018 Elsevier Ltd. All rights reserved.

  18. Methodology of the determination of the uncertainties by using the biometric device the broadway 3D

    NASA Astrophysics Data System (ADS)

    Jasek, Roman; Talandova, Hana; Adamek, Milan

    2016-06-01

    The biometric identification by face is among one of the most widely used methods of biometric identification. Due to it provides a faster and more accurate identification; it was implemented into area of security 3D face reader by Broadway manufacturer was used to measure. It is equipped with the 3D camera system, which uses the method of structured light scanning and saves the template into the 3D model of face. The obtained data were evaluated by software Turnstile Enrolment Application (TEA). The measurements were used 3D face reader the Broadway 3D. First, the person was scanned and stored in the database. Thereafter person has already been compared with the stored template in the database for each method. Finally, a measure of reliability was evaluated for the Broadway 3D face reader.

  19. [Biometric method for the description of the head of an unrecognized corpse for the purpose of personality individualization and identification].

    PubMed

    Zviagin, V N; Galitskaia, O I; Negasheva, M A

    2012-01-01

    We have determined absolute dimensions of the head and the relationship between the dimensions of its selected parts. The study enrolled adult subjects (mostly of Russian ethnicity) at the age from 17 to 22 years (1108 men and 1153 women). We calculated the normal values for the estimation of real dimensional characteristics and the frequency of their occurrence in the population. The proposed approach makes it possible to reliably identify the dimensional features of human appearance in terms of the quantitative verbal description (categories 1-5) and to reveal its most characteristic features. The results of this biometric study of the heads of unrecognized corpses obtained by the specially developed technology may be used in operational and search investigations, in the procedure of corpse identification, and forensic medical personality identification of a missing subject.

  20. Acquisition Level Definitions and Observables for Human Targets, Urban Operations, and the Global War on Terrorism

    DTIC Science & Technology

    2005-04-08

    category, feature identification, has been added to address such worn or carried objects, and facial recognition . The definitions also address commercial...Cell phone or revolver − Uniform worn by French or US or Chinese infantry − Facial recognition /identification (A particular person can be

  1. 76 FR 28503 - Identification of Three Entities as Government of Libya Entities Pursuant to Executive Order 13566

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-17

    ... DEPARTMENT OF THE TREASURY Office of Foreign Assets Control Identification of Three Entities as Government of Libya Entities Pursuant to Executive Order 13566 AGENCY: Department of the Treasury. ACTION... names of three entities identified on May 5, 2011 as persons whose property and interests in property...

  2. Orientation to Machine Shop. Safety, Machine Identification, Metal Identification.

    ERIC Educational Resources Information Center

    Engelbrecht, Nancy; And Others

    These instructional materials provide an orientation to the machine shop for use at the postsecondary level. The first of three sections discusses four important areas of safety: (1) personal safety; (2) safety procedures; (3) safe work practices; and (4) fire prevention. The second section identifies and describes the general purposes of 12…

  3. The Impact of Self-Selection and Reference Group Identification in a University Living-Learning Center

    ERIC Educational Resources Information Center

    Fisher, Ronald J.; Andrews, John J.

    1976-01-01

    A co-educational living-learning center for the arts was studied through participant observation and quantitative assessment. The results document the importance of full self-selection into a membership group and demonstrate the relationships between reference group identification, basic interests in personality, and social behavior. (Author)

  4. RFID: A Revolution in Automatic Data Recognition

    ERIC Educational Resources Information Center

    Deal, Walter F., III

    2004-01-01

    Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna…

  5. The Impact of Subjective Age and Stigma on Older Persons

    ERIC Educational Resources Information Center

    Ward, Russell A.

    1977-01-01

    This study investigated the impact of shifts in age identification by older people (N=323) from "middle-aged" to "elderly" within the context of the labeling theory of deviance. Age identification was unrelated to attitudes toward old people and the label "elderly" did not affect self-esteem through any "gate-keeping" process. (Author)

  6. Identification and Access Management: An Action Research Approach to Develop a Training Strategy for Higher Education

    ERIC Educational Resources Information Center

    San Nicolas-Rocca, Tonia

    2010-01-01

    Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…

  7. Translating nanoparticulate-personalized cancer vaccines into clinical applications: case study with RNA-lipoplexes for the treatment of melanoma.

    PubMed

    Grabbe, Stephan; Haas, Heinrich; Diken, Mustafa; Kranz, Lena M; Langguth, Peter; Sahin, Ugur

    2016-10-01

    The development of nucleic acid based vaccines against cancer has gained considerable momentum through the advancement of modern sequencing technologies and on novel RNA-based synthetic drug formats, which can be readily adapted following identification of every patient's tumor-specific mutations. Furthermore, affordable and individual 'on demand' production of molecularly optimized vaccines should allow their application in large groups of patients. This has resulted in the therapeutic concept of an active personalized cancer vaccine, which has been brought into clinical testing. Successful trials have been performed by intranodal administration of sterile isotonic solutions of synthetic RNA vaccines. The second generation of RNA vaccines which is currently being developed encompasses intravenously injectable RNA nanoparticle formulations (lipoplexes), made up from lipid excipients, denoted RNA (LIP) . A first product that has made its way from bench to bedside is a therapeutic vaccine for intravenous administration based on a fixed set of four RNA lipoplex drug products, each encoding for one shared tumor antigen (Lipoplex Melanoma RNA Immunotherapy, 'Lipo-MERIT'). This article describes the steps for translating these novel RNA nanomedicines into clinical trials.

  8. Personality and support for universal human rights: a review and test of a structural model.

    PubMed

    McFarland, Sam

    2010-12-01

    All individual differences that predict support for international human rights are first reviewed: support for human rights is linked most positively to "globalism" (other international and environmental concerns), "identification with all humanity," principled moral reasoning, benevolence, and dispositional empathy. It is related most negatively to ethnocentrism and its root dispositions, the social dominance orientation, and authoritarianism. Other correlates are also noted. Secondly, a structural model of the effects of authoritarianism, social dominance, ethnocentrism and identification with all humanity upon commitment to human rights is presented and tested. Across 2 studies (Study 1, N=218 nonstudent adults; Study 2, N=102 university students), ethnocentrism and identification with all humanity directly predicted human rights commitment. The effects of authoritarianism upon this commitment were fully mediated through enhanced ethnocentrism and reduced identification with all humanity. The effects of social dominance were similar, but its direct effect upon human rights commitment remained significant and was not, in the second study, mediated by reduced dispositional empathy. © 2010 The Author. Journal of Personality © 2010, Wiley Periodicals, Inc.

  9. Privacy protection schemes for fingerprint recognition systems

    NASA Astrophysics Data System (ADS)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  10. Using the MMPI/MMPI-2 with the Hispanic/Latino Population.

    ERIC Educational Resources Information Center

    Whitney, Jennifer M.

    Examination of the relationship between Hispanic/Latino ethnicity, racial identification, acculturation, culture, language and the Minnesota Multiphasic Personality Inventory (MMPI/MMPI-2) has revealed controversial results. Because the MMPI/MMPI-2 is the most widely used personality assessment, it is important to understand how ethnic and…

  11. Object Relations and the Development of Values.

    ERIC Educational Resources Information Center

    Gazda, George M.; Sedgwick, Charlalee

    1990-01-01

    Claims acquisition of values is related to successes and failures of early relationships. Describes steps person goes through in making identifications, explaining steps that move person toward construction of value system. Refers to works of Heinz Kohut to explain how child's idealizing has within it necessary components for child's growth in…

  12. Characteristics of the Creative Development Technologies Applying during the Work with Students

    ERIC Educational Resources Information Center

    Krinitsyna, Anastasiya Vyacheslavovna; Nikitin, Oleg Denisovich; Boyakova, Ekaterina Vyacheslavovna

    2016-01-01

    Present article explores the characteristics of the influence of creative influence technologies for school and college students on their professional and personal self-identification. The aim of the study is students' creative development, which represents the process of integration of mental, emotional and physical personality components, which…

  13. 32 CFR 552.91 - Individual permit procedures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    .... (2) Personal information including Social Security Number. (3) Vehicle identification and license number, if a vehicle is to be brought on post. (4) Names and ages of minor family members who will... section. (c) A permit and a vehicle pass will be issued to each person authorized area access. The permit...

  14. 32 CFR 552.91 - Individual permit procedures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    .... (2) Personal information including Social Security Number. (3) Vehicle identification and license number, if a vehicle is to be brought on post. (4) Names and ages of minor family members who will... section. (c) A permit and a vehicle pass will be issued to each person authorized area access. The permit...

  15. 32 CFR 552.91 - Individual permit procedures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    .... (2) Personal information including Social Security Number. (3) Vehicle identification and license number, if a vehicle is to be brought on post. (4) Names and ages of minor family members who will... section. (c) A permit and a vehicle pass will be issued to each person authorized area access. The permit...

  16. 32 CFR 552.91 - Individual permit procedures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    .... (2) Personal information including Social Security Number. (3) Vehicle identification and license number, if a vehicle is to be brought on post. (4) Names and ages of minor family members who will... section. (c) A permit and a vehicle pass will be issued to each person authorized area access. The permit...

  17. 32 CFR 552.91 - Individual permit procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .... (2) Personal information including Social Security Number. (3) Vehicle identification and license number, if a vehicle is to be brought on post. (4) Names and ages of minor family members who will... section. (c) A permit and a vehicle pass will be issued to each person authorized area access. The permit...

  18. 21 CFR 880.5300 - Medical absorbent fiber.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Medical absorbent fiber. 880.5300 Section 880.5300...) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL USE DEVICES General Hospital and Personal Use Therapeutic Devices § 880.5300 Medical absorbent fiber. (a) Identification. A medical absorbent fiber is a device...

  19. 21 CFR 880.5300 - Medical absorbent fiber.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Medical absorbent fiber. 880.5300 Section 880.5300...) MEDICAL DEVICES GENERAL HOSPITAL AND PERSONAL USE DEVICES General Hospital and Personal Use Therapeutic Devices § 880.5300 Medical absorbent fiber. (a) Identification. A medical absorbent fiber is a device...

  20. Self-Renewal, Personal Development and Change: An Inexorable Link.

    ERIC Educational Resources Information Center

    Krupp, Judy-Arin

    1995-01-01

    Self-renewal, personal development, and change create an inexorable link. Change management processes include the following: (1) internal locus of control; (2) freedom from institutional crutches; (3) flexible teaching; (4) recognition of emotional reactions to change; and (5) identification of the causes of indecisiveness and insecurities. (JOW)

Top