Science.gov

Sample records for spatial error concealment

  1. Video inpainting with short-term windows: application to object removal and error concealment.

    PubMed

    Ebdelli, Mounira; Le Meur, Olivier; Guillemot, Christine

    2015-10-01

    In this paper, we propose a new video inpainting method which applies to both static or free-moving camera videos. The method can be used for object removal, error concealment, and background reconstruction applications. To limit the computational time, a frame is inpainted by considering a small number of neighboring pictures which are grouped into a group of pictures (GoP). More specifically, to inpaint a frame, the method starts by aligning all the frames of the GoP. This is achieved by a region-based homography computation method which allows us to strengthen the spatial consistency of aligned frames. Then, from the stack of aligned frames, an energy function based on both spatial and temporal coherency terms is globally minimized. This energy function is efficient enough to provide high quality results even when the number of pictures in the GoP is rather small, e.g. 20 neighboring frames. This drastically reduces the algorithm complexity and makes the approach well suited for near real-time video editing applications as well as for loss concealment applications. Experiments with several challenging video sequences show that the proposed method provides visually pleasing results for object removal, error concealment, and background reconstruction context.

  2. A neighbourhood analysis based technique for real-time error concealment in H.264 intra pictures

    NASA Astrophysics Data System (ADS)

    Beesley, Steven T. C.; Grecos, Christos; Edirisinghe, Eran

    2007-02-01

    H.264s extensive use of context-based adaptive binary arithmetic or variable length coding makes streams highly susceptible to channel errors, a common occurrence over networks such as those used by mobile devices. Even a single bit error will cause a decoder to discard all stream data up to the next fixed length resynchronisation point, the worst scenario is that an entire slice is lost. In cases where retransmission and forward error concealment are not possible, a decoder should conceal any erroneous data in order to minimise the impact on the viewer. Stream errors can often be spotted early in the decode cycle of a macroblock which if aborted can provide unused processor cycles, these can instead be used to conceal errors at minimal cost, even as part of a real time system. This paper demonstrates a technique that utilises Sobel convolution kernels to quickly analyse the neighbourhood surrounding erroneous macroblocks before performing a weighted multi-directional interpolation. This generates significantly improved statistical (PSNR) and visual (IEEE structural similarity) results when compared to the commonly used weighted pixel value averaging. Furthermore it is also computationally scalable, both during analysis and concealment, achieving maximum performance from the spare processing power available.

  3. Pixel-level Matching Based Multi-hypothesis Error Concealment Modes for Wireless 3D H.264/MVC Communication

    NASA Astrophysics Data System (ADS)

    El-Shafai, Walid

    2015-09-01

    3D multi-view video (MVV) is multiple video streams shot by several cameras around a single scene simultaneously. Therefore it is an urgent task to achieve high 3D MVV compression to meet future bandwidth constraints while maintaining a high reception quality. 3D MVV coded bit-streams that are transmitted over wireless network can suffer from error propagation in the space, time and view domains. Error concealment (EC) algorithms have the advantage of improving the received 3D video quality without any modifications in the transmission rate or in the encoder hardware or software. To improve the quality of reconstructed 3D MVV, we propose an efficient adaptive EC algorithm with multi-hypothesis modes to conceal the erroneous Macro-Blocks (MBs) of intra-coded and inter-coded frames by exploiting the spatial, temporal and inter-view correlations between frames and views. Our proposed algorithm adapts to 3D MVV motion features and to the error locations. The lost MBs are optimally recovered by utilizing motion and disparity matching between frames and views on pixel-by-pixel matching basis. Our simulation results show that the proposed adaptive multi-hypothesis EC algorithm can significantly improve the objective and subjective 3D MVV quality.

  4. Joint source coding, transport processing, and error concealment for H.323-based packet video

    NASA Astrophysics Data System (ADS)

    Zhu, Qin-Fan; Kerofsky, Louis

    1998-12-01

    In this paper, we investigate how to adapt different parameters in H.263 source coding, transport processing and error concealment to optimize end-to-end video quality at different bitrates and packet loss rates for H.323-based packet video. First different intra coding patterns are compared and we show that the contiguous rectangle or square block pattern offers the best performance in terms of video quality in the presence of packet loss. Second, the optimal intra coding frequency is found for different bitrates and packet loss rates. The optimal number of GOB headers to be inserted in the source coding is then determined. The effect of transport processing strategies such as packetization and retransmission is also examined. For packetization, the impact of packet size and the effect of macroblock segmentation to picture quality are investigated. Finally, we show that the dejitter buffering delay can be used to the advantage for packet loss recovery with video retransmission without incurring any extra delay.

  5. Using self-authentication and recovery images for error concealment in wireless environments

    NASA Astrophysics Data System (ADS)

    Lin, Ching-Yung; Sow, Daby; Chang, Shih-Fu

    2001-11-01

    Handling packet loss or delay in the mobile and/or Internet environment is usually a challenging problem for multimedia transmission. Using connection-oriented protocol such as TCP may introduce intolerable time delay in re-transmission. Using datagram-oriented protocols such as UDP may cause partial representation in case of packet loss. In this paper, we propose a new method of using our self-authentication-and-recovery images (SARI) to do the error detection and concealment in the UDP environment. The lost information in a SARI image can be approximately recovered based on the embedded watermark, which includes the content-based authentication information and recovery information. Images or video frames are watermarked in a priori such that no additional mechanism is needed in the networking or the encoding process. Because the recovery is not based on adjacent blocks, the proposed method can recover the corrupted area even though the information loss happen in large areas or high variant areas. Our experiments show the advantages of such technique in both transmission time saving and broad application potentials.

  6. Passive error concealment for wavelet-coded I-frames with an inhomogeneous Gauss-Markov random field model.

    PubMed

    Rombaut, Joost; Pizurica, Aleksandra; Philips, Wilfried

    2009-04-01

    In video communication over lossy packet networks (e.g., the Internet), packet loss errors can severely damage the transmitted video. The damaged video can largely be repaired with passive error concealment, where neighboring information is used to estimate missing information. We address the problem of passive error concealment for wavelet coded data with dispersive packetization. The reported techniques of this kind have many problems and usually fail in the reconstruction of high-frequency content. This paper presents a novel locally adaptive error concealment method for subband coded I-frames based on an inhomogeneous Gaussian Markov random field model. We estimate the parameters of this model from a local context of each lost coefficient, and we interpolate the lost coefficients accordingly. The results demonstrate a significant improvement over the reported related methods both in terms of objective performance measures and visually. The biggest improvement of the proposed method compared to the state-of-the-art in the field is the correct reconstruction of high-frequency information such as textures and edges.

  7. Geometric-structure-based directional filtering for error concealment in image/video transmission

    NASA Astrophysics Data System (ADS)

    Zeng, Wenjun; Liu, Bede

    1995-12-01

    The time varying nature of wireless channels can cause severe error bursts or dropouts. It is important to recover lost data in coded images in interactive video communication over wireless network. A good spatial interpolation strategy is considered as essential for replenishing missing blocks in still images and video frames. This paper proposes a novel spatial directional interpolation scheme which makes use of the local geometric information extracted from the surrounding blocks. Specifically, statistics of the local geometric structure are modeled as a bimodal distribution. The two nearest surrounding layers of pixels are converted into binary pattern to reveal the local geometric structure. A measure of directional consistency is employed to resolve ambiguity of possible connections of the transition points on the inner layer. The transition lines can be specified within one-pixel accuracy, unlike previous directional filtering schemes which usually filter along only one single direction chosen from a finite candidate set. The new approach produces results that are superior to that of other approaches, in terms of both peak signal-to-noise ratio (PSNR) and visual quality. The computation is also much reduced. It is observed that local structures such as edges, streaks and corners are well preserved in the reconstructed image.

  8. Stand-off spatial offset Raman spectroscopy for the detection of concealed content in distant objects.

    PubMed

    Zachhuber, Bernhard; Gasser, Christoph; Chrysostom, Engelene tH; Lendl, Bernhard

    2011-12-15

    A pulsed (4.4 ns pulse length) frequency-doubled Nd:YAG laser operated at 10 Hz was used to generate Raman scattering of samples at a distance of 12 m. The scattered light was collected by a 6 in. telescope, and the Raman spectrum was recorded using an Acton SP-2750 spectrograph coupled to a gated intensified charge-coupled device (ICCD) detector. Applying a spatial offset between the point where the laser hit the sample and the focus of the telescope on the sample enabled collection of Raman photons that were predominantly generated inside the sample and not from its surface. This is especially effective when the content of concealed objects should be analyzed. High-quality Raman spectra could be recorded, within 10 s of data acquisition, from a solid (NaClO(3)) as well as a liquid (isopropyl alcohol) placed inside a 1.5 mm thick opaque low-density polyethylene (LDPE) plastic bottle. The applied spatial offset was also advantageous in cases where the surface of the container was highly fluorescent. In such a situation, Raman spectra of the sample could not be recorded when the sampling volume (telescope observation field) coincided with the focus of the excitation laser. However, with the use of a spatial offset of some millimeters, a clear Raman spectrum of the content (isopropyl alcohol) in a strongly fluorescent plastic container was obtained.

  9. Authenticating concealed private data while maintaining concealment

    DOEpatents

    Thomas, Edward V.; Draelos, Timothy J.

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  10. Deterministic error correction for nonlocal spatial-polarization hyperentanglement.

    PubMed

    Li, Tao; Wang, Guan-Yu; Deng, Fu-Guo; Long, Gui-Lu

    2016-01-01

    Hyperentanglement is an effective quantum source for quantum communication network due to its high capacity, low loss rate, and its unusual character in teleportation of quantum particle fully. Here we present a deterministic error-correction scheme for nonlocal spatial-polarization hyperentangled photon pairs over collective-noise channels. In our scheme, the spatial-polarization hyperentanglement is first encoded into a spatial-defined time-bin entanglement with identical polarization before it is transmitted over collective-noise channels, which leads to the error rejection of the spatial entanglement during the transmission. The polarization noise affecting the polarization entanglement can be corrected with a proper one-step decoding procedure. The two parties in quantum communication can, in principle, obtain a nonlocal maximally entangled spatial-polarization hyperentanglement in a deterministic way, which makes our protocol more convenient than others in long-distance quantum communication. PMID:26861681

  11. Deterministic error correction for nonlocal spatial-polarization hyperentanglement

    PubMed Central

    Li, Tao; Wang, Guan-Yu; Deng, Fu-Guo; Long, Gui-Lu

    2016-01-01

    Hyperentanglement is an effective quantum source for quantum communication network due to its high capacity, low loss rate, and its unusual character in teleportation of quantum particle fully. Here we present a deterministic error-correction scheme for nonlocal spatial-polarization hyperentangled photon pairs over collective-noise channels. In our scheme, the spatial-polarization hyperentanglement is first encoded into a spatial-defined time-bin entanglement with identical polarization before it is transmitted over collective-noise channels, which leads to the error rejection of the spatial entanglement during the transmission. The polarization noise affecting the polarization entanglement can be corrected with a proper one-step decoding procedure. The two parties in quantum communication can, in principle, obtain a nonlocal maximally entangled spatial-polarization hyperentanglement in a deterministic way, which makes our protocol more convenient than others in long-distance quantum communication. PMID:26861681

  12. Deterministic error correction for nonlocal spatial-polarization hyperentanglement

    NASA Astrophysics Data System (ADS)

    Li, Tao; Wang, Guan-Yu; Deng, Fu-Guo; Long, Gui-Lu

    2016-02-01

    Hyperentanglement is an effective quantum source for quantum communication network due to its high capacity, low loss rate, and its unusual character in teleportation of quantum particle fully. Here we present a deterministic error-correction scheme for nonlocal spatial-polarization hyperentangled photon pairs over collective-noise channels. In our scheme, the spatial-polarization hyperentanglement is first encoded into a spatial-defined time-bin entanglement with identical polarization before it is transmitted over collective-noise channels, which leads to the error rejection of the spatial entanglement during the transmission. The polarization noise affecting the polarization entanglement can be corrected with a proper one-step decoding procedure. The two parties in quantum communication can, in principle, obtain a nonlocal maximally entangled spatial-polarization hyperentanglement in a deterministic way, which makes our protocol more convenient than others in long-distance quantum communication.

  13. Improving OFDR spatial resolution by reducing external clock sampling error

    NASA Astrophysics Data System (ADS)

    Feng, Bowen; Liu, Kun; Liu, Tiegen; Jiang, Junfeng; Du, Yang

    2016-03-01

    Utilizing an auxiliary interferometer to produce external clock signals as the data acquirement clock is widely used to compensate the nonlinearity of the tunable laser source (TLS) in optical frequency domain reflectometry (OFDR). However, this method is not always accurate because of the large optical length difference of both arms in the auxiliary interferometer. To investigate the deviation, we study the source and influence of the external clock sampling error in OFDR system. Based on the model, we find that the sampling error declines with the increase of the TLS's optical frequency tuning rate. The spatial resolution can be as high as 4.8 cm and the strain sensing location accuracy can be up to 0.15 m at the measurement length of 310 m under the minimum sampling error with the optical frequency tuning rate of 2500 GHz/s. Hence, the spatial resolution can be improved by reducing external clock sampling error in OFDR system.

  14. Spatial reasoning in the treatment of systematic sensor errors

    SciTech Connect

    Beckerman, M.; Jones, J.P.; Mann, R.C.; Farkas, L.A.; Johnston, S.E.

    1988-01-01

    In processing ultrasonic and visual sensor data acquired by mobile robots systematic errors can occur. The sonar errors include distortions in size and surface orientation due to the beam resolution, and false echoes. The vision errors include, among others, ambiguities in discriminating depth discontinuities from intensity gradients generated by variations in surface brightness. In this paper we present a methodology for the removal of systematic errors using data from the sonar sensor domain to guide the processing of information in the vision domain, and vice versa. During the sonar data processing some errors are removed from 2D navigation maps through pattern analyses and consistent-labelling conditions, using spatial reasoning about the sonar beam and object characteristics. Others are removed using visual information. In the vision data processing vertical edge segments are extracted using a Canny-like algorithm, and are labelled. Object edge features are then constructed from the segments using statistical and spatial analyses. A least-squares method is used during the statistical analysis, and sonar range data are used in the spatial analysis. 7 refs., 10 figs.

  15. Spatial uncertainty analysis: Propagation of interpolation errors in spatially distributed models

    USGS Publications Warehouse

    Phillips, D.L.; Marks, D.G.

    1996-01-01

    In simulation modelling, it is desirable to quantify model uncertainties and provide not only point estimates for output variables but confidence intervals as well. Spatially distributed physical and ecological process models are becoming widely used, with runs being made over a grid of points that represent the landscape. This requires input values at each grid point, which often have to be interpolated from irregularly scattered measurement sites, e.g., weather stations. Interpolation introduces spatially varying errors which propagate through the model We extended established uncertainty analysis methods to a spatial domain for quantifying spatial patterns of input variable interpolation errors and how they propagate through a model to affect the uncertainty of the model output. We applied this to a model of potential evapotranspiration (PET) as a demonstration. We modelled PET for three time periods in 1990 as a function of temperature, humidity, and wind on a 10-km grid across the U.S. portion of the Columbia River Basin. Temperature, humidity, and wind speed were interpolated using kriging from 700- 1000 supporting data points. Kriging standard deviations (SD) were used to quantify the spatially varying interpolation uncertainties. For each of 5693 grid points, 100 Monte Carlo simulations were done, using the kriged values of temperature, humidity, and wind, plus random error terms determined by the kriging SDs and the correlations of interpolation errors among the three variables. For the spring season example, kriging SDs averaged 2.6??C for temperature, 8.7% for relative humidity, and 0.38 m s-1 for wind. The resultant PET estimates had coefficients of variation (CVs) ranging from 14% to 27% for the 10-km grid cells. Maps of PET means and CVs showed the spatial patterns of PET with a measure of its uncertainty due to interpolation of the input variables. This methodology should be applicable to a variety of spatially distributed models using interpolated

  16. [Prediction of spatial distribution of forest carbon storage in Heilongjiang Province using spatial error model].

    PubMed

    Liu, Chang; Li, Feng-Ri; Zhen, Zhen

    2014-10-01

    Abstract: Based on the data from Chinese National Forest Inventory (CNFI) and Key Ecological Benefit Forest Monitoring plots (5075 in total) in Heilongjiang Province in 2010 and concurrent meteorological data coming from 59 meteorological stations located in Heilongjiang, Jilin and Inner Mongolia, this paper established a spatial error model (SEM) by GeoDA using carbon storage as dependent variable and several independent variables, including diameter of living trees (DBH), number of trees per hectare (TPH), elevation (Elev), slope (Slope), and product of precipitation and temperature (Rain_Temp). Global Moran's I was computed for describing overall spatial autocorrelations of model results at different spatial scales. Local Moran's I was calculated at the optimal bandwidth (25 km) to present spatial distribution residuals. Intra-block spatial variances were computed to explain spatial heterogeneity of residuals. Finally, a spatial distribution map of carbon storage in Heilongjiang was visualized based on predictions. The results showed that the distribution of forest carbon storage in Heilongjiang had spatial effect and was significantly influenced by stand, topographic and meteorological factors, especially average DBH. SEM could solve the spatial autocorrelation and heterogeneity well. There were significant spatial differences in distribution of forest carbon storage. The carbon storage was mainly distributed in Zhangguangcai Mountain, Xiao Xing'an Mountain and Da Xing'an Mountain where dense, forests existed, rarely distributed in Songnen Plains, while Wanda Mountain had moderate-level carbon storage. PMID:25796882

  17. Augmented GNSS differential corrections minimum mean square error estimation sensitivity to spatial correlation modeling errors.

    PubMed

    Kassabian, Nazelie; Lo Presti, Letizia; Rispoli, Francesco

    2014-06-11

    Railway signaling is a safety system that has evolved over the last couple of centuries towards autonomous functionality. Recently, great effort is being devoted in this field, towards the use and exploitation of Global Navigation Satellite System (GNSS) signals and GNSS augmentation systems in view of lower railway track equipments and maintenance costs, that is a priority to sustain the investments for modernizing the local and regional lines most of which lack automatic train protection systems and are still manually operated. The objective of this paper is to assess the sensitivity of the Linear Minimum Mean Square Error (LMMSE) algorithm to modeling errors in the spatial correlation function that characterizes true pseudorange Differential Corrections (DCs). This study is inspired by the railway application; however, it applies to all transportation systems, including the road sector, that need to be complemented by an augmentation system in order to deliver accurate and reliable positioning with integrity specifications. A vector of noisy pseudorange DC measurements are simulated, assuming a Gauss-Markov model with a decay rate parameter inversely proportional to the correlation distance that exists between two points of a certain environment. The LMMSE algorithm is applied on this vector to estimate the true DC, and the estimation error is compared to the noise added during simulation. The results show that for large enough correlation distance to Reference Stations (RSs) distance separation ratio values, the LMMSE brings considerable advantage in terms of estimation error accuracy and precision. Conversely, the LMMSE algorithm may deteriorate the quality of the DC measurements whenever the ratio falls below a certain threshold.

  18. Augmented GNSS Differential Corrections Minimum Mean Square Error Estimation Sensitivity to Spatial Correlation Modeling Errors

    PubMed Central

    Kassabian, Nazelie; Presti, Letizia Lo; Rispoli, Francesco

    2014-01-01

    Railway signaling is a safety system that has evolved over the last couple of centuries towards autonomous functionality. Recently, great effort is being devoted in this field, towards the use and exploitation of Global Navigation Satellite System (GNSS) signals and GNSS augmentation systems in view of lower railway track equipments and maintenance costs, that is a priority to sustain the investments for modernizing the local and regional lines most of which lack automatic train protection systems and are still manually operated. The objective of this paper is to assess the sensitivity of the Linear Minimum Mean Square Error (LMMSE) algorithm to modeling errors in the spatial correlation function that characterizes true pseudorange Differential Corrections (DCs). This study is inspired by the railway application; however, it applies to all transportation systems, including the road sector, that need to be complemented by an augmentation system in order to deliver accurate and reliable positioning with integrity specifications. A vector of noisy pseudorange DC measurements are simulated, assuming a Gauss-Markov model with a decay rate parameter inversely proportional to the correlation distance that exists between two points of a certain environment. The LMMSE algorithm is applied on this vector to estimate the true DC, and the estimation error is compared to the noise added during simulation. The results show that for large enough correlation distance to Reference Stations (RSs) distance separation ratio values, the LMMSE brings considerable advantage in terms of estimation error accuracy and precision. Conversely, the LMMSE algorithm may deteriorate the quality of the DC measurements whenever the ratio falls below a certain threshold. PMID:24922454

  19. Concealed wire tracing apparatus

    DOEpatents

    Kronberg, James W.

    1994-01-01

    An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest.

  20. Large-scale spatial angle measurement and the pointing error analysis

    NASA Astrophysics Data System (ADS)

    Xiao, Wen-jian; Chen, Zhi-bin; Ma, Dong-xi; Zhang, Yong; Liu, Xian-hong; Qin, Meng-ze

    2016-05-01

    A large-scale spatial angle measurement method is proposed based on inertial reference. Common measurement reference is established in inertial space, and the spatial vector coordinates of each measured axis in inertial space are measured by using autocollimation tracking and inertial measurement technology. According to the spatial coordinates of each test vector axis, the measurement of large-scale spatial angle is easily realized. The pointing error of tracking device based on the two mirrors in the measurement system is studied, and the influence of different installation errors to the pointing error is analyzed. This research can lay a foundation for error allocation, calibration and compensation for the measurement system.

  1. Concealed wire tracing apparatus

    DOEpatents

    Kronberg, J.W.

    1994-05-31

    An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface is disclosed. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest. 4 figs.

  2. Concealing with Structured Light

    NASA Astrophysics Data System (ADS)

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N.; Litchinitser, Natalia M.

    2014-02-01

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.

  3. Concealing with Structured Light

    PubMed Central

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N.; Litchinitser, Natalia M.

    2014-01-01

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core. PMID:24522638

  4. Canceling the momentum in a phase-shifting algorithm to eliminate spatially uniform errors.

    PubMed

    Hibino, Kenichi; Kim, Yangjin

    2016-08-10

    In phase-shifting interferometry, phase modulation nonlinearity causes both spatially uniform and nonuniform errors in the measured phase. Conventional linear-detuning error-compensating algorithms only eliminate the spatially variable error component. The uniform error is proportional to the inertial momentum of the data-sampling weight of a phase-shifting algorithm. This paper proposes a design approach to cancel the momentum by using characteristic polynomials in the Z-transform space and shows that an arbitrary M-frame algorithm can be modified to a new (M+2)-frame algorithm that acquires new symmetry to eliminate the uniform error. PMID:27534475

  5. Loss factors associated with spatial and temporal tracking errors in intersatellite PPM communication links

    NASA Technical Reports Server (NTRS)

    Chen, C. C.; Gardner, C. S.

    1986-01-01

    The performance of an optical PPM intersatellite link in the presence of spatial and temporal tracking errors is investigated. It is shown that for a given rms spatial tracking error, an optimal transmitter beamwidth exists which minimizes the probability of bit error. The power penalty associated with the spatial tracking error when the transmitter beamwidth is adjusted to achieve optimal performance is shown to be large (greater than 9 dB) when the rms pointing jitter becomes a significant fraction (greater than 30 percent) of the diffraction limited beamwidth. The power penalty due to temporal tracking error, on the other hand, is relatively small (less than 0.1 dB) when the tracking loop bandwidth is less than 0.1 percent of the slot frequency. By properly allocating losses to spatial and temporal tracking errors, it is seen that a 10 to the -9th error rate can be achieved for a realistic link design with an approximately 3 dB signal power margin.

  6. Functional characteristics of auditory temporal-spatial short-term memory: evidence from serial order errors.

    PubMed

    Parmentier, F B; Jones, D M

    2000-01-01

    The functional characteristics of auditory temporal-spatial short-term memory were explored in 8 experiments in which the to-be-remembered stimuli were sequences of bursts of white noise presented in spatial locations separated in azimuth. Primacy and recency effects were observed in all experiments. A 10-s delay impaired recall for primacy and middle list items but not recency. This effect was shown not to depend on the response modality or on the incidence of omissions or repetitions. Verbal and nonverbal secondary tasks did not affect memory for auditory spatial sounds. Temporal errors rather than spatial errors predominated, suggesting that participants were engaged in a process of maintaining order. This pattern of results may reflect characteristics that serial recall has in common with verbal and spatial recall, but some are unique to the representation of memory for temporal-spatial auditory events.

  7. Effects and correction of magneto-optic spatial light modulator phase errors in an optical correlator

    NASA Technical Reports Server (NTRS)

    Downie, John D.; Hine, Butler P.; Reid, Max B.

    1992-01-01

    The optical phase errors introduced into an optical correlator by the input and filter plane magnetooptic spatial light modulators have been studied. The magnitude of these phase errors is measured and characterized, their effects on the correlation results are evaluated, and a means of correction by a design modification of the binary phase-only optical-filter function is presented. The efficacy of the phase-correction technique is quantified and is found to restore the correlation characteristics to those obtained in the absence of errors, to a high degree. The phase errors of other correlator system elements are also discussed and treated in a similar fashion.

  8. Spatial regression with covariate measurement error: A semi-parametric approach

    PubMed Central

    Huque, Md Hamidul; Bondell, Howard D.; Carroll, Raymond J.; Ryan, Louise M.

    2015-01-01

    Summary Spatial data have become increasingly common in epidemiology and public health research thanks to advances in GIS (Geographic Information Systems) technology. In health research, for example, it is common for epidemiologists to incorporate geographically indexed data into their studies. In practice, however, the spatially-defined covariates are often measured with error. Naive estimators of regression coefficients are attenuated if measurement error is ignored. Moreover, the classical measurement error theory is inapplicable in the context of spatial modelling because of the presence of spatial correlation among the observations. We propose a semi-parametric regression approach to obtain bias corrected estimates of regression parameters and derive their large sample properties. We evaluate the performance of the proposed method through simulation studies and illustrate using data on Ischemic Heart Disease (IHD). Both simulation and practical application demonstrate that the proposed method can be effective in practice. PMID:26788930

  9. Fabrication of SiC aspheric mirrors with low mid-spatial error

    NASA Astrophysics Data System (ADS)

    Tinker, Flemming; Xin, Kai

    2013-09-01

    Recent experience with finishing off-axis parabolas and other conic surfaces is demonstrated by some examples that illustrate surface accuracy - not only in terms of traditional metrics, but also in terms of specified ranges of spatial frequency. Particular attention is given to the topic of interferometric metrology, and the extent to which we can effectively characterize mid-spatial frequency errors. The presence of mid-spatial errors can appear even more dominant in hard ceramics like SiC as compared with glass - reasons for this are suggested. This paper will discuss how controlled force grinding, robotic polishing, and surface smoothing can be employed to minimize and mitigate mid-spatial errors in fast silicon carbide aspheric mirrors. Recent experience and results are presented on two SiC mirrors finished by Aperture Optical Sciences Inc.

  10. Fourier decomposition of spatial localization errors reveals an idiotropic dominance of an internal model of gravity.

    PubMed

    De Sá Teixeira, Nuno Alexandre

    2014-12-01

    Given its conspicuous nature, gravity has been acknowledged by several research lines as a prime factor in structuring the spatial perception of one's environment. One such line of enquiry has focused on errors in spatial localization aimed at the vanishing location of moving objects - it has been systematically reported that humans mislocalize spatial positions forward, in the direction of motion (representational momentum) and downward in the direction of gravity (representational gravity). Moreover, spatial localization errors were found to evolve dynamically with time in a pattern congruent with an anticipated trajectory (representational trajectory). The present study attempts to ascertain the degree to which vestibular information plays a role in these phenomena. Human observers performed a spatial localization task while tilted to varying degrees and referring to the vanishing locations of targets moving along several directions. A Fourier decomposition of the obtained spatial localization errors revealed that although spatial errors were increased "downward" mainly along the body's longitudinal axis (idiotropic dominance), the degree of misalignment between the latter and physical gravity modulated the time course of the localization responses. This pattern is surmised to reflect increased uncertainty about the internal model when faced with conflicting cues regarding the perceived "downward" direction.

  11. Instantaneous detection of spatial gradient errors in differential GNSS

    NASA Astrophysics Data System (ADS)

    Jing, Jing

    Global Navigation Satellite Systems (GNSS) have become a critical element of modern engineering and scientific applications. GPS is currently being used in the design of navigation systems for both civil and military aviation applications. Differential GPS carrier phase measurements between antennas provide a very precise measurement that is useful for these applications. In fact, ground infrastructure has already been implemented in the Ground Based Augmentation System (GBAS) to take advantage of these precise measurements for use in civil aviation. Furthermore, these antennas can also be used to detect and isolate certain signal-in-space (SIS) failures and anomalies that are hazardous to aviation applications, for example the ionospheric anomalies and ephemeris failures. This realization, in turn, has led to the development of numerous carrier-phase based monitors. One drawback of the majority of these monitors is that their performance within a given configuration is dependent on how antennas are paired to form double differences. In contrast, the null space monitor approach is developed to provide consistent detection performance regardless of how the antennas are paired which combines measurements from multiple, spatially separated ground antennas through a null space transformation. The instantaneous carrier phase monitor cannot detect all gradients due to the presence of integer ambiguities. These ambiguities cannot be resolved because the gradient magnitude is unknown a priori. Furthermore, it has been shown that the performance of such monitors is highly dependent on the reference antenna topology. The range of detectable gradients for all carrier phase monitors depends on two factors: the number of antennas and their configuration. Antenna configuration is often overlooked as a means to improve performance. and heuristic arguments typically prevail in the associated siting decisions. However. such heuristics do not provide the maximum detectable range of

  12. The effects of weighting function errors on spatial filters for structural control. [sensors for vibration damping

    NASA Technical Reports Server (NTRS)

    Lindner, Douglas K.; Reichard, Karl M.

    1992-01-01

    Distributed-effect sensors, which respond to spatially distributed inputs over a significant gauge length, encompass piezoelectric laminate films, modal-domain optical fiber sensors, and holographic sensors; they can be fabricated with spatially varying sensitivity to a distributed measurand for spatial filtering. Such spatial filters are configurable to extract various structural parameters from distributed measurements that cannot be directly measured by sensors. A modeling is presently conducted for distributed-effect sensors' integration into state-space structural models, noting the effects of fabrication errors on sensor operation.

  13. On the impact of covariate measurement error on spatial regression modelling

    PubMed Central

    Huque, Md Hamidul; Bondell, Howard; Ryan, Louise

    2015-01-01

    Summary Spatial regression models have grown in popularity in response to rapid advances in GIS (Geographic Information Systems) technology that allows epidemiologists to incorporate geographically indexed data into their studies. However, it turns out that there are some subtle pitfalls in the use of these models. We show that presence of covariate measurement error can lead to significant sensitivity of parameter estimation to the choice of spatial correlation structure. We quantify the effect of measurement error on parameter estimates, and then suggest two different ways to produce consistent estimates. We evaluate the methods through a simulation study. These methods are then applied to data on Ischemic Heart Disease (IHD). PMID:25729267

  14. Spatial heterogeneity of type I error for local cluster detection tests

    PubMed Central

    2014-01-01

    Background Just as power, type I error of cluster detection tests (CDTs) should be spatially assessed. Indeed, CDTs’ type I error and power have both a spatial component as CDTs both detect and locate clusters. In the case of type I error, the spatial distribution of wrongly detected clusters (WDCs) can be particularly affected by edge effect. This simulation study aims to describe the spatial distribution of WDCs and to confirm and quantify the presence of edge effect. Methods A simulation of 40 000 datasets has been performed under the null hypothesis of risk homogeneity. The simulation design used realistic parameters from survey data on birth defects, and in particular, two baseline risks. The simulated datasets were analyzed using the Kulldorff’s spatial scan as a commonly used test whose behavior is otherwise well known. To describe the spatial distribution of type I error, we defined the participation rate for each spatial unit of the region. We used this indicator in a new statistical test proposed to confirm, as well as quantify, the edge effect. Results The predefined type I error of 5% was respected for both baseline risks. Results showed strong edge effect in participation rates, with a descending gradient from center to edge, and WDCs more often centrally situated. Conclusions In routine analysis of real data, clusters on the edge of the region should be carefully considered as they rarely occur when there is no cluster. Further work is needed to combine results from power studies with this work in order to optimize CDTs performance. PMID:24885343

  15. Spatial measurement error and correction by spatial SIMEX in linear regression models when using predicted air pollution exposures.

    PubMed

    Alexeeff, Stacey E; Carroll, Raymond J; Coull, Brent

    2016-04-01

    Spatial modeling of air pollution exposures is widespread in air pollution epidemiology research as a way to improve exposure assessment. However, there are key sources of exposure model uncertainty when air pollution is modeled, including estimation error and model misspecification. We examine the use of predicted air pollution levels in linear health effect models under a measurement error framework. For the prediction of air pollution exposures, we consider a universal Kriging framework, which may include land-use regression terms in the mean function and a spatial covariance structure for the residuals. We derive the bias induced by estimation error and by model misspecification in the exposure model, and we find that a misspecified exposure model can induce asymptotic bias in the effect estimate of air pollution on health. We propose a new spatial simulation extrapolation (SIMEX) procedure, and we demonstrate that the procedure has good performance in correcting this asymptotic bias. We illustrate spatial SIMEX in a study of air pollution and birthweight in Massachusetts.

  16. Error growth patterns in systems with spatial chaos: from coupled map lattices to global weather models.

    PubMed

    Primo, C; Szendro, I G; Rodríguez, M A; Gutiérrez, J M

    2007-03-01

    Error growth in spatiotemporal chaotic systems is investigated by analyzing the interplay between temporal and spatial dynamics. The spatial correlation and localization of relative fluctuations grow and decay indicating two different regimes, before and after saturation by nonlinear effects. This general behavior is shown to hold both in simple coupled map lattices and in global weather models. This explains the increasing or decreasing trends previously observed in the exponential growth rate of these spatiotemporal systems.

  17. Detection of a concealed object

    DOEpatents

    Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA

    2010-11-16

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  18. Detection of a concealed object

    DOEpatents

    Keller, Paul E.; Hall, Thomas E.; McMakin, Douglas L.

    2008-04-29

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  19. Self-Concealment and Suicidal Behaviors

    ERIC Educational Resources Information Center

    Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.

    2012-01-01

    Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…

  20. Aiming error under transformed spatial mappings suggests a structure for visual-motor maps.

    PubMed

    Cunningham, H A

    1989-08-01

    Transformed spatial mappings were used to perturb normal visual-motor processes and reveal the structure of internal spatial representations used by the motor control system. In a 2-D discrete aiming task performed under rotated visual-motor mappings, the pattern of spatial movement error was the same for all Ss: peak error between 90 degrees and 135 degrees of rotation and low error for 180 degrees rotation. A two-component spatial representation, based on oriented bidirectional movement axes plus direction of travel along such axes, is hypothesized. Observed reversals of movement direction under rotations greater than 90 degrees are consistent with the hypothesized structure. Aiming error under reflections, unlike rotations, depended on direction of movement relative to the axis of reflection (see Cunningham & Pavel, in press). Reaction time and movement time effects were observed, but a speed-accuracy tradeoff was found only for rotations for which the direction-reversal strategy could be used. Finally, adaptation to rotation operates at all target locations equally but does not alter the relative difficulty of different rotations. Structural properties of the representation are invariant under learning.

  1. Spatial Resolution, Grayscale, and Error Diffusion Trade-offs: Impact on Display System Design

    NASA Technical Reports Server (NTRS)

    Gille, Jennifer L. (Principal Investigator)

    1996-01-01

    We examine technology trade-offs related to grayscale resolution, spatial resolution, and error diffusion for tessellated display systems. We present new empirical results from our psychophysical study of these trade-offs and compare them to the predictions of a model of human vision.

  2. Accounting for spatial correlations of the observation errors with Ensemble Kalman filters

    NASA Astrophysics Data System (ADS)

    Cosme, Emmanuel; Jean-Michel, Brankart; Clément, Ubelmann; Jacques, Verron; Pierre, Brasseur

    2013-04-01

    The standard Kalman filter observational update requires the inversion of the innovation error covariance matrix, what is often impractical. Most implementations of the Ensemble Kalman filter circumvent this difficulty assuming the diagonality of the observation error covariance matrix, what makes the analysis calculation numerically tractable. However, when observation errors are actually correlated spatially, such hypothesis leads to an inappropriate use of observations. Experiments show that the analysis state error variances yielded by the Ensemble Kalman filter can be severely underestimated. In this presentation, we describe a parameterization of the observation error covariance matrix which preserves its diagonal shape, but represents a simple first order autoregressive correlation structure of the observation errors. This parameterization is based upon an augmentation of the observation vector with gradients of observations. Numerical applications to ocean altimetry show the detrimental effects of specifying a diagonal matrix when observations errors are correlated, and how the new parameterization not only removes the detrimental effects of correlations, but also makes use of these correlations to improve the data assimilation products.

  3. Spatial averaging errors in creating hemispherical reflectance (albedo) maps from directional reflectance data

    NASA Technical Reports Server (NTRS)

    Kimes, D. S.; Kerber, A. G.; Sellers, P. J.

    1993-01-01

    Spatial averaging errors which may occur when creating hemispherical reflectance maps for different cover types from direct nadir technique to estimate the hemispherical reflectance are assessed by comparing the results with those obtained with a knowledge-based system called VEG (Kimes et al., 1991, 1992). It was found that hemispherical reflectance errors provided by using VEG are much less than those using the direct nadir techniques, depending on conditions. Suggestions are made concerning sampling and averaging strategies for creating hemispherical reflectance maps for photosynthetic, carbon cycle, and climate change studies.

  4. Effects of structured mid-spatial frequency surface errors on image performance.

    PubMed

    Tamkin, John M; Milster, Tom D

    2010-11-20

    Optical designers are encouraged to adopt aspheric and free-form surfaces into an increasing number of design spaces because of their improved performance. However, residual tooling marks from advanced aspheric fabrication techniques are difficult to remove. These marks, typically in the mid-spatial frequency (MSF) regime, give rise to structured image artifacts. Using a theory developed in previous publications, this paper applies the fundamentals of MSF modeling to demonstrate how MSF errors are evaluated and toleranced in an optical system. Examples of as-built components with MSF errors are analyzed using commercial optical design software.

  5. Handheld ultrasonic concealed weapon detector

    NASA Astrophysics Data System (ADS)

    Wilde, Norbert; Niederhaus, Steve; Lam, Hon; Lum, Chris

    2002-08-01

    A handheld, battery-operated prototype of a concealed weapon detector (CWD) has been built and tested. Designed to detect both metallic and non-metallic weapons, the sensor utilizes focused ultrasound (40 kHz frequency) to remotely detect concealed objects from beyond arm's length out to a range of about 25 feet (8 meters). Applications include weapon detection in prison settings, by officers in the field for stand-off frisking of suspects, and as supplemental security at courthouse entrances and other monitored portals. The detector emits an adjustable, audible alarm (with provision for an earphone jack) as well as a visible light-bar indicator when an object has been detected. An aiming light, with momentary switch, allows the user to accurately determine the location of the concealed object. A presentation of the detector's capabilities and limitations will be presented along with probability of detection (PD) data obtained using the latest prototype version.

  6. A parametric multiclass Bayes error estimator for the multispectral scanner spatial model performance evaluation

    NASA Technical Reports Server (NTRS)

    Mobasseri, B. G.; Mcgillem, C. D.; Anuta, P. E. (Principal Investigator)

    1978-01-01

    The author has identified the following significant results. The probability of correct classification of various populations in data was defined as the primary performance index. The multispectral data being of multiclass nature as well, required a Bayes error estimation procedure that was dependent on a set of class statistics alone. The classification error was expressed in terms of an N dimensional integral, where N was the dimensionality of the feature space. The multispectral scanner spatial model was represented by a linear shift, invariant multiple, port system where the N spectral bands comprised the input processes. The scanner characteristic function, the relationship governing the transformation of the input spatial, and hence, spectral correlation matrices through the systems, was developed.

  7. Clark's nutcracker spatial memory: many errors might not be due to forgetting

    PubMed

    Bednekoff; Balda

    1997-09-01

    Clark's nutcrackers, Nucifraga columbianarely upon cached seeds for both winter survival and breeding. Laboratory studies have confirmed that nutcrackers use spatial memory to recover their caches. In the laboratory, however, nutcrackers seem to perform less accurately than they do in nature. Two lines of evidence indicate that nutcrackers make 'errors' in the laboratory that are not due to failures of memory. First, when digging in sand-filled cups, nutcrackers were 89% accurate when they plunged their bills directly into the middle of cups but only 21% accurate when they swept their bills across the cups. Second, nutcrackers were more accurate when the cost of probing was increased by covering sand-filled cups with either petri dishes or heavy glass bowls. Birds recovered caches in order of increasing costs. As costs increased, nutcrackers made somewhat fewer errors nearer to cache sites before recovering the caches and dramatically fewer errors further away from cache sites or near cache sites after recovering the caches. Some errors may be a form of environmental sampling. We conclude that the impressive achievements documented by previous studies are underestimates of the spatial memory abilities of Clark's nutcrackers.1997The Association for the Study of Animal Behaviour

  8. Sinusoidal Siemens star spatial frequency response measurement errors due to misidentified target centers

    SciTech Connect

    Birch, Gabriel Carisle; Griffin, John Clark

    2015-07-23

    Numerous methods are available to measure the spatial frequency response (SFR) of an optical system. A recent change to the ISO 12233 photography resolution standard includes a sinusoidal Siemens star test target. We take the sinusoidal Siemens star proposed by the ISO 12233 standard, measure system SFR, and perform an analysis of errors induced by incorrectly identifying the center of a test target. We show a closed-form solution for the radial profile intensity measurement given an incorrectly determined center and describe how this error reduces the measured SFR of the system. As a result, using the closed-form solution, we propose a two-step process by which test target centers are corrected and the measured SFR is restored to the nominal, correctly centered values.

  9. Sinusoidal Siemens star spatial frequency response measurement errors due to misidentified target centers

    DOE PAGES

    Birch, Gabriel Carisle; Griffin, John Clark

    2015-07-23

    Numerous methods are available to measure the spatial frequency response (SFR) of an optical system. A recent change to the ISO 12233 photography resolution standard includes a sinusoidal Siemens star test target. We take the sinusoidal Siemens star proposed by the ISO 12233 standard, measure system SFR, and perform an analysis of errors induced by incorrectly identifying the center of a test target. We show a closed-form solution for the radial profile intensity measurement given an incorrectly determined center and describe how this error reduces the measured SFR of the system. As a result, using the closed-form solution, we proposemore » a two-step process by which test target centers are corrected and the measured SFR is restored to the nominal, correctly centered values.« less

  10. Standoff detection of concealed handguns

    NASA Astrophysics Data System (ADS)

    Rezgui, Nacer; Andrews, David; Bowring, Nicholas; Harmer, Stuart; Southgate, Matthew

    2008-04-01

    An active technique for the standoff detection and identification of concealed conducting items such as handguns and knives is presented. This technique entails illuminating an object with wide range stepped millimetre wave radiation and inducing a local electromagnetic field comprised of a superposition of modes. The coupling to these modes from the illuminating and scattered fields is, in general, frequency dependent and this forms the basis for the detection and identification of conducting items. The object needs to be fully illuminated if a full spectrum of modes and therefore a full frequency response are to be excited and collected. The scattered EM power is measured at "stand off" distance of several metres as the illuminating field is frequency swept and patterns in frequency response characteristic to the target item being sought are looked for. This system relies on contributions from the aspect independent late time responses employed by Baum1 together with aspect independent information derived specifically from gun barrels and polarisation from scattering effects. This technique is suitable for a deployable gun and concealed weapons detection system and does not rely on imaging techniques for determining the presence of a gun. Experimental sets of responses from typical metal or partially conducting objects such as keys, mobile phones and concealed handguns are presented at a range of frequencies.

  11. Handheld ultrasonic concealed weapon detector

    NASA Astrophysics Data System (ADS)

    Wild, Norbert C.; Doft, Frank; Breuner, Dennis; Felber, Franklin S.

    2001-02-01

    A handheld, battery-operated prototype of a concealed weapon detector has been built and tested. Designed to detect both metallic and non-metallic weapons, the sensor utilizes focused ultrasound (40 kHz frequency) to remotely detect concealed objects from beyond arm's length out to a range of about 12 feet (4 meters). The detector can be used in prison settings, by officers in the field to allow for stand-off frisking of suspects, and to supplement security at courthouse entrances and other monitored portals. The detector emits an audible alarm (with provision for an earphone jack) as well as a visible light-bar indicator when an object is detected. A high intensity aiming light, with momentary switch, allows the user to accurately determine the location of the concealed object. Current efforts are aimed at increasing the probability of detection, reducing the false-alarm rate, and extending the range of detectability out to 20 feet. Plans for accomplishing these tasks will be presented together with data showing the effective range and probability of detection for the present system.

  12. Iowa radon leukaemia study: a hierarchical population risk model for spatially correlated exposure measured with error.

    PubMed

    Smith, Brian J; Zhang, Lixun; Field, R William

    2007-11-10

    This paper presents a Bayesian model that allows for the joint prediction of county-average radon levels and estimation of the associated leukaemia risk. The methods are motivated by radon data from an epidemiologic study of residential radon in Iowa that include 2726 outdoor and indoor measurements. Prediction of county-average radon is based on a geostatistical model for the radon data which assumes an underlying continuous spatial process. In the radon model, we account for uncertainties due to incomplete spatial coverage, spatial variability, characteristic differences between homes, and detector measurement error. The predicted radon averages are, in turn, included as a covariate in Poisson models for incident cases of acute lymphocytic (ALL), acute myelogenous (AML), chronic lymphocytic (CLL), and chronic myelogenous (CML) leukaemias reported to the Iowa cancer registry from 1973 to 2002. Since radon and leukaemia risk are modelled simultaneously in our approach, the resulting risk estimates accurately reflect uncertainties in the predicted radon exposure covariate. Posterior mean (95 per cent Bayesian credible interval) estimates of the relative risk associated with a 1 pCi/L increase in radon for ALL, AML, CLL, and CML are 0.91 (0.78-1.03), 1.01 (0.92-1.12), 1.06 (0.96-1.16), and 1.12 (0.98-1.27), respectively. PMID:17373673

  13. Error propagation models to examine the effects of geocoding quality on spatial analysis of individual-level datasets

    PubMed Central

    Zandbergen, P.A.; Hart, T.C.; Lenzer, K.E.; Camponovo, M.E.

    2012-01-01

    The quality of geocoding has received substantial attention in recent years. A synthesis of published studies shows that the positional errors of street geocoding are somewhat unique relative to those of other types of spatial data: 1) the magnitude of error varies strongly across urban-rural gradients; 2) the direction of error is not uniform, but strongly associated with the properties of local street segments; 3) the distribution of errors does not follow a normal distribution, but is highly skewed and characterized by a substantial number of very large error values; and 4) the magnitude of error is spatially autocorrelated and is related to properties of the reference data. This makes it difficult to employ analytic approaches or Monte Carlo simulations for error propagation modeling because these rely on generalized statistical characteristics. The current paper describes an alternative empirical approach to error propagation modeling for geocoded data and illustrates its implementation using three different case-studies of geocoded individual-level datasets. The first case-study consists of determining the land cover categories associated with geocoded addresses using a point-in-raster overlay. The second case-study consists of a local hotspot characterization using kernel density analysis of geocoded addresses. The third case-study consists of a spatial data aggregation using enumeration areas of varying spatial resolution. For each case-study a high quality reference scenario based on address points forms the basis for the analysis, which is then compared to the result of various street geocoding techniques. Results show that the unique nature of the positional error of street geocoding introduces substantial noise in the result of spatial analysis, including a substantial amount of bias for some analysis scenarios. This confirms findings from earlier studies, but expands these to a wider range of analytical techniques. PMID:22469492

  14. Method for imaging a concealed object

    DOEpatents

    Davidson, James R [Idaho Falls, ID; Partin, Judy K [Idaho Falls, ID; Sawyers, Robert J [Idaho Falls, ID

    2007-07-03

    A method for imaging a concealed object is described and which includes a step of providing a heat radiating body, and wherein an object to be detected is concealed on the heat radiating body; imaging the heat radiating body to provide a visibly discernible infrared image of the heat radiating body; and determining if the visibly discernible infrared image of the heat radiating body is masked by the presence of the concealed object.

  15. An examination of exposure measurement error from air pollutant spatial variability in time-series studies.

    PubMed

    Sarnat, Stefanie E; Klein, Mitchel; Sarnat, Jeremy A; Flanders, W Dana; Waller, Lance A; Mulholland, James A; Russell, Armistead G; Tolbert, Paige E

    2010-03-01

    Relatively few studies have evaluated the effects of heterogeneous spatiotemporal pollutant distributions on health risk estimates in time-series analyses that use data from a central monitor to assign exposures. We present a method for examining the effects of exposure measurement error relating to spatiotemporal variability in ambient air pollutant concentrations on air pollution health risk estimates in a daily time-series analysis of emergency department visits in Atlanta, Georgia. We used Poisson generalized linear models to estimate associations between current-day pollutant concentrations and circulatory emergency department visits for the 1998-2004 time period. Data from monitoring sites located in different geographical regions of the study area and at different distances from several urban geographical subpopulations served as alternative measures of exposure. We observed associations for spatially heterogeneous pollutants (CO and NO(2)) using data from several different urban monitoring sites. These associations were not observed when using data from the most rural site, located 38 miles from the city center. In contrast, associations for spatially homogeneous pollutants (O(3) and PM(2.5)) were similar, regardless of the monitoring site location. We found that monitoring site location and the distance of a monitoring site to a population of interest did not meaningfully affect estimated associations for any pollutant when using data from urban sites located within 20 miles from the population center under study. However, for CO and NO(2), these factors were important when using data from rural sites located > or = 30 miles from the population center, most likely owing to exposure measurement error. Overall, our findings lend support to the use of pollutant data from urban central sites to assess population exposures within geographically dispersed study populations in Atlanta and similar cities. PMID:19277071

  16. Caught in the flux net: disentangling error, uncertainty, heterogeneity, and spatial process in biogeochemical scaling

    NASA Astrophysics Data System (ADS)

    Dietze, M.

    2014-12-01

    Attempts to link observations across multiple scales, and in particular the problem of scaling up fine-scale observations to landscape and regional process, faces numerous theoretical, computational, and statistical challenges. This talk aims to link theoretical advances in the scaling of biotic heterogeneity, abiotic heterogeneity, and contagious disturbance with statistical advances for linking observations that integrate over different scales. Critical to this goal is the need to partition sources of uncertainty and variability. In particular, the variance you can calculate most readily is rarely the most important or relevant one to quantify. In community ecology, hierarchical Bayes (HB) latent-variable models that separate true variability in ecosystem processes from observation errors have challenged long-standing theory surrounding the maintenance of biodiversity, yet application of such approaches to regional-scale biogeochemical processes is just beginning. A special case of such models, focused on the change of support problem, deal specifically with linking observations that integrate over different spatial and temporal scales. Occurring in parallel with these statistical advances have been the development of new theories for the spatially-implicit scaling of biotic and abiotic heterogeneity, as well as contagious disturbances such as fire and pathogens, and the incorporation of such approaches into process-based ecosystem models. Such approaches upscale by integrating the probability distributions of system heterogeneity over the functional response of the ecosystem to such heterogeneity. We demonstrate that this approach can also be downscaled by conditioning on incomplete partial observation at a local scale, and can have lower uncertainty than brute-force spatially-explicit approaches. We also extend such approaches from integrating over observed heterogeneities to integrating the latent, high-dimensional variability in HB models. Finally, there is a

  17. Improving filtering and prediction of spatially extended turbulent systems with model errors through stochastic parameter estimation

    SciTech Connect

    Gershgorin, B.; Harlim, J. Majda, A.J.

    2010-01-01

    The filtering and predictive skill for turbulent signals is often limited by the lack of information about the true dynamics of the system and by our inability to resolve the assumed dynamics with sufficiently high resolution using the current computing power. The standard approach is to use a simple yet rich family of constant parameters to account for model errors through parameterization. This approach can have significant skill by fitting the parameters to some statistical feature of the true signal; however in the context of real-time prediction, such a strategy performs poorly when intermittent transitions to instability occur. Alternatively, we need a set of dynamic parameters. One strategy for estimating parameters on the fly is a stochastic parameter estimation through partial observations of the true signal. In this paper, we extend our newly developed stochastic parameter estimation strategy, the Stochastic Parameterization Extended Kalman Filter (SPEKF), to filtering sparsely observed spatially extended turbulent systems which exhibit abrupt stability transition from time to time despite a stable average behavior. For our primary numerical example, we consider a turbulent system of externally forced barotropic Rossby waves with instability introduced through intermittent negative damping. We find high filtering skill of SPEKF applied to this toy model even in the case of very sparse observations (with only 15 out of the 105 grid points observed) and with unspecified external forcing and damping. Additive and multiplicative bias corrections are used to learn the unknown features of the true dynamics from observations. We also present a comprehensive study of predictive skill in the one-mode context including the robustness toward variation of stochastic parameters, imperfect initial conditions and finite ensemble effect. Furthermore, the proposed stochastic parameter estimation scheme applied to the same spatially extended Rossby wave system demonstrates

  18. Effects of Head Rotation on Space- and Word-Based Reading Errors in Spatial Neglect

    ERIC Educational Resources Information Center

    Reinhart, Stefan; Keller, Ingo; Kerkhoff, Georg

    2010-01-01

    Patients with right hemisphere lesions often omit or misread words on the left side of a text or the beginning letters of single words which is termed neglect dyslexia (ND). Two types of reading errors are typically observed in ND: omissions and word-based reading errors. The prior are considered as space-based omission errors on the…

  19. Theory of point-spread function artifacts due to structured mid-spatial frequency surface errors.

    PubMed

    Tamkin, John M; Dallas, William J; Milster, Tom D

    2010-09-01

    Optical design and tolerancing of aspheric or free-form surfaces require attention to surface form, structured surface errors, and nonstructured errors. We describe structured surface error profiles and effects on the image point-spread function using harmonic (Fourier) decomposition. Surface errors over the beam footprint map onto the pupil, where multiple structured surface frequencies mix to create sum and difference diffraction orders in the image plane at each field point. Difference frequencies widen the central lobe of the point-spread function and summation frequencies create ghost images.

  20. [Advances in the studies of concealed penis].

    PubMed

    Fan, Sheng-hai; Li, Xue-de

    2015-09-01

    Concealed penis is usually found in children, which affects the patients both physiologically and psychologically. Some of the patients are wrongly treated by circumcision, which may bring about serious consequences to the sexual life of the patients in their adulthood. In the recent years, this disease has been receiving more and more attention from both doctors and parents. However, controversies remain as to its classification, pathogenesis, pathology, and treatment. This paper focuses on the understanding and advances in the studies of concealed penis.

  1. Theory of modulation transfer function artifacts due to mid-spatial-frequency errors and its application to optical tolerancing.

    PubMed

    Tamkin, John M; Milster, Tom D; Dallas, William

    2010-09-01

    Aspheric and free-form surfaces are powerful surface forms that allow designers to achieve better performance with fewer lenses and smaller packages. Unlike spheres, these surfaces are fabricated with processes that leave a signature, or "structure," that is primarily in the mid-spatial-frequency region. These structured surface errors create ripples in the modulation transfer function (MTF) profile. Using Fourier techniques with generalized functions, the drop in MTF is derived and shown to exhibit a nonlinear relationship with the peak-to-valley height of the structured surface error.

  2. [Identification of Spatial Coding Schemes by Errors Distribuition of Human Memory].

    PubMed

    Lyakhovetskii, V A; Karpinskaia, V Ju; Bobrova, E V

    2015-01-01

    The error distributions of sensory screen touches at kinesthetically memorization and reproduction of visual stimuli containing Muller-Lyer illusion and neutral stimuli were investigated. One group of right-handers begins the task with the right hand and continues with the left one, while the other group--vice versa. It was shown that the errors are distributed either exponentially (with the maximal amount of small errors) either with the maxima at the 2nd bin. The number of errors distributions decaying exponentially is higher for the group beginning the task with the right hand. The errors distributions of touches on the upper segment by the right hand decay exponentially faster than other distributions. Comparison of these data with the simulation results supports the hypothesis of specific for the right and left hemisphere positional and vector coding schemes at human memory. PMID:26601502

  3. Complex linear minimum mean-squared-error equalization of spatially quadrature-amplitude-modulated signals in holographic data storage

    NASA Astrophysics Data System (ADS)

    Sato, Takanori; Kanno, Kazutaka; Bunsen, Masatoshi

    2016-09-01

    We applied complex linear minimum mean-squared-error equalization to spatially quadrature-amplitude-modulated signals in holographic data storage (HDS). The equalization technique can improve dispersion in constellation outputs due to intersymbol interference. We confirm the effectiveness of the equalization technique in numerical simulations and basic optical experiments. Our numerical results have shown that intersymbol interference of a retrieved signal in a HDS system can be improved by using the equalization technique. In our experiments, a mean squared error (MSE), which indicates the deviation from an ideal signal, has been used for quantitatively evaluating the dispersion of equalized signals. Our equalization technique has been able to improve the MSE. However, symbols in the equalized signal have remained inseparable. To further improve the MSE and make the symbols separable, reducing errors in repeated measurements is our future task.

  4. Exact error rate analysis of free-space optical communications with spatial diversity over Gamma-Gamma atmospheric turbulence

    NASA Astrophysics Data System (ADS)

    Ma, Jing; Li, Kangning; Tan, Liying; Yu, Siyuan; Cao, Yubin

    2016-02-01

    The error rate performances and outage probabilities of free-space optical (FSO) communications with spatial diversity are studied for Gamma-Gamma turbulent environments. Equal gain combining (EGC) and selection combining (SC) diversity are considered as practical schemes to mitigate turbulence. The exact bit-error rate (BER) expression and outage probability are derived for direct detection EGC multiple aperture receiver system. BER performances and outage probabilities are analyzed and compared for different number of sub-apertures each having aperture area A with EGC and SC techniques. BER performances and outage probabilities of a single monolithic aperture and multiple aperture receiver system with the same total aperture area are compared under thermal-noise-limited and background-noise-limited conditions. It is shown that multiple aperture receiver system can greatly improve the system communication performances. And these analytical tools are useful in providing highly accurate error rate estimation for FSO communication systems.

  5. Spatial accounting for errors in LiDAR-derived products: Snow volume and snow water equivalent estimation

    NASA Astrophysics Data System (ADS)

    Tinkham, W. T.; Hoffman, C. M.; Falkowski, M. J.; Smith, A. M.; Link, T. E.; Marshall, H.

    2011-12-01

    Light Detection and Ranging (LiDAR) has become one of the most effective and reliable means of characterizing surface topography and vegetation structure. Most LiDAR-derived estimates such as vegetation height, snow depth, and floodplain boundaries rely on the accurate creation of digital terrain models (DTM). As a result of the importance of an accurate DTM in using LiDAR data to estimate snow depth, it is necessary to understand the variables that influence the DTM accuracy in order to assess snow depth error. A series of 4 x 4 m plots that were surveyed at 0.5 m spacing in a semi-arid catchment were used for training the Random Forests algorithm along with a series of 35 variables in order to spatially predict vertical error within a LiDAR derived DTM. The final model was utilized to predict the combined error resulting from snow volume and snow water equivalent estimates derived from a snow-free LiDAR DTM and a snow-on LiDAR acquisition of the same site. The methodology allows for a statistical quantification of the spatially-distributed error patterns that are incorporated into the estimation of snow volume and snow water equivalents from LiDAR.

  6. Spatial and temporal characteristics of error-related activity in the human brain.

    PubMed

    Neta, Maital; Miezin, Francis M; Nelson, Steven M; Dubis, Joseph W; Dosenbach, Nico U F; Schlaggar, Bradley L; Petersen, Steven E

    2015-01-01

    A number of studies have focused on the role of specific brain regions, such as the dorsal anterior cingulate cortex during trials on which participants make errors, whereas others have implicated a host of more widely distributed regions in the human brain. Previous work has proposed that there are multiple cognitive control networks, raising the question of whether error-related activity can be found in each of these networks. Thus, to examine error-related activity broadly, we conducted a meta-analysis consisting of 12 tasks that included both error and correct trials. These tasks varied by stimulus input (visual, auditory), response output (button press, speech), stimulus category (words, pictures), and task type (e.g., recognition memory, mental rotation). We identified 41 brain regions that showed a differential fMRI BOLD response to error and correct trials across a majority of tasks. These regions displayed three unique response profiles: (1) fast, (2) prolonged, and (3) a delayed response to errors, as well as a more canonical response to correct trials. These regions were found mostly in several control networks, each network predominantly displaying one response profile. The one exception to this "one network, one response profile" observation is the frontoparietal network, which showed prolonged response profiles (all in the right hemisphere), and fast profiles (all but one in the left hemisphere). We suggest that, in the place of a single localized error mechanism, these findings point to a large-scale set of error-related regions across multiple systems that likely subserve different functions.

  7. Spatial and Temporal Characteristics of Error-Related Activity in the Human Brain

    PubMed Central

    Miezin, Francis M.; Nelson, Steven M.; Dubis, Joseph W.; Dosenbach, Nico U.F.; Schlaggar, Bradley L.; Petersen, Steven E.

    2015-01-01

    A number of studies have focused on the role of specific brain regions, such as the dorsal anterior cingulate cortex during trials on which participants make errors, whereas others have implicated a host of more widely distributed regions in the human brain. Previous work has proposed that there are multiple cognitive control networks, raising the question of whether error-related activity can be found in each of these networks. Thus, to examine error-related activity broadly, we conducted a meta-analysis consisting of 12 tasks that included both error and correct trials. These tasks varied by stimulus input (visual, auditory), response output (button press, speech), stimulus category (words, pictures), and task type (e.g., recognition memory, mental rotation). We identified 41 brain regions that showed a differential fMRI BOLD response to error and correct trials across a majority of tasks. These regions displayed three unique response profiles: (1) fast, (2) prolonged, and (3) a delayed response to errors, as well as a more canonical response to correct trials. These regions were found mostly in several control networks, each network predominantly displaying one response profile. The one exception to this “one network, one response profile” observation is the frontoparietal network, which showed prolonged response profiles (all in the right hemisphere), and fast profiles (all but one in the left hemisphere). We suggest that, in the place of a single localized error mechanism, these findings point to a large-scale set of error-related regions across multiple systems that likely subserve different functions. PMID:25568119

  8. Quantification of errors in large-eddy simulations of a spatially evolving mixing layer using polynomial chaos

    SciTech Connect

    Meldi, M.; Sagaut, P.; Salvetti, M. V.

    2012-03-15

    A stochastic approach based on generalized polynomial chaos (gPC) is used to quantify the error in large-eddy simulation (LES) of a spatially evolving mixing layer flow and its sensitivity to different simulation parameters, viz., the grid stretching in the streamwise and lateral directions and the subgrid-scale (SGS) Smagorinsky model constant (C{sub S}). The error is evaluated with respect to the results of a highly resolved LES and for different quantities of interest, namely, the mean streamwise velocity, the momentum thickness, and the shear stress. A typical feature of the considered spatially evolving flow is the progressive transition from a laminar regime, highly dependent on the inlet conditions, to a fully developed turbulent one. Therefore, the computational domain is divided in two different zones (inlet dependent and fully turbulent) and the gPC error analysis is carried out for these two zones separately. An optimization of the parameters is also carried out for both these zones. For all the considered quantities, the results point out that the error is mainly governed by the value of the C{sub S} constant. At the end of the inlet-dependent zone, a strong coupling between the normal stretching ratio and the C{sub S} value is observed. The error sensitivity to the parameter values is significantly larger in the inlet-dependent upstream region; however, low-error values can be obtained in this region for all the considered physical quantities by an ad hoc tuning of the parameters. Conversely, in the turbulent regime the error is globally lower and less sensitive to the parameter variations, but it is more difficult to find a set of parameter values leading to optimal results for all the analyzed physical quantities. A similar analysis is also carried out for the dynamic Smagorinsky model, by varying the grid stretching ratios. Comparing the databases generated with the different subgrid-scale models, it is possible to observe that the error cost

  9. Spatial reconstruction by patients with hippocampal damage is dominated by relational memory errors

    PubMed Central

    Watson, Patrick D.; Voss, Joel L.; Warren, David E.; Tranel, Daniel; Cohen, Neal J.

    2013-01-01

    Hippocampal damage causes profound yet circumscribed memory impairment across diverse stimulus types and testing formats. Here, within a single test format involving a single class of stimuli, we identified different performance errors to better characterize the specifics of the underlying deficit. The task involved study and reconstruction of object arrays across brief retention intervals. The most striking feature of patients’ with hippocampal damage performance was that they tended to reverse the relative positions of item pairs within arrays of any size, effectively “swapping” pairs of objects. These “swap errors” were the primary error type in amnesia, almost never occurred in healthy comparison participants, and actually contributed to poor performance on more traditional metrics (such as distance between studied and reconstructed location). Patients made swap errors even in trials involving only a single pair of objects. The selectivity and severity of this particular deficit creates serious challenges for theories of memory and hippocampus. PMID:23418096

  10. A Study on Sixth Grade Students' Misconceptions and Errors in Spatial Measurement: Length, Area, and Volume

    ERIC Educational Resources Information Center

    Tan Sisman, Gulcin; Aksu, Meral

    2016-01-01

    The purpose of the present study was to portray students' misconceptions and errors while solving conceptually and procedurally oriented tasks involving length, area, and volume measurement. The data were collected from 445 sixth grade students attending public primary schools in Ankara, Türkiye via a test composed of 16 constructed-response…

  11. An Examination of the Spatial Distribution of Carbon Dioxide and Systematic Errors

    NASA Technical Reports Server (NTRS)

    Coffey, Brennan; Gunson, Mike; Frankenberg, Christian; Osterman, Greg

    2011-01-01

    The industrial period and modern age is characterized by combustion of coal, oil, and natural gas for primary energy and transportation leading to rising levels of atmospheric of CO2. This increase, which is being carefully measured, has ramifications throughout the biological world. Through remote sensing, it is possible to measure how many molecules of CO2 lie in a defined column of air. However, other gases and particles are present in the atmosphere, such as aerosols and water, which make such measurements more complicated1. Understanding the detailed geometry and path length of the observation is vital to computing the concentration of CO2. Comparing these satellite readings with ground-truth data (TCCON) the systematic errors arising from these sources can be assessed. Once the error is understood, it can be scaled for in the retrieval algorithms to create a set of data, which is closer to the TCCON measurements1. Using this process, the algorithms are being developed to reduce bias, within.1% worldwide of the true value. At this stage, the accuracy is within 1%, but through correcting small errors contained in the algorithms, such as accounting for the scattering of sunlight, the desired accuracy can be achieved.

  12. Detecting concealed objects at a checkpoint

    DOEpatents

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.; Severtsen, Ronald H.

    2008-07-29

    Disclosed are systems, methods, devices, and apparatus to interrogate a clothed individual with electromagnetic radiation to determine if a concealed object is being carried. This determination includes establishing data corresponding to an image of the individual with a pair of opposed, semi-cylindrical array panels each configured to interrogate the individual with electromagnetic radiation in the 200 MHz to 1 THz range.

  13. Concealment of Child Sexual Abuse in Sports

    ERIC Educational Resources Information Center

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  14. Automated Human Screening for Detecting Concealed Knowledge

    ERIC Educational Resources Information Center

    Twyman, Nathan W.

    2012-01-01

    Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation…

  15. Concealed Questions. In Search of Answers

    ERIC Educational Resources Information Center

    Frana, Ilaria

    2010-01-01

    This dissertation examines the semantic interpretation of various types of DPs in so-called concealed-question (CQ) constructions, as "Bill's phone number" in the sentence "John knows Bill's phone number". The peculiar characteristic of DP-CQs is that they are interpreted as having the meaning of an embedded question. So, for instance, the…

  16. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  17. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  18. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  19. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  20. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  1. An analysis of perceptual errors in reading mammograms using quasi-local spatial frequency spectra.

    PubMed

    Mello-Thoms, C; Dunn, S M; Nodine, C F; Kundel, H L

    2001-09-01

    In this pilot study the authors examined areas on a mammogram that attracted the visual attention of experienced mammographers and mammography fellows, as well as areas that were reported to contain a malignant lesion, and, based on their spatial frequency spectrum, they characterized these areas by the type of decision outcome that they yielded: true-positives (TP), false-positives (FP), true-negatives (TN), and false-negatives (FN). Five 2-view (craniocaudal and medial-lateral oblique) mammogram cases were examined by 8 experienced observers, and the eye position of the observers was tracked. The observers were asked to report the location and nature of any malignant lesions present in the case. The authors analyzed each area in which either the observer made a decision or in which the observer had prolonged (>1,000 ms) visual dwell using wavelet packets, and characterized these areas in terms of the energy contents of each spatial frequency band. It was shown that each decision outcome is characterized by a specific profile in the spatial frequency domain, and that these profiles are significantly different from one another. As a consequence of these differences, the profiles can be used to determine which type of decision a given observer will make when examining the area. Computer-assisted perception correctly predicted up to 64% of the TPs made by the observers, 77% of the FPs, and 70% of the TNs.

  2. Applying Error Diagram for Evaluating Spatial Forecasting Model of Large Aftershocks

    NASA Astrophysics Data System (ADS)

    Shebalin, Peter; Sergey, Baranov

    2016-04-01

    Difficulty of use in practice the forecasting result formulated in probability terms is well known in statistical seismology. Small values of probability of earthquake occurrence cannot be directly used for decision making to reduce losses due to seismic hazard. In this research we suggest a technique for applying Molchan's error diagram to evaluate a model of seismic hazard forecasting and make practical recommendation, applied specifically to the hazard after large earthquakes. We illustrate the suggested technique by example of evaluating retrospective forecast of an area where one can expect strong aftershock (M6+). The forecast model is based on data for 12 hours after the mainshock. We found an optimal variant among many tested by minimizing the rate of missed targets (strong aftershock) and the rate of alarm space as a loss function. Analyzing the error diagram, we suggest these three forecast strategies: "soft", "neutral", and 'hard", giving different size of the alarm area, where one may expect strong aftershocks. The suggested technique can be used for making decision at various conditions to reduce losses due to seismic hazard after a strong earthquake. This research was carried out at the expense of the Russian Science Foundation (Project Nu 16-17-00093).

  3. The effect of spatial truncation error on variance of gravity anomalies derived from inversion of satellite orbital and gradiometric data

    NASA Astrophysics Data System (ADS)

    Eshagh, Mehdi; Ghorbannia, Morteza

    2014-07-01

    The spatial truncation error (STE) is a significant systematic error in the integral inversion of satellite gradiometric and orbital data to gravity anomalies at sea level. In order to reduce the effect of STE, a larger area than the desired one is considered in the inversion process, but the anomalies located in its central part are selected as the final results. The STE influences the variance of the results as well because the residual vector, which is contaminated with STE, is used for its estimation. The situation is even more complicated in variance component estimation because of its iterative nature. In this paper, we present a strategy to reduce the effect of STE on the a posteriori variance factor and the variance components for inversion of satellite orbital and gradiometric data to gravity anomalies at sea level. The idea is to define two windowing matrices for reducing this error from the estimated residuals and anomalies. Our simulation studies over Fennoscandia show that the differences between the 0.5°×0.5° gravity anomalies obtained from orbital data and an existing gravity model have standard deviation (STD) and root mean squared error (RMSE) of 10.9 and 12.1 mGal, respectively, and those obtained from gradiometric data have 7.9 and 10.1 in the same units. In the case that they are combined using windowed variance components the STD and RMSE become 6.1 and 8.4 mGal. Also, the mean value of the estimated RMSE after using the windowed variances is in agreement with the RMSE of the differences between the estimated anomalies and those obtained from the gravity model.

  4. Spatial and temporal dissociation of AQP4 and Kir4.1 expression during induction of refractive errors

    PubMed Central

    Goodyear, Melinda J.; Crewther, Sheila G.; Murphy, Melanie J.; Giummarra, Loretta; Hazi, Agnes; Junghans, Barbara M.; Crewther, David P.

    2010-01-01

    Purpose Spatial co-localization of aquaporin water channels (AQP4) and inwardly rectifying potassium ion channels (Kir4.1) on the endfeet regions of glial cells has been suggested as the basis of functionally interrelated mechanisms of osmoregulation in brain edema. The aim of this study was to investigate the spatial and temporal changes in the expression of AQP4 and Kir4.1 channels in an avascular retina during the first week of the optical induction of refractive errors. Methods Three-day-old hatchling chicks were randomly assigned to three groups and either did not wear lenses or were monocularly goggled with ±10D lenses for varying times up to 7 days before biometric assessment. Retinal tissue was prepared either for western blot analysis to show the presence of the AQP4 and Kir4.1 protein in the chick retina or for immunolocalization using AQP4 and Kir4.1 antibodies to determine the regional distribution and intensity of labeling during the induction of refractive errors. Results As expected, ultrasonography demonstrated that all eyes showed rapid elongation post hatching. Negative lens-wearing eyes elongated faster than fellow eyes or normal non goggled eyes and became progressively more myopic with time post lensing. Positive lens-wearing eyes showed reduced ocular growth compared to normal controls and developed a hyperopic refraction. Quantitative immunohistochemistry revealed the upregulation of AQP4 channel expression on Müller cells in the retinal nerve fiber layer during the first 2 days of negative lens wear. Kir4.1 channel upregulation in the inner plexiform layer was only found on day 4 of positive lens wear during the development of refractive hyperopia. Conclusions These results indicate that the expression of AQP4 and Kir4.1 channels on Müller cells is associated with the changes in ocular volume seen during the induction of refractive errors. However, the sites of greatest expression and the temporal pattern of the upregulation of AQP4 and

  5. Medical makeup for concealing facial scars.

    PubMed

    Mee, Donna; Wong, Brian J F

    2012-10-01

    Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine.

  6. Induction detection of concealed bulk banknotes

    NASA Astrophysics Data System (ADS)

    Fuller, Christopher; Chen, Antao

    2012-06-01

    The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.

  7. Concealed evaporite basin drilled in Arizona

    SciTech Connect

    Rauzi, S.L.

    1996-10-21

    The White Mountains of Arizona are a high forested plateau underlain by volcanic rocks of Late Pliocene and Quaternary age on the south margin of the Colorado plateau province. Elevations range from 6,000--11,590 ft, with winter snow and summer rain but ideal conditions for much of the year. There was no evidence of a Permian evaporite basin concealed beneath the White Mountain volcanic field until 1993, when the Tonto 1 Alpine-Federal, a geothermal test well, was drilled. This test did not encounter thermal waters, but it did encounter a surprisingly thick and unexpected sequence of anhydrite, dolomite, and petroliferous limestone assigned to the Supai (Yeso) formation of Permian age. The Tonto test was continuously cored through the Permian section, providing invaluable information that is now stored at the Arizona Geological Survey in Tucson. The paper describes the area geology and the concealed basin.

  8. Concealed weapons detection using electromagnetic resonances

    NASA Astrophysics Data System (ADS)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William

    1998-12-01

    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  9. Internally concealed cocaine: analytical and diagnostic aspects.

    PubMed

    Bogusz, M J; Althoff, H; Erkens, M; Maier, R D; Hofmann, R

    1995-09-01

    Thirty persons arrested at Frankfurt airport for smuggling internally concealed cocaine in 1993/1994 were investigated. An X-ray examination (in all 30 cases), immunochemical examination of urine (in 27 cases) and of saliva (in 20 cases) was performed in parallel. An X-ray examination gave positive results in all examined persons. EMIT cocaine metabolite assay (cut off 300 ng benzoylecgonine (BE)/mL) was positive in eight urine samples. After reducing the cut off to 150 ng BE/mL urine, eleven samples were classified as positive. The results were confirmed by means of chromatographic determinations. These findings showed limited role of immunological examination of urine as a screening test in suspected smuggling of internally concealed drugs. All saliva samples showed negative immunochemical results. The number of concealed containers ranged from 44 to 135 per person. The amount of cocaine hydrochloride found in particular cases ranged from 242 to 1050 g net weight, divided into containers weighing from 5.7 to 13.8 g. Drug packages were obviously machine-made. The packages smuggled by a particular person were uniform. However, a distinct interpersonal variability in drug packages was observed, in regard to the number of protective layers (4-7), size, weight, and cocaine purity. This may be helpful for the identification of production site. The leaching of cocaine from selected containers was investigated in a stirring bath and was independent of the conditions applied. PMID:7595327

  10. A modified surgical procedure for concealed penis

    PubMed Central

    Cheng, Gong; Liu, Bianjiang; Guan, Zhaolong; Huang, Yuan; Qin, Chao; Song, Ninghong; Wang, Zengjun

    2015-01-01

    Introduction: We described a modified surgical procedure for repairing a concealed penis and compared the efficacy and feasibility of modified repair with traditional repair. Methods: From March 2003 to December 2012, 96 patients with a concealed penis were recruited to undergo penile repair at our centre. Modified repair and traditional repair were performed respectively on 46 and 50 cases. We compared operative time, intraoperative blood loss, cosmetic result of operative scars, postoperative penile retraction, and complications. Results: All operations were completed successfully without serious complications. The mean operative time, intraoperative blood loss, and cosmetic result of the operative scar between the two surgical methods were similar. However, the postoperative penile retraction rate in patients undergoing modified repair decreased significantly than in the traditional repair. Conclusions: Our modified surgical procedure is effective and feasible for a concealed penis. Although extra procedures were needed for the modified repair, the operative time, intraoperative blood loss and cosmetic result of operative scar between the two procedures were similar. Compared with traditional repair, modified repair has better clinical outcomes. PMID:26664507

  11. Generation of keys for image optical encryption in spatially incoherent light aimed at reduction of image decryption error

    NASA Astrophysics Data System (ADS)

    Cheremkhin, Pavel A.; Evtikhiev, Nikolay N.; Krasnov, Vitaly V.; Rodin, Vladislav G.; Starikov, Sergey N.

    2014-05-01

    At present time methods of optical encryption are actively developed. The majority of existing methods of optical encryption use not only light intensity distribution, easily registered with photosensors, but also its phase distribution which require application of complex holographic schemes in conjunction with spatially coherent light. This leads to complex optical schemes and low decryption quality. To eliminate these disadvantages it is possible to implement optical encryption using spatially incoherent illumination which requires registration of light intensity distribution only. However this applies new restrictions on encryption keys: Fourier spectrum amplitude distribution of encryption key should overlap Fourier spectrum amplitude distribution of image to be encrypted otherwise loss of information is unavoidable. Therefore it seems that best key should have white spectrum. On the other hand due to fact that only light intensity distribution is registered, spectra of image to be encrypted and encryption key always have peaks at zero frequency and their heights depend on corresponding total energy. Since encrypted image contains noise, ratio of its average spectrum energy to noise average energy determines signal to noise ratio of decrypted image. Therefore ratio of amplitude at zero frequency to average spectrum amplitude (RZA) of encryption key defines decrypted images quality. For generation of encryption keys with low RZA method of direct search with random trajectory (DSRT) was used. To estimate impact of key RZA on decrypted images error numerical experiments were conducted. For experiments keys with different RZA values but with same energy value were generated and used. Numerically simulated optical encryption and decryption of set of test images was conducted. Results of experiment demonstrate that application of keys with low RZA generated by DSRT method leads to up to 20% lower error in comparison to keys generated by means of uniform random

  12. Concealed Wolff-Parkinson-White syndrome.

    PubMed

    Hiejima, K; Satake, S

    1978-03-01

    Sixty-nine patients, 23 of whom had documented attacks of paroxysmal supraventricular tachycardia (PSVT), were studied electrophysiologically and the following results were obtained: (1) Antegrade concealed Wolff-Parkinson-White syndrom (AC WPW) was demonstrated in 7 out of 69 patients by atrial stimulation including extrastimulus. Six of these 7 patients presented an accessory pathway (AP) conduction of the Kent type, 5 of which showed Type A and another, Type B. The remaining one of these 7 patients showed an AP conduction of the Mahaim type. One of the 7 patients showed a combination with the James and Kent types AP conduction. (2) Retrograde concealed Wolff-Parkinson-White syndrome (RC WPW) was demonstrated in 8 out of 49 patients in whom the presence of V-A conduction was revealed by ventricular stimulation, while PSVT was documented in 7 of these 8 patients. An AP of the Kent type was identified in the left side of the heart in 5 out of 7 patients with documented PSVT, the right side in one and in the septal region in one. (3) The presence of bilateral or two APs were demonstrated in 3 patients. In another one with documented PSVT, the presence of a branched AP from a left-sided Kent bundle was assumed. In conclusion, our study demonstrated that concealed APs may be more frequent than realized. For example, the frequency of RC WPW in patients with PSVT was 30.4% (7/23) in our series. Accordingly, it is postulated that RC WPW may also be indicated for surgical therapy and that detailed electrophysiologic examination by the physician should be carried out for the sake of determining the indication.

  13. Detecting persons concealed in a vehicle

    DOEpatents

    Tucker, Jr., Raymond W.

    2005-03-29

    An improved method for detecting the presence of humans or animals concealed within in a vehicle uses a combination of the continuous wavelet transform and a ratio-based energy calculation to determine whether the motion detected using seismic sensors placed on the vehicle is due to the presence of a heartbeat within the vehicle or is the result of motion caused by external factors such as the wind. The method performs well in the presence of light to moderate ambient wind levels, producing far fewer false alarm indications. The new method significantly improves the range of ambient environmental conditions under which human presence detection systems can reliably operate.

  14. Spatial and temporal variability of the overall error of National Atmospheric Deposition Program measurements determined by the USGS collocated-sampler program, water years 1989-2001.

    PubMed

    Wetherbee, Gregory A; Latysh, Natalie E; Gordon, John D

    2005-06-01

    Data from the U.S. Geological Survey (USGS) collocated-sampler program for the National Atmospheric Deposition Program/National Trends Network (NADP/NTN) are used to estimate the overall error of NADP/NTN measurements. Absolute errors are estimated by comparison of paired measurements from collocated instruments. Spatial and temporal differences in absolute error were identified and are consistent with longitudinal distributions of NADP/NTN measurements and spatial differences in precipitation characteristics. The magnitude of error for calcium, magnesium, ammonium, nitrate, and sulfate concentrations, specific conductance, and sample volume is of minor environmental significance to data users. Data collected after a 1994 sample-handling protocol change are prone to less absolute error than data collected prior to 1994. Absolute errors are smaller during non-winter months than during winter months for selected constituents at sites where frozen precipitation is common. Minimum resolvable differences are estimated for different regions of the USA to aid spatial and temporal watershed analyses.

  15. Spatial and temporal variability of the overall error of National Atmospheric Deposition Program measurements determined by the USGS collocated-sampler program, water years 1989-2001

    USGS Publications Warehouse

    Wetherbee, G.A.; Latysh, N.E.; Gordon, J.D.

    2005-01-01

    Data from the U.S. Geological Survey (USGS) collocated-sampler program for the National Atmospheric Deposition Program/National Trends Network (NADP/NTN) are used to estimate the overall error of NADP/NTN measurements. Absolute errors are estimated by comparison of paired measurements from collocated instruments. Spatial and temporal differences in absolute error were identified and are consistent with longitudinal distributions of NADP/NTN measurements and spatial differences in precipitation characteristics. The magnitude of error for calcium, magnesium, ammonium, nitrate, and sulfate concentrations, specific conductance, and sample volume is of minor environmental significance to data users. Data collected after a 1994 sample-handling protocol change are prone to less absolute error than data collected prior to 1994. Absolute errors are smaller during non-winter months than during winter months for selected constituents at sites where frozen precipitation is common. Minimum resolvable differences are estimated for different regions of the USA to aid spatial and temporal watershed analyses.

  16. Failure to paint the left quarter of a watercolor and no error in a line drawing: a case report of an art teacher with unilateral spatial neglect.

    PubMed

    Kondo, Minako; Mori, Toshiko; Makino, Kenichiro; Okazaki, Tetsuya; Hachisuka, Kenji

    2012-06-01

    A 54-year-old art teacher, experienced a right putaminal hemorrhage, and thereafter suffered severe left hemiplegia and unilateral spatial neglect, and was transferred to the rehabilitation department of the University Hospital 1 month after the onset. Although the unilateral spatial neglect was improving, the patient was unable to paint the left quarter of a watercolor, but there was no error in line drawing. The occurrence of errors only in a watercolor suggests that the neural process for painting a watercolor is different from that of line drawing.

  17. Failure to paint the left quarter of a watercolor and no error in a line drawing: a case report of an art teacher with unilateral spatial neglect.

    PubMed

    Kondo, Minako; Mori, Toshiko; Makino, Kenichiro; Okazaki, Tetsuya; Hachisuka, Kenji

    2012-06-01

    A 54-year-old art teacher, experienced a right putaminal hemorrhage, and thereafter suffered severe left hemiplegia and unilateral spatial neglect, and was transferred to the rehabilitation department of the University Hospital 1 month after the onset. Although the unilateral spatial neglect was improving, the patient was unable to paint the left quarter of a watercolor, but there was no error in line drawing. The occurrence of errors only in a watercolor suggests that the neural process for painting a watercolor is different from that of line drawing. PMID:21936640

  18. Bit error rate analysis of free-space optical system with spatial diversity over strong atmospheric turbulence channel with pointing errors

    NASA Astrophysics Data System (ADS)

    Krishnan, Prabu; Sriram Kumar, D.

    2014-12-01

    Free-space optical communication (FSO) is emerging as a captivating alternative to work out the hindrances in the connectivity problems. It can be used for transmitting signals over common lands and properties that the sender or receiver may not own. The performance of an FSO system depends on the random environmental conditions. The bit error rate (BER) performance of differential phase shift keying FSO system is investigated. A distributed strong atmospheric turbulence channel with pointing error is considered for the BER analysis. Here, the system models are developed for single-input, single-output-FSO (SISO-FSO) and single-input, multiple-output-FSO (SIMO-FSO) systems. The closed-form mathematical expressions are derived for the average BER with various combining schemes in terms of the Meijer's G function.

  19. Forward error correction and spatial diversity techniques for high-data-rate MILSATCOM over a slow-fading, nuclear-disturbed channel

    NASA Astrophysics Data System (ADS)

    Paul, Heywood I.; Meader, Charles B.; Lyons, Daniel A.; Ayers, David R.

    Forward error correction (FEC) and spatial diversity techniques are considered for improving the reliability of high-data-rate military satellite communication (MILSATCOM) over a slow-fading, nuclear-disturbed channel. Slow fading, which occurs when the channel decorrelation time is much greater than the transmitted symbol interval, is characterized by deep fades and, without special precautions, long bursts of errors over high-data-rate communication links. Using the widely accepted Defense Nuclear Agency (DNA) nuclear-scintillated channel model, the authors derive performance tradeoffs among required interleaver storage, FEC, spatial diversity, and link signal-to-noise ratio for differential binary phase shift keying (DBPSK) in the slow-fading environment. Spatial diversity is found to yield impressive gains without the large memory storage and transmission relay requirements associated with interleaving.

  20. Millimeter-wave concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Chang, Yu-Wen; Juhola, Markku; Grainger, William; Wang, Beining; Manahan, Brian

    1997-02-01

    Millimeter-wave concealed weapon detection, based on the use of a fast scan short-range FMCW 94 GHz radar, was evaluated in a small business innovative research phase I under the Technology Reinvestment Project (TRP) program. The feasibility of a fast circular scan technique invented by Chang Industry has been firmly established, with handgun images recorded. This fast scan technique is essential both for remote sensing and full-body fixed site scanner applications. Although only raw image data was obtained in Phase I, we propose to apply super-resolution image enhancements and target recognition software algorithms to provide more reliable detection. Endorsement from the Los Angeles County Sheriff's Department, to provide operational input and testing and evaluation, and the hiring of a consultant to plan for future program financing (including venture capital investment) make the project very attractive for commercialization.

  1. Color image fusion for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Toet, Alexander

    2003-09-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.

  2. Concealed semantic and episodic autobiographical memory electrified.

    PubMed

    Ganis, Giorgio; Schendan, Haline E

    2012-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as "memory detection," little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816

  3. A method for enhancing digital information displayed to computer users with visual refractive errors via spatial and spectral processing

    NASA Astrophysics Data System (ADS)

    Alonso, Miguel, Jr.

    2007-12-01

    This research pursued the conceptualization, implementation, and verification of a system that enhances digital information displayed on an LCD panel to users with visual refractive errors. The target user groups for this system are individuals who have moderate to severe visual aberrations for which conventional means of compensation, such as glasses or contact lenses, does not improve their vision. This research is based on a priori knowledge of the user's visual aberration, as measured by a wavefront analyzer. With this information it is possible to generate images that, when displayed to this user, will counteract his/her visual aberration. The method described in this dissertation advances the development of techniques for providing such compensation by integrating spatial information in the image as a means to eliminate some of the shortcomings inherent in using display devices such as monitors or LCD panels. Additionally, physiological considerations are discussed and integrated into the method for providing said compensation. In order to provide a realistic sense of the performance of the methods described, they were tested by mathematical simulation in software, as well as by using a single-lens high resolution CCD camera that models an aberrated eye, and finally with human subjects having various forms of visual aberrations. Experiments were conducted on these systems and the data collected from these experiments was evaluated using statistical analysis. The experimental results revealed that the pre-compensation method resulted in a statistically significant improvement in vision for all of the systems. Although significant, the improvement was not as large as expected for the human subject tests. Further analysis suggest that even under the controlled conditions employed for testing with human subjects, the characterization of the eye may be changing. This would require real-time monitoring of relevant variables (e.g. pupil diameter) and continuous

  4. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    PubMed

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. PMID:24211560

  5. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    PubMed

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour.

  6. Concealing Concealment: The Mediating Role of Internalized Heterosexism in Psychological Distress Among Lesbian, Gay, and Bisexual Older Adults

    PubMed Central

    Hoy-Ellis, Charles P.

    2016-01-01

    Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors—internalized heterosexism and concealment of sexual orientation—and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed. PMID:26322654

  7. Concealed identification symbols and nondestructive determination of the identification symbols

    SciTech Connect

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  8. Approach trajectory planning system for maximum concealment

    NASA Technical Reports Server (NTRS)

    Warner, David N., Jr.

    1986-01-01

    A computer-simulation study was undertaken to investigate a maximum concealment guidance technique (pop-up maneuver), which military aircraft may use to capture a glide path from masked, low-altitude flight typical of terrain following/terrain avoidance flight enroute. The guidance system applied to this problem is the Fuel Conservative Guidance System. Previous studies using this system have concentrated on the saving of fuel in basically conventional land and ship-based operations. Because this system is based on energy-management concepts, it also has direct application to the pop-up approach which exploits aircraft performance. Although the algorithm was initially designed to reduce fuel consumption, the commanded deceleration is at its upper limit during the pop-up and, therefore, is a good approximation of a minimum-time solution. Using the model of a powered-lift aircraft, the results of the study demonstrated that guidance commands generated by the system are well within the capability of an automatic flight-control system. Results for several initial approach conditions are presented.

  9. Detection of EEG spatial-spectral-temporal signatures of errors: a comparative study of ICA-based and channel-based methods.

    PubMed

    Shou, Guofa; Ding, Lei

    2015-01-01

    The present study aimed to investigate the sensitivity of independent component analysis (ICA)- and channel-based methods in detecting electroencephalography (EEG) spatial-spectral-temporal signatures of performance errors. 128-channel EEG signals recorded from 18 subjects, who performed a color-word matching Stroop task, were analyzed. The spatial-spectral-temporal patterns in event-related potentials (ERPs) and oscillatory activities (i.e., power and phase) were measured at four selected channels, i.e., FCz, Pz, O1 and O2, from original EEG data after preprocessing, EEG data after additional current source density (CSD) transform, and back-projected EEG data from individual ICs after additional ICA analysis. Pair-wise correlation coefficient (CC) and mutual information (MI), calculated from three EEG data at four selected channels, were compared to examine mutual correlations in EEG signals obtained through three different means. Thereafter, EEG signatures of errors from these three means were statistically compared at multiple time windows in the contrast of error and correct responses. Significantly decreased CC and MI values were observed in CSD- and ICA-processed EEGs as compared with original EEG, with the smallest CC and MI in ICA EEG. Similar error patterns in ERPs and peri-response oscillatory activities were detected in all three EEGs, whereas the pre-stimulus and post-stimulus error-related oscillatory patterns identified in ICA EEG were either not or only partially detected in both original EEG and CSD EEGs in general. Both CSD and ICA processes can largely reduce signal correlations due to the volume conduction effect in original EEG, and EEG signatures of errors are better detected by ICA-based method than channel-based method (i.e., original and CSD EEGs). ICA provides the best sensitivity to detect EEG signatures linked to specific neural processes via disentangling superimposed channel-level EEG signals into distinct neurocognitive process

  10. Ebola nurse Pauline Cafferkey accused of concealing high temperature.

    PubMed

    2016-08-24

    Pauline Cafferkey, the nurse who was infected with the Ebola virus while caring for sick people in west Africa, has been accused of concealing her temperature during checks on her return to the UK. PMID:27641552

  11. Grab vs. composite sampling of particulate materials with significant spatial heterogeneity--a simulation study of "correct sampling errors".

    PubMed

    Minkkinen, Pentti O; Esbensen, Kim H

    2009-10-19

    Sampling errors can be divided into two classes, incorrect sampling and correct sampling errors. Incorrect sampling errors arise from incorrectly designed sampling equipment or procedures. Correct sampling errors are due to the heterogeneity of the material in sampling targets. Excluding the incorrect sampling errors, which can all be eliminated in practice although informed and diligent work is often needed, five factors dominate sampling variance: two factors related to material heterogeneity (analyte concentration; distributional heterogeneity) and three factors related to the sampling process itself (sample type, sample size, sampling modus). Due to highly significant interactions, a comprehensive appreciation of their combined effects is far from trivial and has in fact never been illustrated in detail. Heterogeneous materials can be well characterized by the two first factors, while all essential sampling process characteristics can be summarized by combinations of the latter three. We here present simulations based on an experimental design that varies all five factors. Within the framework of the Theory of Sampling, the empirical Total Sampling Error is a function of the fundamental sampling error and the grouping and segregation error interacting with a specific sampling process. We here illustrate absolute and relative sampling variance levels resulting from a wide array of simulated repeated samplings and express the effects by pertinent lot mean estimates and associated Root Mean Squared Errors/sampling variances, covering specific combinations of materials' heterogeneity and typical sampling procedures as used in current science, technology and industry. Factors, levels and interactions are varied within limits selected to match realistic materials and sampling situations that mimic, e.g., sampling for genetically modified organisms; sampling of geological drill cores; sampling during off-loading 3-dimensional lots (shiploads, railroad cars, truckloads

  12. Improving the spatial and temporal resolution with quantification of uncertainty and errors in earth observation data sets using Data Interpolating Empirical Orthogonal Functions methodology

    NASA Astrophysics Data System (ADS)

    El Serafy, Ghada; Gaytan Aguilar, Sandra; Ziemba, Alexander

    2016-04-01

    There is an increasing use of process-based models in the investigation of ecological systems and scenario predictions. The accuracy and quality of these models are improved when run with high spatial and temporal resolution data sets. However, ecological data can often be difficult to collect which manifests itself through irregularities in the spatial and temporal domain of these data sets. Through the use of Data INterpolating Empirical Orthogonal Functions(DINEOF) methodology, earth observation products can be improved to have full spatial coverage within the desired domain as well as increased temporal resolution to daily and weekly time step, those frequently required by process-based models[1]. The DINEOF methodology results in a degree of error being affixed to the refined data product. In order to determine the degree of error introduced through this process, the suspended particulate matter and chlorophyll-a data from MERIS is used with DINEOF to produce high resolution products for the Wadden Sea. These new data sets are then compared with in-situ and other data sources to determine the error. Also, artificial cloud cover scenarios are conducted in order to substantiate the findings from MERIS data experiments. Secondly, the accuracy of DINEOF is explored to evaluate the variance of the methodology. The degree of accuracy is combined with the overall error produced by the methodology and reported in an assessment of the quality of DINEOF when applied to resolution refinement of chlorophyll-a and suspended particulate matter in the Wadden Sea. References [1] Sirjacobs, D.; Alvera-Azcárate, A.; Barth, A.; Lacroix, G.; Park, Y.; Nechad, B.; Ruddick, K.G.; Beckers, J.-M. (2011). Cloud filling of ocean colour and sea surface temperature remote sensing products over the Southern North Sea by the Data Interpolating Empirical Orthogonal Functions methodology. J. Sea Res. 65(1): 114-130. Dx.doi.org/10.1016/j.seares.2010.08.002

  13. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300

    PubMed Central

    Farwell, Lawrence A.; Richardson, Drew C.; Richardson, Graham M.; Furedy, John J.

    2014-01-01

    A classification concealed information test (CIT) used the “brain fingerprinting” method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  14. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300.

    PubMed

    Farwell, Lawrence A; Richardson, Drew C; Richardson, Graham M; Furedy, John J

    2014-01-01

    A classification concealed information test (CIT) used the "brain fingerprinting" method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  15. Assessing representation errors of IAGOS CO2, CO and CH4 profile observations: the impact of spatial variations in near-field emissions

    NASA Astrophysics Data System (ADS)

    Boschetti, Fabio; Thouret, Valerie; Nedelec, Philippe; Chen, Huilin; Gerbig, Christoph

    2015-04-01

    Airborne platforms have their main strength in the ability of collecting mixing ratio and meteorological data at different heights across a vertical profile, allowing an insight in the internal structure of the atmosphere. However, rental airborne platforms are usually expensive, limiting the number of flights that can be afforded and hence on the amount of data that can be collected. To avoid this disadvantage, the MOZAIC/IAGOS (Measurements of Ozone and water vapor by Airbus In-service airCraft/In-service Aircraft for a Global Observing System) program makes use of commercial airliners, providing data on a regular basis. It is therefore considered an important tool in atmospheric investigations. However, due to the nature of said platforms, MOZAIC/IAGOS's profiles are located near international airports, which are usually significant emission sources, and are in most cases close to major urban settlements, characterized by higher anthropogenic emissions compared to rural areas. When running transport models at finite resolution, these local emissions can heavily affect measurements resulting in biases in model/observation mismatch. Model/observation mismatch can include different aspects in both horizontal and vertical direction, for example spatial and temporal resolution of the modeled fluxes, or poorly represented convective transport or turbulent mixing in the boundary layer. In the framework of the IGAS (IAGOS for GMES Atmospheric Service) project, whose aim is to improve connections between data collected by MOZAIC/IAGOS and Copernicus Atmospheric Service, the present study is focused on the effect of the spatial resolution of emission fluxes, referred to here as representation error. To investigate this, the Lagrangian transport model STILT (Stochastic Time Inverted Lagrangian Transport) was coupled with EDGAR (Emission Database for Global Atmospheric Research) version-4.3 emission inventory at European regional scale. EDGAR's simulated fluxes for CO, CO2

  16. Attenuation and bit error rate for four co-propagating spatially multiplexed optical communication channels of exactly same wavelength in step index multimode fibers

    NASA Astrophysics Data System (ADS)

    Murshid, Syed H.; Chakravarty, Abhijit

    2011-06-01

    Spatial domain multiplexing (SDM) utilizes co-propagation of exactly the same wavelength in optical fibers to increase the bandwidth by integer multiples. Input signals from multiple independent single mode pigtail laser sources are launched at different input angles into a single multimode carrier fiber. The SDM channels follow helical paths and traverse through the carrier fiber without interfering with each other. The optical energy from the different sources is spatially distributed and takes the form of concentric circular donut shaped rings, where each ring corresponds to an independent laser source. At the output end of the fiber these donut shaped independent channels can be separated either with the help of bulk optics or integrated concentric optical detectors. This presents the experimental setup and results for a four channel SDM system. The attenuation and bit error rate for individual channels of such a system is also presented.

  17. Investigation of the structure and lithology of bedrock concealed by basin fill, using ground-based magnetic-field-profile data acquired in the San Rafael Basin, southeastern Arizona

    USGS Publications Warehouse

    Bultman, Mark W.

    2013-01-01

    Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral

  18. Pigmented concealing powders for the hair loss patient.

    PubMed

    Cossman, Jack P; Ladizinski, Barry; Lee, Kachiu C

    2013-12-01

    Patients suffering from alopecia may experience low self-esteem, low self-image, and other psychological consequences. While medical and surgical options for treating hair loss exist, these may be prohibitively expensive or have an unpredictable outcome. In lieu of or in addition to therapeutic approaches, cosmetic options have long been an approach to hair loss. However, patients and clinicians alike often regard cosmetic options to be limited to hairstyling and hairpieces, unaware that newer options, namely pigmented concealing powders, may offer a more practical and seemingly natural camouflage. This article introduces the clinician to concealing powders as a viable option for the hair loss patient.

  19. Concealing a Passive Sensing System with Single-Negative Layers

    NASA Astrophysics Data System (ADS)

    Zhu, Xue-Feng; Zou, Xin-Ye; Zhou, Xiao-Wei; Liang, Bin; Cheng, Jian-Chun

    2012-01-01

    We propose a multi-layer structure for concealing an electromagnetic sensing system (a sensor is wrapped with a transparent protective layer), using single-negative (SNG) materials whose material parameters are completely independent of those of the host matrix as well as the concealed system. The numerical results show that only three different kinds of SNG materials are sufficient to yield the cloaking effect even in the presence of weak loss. This may significantly facilitate the experimental realization of a well-performing sensor-cloaking device.

  20. Adolescent disclosure and concealment: longitudinal and concurrent associations with aggression.

    PubMed

    Leavitt, Chelom E; Nelson, David A; Coyne, Sarah M; Hart, Craig H

    2013-01-01

    This longitudinal study assessed the association between prior (preschool) and concurrent physical and relational aggression as they relate to Russian adolescents' disclosure and concealment patterns with their parents. In the initial preschool study, there were 106 boys and 106 girls (mean age = 60.24 months, SD = 7.81). Both peer nominations and teacher ratings of aggression were obtained for these children. Ten years later, the majority of these children (72.2%; n = 153) completed a longitudinal follow-up battery of assessments. Included in these measures was a self-reported measure of aggression as well as an assessment of the extent to which these adolescents disclosed to and concealed information from their parents. Separate models were estimated by gender of child for the 153 children who participated in both Time 1 and Time 2 data collections. Preschool physical aggression proved an important longitudinal predictor of adolescent disclosure and concealment for girls. Concurrently, self-rated relational aggression was also significantly associated with concealment for both boys and girls.

  1. Detecting concealed information using functional near-infrared spectroscopy.

    PubMed

    Sai, Liyang; Zhou, Xiaomei; Ding, Xiao Pan; Fu, Genyue; Sang, Biao

    2014-09-01

    The present study focused on the potential application of fNIRS in the detection of concealed information. Participants either committed a mock crime or not and then were presented with a randomized series of probes (crime-related information) and irrelevants (crime-irrelevant information) in a standard concealed information test (CIT). Participants in the guilty group were instructed to conceal crime-related information they obtained from the mock crime, thus making deceptive response to the probes. Meanwhile, their brain activity to probes and irrelevants was recorded by functional near-infrared spectroscopy (fNIRS). At the group level, we found that probe items were associated with longer reaction times and greater activity in bilateral dorsolateral prefrontal cortex and supplementary motor cortex than irrelevant items in the guilty group, but not in the innocent group. These findings provided evidence on neural correlates of recognition during a CIT. Finally, on the basis of the activity in bilateral dorsolateral prefrontal cortex and supplementary motor cortex, the correct classification of guilty versus innocent participants was approximately 75 % and the combination of fNIRS and reaction time measures yielded a better classification rate of 83.3 %. These findings illustrate the feasibility and promise of using fNIRS to detect concealed information. PMID:24514911

  2. Cylindrical millimeter-wave imaging technique for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    1998-03-01

    A novel cylindrical millimeter-wave imaging technique has been developed at the Pacific Northwest National Laboratory for the detection of metallic and non-metallic concealed weapons. This technique uses a vertical array of millimeter- wave antennas which is mechanically swept around a person in a cylindrical fashion. The wideband millimeter-wave data is mathematically reconstructed into a series of high- resolution images of the person being screened. Clothing is relatively transparent to millimeter-wave illumination,whereas the human body and concealed items are reflective at millimeter wavelengths. Differences in shape and reflectivity are revealed in the images and allow a human operator to detect and identify concealed weapons. A full 360 degree scan is necessary to fully inspect a person for concealed items. The millimeter-wave images can be formed into a video animation sequence in which the person appears to rotate in front of a fixed illumination source.This is s convenient method for presenting the 3D image data for analysis. This work has been fully sponsored by the FAA. An engineering prototype based on the cylindrical imaging technique is presently under development. The FAA is currently opposed to presenting the image data directly to the operator due to personal privacy concerns. A computer automated system is desired to address this problem by eliminating operator viewing of the imagery.

  3. Do Children Understand That People Selectively Conceal or Express Emotion?

    ERIC Educational Resources Information Center

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  4. Detection of concealed and buried chemicals by using multifrequency excitations

    SciTech Connect

    Gao Yaohui; Chen, Meng-Ku; Yang, Chia-En; Chang, Yun-Ching; Yao, Jim; Cheng Jiping; Yin, Stuart; Hui Rongqing; Ruffin, Paul; Brantley, Christina; Edwards, Eugene; Luo, Claire

    2010-08-15

    In this paper, we present a new type of concealed and buried chemical detection system by stimulating and enhancing spectroscopic signatures with multifrequency excitations, which includes a low frequency gradient dc electric field, a high frequency microwave field, and higher frequency infrared (IR) radiations. Each excitation frequency plays a unique role. The microwave, which can penetrate into the underground and/or pass through the dielectric covers with low attenuation, could effectively transform its energy into the concealed and buried chemicals and increases its evaporation rate from the sample source. Subsequently, a gradient dc electric field, generated by a Van De Graaff generator, not only serves as a vapor accelerator for efficiently expediting the transportation process of the vapor release from the concealed and buried chemicals but also acts as a vapor concentrator for increasing the chemical concentrations in the detection area, which enables the trace level chemical detection. Finally, the stimulated and enhanced vapors on the surface are detected by the IR spectroscopic fingerprints. Our theoretical and experimental results demonstrate that more than sixfold increase in detection signal can be achieved by using this proposed technology. The proposed technology can also be used for standoff detection of concealed and buried chemicals by adding the remote IR and/or thermal spectroscopic and imaging detection systems.

  5. Autonomous spatially adaptive sampling in experiments based on curvature, statistical error and sample spacing with applications in LDA measurements

    NASA Astrophysics Data System (ADS)

    Theunissen, Raf; Kadosh, Jesse S.; Allen, Christian B.

    2015-06-01

    Spatially varying signals are typically sampled by collecting uniformly spaced samples irrespective of the signal content. For signals with inhomogeneous information content, this leads to unnecessarily dense sampling in regions of low interest or insufficient sample density at important features, or both. A new adaptive sampling technique is presented directing sample collection in proportion to local information content, capturing adequately the short-period features while sparsely sampling less dynamic regions. The proposed method incorporates a data-adapted sampling strategy on the basis of signal curvature, sample space-filling, variable experimental uncertainty and iterative improvement. Numerical assessment has indicated a reduction in the number of samples required to achieve a predefined uncertainty level overall while improving local accuracy for important features. The potential of the proposed method has been further demonstrated on the basis of Laser Doppler Anemometry experiments examining the wake behind a NACA0012 airfoil and the boundary layer characterisation of a flat plate.

  6. Effects of moderate prenatal ethanol exposure and age on social behavior, spatial response perseveration errors and motor behavior.

    PubMed

    Hamilton, Derek A; Barto, Daniel; Rodriguez, Carlos I; Magcalas, Christy M; Fink, Brandi C; Rice, James P; Bird, Clark W; Davies, Suzy; Savage, Daniel D

    2014-08-01

    Persistent deficits in social behavior are among the major negative consequences associated with exposure to ethanol during prenatal development. Prior work from our laboratory has linked deficits in social behavior following moderate prenatal alcohol exposure (PAE) in the rat to functional alterations in the ventrolateral frontal cortex [21]. In addition to social behaviors, the regions comprising the ventrolateral frontal cortex are critical for diverse processes ranging from orofacial motor movements to flexible alteration of behavior in the face of changing consequences. The broader behavioral implications of altered ventrolateral frontal cortex function following moderate PAE have, however, not been examined. In the present study we evaluated the consequences of moderate PAE on social behavior, tongue protrusion, and flexibility in a variant of the Morris water task that required modification of a well-established spatial response. PAE rats displayed deficits in tongue protrusion, reduced flexibility in the spatial domain, increased wrestling, and decreased investigation, indicating that several behaviors associated with ventrolateral frontal cortex function are impaired following moderate PAE. A linear discriminant analysis revealed that measures of wrestling and tongue protrusion provided the best discrimination of PAE rats from saccharin-exposed control rats. We also evaluated all behaviors in young adult (4-5 months) or older (10-11 months) rats to address the persistence of behavioral deficits in adulthood and possible interactions between early ethanol exposure and advancing age. Behavioral deficits in each domain persisted well into adulthood (10-11 months), however, there was no evidence that aging enhances the effects of moderate PAE within the age ranges that were studied. PMID:24769174

  7. Campaign for Right to Carry Concealed Guns on Campuses Gains Traction

    ERIC Educational Resources Information Center

    Wiseman, Rachel

    2012-01-01

    Five years after the Virginia Tech massacre prompted a student in Texas to start a Facebook page in favor of the right to carry concealed weapons on college campuses, the resulting group, Students for Concealed Carry, has advanced its cause. In more than a dozen states, legislation has been introduced to allow the carrying of concealed firearms on…

  8. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    NASA Astrophysics Data System (ADS)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  9. Could plate tectonics on Venus be concealed by volcanic deposits

    NASA Technical Reports Server (NTRS)

    Kaula, W. M.; Muradian, L. M.

    1982-01-01

    The present investigation is supplementary to a study reported by Kaula and Phillips (1981). From an analysis of Pioneer Venus altimetry, Kaula and Phillips had inferred that any heat loss from the planet by plate tectonics must be small compared to that from the earth. However, it has been suggested by others that plate tectonic may exist on Venus, but that the expected 'square root of s' dependence of the topographic drop off is not observed because it is concealed by lava flows. The present investigation has the objective to conduct an examination whether this suggestion of concealment by lava flow is correct. On the basis of the performed analysis, it is concluded that the results obtained by Kaula and Phillips appear to be well justified.

  10. ID-Check: Online Concealed Information Test Reveals True Identity.

    PubMed

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. PMID:26390033

  11. An adaptive perspective on revealed and concealed cues to empathy.

    PubMed

    Ward, Robert; Shingler, Polly

    2016-02-01

    Wu, Sheppard, and Mitchell (Br. J. Psychol., 2016; 107, 1-22) found that observers could accurately identify people with extreme but not more average empathy scores. Here, we further consider this U-shaped discrimination function. We first examine a statistical issue regarding the construction of the average groups, which are less homogenous by definition than the extreme groups. We then consider the kinds of questions arising when these results are considered within the adaptive framework of signal theory. Some interesting questions arise relating to the signal sender, including the costs and benefits to the sender in revealing and concealing true empathy levels, and the effects of adopting behavioural norms to conceal true levels of empathy.

  12. ID-Check: Online Concealed Information Test Reveals True Identity.

    PubMed

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications.

  13. Noise-resistant system of concealed information transfer on a chaotic delayed feedback oscillator with switchable delay time

    NASA Astrophysics Data System (ADS)

    Kul'minskii, D. D.; Ponomarenko, V. I.; Karavaev, A. S.; Prokhorov, M. D.

    2016-05-01

    We propose a system of concealed information transfer based on a delayed feedback oscillator with switchable chaotic regimes. The proposed system is analyzed numerically and experimentally. The dependences of the bit error rate during transmission of a binary information signal on the signal-to-noise ratio, attenuation of the signal in the communication channel, and the duration of the time interval during which a bit is transferred are constructed. The high stability of the system to noise and amplitude distortions of a signal in the communication channel is demonstrated.

  14. Biomedical psychiatry and its concealed metaphors: an anthropological perspective.

    PubMed

    Martínez-Hernáez, Angel

    2013-09-01

    The idea that power relations structure social life is self-evident to most anthropologists. Western medical knowledge or biomedicine, and by extension science or scientific knowledge, however, has until relatively recently been exempt from anthropological scrutiny in political terms. An understanding of biomedicine as a system of knowledge that is not a copy of facts but a representation of them has entailed a break with the traditional separation of folk knowledge and scientific knowledge in anthropology, making it possible to include biomedicine in the repertoire of ethnographic objects. The peculiarity of biomedicine as a cultural system, seen from this perspective, lies in a paradox: its self-characterization as a set of non-ideological discourses and practices is a representation that conceals its ideological and power-saturated nature. Through an analysis of DSM-IV-TR, this article explores some of the representational strategies through which this concealment takes place in biomedical psychiatry: the asocial and universal character of mental illness categories; the neutrality of clinical practice; and the non-moral nature of clinical criteria and judgment. These are concealed metaphors in the true sense, for not only do they speak of something without naming it but they also deny their own existence as metaphors.

  15. Biomedical psychiatry and its concealed metaphors: an anthropological perspective.

    PubMed

    Martínez-Hernáez, Angel

    2013-09-01

    The idea that power relations structure social life is self-evident to most anthropologists. Western medical knowledge or biomedicine, and by extension science or scientific knowledge, however, has until relatively recently been exempt from anthropological scrutiny in political terms. An understanding of biomedicine as a system of knowledge that is not a copy of facts but a representation of them has entailed a break with the traditional separation of folk knowledge and scientific knowledge in anthropology, making it possible to include biomedicine in the repertoire of ethnographic objects. The peculiarity of biomedicine as a cultural system, seen from this perspective, lies in a paradox: its self-characterization as a set of non-ideological discourses and practices is a representation that conceals its ideological and power-saturated nature. Through an analysis of DSM-IV-TR, this article explores some of the representational strategies through which this concealment takes place in biomedical psychiatry: the asocial and universal character of mental illness categories; the neutrality of clinical practice; and the non-moral nature of clinical criteria and judgment. These are concealed metaphors in the true sense, for not only do they speak of something without naming it but they also deny their own existence as metaphors. PMID:24308254

  16. Deep Raman spectroscopy for the non-invasive standoff detection of concealed chemical threat agents.

    PubMed

    Izake, Emad L; Cletus, Biju; Olds, William; Sundarajoo, Shankaran; Fredericks, Peter M; Jaatinen, Esa

    2012-05-30

    Deep Raman spectroscopy has been utilized for the standoff detection of concealed chemical threat agents from a distance of 15 m under real life background illumination conditions. By using combined time and space resolved measurements, various explosive precursors hidden in opaque plastic containers were identified non-invasively. Our results confirm that combined time and space resolved Raman spectroscopy leads to higher selectivity towards the sub-layer over the surface layer as well as enhanced rejection of fluorescence from the container surface when compared to standoff spatially offset Raman spectroscopy. Raman spectra that have minimal interference from the packaging material and good signal-to-noise ratio were acquired within 5 s of measurement time. A new combined time and space resolved Raman spectrometer has been designed with nanosecond laser excitation and gated detection, making it of lower cost and complexity than picosecond-based laboratory systems. PMID:22608458

  17. Temporal spying and concealing process in fibre-optic data transmission systems through polarization bypass

    PubMed Central

    Bony, P.Y.; Guasoni, M.; Morin, P.; Sugny, D.; Picozzi, A.; Jauslin, H.R.; Pitois, S.; Fatome, J.

    2014-01-01

    Recent research has been focused on the ability to manipulate a light beam in such a way to hide, namely to cloak, an event over a finite time or localization in space. The main idea is to create a hole or a gap in the spatial or time domain so as to allow for an object or data to be kept hidden for a while and then to be restored. By enlarging the field of applications of this concept to telecommunications, researchers have recently reported the possibility to hide transmitted data in an optical fibre. Here we report the first experimental demonstration of perpetual temporal spying and blinding process of optical data in fibre-optic transmission line based on polarization bypass. We successfully characterize the performance of our system by alternatively copying and then concealing 100% of a 10-Gb s−1 transmitted signal. PMID:25135759

  18. Deep Raman spectroscopy for the non-invasive standoff detection of concealed chemical threat agents.

    PubMed

    Izake, Emad L; Cletus, Biju; Olds, William; Sundarajoo, Shankaran; Fredericks, Peter M; Jaatinen, Esa

    2012-05-30

    Deep Raman spectroscopy has been utilized for the standoff detection of concealed chemical threat agents from a distance of 15 m under real life background illumination conditions. By using combined time and space resolved measurements, various explosive precursors hidden in opaque plastic containers were identified non-invasively. Our results confirm that combined time and space resolved Raman spectroscopy leads to higher selectivity towards the sub-layer over the surface layer as well as enhanced rejection of fluorescence from the container surface when compared to standoff spatially offset Raman spectroscopy. Raman spectra that have minimal interference from the packaging material and good signal-to-noise ratio were acquired within 5 s of measurement time. A new combined time and space resolved Raman spectrometer has been designed with nanosecond laser excitation and gated detection, making it of lower cost and complexity than picosecond-based laboratory systems.

  19. Resource partitioning among flower visitors and evolution of nectar concealment in multi-species communities.

    PubMed

    Rodríguez-Gironés, Miguel A; Santamaría, Luis

    2005-01-22

    The plant community within which flower evolution takes place has largely been ignored. We develop two models for the evolution of nectar concealment when flowers are visited by legitimate pollinators and flower parasites. When there is a single plant species, no level of nectar concealment is evolutionarily stable: any population can be invaded by mutants exhibiting a higher level of nectar concealment. However, the presence of a second flower species with exposed nectar and not subject to evolution breaks the runaway process. In the presence of open flowers, depending on the fitness function there may be an evolutionarily stable level of nectar concealment, or more complex evolutionary dynamics, with nectar concealment fluctuating within a bounded range. Concealment of nectar from flower parasites can evolve even if it implies decreasing the accessibility of nectar to legitimate pollinators.

  20. [Effects of false memories on the Concealed Information Test].

    PubMed

    Zaitsu, Wataru

    2012-10-01

    The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories. PMID:23214081

  1. Concealed Left Ventricle to Right Atrium Fistula Complicating Infective Endocarditis.

    PubMed

    Onzuka, Tatsushi; Morishige, Shoji; Yamashita, Yoshiyuki; Ueno, Yasutaka

    2016-09-01

    We report a case of aortic prosthetic valve endocarditis presenting with subaortic stenosis without perivalvular leakage and vegetations in the left ventricular outflow and right atrium, the latter being attached to the atrioventricular septum. Intraoperatively, an abscess that had formed on the aortic annulus and perforated to the right atrium was unexpectedly found, the fistula being occluded by vegetations. Even when no left-to-right shunts are detected by imaging, vegetations adjacent to the atrioventricular septum may conceal a left ventricle-right atrium fistula, resulting in prosthetic valve endocarditis presenting clinically as subaortic stenosis without perivalvular leakage. PMID:27549556

  2. Attachment style, self-concealment, and interpersonal distance among Japanese undergraduates.

    PubMed

    Yukawa, Shintaro; Tokuda, Hideji; Sato, Jun

    2007-06-01

    The relationships among attachment style, self-concealment, and interpersonal distance were studied with 71 Japanese undergraduates (33 men and 38 women, ages 18 to 20 years, M = 18.7, SD= .6). Participants completed a questionnaire about Self-concealment and Attachment Styles (Secure, Anxious, and Avoidant). One week later, Interpersonal Distance, which individuals maintain between themselves and others, was measured by the stop-distance paradigm. Analysis showed that scores for more Anxious and Avoidant Attachment Styles were positively correlated with those for greater Self-concealment. Scores for greater Self-concealment and more Anxious Attachment Style were also correlated with longer Interpersonal Distance.

  3. 3D laser imaging for concealed object identification

    NASA Astrophysics Data System (ADS)

    Berechet, Ion; Berginc, Gérard; Berechet, Stefan

    2014-09-01

    This paper deals with new optical non-conventional 3D laser imaging. Optical non-conventional imaging explores the advantages of laser imaging to form a three-dimensional image of the scene. 3D laser imaging can be used for threedimensional medical imaging, topography, surveillance, robotic vision because of ability to detect and recognize objects. In this paper, we present a 3D laser imaging for concealed object identification. The objective of this new 3D laser imaging is to provide the user a complete 3D reconstruction of the concealed object from available 2D data limited in number and with low representativeness. The 2D laser data used in this paper come from simulations that are based on the calculation of the laser interactions with the different interfaces of the scene of interest and from experimental results. We show the global 3D reconstruction procedures capable to separate objects from foliage and reconstruct a threedimensional image of the considered object. In this paper, we present examples of reconstruction and completion of three-dimensional images and we analyse the different parameters of the identification process such as resolution, the scenario of camouflage, noise impact and lacunarity degree.

  4. Target Speaker Detection with Concealed EEG Around the Ear.

    PubMed

    Mirkovic, Bojana; Bleichner, Martin G; De Vos, Maarten; Debener, Stefan

    2016-01-01

    Target speaker identification is essential for speech enhancement algorithms in assistive devices aimed toward helping the hearing impaired. Several recent studies have reported that target speaker identification is possible through electroencephalography (EEG) recordings. If the EEG system could be reduced to acceptable size while retaining the signal quality, hearing aids could benefit from the integration with concealed EEG. To compare the performance of a multichannel around-the-ear EEG system with high-density cap EEG recordings an envelope tracking algorithm was applied in a competitive speaker paradigm. The data from 20 normal hearing listeners were concurrently collected from the traditional state-of-the-art laboratory wired EEG system and a wireless mobile EEG system with two bilaterally-placed around-the-ear electrode arrays (cEEGrids). The results show that the cEEGrid ear-EEG technology captured neural signals that allowed the identification of the attended speaker above chance-level, with 69.3% accuracy, while cap-EEG signals resulted in the accuracy of 84.8%. Further analyses investigated the influence of ear-EEG signal quality and revealed that the envelope tracking procedure was unaffected by variability in channel impedances. We conclude that the quality of concealed ear-EEG recordings as acquired with the cEEGrid array has potential to be used in the brain-computer interface steering of hearing aids. PMID:27512364

  5. Target Speaker Detection with Concealed EEG Around the Ear

    PubMed Central

    Mirkovic, Bojana; Bleichner, Martin G.; De Vos, Maarten; Debener, Stefan

    2016-01-01

    Target speaker identification is essential for speech enhancement algorithms in assistive devices aimed toward helping the hearing impaired. Several recent studies have reported that target speaker identification is possible through electroencephalography (EEG) recordings. If the EEG system could be reduced to acceptable size while retaining the signal quality, hearing aids could benefit from the integration with concealed EEG. To compare the performance of a multichannel around-the-ear EEG system with high-density cap EEG recordings an envelope tracking algorithm was applied in a competitive speaker paradigm. The data from 20 normal hearing listeners were concurrently collected from the traditional state-of-the-art laboratory wired EEG system and a wireless mobile EEG system with two bilaterally-placed around-the-ear electrode arrays (cEEGrids). The results show that the cEEGrid ear-EEG technology captured neural signals that allowed the identification of the attended speaker above chance-level, with 69.3% accuracy, while cap-EEG signals resulted in the accuracy of 84.8%. Further analyses investigated the influence of ear-EEG signal quality and revealed that the envelope tracking procedure was unaffected by variability in channel impedances. We conclude that the quality of concealed ear-EEG recordings as acquired with the cEEGrid array has potential to be used in the brain-computer interface steering of hearing aids. PMID:27512364

  6. Active millimeter wave detection of concealed layers of dielectric material

    NASA Astrophysics Data System (ADS)

    Bowring, N. J.; Baker, J. G.; Rezgui, N. D.; Southgate, M.; Alder, J. F.

    2007-04-01

    Extensive work has been published on millimetre wave active and passive detection and imaging of metallic objects concealed under clothing. We propose and demonstrate a technique for revealing the depth as well as the outline of partially transparent objects, which is especially suited to imaging layer materials such as explosives and drugs. The technique uses a focussed and scanned FMCW source, swept through many GHz to reveal this structure. The principle involved is that a parallel sided dielectric slab produces reflections at both its upper and lower surfaces, acting as a Fabry-Perot interferometer. This produces a pattern of alternating reflected peaks and troughs in frequency space. Fourier or Burg transforming this pattern into z-space generates a peak at the thickness of the irradiated sample. It could be argued that though such a technique may work for single uniform slabs of dielectric material, it will give results of little or no significance when the sample both scatters the incident radiation and gives erratic reflectivities due to its non-uniform thickness and permittivity . We show results for a variety of materials such as explosive simulants, powder and drugs, both alone and concealed under clothing or in a rucksack, which display strongly directional reflectivities at millimeter wavelengths, and whose location is well displayed by a varying thickness parameter as the millimetre beam is scanned across the target. With this system we find that samples can easily be detected at standoff distances of at least 4.6m.

  7. Terahertz imaging system performance model for concealed-weapon identification.

    PubMed

    Murrill, Steven R; Jacobs, Eddie L; Moyer, Steven K; Halford, Carl E; Griffin, Steven T; De Lucia, Frank C; Petkie, Douglas T; Franck, Charmaine C

    2008-03-20

    The U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) and the U.S. Army Research Laboratory have developed a terahertz (THz) -band imaging system performance model for detection and identification of concealed weaponry. The MATLAB-based model accounts for the effects of all critical sensor and display components and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination. The model is based on recent U.S. Army NVESD sensor performance modeling technology that couples system design parameters to observer-sensor field performance by using the acquire methodology for weapon identification performance predictions. This THz model has been developed in support of the Defense Advanced Research Project Agencies' Terahertz Imaging Focal-Plane Technology (TIFT) program and is currently being used to guide the design and development of a 0.650 THz active-passive imaging system. This paper will describe the THz model in detail, provide and discuss initial modeling results for a prototype THz imaging system, and outline plans to calibrate and validate the model through human perception testing. PMID:18709076

  8. Concealed Threat Detection at Multiple Frames-per-second

    SciTech Connect

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  9. Passive millimeter-wave imaging for concealed article detection

    NASA Astrophysics Data System (ADS)

    Lovberg, John A.; Galliano, Joseph A., Jr.; Clark, Stuart E.

    1997-02-01

    Passive-millimeter-wave imaging (PMI) provides a powerful sensing tool for law enforcement, allowing an unobtrusive means for detecting concealed weapons, explosives, or contraband on persons or in baggage. Natural thermal emissions at millimeter wavelengths from bodies, guns, explosives, and other articles pass easily through clothing or other concealment materials, where they can be detected and converted into conventional 2-dimensional images. A new implementation of PMI has demonstrated a large-area, near- real-time staring capability for personnel inspection at standoff ranges of greater than 10 meters. In this form, PMI does not require operator cuing based on subjective 'profiles' of suspicious appearance or behaviors, which may otherwise be construed as violations of civil rights. To the contrary, PMI detects and images heat generated by any object with no predisposition as to its nature or function (e.g. race or gender of humans). As a totally passive imaging tool, it generates no radio-frequency or other radiation which might raise public health concerns. Specifics of the new PMI architecture are presented along with a host of imaging data representing the current state- of-the-art.

  10. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  11. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  12. Error robustness evaluation of H.264/MPEG-4 AVC

    NASA Astrophysics Data System (ADS)

    Halbach, Till; Olsen, Steffen

    2004-01-01

    The robustness of the recently ratified video compression standard H.264/MPEG-4 AVC against channel errors is evaluated with the focus on rate distortion matters. After a brief introduction of the standard and an explanation of its error-resistant features, it is investigated how the error resilience tools of H.264 can be deployed best for packet-wise transmission as in ATM, H.323, and IP-based services. Further, the performances of two error concealment strategies for use in an H.264-conform decoder are compared to each other.

  13. Women with onset of epilepsy prior to marriage: disclose or conceal?

    PubMed

    Santosh, Deetha; Kumar, T Santosh; Sarma, P Sankara; Radhakrishnan, Kurupath

    2007-05-01

    We inquired reasons for concealment/disclosure of the history of epilepsy during marriage negotiations and marriage outcomes of 82 consecutive women attending a tertiary referral center based epilepsy clinic in Kerala, southern India. At the time of marriage, 55% concealed and 45% disclosed the history of epilepsy. Majority of those who concealed admitted that they did so fearing breakup of marriage negotiations, and majority of those who disclosed did so to forestall the consequences after marriage of concealing. Compared to those who disclosed, the prevalence of divorce, separation and disturbed marriages were significantly higher among those who concealed. Honest prospective communication during marriage negotiations about epilepsy is important for preserving subsequent married life.

  14. Physician Beliefs about Physical and Mental Competency of Patients Applying for Concealed Weapon Permits.

    PubMed

    Goldstein, Adam O; Viera, Anthony J; Pierson, John; Barnhouse, Kathy K; Tulsky, James A; Richman, Barak D

    2015-06-01

    Law enforcement officials have asked health care providers to evaluate patient applications for concealed weapon permits. The current study was designed to examine physician beliefs regarding competency to carry a concealed weapon for patients with specific physical and mental conditions. Among 222 North Carolina physicians who participated in this survey (40% response rate), large variation and uncertainty existed for determining competency. Physicians most frequently chose mild dementia, post-traumatic stress disorder, and recent depression as conditions that would render a patient not competent to carry a concealed weapon. Male physicians and those owning a gun were more likely to deem a patient competent. Almost a third of physicians were unsure about competence for most conditions. Physicians asked to assess competency of patients to carry a concealed weapon have quite disparate views on competency and little confidence in their decisions. If physicians are expected to assess patient competence to carry a concealed weapon, more objective criteria and training are needed.

  15. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    PubMed

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity.

  16. Pathways Between Concealable Stigmatized Identities and Substance Misuse

    PubMed Central

    Talley, Amelia E.; Littlefield, Andrew K.

    2015-01-01

    Individuals with concealable stigmatized identities often possess no obviously devalued attributes, yet are at greater risk for problematic substance use compared to their privileged counterparts. We present a conceptual model, which proposes that identity-relevant content and characteristics have important implications for cognitive, affective, and behavioral consequences of stigma-related stress. In doing so, we synthesize stigma-related models from the extant literature and attempt to integrate these concepts with previous work detailing potential contributors to substance use behaviors specifically. Finally, we ask readers to consider the various ways in which the content and characteristics of an individual’s stigmatized identity might combine with situational and additional individual difference factors to influence the likelihood of substance misuse. PMID:26379766

  17. Geophysical investigations of concealed faults near Yucca Mountain, Southwest Nevada

    USGS Publications Warehouse

    Ponce, D.A.

    1993-01-01

    Detailed gravity and ground magnetic data collected along surveyed traverses across Midway Valley, on the eastern flank of Yucca Mountain, Nevada reveal that these methods can be used to delineate concealed faults. These studies are part of an effort to evaluate faulting in the vicinity of the proposed surface facilities for a potential nuclear waste repository at Yucca Mountain. The largest gravity and magnetic anomaly in the vicinity of Midway Valley is associated with the Paintbrush fault on the west flank of Alice Ridge. Geophysical data infer a vertical offset of about 200 m (650 ft). Another prominent gravity and magnetic anomaly is associated with the Bow Ridge fault in the western part of Midway Valley.

  18. Incidental radiographic finding of the concealed art of susuk.

    PubMed

    Devang Divakar, Darshan; Mavinapalla, Seema; Al Kheraif, Abdulaziz Abdullah; Ramakrishnaiah, Ravikumar; Abd Rahim, Muhammad Furqon Bin; Khan, Aftab Ahmed

    2016-07-01

    Susuk, or charm needles, are small, metallic needles inserted under the skin, considered to enhance beauty, health and luck. This hidden secret of inserting susuk is a traditional superstitious ritual, widely practiced among women of Southeast Asia. Here, we present an interesting case of incidental radiographic finding of the concealed art of susuk, which was exposed on a panoramic radiograph taken on a routine basis as a part of diagnostic work up at our centre. An orthopantomogram revealed bilateral metallic foreign bodies in the maxillo-facial region. Anamnestic data affirmed the practice of the body art of susuk. The charm needles were present in the orofacial region without the patient experiencing any pathological signs or symptoms.

  19. Worker's refusal to conceal HIV tattoo amounts to misconduct.

    PubMed

    1997-07-25

    [Name removed] was fired in 1994 from his job as a nurse's aide at the Seattle, WA Harborview Medical Center after refusing to cover a tattoo on his left inside forearm that reads HIV POSITIVE. The 9th U.S. Circuit Court of Appeals rejected [name removed]'s arguments that he was terminated because of his HIV status and not the tattoo. He contended that the hospital violated the Americans with Disabilities Act (ADA), the Rehabilitation Act, and his First Amendment right to free speech. The judge agreed with the hospital that [name removed]'s refusal to conceal the tattoo amounted to insubordination. The appeals panel affirmed the granting of summary judgment on [name removed]'s ADA and Rehabilitation Act claims. [Name removed] said he had himself tattooed to help dispel the stigma attached to his infection. The hospital said the tattoo alarmed some patients. PMID:11364513

  20. Temperature effects on polygraph detection of concealed information.

    PubMed

    MacNeill, A Luke; Bradley, M T

    2016-02-01

    Thermoregulatory influences on electrodermal and cardiovascular activity may interfere with the detection of concealed information using a polygraph. This possibility was assessed by means of a mock terrorism scenario. Seventy-two participants were assigned to either a guilty or an innocent role. They were given a polygraph test at one of three ambient temperatures: 10°C, 22°C, or 34°C. Among guilty participants, electrodermal and cardiovascular measures were least effective at 10°C. Electrodermal results were optimal at 22°C, whereas cardiovascular results were optimal at 34°C. Among innocent participants, the effectiveness of these same measures was not affected by ambient temperature. Temperature had no significant impact on respiration results within the guilty or the innocent groups. Taken together, these findings have implications for those who use polygraphs in uncontrolled testing environments. PMID:26435532

  1. Temperature effects on polygraph detection of concealed information.

    PubMed

    MacNeill, A Luke; Bradley, M T

    2016-02-01

    Thermoregulatory influences on electrodermal and cardiovascular activity may interfere with the detection of concealed information using a polygraph. This possibility was assessed by means of a mock terrorism scenario. Seventy-two participants were assigned to either a guilty or an innocent role. They were given a polygraph test at one of three ambient temperatures: 10°C, 22°C, or 34°C. Among guilty participants, electrodermal and cardiovascular measures were least effective at 10°C. Electrodermal results were optimal at 22°C, whereas cardiovascular results were optimal at 34°C. Among innocent participants, the effectiveness of these same measures was not affected by ambient temperature. Temperature had no significant impact on respiration results within the guilty or the innocent groups. Taken together, these findings have implications for those who use polygraphs in uncontrolled testing environments.

  2. Incidental radiographic finding of the concealed art of susuk.

    PubMed

    Devang Divakar, Darshan; Mavinapalla, Seema; Al Kheraif, Abdulaziz Abdullah; Ramakrishnaiah, Ravikumar; Abd Rahim, Muhammad Furqon Bin; Khan, Aftab Ahmed

    2016-07-01

    Susuk, or charm needles, are small, metallic needles inserted under the skin, considered to enhance beauty, health and luck. This hidden secret of inserting susuk is a traditional superstitious ritual, widely practiced among women of Southeast Asia. Here, we present an interesting case of incidental radiographic finding of the concealed art of susuk, which was exposed on a panoramic radiograph taken on a routine basis as a part of diagnostic work up at our centre. An orthopantomogram revealed bilateral metallic foreign bodies in the maxillo-facial region. Anamnestic data affirmed the practice of the body art of susuk. The charm needles were present in the orofacial region without the patient experiencing any pathological signs or symptoms. PMID:26271077

  3. Selection of food patches by sympatric herbivores in response to concealment and distance from a refuge.

    PubMed

    Crowell, Miranda M; Shipley, Lisa A; Camp, Meghan J; Rachlow, Janet L; Forbey, Jennifer S; Johnson, Timothy R

    2016-05-01

    Small herbivores face risks of predation while foraging and are often forced to trade off food quality for safety. Life history, behaviour, and habitat of predator and prey can influence these trade-offs. We compared how two sympatric rabbits (pygmy rabbit, Brachylagus idahoensis; mountain cottontail, Sylvilagus nuttallii) that differ in size, use of burrows, and habitat specialization in the sagebrush-steppe of western North America respond to amount and orientation of concealment cover and proximity to burrow refuges when selecting food patches. We predicted that both rabbit species would prefer food patches that offered greater concealment and food patches that were closer to burrow refuges. However, because pygmy rabbits are small, obligate burrowers that are restricted to sagebrush habitats, we predicted that they would show stronger preferences for greater cover, orientation of concealment, and patches closer to burrow refuges. We offered two food patches to individuals of each species during three experiments that either varied in the amount of concealment cover, orientation of concealment cover, or distance from a burrow refuge. Both species preferred food patches that offered greater concealment, but pygmy rabbits generally preferred terrestrial and mountain cottontails preferred aerial concealment. Only pygmy rabbits preferred food patches closer to their burrow refuge. Different responses to concealment and proximity to burrow refuges by the two species likely reflect differences in perceived predation risks. Because terrestrial predators are able to dig for prey in burrows, animals like pygmy rabbits that rely on burrow refuges might select food patches based more on terrestrial concealment. In contrast, larger habitat generalists that do not rely on burrow refuges, like mountain cottontails, might trade off terrestrial concealment for visibility to detect approaching terrestrial predators. This study suggests that body size and evolutionary adaptations

  4. Microwave-Spectral Signatures Would Reveal Concealed Objects

    NASA Technical Reports Server (NTRS)

    Arndt, G.; Ngo, P.; Carl, J. R.; Byerly, K.; Stolarcyzk, L.

    2004-01-01

    A proposed technique for locating concealed objects (especially small antipersonnel land mines) involves the acquisition and processing of spectral signatures over broad microwave frequency bands. This technique was conceived to overcome the weaknesses of older narrow- band electromagnetic techniques like ground-probing radar and low-frequency electromagnetic induction. Ground-probing radar is susceptible to false detections and/or interference caused by rocks, roots, air pockets, soil inhomogeneities, ice, liquid water, and miscellaneous buried objects other than those sought. Moreover, if the radar frequency happens to be one for which the permittivity of a sought object matches the permittivity of the surrounding soil or there is an unfavorable complex-amplitude addition of the radar reflection at the receiver, then the object is not detected. Low-frequency electromagnetic induction works well for detecting metallic objects, but the amounts of metal in plastic mines are often too small to be detectable. The potential advantage of the proposed technique arises from the fact that wideband spectral signatures generally contain more relevant information than do narrow-band signals. Consequently, spectral signatures could be used to make better decisions regarding whether concealed objects are present and whether they are the ones sought. In some cases, spectral signatures could provide information on the depths, sizes, shapes, and compositions of objects. An apparatus to implement the proposed technique (see Figure 1) could be assembled from equipment already in common use. Typically, such an apparatus would include a radio-frequency (RF) transmitter/receiver, a broad-band microwave antenna, and a fast personal computer loaded with appropriate software. In operation, the counter would be turned on, the antenna would be aimed at the ground or other mass suspected to contain a mine or other sought object, and the operating frequency would be swept over the band of

  5. Refractive Errors

    MedlinePlus

    ... and lens of your eye helps you focus. Refractive errors are vision problems that happen when the shape ... cornea, or aging of the lens. Four common refractive errors are Myopia, or nearsightedness - clear vision close up ...

  6. Theoretical analysis on the measurement errors of local 2D DIC: Part I temporal and spatial uncertainty quantification of displacement measurements

    SciTech Connect

    Wang, Yueqi; Lava, Pascal; Reu, Phillip; Debruyne, Dimitri; Van Houtte, Paul

    2015-12-23

    This study presents a theoretical uncertainty quantification of displacement measurements by subset-based 2D-digital image correlation. A generalized solution to estimate the random error of displacement measurement is presented. The obtained solution suggests that the random error of displacement measurements is determined by the image noise, the summation of the intensity gradient in a subset, the subpixel part of displacement, and the interpolation scheme. The proposed method is validated with virtual digital image correlation tests.

  7. Hypoxia in the St. Lawrence Estuary: How a Coding Error Led to the Belief that “Physics Controls Spatial Patterns”

    PubMed Central

    2015-01-01

    Two fundamental sign errors were found in a computer code used for studying the oxygen minimum zone (OMZ) and hypoxia in the Estuary and Gulf of St. Lawrence. These errors invalidate the conclusions drawn from the model, and call into question a proposed mechanism for generating OMZ that challenges classical understanding. The study in question is being cited frequently, leading the discipline in the wrong direction. PMID:26397371

  8. Eliminating bias in randomized controlled trials: importance of allocation concealment and masking.

    PubMed

    Viera, Anthony J; Bangdiwala, Shrikant I

    2007-02-01

    Randomization in randomized controlled trials involves more than generation of a random sequence by which to assign subjects. For randomization to be successfully implemented, the randomization sequence must be adequately protected (concealed) so that investigators, involved health care providers, and subjects are not aware of the upcoming assignment. The absence of adequate allocation concealment can lead to selection bias, one of the very problems that randomization was supposed to eliminate. Authors of reports of randomized trials should provide enough details on how allocation concealment was achieved so the reader can determine the likelihood of success. Fortunately, a plan of allocation concealment can always be incorporated into the design of a randomized trial. Certain methods minimize the risk of concealment failing more than others. Keeping knowledge of subjects' assignment after allocation from subjects, investigators/health care providers, or those assessing outcomes is referred to as masking (also known as blinding). The goal of masking is to prevent ascertainment bias. In contrast to allocation concealment, masking cannot always be incorporated into a randomized controlled trial. Both allocation concealment and masking add to the elimination of bias in randomized controlled trials.

  9. A Concealed Barcode Identification System Using Terahertz Time-domain Spectroscopy

    NASA Astrophysics Data System (ADS)

    Guan, Yu; Yamamoto, Manabu; Kitazawa, Toshiyuki; Tripathi, Saroj R.; Takeya, Kei; Kawase, Kodo

    2015-03-01

    We present a concealed terahertz barcode/chipless tag to achieve remote identification through an obstructing material using terahertz radiation. We show scanned terahertz reflection spectral images of barcodes concealed by a thick obstacle. A concealed and double- side printed terahertz barcode structure is proposed, and we demonstrate that our design has better performance in definition than a single-side printed barcode using terahertz time-domain spectroscopy. This technique combines the benefits of a chipless tag to read encoded information covered by an optically opaque material with low cost and a simple fabrication process. Simulations are also described, along with an explanation of the principle of the terahertz barcode identification system.

  10. Tests of a dynamic systems account of the A-not-B error: the influence of prior experience on the spatial memory abilities of two-year-olds.

    PubMed

    Spencer, J P; Smith, L B; Thelen, E

    2001-01-01

    Recently, Smith, Thelen, and colleagues proposed a dynamic systems account of the Piagetian "A-not-B" error in which infants' errors result from general processes that make goal-directed actions to remembered locations. Based on this account, the A-not-B error should be a general phenomenon, observable in different tasks and at different points in development. Smith, Thelen, et al.'s proposal was tested using an A-not-B version of a sandbox task. During three training trials and three "A" trials, 2-year-olds watched as a toy was buried in a sandbox at Location A. Following a 10-s delay, children searched for the object. Across five experiments, children's (total N = 92) performance on the A trials was accurate. After the A trials, children watched as a toy was hidden at Location B, 8 to 10 inches from Location A. In all experiments, children's searches after a 10-s delay were significantly biased in the direction of Location A. Furthermore, this bias toward Location A decreased with repeated trials to Location B, as well as when children completed fewer trials to Location A. Together, these data suggest that A-not-B-type errors are pervasive across tasks and development.

  11. CW THz scanning transmission imaging for concealed object detection

    NASA Astrophysics Data System (ADS)

    Li, Qi; Yao, Rui; Yin, Qiguo; Ding, Shenghui; Wang, Qi

    2009-07-01

    In the paper, the two-dimensional THz imaging methods are described. The SIFIR-50 FPL Far-Infrared Laser is used as the THz source. The output frequency is 2.5THz in the experiment, because the THz laser operates steadily at this frequency. The P4-42 detector works at room temperature and offers relatively high sensitivity. The software of THz imaging system is self-designed, and it plays a crucial role in this imaging system because it controls nearly all the operations of this system, including the two-dimensional scanning, image data collection, image data storage, image display and image processing. Utilizing this setup, THz transmission images of concealed objects are obtained. In the experiment, a bottle cap and a plastic board covered by reflective materials are chosen as the imaging objects; paper and Teflon are placed before the object to test the transmission imaging effect. The experimental results show that this imaging system can generate clear images.

  12. Concealed Utility Route Planning: Guidelines for Indian Residential Buildings

    NASA Astrophysics Data System (ADS)

    Gupta, Sumana

    2015-09-01

    Utility lines, particularly in Indian residential buildings, are networked in a haphazard manner to economize and expedite the process of laying conduits. They remain concealed behind the wall finish exposing problems later. The conventional method adopted while laying the routes does not economize the process rather it damages the newly constructed building. After an investigation of the practiced methods through reconnaissance, a construction vocabulary in form of guidelines is recommended for brick residential construction. Taking advantage of the versatility of a brick and considering it as an indigenous construction material of the Indian plains, a judicious way of brick laying can create horizontal and vertical chase at specified heights to receive the utility conduits. The method will simplify, expedite, and organize the utility routes and provide a seamless connection of major utility lines in a residential building. It will aid in future augmentation, easy maintenance, cost reduction and time involved in construction. Practical training of masons and awareness of relevant contractors at site is required through trained site supervisors. The proposed method merits further investigation for inclusion in academic curriculums of the trade.

  13. GILBERT'S SYNDROME - A CONCEALED ADVERSITY FOR PHYSICIANS AND SURGEONS.

    PubMed

    Rasool, Ahsan; Sabir, Sabir; Ashlaq, Muhammad; Farooq, Umer; Khan, Muhammad Zatmar; Khan, Faisal Yousaf

    2015-01-01

    Gilbert's syndrome (often abbreviated as GS) is most common hereditary cause of mild unconjugated (indirect) hyperbilirubinemia. Various studies have been published depicting clinical and pharmacological effects of Gilbert's syndrome (GS). However GS as a sign of precaution for physician and surgeons has not been clearly established. A systematic study of the available literature was done. Key words of Gilbert's syndrome, hyperbilirubinemia and clinical and pharmacological aspects of GS were searched using PubMed as search engine. Considering the study done in last 40 years, 375 articles were obtained and their abstracts were studied. The criterion for selecting the articles for through study was based on their close relevance with the topic. Thus 40 articles and 2 case reports were thoroughly studied. It was concluded that Gilbert's syndrome has immense clinical importance because the mild hyperbilirubinemia can be mistaken for a sign of occult, chronic, or progressive liver disease. GS is associated with lack of detoxification of few drugs. It is related with spherocytosis, cholithiasis, haemolytic anaemia, intra-operative toxicity, irinotecan toxicity, schizophrenia and problems in morphine metabolism. It also has profound phenotypic effect as well. The bilirubin level of a GS individual can rise abnormally high in various conditions in a person having Gilbert's syndrome. This can mislead the physicians and surgeons towards false diagnosis. Therefore proper diagnosis of GS should be ascertained in order to avoid the concealed adversities of this syndrome. PMID:26721045

  14. Severe forms of concealed penis without hypospadias: Surgical strategies

    PubMed Central

    de Jesus, Lisieux Eyer; Dekermacher, Samuel; Anderson, Kleber M.

    2015-01-01

    Introduction: Concealed penis (CP) may vary in severity and includes megaprepuce (MP) as a variant. Many different surgical strategies have been described in order to maximize penile exposure and to deal with skin deficiency. We describe the strategies that we use to overcome technical problems in severe cases of CP. Materials and Methods: Six consecutive cases of severe CP (including 3 with MP) were treated in a 2-year period between January 2011 and April 2013. These patients were treated using extensive degloving, removal of dysplastic dartos, Alexander's preputial flap, scrotal flaps and skin grafts. Three patients had been previously circumcised. Cases associated with hypospadias, obesity, disorders of sexual differentiation and micropenises were excluded. Results: All six patients attained good results, with good exposure of the penis, ability to void standing with a well-directed flow and reasonable esthetic results. A technical algorithm for the treatment of primary or recurring cases of CP is proposed. Conclusion: Alexander’ s distally based ventral preputial flap is a useful technical resource to treat MP cases. Free skin grafts and/or laterally based scrotal flaps may be used to cover the penis after release in severe cases of CP. PMID:26604447

  15. Errors on interrupter tasks presented during spatial and verbal working memory performance are linearly linked to large-scale functional network connectivity in high temporal resolution resting state fMRI.

    PubMed

    Magnuson, Matthew Evan; Thompson, Garth John; Schwarb, Hillary; Pan, Wen-Ju; McKinley, Andy; Schumacher, Eric H; Keilholz, Shella Dawn

    2015-12-01

    The brain is organized into networks composed of spatially separated anatomical regions exhibiting coherent functional activity over time. Two of these networks (the default mode network, DMN, and the task positive network, TPN) have been implicated in the performance of a number of cognitive tasks. To directly examine the stable relationship between network connectivity and behavioral performance, high temporal resolution functional magnetic resonance imaging (fMRI) data were collected during the resting state, and behavioral data were collected from 15 subjects on different days, exploring verbal working memory, spatial working memory, and fluid intelligence. Sustained attention performance was also evaluated in a task interleaved between resting state scans. Functional connectivity within and between the DMN and TPN was related to performance on these tasks. Decreased TPN resting state connectivity was found to significantly correlate with fewer errors on an interrupter task presented during a spatial working memory paradigm and decreased DMN/TPN anti-correlation was significantly correlated with fewer errors on an interrupter task presented during a verbal working memory paradigm. A trend for increased DMN resting state connectivity to correlate to measures of fluid intelligence was also observed. These results provide additional evidence of the relationship between resting state networks and behavioral performance, and show that such results can be observed with high temporal resolution fMRI. Because cognitive scores and functional connectivity were collected on nonconsecutive days, these results highlight the stability of functional connectivity/cognitive performance coupling. PMID:25563228

  16. Real-time outdoor concealed-object detection with passive millimeter wave imaging.

    PubMed

    Yeom, Seokwon; Lee, Dong-Su; Son, Jung-Young; Jung, Min-Kyoo; Jang, YuShin; Jung, Sang-Won; Lee, Seok-Jae

    2011-01-31

    Millimeter wave imaging is finding rapid adoption in security applications such as the detection of objects concealed under clothing. A passive imaging system can be realized as a stand-off type sensor that can operate in open spaces, both indoors and outdoors. In this paper, we address real-time outdoor concealed-object detection and segmentation with a radiometric imaging system operating in the W-band. The imaging system is equipped with a dielectric lens and a receiver array operating at around 94 GHz. Images are analyzed by multilevel segmentation to identify a concealed object. Each level of segmentation comprises vector quantization, expectation-maximization, and Bayesian decision making to cluster pixels on the basis of a Gaussian mixture model. In addition, we describe a faster process that adopts only vector quantization for the first level segmentation. Experiments confirm that the proposed methods provide fast and reliable detection and segmentation for a moving human subject carrying a concealed gun.

  17. Error Analysis

    NASA Astrophysics Data System (ADS)

    Scherer, Philipp O. J.

    Input data as well as the results of elementary operations have to be represented by machine numbers, the subset of real numbers which is used by the arithmetic unit of today's computers. Generally this generates rounding errors. This kind of numerical error can be avoided in principle by using arbitrary precision arithmetics or symbolic algebra programs. But this is unpractical in many cases due to the increase in computing time and memory requirements. Results from more complex operations like square roots or trigonometric functions can have even larger errors since series expansions have to be truncated and iterations accumulate the errors of the individual steps. In addition, the precision of input data from an experiment is limited. In this chapter we study the influence of numerical errors on the uncertainties of the calculated results and the stability of simple algorithms.

  18. Concealed pregnancy and newborn abandonment: a contemporary 21st century issue. Part 1.

    PubMed

    Tighe, Sylvia Murphy; Lalor, Joan

    2016-06-01

    This two-part series explores the phenomenon of concealed pregnancy and the association with newborn abandonment, with reference to recent cases of public interest. In Part 1 we focus on defining concealed pregnancy as a complex process which involves hiding a pregnancy, that can lead to tragic consequences such as maternal or neonatal morbidity or mortality (Murphy Tighe and Lalor 2016; Chen et al 2007).The psychosocial issues involved will also be presented (Murphy Tighe and Lalor 2016).

  19. Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.

    PubMed

    Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon

    2016-01-01

    Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.

  20. Impulse radar imaging system for concealed object detection

    NASA Astrophysics Data System (ADS)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal

  1. Digital spatial data for observed, predicted, and misclassification errors for observations in the training dataset for nitrate and arsenic concentrations in basin-fill aquifers in the Southwest Principal Aquifers study area

    USGS Publications Warehouse

    McKinney, Tim S.; Anning, David W.

    2012-01-01

    This product "Digital spatial data for observed, predicted, and misclassification errors for observations in the training dataset for nitrate and arsenic concentrations in basin-fill aquifers in the Southwest Principal Aquifers study area" is a 1:250,000-scale point spatial dataset developed as part of a regional Southwest Principal Aquifers (SWPA) study (Anning and others, 2012). The study examined the vulnerability of basin-fill aquifers in the southwestern United States to nitrate contamination and arsenic enrichment. Statistical models were developed by using the random forest classifier algorithm to predict concentrations of nitrate and arsenic across a model grid that represents local- and basin-scale measures of source, aquifer susceptibility, and geochemical conditions.

  2. [Abortion in unsafe conditions. Concealment, illegality, corruption and negligence].

    PubMed

    Ortiz Ortega, A

    1993-01-01

    "Abortion practiced under conditions of risk" is a phrase used to refer to illegal abortion. The phrase does not highlight the disappearance of risk when legislation changes. Rather, it calls attention to the fact that legal restrictions significantly increase dangers while failing to discourage women determined to terminate pregnancies. The International Planned Parenthood Federation defines abortion under conditions of risk as the use of nonoptimal technology, lack of counseling and services to orient the woman's decision and provide postabortion counseling, and the limitation of freedom to make the decision. The phrase encompasses concealment, illegality, corruption, and negligence. It is designed to impose a reproductive health perspective in response to an unresolved social conflict. Steps have been developed to improve the situation of women undergoing abortion even without a change in its legal status. Such steps include training and purchase of equipment for treatment of incomplete abortions and development of counseling and family planning services. The central difficulty of abortion induced in conditions of risk derives from the laws imposing the need for secrecy. In Mexico, the abortion decision belongs to the government and the society, while individual absorb the consequences of the practice of abortion. Public decision making about abortion is dominated by the concept that the female has an obligation to carry any pregnancy to term. Women who interfere with male descendency and practice a sexuality distinct from reproduction are made to pay a price in health and emotional balance. Resolution of the problem of abortion will require new concepts in terms of legal status, public health issues, and the rights of women. The problem becomes more pressing as abortion becomes more common in a country anxious to advance in the demographic transition. Only a commitment to the reproductive health of women and the full development of their rights as citizens will

  3. Robust identification of concealed dangerous substances using THz imaging spectroscopy

    NASA Astrophysics Data System (ADS)

    Nystad, Helle E.; Haakestad, Magnus W.; van Rheenen, Arthur D.

    2015-05-01

    False alarm rates must be kept sufficiently low if a method to detect and identify objects or substances is to be implemented in real life applications. This is also true when trying to detect and identify dangerous substances such as explosives and drugs that are concealed in packaging materials. THz technology may be suited to detect these substances, especially when imaging and spectroscopy are combined. To achieve reasonable throughput, the detection and identification process must be automated and this implies reliance on algorithms to perform this task, rather than human beings. The identification part of the algorithm must compare spectral features of the unknown substance with those in a library of features and determining the distance, in some sense, between these features. If the distance is less than some defined threshold a match is declared. In this paper we consider two types of spectral characteristic that are derived from measured time-domain signals measured in the THz regime: the absorbance and its derivative. Also, we consider two schemes to measure the distance between the unknown and library characteristics: Spectral Angle Mapping (SAM) and Principal Component Analysis (PCA). Finally, the effect of windowing of the measured time-domain signal on the performance of the algorithms is studied, by varying the Blackman-Harris (B-H) window width. Algorithm performance is quantified by studying the receiver-operating characteristics (ROC). For the data considered in this study we conclude that the best performance is obtained when the derivative of the absorbance is used in combination with a narrow B-H window and SAM. SAM is a more straight-forward method and requires no large training data sets and tweaking.

  4. Medication Errors

    MedlinePlus

    ... to reduce the risk of medication errors to industry and others at FDA. Additionally, DMEPA prospectively reviews ... List of Abbreviations Regulations and Guidances Guidance for Industry: Safety Considerations for Product Design to Minimize Medication ...

  5. Medication Errors

    MedlinePlus

    Medicines cure infectious diseases, prevent problems from chronic diseases, and ease pain. But medicines can also cause harmful reactions if not used ... You can help prevent errors by Knowing your medicines. Keep a list of the names of your ...

  6. Quantifying error distributions in crowding.

    PubMed

    Hanus, Deborah; Vul, Edward

    2013-03-22

    When multiple objects are in close proximity, observers have difficulty identifying them individually. Two classes of theories aim to account for this crowding phenomenon: spatial pooling and spatial substitution. Variations of these accounts predict different patterns of errors in crowded displays. Here we aim to characterize the kinds of errors that people make during crowding by comparing a number of error models across three experiments in which we manipulate flanker spacing, display eccentricity, and precueing duration. We find that both spatial intrusions and individual letter confusions play a considerable role in errors. Moreover, we find no evidence that a naïve pooling model that predicts errors based on a nonadditive combination of target and flankers explains errors better than an independent intrusion model (indeed, in our data, an independent intrusion model is slightly, but significantly, better). Finally, we find that manipulating trial difficulty in any way (spacing, eccentricity, or precueing) produces homogenous changes in error distributions. Together, these results provide quantitative baselines for predictive models of crowding errors, suggest that pooling and spatial substitution models are difficult to tease apart, and imply that manipulations of crowding all influence a common mechanism that impacts subject performance.

  7. Using fMRI to decode true thoughts independent of intention to conceal.

    PubMed

    Yang, Zhi; Huang, Zirui; Gonzalez-Castillo, Javier; Dai, Rui; Northoff, Georg; Bandettini, Peter

    2014-10-01

    Multi-variate pattern analysis (MVPA) applied to BOLD-fMRI has proven successful at decoding complicated fMRI signal patterns associated with a variety of cognitive processes. One cognitive process, not yet investigated, is the mental representation of "Yes/No" thoughts that precede the actual overt response to a binary "Yes/No" question. In this study, we focus on examining: (1) whether spatial patterns of the hemodynamic response carry sufficient information to allow reliable decoding of "Yes/No" thoughts; and (2) whether decoding of "Yes/No" thoughts is independent of the intention to respond honestly or dishonestly. To achieve this goal, we conducted two separate experiments. Experiment 1, collected on a 3T scanner, examined the whole brain to identify regions that carry sufficient information to permit significantly above-chance prediction of "Yes/No" thoughts at the group level. In Experiment 2, collected on a 7T scanner, we focused on the regions identified in Experiment 1 to examine the capability of achieving high decoding accuracy at the single subject level. A set of regions--namely right superior temporal gyrus, left supra-marginal gyrus, and left middle frontal gyrus--exhibited high decoding power. Decoding accuracy for these regions increased with trial averaging. When 18 trials were averaged, the median accuracies were 82.5%, 77.5%, and 79.5%, respectively. When trials were separated according to deceptive intentions (set via experimental cues), and classifiers were trained on honest trials, but tested on trials where subjects were asked to deceive, the median accuracies of these regions still reached 66%, 75%, and 78.5%. These results provide evidence that concealed "Yes/No" thoughts are encoded in the BOLD signal, retaining some level of independence from the subject's intentions to answer honestly or dishonestly. These findings also suggest the theoretical possibility for more efficient brain-computer interfaces where subjects only need to think

  8. How many more guns?: Estimating the effect of allowing licensed concealed handguns on a college campus.

    PubMed

    Bouffard, Jeffrey A; Nobles, Matt R; Wells, William; Cavanaugh, Michael R

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased prevalence of concealed handguns would lead to increases in other negative consequences, such as accidental shootings. Little empirical research has examined the potential outcomes of such a policy change, nor has existing research examined the prerequisite issue of whether lifting these bans would result in substantial increases in the prevalence of concealed handguns among students. Using a sample of undergraduate classrooms selected from five academic buildings at a public university in Texas, this study examines the potential impact of lifting the concealed handgun ban on the likelihood that a given classroom would contain at least one legally carried handgun. Results reveal that the impact of potential policy changes in this area vary based on the building under consideration and the measure of potential handgun prevalence. Limitations of the study and implications for future research on the issue of concealed handgun carrying on college campuses are discussed.

  9. Real-time concealed-object detection and recognition with passive millimeter wave imaging.

    PubMed

    Yeom, Seokwon; Lee, Dong-Su; Jang, Yushin; Lee, Mun-Kyo; Jung, Sang-Won

    2012-04-23

    Millimeter wave (MMW) imaging is finding rapid adoption in security applications such as concealed object detection under clothing. A passive MMW imaging system can operate as a stand-off type sensor that scans people in both indoors and outdoors. However, the imaging system often suffers from the diffraction limit and the low signal level. Therefore, suitable intelligent image processing algorithms would be required for automatic detection and recognition of the concealed objects. This paper proposes real-time outdoor concealed-object detection and recognition with a radiometric imaging system. The concealed object region is extracted by the multi-level segmentation. A novel approach is proposed to measure similarity between two binary images. Principal component analysis (PCA) regularizes the shape in terms of translation and rotation. A geometric-based feature vector is composed of shape descriptors, which can achieve scale and orientation-invariant and distortion-tolerant property. Class is decided by minimum Euclidean distance between normalized feature vectors. Experiments confirm that the proposed methods provide fast and reliable recognition of the concealed object carried by a moving human subject.

  10. Antisociality, underarousal and the validity of the Concealed Information Polygraph Test.

    PubMed

    Verschuere, Bruno; Crombez, Geert; Koster, Ernst H W; De Clercq, Armand

    2007-03-01

    The Concealed Information Polygraph Test has been advocated as the preferred method for the physiological detection of deception. In this study, we further examined the validity of the Concealed Information Test in antisocial individuals. Physiological responding to concealed information was assessed in 48 male prisoners, and compared with responding in 31 male community volunteers. Based upon the association between antisociality and autonomic hyporesponsivity, lower detection rates were expected in the prisoners. Participants were questioned on five personally significant items (e.g., day of birth), instructed to deny recognition of this information, and promised a financial reward when able to hide recognition. Prisoners showed reduced autonomic reactivity in comparison to the community volunteers. This hyporesponsivity had little impact on the sensitivity of the Concealed Information Test. Detection efficiency in the prisoners was significantly above chance (d=2.67; a=0.82; 79%), and did not differ significantly from that obtained in the community volunteers (d=3.04; a=0.85; 87%). The present data support the validity of the Concealed Information Test in criminal populations.

  11. Exploring the characteristics of the attentional blink paradigm when used to discover concealed knowledge.

    PubMed

    Niziurski, Julie; Andre, Jeffrey

    2015-12-01

    Ganis and Patnaik (Appl Psychophysiol Biofeedback 34:189-196, 2009) reported that the attentional blink paradigm using faces could be used to detect the presence of concealed knowledge. The attentional blink is defined as the inability to successfully detect the second of two target items presented within a short inter-stimulus interval. The present study tested the use of the attentional blink paradigm in a concealed knowledge test by investigating the effect that familiar faces may have on the attentional blink. Participants completed 200 trials where they were told to look for the same familiar target (Target 2; actor Brad Pitt) that was intermixed with neutral face stimuli and one other familiar face (Target 1; actor George Clooney). Target 1 was to act as the concealed knowledge as participants familiar with Target 1 would be distracted by his unannounced presence and report not seeing Target 2 thereby showing an attentional blink. Despite all participants being familiar with Target 2, an attentional blink still occurred, but with higher than normal Target 2 accuracy rates. Overall, we found support for using the AB paradigm with the concealed knowledge test; however, a possible countermeasure to the attentional blink is familiarity with Target 2 as eight of 21 participants who recognized Target 1 (the concealed knowledge) were also able to detect Target 2 on 100 % of the trials where Target 1's presence should have created an attentional blink. PMID:26162299

  12. A multifaceted active swept millimetre-wave approach to the detection of concealed weapons

    NASA Astrophysics Data System (ADS)

    Andrews, David A.; Bowring, Nicholas; Rezgui, Nacer D.; Southgate, Matthew; Guest, Elizabeth; Harmer, Stuart; Atiah, Ali

    2008-10-01

    The effective detection of concealed handguns and knives in open spaces is a major challenge for police and security services round the world. Here an automated technique for the detection of concealed handguns that relies on active swept illumination of the target to induce both scattered fields and aspect independent responses from the concealed object is presented. The broad frequency sweep permits information about the object's size to be deduced from transformations into the time/distance domain. In our experiments we collect multiple sweeps across the frequency range at very high speed, which produces a time evolved response from the target, from both normal and cross polarized detectors. From this we extract characteristic signatures from the responses that allow those from innocent objects (e.g. mobile phones, keys etc) to be distinguished from handguns. Information about the optical depth separation of the scattering corners and the degree and shape of cross polarization allows a neural network to successfully concealed handguns. Finally this system utilizes a range of signal processing techniques ranging from correlation between cross and normally polarized scattering through to a neural network classifier to deduce whether a concealed weapon is present.

  13. Drug-related deaths with evidence of intracorporeal drug concealment at autopsy: five case reports.

    PubMed

    Wilcher, Glenn

    2011-12-01

    Intracorporeal concealment of illicit drugs is a rare observation at coronial autopsy examinations. The article reports 5 cases of accidental drug overdoses at the Westmead Coronial Morgue, Sydney New South Wales, over a 6-year period with evidence of intracorporeal drug concealment known as body packing or body stuffing. Three different forms of anatomic concealment of drugs are illustrated, Case 2 involving therapeutic medication in the form of glass ampoules for parenteral injection not previously reported. Three deaths were the result of acute toxicity due to polydrug abuse rather than as a consequence of the body packing behavior and rupture of the drug packaging, with the intracorporeal drug concealments an adjunct finding at the autopsy examinations. The cause of death in Case 3 was the direct result of acute cocaine intoxication due to rupture of drug packages in the rectum and mucosal absorption. The article details forensic sociological aspects of drug concealment and subcultural group human behavior that can assist in providing information for the initiation of investigations.

  14. Use of Near-Infrared Spectroscopy and Chemometrics for the Nondestructive Identification of Concealed Damage in Raw Almonds (Prunus dulcis).

    PubMed

    Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E

    2016-07-27

    Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model. PMID:27309980

  15. Use of Near-Infrared Spectroscopy and Chemometrics for the Nondestructive Identification of Concealed Damage in Raw Almonds (Prunus dulcis).

    PubMed

    Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E

    2016-07-27

    Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model.

  16. Edge-aware spatial-frequency extrapolation for consecutive block loss.

    PubMed

    Liu, Hao; Wang, Dengcheng; Wang, Bing; Li, Kangda; Tang, Hainie

    2016-01-01

    To improve the spatial error concealment (SEC) for consecutive block loss, an edge-aware spatial-frequency extrapolation (ESFE) algorithm and its edge-guided parametric model are proposed by selectively incorporating the Hough-based edge synthesis into the frequency-based extrapolation architecture. The dominant edges that cross the missing blocks are firstly identified by the Canny detector, and then the robust Hough transformation is utilized to systematically connect these discontinuous edges. During the generation of edge-guided parametric model, the synthesized edges are utilized to divide the missing blocks into the structure-preserving regions, and thus the residual error is reliably reduced. By successively minimizing the weighted residual error and updating the parametric model, the known samples are approximated by a set of basis functions which are distributed in a region containing both known and unknown samples. Compared with other state-of-the-art SEC algorithms, experimental results show that the proposed ESFE algorithm can achieve better reconstruction quality for consecutive block loss while keeping relatively moderate computational complexity.

  17. The role of psychological flexibility in the relationship between self-concealment and disordered eating symptoms.

    PubMed

    Masuda, Akihiko; Boone, Matthew S; Timko, C Alix

    2011-04-01

    The present cross-sectional study investigated whether psychological flexibility mediates the association between self-concealment and disordered eating (DE) symptoms among non-clinical college students. Data of 209 male and female participants (nfemale =165), aged 18-22 years old, were used for analyses. Self-concealment was found to be positively associated with DE symptoms (i.e., general eating disorder symptoms and eating disorder-related cognitions) and negatively associated with psychological flexibility. Psychological flexibility was inversely associated with DE symptoms. Finally, psychological flexibility was found to mediate the association between self-concealment and DE symptoms after accounting for gender, ethnic background, and body mass index (BMI). PMID:21385643

  18. NIR spectroscopy with multivariate calibration and lock-in amplification to detect chemicals concealed behind fabrics

    NASA Astrophysics Data System (ADS)

    Saleem, Aamer; Canal, Céline; Hutchins, David A.; Green, Roger J.

    2011-05-01

    The detection of specific chemicals when concealed behind a layer of clothing is reported using near infrared (NIR) spectroscopy. Concealment modifies the spectrum of a particular chemical when recorded at stand-off ranges of three meters in a diffuse reflection experiment. The subsequent analysis to identify a particular chemical has involved employing calibration models such as principal component regression (PCR) and partial least squares regression (PLSR). Additionally, detection has been attempted with good results using neural networks. The latter technique serves to overcome nonlinearities in the calibration/training dataset, affording more robust modelling. Finally, lock-in amplification of spectral data collected in through-transmission arrangement has been shown to allow detection at SNR as low as -60dB. The work has been shown to both allow detection of specific chemicals concealed behind a single intervening layer of fabric material, and to estimate the concentration of certain liquids.

  19. Noradrenergic signaling in the medial prefrontal cortex and amygdala differentially regulates vicarious trial-and-error in a spatial decision-making task.

    PubMed

    Amemiya, Seiichiro; Kubota, Natsuko; Umeyama, Nao; Nishijima, Takeshi; Kita, Ichiro

    2016-01-15

    In uncertain choice situations, we deliberately search and evaluate possible options before taking an action. Once we form a preference regarding the current situation, we take an action more automatically and with less deliberation. In rats, the deliberation process can be seen in vicarious trial-and-error behavior (VTE), which is a head-orienting behavior toward options at a choice point. Recent neurophysiological findings suggest that VTE reflects the rat's thinking about future options as deliberation, expectation, and planning when rats feel conflict. VTE occurs depending on the demand: an increase occurs during initial learning, and a decrease occurs with progression in learning. However, the brain circuit underlying the regulation of VTE has not been thoroughly examined. In situations in which VTE often appears, the medial prefrontal cortex (mPFC) and the amygdala (AMY) are crucial for learning and decision making. Our previous study reported that noradrenaline regulates VTE. Here, to investigate whether the mPFC and AMY are involved in regulation of VTE, we examined the effects of local injection of clonidine, an alpha2 adrenergic autoreceptor agonist, into either region in rats during VTE and choice behavior during a T-maze choice task. Injection of clonidine into either region impaired selection of the advantageous choice in the task. Furthermore, clonidine injection into the mPFC suppressed occurrence of VTE in the early phase of the task, whereas injection into the AMY inhibited the decrease in VTE in the later phase and thus maintained a high level of VTE throughout the task. These results suggest that the mPFC and AMY play a role in the increase and decrease in VTE, respectively, and that noradrenergic mechanisms mediate the dynamic regulation of VTE over experiences.

  20. Concealed pregnancy and newborn abandonment: a contemporary 21st century issue Part 2.

    PubMed

    Tighe, Sylvia Murphy; Lalor, Joan

    2016-01-01

    This second of a two-part article explores the consequences of concealed pregnancy and the association with newborn abandonment, with reference to recent cases of public interest. Concealed pregnancy is a complex process which involves hiding a pregnancy, and can lead to tragic consequences, such as maternal or neonatal morbidity or mortality (Murphy Tighe and Lalor 2016; Chen et al 2007).The psychosocial issues involved will also be explored and points for midwifery practice are presented and considered (Murphy Tighe and Lalor 2016). PMID:27652438

  1. Concealed pregnancy and newborn abandonment: a contemporary 21st century issue Part 2.

    PubMed

    Tighe, Sylvia Murphy; Lalor, Joan

    2016-01-01

    This second of a two-part article explores the consequences of concealed pregnancy and the association with newborn abandonment, with reference to recent cases of public interest. Concealed pregnancy is a complex process which involves hiding a pregnancy, and can lead to tragic consequences, such as maternal or neonatal morbidity or mortality (Murphy Tighe and Lalor 2016; Chen et al 2007).The psychosocial issues involved will also be explored and points for midwifery practice are presented and considered (Murphy Tighe and Lalor 2016).

  2. Identifying the location of a concealed object through unintentional eye movements.

    PubMed

    Neuman, Yair; Assaf, Dan; Israeli, Navot

    2015-01-01

    In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed.

  3. Detection of concealed substances in sealed opaque plastic and coloured glass containers using SORS

    NASA Astrophysics Data System (ADS)

    Bloomfield, Matthew; Loeffen, Paul W.; Matousek, Pavel

    2010-10-01

    The reliable detection of concealed substances in sealed opaque plastic and coloured glass containers, with low falsealarm rate, is a problem in numerous areas of security. For example, in aviation security, there is no reliable methodology for alarm resolution of substances with high chemical specificity unless the substances are in optically transparent containers. We present a recently developed method called Spatially Offset Raman Spectroscopy (SORS) which enables the discrimination of the Raman spectrum of the content substance from the Raman spectrum of the container material with no prior knowledge of either, thereby allowing unambiguous identification of the container contents. The method is effective with coloured plastic containers that are several millimetres thick and which are not see-through to the eye and also for coloured glass bottles. Such cases do not typically yield to conventional backscatter Raman spectroscopy (or have poor false-alarm rates) since the content signal is often overwhelmed by the signal from the container, which may in addition have a strong interfering fluorescence background. SORS measurement can be performed in a few seconds by shining a laser light onto the container and then measuring the Raman signal at the excitation point but also at one or more offset positions. Each measurement has different relative orthogonal contributions from the container and contents Raman spectra, so that, with no prior knowledge, the pure spectra of both the container and contents can be extracted - either by scaled subtraction or via multivariate statistical methods. The content spectrum can then be compared to a reference library of pure materials to give a threat evaluation with a confidence level not compromised by interfering signals originating from the container wall. In this paper, we describe the methods and their optimization, and characterize their performance in practical screening applications. The study shows that there is

  4. The Role of Stigma Concealment in the Retrospective High School Experiences of Gay, Lesbian, and Bisexual Individuals

    ERIC Educational Resources Information Center

    Frost, David M.; Bastone, Linda M.

    2008-01-01

    High school is a time when most gay, lesbian, and bisexual (GLB) youths experience a great deal of distress related to the stigma attached to being gay. Many try to avoid stigmatization by concealing the fact that they are GLB. This brief report presents a descriptive, multidimensional approach to understanding GLB stigma concealment as a…

  5. How Many More Guns?: Estimating the Effect of Allowing Licensed Concealed Handguns on a College Campus

    ERIC Educational Resources Information Center

    Bouffard, Jeffrey A.; Nobles, Matt R.; Wells, William; Cavanaugh, Michael R.

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased…

  6. The intention to conceal activates the right prefrontal cortex: an event-related potential study.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi

    2015-03-01

    Recent studies on deception have shown that a late positive potential (LPP), a component of event-related brain potentials, is elicited when a participant wishes to conceal recognition of the eliciting stimulus. The LPP occurs about 500 ms after stimulus onset and has an occipital scalp distribution with concurrent negativity at frontal sites. The present study investigated the cortical sources of the LPP associated with the intention to conceal. Standardized low-resolution electromagnetic tomography analysis was applied on previously published concealment-related LPP data (Matsuda, Nittono, and Ogawa, 2013, N=30). The cortical sources of the LPP were estimated in the right middle frontal gyrus and the right inferior frontal gyrus, which fits well with the findings of fMRI studies. Previous research suggests that activities in the middle frontal gyrus and the right inferior frontal gyrus are associated with cognitive control and that greater relative right than left frontal activities are associated with withdrawal motivation. On the basis of these findings, it is concluded that the LPP may reflect cognitive control with withdrawal motivation that is recruited by the participants' goal of concealing their recognition and avoiding disclosure. A positive potential at occipital sites can be a sign of the activation in the prefrontal cortex.

  7. Productive and Inclusive? How Documentation Concealed Racialising Practices in a Diversity Project

    ERIC Educational Resources Information Center

    Miller, Melinda G.

    2014-01-01

    This article examines how documentation concealed racialising practices in a diversity project that was seen to be productive and inclusive. Documentation examples are taken from a doctoral study about embedding Indigenous perspectives in early childhood education curricula in two Australian urban childcare centres. In place of reporting examples…

  8. Novel, ERP-based, concealed information detection: Combining recognition-based and feedback-evoked ERPs.

    PubMed

    Sai, Liyang; Lin, Xiaohong; Rosenfeld, J Peter; Sang, Biao; Hu, Xiaoqing; Fu, Genyue

    2016-02-01

    The present study introduced a novel variant of the concealed information test (CIT), called the feedback-CIT. By providing participants with feedbacks regarding their memory concealment performance during the CIT, we investigated the feedback-related neural activity underlying memory concealment. Participants acquired crime-relevant memories via enacting a lab crime, and were tested with the feedback-CIT while EEGs were recorded. We found that probes (e.g., crime-relevant memories) elicited larger recognition-P300s than irrelevants among guilty participants. Moreover, feedback-related negativity (FRN) and feedback-P300 could also discriminate probes from irrelevants among guilty participants. Both recognition- and feedback-ERPs were highly effective in distinguishing between guilty and innocent participants (recognition-P300: AUC=.73; FRN: AUC=.95; feedback-P300: AUC=.97). This study sheds new light on brain-based memory detection, such that feedback-related neural signals can be employed to detect concealed memories.

  9. Orienting versus inhibition in the Concealed Information Test: Different cognitive processes drive different physiological measures.

    PubMed

    Selle, Nathalie Klein; Verschuere, Bruno; Kindt, Merel; Meijer, Ewout; Ben-Shakhar, Gershon

    2016-04-01

    The Concealed Information Test (CIT) provides a valid tool for psychophysiological detection of concealed knowledge. However, its precise theoretical underpinnings remain a matter of debate. The differential physiological responses elicited by concealed, relevant items, relative to control items, were traditionally explained as reflecting an orienting response (OR). According to an alternative account, these responses reflect attempts to inhibit arousal. The present study examined whether and to what extent CIT detection efficiency is affected by instructions aimed at manipulating arousal inhibition (AI). One hundred and forty-eight undergraduate students completed a CIT, while electrodermal, cardiac, and respiratory measures were recorded. Half of the participants were requested to imagine that they are suspected of committing a crime and were motivated to avoid detection (presumably eliciting both OR and AI), while the other half were requested to imagine that they are witnesses of a crime and were motivated to be detected (presumably eliciting OR only). All participants were further requested to remain silent throughout the test. In both conditions, concealed items led to a similar increase in skin conductance as compared to the control items. However, the typically observed heart rate deceleration and respiratory suppression were found in suspects, but not in witnesses. These data imply that different mechanisms drive the responding of different psychophysiological measures used in the CIT, with skin conductance reflecting OR, and heart rate and respiration primarily reflecting AI. PMID:26615984

  10. 36-Month-Olds Conceal Visual and Auditory Information from Others

    ERIC Educational Resources Information Center

    Melis, Alicia P.; Call, Josep; Tomasello, Michael

    2010-01-01

    By three years of age, children are skilled at assessing under which circumstances others can see things. However, nothing is known about whether they can use this knowledge to guide their own deceptive behaviour. Here we investigated 3-year-olds' ability to strategically inhibit or conceal forbidden actions that a nearby adult experimenter could…

  11. Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.

    PubMed

    Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G

    2016-01-01

    Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population.

  12. Ego Identity, Social Anxiety, Social Support, and Self-Concealment in Lesbian, Gay, and Bisexual Individuals

    ERIC Educational Resources Information Center

    Potoczniak, Daniel J.; Aldea, Mirela A.; DeBlaere, Cirleen

    2007-01-01

    This study examined a model in which the relationship between social anxiety and two dimensions of ego identity (commitment and exploration) was expected to be mediated by social support and self-concealment for a sample of lesbian, gay, and bisexual individuals (N=347). Statistically significant paths were found from social anxiety to social…

  13. The Psychological Implications of Concealing a Stigma: A Cognitive-Affective-Behavioral Model

    ERIC Educational Resources Information Center

    Pachankis, John E.

    2007-01-01

    Many assume that individuals with a hidden stigma escape the difficulties faced by individuals with a visible stigma. However, recent research has shown that individuals with a concealable stigma also face considerable stressors and psychological challenges. The ambiguity of social situations combined with the threat of potential discovery makes…

  14. University Presidents' Perceptions and Practice Regarding the Carrying of Concealed Handguns on College Campuses

    ERIC Educational Resources Information Center

    Price, James H.; Thompson, Amy; Khubchandani, Jagdish; Dake, Joseph; Payton, Erica; Teeple, Karen

    2014-01-01

    Objective: To assess the perceptions and practices of a national sample of college and university presidents regarding their support for concealed handguns being carried on college campuses. Participants: The sample for this study consisted of a national random sample of 900 college or university presidents. Methods: In the spring of 2013, a…

  15. Detecting concealed information using feedback related event-related brain potentials.

    PubMed

    Sai, Liyang; Lin, Xiaohong; Hu, Xiaoqing; Fu, Genyue

    2014-10-01

    Employing an event-related potential (ERP)-based concealed information test (CIT), the present study investigated (1) the neurocognitive processes when people received feedbacks regarding their deceptive/truthful responses and (2) whether such feedback-related ERP activities can be used to detect concealed information above and beyond the recognition-related P300. During the CIT, participants were presented with rare, meaningful probes (their own names) embedded within a series of frequent yet meaningless irrelevants (others' names). Participants were instructed to deny their recognition of the probes. Critically, following participants' responses, they were provided with feedbacks regarding whether they succeeded or failed in the CIT. Replicating previous ERP-based CITs, we found a larger P300 elicited by probe compared to irrelevant. Regarding feedback-related ERPs, a temporospatial Principle Component Analyses found two ERP components that were not only sensitive to feedback manipulations but also can discriminate probe from irrelevant: an earlier, central-distributed positivity that was elicited by "success" feedbacks peaked around 219ms; and a later, right central-distributed positivity that was also elicited by "success" feedbacks, peaked around 400ms. Importantly, the feedback ERPs were not correlated with P300 that was elicited by probe/irrelevant, suggesting that these two ERPs reflect independent processes underlying memory concealment. These findings illustrate the feasibility and promise of using feedback-related ERPs to detect concealed memory and thus deception. PMID:25058495

  16. The Cost of Question Concealment: Eye-Tracking and MEG Evidence

    ERIC Educational Resources Information Center

    Harris, Jesse; Pylkkanen, Liina; McElree, Brian; Frisson, Steven

    2008-01-01

    Although natural language appears to be largely compositional, the meanings of certain expressions cannot be straightforwardly recovered from the meanings of their parts. This study examined the online processing of one such class of expressions: "concealed questions", in which the meaning of a complex noun phrase ("the proof of the theorem")…

  17. The cost of question concealment: eye-tracking and MEG evidence.

    PubMed

    Harris, Jesse; Pylkkänen, Liina; McElree, Brian; Frisson, Steven

    2008-10-01

    Although natural language appears to be largely compositional, the meanings of certain expressions cannot be straightforwardly recovered from the meanings of their parts. This study examined the online processing of one such class of expressions: concealed questions, in which the meaning of a complex noun phrase (the proof of the theorem) shifts to a covert question (what the proof of the theorem is) when mandated by a sub-class of question-selecting verbs (e.g., guess). Previous behavioral and magnetoencephalographic (MEG) studies have reported a cost associated with converting an entity denotation to an event. Our study tested whether both types of meaning-shift affect the same computational resources by examining the effects elicited by concealed questions in eye-tracking and MEG. Experiment 1 found evidence from eye-movements that verbs requiring the concealed question interpretation require more processing time than verbs that do not support a shift in meaning. Experiment 2 localized the cost of the concealed question interpretation in the left posterior temporal region, an area distinct from that affected by complement coercion. Experiment 3 presented the critical verbs in isolation and found no posterior temporal effect, confirming that the effect of Experiment 2 reflected sentential, and not lexical-level, processing.

  18. The Effects of Concealing Academic Achievement Information on Adolescents' Self-Concept

    ERIC Educational Resources Information Center

    Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling

    2011-01-01

    Using an experimental design, the effect of concealing academic achievement information on adolescents' self-concept was examined in the current study. Specifically, adolescents with low academic achievement and adolescents with average to high academic achievement (N = 129) were randomly assigned to different interview contexts wherein…

  19. Fear Perceptions in Public Parks: Interactions of Environmental Concealment, the Presence of People Recreating, and Gender

    ERIC Educational Resources Information Center

    Jorgensen, Lisa J.; Ellis, Gary D.; Ruddell, Edward

    2013-01-01

    This research examined the effect of concealment (environmental cues), presence or absence of people recreating (social cues), and gender on individuals' fear of crime in a community park setting. Using a 7-point single-item indicator, 732 participants from two samples (540 park visitors and 192 college students) rated their estimates of fear…

  20. An adaptive error-resilient video encoder

    NASA Astrophysics Data System (ADS)

    Cheng, Liang; El Zarki, Magda

    2003-06-01

    When designing an encoder for a real-time video application over a wireless channel, we must take into consideration the unpredictable fluctuation of the quality of the channel and its impact on the transmitted video data. This uncertainty motivates the development of an adaptive video encoding mechanism that can compensate for the infidelity caused either by data loss and/or by the post-processing (error concealment) at the decoder. In this paper, we first explore the major factors that cause quality degradation. We then propose an adaptive progressive replenishment algorithm for a packet loss rate (PLR) feedback enabled system. Assuming the availability of a feedback channel, we discuss a video quality assessment method, which allows the encoder to be aware of the decoder-side perceptual quality. Finally, we present a novel dual-feedback mechanism that guarantees an acceptable level of quality at the receiver side with modest increase in the complexity of the encoder.

  1. Identifying the location of a concealed object through unintentional eye movements.

    PubMed

    Neuman, Yair; Assaf, Dan; Israeli, Navot

    2015-01-01

    In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879

  2. Identifying the location of a concealed object through unintentional eye movements

    PubMed Central

    Neuman, Yair; Assaf, Dan; Israeli, Navot

    2015-01-01

    In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879

  3. Detection of concealed information by P3 and frontal EEG asymmetry.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi; Allen, John J B

    2013-03-14

    Psychophysiological detection of deception has seen increased attention in both research and applied settings. In this field, the most scientifically validated paradigm is the Concealed Information Test (CIT). The CIT does not directly deal with whether a participant is lying, but examines whether a participant recognizes a critical relevant detail, inferred by differences in physiological responses between critical and non-critical items. Although event-related potential (ERP) approaches to the CIT have shown high accuracy, a combination of measures might improve the test's performance. We thus assessed whether a new CIT index, frontal EEG asymmetry that is supposed to reflect differences in approach/withdrawal motivation, would prove useful. Nineteen participants were asked to steal one item in a mock crime, and were then administered two CITs while concealing the stolen item. One CIT included the stolen item (i.e., guilty condition), whereas the other CIT did not (i.e., innocent condition). In the guilty condition, the concealed stolen item elicited greater relative left frontal alpha activity (indicative of relative right frontal cortical activity) as compared to the other items, suggesting that the recognition of the concealed item might have induced withdrawal motivation. Although the discrimination between guilty and innocent conditions by the asymmetry score alone was not as good as that by the ERP P3 index, combining the asymmetry score and P3 improved the detection performance significantly. The results suggest that the frontal EEG asymmetry can be used as a new measure in the CIT that provides additional information beyond that captured by the traditional ERP index.

  4. Detection of Concealed Liquid Explosives and Illicit Drugs in Unopened Bottles

    NASA Astrophysics Data System (ADS)

    Kumar, Sankaran; Prado, Pablo J.

    This article discusses the use of Magnetic Resonance relaxometry as a non-invasive method to detect concealed liquid explosives and drugs in unopened containers. The safe, non-ionizing detection is based on sensing liquid alteration without opening its container. The technique has proven to be effective with non-metallic bottles, independently of their shape and size. Other spectroscopic and bulk methods to identify illicit liquid substances as well as the potential of combining screening technologies are presented.

  5. Concealed neuroanatomy in Michelangelo's Separation of Light From Darkness in the Sistine Chapel.

    PubMed

    Suk, Ian; Tamargo, Rafael J

    2010-05-01

    Michelangelo Buonarroti (1475-1564) was a master anatomist as well as an artistic genius. He dissected cadavers numerous times and developed a profound understanding of human anatomy. From 1508 to 1512, Michelangelo painted the ceiling of the Sistine Chapel in Rome. His Sistine Chapel frescoes are considered one of the monumental achievements of Renaissance art. In the winter of 1511, Michelangelo entered the final stages of the Sistine Chapel project and painted 4 frescoes along the longitudinal apex of the vault, which completed a series of 9 central panels depicting scenes from the Book of Genesis. It is reported that Michelangelo concealed an image of the brain in the first of these last 4 panels, namely, the Creation of Adam. Here we present evidence that he concealed another neuronanatomic structure in the final panel of this series, the Separation of Light From Darkness, specifically a ventral view of the brainstem. The Separation of Light From Darkness is an important panel in the Sistine Chapel iconography because it depicts the beginning of Creation and is located directly above the altar. We propose that Michelangelo, a deeply religious man and an accomplished anatomist, intended to enhance the meaning of this iconographically critical panel and possibly document his anatomic accomplishments by concealing this sophisticated neuroanatomic rendering within the image of God.

  6. Preventing shoulder-surfing attack with the concept of concealing the password objects' information.

    PubMed

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin; Chong, Yu Nam; Por, Lip Yee

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to "shoulder-surfing" attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack.

  7. Concealment of psychopathology in forensic evaluations: a pilot study of intentional and uninsightful dissimulators.

    PubMed

    Caruso, Keith A; Benedek, David M; Auble, Pamela M; Bernet, William

    2003-01-01

    Dissimulation is the concealment of genuine psychiatric symptoms in an attempt to present a picture of psychiatric health. In this pilot study, the authors set out to demonstrate that defendants may conceal psychiatric illness even in forensic settings, contrary to their apparent self-interest. They reviewed their records for forensic assessments of dissimulators and malingerers and classified dissimulators as "intentional" or "uninsightful" depending on whether their concealment of symptoms appeared to be a volitional act or driven by a lack of insight. Although there were obvious diagnostic differences, the only other significant difference between malingerers and dissimulators was that malingerers were more likely to be facing charges related to financial crimes. Uninsightful dissimulators were significantly older than were intentional dissimulators. Uninsightful dissimulators were also more likely to be psychotic, particularly delusional and schizophrenic, than were intentional dissimulators. While forensic psychiatrists are vigilant in attempts to detect malingering, these data suggest that they should be equally vigilant regarding the possibility of dissimulation. Although further study is indicated, it appears that dissimulators are a heterogeneous group.

  8. Stepped-frequency CW radar for concealed weapon detection and through-the-wall surveillance

    NASA Astrophysics Data System (ADS)

    Hunt, Allen R.; Hogg, R. Douglas

    2002-08-01

    Both concealed weapons detection and through the wall surveillance are significant problems for both law enforcement and military personnel. While on the surface it would appear that these two problems are unrelated technologically, they do, in fact, share some common ground. A concealed weapon acts as resonant object, exhibiting electromagnetic resonance peaks at frequencies characteristic of the weapon's major dimensions. For handguns the frequency range of interest lies approximately between 450 MHz and 2 GHz. As it turns out, this is also a region over which many common building materials are largely transparent. As part of grant 97-IJ-CX-K013 from the National Institute of Justice, AKELA, Inc. has developed a stepped-frequency, CW radar that covers this frequency range. The radar is digitally synthesized and controlled and has a range resolution of approximately 4'. Digital waveform control gives the radar the ability to avoid interference with other electronic devices, to tailor data collection for signal processing requirements, and to change its sweep time in response to operational requirements. AKELA has developed a brassboard concealed weapons detector that uses this radar. A through the wall imaging system that uses the radar is currently in development under AFRL Contract F30602-00-C-0205.

  9. Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information

    PubMed Central

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649

  10. Concealment of drugs by police detainees: lessons learned from adverse incidents and from 'routine' clinical practice.

    PubMed

    Havis, Siobhan; Best, David; Carter, Jane

    2005-10-01

    This is a collaborative piece of work undertaken between the PCA and a Principal FME. The study is based on 16 cases of internal drug concealment drawn from 43 drug-related deaths in custody in England and Wales between 1997 and 2002. These data are supplemented by three case studies from a county force involving non-fatal drug concealment to illustrate practical custody issues. The majority of the 16 deaths were white (n = 12) and male (n = 13) with a mean age of 34 years. In half of the cases, the deceased was known or believed to have concealed drugs orally at the point of initial contact with police. In 4/16 cases, the individual first showed signs of medical distress in a public place, a further 4 collapsed on arrival at the police station and two more detainees were subsequently found collapsed in their cell. Drug toxicity was the most common cause of death (10/16). In 5 cases death was caused by airway obstruction by swallowed packages. Both cocaine (14/16) and cannabis (8/16) traces were found in post-mortem samples. The report emphasises the need for a safety first approach.

  11. [Diagnostic Errors in Medicine].

    PubMed

    Buser, Claudia; Bankova, Andriyana

    2015-12-01

    The recognition of diagnostic errors in everyday practice can help improve patient safety. The most common diagnostic errors are the cognitive errors, followed by system-related errors and no fault errors. The cognitive errors often result from mental shortcuts, known as heuristics. The rate of cognitive errors can be reduced by a better understanding of heuristics and the use of checklists. The autopsy as a retrospective quality assessment of clinical diagnosis has a crucial role in learning from diagnostic errors. Diagnostic errors occur more often in primary care in comparison to hospital settings. On the other hand, the inpatient errors are more severe than the outpatient errors.

  12. [Diagnostic Errors in Medicine].

    PubMed

    Buser, Claudia; Bankova, Andriyana

    2015-12-01

    The recognition of diagnostic errors in everyday practice can help improve patient safety. The most common diagnostic errors are the cognitive errors, followed by system-related errors and no fault errors. The cognitive errors often result from mental shortcuts, known as heuristics. The rate of cognitive errors can be reduced by a better understanding of heuristics and the use of checklists. The autopsy as a retrospective quality assessment of clinical diagnosis has a crucial role in learning from diagnostic errors. Diagnostic errors occur more often in primary care in comparison to hospital settings. On the other hand, the inpatient errors are more severe than the outpatient errors. PMID:26649954

  13. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally-Bisexual Men

    PubMed Central

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J.; Parsons, Jeffrey T.

    2013-01-01

    Objective Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men’s mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. Method An ethnically-diverse sample of 203 non-gay-identified, behaviorally-bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Results Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. Conclusions The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure. PMID:23276123

  14. Clothing adjustments for concealed soft body armor during moderate physical exertion.

    PubMed

    Ryan, Greg A; Bishop, Stacy H; Herron, Robert L; Katica, Charles P; Elbon, Bre'anna L; Bosak, Andrew M; Bishop, Phillip

    2015-01-01

    Previous research has studied the impact of Level II concealed soft body armor (SBA) on the augmentation of heat storage in a hot environment simulating a typical summer day in the southeastern United States (wet bulb globe temperature [WBGT] = 30°C) and noted a significant difference between macro- and micro-WBGTs. The purpose of this study was to characterize the microclimate (micro-WBGT) under a concealed Level II SBA during 60 min of moderately intense work at two separate macro-WBGTs (26°C and 30°C), and to establish WBGT corrections to allow prediction of heat strain in an individual wearing a concealed Level II SBA. A single trial was performed with nine volunteers (27 ± 4 years) outfitted with a simulated standard law enforcement uniform and a traditional concealed Level II SBA, in a moderately warm environment (WBGT = 26°C). Each participant performed cycles of 12 min of walking (1.25 L · min(-1)) and 3 min of arm curls (14.3 kg, 0.6 L · min(-1)) with a 5 min rest after every other cycle, for a total of 60 minutes. This trial was compared to an identical previously completed 60-min work bout at 30°C. A two-way repeated measures ANOVA with Post hoc Bonferroni and paired samples t-test analysis was conducted. A greater difference between macro- micro-WBGTs existed at 26°C compared to the 30°C macro-WBGT. Under these conditions, a moderate work in Level II SBA requires a WBGT correction of 8.9°C and 6.2°C at macro-WBGTs of 26°C and 30°C, respectively. A modified simple linear regression prediction model was established for mean Micro-WBGT for each macro-WBGTs after the plateau point at the 30 min mark. The derivation regressions at 26°C (R(2) = 0.99), and 30°C (R(2) = 0.99) indicate that micro-WBGT could be predicted for each 15 minutes time at both macro-WBGTs tested for individuals doing moderate intensity (300 Kcals · hr(-1)) work wearing concealed Level II SBA. PMID:25437276

  15. Sun compass error model

    NASA Technical Reports Server (NTRS)

    Blucker, T. J.; Ferry, W. W.

    1971-01-01

    An error model is described for the Apollo 15 sun compass, a contingency navigational device. Field test data are presented along with significant results of the test. The errors reported include a random error resulting from tilt in leveling the sun compass, a random error because of observer sighting inaccuracies, a bias error because of mean tilt in compass leveling, a bias error in the sun compass itself, and a bias error because the device is leveled to the local terrain slope.

  16. Unforced errors and error reduction in tennis

    PubMed Central

    Brody, H

    2006-01-01

    Only at the highest level of tennis is the number of winners comparable to the number of unforced errors. As the average player loses many more points due to unforced errors than due to winners by an opponent, if the rate of unforced errors can be reduced, it should lead to an increase in points won. This article shows how players can improve their game by understanding and applying the laws of physics to reduce the number of unforced errors. PMID:16632568

  17. Error in radiology.

    PubMed

    Goddard, P; Leslie, A; Jones, A; Wakeley, C; Kabala, J

    2001-10-01

    The level of error in radiology has been tabulated from articles on error and on "double reporting" or "double reading". The level of error varies depending on the radiological investigation, but the range is 2-20% for clinically significant or major error. The greatest reduction in error rates will come from changes in systems.

  18. Electromagnetic induction imaging of concealed metallic objects by means of resonating circuits

    NASA Astrophysics Data System (ADS)

    Guilizzoni, R.; Watson, J. C.; Bartlett, P. A.; Renzoni, F.

    2016-05-01

    An electromagnetic induction system, suitable for 2D imaging of metallic samples of different electrical conductivities, has been developed. The system is based on a parallel LCR circuit comprising a ferrite-cored coil (7.8 mm x 9.5 mm, L=680 μH at 1 KHz), a variable resistor and capacitor. The working principle of the system is based on eddy current induction inside a metallic sample when this is introduced into the AC magnetic field created by the coil. The inductance of the LCR circuit is modified due to the presence of the sample, to an extent that depends on its conductivity. Such modification is known to increase when the system is operated at its resonant frequency. Characterizing different metals based on their values of conductivity is therefore possible by utilizing a suitable system operated at resonance. Both imaging and material characterization were demonstrated by means of the proposed electromagnetic induction technique. Furthermore, the choice of using a system with an adjustable resonant frequency made it possible to select resonances that allow magnetic-field penetration through conductive screens. Investigations on the possibility of imaging concealed metals by penetrating such shields have been carried out. A penetration depth of δ~3 mm through aluminium (Al) was achieved. This allowed concealed metallic samples- having conductivities ranging from 0.54 to 59.77 MSm-1 and hidden behind 1.5-mm-thick Al shields- to be imaged. Our results demonstrate that the presence of the concealed metallic objects can be revealed. The technique was thus shown to be a promising detection tool for security applications.

  19. Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons

    NASA Astrophysics Data System (ADS)

    Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.

    2015-10-01

    The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.

  20. Shaeer’s Technique: A Minimally Invasive Procedure for Monsplasty and Revealing the Concealed Penis

    PubMed Central

    2016-01-01

    Background: A concealed penis is a condition where part of the penis is invisible below the surface of the prepubic skin. Dermolipectomy can correct this condition, although it involves a long abdominal crease incision, or infrapubic incision around the base of the penis, and a possibility for genital lymphedema. This study describes Shaeer’s technique, a minimally invasive method for revealing the concealed penis. Methods: A 1- to 2-cm-long incision was cut over the anterior superior iliac spine (ASIS) on either side. A long curved blunt forceps was inserted from one incision, down to the base of the penis and then up to the contralateral ASIS. A 5-mm wide nonabsorbable tape was picked up by the forceps from 1 incision and pulled through to emerge from the other. Pulling on the tape cephalad pulled the mons pubis and revealed the penis. The tape was sutured to the periosteum overlying the ASIS on either side. Patients were followed up for 18 months for penile length, complications, and overall satisfaction. Results: Twenty patients were operated upon. Preoperatively, flaccid visible length was 3 ± 0.9 cm, and erect visible length was 8 ± 4.6 cm. Postoperatively, the flaccid visible length was 7.1 ± 2.1 cm, with a 57.9% improvement in length (P < 0.0001). Erect visible length was 11.8 ± 2.1 cm, with a 32% improvement in length (P < 0.0001). Length gain was maintained for 18 months. Conclusion: Shaeer’s technique is a minimally invasive, short, and simple procedure for monsplasty and revealing the concealed penis.

  1. Experimental methods of indoor millimeter-wave radiometric imaging for personnel concealed contraband detection

    NASA Astrophysics Data System (ADS)

    Hu, Taiyang; Xiao, Zelong; Li, Hao; Lv, Rongchuan; Lu, Xuan

    2014-11-01

    The increasingly emerging terrorism attacks and violence crimes around the world have posed severe threats to public security, so carrying out relevant research on advanced experimental methods of personnel concealed contraband detection is crucial and meaningful. All of the advantages of imaging covertly, avoidance of interference with other systems, intrinsic property of being safe to persons under screening , and the superior ability of imaging through natural or manmade obscurants, have significantly combined to enable millimeter-wave (MMW) radiometric imaging to offer great potential in personnel concealed contraband detection. Based upon the current research status of MMW radiometric imaging and urgent demands of personnel security screening, this paper mainly focuses on the experimental methods of indoor MMW radiometric imaging. The reverse radiation noise resulting from super-heterodyne receivers seriously affects the image experiments carried out at short range, so both the generation mechanism and reducing methods of this noise are investigated. Then, the benefit of sky illumination no longer exists for the indoor radiometric imaging, and this leads to the decrease in radiometric temperature contrast between target and background. In order to enhance the radiometric temperature contrast for improving indoor imaging performance, the noise illumination technique is adopted in the indoor imaging scenario. In addition, the speed and accuracy of concealed contraband detection from acquired MMW radiometric images are usually restricted to the deficiencies in traditional artificial interpretation by security inspectors, thus an automatic recognition and location algorithm by integrating improved Fuzzy C-means clustering with moment invariants is put forward. A series of original results are also presented to demonstrate the significance and validity of these methods.

  2. Face and Voice as Social Stimuli Enhance Differential Physiological Responding in a Concealed Information Test

    PubMed Central

    Ambach, Wolfgang; Assmann, Birthe; Krieg, Bennet; Vaitl, Dieter

    2012-01-01

    Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT). Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT. Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA), respiration line length (RLL), phasic heart rate (pHR), and finger pulse waveform length (FPWL) were registered. The Psychopathic Personality Inventory – Revised (PPI-R) was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found. The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT. PMID:23293613

  3. TDCS Guided using fMRI Significantly Accelerates Learning to Identify Concealed Objects

    PubMed Central

    Clark, Vincent P.; Coffman, Brian A.; Mayer, Andy R.; Weisend, Michael P.; Lane, Terran D.R.; Calhoun, Vince D.; Raybourn, Elaine M.; Garcia, Christopher M.; Wassermann, Eric M.

    2011-01-01

    The accurate identification of obscured and concealed objects in complex environments was an important skill required for survival during human evolution, and is required today for many forms of expertise. Here we used transcranial direct current stimulation (tDCS) guided using neuroimaging to increase learning rate in a novel, minimally guided discovery-learning paradigm. Ninety-six subjects identified threat-related objects concealed in naturalistic virtual surroundings used in real-world training. A variety of brain networks were found using fMRI data collected at different stages of learning, with two of these networks focused in right inferior frontal and right parietal cortex. Anodal 2.0 mA tDCS performed for 30 minutes over these regions in a series of single-blind, randomized studies resulted in significant improvements in learning and performance compared with 0.1 mA tDCS. This difference in performance increased to a factor of two after a one-hour delay. A dose-response effect of current strength on learning was also found. Taken together, these brain imaging and stimulation studies suggest that right frontal and parietal cortex are involved in learning to identify concealed objects in naturalistic surroundings. Furthermore, they suggest that the application of anodal tDCS over these regions can greatly increase learning, resulting in one of the largest effects on learning yet reported. The methods developed here may be useful to decrease the time required to attain expertise in a variety of settings. PMID:21094258

  4. Exploiting synthetic aperture radar imagery for retrieving vibration signatures of concealed machinery

    NASA Astrophysics Data System (ADS)

    Pérez, Francisco; Campbell, Justin B.; Jaramillo, Monica; Dunkel, Ralf; Atwood, Thomas; Doerry, Armin; Gerstle, Walter H.; Santhanam, Balu; Hayat, Majeed M.

    2016-05-01

    It has been demonstrated that the instantaneous acceleration associated with vibrating objects that are directly imaged by synthetic aperture radar (SAR) can be estimated through the application of the discrete fractional Fourier transform (DFrFT) using the information contained in the complex SAR image. In general, vibration signatures may include, for example, the number of chirped sinusoids as well as their respective base frequencies and chirp rates. By further processing the DFrFT-processed data for clutter-noise rejection by means of pseudo- subspace methods, has been shown that the SAR-vibrometry method can be reliable as long as the signal-to-noise ratio (SNR) and the signal-to-clutter ratio (SCR) of the slow-time SAR signal at the range-line of interest exceeds 15dB. Meanwhile, the Nyquist theorem dictates that the maximum measurable vibration frequency is limited by half of the pulse-repetition frequency. This paper focuses on the detection and estimation of vibrations generated by machinery concealed within buildings and other structures. This is a challenging task in general because the vibration signatures of the source are typically altered by their housing structure; moreover, the SNR at the surface of the housing structure tends to be reduced. Here, experimental results for three different vibrating targets, including one concealed target, are reported using complex SAR images acquired by the General Atomics Lynx radar at resolutions of 1-ft and 4-in. The concealed vibrating target is actuated by a gear motor with an off-balance weight attached to it, which is enclosed by a wooden housing. The vibrations of the motor are transmitted to a chimney that extends above the housing structure. Using the SAR vibrometry approach, it is shown that it is possible to distinguish among the three vibrating objects based upon their vibration signatures.

  5. Shaeer’s Technique: A Minimally Invasive Procedure for Monsplasty and Revealing the Concealed Penis

    PubMed Central

    2016-01-01

    Background: A concealed penis is a condition where part of the penis is invisible below the surface of the prepubic skin. Dermolipectomy can correct this condition, although it involves a long abdominal crease incision, or infrapubic incision around the base of the penis, and a possibility for genital lymphedema. This study describes Shaeer’s technique, a minimally invasive method for revealing the concealed penis. Methods: A 1- to 2-cm-long incision was cut over the anterior superior iliac spine (ASIS) on either side. A long curved blunt forceps was inserted from one incision, down to the base of the penis and then up to the contralateral ASIS. A 5-mm wide nonabsorbable tape was picked up by the forceps from 1 incision and pulled through to emerge from the other. Pulling on the tape cephalad pulled the mons pubis and revealed the penis. The tape was sutured to the periosteum overlying the ASIS on either side. Patients were followed up for 18 months for penile length, complications, and overall satisfaction. Results: Twenty patients were operated upon. Preoperatively, flaccid visible length was 3 ± 0.9 cm, and erect visible length was 8 ± 4.6 cm. Postoperatively, the flaccid visible length was 7.1 ± 2.1 cm, with a 57.9% improvement in length (P < 0.0001). Erect visible length was 11.8 ± 2.1 cm, with a 32% improvement in length (P < 0.0001). Length gain was maintained for 18 months. Conclusion: Shaeer’s technique is a minimally invasive, short, and simple procedure for monsplasty and revealing the concealed penis. PMID:27622092

  6. Contour Error Map Algorithm

    NASA Technical Reports Server (NTRS)

    Merceret, Francis; Lane, John; Immer, Christopher; Case, Jonathan; Manobianco, John

    2005-01-01

    The contour error map (CEM) algorithm and the software that implements the algorithm are means of quantifying correlations between sets of time-varying data that are binarized and registered on spatial grids. The present version of the software is intended for use in evaluating numerical weather forecasts against observational sea-breeze data. In cases in which observational data come from off-grid stations, it is necessary to preprocess the observational data to transform them into gridded data. First, the wind direction is gridded and binarized so that D(i,j;n) is the input to CEM based on forecast data and d(i,j;n) is the input to CEM based on gridded observational data. Here, i and j are spatial indices representing 1.25-km intervals along the west-to-east and south-to-north directions, respectively; and n is a time index representing 5-minute intervals. A binary value of D or d = 0 corresponds to an offshore wind, whereas a value of D or d = 1 corresponds to an onshore wind. CEM includes two notable subalgorithms: One identifies and verifies sea-breeze boundaries; the other, which can be invoked optionally, performs an image-erosion function for the purpose of attempting to eliminate river-breeze contributions in the wind fields.

  7. Millimetre wave and terahertz technology for the detection of concealed threats: a review

    NASA Astrophysics Data System (ADS)

    Kemp, Michael C.

    2006-09-01

    There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Electromagnetic waves at these frequencies are safe, penetrate barriers and have short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavelengths which can be used to identify them. This paper reviews the progress which has been made in recent years and identifies the achievements, challenges and prospects for these technologies in checkpoint people screening, stand off detection of improvised explosive devices (IEDs) and suicide bombers as well as more specialized screening tasks.

  8. Standoff concealed weapon detection using a 350 GHz radar imaging system

    SciTech Connect

    Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick LJ

    2010-04-01

    The Pacific Northwest National Laboratory is currently developing a 350 GHz, active, wideband, three-dimensional, radar imaging system to evaluate the feasibility of active sub-mm imaging for standoff concealed weapon detection. The prototype radar imaging system is based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed rotating conical scanner. The wideband operation of this system provides accurate ranging information, and the images obtained are fully three-dimensional. Recent improvements to the system include increased imaging speed using improved balancing techniques, wider bandwidth, and image display techniques.

  9. Ambient air cooling for concealed soft body armor in a hot environment.

    PubMed

    Ryan, Greg A; Bishop, Stacy H; Herron, Robert L; Katica, Charles P; Elbon, Bre'anna L; Bosak, Andrew M; Bishop, Phillip

    2014-01-01

    Concealed soft body armor inhibits convective and evaporative heat loss and increases heat storage, especially in hot environments. One option to potentially mitigate heat storage is to promote airflow under the soft body armor. The purpose of this study was to evaluate the effect of ambient air induction (∼100 liters per minute) on heat strain while wearing concealed soft body armor in a hot environment (wet bulb globe temperature = 30°C). A counter-balanced, repeated measures protocol was performed with nine healthy male volunteers. Participants were fitted with either a traditional or modified Level II concealed soft body armor. Participants performed cycles of 12 min of walking (1.25 liters per minute) and 3 min of arm curls (0.6 liters per minute) for a total of 60 min. Two-way repeated measures ANOVA was used to assess the mean differences in physiological measures (rectal temperature, heart rate, micro-environment [temperature and relative humidity]). Post hoc Bonferroni analysis and paired samples t-tests (alpha = 0.01) were conducted on omnibus significant findings. Perceptual measures (perceived exertion, thermal comfort) were analyzed using Wilcoxon Signed Ranks Tests. Modification led to an improvement in perceived exertion at 45 min (MOD: 10 ± 1; CON: 11 ± 2; p ≤ 0.001) and 60 min (MOD: 10 ± 2; CON: 12 ± 2; p ≤ 0.001) and a reduction in micro-environment temperature in MOD (1.0 ± 0.2°C, p = 0.03) compared to CON. Modification did not attenuate change in rectal temperature or heart rate (p < 0.01) during 60-min work bout. Change in rectal temperature approached significance between MOD and CON at the end of the work bout (MOD: 0.4 ± 0.2°C; CON: 0.7 ± 0.3°C; p = 0.048). The slope of rectal temperature was significantly greater (p = 0.04) under CON compared to MOD. These data suggest that air induction may provide small benefits while wearing concealed soft body armor, though improvements are needed to lessen physiological strain.

  10. Concealed long QT syndrome and intractable partial epilepsy: a case report.

    PubMed

    Anderson, Jason H; Bos, Johan Martijn; Meyer, Fredric B; Cascino, Gregory D; Ackerman, Michael J

    2012-11-01

    Herein, we describe a patient with concealed type 2 long QT syndrome with concomitant electroencephalogram-documented epilepsy. Although syncope in patients with long QT syndrome is common and often secondary to cerebral hypoxia after a protracted ventricular arrhythmia, this article demonstrates the importance of avoiding "tunnel vision" as patients with long QT syndrome could also have a primary seizure disorder. Identification of the etiology underlying seizurelike activity is paramount in instituting effective therapy. Furthermore, we theorize that abnormal KCHN2-encoded potassium channel repolarization in the brain could result in epilepsy and arrhythmias in long QT syndrome. PMID:23058853

  11. Geometrical configurations of unphased diffraction-limited antennas in passive millimetre-wave imaging systems for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Serenelli, Roberto

    2004-12-01

    This paper analyzes simple imaging configurations to scan a human body, suitable as passive or active millimetre-wave imaging systems for concealed weapon detection (CWD). The first cylindrical configuration allows a 360 degrees scan: N unphased diffraction-limited antennas each of size L are placed on a circular support surrounding the subject (allowing scanning in the horizontal plane with N non-overlapping independent beams), and this circle is mechanically displaced over the whole body height. An analytical formula gives the maximum obtainable spatial resolution for different dimensions of the circular scanning device and operating frequencies, and the number of receivers achieving this optimal resolution. Constraints to be taken into account are diffraction, the usable total length of the circle, and the full coverage by the N beams over the subject, which is modelled as a cylinder with variable radius, coaxial with the scanning circle. Numerical calculations of system resolution are shown for different operating microwave (MW) and millimetre-wave (MMW) frequencies; in order to study off-axis performances, situations where the subject is not coaxial with the scanning device are also considered. For the case of a parallelepiped to be imaged instead of a cylinder, a linear array configuration is analyzed similarly to the circular one. A theoretical study is carried out to design other curved arrays, filled with unphased diffraction-limited antennas, for the imaging of linear subjects with finer resolution. Finally, the application of such configurations is considered for the design of active imaging systems, and different system architectures are discussed.

  12. An algorithm to unveil the inner structure of objects concealed by beam divergence in radiographic image acquisition systems

    SciTech Connect

    Almeida, G. L.; Silvani, M. I.; Lopes, R. T.

    2014-11-11

    Two main parameters rule the performance of an Image Acquisition System, namely, spatial resolution and contrast. For radiographic systems using cone beam arrangements, the farther the source, the better the resolution, but the contrast would diminish due to the lower statistics. A closer source would yield a higher contrast but it would no longer reproduce the attenuation map of the object, as the incoming beam flux would be reduced by unequal large divergences and attenuation factors. This work proposes a procedure to correct these effects when the object is comprised of a hull - or encased in it - possessing a shape capable to be described in analytical geometry terms. Such a description allows the construction of a matrix containing the attenuation factors undergone by the beam from the source until its final destination at each coordinate on the 2D detector. Each matrix element incorporates the attenuation suffered by the beam after its travel through the hull wall, as well as its reduction due to the square of distance to the source and the angle it hits the detector surface. When the pixel intensities of the original image are corrected by these factors, the image contrast, reduced by the overall attenuation in the exposure phase, are recovered, allowing one to see details otherwise concealed due to the low contrast. In order to verify the soundness of this approach, synthetic images of objects of different shapes, such as plates and tubes, incorporating defects and statistical fluctuation, have been generated, recorded for further comparison and afterwards processed to improve their contrast. The developed algorithm which, generates processes and plots the images has been written in Fortran 90 language. As the resulting final images exhibit the expected improvements, it therefore seemed worthwhile to carry out further tests with actual experimental radiographies.

  13. An algorithm to unveil the inner structure of objects concealed by beam divergence in radiographic image acquisition systems

    NASA Astrophysics Data System (ADS)

    Almeida, G. L.; Silvani, M. I.; Lopes, R. T.

    2014-11-01

    Two main parameters rule the performance of an Image Acquisition System, namely, spatial resolution and contrast. For radiographic systems using cone beam arrangements, the farther the source, the better the resolution, but the contrast would diminish due to the lower statistics. A closer source would yield a higher contrast but it would no longer reproduce the attenuation map of the object, as the incoming beam flux would be reduced by unequal large divergences and attenuation factors. This work proposes a procedure to correct these effects when the object is comprised of a hull - or encased in it - possessing a shape capable to be described in analytical geometry terms. Such a description allows the construction of a matrix containing the attenuation factors undergone by the beam from the source until its final destination at each coordinate on the 2D detector. Each matrix element incorporates the attenuation suffered by the beam after its travel through the hull wall, as well as its reduction due to the square of distance to the source and the angle it hits the detector surface. When the pixel intensities of the original image are corrected by these factors, the image contrast, reduced by the overall attenuation in the exposure phase, are recovered, allowing one to see details otherwise concealed due to the low contrast. In order to verify the soundness of this approach, synthetic images of objects of different shapes, such as plates and tubes, incorporating defects and statistical fluctuation, have been generated, recorded for further comparison and afterwards processed to improve their contrast. The developed algorithm which, generates processes and plots the images has been written in Fortran 90 language. As the resulting final images exhibit the expected improvements, it therefore seemed worthwhile to carry out further tests with actual experimental radiographies.

  14. Parasitism rate, parasitoid community composition and host specificity on exposed and semi-concealed caterpillars from a tropical rainforest.

    PubMed

    Hrcek, Jan; Miller, Scott E; Whitfield, James B; Shima, Hiroshi; Novotny, Vojtech

    2013-10-01

    The processes maintaining the enormous diversity of herbivore-parasitoid food webs depend on parasitism rate and parasitoid host specificity. The two parameters have to be evaluated in concert to make conclusions about the importance of parasitoids as natural enemies and guide biological control. We document parasitism rate and host specificity in a highly diverse caterpillar-parasitoid food web encompassing 266 species of lepidopteran hosts and 172 species of hymenopteran or dipteran parasitoids from a lowland tropical forest in Papua New Guinea. We found that semi-concealed hosts (leaf rollers and leaf tiers) represented 84% of all caterpillars, suffered a higher parasitism rate than exposed caterpillars (12 vs. 5%) and their parasitoids were also more host specific. Semi-concealed hosts may therefore be generally more amenable to biological control by parasitoids than exposed ones. Parasitoid host specificity was highest in Braconidae, lower in Diptera: Tachinidae, and, unexpectedly, the lowest in Ichneumonidae. This result challenges the long-standing view of low host specificity in caterpillar-attacking Tachinidae and suggests higher suitability of Braconidae and lower suitability of Ichneumonidae for biological control of caterpillars. Semi-concealed hosts and their parasitoids are the largest, yet understudied component of caterpillar-parasitoid food webs. However, they still remain much closer in parasitism patterns to exposed hosts than to what literature reports on fully concealed leaf miners. Specifically, semi-concealed hosts keep an equally low share of idiobionts (2%) as exposed caterpillars.

  15. Parasitism rate, parasitoid community composition and host specificity on exposed and semi-concealed caterpillars from a tropical rainforest.

    PubMed

    Hrcek, Jan; Miller, Scott E; Whitfield, James B; Shima, Hiroshi; Novotny, Vojtech

    2013-10-01

    The processes maintaining the enormous diversity of herbivore-parasitoid food webs depend on parasitism rate and parasitoid host specificity. The two parameters have to be evaluated in concert to make conclusions about the importance of parasitoids as natural enemies and guide biological control. We document parasitism rate and host specificity in a highly diverse caterpillar-parasitoid food web encompassing 266 species of lepidopteran hosts and 172 species of hymenopteran or dipteran parasitoids from a lowland tropical forest in Papua New Guinea. We found that semi-concealed hosts (leaf rollers and leaf tiers) represented 84% of all caterpillars, suffered a higher parasitism rate than exposed caterpillars (12 vs. 5%) and their parasitoids were also more host specific. Semi-concealed hosts may therefore be generally more amenable to biological control by parasitoids than exposed ones. Parasitoid host specificity was highest in Braconidae, lower in Diptera: Tachinidae, and, unexpectedly, the lowest in Ichneumonidae. This result challenges the long-standing view of low host specificity in caterpillar-attacking Tachinidae and suggests higher suitability of Braconidae and lower suitability of Ichneumonidae for biological control of caterpillars. Semi-concealed hosts and their parasitoids are the largest, yet understudied component of caterpillar-parasitoid food webs. However, they still remain much closer in parasitism patterns to exposed hosts than to what literature reports on fully concealed leaf miners. Specifically, semi-concealed hosts keep an equally low share of idiobionts (2%) as exposed caterpillars. PMID:23463243

  16. When Interference Helps: Increasing Executive Load to Facilitate Deception Detection in the Concealed Information Test

    PubMed Central

    Visu-Petra, George; Varga, Mihai; Miclea, Mircea; Visu-Petra, Laura

    2013-01-01

    The possibility to enhance the detection efficiency of the Concealed Information Test (CIT) by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem), and an RT-based CIT plus a concurrent set-shifting task (CITShift). The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift) was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants). The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior. PMID:23543918

  17. Concealing of facial expressions by a wild Barbary macaque (Macaca sylvanus).

    PubMed

    Thunström, Maria; Kuchenbuch, Paul; Young, Christopher

    2014-07-01

    Behavioural research on non-vocal communication among non-human primates and its possible links to the origin of human language is a long-standing research topic. Because human language is under voluntary control, it is of interest whether this is also true for any communicative signals of other species. It has been argued that the behaviour of hiding a facial expression with one's hand supports the idea that gestures might be under more voluntary control than facial expressions among non-human primates, and it has also been interpreted as a sign of intentionality. So far, the behaviour has only been reported twice, for single gorilla and chimpanzee individuals, both in captivity. Here, we report the first observation of concealing of facial expressions by a monkey, a Barbary macaque (Macaca sylvanus), living in the wild. On eight separate occasions between 2009 and 2011 an adult male was filmed concealing two different facial expressions associated with play and aggression ("play face" and "scream face"), 22 times in total. The videos were analysed in detail, including gaze direction, hand usage, duration, and individuals present. This male was the only individual in his group to manifest this behaviour, which always occurred in the presence of a dominant male. Several possible interpretations of the function of the behaviour are discussed. The observations in this study indicate that the gestural communication and cognitive abilities of monkeys warrant more research attention.

  18. Concealed weapons detection with an improved passive millimeter-wave imager

    NASA Astrophysics Data System (ADS)

    Martin, Christopher A.; Kolinko, Vladimir G.

    2004-08-01

    Trex Enterprises has developed a second-generation passive millimeter-wave imaging system for detection of concealed weapons and explosives at standoff ranges. Passive millimeter-wave sensors form an image from naturally emitted blackbody radiation in the millimeter-wave portion of the electromagnetic spectrum. Radiation at this wavelength passes through most types of clothing, allowing the user to acquire an image of any articles on a suspect"s person that differ significantly from the human body in their reflectivity or radiometric temperature at millimeter-wave wavelengths. Trex Enterprises previously demonstrated a first-generation concealed weapon detection system with the ability to detect handguns and knives under heavy clothing at a range of 27". The second-generation imager, while similar in concept, has an improved field-of-view and a much reduced size and weight. The imager is to be put through a battery of tests by both Trex Enterprises and the National Institute Of Justice to determine its ability to detect both metallic and non-metallic knives and handguns as well as various types of explosive devices. The tests will be conducted indoors and outdoors at various ranges.

  19. Combined Illumination Cylindrical Millimeter-Wave Imaging Technique for Concealed Weapon Detection

    SciTech Connect

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    2000-04-01

    A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30-300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3-D images of the person. After reconstruction, the images are combined into a single high-resolution three-dimensional image of the person under surveillance. This combined image is then rendered using 3-D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operator will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration (FAA).

  20. Combined illumination cylindrical millimeter-wave imaging technique for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    2000-07-01

    A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30 - 300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3D images of the person. After reconstruction, the images are combined into a single high-resolution 3D image of the person under surveillance. This combined image is then rendered using 3D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operate will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration.

  1. Development of a longer range standoff millimetre wave radar concealed threat detector

    NASA Astrophysics Data System (ADS)

    Bowring, Nicholas J.; Southgate, Matthew J.; Andrews, David A.; Rezgui, Nacer D.; Harmer, Stuart W.; O'Reilly, Dean

    2013-05-01

    A millimeter wave (75 - 110 GHz) polarimetric radar system (MiRTLE) has been developed for the detection of threat objects, such as guns, knives, or explosive devices, which have been concealed under clothing upon the human body. The system uses a Gaussian lens antenna to enable operation at stand-off ranges up to 25 meters. By utilizing ultra-wideband Swept Frequency Continuous Wave Radar very high range resolution (~ 10mm) is realized. The system is capable of detecting objects positioned in front of the body and of measuring the range of a target. By interpretation of the scattered waveform, the presence of a wide spectrum of threat items concealed on the human body may be detected. Threat detection is autonomously rendered by application of a neural network to the scattered time domain, polarimetric radar returns and the system may be taught to alarm or reject certain classes of objects; this allows for highly specific or broad spectrum threat detection. The radar system is portable and operator steerable allowing standoff monitoring of moving human targets in real time. Rapid (1ms) sweep times and fast signal acquisition and processing allow decisions to be made at video frame rates (30 fps) and integrated directly to a video feed providing the operator with a field of view and facilitating aiming. Performance parameters for detection of guns and simulated explosive devices are presented for ranges up to 25 meters.

  2. Partner choice through concealed floral sugar rewards evolved with the specialization of ant-plant mutualisms.

    PubMed

    Chomicki, Guillaume; Staedler, Yannick M; Schönenberger, Jürg; Renner, Susanne S

    2016-09-01

    Obligate mutualisms require filtering mechanisms to prevent their exploitation by opportunists, but ecological contexts and traits facilitating the evolution of such mechanisms are largely unknown. We investigated the evolution of filtering mechanisms in an epiphytic ant-plant symbiotic system in Fiji involving Rubiaceae and dolichoderine ants, using field experiments, metabolomics, X-ray micro-computed tomography (micro-CT) scanning and phylogenetics. We discovered a novel plant reward consisting of sugary sap concealed in post-anthetic flowers only accessible to Philidris nagasau workers that bite through the thick epidermis. In five of the six species of Rubiaceae obligately inhabited by this ant, the nectar glands functioned for 10 d after a flower's sexual function was over. Sugar metabolomics and field experiments showed that ant foraging tracks sucrose levels, which only drop at the onset of fruit development. Ontogenetic analyses of our focal species and their relatives revealed a 25-fold increase in nectary size and delayed fruit development in the ant-rewarding species, and Bayesian analyses of several traits showed the correlated evolution of sugar rewards and symbiosis specialization. Concealed floral nectar forestalls exploitation by opportunists (generalist ants) and stabilizes these obligate mutualisms. Our study pinpoints the importance of partner choice mechanisms in transitions from facultative to obligate mutualisms.

  3. Detection of hazardous liquids concealed in glass, plastic, and aluminum containers

    NASA Astrophysics Data System (ADS)

    Ramirez, Michael L.; Ortiz, William; Ruiz, Orlando; Pacheco-Londoño, Leonardo; Hernández-Rivera, Samuel P.

    2007-04-01

    The use of liquid explosives by terrorists has raised the attention to the use of hazardous liquids as threats to people, buildings and transportation systems. Hazardous liquids such as explosive mixtures, flammables or even chemical warfare agents (CWA) can be concealed in common containers and pass security checks undetected. This work presents three non invasive, non destructive detection approaches that can be used to characterize the content of common liquid containers and detect if the liquid is the intended or a concealed hazardous liquid. Fiber optic coupled Raman spectroscopy and Stand off Raman spectroscopy were used to inspect the content of glass and plastic bottles and thermal conductivity was used to asses the liquid inside aluminum cans. Raman spectroscopy experiments were performed at 532 nm, 488 nm and 785 nm excitation wavelengths. The hazardous liquids under consideration included CWA simulant DMMP, hydrogen peroxide, acetone, cyclohexane, ethanol and nitric acid. These techniques have potential use as a detector for hazardous liquids at a check point or to inspect suspicious bottles from a distance.

  4. Noninvasive detection of concealed explosives: depth profiling through opaque plastics by time-resolved Raman spectroscopy.

    PubMed

    Petterson, Ingeborg E Iping; López-López, María; García-Ruiz, Carmen; Gooijer, Cees; Buijs, Joost B; Ariese, Freek

    2011-11-15

    The detection of explosives concealed behind opaque, diffusely scattering materials is a challenge that requires noninvasive analytical techniques for identification without having to manipulate the package. In this context, this study focuses on the application of time-resolved Raman spectroscopy (TRRS) with a picosecond pulsed laser and an intensified charge-coupled device (ICCD) detector for the noninvasive identification of explosive materials through several millimeters of opaque polymers or plastic packaging materials. By means of a short (250 ps) gate which can be delayed several hundred picoseconds after the laser pulse, the ICCD detector allows for the temporal discrimination between photons from the surface of a sample and those from deeper layers. TRRS was applied for the detection of the two main isomers of dinitrotoluene, 2,4-dinitrotoluene, and 2,6-dinitrotoluene as well as for various other components of explosive mixtures, including akardite II, diphenylamine, and ethyl centralite. Spectra were obtained through different diffuse scattering white polymer materials: polytetrafluoroethylene (PTFE), polyoxymethylene (POM), and polyethylene (PE). Common packaging materials of various thicknesses were also selected, including polystyrene (PS) and polyvinyl chloride (PVC). With the demonstration of the ability to detect concealed, explosives-related compounds through an opaque first layer, this study may have important applications in the security and forensic fields.

  5. A map overlay error model based on boundary geometry

    USGS Publications Warehouse

    Gaeuman, D.; Symanzik, J.; Schmidt, J.C.

    2005-01-01

    An error model for quantifying the magnitudes and variability of errors generated in the areas of polygons during spatial overlay of vector geographic information system layers is presented. Numerical simulation of polygon boundary displacements was used to propagate coordinate errors to spatial overlays. The model departs from most previous error models in that it incorporates spatial dependence of coordinate errors at the scale of the boundary segment. It can be readily adapted to match the scale of error-boundary interactions responsible for error generation on a given overlay. The area of error generated by overlay depends on the sinuosity of polygon boundaries, as well as the magnitude of the coordinate errors on the input layers. Asymmetry in boundary shape has relatively little effect on error generation. Overlay errors are affected by real differences in boundary positions on the input layers, as well as errors in the boundary positions. Real differences between input layers tend to compensate for much of the error generated by coordinate errors. Thus, the area of change measured on an overlay layer produced by the XOR overlay operation will be more accurate if the area of real change depicted on the overlay is large. The model presented here considers these interactions, making it especially useful for estimating errors studies of landscape change over time. ?? 2005 The Ohio State University.

  6. Decision makers use norms, not cost-benefit analysis, when choosing to conceal or reveal unfair rewards.

    PubMed

    Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François

    2013-01-01

    We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards. PMID:24066040

  7. Decision Makers Use Norms, Not Cost-Benefit Analysis, When Choosing to Conceal or Reveal Unfair Rewards

    PubMed Central

    Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François

    2013-01-01

    We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards. PMID:24066040

  8. Robust quantum spatial search

    NASA Astrophysics Data System (ADS)

    Tulsi, Avatar

    2016-07-01

    Quantum spatial search has been widely studied with most of the study focusing on quantum walk algorithms. We show that quantum walk algorithms are extremely sensitive to systematic errors. We present a recursive algorithm which offers significant robustness to certain systematic errors. To search N items, our recursive algorithm can tolerate errors of size O(1{/}√{ln N}) which is exponentially better than quantum walk algorithms for which tolerable error size is only O(ln N{/}√{N}). Also, our algorithm does not need any ancilla qubit. Thus our algorithm is much easier to implement experimentally compared to quantum walk algorithms.

  9. Self-concealment, social self-efficacy, acculturative stress, and depression in African, Asian, and Latin American international college students.

    PubMed

    Constantine, Madonna G; Okazaki, Sumie; Utsey, Shawn O

    2004-07-01

    The primary purpose of this exploratory investigation was to examine self-concealment behaviors and social self-efficacy skills as potential mediators in the relationship between acculturative stress and depression in a sample of 320 African, Asian, and Latin American international college students. The authors found several differences by demography with regard to the study's variables. After controlling for regional group membership, sex, and English language fluency, they found that self-concealment and social self-efficacy did not serve as mediators in the relationship between African, Asian, and Latin American international students' acculturative stress experiences and depressive symptomatology. Implications of the findings are discussed.

  10. Scattering suppression from arbitrary objects in spatially dispersive layered metamaterials

    NASA Astrophysics Data System (ADS)

    Shalin, Alexander S.; Ginzburg, Pavel; Orlov, Alexey A.; Iorsh, Ivan; Belov, Pavel A.; Kivshar, Yuri S.; Zayats, Anatoly V.

    2015-03-01

    Concealing objects by making them invisible to an external electromagnetic probe is coined by the term "cloaking." Cloaking devices, having numerous potential applications, are still facing challenges in realization, especially in the visible spectral range. In particular, inherent losses and extreme parameters of metamaterials required for the cloak implementation are the limiting factors. Here, we numerically demonstrate nearly perfect suppression of scattering from arbitrary-shaped objects in spatially dispersive metamaterial acting as an alignment-free concealing cover. We consider a realization of a metamaterial as a metal-dielectric multilayer and demonstrate suppression of scattering from an arbitrary object in forward and backward directions with perfectly preserved wave fronts and less than 10% absolute intensity change, despite spatial dispersion effects present in the composite metamaterial. Beyond the usual scattering suppression applications, the proposed configuration may be used for a simple realization of scattering-free detectors and sensors.

  11. Field error lottery

    NASA Astrophysics Data System (ADS)

    James Elliott, C.; McVey, Brian D.; Quimby, David C.

    1991-07-01

    The level of field errors in a free electron laser (FEL) is an important determinant of its performance. We have computed 3D performance of a large laser subsystem subjected to field errors of various types. These calculations have been guided by simple models such as SWOOP. The technique of choice is use of the FELEX free electron laser code that now possesses extensive engineering capabilities. Modeling includes the ability to establish tolerances of various types: fast and slow scale field bowing, field error level, beam position monitor error level, gap errors, defocusing errors, energy slew, displacement and pointing errors. Many effects of these errors on relative gain and relative power extraction are displayed and are the essential elements of determining an error budget. The random errors also depend on the particular random number seed used in the calculation. The simultaneous display of the performance versus error level of cases with multiple seeds illustrates the variations attributable to stochasticity of this model. All these errors are evaluated numerically for comprehensive engineering of the system. In particular, gap errors are found to place requirements beyond convenient mechanical tolerances of ± 25 μm, and amelioration of these may occur by a procedure using direct measurement of the magnetic fields at assembly time.

  12. Field error lottery

    NASA Astrophysics Data System (ADS)

    Elliott, C. James; McVey, Brian D.; Quimby, David C.

    1990-11-01

    The level of field errors in an FEL is an important determinant of its performance. We have computed 3D performance of a large laser subsystem subjected to field errors of various types. These calculations have been guided by simple models such as SWOOP. The technique of choice is utilization of the FELEX free electron laser code that now possesses extensive engineering capabilities. Modeling includes the ability to establish tolerances of various types: fast and slow scale field bowing, field error level, beam position monitor error level, gap errors, defocusing errors, energy slew, displacement, and pointing errors. Many effects of these errors on relative gain and relative power extraction are displayed and are the essential elements of determining an error budget. The random errors also depend on the particular random number seed used in the calculation. The simultaneous display of the performance versus error level of cases with multiple seeds illustrates the variations attributable to stochasticity of this model. All these errors are evaluated numerically for comprehensive engineering of the system. In particular, gap errors are found to place requirements beyond mechanical tolerances of (plus minus)25(mu)m, and amelioration of these may occur by a procedure utilizing direct measurement of the magnetic fields at assembly time.

  13. Field error lottery

    SciTech Connect

    Elliott, C.J.; McVey, B. ); Quimby, D.C. )

    1990-01-01

    The level of field errors in an FEL is an important determinant of its performance. We have computed 3D performance of a large laser subsystem subjected to field errors of various types. These calculations have been guided by simple models such as SWOOP. The technique of choice is utilization of the FELEX free electron laser code that now possesses extensive engineering capabilities. Modeling includes the ability to establish tolerances of various types: fast and slow scale field bowing, field error level, beam position monitor error level, gap errors, defocusing errors, energy slew, displacement and pointing errors. Many effects of these errors on relative gain and relative power extraction are displayed and are the essential elements of determining an error budget. The random errors also depend on the particular random number seed used in the calculation. The simultaneous display of the performance versus error level of cases with multiple seeds illustrates the variations attributable to stochasticity of this model. All these errors are evaluated numerically for comprehensive engineering of the system. In particular, gap errors are found to place requirements beyond mechanical tolerances of {plus minus}25{mu}m, and amelioration of these may occur by a procedure utilizing direct measurement of the magnetic fields at assembly time. 4 refs., 12 figs.

  14. Intentional retrieval suppression can conceal guilty knowledge in ERP memory detection tests☆

    PubMed Central

    Bergström, Zara M.; Anderson, Michael C.; Buda, Marie; Simons, Jon S.; Richardson-Klavehn, Alan

    2013-01-01

    Brain-activity markers of guilty knowledge have been promoted as accurate and reliable measures for establishing criminal culpability. Tests based on these markers interpret the presence or absence of memory-related neural activity as diagnostic of whether or not incriminating information is stored in a suspect's brain. This conclusion critically relies on the untested assumption that reminders of a crime uncontrollably elicit memory-related brain activity. However, recent research indicates that, in some circumstances, humans can control whether they remember a previous experience by intentionally suppressing retrieval. We examined whether people could use retrieval suppression to conceal neural evidence of incriminating memories as indexed by Event-Related Potentials (ERPs). When people were motivated to suppress crime retrieval, their memory-related ERP effects were significantly decreased, allowing guilty individuals to evade detection. Our findings indicate that brain measures of guilty knowledge may be under criminals’ intentional control and place limits on their use in legal settings. PMID:23664804

  15. Memory instructions, vocalization, mock crimes, and concealed information tests with a polygraph.

    PubMed

    Bradley, M T; Malik, F J; Cullen, M C

    2011-12-01

    Accuracy rates with polygraphs using concealed information tests (CITs) depend on memory for crime details. Some participants read instructions on murdering a dummy victim that specified exact crime details asked on the subsequent CIT. Others read instructions not stating details, but still requiring interaction with the exact same details for the crime. For example, the murder weapon was under four heavy boxes. Instructions stated either "... remove the 4 boxes ..." or "... remove the boxes ..." Thus, each group removed four boxes, but only one group was primed with the number "4" beforehand. In addition, the victim unexpectedly shouted at some participants during the crime. An innocent group was not exposed to either manipulation. Memory, detection scores, and detection rates were lower for guilty participants not primed with details. Sound affected detection scores but not memory, and there was no interaction between the two factors. Information tests are limited by how crime information is received. PMID:22403929

  16. Effects of coping and cooperative instructions on guilty and informed innocents' physiological responses to concealed information.

    PubMed

    Zvi, Liza; Nachson, Israel; Elaad, Eitan

    2012-05-01

    Previous research on the Concealed Information Test indicates that knowledge of the critical information of a given event is sufficient for the elicitation of strong physiological reactions, thus facilitating detection by the test. Other factors that affect the test's efficacy are deceptive verbal responses to the test's questions and motivation of guilty examinees to avoid detection. In the present study effects of coping and cooperative instructions - delivered to guilty and innocent participants - on detection were examined. In a mock-theft experiment guilty participants who actually committed a mock-crime, and informed innocent participants who handled the critical items of the crime in an innocent context, were instructed to adopt either a coping or a cooperative attitude toward the polygraph test. Results indicated that both, guilt and coping behavior, were associated with enhanced physiological responses to the critical information, whereas innocence and cooperative behavior attenuated physiological responses. Theoretical and applied implications of the results are discussed. PMID:22330977

  17. Memory instructions, vocalization, mock crimes, and concealed information tests with a polygraph.

    PubMed

    Bradley, M T; Malik, F J; Cullen, M C

    2011-12-01

    Accuracy rates with polygraphs using concealed information tests (CITs) depend on memory for crime details. Some participants read instructions on murdering a dummy victim that specified exact crime details asked on the subsequent CIT. Others read instructions not stating details, but still requiring interaction with the exact same details for the crime. For example, the murder weapon was under four heavy boxes. Instructions stated either "... remove the 4 boxes ..." or "... remove the boxes ..." Thus, each group removed four boxes, but only one group was primed with the number "4" beforehand. In addition, the victim unexpectedly shouted at some participants during the crime. An innocent group was not exposed to either manipulation. Memory, detection scores, and detection rates were lower for guilty participants not primed with details. Sound affected detection scores but not memory, and there was no interaction between the two factors. Information tests are limited by how crime information is received.

  18. A concealed small bowel perforation in an adult secondary to bicycle handlebar trauma

    PubMed Central

    Nolan, GJ; Simpson, RR

    2013-01-01

    Traumatic abdominal wall hernia (TAWH) secondary to bicycle handlebar is a rare injury. The majority of the literature describes abdominal wall herniation in children. We present a rare case of TAWH in an adult with a concealed small bowel perforation. Although clinical examination in conjunction with computed tomography can exclude the majority of solid organ injuries, small bowel injuries can often be missed. Our case initially revealed a serosal tear in the small bowel but, on close inspection, a separate 3mm perforation was identified, hidden in the small bowel mesentery. We strongly support a low threshold for operative intervention if there is any suspicion. Moreover, we stress the importance of meticulous examination during laparotomy as this injury could have been easily missed, resulting in potential morbidity or mortality in a patient sustaining such an injury. PMID:23676803

  19. Remote concealed weapon detection in millimeter-wave region: active and passive

    NASA Astrophysics Data System (ADS)

    Stanko, Stephan; Klöppel, Frank; Huck, Johann; Nötel, Denis; Hägelen, Manfred; Briese, Gunnar; Gregor, Alexander; Erukulla, Sreenivas; Fuchs, Hans-Hellmuth; Essen, Helmut; Pagels, Anke

    2006-09-01

    Sensors used for Security purposes have to cover the non-invasive inspection of persons, baggage and letters with the aim to detect weapons, explosives and chemical or biological threat material. Currently, emphasis is placed on system concepts and technologies for this type of applications, employing millimeterwave-, submillimeterwave- and terahertz sensors. This is based on the capability of these frequency bands to look through textiles and the possibility to achieve a geometric resolution which is sufficient to resolve critical items within the necessary range. Using multiple frequencies promises to give more detailed information about the structure of the observed objects. Furthermore, to overcome the limitations of passive millimeter- and submillimeterwave sensors which depend on indirect illumination, systems using miniaturized mmw-radar modules are applied as well. This paper describes two approaches for the detection of concealed weapons, the first using a millimeterwave radiometer on a scanner and the second employing a miniaturized radar module based on a synthetic aperture method.

  20. Design of an active millimeter-wave concealed-object imaging system

    NASA Astrophysics Data System (ADS)

    Paulter, Nicholas G.; Grossman, Erich N.; Stenbakken, G. N.; Waltrip, B. C.; Nolen, Shalva; Reintsema, Carl D.

    2001-08-01

    The research and design of an active millimeter-wave concealed object imaging system is described. Several illumination and detection methods were analyzed via computer simulation to assess the effects of system parameters on the signal-to-noise ratio of the detected signal. The results of many of these simulations were experimentally verified using either a 10 MHz or a 100 GHz measurement system. Based on this assessment, two design using pulsed illuminate with gated detection were selected for development. Pulsed illumination is provided using a pulsed broadband noise source. For detecting the reflected noise pulse, two methods were examined, one using micro bolometers and the other using electrooptics. Based on imaging system considerations, such as cost of manufacture, ruggedness, etc., and technical parameters, micro bolometer arrays were selected for further development. The electronics interface, including image display capability, was developed. We examined the absorption of some common clothing materials at 100 Ghz and compared this to results previously reported.

  1. A novel Dual Probe Complex Trial Protocol for detection of concealed information.

    PubMed

    Labkovsky, Elena; Rosenfeld, J Peter

    2014-11-01

    In simply guilty (SG), countermeasure-using guilty (CM), and innocent (IN) subjects, a new concealed information test, the P300-based Dual Probe Complex Trial Protocol was tested in a mock crime scenario. It combines an oddball protocol with two stimuli (probe, irrelevant) and another with three stimuli (probe, irrelevant, target) into one trial, doubling detected mock crime information per unit time, compared to previous protocols. Probe-irrelevant amplitude differences were significant in SG and CM, but not IN subjects. On a measure from both two and three stimulus protocol parts of the Dual Probe Complex Trial Protocol trial, accuracy was 94.7% (based on a .9 bootstrap criterion). The criterion-independent area (AUC) under the receiver operating characteristic (from signal detection theory) measuring SG and CM versus IN discriminability averaged .92 (in a range of 0.5-1.0). Countermeasures enhanced irrelevant (not probe) P300s in CM groups. PMID:24981064

  2. 220GHz wideband 3D imaging radar for concealed object detection technology development and phenomenology studies

    NASA Astrophysics Data System (ADS)

    Robertson, Duncan A.; Macfarlane, David G.; Bryllert, Tomas

    2016-05-01

    We present a 220 GHz 3D imaging `Pathfinder' radar developed within the EU FP7 project CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) which has been built to address two objectives: (i) to de-risk the radar hardware development and (ii) to enable the collection of phenomenology data with ~1 cm3 volumetric resolution. The radar combines a DDS-based chirp generator and self-mixing multiplier technology to achieve a 30 GHz bandwidth chirp with such high linearity that the raw point response is close to ideal and only requires minor nonlinearity compensation. The single transceiver is focused with a 30 cm lens mounted on a gimbal to acquire 3D volumetric images of static test targets and materials.

  3. The human operational sex ratio: effects of marriage, concealed ovulation, and menopause on mate competition.

    PubMed

    Marlowe, Frank W; Berbesque, J Colette

    2012-12-01

    Among mammals, male-male competition for sexual access to females frequently involves fighting. Larger body size gives males an advantage in fighting, which explains why males tend to be larger than females in many species, including anthropoid primates. Mitani et al. derived a formula to measure the operational sex ratio (OSR) to reflect the degree of male-male competition using the number of reproductively available males to females who are cycling and capable of conceiving. The OSR should predict the degree of sexual dimorphism in body mass-at least if male-male competition involves much fighting or threatening. Here, we use hunter-gatherer demographic data and the Mitani et al. formula to calculate the human OSR. We show that humans have a much lower degree of body mass sexual dimorphism than is predicted by our OSR. We suggest this is because human competition rarely involves fighting. In human hunter-gatherer societies, differences in the ages of marriage have an impact on competition in that the age of males at first marriage is younger when there is a lower percentage of married men with two or more wives, and older when there is a higher percentage of married men with two or more wives. We discuss the implications of this for females, along with the effects of two key life history traits that influence the OSR, concealed ovulation and menopause. While menopause decreases the number of reproductively available females to males and thus increases male-male competition, concealed ovulation decreases male-male competition. Finally, we discuss the importance of mostly monogamous mate bonds in human evolution.

  4. New way for both quality enhancement of THz images and detection of concealed objects

    NASA Astrophysics Data System (ADS)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.

    2015-08-01

    As it is well-known, the passive THz camera allows seeing concealed object without contact with a person and this camera is non-dangerous for a person. Obviously, efficiency of using the passive THz camera depends on its temperature resolution. This characteristic specifies possibilities of the detection for concealed object: minimal size of the object; maximal distance of the detection; image quality. Computer processing of the THz image may lead to many times improving of the image quality without any additional engineering efforts. Therefore, developing of modern novel computer code for its application to THz images is urgent problem. Using appropriate new methods one may expect such temperature resolution which will allow to see banknote in pocket of a person without any real contact. Modern algorithms for computer processing of THz images allow also to see object inside the human body using a temperature trace on the human skin. This circumstance enhances essentially opportunity of passive THz camera applications for counterterrorism problems. We developed new real-time algorithm, based on the correlation function, for the detection of cancelled objects by using computer processing of the passive THz images without their viewing. This algorithm allows us to make a conclusion about presence of forbidden objects on the human body. To see this object with high quality we propose one more algorithm which allows to increase the image quality. Current approach for computer processing of the THz images differs from approaches developed by us early. We apply new algorithms with success to the images captured by passive THz camera TS4 manufactured by ThruVision Inc. The distance between the camera and person is changed from 4 to 10 metres.

  5. Concealed Fertility and Extended Female Sexuality in a Non-Human Primate (Macaca assamensis)

    PubMed Central

    Fürtbauer, Ines; Heistermann, Michael; Schülke, Oliver; Ostner, Julia

    2011-01-01

    In numerous primates living in mixed-sex groups, females display probabilistic cues of fertility to simultaneously concentrate paternity to dominant males while diluting it amongst others as a means to reduce the risk of infanticide and to increase male care for offspring. A few species, however, lack these cues and potentially conceal fertility from males; yet, to date, little is known about mating patterns and their underlying proximate mechanisms in such species. Here, we investigated mating activity and sexual consortships relative to female reproductive state in wild Assamese macaques (Macaca assamensis), a species where females lack prominent anogenital swellings and copulation calls. During two mating seasons (2837 contact hours) we recorded sexual and social behaviors, sexual consortships, and collected 1178 fecal samples (n = 15 females) which were analyzed for progestogen concentrations to assess female reproductive state and to determine the timing of ovulation and conception. Although mostly conceiving in their first ovarian cycle, females were sexually receptive throughout the entire 4-month mating season, and within-cycle mating frequencies were not increased during fertile phases. Dominant males did not monopolize fertile matings, and consortships by high-ranking males lasted for long periods, which were not exclusively linked to female fertile phases. Furthermore, females copulated promiscuously but not randomly, i.e. for almost every female, matings were concentrated to a certain male, irrespective of male rank. Collectively, we demonstrate that fertility is undisclosed to males. The extreme extended female sexuality facilitated by concealed fertility may allow females to create differentiated mating relationships within a promiscuous mating system. Our study provides important new insight into the plasticity of female sexuality in non-human primates. PMID:21853074

  6. Enhanced terahertz imaging system performance analysis and design tool for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Franck, Charmaine C.; Espinola, Richard L.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.

    2011-11-01

    The U.S. Army Research Laboratory (ARL) and the U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) have developed a terahertz-band imaging system performance model/tool for detection and identification of concealed weaponry. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security & Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). This paper will provide a comprehensive review of an enhanced, user-friendly, Windows-executable, terahertz-band imaging system performance analysis and design tool that now includes additional features such as a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures. This newly enhanced THz imaging system design tool is an extension of the advanced THz imaging system performance model that was developed under the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will also provide example system component (active-illumination source and detector) trade-study analyses using the new features of this user-friendly THz imaging system performance analysis and design tool.

  7. P300 amplitudes in the concealed information test are less affected by depth of processing than electrodermal responses

    PubMed Central

    Gamer, Matthias; Berti, Stefan

    2012-01-01

    The Concealed Information Test (CIT) has been used in the laboratory as well as in field applications to detect concealed crime related memories. The presentation of crime relevant details to guilty suspects has been shown to elicit enhanced N200 and P300 amplitudes of the event-related brain potentials (ERPs) as well as greater skin conductance responses (SCRs) as compared to neutral test items. These electrophysiological and electrodermal responses were found to incrementally contribute to the validity of the test, thereby suggesting that these response systems are sensitive to different psychological processes. In the current study, we tested whether depth of processing differentially affects N200, P300, and SCR amplitudes in the CIT. Twenty participants carried out a mock crime and became familiar with central and peripheral crime details. A CIT that was conducted 1 week later revealed that SCR amplitudes were larger for central details although central and peripheral items were remembered equally well in a subsequent explicit memory test. By contrast, P300 amplitudes elicited by crime related details were larger but did not differ significantly between question types. N200 amplitudes did not allow for detecting concealed knowledge in this study. These results indicate that depth of processing might be one factor that differentially affects central and autonomic nervous system responses to concealed information. Such differentiation might be highly relevant for field applications of the CIT. PMID:23162454

  8. [Cardioversion for paroxysmal supraventricular tachycardia during lung surgery in a patient with concealed Wolff-Parkinson-White syndrome].

    PubMed

    Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji

    2014-10-01

    We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.

  9. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally Bisexual Men

    ERIC Educational Resources Information Center

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J., Jr.; Parsons, Jeffrey T.

    2013-01-01

    Objective: Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may…

  10. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    ERIC Educational Resources Information Center

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  11. Geochemical Data for Samples Collected in 2008 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    USGS Publications Warehouse

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2009-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molybdenum deposit. This report presents the analytical data collected in 2008. The Pebble deposit is world class in size, and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic rocks. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, is relatively undisturbed (except for exploration company drill holes), is a large mineral system, and is fairly well-constrained at depth by the drill hole geology and geochemistry. The goals of this study are to 1) determine whether the concealed deposit can be detected with surface samples, 2) better understand the processes of metal migration from the deposit to the surface, and 3) test and develop methods for assessing mineral resources in similar concealed terrains. The analytical data are presented as an integrated Microsoft Access 2003 database and as separate Excel files.

  12. Accepting error to make less error.

    PubMed

    Einhorn, H J

    1986-01-01

    In this article I argue that the clinical and statistical approaches rest on different assumptions about the nature of random error and the appropriate level of accuracy to be expected in prediction. To examine this, a case is made for each approach. The clinical approach is characterized as being deterministic, causal, and less concerned with prediction than with diagnosis and treatment. The statistical approach accepts error as inevitable and in so doing makes less error in prediction. This is illustrated using examples from probability learning and equal weighting in linear models. Thereafter, a decision analysis of the two approaches is proposed. Of particular importance are the errors that characterize each approach: myths, magic, and illusions of control in the clinical; lost opportunities and illusions of the lack of control in the statistical. Each approach represents a gamble with corresponding risks and benefits.

  13. Inborn errors of metabolism

    MedlinePlus

    Metabolism - inborn errors of ... Bodamer OA. Approach to inborn errors of metabolism. In: Goldman L, Schafer AI, eds. Goldman's Cecil Medicine . 25th ed. Philadelphia, PA: Elsevier Saunders; 2015:chap 205. Rezvani I, Rezvani G. An ...

  14. Drug Errors in Anaesthesiology

    PubMed Central

    Jain, Rajnish Kumar; Katiyar, Sarika

    2009-01-01

    Summary Medication errors are a leading cause of morbidity and mortality in hospitalized patients. The incidence of these drug errors during anaesthesia is not certain. They impose a considerable financial burden to health care systems apart from the patient losses. Common causes of these errors and their prevention is discussed. PMID:20640103

  15. Error dynamics in shell models for turbulence

    NASA Astrophysics Data System (ADS)

    De Cruz, Lesley; Vannitsem, Stéphane

    2013-04-01

    A deep understanding of the error dynamics in turbulent systems is crucial to estimate the horizon of predictability, and to quantify the impact of initial-condition (IC) and model errors on the statistical characteristics of ensemble prediction systems. We present a study of the dynamics of combined IC and model errors in a turbulent system. We use the Sabra shell model [1], a spectral model which captures the characteristic properties of a turbulent system using a low number of variables (of the order of 50). The analytical properties of the short-term error dynamics in the Sabra shell model are investigated using the methodology described in Ref. [2], and compared to numerical results. Of particular interest is the property of a dissipative system that the mean squared error (MSE) reaches a minimum shortly after the introduction of an IC error. The distribution of the minimum-error times is investigated, and the spatial-scale dependence of the error dynamics is discussed. At longer time scales, our simulations confirm the well-known fact that an arbitrarily small error in the initial conditions contaminates the integral scale in a time that is independent of the scale of the initial error. Finally, we report on the error dynamics in the presence of a crossover between 3D and 2D turbulence, known to characterise the atmosphere. References [1] V. S. L'vov, E. Podivilov, A. Pomyalov, I. Procaccia, and D. Vandembroucq. Improved shell model of turbulence. Physical Review E, 58:1811-1822, August 1998. [2] C. Nicolis, R. A. P. Perdigao, and S. Vannitsem. Dynamics of Prediction Errors under the Combined Effect of Initial Condition and Model Errors. Journal of Atmospheric Sciences, 66:766, 2009.

  16. [Medical errors in obstetrics].

    PubMed

    Marek, Z

    1984-08-01

    Errors in medicine may fall into 3 main categories: 1) medical errors made only by physicians, 2) technical errors made by physicians and other health care specialists, and 3) organizational errors associated with mismanagement of medical facilities. This classification of medical errors, as well as the definition and treatment of them, fully applies to obstetrics. However, the difference between obstetrics and other fields of medicine stems from the fact that an obstetrician usually deals with healthy women. Conversely, professional risk in obstetrics is very high, as errors and malpractice can lead to very serious complications. Observations show that the most frequent obstetrical errors occur in induced abortions, diagnosis of pregnancy, selection of optimal delivery techniques, treatment of hemorrhages, and other complications. Therefore, the obstetrician should be prepared to use intensive care procedures similar to those used for resuscitation.

  17. Note on apparent systematic and periodic errors in Geosat orbits

    NASA Technical Reports Server (NTRS)

    Sirkes, Ziv; Wunsch, Carl

    1990-01-01

    Apparent errors in Geosat orbits are estimated directly from the measurements. There are technical difficulties in such estimates from quasi-periodically gapped data. The dominant orbit errors display a line spectrum, in which the once/orbit error peak is split in a complex way into a series of narrow lines, with other errors being present as well. The spatial pattern of the errors is not random, displaying differences between mean ascending and descending orbits which are coherent over thousands of kilometers. Orbit errors do not decorrelate within a few orbit periods.

  18. Aircraft system modeling error and control error

    NASA Technical Reports Server (NTRS)

    Kulkarni, Nilesh V. (Inventor); Kaneshige, John T. (Inventor); Krishnakumar, Kalmanje S. (Inventor); Burken, John J. (Inventor)

    2012-01-01

    A method for modeling error-driven adaptive control of an aircraft. Normal aircraft plant dynamics is modeled, using an original plant description in which a controller responds to a tracking error e(k) to drive the component to a normal reference value according to an asymptote curve. Where the system senses that (1) at least one aircraft plant component is experiencing an excursion and (2) the return of this component value toward its reference value is not proceeding according to the expected controller characteristics, neural network (NN) modeling of aircraft plant operation may be changed. However, if (1) is satisfied but the error component is returning toward its reference value according to expected controller characteristics, the NN will continue to model operation of the aircraft plant according to an original description.

  19. Dimensional jump in quantum error correction

    NASA Astrophysics Data System (ADS)

    Bombín, Héctor

    2016-04-01

    Topological stabilizer codes with different spatial dimensions have complementary properties. Here I show that the spatial dimension can be switched using gauge fixing. Combining 2D and 3D gauge color codes in a 3D qubit lattice, fault-tolerant quantum computation can be achieved with constant time overhead on the number of logical gates, up to efficient global classical computation, using only local quantum operations. Single-shot error correction plays a crucial role.

  20. Software error detection

    NASA Technical Reports Server (NTRS)

    Buechler, W.; Tucker, A. G.

    1981-01-01

    Several methods were employed to detect both the occurrence and source of errors in the operational software of the AN/SLQ-32. A large embedded real time electronic warfare command and control system for the ROLM 1606 computer are presented. The ROLM computer provides information about invalid addressing, improper use of privileged instructions, stack overflows, and unimplemented instructions. Additionally, software techniques were developed to detect invalid jumps, indices out of range, infinte loops, stack underflows, and field size errors. Finally, data are saved to provide information about the status of the system when an error is detected. This information includes I/O buffers, interrupt counts, stack contents, and recently passed locations. The various errors detected, techniques to assist in debugging problems, and segment simulation on a nontarget computer are discussed. These error detection techniques were a major factor in the success of finding the primary cause of error in 98% of over 500 system dumps.

  1. Error detection method

    DOEpatents

    Olson, Eric J.

    2013-06-11

    An apparatus, program product, and method that run an algorithm on a hardware based processor, generate a hardware error as a result of running the algorithm, generate an algorithm output for the algorithm, compare the algorithm output to another output for the algorithm, and detect the hardware error from the comparison. The algorithm is designed to cause the hardware based processor to heat to a degree that increases the likelihood of hardware errors to manifest, and the hardware error is observable in the algorithm output. As such, electronic components may be sufficiently heated and/or sufficiently stressed to create better conditions for generating hardware errors, and the output of the algorithm may be compared at the end of the run to detect a hardware error that occurred anywhere during the run that may otherwise not be detected by traditional methodologies (e.g., due to cooling, insufficient heat and/or stress, etc.).

  2. The Error in Total Error Reduction

    PubMed Central

    Witnauer, James E.; Urcelay, Gonzalo P.; Miller, Ralph R.

    2013-01-01

    Most models of human and animal learning assume that learning is proportional to the discrepancy between a delivered outcome and the outcome predicted by all cues present during that trial (i.e., total error across a stimulus compound). This total error reduction (TER) view has been implemented in connectionist and artificial neural network models to describe the conditions under which weights between units change. Electrophysiological work has revealed that the activity of dopamine neurons is correlated with the total error signal in models of reward learning. Similar neural mechanisms presumably support fear conditioning, human contingency learning, and other types of learning. Using a computational modelling approach, we compared several TER models of associative learning to an alternative model that rejects the TER assumption in favor of local error reduction (LER), which assumes that learning about each cue is proportional to the discrepancy between the delivered outcome and the outcome predicted by that specific cue on that trial. The LER model provided a better fit to the reviewed data than the TER models. Given the superiority of the LER model with the present data sets, acceptance of TER should be tempered. PMID:23891930

  3. Model Error Budgets

    NASA Technical Reports Server (NTRS)

    Briggs, Hugh C.

    2008-01-01

    An error budget is a commonly used tool in design of complex aerospace systems. It represents system performance requirements in terms of allowable errors and flows these down through a hierarchical structure to lower assemblies and components. The requirements may simply be 'allocated' based upon heuristics or experience, or they may be designed through use of physics-based models. This paper presents a basis for developing an error budget for models of the system, as opposed to the system itself. The need for model error budgets arises when system models are a principle design agent as is increasingly more common for poorly testable high performance space systems.

  4. Mobile TNA system to detect explosives and drugs concealed in cars and trucks

    NASA Astrophysics Data System (ADS)

    Bendahan, Joseph; Gozani, Tsahi

    1998-12-01

    The drug problem in the U.S. is serious and efforts to fight it are constrained by the lack of adequate means to curb the inflow of smuggled narcotics into the country through cargo containers. Also, events such as the disastrous explosion in Oklahoma City, the IRA bombing in London, and the bombing of the U.S. military residence in Dharan make the development of new tools for the detection of explosives and drugs in vehicles imperative. Thermal neutron analysis (TNA) technology, developed for the detection of explosives in suitcases, and detection of landmines and unexploded ordnance is presently being applied to the nonintrusive detection of significant amounts of explosives and drugs concealed in cars, trucks and large cargo containers. TNA technology is based on the analysis of characteristic gamma rays emitted following thermal neutron capture. A TNA system can be used in a variety of operational scenarios, such as inspection before an unloaded cargo container from a spit is moved to temporary storage, inspection of trucks unloaded from a ferry, or inspection of vehicles parked close to Federal building or military bases. This paper will discuss the detection process and operational scenarios, and will present results from recent simulations and measurements.

  5. Paternal signature in kin recognition cues of a social insect: concealed in juveniles, revealed in adults

    PubMed Central

    Wong, Janine W. Y.; Meunier, Joël; Lucas, Christophe; Kölliker, Mathias

    2014-01-01

    Kin recognition is a key mechanism to direct social behaviours towards related individuals or avoid inbreeding depression. In insects, recognition is generally mediated by cuticular hydrocarbon (CHC) compounds, which are partly inherited from parents. However, in social insects, potential nepotistic conflicts between group members from different patrilines are predicted to select against the expression of patriline-specific signatures in CHC profiles. Whereas this key prediction in the evolution of insect signalling received empirical support in eusocial insects, it remains unclear whether it can be generalized beyond eusociality to less-derived forms of social life. Here, we addressed this issue by manipulating the number of fathers siring clutches tended by females of the European earwig, Forficula auricularia, analysing the CHC profiles of the resulting juvenile and adult offspring, and using discriminant analysis to estimate the information content of CHC with respect to the maternal and paternal origin of individuals. As predicted, if paternally inherited cues are concealed during family life, increases in mating number had no effect on information content of CHC profiles among earwig juveniles, but significantly decreased the one among adult offspring. We suggest that age-dependent expression of patriline-specific cues evolved to limit the risks of nepotism as family-living juveniles and favour sibling-mating avoidance as group-living adults. These results highlight the role of parental care and social life in the evolution of chemical communication and recognition cues. PMID:25165768

  6. Detection and classification of concealed weapons using a magnetometer-based portal

    NASA Astrophysics Data System (ADS)

    Kotter, Dale K.; Roybal, Lyle G.; Polk, Robert E.

    2002-08-01

    A concealed weapons detection technology was developed through the support of the National Institute of Justice (NIJ) to provide a non intrusive means for rapid detection, location, and archiving of data (including visual) of potential suspects and weapon threats. This technology, developed by the Idaho National Engineering and Environmental Laboratory (INEEL), has been applied in a portal style weapons detection system using passive magnetic sensors as its basis. This paper will report on enhancements to the weapon detection system to enable weapon classification and to discriminate threats from non-threats. Advanced signal processing algorithms were used to analyze the magnetic spectrum generated when a person passes through a portal. These algorithms analyzed multiple variables including variance in the magnetic signature from random weapon placement and/or orientation. They perform pattern recognition and calculate the probability that the collected magnetic signature correlates to a known database of weapon versus non-weapon responses. Neural networks were used to further discriminate weapon type and identify controlled electronic items such as cell phones and pagers. False alarms were further reduced by analyzing the magnetic detector response by using a Joint Time Frequency Analysis digital signal processing technique. The frequency components and power spectrum for a given sensor response were derived. This unique fingerprint provided additional information to aid in signal analysis. This technology has the potential to produce major improvements in weapon detection and classification.

  7. Grossly calcified choroid plexus concealing foramen of Monro meningiomas as an unusual cause of obstructive hydrocephalus

    PubMed Central

    Kawaguchi, Tomohiro; Fujimura, Miki; Tominaga, Teiji

    2016-01-01

    Various intraventricular tumors can present with calcifications; however, the choroid plexus can also have physiological calcifications. This is the first case report of meningiomas located at the bilateral foramen of Monro (FOM), concealed by a grossly calcified choroid plexus, presenting with obstructive hydrocephalus. A 60-year-old woman with disturbed consciousness was admitted by ambulance. Head computed tomography revealed significantly high-density lesions that smoothly extended from the choroid plexus of the lateral ventricles to the third ventricle. They occupied both sides of the FOM, resulting in obstructive hydrocephalus. The diagnostic endoscopic biopsy was performed using a flexible neuroendoscopic system, and an egg shell-like grossly calcified choroid plexus was found to smoothly extend toward the FOM. Resection was not selected because the calcified lesions had tightly adhered to the veins and fornix; therefore, the patient underwent ventriculo-peritoneal shunting. The lesions were histologically identified as psammomatous meningiomas with low proliferation potential (the Ki-67 labeling index was lower than 1%). She was discharged 10 days after surgery without neurological deficits. As calcifications can have tumoral and nontumoral origins, we considered neuroendoscopic exploration to be essential in order to achieve an accurate diagnosis and select optimal management. PMID:26889294

  8. 'The vagina does not talk': conception concealed or deliberately disclosed in eastern Cameroon.

    PubMed

    van der Sijpt, Erica

    2012-01-01

    In the East Province of Cameroon, respectable womanhood has long been intrinsically related to ethics of production and reproduction: women attain social standing through productive work in the fields and through the reproduction of children - preferably within a marital setting. Yet, in the face of current alternative 'horizons of honour' such as schooling, employment or relationships with rich urban men, women's intentions with regard to marriage and motherhood acquire different meanings. On their pathways to urban forms of honour, formal engagements and childbearing are often postponed, while premarital sexual encounters proliferate. This paper explores the meanings of pregnancy within the context of these fragile relationships and women's urban aspirations; fertility will be shown to be a 'bet' that may either disrupt or stabilize urban affairs and ambitions. As such, pregnancies can be strategically anticipated and deliberately disclosed or unexpectedly encountered and secretly disrupted. This paper sheds light on women's strategies of concealment and disclosure of pregnancies and shows that these practices are often inspired by a notion of the 'right timing' of particular reproductive conjunctures - a notion that is of increasing relevance in current frames of female honour in Cameroon. PMID:22118422

  9. Psychophysiological detection of concealed information shared by groups: an empirical study of the searching CIT.

    PubMed

    Breska, Assaf; Zaidenberg, Daphna; Gronau, Nurit; Ben-Shakhar, Gershon

    2014-06-01

    This study focused on the application of the Concealed Information Test (CIT) to situations in which the crime-related information is shared by a group of suspects but is not available to the investigators (a method known as the "searching CIT," or SCIT). Twenty-two groups, each comprising 4 to 7 participants (115 in total), planned 1 of 2 mock crimes (kidnapping or bank robbery). While planning the crime, each group decided on 5 crime-related critical items (e.g., the city in which the bank was located). Each critical item was chosen from a predefined set of 4 alternatives. At a second stage, the SCIT was administered individually and each participant was tested on the 2 crimes-the actual planned crime, in which the participant was "guilty," and the unplanned crime, in which the participant was "innocent." Two algorithms, adopted from Breska, Ben-Shakhar, and Gronau (2012), were applied to detect the critical items and to differentiate between "guilty" and "innocent" participants. Findings revealed that differentiation efficiency based on electrodermal and respiration measures was identical to that obtained with the standard CIT when applied to large groups, but lower, although significantly greater than chance, when applied to differentiate between small groups.

  10. Investigation of late time response analysis for detection of multiple concealed objects

    NASA Astrophysics Data System (ADS)

    Hutchinson, Simon; Fernando, Michael; Andrews, David; Harmer, Stuart; Bowring, Nicholas

    2013-10-01

    This paper investigates the use of Late Time Response (LTR) analysis for detecting multiple objects in concealed object detection. When a conductive object is illuminated by an ultra-wide band (UWB) frequency radar signal, the surface currents induced upon the object give rise to LTR signals. The LTR results from a number of different targets are presented. The distance between the targets within the same radar beam has been adjusted in increments of 5cm to determine the point at which the individual objects can be distinguished from each other. The experiment was performed using double ridged horn antennas in a pseudo-monostatic arrangement. Vector network analysers (VNA) are used to provide the UWB stepped frequency continuous wave radar signal. The distance between the transmitting antenna and the target object is kept at 50cm for all the experiments performed and the power level at the VNA was set to 2dBm. The targets in the experimental setup are suspended in isolation in a non-anechoic environment. To allow for the de-convolution of the signal and the removal of background clutter Matlab was used in post processing. The Fast Fourier Transform (FFT) and Continuous Wavelet Transform (CWT) are used to process the return signals and extract the LTR features from the noise clutter. A Generalized Pencil-of-Function (GPOF) method was then used to extract the complex poles of the signal. In the case of a single needle these poles can be found around 1.9GHz.

  11. Effect of Temperature and Moisture on the Development of Concealed Damage in Raw Almonds (Prunus dulcis).

    PubMed

    Rogel-Castillo, Cristian; Zuskov, David; Chan, Bronte Lee; Lee, Jihyun; Huang, Guangwei; Mitchell, Alyson E

    2015-09-23

    Concealed damage (CD) is a brown discoloration of nutmeat that appears only after kernels are treated with moderate heat (e.g., roasting). Identifying factors that promote CD in almonds is of significant interest to the nut industry. Herein, the effect of temperature (35 and 45 °C) and moisture (<5, 8, and 11%) on the composition of volatiles in raw almonds (Prunus dulcis var. Nonpareil) was studied using HS-SPME-GC/MS. A CIE LCh colorimetric method was developed to identify raw almonds with CD. A significant increase in CD was demonstrated in almonds exposed to moisture (8% kernel moisture content) at 45 °C as compared to 35 °C. Elevated levels of volatiles related to lipid peroxidation and amino acid degradation were observed in almonds with CD. These results suggest that postharvest moisture exposure resulting in an internal kernel moisture ≥ 8% is a key factor in the development of CD in raw almonds and that CD is accelerated by temperature.

  12. Effect of Temperature and Moisture on the Development of Concealed Damage in Raw Almonds (Prunus dulcis).

    PubMed

    Rogel-Castillo, Cristian; Zuskov, David; Chan, Bronte Lee; Lee, Jihyun; Huang, Guangwei; Mitchell, Alyson E

    2015-09-23

    Concealed damage (CD) is a brown discoloration of nutmeat that appears only after kernels are treated with moderate heat (e.g., roasting). Identifying factors that promote CD in almonds is of significant interest to the nut industry. Herein, the effect of temperature (35 and 45 °C) and moisture (<5, 8, and 11%) on the composition of volatiles in raw almonds (Prunus dulcis var. Nonpareil) was studied using HS-SPME-GC/MS. A CIE LCh colorimetric method was developed to identify raw almonds with CD. A significant increase in CD was demonstrated in almonds exposed to moisture (8% kernel moisture content) at 45 °C as compared to 35 °C. Elevated levels of volatiles related to lipid peroxidation and amino acid degradation were observed in almonds with CD. These results suggest that postharvest moisture exposure resulting in an internal kernel moisture ≥ 8% is a key factor in the development of CD in raw almonds and that CD is accelerated by temperature. PMID:26320359

  13. Systematic changes in tonic physiological activities during the Concealed Information Test.

    PubMed

    Ogawa, Tokihiro; Matsuda, Izumi; Hirota, Akihisa; Takasawa, Noriyoshi

    2014-12-01

    Many studies on the Concealed Information Test have focused on phasic physiological changes that are temporally locked to stimulus presentation. However, little is known about changes in tonic, basal physiological levels throughout a stimulus series. This study focused on changes in tonic physiological activities during the CIT. Thirty-nine participants carried out a mock theft and subsequently received a CIT. Skin conductance, heart rate, and normalized pulse volume (NPV) were recorded. The pre-stimulus physiological level of these measures throughout the CIT series was compared across a question series with different serial positions of the relevant item. Results showed that changes in the pre-stimulus level differed depending on the serial position of the relevant item. Skin conductance declined throughout the series, but showed a transient increase after relevant item presentation. Heart rate was relatively constant throughout the series, but decreased after relevant item presentation. NPV continued to decrease until the relevant item, but increased thereafter, indicating a pattern similar to the classic Peak of Tension concept. In addition, the pre-stimulus NPV showed a significant relevant-irrelevant difference. Theoretical and practical implications of these findings are discussed. PMID:25152172

  14. Psychophysiological detection of concealed information shared by groups: an empirical study of the searching CIT.

    PubMed

    Breska, Assaf; Zaidenberg, Daphna; Gronau, Nurit; Ben-Shakhar, Gershon

    2014-06-01

    This study focused on the application of the Concealed Information Test (CIT) to situations in which the crime-related information is shared by a group of suspects but is not available to the investigators (a method known as the "searching CIT," or SCIT). Twenty-two groups, each comprising 4 to 7 participants (115 in total), planned 1 of 2 mock crimes (kidnapping or bank robbery). While planning the crime, each group decided on 5 crime-related critical items (e.g., the city in which the bank was located). Each critical item was chosen from a predefined set of 4 alternatives. At a second stage, the SCIT was administered individually and each participant was tested on the 2 crimes-the actual planned crime, in which the participant was "guilty," and the unplanned crime, in which the participant was "innocent." Two algorithms, adopted from Breska, Ben-Shakhar, and Gronau (2012), were applied to detect the critical items and to differentiate between "guilty" and "innocent" participants. Findings revealed that differentiation efficiency based on electrodermal and respiration measures was identical to that obtained with the standard CIT when applied to large groups, but lower, although significantly greater than chance, when applied to differentiate between small groups. PMID:24564513

  15. Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements.

    PubMed

    Iwasaki, Miho; Noguchi, Yasuki

    2016-02-26

    When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions.

  16. Detection of contraband concealed on the body using x-ray imaging

    NASA Astrophysics Data System (ADS)

    Smith, Gerald J.

    1997-01-01

    In an effort to avoid detection, smugglers and terrorists are increasingly using the body as a vehicle for transporting illicit drugs, weapons, and explosives. This trend illustrates the natural tendency of traffickers to seek the path of least resistance, as improved interdiction technology and operational effectiveness have been brought to bear on other trafficking avenues such as luggage, cargo, and parcels. In response, improved technology for human inspection is being developed using a variety of techniques. ASE's BodySearch X-ray Inspection Systems uses backscatter x-ray imaging of the human body to quickly, safely, and effectively screen for drugs, weapons, and explosives concealed on the body. This paper reviews the law enforcement and social issues involved in human inspections, and briefly describes the ASE BodySearch systems. Operator training, x-ray image interpretation, and maximizing systems effectiveness are also discussed. Finally, data collected from operation of the BodySearch system in the field is presented, and new law enforcement initiatives which have come about due to recent events are reviewed.

  17. The caregiving bind: concealing the demands of informal care can undermine the caregiving identity.

    PubMed

    Moore, Helen; Gillespie, Alex

    2014-09-01

    Disagreements and misunderstandings between informal caregivers and care-receivers have been widely reported, but the causes are unclear. The present article compares the views of people with acquired brain injury and their main informal caregivers (28 dyads, n = 56). First, we report a quantitative analysis finding that the majority of disagreements were about caregivers' identity. Caregivers saw themselves as less confident, less intelligent, more embarrassed, more independent and more overprotective than care-receivers rated them to be. Caregivers understood the care-receivers' ratings but disagreed with them' Second, we report a qualitative analysis focussing on how caregivers felt themselves to be perceived by significant others. Caregivers felt that the care-receiver, family members, the general public, health services and even friends often have negative views of them. The 'caregiving bind' is proposed as a cause of caregivers' negative identity. It arises when caregivers try to protect the care-receiver's identity by concealing the extent of informal care provision, with the unintended consequence of undermining the prospects of the caregiver receiving positive social recognition for the challenging work of caregiving. The caregiving bind has implications for therapy and points to the potential of friends and health services to provide caregivers with positive social recognition. PMID:24996218

  18. Paternal signature in kin recognition cues of a social insect: concealed in juveniles, revealed in adults.

    PubMed

    Wong, Janine W Y; Meunier, Joël; Lucas, Christophe; Kölliker, Mathias

    2014-10-22

    Kin recognition is a key mechanism to direct social behaviours towards related individuals or avoid inbreeding depression. In insects, recognition is generally mediated by cuticular hydrocarbon (CHC) compounds, which are partly inherited from parents. However, in social insects, potential nepotistic conflicts between group members from different patrilines are predicted to select against the expression of patriline-specific signatures in CHC profiles. Whereas this key prediction in the evolution of insect signalling received empirical support in eusocial insects, it remains unclear whether it can be generalized beyond eusociality to less-derived forms of social life. Here, we addressed this issue by manipulating the number of fathers siring clutches tended by females of the European earwig, Forficula auricularia, analysing the CHC profiles of the resulting juvenile and adult offspring, and using discriminant analysis to estimate the information content of CHC with respect to the maternal and paternal origin of individuals. As predicted, if paternally inherited cues are concealed during family life, increases in mating number had no effect on information content of CHC profiles among earwig juveniles, but significantly decreased the one among adult offspring. We suggest that age-dependent expression of patriline-specific cues evolved to limit the risks of nepotism as family-living juveniles and favour sibling-mating avoidance as group-living adults. These results highlight the role of parental care and social life in the evolution of chemical communication and recognition cues.

  19. Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements

    PubMed Central

    Iwasaki, Miho; Noguchi, Yasuki

    2016-01-01

    When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions. PMID:26915796

  20. Living at Risk: Concealing Risk and Preserving Hope in Huntington Disease

    PubMed Central

    Sims, Sharon L.; Swenson, Melinda M.; Harrison, Joan M.; Moskowitz, Carol; Stepanov, Nonna; Suter, Gregory W.; Westphal, Beryl J.

    2013-01-01

    Much of the qualitative research on Huntington disease has focused on the genetic testing aspects of HD. The overall purpose of this qualitative study was to gather information about the everyday experience of living with the risk of developing Huntington disease in a sample of individuals at risk for HD who have chosen not to pursue genetic testing. Data for this article was obtained from unstructured, open-ended qualitative interviews of a sample of people participating in the PHAROS study. PHAROS, the Prospective Huntington At-Risk Observational Study, is a multi-site study that aims to establish whether experienced clinicians can reliably determine the earliest clinical symptoms of Huntington disease in individuals at 50% risk for HD who have chosen not to undergo genetic testing. Interviews were conducted at six PHAROS research sites across the United States. In this paper, the research team used qualitative description to construct and explore two main themes: (1) careful concealment of risk as an act of self-preservation and (2) preserving hope. PMID:17943424

  1. Atrioventricular reciprocal rhythm and chronic reciprocating tachycardia in a newborn infant with concealed Wolff-Parkinson-White syndrome.

    PubMed Central

    Sung, R J; Ferrer, P; Garcia, O L; Castellanos, A; Gelband, H

    1977-01-01

    A case of atrioventricular reciprocal rhythm and chronic reciprocating tachycardia in a newborn infant is presented. Electrophysiological studies suggest that these rhythm disturbances are related to the presence of a right-sided atrioventricular accessory pathway capable only of retrograde conduction (concealed Wolff-Parkinson-White syndrome). The technique of recording the sequence of atrial activation during the tachycardia is described and its clinical importance emphasised. PMID:884032

  2. Preventing errors in laterality.

    PubMed

    Landau, Elliot; Hirschorn, David; Koutras, Iakovos; Malek, Alexander; Demissie, Seleshie

    2015-04-01

    An error in laterality is the reporting of a finding that is present on the right side as on the left or vice versa. While different medical and surgical specialties have implemented protocols to help prevent such errors, very few studies have been published that describe these errors in radiology reports and ways to prevent them. We devised a system that allows the radiologist to view reports in a separate window, displayed in a simple font and with all terms of laterality highlighted in separate colors. This allows the radiologist to correlate all detected laterality terms of the report with the images open in PACS and correct them before the report is finalized. The system is monitored every time an error in laterality was detected. The system detected 32 errors in laterality over a 7-month period (rate of 0.0007 %), with CT containing the highest error detection rate of all modalities. Significantly, more errors were detected in male patients compared with female patients. In conclusion, our study demonstrated that with our system, laterality errors can be detected and corrected prior to finalizing reports.

  3. Refractive error blindness.

    PubMed Central

    Dandona, R.; Dandona, L.

    2001-01-01

    Recent data suggest that a large number of people are blind in different parts of the world due to high refractive error because they are not using appropriate refractive correction. Refractive error as a cause of blindness has been recognized only recently with the increasing use of presenting visual acuity for defining blindness. In addition to blindness due to naturally occurring high refractive error, inadequate refractive correction of aphakia after cataract surgery is also a significant cause of blindness in developing countries. Blindness due to refractive error in any population suggests that eye care services in general in that population are inadequate since treatment of refractive error is perhaps the simplest and most effective form of eye care. Strategies such as vision screening programmes need to be implemented on a large scale to detect individuals suffering from refractive error blindness. Sufficient numbers of personnel to perform reasonable quality refraction need to be trained in developing countries. Also adequate infrastructure has to be developed in underserved areas of the world to facilitate the logistics of providing affordable reasonable-quality spectacles to individuals suffering from refractive error blindness. Long-term success in reducing refractive error blindness worldwide will require attention to these issues within the context of comprehensive approaches to reduce all causes of avoidable blindness. PMID:11285669

  4. Everyday Scale Errors

    ERIC Educational Resources Information Center

    Ware, Elizabeth A.; Uttal, David H.; DeLoache, Judy S.

    2010-01-01

    Young children occasionally make "scale errors"--they attempt to fit their bodies into extremely small objects or attempt to fit a larger object into another, tiny, object. For example, a child might try to sit in a dollhouse-sized chair or try to stuff a large doll into it. Scale error research was originally motivated by parents' and…

  5. Action errors, error management, and learning in organizations.

    PubMed

    Frese, Michael; Keith, Nina

    2015-01-01

    Every organization is confronted with errors. Most errors are corrected easily, but some may lead to negative consequences. Organizations often focus on error prevention as a single strategy for dealing with errors. Our review suggests that error prevention needs to be supplemented by error management--an approach directed at effectively dealing with errors after they have occurred, with the goal of minimizing negative and maximizing positive error consequences (examples of the latter are learning and innovations). After defining errors and related concepts, we review research on error-related processes affected by error management (error detection, damage control). Empirical evidence on positive effects of error management in individuals and organizations is then discussed, along with emotional, motivational, cognitive, and behavioral pathways of these effects. Learning from errors is central, but like other positive consequences, learning occurs under certain circumstances--one being the development of a mind-set of acceptance of human error.

  6. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    PubMed

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation." PMID:26914706

  7. Comparing Absolute Error with Squared Error for Evaluating Empirical Models of Continuous Variables: Compositions, Implications, and Consequences

    NASA Astrophysics Data System (ADS)

    Gao, J.

    2014-12-01

    Reducing modeling error is often a major concern of empirical geophysical models. However, modeling errors can be defined in different ways: When the response variable is continuous, the most commonly used metrics are squared (SQ) and absolute (ABS) errors. For most applications, ABS error is the more natural, but SQ error is mathematically more tractable, so is often used as a substitute with little scientific justification. Existing literature has not thoroughly investigated the implications of using SQ error in place of ABS error, especially not geospatially. This study compares the two metrics through the lens of bias-variance decomposition (BVD). BVD breaks down the expected modeling error of each model evaluation point into bias (systematic error), variance (model sensitivity), and noise (observation instability). It offers a way to probe the composition of various error metrics. I analytically derived the BVD of ABS error and compared it with the well-known SQ error BVD, and found that not only the two metrics measure the characteristics of the probability distributions of modeling errors differently, but also the effects of these characteristics on the overall expected error are different. Most notably, under SQ error all bias, variance, and noise increase expected error, while under ABS error certain parts of the error components reduce expected error. Since manipulating these subtractive terms is a legitimate way to reduce expected modeling error, SQ error can never capture the complete story embedded in ABS error. I then empirically compared the two metrics with a supervised remote sensing model for mapping surface imperviousness. Pair-wise spatially-explicit comparison for each error component showed that SQ error overstates all error components in comparison to ABS error, especially variance-related terms. Hence, substituting ABS error with SQ error makes model performance appear worse than it actually is, and the analyst would more likely accept a

  8. Proofreading for word errors.

    PubMed

    Pilotti, Maura; Chodorow, Martin; Agpawa, Ian; Krajniak, Marta; Mahamane, Salif

    2012-04-01

    Proofreading (i.e., reading text for the purpose of detecting and correcting typographical errors) is viewed as a component of the activity of revising text and thus is a necessary (albeit not sufficient) procedural step for enhancing the quality of a written product. The purpose of the present research was to test competing accounts of word-error detection which predict factors that may influence reading and proofreading differently. Word errors, which change a word into another word (e.g., from --> form), were selected for examination because they are unlikely to be detected by automatic spell-checking functions. Consequently, their detection still rests mostly in the hands of the human proofreader. Findings highlighted the weaknesses of existing accounts of proofreading and identified factors, such as length and frequency of the error in the English language relative to frequency of the correct word, which might play a key role in detection of word errors.

  9. Errors in neuroradiology.

    PubMed

    Caranci, Ferdinando; Tedeschi, Enrico; Leone, Giuseppe; Reginelli, Alfonso; Gatta, Gianluca; Pinto, Antonio; Squillaci, Ettore; Briganti, Francesco; Brunese, Luca

    2015-09-01

    Approximately 4 % of radiologic interpretation in daily practice contains errors and discrepancies that should occur in 2-20 % of reports. Fortunately, most of them are minor degree errors, or if serious, are found and corrected with sufficient promptness; obviously, diagnostic errors become critical when misinterpretation or misidentification should significantly delay medical or surgical treatments. Errors can be summarized into four main categories: observer errors, errors in interpretation, failure to suggest the next appropriate procedure, failure to communicate in a timely and a clinically appropriate manner. Misdiagnosis/misinterpretation percentage should rise up in emergency setting and in the first moments of the learning curve, as in residency. Para-physiological and pathological pitfalls in neuroradiology include calcification and brain stones, pseudofractures, and enlargement of subarachnoid or epidural spaces, ventricular system abnormalities, vascular system abnormalities, intracranial lesions or pseudolesions, and finally neuroradiological emergencies. In order to minimize the possibility of error, it is important to be aware of various presentations of pathology, obtain clinical information, know current practice guidelines, review after interpreting a diagnostic study, suggest follow-up studies when appropriate, communicate significant abnormal findings appropriately and in a timely fashion directly with the treatment team.

  10. Uncorrected refractive errors.

    PubMed

    Naidoo, Kovin S; Jaggernath, Jyoti

    2012-01-01

    Global estimates indicate that more than 2.3 billion people in the world suffer from poor vision due to refractive error; of which 670 million people are considered visually impaired because they do not have access to corrective treatment. Refractive errors, if uncorrected, results in an impaired quality of life for millions of people worldwide, irrespective of their age, sex and ethnicity. Over the past decade, a series of studies using a survey methodology, referred to as Refractive Error Study in Children (RESC), were performed in populations with different ethnic origins and cultural settings. These studies confirmed that the prevalence of uncorrected refractive errors is considerably high for children in low-and-middle-income countries. Furthermore, uncorrected refractive error has been noted to have extensive social and economic impacts, such as limiting educational and employment opportunities of economically active persons, healthy individuals and communities. The key public health challenges presented by uncorrected refractive errors, the leading cause of vision impairment across the world, require urgent attention. To address these issues, it is critical to focus on the development of human resources and sustainable methods of service delivery. This paper discusses three core pillars to addressing the challenges posed by uncorrected refractive errors: Human Resource (HR) Development, Service Development and Social Entrepreneurship. PMID:22944755

  11. Error Prevention Aid

    NASA Technical Reports Server (NTRS)

    1987-01-01

    In a complex computer environment there is ample opportunity for error, a mistake by a programmer, or a software-induced undesirable side effect. In insurance, errors can cost a company heavily, so protection against inadvertent change is a must for the efficient firm. The data processing center at Transport Life Insurance Company has taken a step to guard against accidental changes by adopting a software package called EQNINT (Equations Interpreter Program). EQNINT cross checks the basic formulas in a program against the formulas that make up the major production system. EQNINT assures that formulas are coded correctly and helps catch errors before they affect the customer service or its profitability.

  12. Spatial abstraction for autonomous robot navigation.

    PubMed

    Epstein, Susan L; Aroor, Anoop; Evanusa, Matthew; Sklar, Elizabeth I; Parsons, Simon

    2015-09-01

    Optimal navigation for a simulated robot relies on a detailed map and explicit path planning, an approach problematic for real-world robots that are subject to noise and error. This paper reports on autonomous robots that rely on local spatial perception, learning, and commonsense rationales instead. Despite realistic actuator error, learned spatial abstractions form a model that supports effective travel. PMID:26227680

  13. Spatial abstraction for autonomous robot navigation.

    PubMed

    Epstein, Susan L; Aroor, Anoop; Evanusa, Matthew; Sklar, Elizabeth I; Parsons, Simon

    2015-09-01

    Optimal navigation for a simulated robot relies on a detailed map and explicit path planning, an approach problematic for real-world robots that are subject to noise and error. This paper reports on autonomous robots that rely on local spatial perception, learning, and commonsense rationales instead. Despite realistic actuator error, learned spatial abstractions form a model that supports effective travel.

  14. Algorithms for detecting concealed knowledge among groups when the critical information is unavailable.

    PubMed

    Breska, Assaf; Ben-Shakhar, Gershon; Gronau, Nurit

    2012-09-01

    We examined whether the Concealed Information Test (CIT) may be used when the critical details are unavailable to investigators (the Searching CIT [SCIT]). This use may have important applications in criminal investigations (e.g., finding the location of a murder weapon) and in security-related threats (e.g., detecting individuals and groups suspected in planning a terror attack). Two classes of algorithms designed to detect the critical items and classify individuals in the SCIT were examined. The 1st class was based on averaging responses across subjects to identify critical items and on averaging responses across the identified critical items to identify knowledgeable subjects. The 2nd class used clustering methods based on the correlations between the response profiles of all subject pairs. We applied a principal component analysis to decompose the correlation matrix into its principal components and defined the detection score as the coefficient of each subject on the component that explained the largest portion of the variance. Reanalysis of 3 data sets from previous CIT studies demonstrated that in most cases the efficiency of differentiation between knowledgeable and unknowledgeable subjects in the SCIT (indexed by the area under the receiver operating characteristic curve) approached that of the standard CIT for both algorithms. We also examined the robustness of our results to variations in the number of knowledgeable and unknowledgeable subjects in the sample. This analysis demonstrated that the performance of our algorithms is relatively robust to changes in the number of individuals examined in each group, provided that at least 2 (but desirably 5 or more) knowledgeable examinees are included.

  15. Expanded opportunities of THz passive camera for the detection of concealed objects

    NASA Astrophysics Data System (ADS)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.

    2013-10-01

    Among the security problems, the detection of object implanted into either the human body or animal body is the urgent problem. At the present time the main tool for the detection of such object is X-raying only. However, X-ray is the ionized radiation and therefore can not be used often. Other way for the problem solving is passive THz imaging using. In our opinion, using of the passive THz camera may help to detect the object implanted into the human body under certain conditions. The physical reason of such possibility arises from temperature trace on the human skin as a result of the difference in temperature between object and parts of human body. Modern passive THz cameras have not enough resolution in temperature to see this difference. That is why, we use computer processing to enhance the passive THz camera resolution for this application. After computer processing of images captured by passive THz camera TS4, developed by ThruVision Systems Ltd., we may see the pronounced temperature trace on the human body skin from the water, which is drunk by person, or other food eaten by person. Nevertheless, there are many difficulties on the way of full soution of this problem. We illustrate also an improvement of quality of the image captured by comercially available passive THz cameras using computer processing. In some cases, one can fully supress a noise on the image without loss of its quality. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts.

  16. Remote Detection of Concealed Radioactive Materials by Using Focused Powerful Terahertz Radiation

    NASA Astrophysics Data System (ADS)

    Nusinovich, Gregory S.

    2016-06-01

    This review paper summarizes the results of studies of a novel concept of the remote detection of concealed radioactive materials by using focused high-power terahertz (THz) radiation. The concept is based on the known fact that the ambient electron density in air is low (one to three free electrons per cubic centimeter). These electrons can serve as seed electrons from which an avalanche breakdown in strong electromagnetic fields starts. When a powerful THz radiation is focused in a small spot, the breakdown-prone volume can be much smaller than a cubic centimeter. So, the probability of having some free electrons in this volume and, hence, the probability of breakdown are low in the absence of additional sources of air ionization. However, in the vicinity of radioactive materials (10-20 m), the electron density can be higher, and, hence, there are always some seed free electrons from which the avalanche ionization will start. Thus, the breakdown rate in this case can be close to 100 %. Realization of this concept requires studies of various physical and technical issues. First, it is necessary to develop a high-power source of (sub-) THz radiation whose power, frequency, and pulse duration are sufficient for realizing this goal. Second, it is necessary to analyze numerous issues important for realizing this concept. Among these issues are (a) enhancement of the ionization level of air molecules in the presence of hidden radioactive materials, (b) estimating the minimum detectable mass of radioactive material, (c) formation of breakdown-prone volumes in focused THz wave beams, and (d) effect of atmospheric conditions on the propagation and focusing of THz wave beams and on the optimal location of the breakdown-prone volume between a container with hidden radioactive material and a THz antenna. The results of these studies are described below.

  17. Design of spectrally versatile forward-looking ground-penetrating radar for detection of concealed targets

    NASA Astrophysics Data System (ADS)

    Phelan, Brian R.; Ressler, Marc A.; Mazzaro, Gregory J.; Sherbondy, Kelly D.; Narayanan, Ram M.

    2013-05-01

    The design of high-resolution radars which can operate in theater involves a careful consideration of the radar's radiated spectrum. While a wide bandwidth yields better target detectability and classification, it can also interfere with other devices and/or violate federal and international communication laws. Under the Army Research Laboratory (ARL) Partnerships in Research Transition (PIRT) program, we are developing a Stepped-Frequency Radar (SFR) which allows for manipulation of the radiated spectrum, while still maintaining an effective ultra-wide bandwidth for achieving good range resolution. The SFR is a forward-looking, ultra-wideband (UWB) imaging radar capable of detecting concealed targets. This paper presents the research and analysis undertaken during the design of the SFR which will eventually complement an existing ARL system, the Synchronous Impulse REconstruction (SIRE) radar. The SFR is capable of excising prohibited frequency bands, while maintaining the down-range resolution capability of the original SIRE radar. The SFR has two transmit antennas and a 16-element receive antenna array, and this configuration achieves suitable cross-range resolution for target detection. The SFR, like the SIRE radar, is a vehicle mounted, forward-looking, ground penetrating radar (GPR) capable of using synthetic aperture radar (SAR) technology for the detection of subsurface targets via 3D imaging. Many contradicting design considerations are analyzed in this paper. The selection of system bandwidth, antenna types, number of antennas, frequency synthesizers, digitizers, receive amplifiers, wideband splitters, and many other components are critical to the design of the SFR. Leveraging commercial components and SIRE sub-systems were design factors offering an expedited time to the initial implementation of the radar while reducing overall costs. This SFR design will result in an ARL asset to support obscured target detection such as improvised explosive devices

  18. Concealed d-wave pairs in the s± condensate of iron-based superconductors.

    PubMed

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-05-17

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave ([Formula: see text]) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of [Formula: see text] state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave ([Formula: see text]) motion of the pairs with the internal angular momenta [Formula: see text] of the iron orbitals to make a singlet ([Formula: see text]), an [Formula: see text] superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1-x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin ([Formula: see text]) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy. PMID:27140626

  19. Estimating Bias Error Distributions

    NASA Technical Reports Server (NTRS)

    Liu, Tian-Shu; Finley, Tom D.

    2001-01-01

    This paper formulates the general methodology for estimating the bias error distribution of a device in a measuring domain from less accurate measurements when a minimal number of standard values (typically two values) are available. A new perspective is that the bias error distribution can be found as a solution of an intrinsic functional equation in a domain. Based on this theory, the scaling- and translation-based methods for determining the bias error distribution arc developed. These methods are virtually applicable to any device as long as the bias error distribution of the device can be sufficiently described by a power series (a polynomial) or a Fourier series in a domain. These methods have been validated through computational simulations and laboratory calibration experiments for a number of different devices.

  20. The surveillance error grid.

    PubMed

    Klonoff, David C; Lias, Courtney; Vigersky, Robert; Clarke, William; Parkes, Joan Lee; Sacks, David B; Kirkman, M Sue; Kovatchev, Boris

    2014-07-01

    Currently used error grids for assessing clinical accuracy of blood glucose monitors are based on out-of-date medical practices. Error grids have not been widely embraced by regulatory agencies for clearance of monitors, but this type of tool could be useful for surveillance of the performance of cleared products. Diabetes Technology Society together with representatives from the Food and Drug Administration, the American Diabetes Association, the Endocrine Society, and the Association for the Advancement of Medical Instrumentation, and representatives of academia, industry, and government, have developed a new error grid, called the surveillance error grid (SEG) as a tool to assess the degree of clinical risk from inaccurate blood glucose (BG) monitors. A total of 206 diabetes clinicians were surveyed about the clinical risk of errors of measured BG levels by a monitor. The impact of such errors on 4 patient scenarios was surveyed. Each monitor/reference data pair was scored and color-coded on a graph per its average risk rating. Using modeled data representative of the accuracy of contemporary meters, the relationships between clinical risk and monitor error were calculated for the Clarke error grid (CEG), Parkes error grid (PEG), and SEG. SEG action boundaries were consistent across scenarios, regardless of whether the patient was type 1 or type 2 or using insulin or not. No significant differences were noted between responses of adult/pediatric or 4 types of clinicians. Although small specific differences in risk boundaries between US and non-US clinicians were noted, the panel felt they did not justify separate grids for these 2 types of clinicians. The data points of the SEG were classified in 15 zones according to their assigned level of risk, which allowed for comparisons with the classic CEG and PEG. Modeled glucose monitor data with realistic self-monitoring of blood glucose errors derived from meter testing experiments plotted on the SEG when compared to

  1. Alcohol and error processing.

    PubMed

    Holroyd, Clay B; Yeung, Nick

    2003-08-01

    A recent study indicates that alcohol consumption reduces the amplitude of the error-related negativity (ERN), a negative deflection in the electroencephalogram associated with error commission. Here, we explore possible mechanisms underlying this result in the context of two recent theories about the neural system that produces the ERN - one based on principles of reinforcement learning and the other based on response conflict monitoring.

  2. Quantum Error Correction

    NASA Astrophysics Data System (ADS)

    Lidar, Daniel A.; Brun, Todd A.

    2013-09-01

    Prologue; Preface; Part I. Background: 1. Introduction to decoherence and noise in open quantum systems Daniel Lidar and Todd Brun; 2. Introduction to quantum error correction Dave Bacon; 3. Introduction to decoherence-free subspaces and noiseless subsystems Daniel Lidar; 4. Introduction to quantum dynamical decoupling Lorenza Viola; 5. Introduction to quantum fault tolerance Panos Aliferis; Part II. Generalized Approaches to Quantum Error Correction: 6. Operator quantum error correction David Kribs and David Poulin; 7. Entanglement-assisted quantum error-correcting codes Todd Brun and Min-Hsiu Hsieh; 8. Continuous-time quantum error correction Ognyan Oreshkov; Part III. Advanced Quantum Codes: 9. Quantum convolutional codes Mark Wilde; 10. Non-additive quantum codes Markus Grassl and Martin Rötteler; 11. Iterative quantum coding systems David Poulin; 12. Algebraic quantum coding theory Andreas Klappenecker; 13. Optimization-based quantum error correction Andrew Fletcher; Part IV. Advanced Dynamical Decoupling: 14. High order dynamical decoupling Zhen-Yu Wang and Ren-Bao Liu; 15. Combinatorial approaches to dynamical decoupling Martin Rötteler and Pawel Wocjan; Part V. Alternative Quantum Computation Approaches: 16. Holonomic quantum computation Paolo Zanardi; 17. Fault tolerance for holonomic quantum computation Ognyan Oreshkov, Todd Brun and Daniel Lidar; 18. Fault tolerant measurement-based quantum computing Debbie Leung; Part VI. Topological Methods: 19. Topological codes Héctor Bombín; 20. Fault tolerant topological cluster state quantum computing Austin Fowler and Kovid Goyal; Part VII. Applications and Implementations: 21. Experimental quantum error correction Dave Bacon; 22. Experimental dynamical decoupling Lorenza Viola; 23. Architectures Jacob Taylor; 24. Error correction in quantum communication Mark Wilde; Part VIII. Critical Evaluation of Fault Tolerance: 25. Hamiltonian methods in QEC and fault tolerance Eduardo Novais, Eduardo Mucciolo and

  3. Thermodynamics of Error Correction

    NASA Astrophysics Data System (ADS)

    Sartori, Pablo; Pigolotti, Simone

    2015-10-01

    Information processing at the molecular scale is limited by thermal fluctuations. This can cause undesired consequences in copying information since thermal noise can lead to errors that can compromise the functionality of the copy. For example, a high error rate during DNA duplication can lead to cell death. Given the importance of accurate copying at the molecular scale, it is fundamental to understand its thermodynamic features. In this paper, we derive a universal expression for the copy error as a function of entropy production and work dissipated by the system during wrong incorporations. Its derivation is based on the second law of thermodynamics; hence, its validity is independent of the details of the molecular machinery, be it any polymerase or artificial copying device. Using this expression, we find that information can be copied in three different regimes. In two of them, work is dissipated to either increase or decrease the error. In the third regime, the protocol extracts work while correcting errors, reminiscent of a Maxwell demon. As a case study, we apply our framework to study a copy protocol assisted by kinetic proofreading, and show that it can operate in any of these three regimes. We finally show that, for any effective proofreading scheme, error reduction is limited by the chemical driving of the proofreading reaction.

  4. Human error in aviation operations

    NASA Technical Reports Server (NTRS)

    Nagel, David C.

    1988-01-01

    The role of human error in commercial and general aviation accidents and the techniques used to evaluate it are reviewed from a human-factors perspective. Topics addressed include the general decline in accidents per million departures since the 1960s, the increase in the proportion of accidents due to human error, methods for studying error, theoretical error models, and the design of error-resistant systems. Consideration is given to information acquisition and processing errors, visually guided flight, disorientation, instrument-assisted guidance, communication errors, decision errors, debiasing, and action errors.

  5. Error monitoring in musicians.

    PubMed

    Maidhof, Clemens

    2013-01-01

    To err is human, and hence even professional musicians make errors occasionally during their performances. This paper summarizes recent work investigating error monitoring in musicians, i.e., the processes and their neural correlates associated with the monitoring of ongoing actions and the detection of deviations from intended sounds. Electroencephalography (EEG) studies reported an early component of the event-related potential (ERP) occurring before the onsets of pitch errors. This component, which can be altered in musicians with focal dystonia, likely reflects processes of error detection and/or error compensation, i.e., attempts to cancel the undesired sensory consequence (a wrong tone) a musician is about to perceive. Thus, auditory feedback seems not to be a prerequisite for error detection, consistent with previous behavioral results. In contrast, when auditory feedback is externally manipulated and thus unexpected, motor performance can be severely distorted, although not all feedback alterations result in performance impairments. Recent studies investigating the neural correlates of feedback processing showed that unexpected feedback elicits an ERP component after note onsets, which shows larger amplitudes during music performance than during mere perception of the same musical sequences. Hence, these results stress the role of motor actions for the processing of auditory information. Furthermore, recent methodological advances like the combination of 3D motion capture techniques with EEG will be discussed. Such combinations of different measures can potentially help to disentangle the roles of different feedback types such as proprioceptive and auditory feedback, and in general to derive at a better understanding of the complex interactions between the motor and auditory domain during error monitoring. Finally, outstanding questions and future directions in this context will be discussed. PMID:23898255

  6. Errata: Papers in Error Analysis.

    ERIC Educational Resources Information Center

    Svartvik, Jan, Ed.

    Papers presented at the symposium of error analysis in Lund, Sweden, in September 1972, approach error analysis specifically in its relation to foreign language teaching and second language learning. Error analysis is defined as having three major aspects: (1) the description of the errors, (2) the explanation of errors by means of contrastive…

  7. Computation of Standard Errors

    PubMed Central

    Dowd, Bryan E; Greene, William H; Norton, Edward C

    2014-01-01

    Objectives We discuss the problem of computing the standard errors of functions involving estimated parameters and provide the relevant computer code for three different computational approaches using two popular computer packages. Study Design We show how to compute the standard errors of several functions of interest: the predicted value of the dependent variable for a particular subject, and the effect of a change in an explanatory variable on the predicted value of the dependent variable for an individual subject and average effect for a sample of subjects. Empirical Application Using a publicly available dataset, we explain three different methods of computing standard errors: the delta method, Krinsky–Robb, and bootstrapping. We provide computer code for Stata 12 and LIMDEP 10/NLOGIT 5. Conclusions In most applications, choice of the computational method for standard errors of functions of estimated parameters is a matter of convenience. However, when computing standard errors of the sample average of functions that involve both estimated parameters and nonstochastic explanatory variables, it is important to consider the sources of variation in the function's values. PMID:24800304

  8. Compact disk error measurements

    NASA Technical Reports Server (NTRS)

    Howe, D.; Harriman, K.; Tehranchi, B.

    1993-01-01

    The objectives of this project are as follows: provide hardware and software that will perform simple, real-time, high resolution (single-byte) measurement of the error burst and good data gap statistics seen by a photoCD player read channel when recorded CD write-once discs of variable quality (i.e., condition) are being read; extend the above system to enable measurement of the hard decision (i.e., 1-bit error flags) and soft decision (i.e., 2-bit error flags) decoding information that is produced/used by the Cross Interleaved - Reed - Solomon - Code (CIRC) block decoder employed in the photoCD player read channel; construct a model that uses data obtained via the systems described above to produce meaningful estimates of output error rates (due to both uncorrected ECC words and misdecoded ECC words) when a CD disc having specific (measured) error statistics is read (completion date to be determined); and check the hypothesis that current adaptive CIRC block decoders are optimized for pressed (DAD/ROM) CD discs. If warranted, do a conceptual design of an adaptive CIRC decoder that is optimized for write-once CD discs.

  9. Error Types and Error Positions in Neglect Dyslexia: Comparative Analyses in Neglect Patients and Healthy Controls

    ERIC Educational Resources Information Center

    Weinzierl, Christiane; Kerkhoff, Georg; van Eimeren, Lucia; Keller, Ingo; Stenneken, Prisca

    2012-01-01

    Unilateral spatial neglect frequently involves a lateralised reading disorder, neglect dyslexia (ND). Reading of single words in ND is characterised by left-sided omissions and substitutions of letters. However, it is unclear whether the distribution of error types and positions within a word shows a unique pattern of ND when directly compared to…

  10. Big tobacco is watching: British American Tobacco's surveillance and information concealment at the Guildford depository.

    PubMed

    Muggli, Monique E; LeGresley, Eric M; Hurt, Richard D

    2004-05-29

    The 1998 State of Minnesota legal settlement with the tobacco industry required British American Tobacco (BAT) to provide public access to the 8 million pages housed in its document depository located near Guildford, UK, and to any company documents sent to the Minnesota depository. While the Minnesota depository is managed by an independent third party, BAT's Guildford depository is run by the company itself. Starkly different from the Minnesota depository, at the Guildford depository it is extraordinarily more difficult to access, search, and obtain requested documents. BAT's approach to running the Guildford depository, in our view, amounts to concealing what is supposed to be public information. Newly produced BAT documents from subsequent litigation, dating from 1996 to 2001 disclose the company's efforts to gather intelligence on visitors and their work. We believe that BAT has acted to make access to information more difficult by delaying document production requested by public visitors and refusing to supply requested documents in an electronic format despite, in the company's own words, the establishment of "big time imaging" capabilities at the Guildford depository. During testimony in 2000, then BAT Chairman, Martin Broughton stated to the UK House of Commons Health Select Committee that the scanning and subsequent placement of the Guildford collection online "would be an extreme effort for absolutely no purpose whatsoever", stating that "there is no indication to me that serious researchers are showing any interest in the papers em leader ". New documents show that not only did the company recognise the importance of research undertaken by visitors, but also invested substantial resources and undertook numerous scanning projects during that time. The vulnerability of this important resource is demonstrated by the decreased number of files listed on the electronic database and the inadvertent deletion of an audio tape housed at the depository. With

  11. Dialogues on prediction errors.

    PubMed

    Niv, Yael; Schoenbaum, Geoffrey

    2008-07-01

    The recognition that computational ideas from reinforcement learning are relevant to the study of neural circuits has taken the cognitive neuroscience community by storm. A central tenet of these models is that discrepancies between actual and expected outcomes can be used for learning. Neural correlates of such prediction-error signals have been observed now in midbrain dopaminergic neurons, striatum, amygdala and even prefrontal cortex, and models incorporating prediction errors have been invoked to explain complex phenomena such as the transition from goal-directed to habitual behavior. Yet, like any revolution, the fast-paced progress has left an uneven understanding in its wake. Here, we provide answers to ten simple questions about prediction errors, with the aim of exposing both the strengths and the limitations of this active area of neuroscience research.

  12. Experimental Quantum Error Detection

    PubMed Central

    Jin, Xian-Min; Yi, Zhen-Huan; Yang, Bin; Zhou, Fei; Yang, Tao; Peng, Cheng-Zhi

    2012-01-01

    Faithful transmission of quantum information is a crucial ingredient in quantum communication networks. To overcome the unavoidable decoherence in a noisy channel, to date, many efforts have been made to transmit one state by consuming large numbers of time-synchronized ancilla states. However, such huge demands of quantum resources are hard to meet with current technology and this restricts practical applications. Here we experimentally demonstrate quantum error detection, an economical approach to reliably protecting a qubit against bit-flip errors. Arbitrary unknown polarization states of single photons and entangled photons are converted into time bins deterministically via a modified Franson interferometer. Noise arising in both 10 m and 0.8 km fiber, which induces associated errors on the reference frame of time bins, is filtered when photons are detected. The demonstrated resource efficiency and state independence make this protocol a promising candidate for implementing a real-world quantum communication network. PMID:22953047

  13. Concealed carry weapon permits: a Second Amendment right or a recipe for disaster on our nation's campuses?

    PubMed

    Fennell, Reginald

    2009-01-01

    Crimes on college campuses can "strike fear" into the lives of those in higher education and a shooting is one of the crimes that ranks at the top of the most feared acts of violence. Maybe more direct counseling for clients who have weapons with regard to anticipatory guidance on firearms is needed. However, the debate continues with proposed legislation in different states regarding Second Amendment rights to legally carry concealed weapons on our Nation's campuses. What should be our response to this legislation? PMID:19892645

  14. Concealed carry weapon permits: a Second Amendment right or a recipe for disaster on our nation's campuses?

    PubMed

    Fennell, Reginald

    2009-01-01

    Crimes on college campuses can "strike fear" into the lives of those in higher education and a shooting is one of the crimes that ranks at the top of the most feared acts of violence. Maybe more direct counseling for clients who have weapons with regard to anticipatory guidance on firearms is needed. However, the debate continues with proposed legislation in different states regarding Second Amendment rights to legally carry concealed weapons on our Nation's campuses. What should be our response to this legislation?

  15. First record of genus Puliciphora Dahl (Diptera: Phoridae) associated with rabbit carcasses placed in concealed environments in Malaysia.

    PubMed

    Zuha, Raja Muhammad; See, Huong Wen; Disney, R Henry L; Omar, Baharudin

    2014-12-01

    Scuttle flies of genus Puliciphora Dahl (Diptera: Phoridae) are recorded for the first time in Malaysia from rabbit carcasses placed in concealed environments. They consist of Puliciphora borinquenensis Wheeler ♂♀, Puliciphora obtecta Meijere ♀ and Puliciphora beckeri Meijere ♀. All species were obtained from rabbit carcasses in used luggage and garbage bin placed at Forensic Science Simulation Site, Universiti Kebangsaan Malaysia, Bangi, Selangor. The specimens were collected from the carcasses using a modified Malaise trap, an entomological aspirator and preserved in 70% ethanol. This report expands the geographical distributions of these species and their microhabitat, suggests its possible important role in forensic entomology.

  16. Using pretest data to screen low-reactivity individuals in the autonomic-based concealed information test.

    PubMed

    Matsuda, Izumi; Ogawa, Tokihiro; Tsuneoka, Michiko; Verschuere, Bruno

    2015-03-01

    The concealed information test (CIT) can be used to assess whether an individual possesses crime-related information. However, its discrimination performance has room for improvement. We examined whether screening out participants who do not respond distinctively on a pretest improves the diagnosticity of a mock-crime CIT. Before conducting the CIT, we gave a pretest to 152 participants, 80 of whom were assigned as guilty. Pretest screening significantly improved the diagnostic value of the mock-crime CIT; however, it also led to a substantial number of undiagnosed participants (33.6%). Pretest screening holds promise, but its application would benefit from dedicated measures for screening out participants. PMID:25208848

  17. First record of genus Puliciphora Dahl (Diptera: Phoridae) associated with rabbit carcasses placed in concealed environments in Malaysia.

    PubMed

    Zuha, Raja Muhammad; See, Huong Wen; Disney, R Henry L; Omar, Baharudin

    2014-12-01

    Scuttle flies of genus Puliciphora Dahl (Diptera: Phoridae) are recorded for the first time in Malaysia from rabbit carcasses placed in concealed environments. They consist of Puliciphora borinquenensis Wheeler ♂♀, Puliciphora obtecta Meijere ♀ and Puliciphora beckeri Meijere ♀. All species were obtained from rabbit carcasses in used luggage and garbage bin placed at Forensic Science Simulation Site, Universiti Kebangsaan Malaysia, Bangi, Selangor. The specimens were collected from the carcasses using a modified Malaise trap, an entomological aspirator and preserved in 70% ethanol. This report expands the geographical distributions of these species and their microhabitat, suggests its possible important role in forensic entomology. PMID:25466156

  18. Imaging the concealed section of the Whakatane fault below Whakatane city, New Zealand, with a shear wave land streamer system

    NASA Astrophysics Data System (ADS)

    Polom, Ulrich; Mueller, Christof; Krawczyk, CharLotte M.

    2016-04-01

    The Mw 7.1 Darfield Earthquake in September 2010 ruptured the surface along the Greendale Fault that was not known prior to the earthquake. The subsequent Mw 6.3 Christchurch earthquake in February 2011 demonstrated that concealed active faults have a significant risk potential for urban infrastructure and human life in New Zealand if they are located beneath or close to such areas. Mapping exposures and analysis of active faults incorporated into the National Seismic Hazard Model (NSHM) suggests that several thousands of these active structures are yet to be identified and have the potential to generate moderate to large magnitude earthquakes (i.e. magnitudes >5). Geological mapping suggests that active faults pass beneath, or within many urban areas in New Zealand, including Auckland, Blenheim, Christchurch, Hastings/Napier, Nelson, Rotorua, Taupo, Wellington, and Whakatane. Since no established methodology for routinely locating and assessing the earthquake hazard posed by concealed active faults is available, the principal objective of the presented study was to evaluate the usefulness of high-resolution shear wave seismic reflection profiling using a land streamer to locate buried faults in urban areas of New Zealand. During the survey carried out in the city of Whakatane in February 2015, the method was first tested over a well known surface outcrop of the Edgecumbe Fault 30 km south-west of Whakatane city. This allowed further to investigate the principle shear wave propagation characteristics in the unknown sediments, consisting mainly of effusive rock material of the Taupo volcanic zone mixed with marine transgression units. Subsequently the survey was continued within Whakatane city using night operation time slots to reduce the urban noise. In total, 11 profiles of 5.7 km length in high data quality were acquired, which clearly show concealed rupture structures of obviously different age in the shallow sediments down to 100 m depth. Subject to depth

  19. Temporospatial dissociation of Pe subcomponents for perceived and unperceived errors

    PubMed Central

    Endrass, Tanja; Klawohn, Julia; Preuss, Julia; Kathmann, Norbert

    2012-01-01

    Previous research on performance monitoring revealed that errors are followed by an initial fronto-central negative deflection (error-related negativity, ERN or Ne) and a subsequent centro-parietal positivity (error positivity, Pe). It has been shown that error awareness mainly influences the Pe, whereas the ERN seems unaffected by conscious awareness of an error. The aim of the present study was to investigate the relation of ERN and Pe to error awareness in a visual size discrimination task in which errors are not elicited by impulsive responding but by perceptual difficulty. Further, we applied a temporospatial principal component analysis (PCA) to examine whether the temporospatial subcomponents of the Pe would differentially relate to error awareness. Event-related potential (ERP) results were in accordance with earlier studies: a significant error awareness effect was found for the Pe, but not for the ERN. Interestingly, a modulation with error perception on correct trials was found: correct responses considered as incorrect had larger correct-related negativity (CRN) and lager Pe amplitudes than correct responses considered as correct. The PCA yielded two relevant spatial factors accounting for the Pe (latency 300 ms). A temporospatial factor characterized by a centro-parietal positivity varied significantly with error awareness. Of the two temporospatial factors corresponding to ERN and CRN, one factor with central topography varied with response correctness and subjective error perception on correct responses. The PCA results indicate that the error awareness effect is specifically related to the centro-parietal subcomponent of the Pe. Since this component has also been shown to be related to the importance of an error, the present variation with error awareness indicates that this component is sensitive to the salience of an error and that salience secondarily may trigger error awareness. PMID:22737113

  20. Error Free Software

    NASA Technical Reports Server (NTRS)

    1985-01-01

    A mathematical theory for development of "higher order" software to catch computer mistakes resulted from a Johnson Space Center contract for Apollo spacecraft navigation. Two women who were involved in the project formed Higher Order Software, Inc. to develop and market the system of error analysis and correction. They designed software which is logically error-free, which, in one instance, was found to increase productivity by 600%. USE.IT defines its objectives using AXES -- a user can write in English and the system converts to computer languages. It is employed by several large corporations.

  1. [Medical device use errors].

    PubMed

    Friesdorf, Wolfgang; Marsolek, Ingo

    2008-01-01

    Medical devices define our everyday patient treatment processes. But despite the beneficial effect, every use can also lead to damages. Use errors are thus often explained by human failure. But human errors can never be completely extinct, especially in such complex work processes like those in medicine that often involve time pressure. Therefore we need error-tolerant work systems in which potential problems are identified and solved as early as possible. In this context human engineering uses the TOP principle: technological before organisational and then person-related solutions. But especially in everyday medical work we realise that error-prone usability concepts can often only be counterbalanced by organisational or person-related measures. Thus human failure is pre-programmed. In addition, many medical work places represent a somewhat chaotic accumulation of individual devices with totally different user interaction concepts. There is not only a lack of holistic work place concepts, but of holistic process and system concepts as well. However, this can only be achieved through the co-operation of producers, healthcare providers and clinical users, by systematically analyzing and iteratively optimizing the underlying treatment processes from both a technological and organizational perspective. What we need is a joint platform like medilab V of the TU Berlin, in which the entire medical treatment chain can be simulated in order to discuss, experiment and model--a key to a safe and efficient healthcare system of the future. PMID:19213452

  2. Orwell's Instructive Errors

    ERIC Educational Resources Information Center

    Julian, Liam

    2009-01-01

    In this article, the author talks about George Orwell, his instructive errors, and the manner in which Orwell pierced worthless theory, faced facts and defended decency (with fluctuating success), and largely ignored the tradition of accumulated wisdom that has rendered him a timeless teacher--one whose inadvertent lessons, while infrequently…

  3. Help prevent hospital errors

    MedlinePlus

    ... A.D.A.M. Editorial team. Related MedlinePlus Health Topics Medication Errors Patient Safety Browse the Encyclopedia A.D.A.M., Inc. is accredited by URAC, also known as the American Accreditation HealthCare Commission ... for online health information and services. Learn more about A.D. ...

  4. Challenge and Error: Critical Events and Attention-Related Errors

    ERIC Educational Resources Information Center

    Cheyne, James Allan; Carriere, Jonathan S. A.; Solman, Grayden J. F.; Smilek, Daniel

    2011-01-01

    Attention lapses resulting from reactivity to task challenges and their consequences constitute a pervasive factor affecting everyday performance errors and accidents. A bidirectional model of attention lapses (error [image omitted] attention-lapse: Cheyne, Solman, Carriere, & Smilek, 2009) argues that errors beget errors by generating attention…

  5. Inborn Errors of Metabolism.

    PubMed

    Ezgu, Fatih

    2016-01-01

    Inborn errors of metabolism are single gene disorders resulting from the defects in the biochemical pathways of the body. Although these disorders are individually rare, collectively they account for a significant portion of childhood disability and deaths. Most of the disorders are inherited as autosomal recessive whereas autosomal dominant and X-linked disorders are also present. The clinical signs and symptoms arise from the accumulation of the toxic substrate, deficiency of the product, or both. Depending on the residual activity of the deficient enzyme, the initiation of the clinical picture may vary starting from the newborn period up until adulthood. Hundreds of disorders have been described until now and there has been a considerable clinical overlap between certain inborn errors. Resulting from this fact, the definite diagnosis of inborn errors depends on enzyme assays or genetic tests. Especially during the recent years, significant achievements have been gained for the biochemical and genetic diagnosis of inborn errors. Techniques such as tandem mass spectrometry and gas chromatography for biochemical diagnosis and microarrays and next-generation sequencing for the genetic diagnosis have enabled rapid and accurate diagnosis. The achievements for the diagnosis also enabled newborn screening and prenatal diagnosis. Parallel to the development the diagnostic methods; significant progress has also been obtained for the treatment. Treatment approaches such as special diets, enzyme replacement therapy, substrate inhibition, and organ transplantation have been widely used. It is obvious that by the help of the preclinical and clinical research carried out for inborn errors, better diagnostic methods and better treatment approaches will high likely be available.

  6. Electron beam injected into ground generates subsoil x-rays that may deactivate concealed electronics used to trigger explosive devices

    NASA Astrophysics Data System (ADS)

    Retsky, Michael

    2008-04-01

    Explosively formed projectiles (EFP) are a major problem in terrorism and asymmetrical warfare. EFPs are often triggered by ordinary infrared motion detectors. A potential weak link is that such electronics are not hardened to ionizing radiation and can latch-up or enter other inoperative states after exposure to a single short event of ionizing radiation. While these can often be repaired with a power restart, they also can produce shorts and permanent damage. A problem of course is that we do not want to add radiation exposure to the long list of war related hazards. Biological systems are highly sensitive to integrated dosage but show no particular sensitivity to short pulses. There may be a way to generate short pulsed subsoil radiation to deactivate concealed electronics without introducing radiation hazards to military personnel and civilian bystanders. Electron beams of 30 MeV that can be produced by portable linear accelerators (linacs) propagate >20 m in air and 10-12 cm in soil. X-radiation is produced by bremsstrahlung and occurs subsoil beneath the point of impact and is mostly forward directed. Linacs 1.5 m long can produce 66 MWatt pulses of subsoil x-radiation 1 microsecond or less in duration. Untested as yet, such a device could be mounted on a robotic vehicle that precedes a military convoy and deactivates any concealed electronics within 10-20 meters on either side of the road.

  7. The impact of transmission errors on progressive 720 lines HDTV coded with H.264

    NASA Astrophysics Data System (ADS)

    Brunnström, Kjell; Stålenbring, Daniel; Pettersson, Martin; Gustafsson, Jörgen

    2010-02-01

    TV sent over the networks based on the Internet Protocol i.e IPTV is moving towards high definition (HDTV). There has been quite a lot of work on how the HDTV is affected by different codecs and bitrates, but the impact of transmission errors over IP-networks have been less studied. The study was focusing on H.264 encoded 1280x720 progressive HDTV format and was comparing three different concealment methods for different packet loss rates. One is included in a propriety decoder, one is part of FFMPEG and different length of freezing. The target is to simulate what typically IPTV settop-boxes will do when encountering packet loss. Another aim is to study whether the presentation upscaled on the full HDTV screen or presented pixel mapped in a smaller area in the center of the sceen would have an effect on the quality. The results show that there were differences between the two packet loss concealment methods in FFMPEG and in the propriety codec. Freezing seemed to have similar effect as been reported before. For low rates of transmission errors the coding impairments has impact on the quality, but for higher degree of transmission errors these does not affect the quality, since they become overshadowed by transmission error. An interesting effect where the higher bitrate videos goes from having higher quality for lower degree of packet loss, to having lower quality than the lower bitrate video at higher packet loss, was discovered. The different way of presenting the video i.e. upscaled or not-upscaled was significant on the 95% level, but just about.

  8. Geophysical and geochemical data from the area of the Pebble Cu-Au-Mo porphyry deposit, southwestern Alaska: Contributions to assessment techniques for concealed mineral resources

    USGS Publications Warehouse

    Anderson, E.D.; Smith, S.M.; Giles, S.A.; Granitto, Matthew; Eppinger, R.G.; Bedrosian, P.A.; Shah, A.K.; Kelley, K.D.; Fey, D.L.; Minsley, B.J.; Brown, P.J.

    2011-01-01

    In 2007, the U.S. Geological Survey began a multidisciplinary study in southwest Alaska to investigate the setting and detectability of mineral deposits in concealed volcanic and glacial terranes. The study area hosts the world-class Pebble porphyry Cu-Au-Mo deposit, and through collaboration with the Pebble Limited Partnership, a range of geophysical and geochemical investigations was carried out in proximity to the deposit. The deposit is almost entirely concealed by tundra, glacial deposits, and post-mineralization volcanic rocks. The discovery of mineral resources beneath cover is becoming more important because most of the mineral resources at the surface have already been discovered. Research is needed to identify ways in which to assess for concealed mineral resources. This report presents the uninterpreted geophysical measurements and geochemical and mineralogical analytical data from samples collected during the summer field seasons from 2007 to 2010, and makes the data available in a single Geographic Information System (GIS) database.

  9. Tropical errors and convection

    NASA Astrophysics Data System (ADS)

    Bechtold, P.; Bauer, P.; Engelen, R. J.

    2012-12-01

    Tropical convection is analysed in the ECMWF Integrated Forecast System (IFS) through tropical errors and their evolution during the last decade as a function of model resolution and model changes. As the characterization of these errors is particularly difficult over tropical oceans due to sparse in situ upper-air data, more weight compared to the middle latitudes is given in the analysis to the underlying forecast model. Therefore, special attention is paid to available near-surface observations and to comparison with analysis from other Centers. There is a systematic lack of low-level wind convergence in the Inner Tropical Convergence Zone (ITCZ) in the IFS, leading to a spindown of the Hadley cell. Critical areas with strong cross-equatorial flow and large wind errors are the Indian Ocean with large interannual variations in forecast errors, and the East Pacific with persistent systematic errors that have evolved little during the last decade. The analysis quality in the East Pacific is affected by observation errors inherent to the atmospheric motion vector wind product. The model's tropical climate and its variability and teleconnections are also evaluated, with a particular focus on the Madden-Julian Oscillation (MJO) during the Year of Tropical Convection (YOTC). The model is shown to reproduce the observed tropical large-scale wave spectra and teleconnections, but overestimates the precipitation during the South-East Asian summer monsoon. The recent improvements in tropical precipitation, convectively coupled wave and MJO predictability are shown to be strongly related to improvements in the convection parameterization that realistically represents the convection sensitivity to environmental moisture, and the large-scale forcing due to the use of strong entrainment and a variable adjustment time-scale. There is however a remaining slight moistening tendency and low-level wind imbalance in the model that is responsible for the Asian Monsoon bias and for too

  10. Speech Errors across the Lifespan

    ERIC Educational Resources Information Center

    Vousden, Janet I.; Maylor, Elizabeth A.

    2006-01-01

    Dell, Burger, and Svec (1997) proposed that the proportion of speech errors classified as anticipations (e.g., "moot and mouth") can be predicted solely from the overall error rate, such that the greater the error rate, the lower the anticipatory proportion (AP) of errors. We report a study examining whether this effect applies to changes in error…

  11. Control by model error estimation

    NASA Technical Reports Server (NTRS)

    Likins, P. W.; Skelton, R. E.

    1976-01-01

    Modern control theory relies upon the fidelity of the mathematical model of the system. Truncated modes, external disturbances, and parameter errors in linear system models are corrected by augmenting to the original system of equations an 'error system' which is designed to approximate the effects of such model errors. A Chebyshev error system is developed for application to the Large Space Telescope (LST).

  12. Marking Errors: A Simple Strategy

    ERIC Educational Resources Information Center

    Timmons, Theresa Cullen

    1987-01-01

    Indicates that using highlighters to mark errors produced a 76% class improvement in removing comma errors and a 95.5% improvement in removing apostrophe errors. Outlines two teaching procedures, to be followed before introducing this tool to the class, that enable students to remove errors at this effective rate. (JD)

  13. Automatic Error Analysis Using Intervals

    ERIC Educational Resources Information Center

    Rothwell, E. J.; Cloud, M. J.

    2012-01-01

    A technique for automatic error analysis using interval mathematics is introduced. A comparison to standard error propagation methods shows that in cases involving complicated formulas, the interval approach gives comparable error estimates with much less effort. Several examples are considered, and numerical errors are computed using the INTLAB…

  14. Neural Correlates of Reach Errors

    PubMed Central

    Hashambhoy, Yasmin; Rane, Tushar; Shadmehr, Reza

    2005-01-01

    Reach errors may be broadly classified into errors arising from unpredictable changes in target location, called target errors, and errors arising from miscalibration of internal models, called execution errors. Execution errors may be caused by miscalibration of dynamics (e.g.. when a force field alters limb dynamics) or by miscalibration of kinematics (e.g., when prisms alter visual feedback). While all types of errors lead to similar online corrections, we found that the motor system showed strong trial-by-trial adaptation in response to random execution errors but not in response to random target errors. We used fMRI and a compatible robot to study brain regions involved in processing each kind of error. Both kinematic and dynamic execution errors activated regions along the central and the post-central sulci and in lobules V, VI, and VIII of the cerebellum, making these areas possible sites of plastic changes in internal models for reaching. Only activity related to kinematic errors extended into parietal area 5. These results are inconsistent with the idea that kinematics and dynamics of reaching are computed in separate neural entities. In contrast, only target errors caused increased activity in the striatum and the posterior superior parietal lobule. The cerebellum and motor cortex were as strongly activated as with execution errors. These findings indicate a neural and behavioral dissociation between errors that lead to switching of behavioral goals, and errors that lead to adaptation of internal models of limb dynamics and kinematics. PMID:16251440

  15. The Insufficiency of Error Analysis

    ERIC Educational Resources Information Center

    Hammarberg, B.

    1974-01-01

    The position here is that error analysis is inadequate, particularly from the language-teaching point of view. Non-errors must be considered in specifying the learner's current command of the language, its limits, and his learning tasks. A cyclic procedure of elicitation and analysis, to secure evidence of errors and non-errors, is outlined.…

  16. A Simple Approach to Experimental Errors

    ERIC Educational Resources Information Center

    Phillips, M. D.

    1972-01-01

    Classifies experimental error into two main groups: systematic error (instrument, personal, inherent, and variational errors) and random errors (reading and setting errors) and presents mathematical treatments for the determination of random errors. (PR)

  17. Manson's triple error.

    PubMed

    F, Delaporte

    2008-09-01

    The author discusses the significance, implications and limitations of Manson's work. How did Patrick Manson resolve some of the major problems raised by the filarial worm life cycle? The Amoy physician showed that circulating embryos could only leave the blood via the percutaneous route, thereby requiring a bloodsucking insect. The discovery of a new autonomous, airborne, active host undoubtedly had a considerable impact on the history of parasitology, but the way in which Manson formulated and solved the problem of the transfer of filarial worms from the body of the mosquito to man resulted in failure. This article shows how the epistemological transformation operated by Manson was indissociably related to a series of errors and how a major breakthrough can be the result of a series of false proposals and, consequently, that the history of truth often involves a history of error. PMID:18814729

  18. Modular error embedding

    DOEpatents

    Sandford, II, Maxwell T.; Handel, Theodore G.; Ettinger, J. Mark

    1999-01-01

    A method of embedding auxiliary information into the digital representation of host data containing noise in the low-order bits. The method applies to digital data representing analog signals, for example digital images. The method reduces the error introduced by other methods that replace the low-order bits with auxiliary information. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user through use of a digital key. The modular error embedding method includes a process to permute the order in which the host data values are processed. The method doubles the amount of auxiliary information that can be added to host data values, in comparison with bit-replacement methods for high bit-rate coding. The invention preserves human perception of the meaning and content of the host data, permitting the addition of auxiliary data in the amount of 50% or greater of the original host data.

  19. Error-Free Software

    NASA Technical Reports Server (NTRS)

    1989-01-01

    001 is an integrated tool suited for automatically developing ultra reliable models, simulations and software systems. Developed and marketed by Hamilton Technologies, Inc. (HTI), it has been applied in engineering, manufacturing, banking and software tools development. The software provides the ability to simplify the complex. A system developed with 001 can be a prototype or fully developed with production quality code. It is free of interface errors, consistent, logically complete and has no data or control flow errors. Systems can be designed, developed and maintained with maximum productivity. Margaret Hamilton, President of Hamilton Technologies, also directed the research and development of USE.IT, an earlier product which was the first computer aided software engineering product in the industry to concentrate on automatically supporting the development of an ultrareliable system throughout its life cycle. Both products originated in NASA technology developed under a Johnson Space Center contract.

  20. A comment on Farwell (2012): brain fingerprinting: a comprehensive tutorial review of detection of concealed information with event-related brain potentials.

    PubMed

    Meijer, Ewout H; Ben-Shakhar, Gershon; Verschuere, Bruno; Donchin, Emanuel

    2013-04-01

    In a recent issue of Cognitive Neurodynamics Farwell (Cogn Neurodyn 6:115-154, 2012) published a comprehensive tutorial review of the use of Event Related Brain Potentials (ERP) in the detection of concealed information. Farwell's review covered much of his own work employing his "brain fingerprinting" technology. All his work showed a 100 % accuracy rate in detecting concealed information. We argue in this comment that Farwell (Cogn Neurodyn 6:115-154, 2012) is misleading and misrepresents the scientific status of brain fingerprinting technology.

  1. Error modelling on burned area products

    NASA Astrophysics Data System (ADS)

    Padilla, M.; Chuvieco, E.

    2012-12-01

    In the last decade multiple efforts have been undertaken to map burned areas (BA) at global scale. Global BA projects usually carry along a validation phase, which aims to assess product quality. Errors are commonly measured in these validation exercises, but they frequently do not tackle error sources, which hampers the use of BA products as input to earth system models. In this study we present a method to assess the relationships between commission and omission errors on one side and landscape and burned patch characteristics on the other side. Errors were extracted by comparing global BA results and Landsat BA perimeters. Selected factors to explain error distribution were related to landscape characteristics and quality of input data. The former included BA spatial properties, tree cover (from MODIS Vegetation Continous Field), and the land cover type (Globcover 2005). The latter were the number of cloud-free observations, the confidence level of the BA algorithm and the sub-pixel proportion of true BA. The relationship between explanatory variables and errors was estimated using Generalized Additive Models. This analysis was undertaken to assess global BA products within the framework of the fire_cci project (www.esa-fire-cci.org). This project is part of the European Space Agency's Climate Change Initiative, which aims to generate long-term global products of Essential Climate Variables (ECV). The fire_cci project aims to generate time series of global BA, merging data from three sensors: MERIS, (A)ATSR and VEGETATION. The error characterization exercise presented in this paper was based on MERIS BA results from 2005 in four study sites (Australia, Brazil, Canada and Kazakhstan). Results show that errors are more frequent on pixels partially burned, and tend to decrease for high and low tree-cover (when areas have either 0 or 100%), as well as when the product confidence level is high. Detected burned pixels surrounded by other burned pixels were found less

  2. Functional analysis of concealment: a novel application of prospect and refuge theory.

    PubMed

    Singh, Punya; Ellard, Colin G

    2012-09-01

    According to prospect-refuge theory, humans prefer environments that afford protection from threat (refuge), but also provide large fields of view (prospect). Prospect-refuge theory in the past has traditionally only been applied to humans, but many of the same contingencies governing spatial preference ought to also hold true in animals. The focus of this study was to examine if this phenomena also occurs in animals. Gerbils were placed in an arena containing three dome shaped refuges that varied in prospect-refuge levels. A simulated predator was released during the trial to examine how contextual factors may influence the degree of prospect and refuge preferred. The results indicate a preference for the enclosed refuge at stimulus onset even though this was not reflective of what happened prior to predator release. The results suggest spatial preferences in animals are influenced by prospect-refuge considerations in certain contexts.

  3. Uncertainty characterization in spatial categorical information

    NASA Astrophysics Data System (ADS)

    Zhang, Jingxiong; Zhang, Jinping; Yao, Na

    2008-12-01

    Uncertainty is an integral component in thematic mapping, and descriptors such as percent correctly classified pixels (PCC) and Kappa coefficients of agreement have been devised as thematic accuracy metrics. However, such spatially averaged measures neither offer hints about spatial variation in accuracy, nor are they useful for error propagation in derivatives due to the deficiency that spatial dependency is not properly accommodated. Geostatistics provides a good framework for spatial uncertainty characterization, as conditional simulation is designed for generating equal-probable realizations of often sparsely sampled fields of concern, which can be summarized for error statistics or subjected to particular geo-processing to facilitate error propagation. Often, for modeling errors in area-class maps depicting distributions of spatial classes, stochastic indicator simulation is employed. Unfortunately, indicator approaches suffer from non-invariant behaviors in simulated classes as class labels are drawn from intervals of class probabilities that are arbitrarily ordered. Discriminant space-based models have been proposed to enhance consistency in mapping spatial classes and replicability in modeling spatial categorical uncertainty. This paper explores bivariate (rather than univariate) discriminant models and extends uncertainty modeling from single-time to bi-temporal area-class maps. Experiment using simulated data sets was carried out to quantify errors in area classes and their propagation in change analysis. It was found that there are significant differences between the results obtained by discriminant models and those by indicator geostatistics. Further investigations are anticipated incorporating real data for mapping and propagating errors in area classes.

  4. Surface errors in the course of machining precision optics

    NASA Astrophysics Data System (ADS)

    Biskup, H.; Haberl, A.; Rascher, R.

    2015-08-01

    Precision optical components are usually machined by grinding and polishing in several steps with increasing accuracy. Spherical surfaces will be finished in a last step with large tools to smooth the surface. The requested surface accuracy of non-spherical surfaces only can be achieved with tools in point contact to the surface. So called mid-frequency errors (MSFE) can accumulate with zonal processes. This work is on the formation of surface errors from grinding to polishing by conducting an analysis of the surfaces in their machining steps by non-contact interferometric methods. The errors on the surface can be distinguished as described in DIN 4760 whereby 2nd to 3rd order errors are the so-called MSFE. By appropriate filtering of the measured data frequencies of errors can be suppressed in a manner that only defined spatial frequencies will be shown in the surface plot. It can be observed that some frequencies already may be formed in the early machining steps like grinding and main-polishing. Additionally it is known that MSFE can be produced by the process itself and other side effects. Beside a description of surface errors based on the limits of measurement technologies, different formation mechanisms for selected spatial frequencies are presented. A correction may be only possible by tools that have a lateral size below the wavelength of the error structure. The presented considerations may be used to develop proposals to handle surface errors.

  5. Geochemical Data for Samples Collected in 2007 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    USGS Publications Warehouse

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2008-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of

  6. Discovery of a concealed geothermal resource in the Alturas Basin, and its implications for further exploration in northeastern California

    SciTech Connect

    Bohm, B.; Juncal, R.W.

    1995-12-31

    In 1988 a so far unknown geothermal resource was drilled into under the City of Alturas in northeastern California. A fracture was tapped below 2300 feet, in cemented fine-grained tuffs and mudflows, producing 182{degrees}F water. The well has been used since 1990 to heat the local high school. A second well was drilled in 1991, producing about 250 gpm 182{degrees}F water from a fracture below 1893 ft. Well productivities and artesian pressures are variable, depending on distance from a major fault zone and local hydrologic regime. It appears as if the wells produce from deep reaching fractures in a caprock, that may conceal a 300 to 400{degrees}F resource between 4000 and 6000 feet depth. The results have important implications for geothermal exploration in northeastern California, i.e. just because there are no surface manifestations in a basin, it does not necessarily mean there is no geothermal resource at depth.

  7. The impact of prior knowledge from participant instructions in a mock crime P300 Concealed Information Test.

    PubMed

    Winograd, Michael R; Rosenfeld, J Peter

    2014-12-01

    In P300-Concealed Information Tests used with mock crime scenarios, the amount of detail revealed to a participant prior to the commission of the mock crime can have a serious impact on a study's validity. We predicted that exposure to crime details through instructions would bias detection rates toward enhanced sensitivity. In a 2 × 2 factorial design, participants were either informed (through mock crime instructions) or naïve as to the identity of a to-be-stolen item, and then either committed (guilty) or did not commit (innocent) the crime. Results showed that prior knowledge of the stolen item was sufficient to cause 69% of innocent-informed participants to be incorrectly classified as guilty. Further, we found a trend toward enhanced detection rate for guilty-informed participants over guilty-naïve participants. Results suggest that revealing details to participants through instructions biases detection rates in the P300-CIT toward enhanced sensitivity.

  8. The impact of prior knowledge from participant instructions in a mock crime P300 Concealed Information Test.

    PubMed

    Winograd, Michael R; Rosenfeld, J Peter

    2014-12-01

    In P300-Concealed Information Tests used with mock crime scenarios, the amount of detail revealed to a participant prior to the commission of the mock crime can have a serious impact on a study's validity. We predicted that exposure to crime details through instructions would bias detection rates toward enhanced sensitivity. In a 2 × 2 factorial design, participants were either informed (through mock crime instructions) or naïve as to the identity of a to-be-stolen item, and then either committed (guilty) or did not commit (innocent) the crime. Results showed that prior knowledge of the stolen item was sufficient to cause 69% of innocent-informed participants to be incorrectly classified as guilty. Further, we found a trend toward enhanced detection rate for guilty-informed participants over guilty-naïve participants. Results suggest that revealing details to participants through instructions biases detection rates in the P300-CIT toward enhanced sensitivity. PMID:25128283

  9. Packers, pushers and stuffers--managing patients with concealed drugs in UK emergency departments: a clinical and medicolegal review.

    PubMed

    Booker, R J; Smith, J E; Rodger, M P

    2009-05-01

    Body packing, pushing and stuffing are methods by which illicit drugs may be carried within the human body. Patients involved in these practices may present UK emergency departments with complex medical, legal and ethical considerations. This review article examines not only the evidence behind the clinical management of these patients, but also the legal powers afforded to the authorities to authorise the use of intimate searches and diagnostic imaging for forensic purposes. Serious complications from concealed drug packets are now rare, and most asymptomatic patients may be safely discharged from hospital after assessment. Emergency surgery is indicated for body packers with cocaine poisoning and for some cases of heroin poisoning. Urgent surgery is indicated for obstruction, perforation, the passage of packet fragments and failure of conservative treatment. Guidance is given for doctors who are faced with requests from the authorities to perform intimate searches and diagnostic imaging for forensic purposes.

  10. Lead isotopes in iron and manganese oxide coatings and their use as an exploration guide for concealed mineralization

    USGS Publications Warehouse

    Gulson, B.L.; Church, S.E.; Mizon, K.J.; Meier, A.L.

    1992-01-01

    Lead isotopes from Fe and Mn oxides that coat stream pebbles from around the Mount Emmons porphyry molybdenum deposit in Colorado were studied to assess the feasibility of using Pb isotopes to detect concealed mineral deposits. The Fe/Mn oxide coatings were analyzed to determine their elemental concentrations using ICP-AES. The Pb isotope compositions of solutions from a selected suite of samples were measured, using both thermal ionization and ICP mass spectrometry, to compare results determined by the two analytical methods. Heavy mineral concentrates from the same sites were also analyzed to compare the Pb isotope compositions of the Fe/Mn coatings with those found in panned concentrates. The Fe/Mn and 206Pb/204Pb ratios of the oxide coatings are related to the lithology of the host rocks; Fe/Mn oxide coatings on pebbles of black shale have higher Fe/Mn values than do the coatings on either sandstone or igneous rocks. The shale host rocks have a more radiogenic signature (e.g. higher 206Pb/ 204Pb) than the sandstone or igneous host rocks. The Pb isotope data from sandstone and igneous hosts can detect concealed mineralized rock on both a regional and local scale, even though there are contributions from: (1) metals from the main-stage molybdenite ore deposit; (2) metals from the phyllic alteration zone which has a more radiogenic Pb isotope signature reflecting hydrothermal leaching of Pb from the Mancos Shale; (3) Pb-rich base metal veins with a highly variable Pb isotope signature; and (4) sedimentary country rocks which have a more radiogenic Pb isotope signature. An investigation of within-stream variation shows that the Pb isotope signature of the molybdenite ore zone is retained in the Fe/Mn oxide coatings and is not camouflaged by contributions from Pb-rich base-metal veins that crop out upstream. In another traverse, the Pb isotope data from Fe/Mn oxide coatings reflect a complex mixing of Pb from the molybdenite ore zone and its hornfels margin, Pb

  11. Hidden from health: structural stigma, sexual orientation concealment, and HIV across 38 countries in the European MSM Internet Survey

    PubMed Central

    Pachankis, John E.; Hatzenbuehler, Mark L.; Hickson, Ford; Weatherburn, Peter; Berg, Rigmor C.; Marcus, Ulrich; Schmidt, Axel J.

    2016-01-01

    Objective Substantial country-level variation exists in prejudiced attitudes towards male homosexuality and in the extent to which countries promote the unequal treatment of MSM through discriminatory laws. The impact and underlying mechanisms of country-level stigma on odds of diagnosed HIV, sexual opportunities, and experience of HIV-prevention services, needs and behaviours have rarely been examined, however. Design Data come from the European MSM Internet Survey (EMIS), which was administered between June and August 2010 across 38 European countries (N =174 209). Methods Country-level stigma was assessed using a combination of national laws and policies affecting sexual minorities and a measure of attitudes held by the citizens of each country. We also assessed concealment, HIV status, number of past 12-month male sex partners, and eight HIV-preventive services, knowledge, and behavioural outcomes. Results MSM living in countries with higher levels of stigma had reduced odds of diagnosed HIV and fewer partners but higher odds of sexual risk behaviour, unmet prevention needs, not using testing services, and not discussing their sexuality in testing services. Sexual orientation concealment mediated associations between country-level stigma and these outcomes. Conclusion Country-level stigma may have historically limited HIV transmission opportunities among MSM, but by restricting MSM’s public visibility, it also reduces MSM’s ability to access HIV-preventive services, knowledge and precautionary behaviours. These findings suggest that MSM in European countries with high levels of stigma are vulnerable to HIV infection. Although they have less opportunity to identify and contact other MSM, this might change with emerging technologies. PMID:26035323

  12. Mental Health Stigma, Self-Concealment, and Help-Seeking Attitudes among Asian American and European American College Students with No Help-Seeking Experience

    ERIC Educational Resources Information Center

    Masuda, Akihiko; Boone, Matthew S.

    2011-01-01

    The present study examined whether mental health stigma (i.e., negative attitudes toward people with a psychological disorder) and self-concealment are unique predictors of help-seeking attitudes in Asian American and European American college students with no history of seeking professional psychological services. The Asian American group had…

  13. Attitudes toward Face-to-Face and Online Counseling: Roles of Self-Concealment, Openness to Experience, Loss of Face, Stigma, and Disclosure Expectations among Korean College Students

    ERIC Educational Resources Information Center

    Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon

    2014-01-01

    This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…

  14. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    ERIC Educational Resources Information Center

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  15. Skylab water balance error analysis

    NASA Technical Reports Server (NTRS)

    Leonard, J. I.

    1977-01-01

    Estimates of the precision of the net water balance were obtained for the entire Skylab preflight and inflight phases as well as for the first two weeks of flight. Quantitative estimates of both total sampling errors and instrumentation errors were obtained. It was shown that measurement error is minimal in comparison to biological variability and little can be gained from improvement in analytical accuracy. In addition, a propagation of error analysis demonstrated that total water balance error could be accounted for almost entirely by the errors associated with body mass changes. Errors due to interaction between terms in the water balance equation (covariances) represented less than 10% of the total error. Overall, the analysis provides evidence that daily measurements of body water changes obtained from the indirect balance technique are reasonable, precise, and relaible. The method is not biased toward net retention or loss.

  16. [Dealing with errors in medicine].

    PubMed

    Schoenenberger, R A; Perruchoud, A P

    1998-12-24

    Iatrogenic disease is probably more commonly than assumed the consequence of errors and mistakes committed by physicians and other medical personnel. Traditionally, strategies to prevent errors in medicine focus on inspection and rely on the professional ethos of health care personnel. The increasingly complex nature of medical practise and the multitude of interventions that each patient receives increases the likelihood of error. More efficient approaches to deal with errors have been developed. The methods include routine identification of errors (critical incidence report), systematic monitoring of multiple-step processes in medical practice, system analysis, and system redesign. A search for underlying causes of errors (rather than distal causes) will enable organizations to collectively learn without denying the inevitable occurrence of human error. Errors and mistakes may become precious chances to increase the quality of medical care.

  17. Error Sources in Asteroid Astrometry

    NASA Technical Reports Server (NTRS)

    Owen, William M., Jr.

    2000-01-01

    Asteroid astrometry, like any other scientific measurement process, is subject to both random and systematic errors, not all of which are under the observer's control. To design an astrometric observing program or to improve an existing one requires knowledge of the various sources of error, how different errors affect one's results, and how various errors may be minimized by careful observation or data reduction techniques.

  18. Reducing nurse medicine administration errors.

    PubMed

    Ofosu, Rose; Jarrett, Patricia

    Errors in administering medicines are common and can compromise the safety of patients. This review discusses the causes of drug administration error in hospitals by student and registered nurses, and the practical measures educators and hospitals can take to improve nurses' knowledge and skills in medicines management, and reduce drug errors.

  19. Error Bounds for Interpolative Approximations.

    ERIC Educational Resources Information Center

    Gal-Ezer, J.; Zwas, G.

    1990-01-01

    Elementary error estimation in the approximation of functions by polynomials as a computational assignment, error-bounding functions and error bounds, and the choice of interpolation points are discussed. Precalculus and computer instruction are used on some of the calculations. (KR)

  20. Uncertainty quantification and error analysis

    SciTech Connect

    Higdon, Dave M; Anderson, Mark C; Habib, Salman; Klein, Richard; Berliner, Mark; Covey, Curt; Ghattas, Omar; Graziani, Carlo; Seager, Mark; Sefcik, Joseph; Stark, Philip

    2010-01-01

    UQ studies all sources of error and uncertainty, including: systematic and stochastic measurement error; ignorance; limitations of theoretical models; limitations of numerical representations of those models; limitations on the accuracy and reliability of computations, approximations, and algorithms; and human error. A more precise definition for UQ is suggested below.

  1. ‘I am doing fine only because I have not told anyone’: the necessity of concealment in the lives of people living with HIV in India

    PubMed Central

    George, Mathew Sunil; Lambert, Helen

    2015-01-01

    In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives. PMID:25706959

  2. Beta systems error analysis

    NASA Technical Reports Server (NTRS)

    1984-01-01

    The atmospheric backscatter coefficient, beta, measured with an airborne CO Laser Doppler Velocimeter (LDV) system operating in a continuous wave, focussed model is discussed. The Single Particle Mode (SPM) algorithm, was developed from concept through analysis of an extensive amount of data obtained with the system on board a NASA aircraft. The SPM algorithm is intended to be employed in situations where one particle at a time appears in the sensitive volume of the LDV. In addition to giving the backscatter coefficient, the SPM algorithm also produces as intermediate results the aerosol density and the aerosol backscatter cross section distribution. A second method, which measures only the atmospheric backscatter coefficient, is called the Volume Mode (VM) and was simultaneously employed. The results of these two methods differed by slightly less than an order of magnitude. The measurement uncertainties or other errors in the results of the two methods are examined.

  3. Errors inducing radiation overdoses.

    PubMed

    Grammaticos, Philip C

    2013-01-01

    There is no doubt that equipments exposing radiation and used for therapeutic purposes should be often checked for possibly administering radiation overdoses to the patients. Technologists, radiation safety officers, radiologists, medical physicists, healthcare providers and administration should take proper care on this issue. "We must be beneficial and not harmful to the patients", according to the Hippocratic doctrine. Cases of radiation overdose are often reported. A series of cases of radiation overdoses have recently been reported. Doctors who were responsible, received heavy punishments. It is much better to prevent than to treat an error or a disease. A Personal Smart Card or Score Card has been suggested for every patient undergoing therapeutic and/or diagnostic procedures by the use of radiation. Taxonomy may also help. PMID:24251304

  4. Field Vectors to Metamorphosed Ores: A Prelude to Finding Currently Concealed Volcano-Plutonic Arc Settings and Their Mineral Deposits in The Grenville Province

    NASA Astrophysics Data System (ADS)

    Corriveau, L.; Bonnet, A.; van Breemen, O.

    2004-05-01

    Recent mineral deposits synthesis highlights the largely barren nature of the high-grade metamorphic terrains of the Canadian Shield in terms of large mining camps. No where is the gap most startling than in the Grenville Province even though a lot of its Paleo- to Mesoproterozoic crust consists of magmatic arcs renown worldwide to host IOCG, VHMS and Porphyry Cu deposits. All these deposit types have significant alteration halos that can serve as vectors to ore. The use of such vectors forced a complete reinterpretation of the nature of the La Romaine domain in the eastern Grenville Province. Mapped in the 70's as being a metasedimentary basin with >500 km2 of meta-arkose and minor pelite, quartzite, conglomerate and marble, the domain is herein reassessed as a major 1.5 Ga Pinwarian continental magmatic arc fertile in Cu-sulphides and Fe-oxides mineralizing systems. The original markers used to prognosticate a sedimentary origin can now be demonstrated to be a series of rhyolitic to dacitic lapillistone, sericitized tuff with Al nodules and veins, Al gneiss locally with lapilli textures, garnetite, ironstones and calc-silicate rocks. The distribution, paragenesis and mode of the Al-, Fe- and Ca-rich units significantly depart from those of normal metasediments but are very diagnostic of metamorphosed hydrothermal alteration zones and meta-exhalites. Mapping alteration vectors provided clues to search for and find the volcanic rocks concealed among the composite granitic gneiss, the zones of hydrothermal leaching (e.g., sericitic, argillic and advanced argillic alterations) and discharge, the cap rocks, and the Cu mineralization. Spatial and stratigraphic relationships provided a means to compare their settings with ore deposit models. Roof pendants of Ba-rich meta-exhalite in surrounding 1.5 Ga granitic plutons and intrusion of 1495 Ma Qtz-Kfs porphyry across hydrothermally altered 1500 Ma tuffs attest to coeval hydrothermal activity and sub-volcanic plutons. The

  5. Register file soft error recovery

    SciTech Connect

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  6. Rapid mapping of volumetric errors

    SciTech Connect

    Krulewich, D.; Hale, L.; Yordy, D.

    1995-09-13

    This paper describes a relatively inexpensive, fast, and easy to execute approach to mapping the volumetric errors of a machine tool, coordinate measuring machine, or robot. An error map is used to characterize a machine or to improve its accuracy by compensating for the systematic errors. The method consists of three steps: (1) modeling the relationship between the volumetric error and the current state of the machine; (2) acquiring error data based on length measurements throughout the work volume; and (3) optimizing the model to the particular machine.

  7. Spatial cognition

    NASA Technical Reports Server (NTRS)

    Kaiser, Mary Kister; Remington, Roger

    1988-01-01

    Spatial cognition is the ability to reason about geometric relationships in the real (or a metaphorical) world based on one or more internal representations of those relationships. The study of spatial cognition is concerned with the representation of spatial knowledge, and our ability to manipulate these representations to solve spatial problems. Spatial cognition is utilized most critically when direct perceptual cues are absent or impoverished. Examples are provided of how human spatial cognitive abilities impact on three areas of space station operator performance: orientation, path planning, and data base management. A videotape provides demonstrations of relevant phenomena (e.g., the importance of orientation for recognition of complex, configural forms). The presentation is represented by abstract and overhead visuals only.

  8. Spatial mapping takes time.

    PubMed

    Whishaw, I Q

    1998-01-01

    The experiment tested the prediction that spatial mapping takes time and asked whether time use is reflected in the overt behavior of a performing animal. The study examines this question by exploiting the expected behavioral differences of control rats and rats with hippocampal formation damage induced with fimbria-fornix (FF) lesions on a spatial navigation task. Previous studies have shown that control rats use a mapping strategy, in which they use the relative positions of environmental cues to reach places in space, whereas FF rats use a cue-based strategy, in which they are guided by a single cue or their own body orientation. Therefore, control and FF rats were overtrained on a complex foraging task in which they left a burrow to retrieve eight food pellets hidden around the perimeter of a circular table. The control rats retrieved the food pellets in order of their distance from the burrow, took direct routes to the food, and made few errors, all of which suggested they used a spatial strategy. The FF rats were less likely to retrieve food as a function of its distance, took a circular path around the perimeter of the table, and made many errors, suggesting they used a cue-based strategy. Despite taking shorter routes than the FF rats, the control rats had proportionally slower response speeds. Their slow response speeds support the hypothesis that spatial mapping takes time and that mapping time is reflected in behavior. The results are discussed in relation to their relevance to spatial mapping theory, hippocampal function, and the evolution of foraging strategies.

  9. Improved Error Thresholds for Measurement-Free Error Correction

    NASA Astrophysics Data System (ADS)

    Crow, Daniel; Joynt, Robert; Saffman, M.

    2016-09-01

    Motivated by limitations and capabilities of neutral atom qubits, we examine whether measurement-free error correction can produce practical error thresholds. We show that this can be achieved by extracting redundant syndrome information, giving our procedure extra fault tolerance and eliminating the need for ancilla verification. The procedure is particularly favorable when multiqubit gates are available for the correction step. Simulations of the bit-flip, Bacon-Shor, and Steane codes indicate that coherent error correction can produce threshold error rates that are on the order of 10-3 to 10-4—comparable with or better than measurement-based values, and much better than previous results for other coherent error correction schemes. This indicates that coherent error correction is worthy of serious consideration for achieving protected logical qubits.

  10. Errors in clinical laboratories or errors in laboratory medicine?

    PubMed

    Plebani, Mario

    2006-01-01

    Laboratory testing is a highly complex process and, although laboratory services are relatively safe, they are not as safe as they could or should be. Clinical laboratories have long focused their attention on quality control methods and quality assessment programs dealing with analytical aspects of testing. However, a growing body of evidence accumulated in recent decades demonstrates that quality in clinical laboratories cannot be assured by merely focusing on purely analytical aspects. The more recent surveys on errors in laboratory medicine conclude that in the delivery of laboratory testing, mistakes occur more frequently before (pre-analytical) and after (post-analytical) the test has been performed. Most errors are due to pre-analytical factors (46-68.2% of total errors), while a high error rate (18.5-47% of total errors) has also been found in the post-analytical phase. Errors due to analytical problems have been significantly reduced over time, but there is evidence that, particularly for immunoassays, interference may have a serious impact on patients. A description of the most frequent and risky pre-, intra- and post-analytical errors and advice on practical steps for measuring and reducing the risk of errors is therefore given in the present paper. Many mistakes in the Total Testing Process are called "laboratory errors", although these may be due to poor communication, action taken by others involved in the testing process (e.g., physicians, nurses and phlebotomists), or poorly designed processes, all of which are beyond the laboratory's control. Likewise, there is evidence that laboratory information is only partially utilized. A recent document from the International Organization for Standardization (ISO) recommends a new, broader definition of the term "laboratory error" and a classification of errors according to different criteria. In a modern approach to total quality, centered on patients' needs and satisfaction, the risk of errors and mistakes

  11. Improved error resilient H.264 coding scheme using SP/SI macroblocks

    NASA Astrophysics Data System (ADS)

    Zhou, Xiaosong; Kung, Wei-Ying; Kuo, C.-C. Jay

    2005-03-01

    An error resilient H.264 coding scheme using SP/SI macroblocks is presented in this work. It is able to generate alternative SP macroblocks utilizing multiple reference frames and the concealed versions of the corrupted frames. These alternative macroblocks are used to replace the original ones in the output video stream to protect them from being affected by previous errors detected at the decoder side. The introduced bit bate is further reduced by adjusting quantization levels adaptively. Specifically, different versions of alternative SP macroblocks can be coded using different quantization levels, which is associated with different levels of error resilience performance and different bit rate consumptions. A proper alternative version is encoded according to the importance of the macroblock. The importance of the macroblock is measured by its influence on subsequent frames if the macroblock is not correctly reconstructed. Accordingly, fewer bits are used to replace those macroblocks with less importance. Simulation results demonstrate the proposed approach achieves an excellent error resilient capability and an improvement in reducing the bit rate overhead.

  12. Spatial Displays and Spatial Instruments

    NASA Technical Reports Server (NTRS)

    Ellis, Stephen R. (Editor); Kaiser, Mary K. (Editor); Grunwald, Arthur J. (Editor)

    1989-01-01

    The conference proceedings topics are divided into two main areas: (1) issues of spatial and picture perception raised by graphical electronic displays of spatial information; and (2) design questions raised by the practical experience of designers actually defining new spatial instruments for use in new aircraft and spacecraft. Each topic is considered from both a theoretical and an applied direction. Emphasis is placed on discussion of phenomena and determination of design principles.

  13. Sepsis: Medical errors in Poland.

    PubMed

    Rorat, Marta; Jurek, Tomasz

    2016-01-01

    Health, safety and medical errors are currently the subject of worldwide discussion. The authors analysed medico-legal opinions trying to determine types of medical errors and their impact on the course of sepsis. The authors carried out a retrospective analysis of 66 medico-legal opinions issued by the Wroclaw Department of Forensic Medicine between 2004 and 2013 (at the request of the prosecutor or court) in cases examined for medical errors. Medical errors were confirmed in 55 of the 66 medico-legal opinions. The age of victims varied from 2 weeks to 68 years; 49 patients died. The analysis revealed medical errors committed by 113 health-care workers: 98 physicians, 8 nurses and 8 emergency medical dispatchers. In 33 cases, an error was made before hospitalisation. Hospital errors occurred in 35 victims. Diagnostic errors were discovered in 50 patients, including 46 cases of sepsis being incorrectly recognised and insufficient diagnoses in 37 cases. Therapeutic errors occurred in 37 victims, organisational errors in 9 and technical errors in 2. In addition to sepsis, 8 patients also had a severe concomitant disease and 8 had a chronic disease. In 45 cases, the authors observed glaring errors, which could incur criminal liability. There is an urgent need to introduce a system for reporting and analysing medical errors in Poland. The development and popularisation of standards for identifying and treating sepsis across basic medical professions is essential to improve patient safety and survival rates. Procedures should be introduced to prevent health-care workers from administering incorrect treatment in cases.

  14. Dopamine reward prediction error coding.

    PubMed

    Schultz, Wolfram

    2016-03-01

    Reward prediction errors consist of the differences between received and predicted rewards. They are crucial for basic forms of learning about rewards and make us strive for more rewards-an evolutionary beneficial trait. Most dopamine neurons in the midbrain of humans, monkeys, and rodents signal a reward prediction error; they are activated by more reward than predicted (positive prediction error), remain at baseline activity for fully predicted rewards, and show depressed activity with less reward than predicted (negative prediction error). The dopamine signal increases nonlinearly with reward value and codes formal economic utility. Drugs of addiction generate, hijack, and amplify the dopamine reward signal and induce exaggerated, uncontrolled dopamine effects on neuronal plasticity. The striatum, amygdala, and frontal cortex also show reward prediction error coding, but only in subpopulations of neurons. Thus, the important concept of reward prediction errors is implemented in neuronal hardware.

  15. Dopamine reward prediction error coding

    PubMed Central

    Schultz, Wolfram

    2016-01-01

    Reward prediction errors consist of the differences between received and predicted rewards. They are crucial for basic forms of learning about rewards and make us strive for more rewards—an evolutionary beneficial trait. Most dopamine neurons in the midbrain of humans, monkeys, and rodents signal a reward prediction error; they are activated by more reward than predicted (positive prediction error), remain at baseline activity for fully predicted rewards, and show depressed activity with less reward than predicted (negative prediction error). The dopamine signal increases nonlinearly with reward value and codes formal economic utility. Drugs of addiction generate, hijack, and amplify the dopamine reward signal and induce exaggerated, uncontrolled dopamine effects on neuronal plasticity. The striatum, amygdala, and frontal cortex also show reward prediction error coding, but only in subpopulations of neurons. Thus, the important concept of reward prediction errors is implemented in neuronal hardware. PMID:27069377

  16. Medication Errors in Outpatient Pediatrics.

    PubMed

    Berrier, Kyla

    2016-01-01

    Medication errors may occur during parental administration of prescription and over-the-counter medications in the outpatient pediatric setting. Misinterpretation of medication labels and dosing errors are two types of errors in medication administration. Health literacy may play an important role in parents' ability to safely manage their child's medication regimen. There are several proposed strategies for decreasing these medication administration errors, including using standardized dosing instruments, using strictly metric units for medication dosing, and providing parents and caregivers with picture-based dosing instructions. Pediatric healthcare providers should be aware of these strategies and seek to implement many of them into their practices. PMID:27537086

  17. A theory of human error

    NASA Technical Reports Server (NTRS)

    Mcruer, D. T.; Clement, W. F.; Allen, R. W.

    1980-01-01

    Human error, a significant contributing factor in a very high proportion of civil transport, general aviation, and rotorcraft accidents is investigated. Correction of the sources of human error requires that one attempt to reconstruct underlying and contributing causes of error from the circumstantial causes cited in official investigative reports. A validated analytical theory of the input-output behavior of human operators involving manual control, communication, supervisory, and monitoring tasks which are relevant to aviation operations is presented. This theory of behavior, both appropriate and inappropriate, provides an insightful basis for investigating, classifying, and quantifying the needed cause-effect relationships governing propagation of human error.

  18. Measurement Error and Equating Error in Power Analysis

    ERIC Educational Resources Information Center

    Phillips, Gary W.; Jiang, Tao

    2016-01-01

    Power analysis is a fundamental prerequisite for conducting scientific research. Without power analysis the researcher has no way of knowing whether the sample size is large enough to detect the effect he or she is looking for. This paper demonstrates how psychometric factors such as measurement error and equating error affect the power of…

  19. Anxiety and Error Monitoring: Increased Error Sensitivity or Altered Expectations?

    ERIC Educational Resources Information Center

    Compton, Rebecca J.; Carp, Joshua; Chaddock, Laura; Fineman, Stephanie L.; Quandt, Lorna C.; Ratliff, Jeffrey B.

    2007-01-01

    This study tested the prediction that the error-related negativity (ERN), a physiological measure of error monitoring, would be enhanced in anxious individuals, particularly in conditions with threatening cues. Participants made gender judgments about faces whose expressions were either happy, angry, or neutral. Replicating prior studies, midline…

  20. Improving medication administration error reporting systems. Why do errors occur?

    PubMed

    Wakefield, B J; Wakefield, D S; Uden-Holman, T

    2000-01-01

    Monitoring medication administration errors (MAE) is often included as part of the hospital's risk management program. While observation of actual medication administration is the most accurate way to identify errors, hospitals typically rely on voluntary incident reporting processes. Although incident reporting systems are more economical than other methods of error detection, incident reporting can also be a time-consuming process depending on the complexity or "user-friendliness" of the reporting system. Accurate incident reporting systems are also dependent on the ability of the practitioner to: 1) recognize an error has actually occurred; 2) believe the error is significant enough to warrant reporting; and 3) overcome the embarrassment of having committed a MAE and the fear of punishment for reporting a mistake (either one's own or another's mistake).

  1. Error propagation in energetic carrying capacity models

    USGS Publications Warehouse

    Pearse, Aaron T.; Stafford, Joshua D.

    2014-01-01

    Conservation objectives derived from carrying capacity models have been used to inform management of landscapes for wildlife populations. Energetic carrying capacity models are particularly useful in conservation planning for wildlife; these models use estimates of food abundance and energetic requirements of wildlife to target conservation actions. We provide a general method for incorporating a foraging threshold (i.e., density of food at which foraging becomes unprofitable) when estimating food availability with energetic carrying capacity models. We use a hypothetical example to describe how past methods for adjustment of foraging thresholds biased results of energetic carrying capacity models in certain instances. Adjusting foraging thresholds at the patch level of the species of interest provides results consistent with ecological foraging theory. Presentation of two case studies suggest variation in bias which, in certain instances, created large errors in conservation objectives and may have led to inefficient allocation of limited resources. Our results also illustrate how small errors or biases in application of input parameters, when extrapolated to large spatial extents, propagate errors in conservation planning and can have negative implications for target populations.

  2. A study on heterogeneous distributed spatial information platform based on semantic Web services

    NASA Astrophysics Data System (ADS)

    Peng, Shuang-yun; Yang, Kun; Xu, Quan-li; Huang, Bang-mei

    2008-10-01

    With the development of Semantic Web technology, the spatial information service based on ontology is an effective way for sharing and interoperation of heterogeneous information resources in the distributed network environment. This paper discusses spatial information sharing and interoperability in the Semantic Web Services architecture. Through using Ontology record spatial information in sharing knowledge system, explicit and formalization expresses the default and the concealment semantic information. It provides the prerequisite for spatial information sharing and interoperability; Through Semantic Web Services technology parses Ontology and intelligent buildings services under network environment, form a network of services. In order to realize the practical applications of spatial information sharing and interoperation in different brunches of CDC system, a prototype system for HIV/AIDS information sharing based on geo-ontology has also been developed by using the methods described above.

  3. Error coding simulations in C

    NASA Technical Reports Server (NTRS)

    Noble, Viveca K.

    1994-01-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  4. Error coding simulations in C

    NASA Astrophysics Data System (ADS)

    Noble, Viveca K.

    1994-10-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  5. Burst Packet Loss Concealment Using Multiple Codebooks and Comfort Noise for CELP-Type Speech Coders in Wireless Sensor Networks

    PubMed Central

    Park, Nam In; Kim, Hong Kook; Jung, Min A; Lee, Seong Ro; Choi, Seung Ho

    2011-01-01

    In this paper, a packet loss concealment (PLC) algorithm for CELP-type speech coders is proposed in order to improve the quality of decoded speech under burst packet loss conditions in a wireless sensor network. Conventional receiver-based PLC algorithms in the G.729 speech codec are usually based on speech correlation to reconstruct the decoded speech of lost frames by using parameter information obtained from the previous correctly received frames. However, this approach has difficulty in reconstructing voice onset signals since the parameters such as pitch, linear predictive coding coefficient, and adaptive/fixed codebooks of the previous frames are mostly related to silence frames. Thus, in order to reconstruct speech signals in the voice onset intervals, we propose a multiple codebook-based approach that includes a traditional adaptive codebook and a new random codebook composed of comfort noise. The proposed PLC algorithm is designed as a PLC algorithm for G.729 and its performance is then compared with that of the PLC algorithm currently employed in G.729 via a perceptual evaluation of speech quality, a waveform comparison, and a preference test under different random and burst packet loss conditions. It is shown from the experiments that the proposed PLC algorithm provides significantly better speech quality than the PLC algorithm employed in G.729 under all the test conditions. PMID:22163902

  6. Memory detection with the Concealed Information Test: a meta analysis of skin conductance, respiration, heart rate, and P300 data.

    PubMed

    Meijer, Ewout H; Selle, Nathalie Klein; Elber, Lotem; Ben-Shakhar, Gershon

    2014-09-01

    The Concealed Information Test (CIT) uses psychophysiological measures to determine the presence or absence of crime-related information in a suspect's memory. We conducted a meta-analysis on the validity of the CIT based on four physiological measures-skin conductance response (SCR), respiration line length (RLL), changes in heart rate (HR), and enhanced amplitudes of the P300 component of the event-related potential (P300). This meta-analysis relied on laboratory studies that used either the mock-crime or the personal-item paradigm. Results showed a mean effect size (d*) of 1.55 for SCR, 1.11 for RLL, 0.89 for HR, and 1.89 for P300. However, P300 outperformed SCR only in the personal-item paradigm, but not in the mock-crime paradigm. Motivation level, number of questions, publication year, and the inclusion of innocent participants emerged as significant moderators for the SCR, while only the type of paradigm used moderated the P300 effect. PMID:24916920

  7. The dengue virus conceals double-stranded RNA in the intracellular membrane to escape from an interferon response

    PubMed Central

    Uchida, Leo; Espada-Murao, Lyre Anni; Takamatsu, Yuki; Okamoto, Kenta; Hayasaka, Daisuke; Yu, Fuxun; Nabeshima, Takeshi; Buerano, Corazon C.; Morita, Kouichi

    2014-01-01

    The dengue virus (DENV) circulates between humans and mosquitoes and requires no other mammals or birds for its maintenance in nature. The virus is well-adapted to humans, as reflected by high-level viraemia in patients. To investigate its high adaptability, the DENV induction of host type-I interferon (IFN) was assessed in vitro in human-derived HeLa cells and compared with that induced by the Japanese encephalitis virus (JEV), a closely related arbovirus that generally exhibits low viraemia in humans. A sustained viral spread with a poor IFN induction was observed in the DENV-infected cells, whereas the JEV infection resulted in a self-limiting and abortive infection with a high IFN induction. There was no difference between DENV and JEV double-stranded RNA (dsRNA) as IFN inducers. Instead, the dsRNA was poorly exposed in the cytosol as late as 48 h post-infection (p.i.), despite the high level of DENV replication in the infected cells. In contrast, the JEV-derived dsRNA appeared in the cytosol as early as 24 h p.i. Our results provided evidence for the first time in DENV, that concealing dsRNA in the intracellular membrane diminishes the effect of the host defence mechanism, a strategy that differs from an active suppression of IFN activity. PMID:25491663

  8. The effect of divided attention on inhibiting the gravity error.

    PubMed

    Hood, Bruce M; Wilson, Alice; Dyson, Sally

    2006-05-01

    Children who could overcome the gravity error on Hood's (1995) tubes task were tested in a condition where they had to monitor two falling balls. This condition significantly impaired search performance with the majority of mistakes being gravity errors. In a second experiment, the effect of monitoring two balls was compared in the tubes task and a spatial transposition task not involving gravity. Again, monitoring two objects produced impaired search performance in the gravity task but not in the spatial transposition task. These findings support the view that divided attention disrupts the ability to exercise inhibitory control over the gravity error and that the performance drop on this task is not due to the additional task demands incurred by divided attention.

  9. Dose calibration optimization and error propagation in polymer gel dosimetry

    NASA Astrophysics Data System (ADS)

    Jirasek, A.; Hilts, M.

    2014-02-01

    This study reports on the relative precision, relative error, and dose differences observed when using a new full-image calibration technique in NIPAM-based x-ray CT polymer gel dosimetry. The effects of calibration parameters (e.g. gradient thresholding, dose bin size, calibration fit function, and spatial remeshing) on subsequent errors in calibrated gel images are reported. It is found that gradient thresholding, dose bin size, and fit function all play a primary role in affecting errors in calibrated images. Spatial remeshing induces minimal reductions or increases in errors in calibrated images. This study also reports on a full error propagation throughout the CT gel image pre-processing and calibration procedure thus giving, for the first time, a realistic view of the errors incurred in calibrated CT polymer gel dosimetry. While the work is based on CT polymer gel dosimetry, the formalism is valid for and easily extended to MRI or optical CT dosimetry protocols. Hence, the procedures developed within the work are generally applicable to calibration of polymer gel dosimeters.

  10. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    PubMed

    Varga, Mihai; Visu-Petra, George; Miclea, Mircea; Visu-Petra, Laura

    2015-01-01

    Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity) simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral) would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM) updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression). Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants). Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression) of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the transfer of

  11. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    PubMed

    Varga, Mihai; Visu-Petra, George; Miclea, Mircea; Visu-Petra, Laura

    2015-01-01

    Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity) simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral) would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM) updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression). Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants). Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression) of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the transfer of

  12. The “Good Cop, Bad Cop” Effect in the RT-Based Concealed Information Test: Exploring the Effect of Emotional Expressions Displayed by a Virtual Investigator

    PubMed Central

    Varga, Mihai; Visu-Petra, George; Miclea, Mircea; Visu-Petra, Laura

    2015-01-01

    Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity) simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral) would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM) updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression). Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants). Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression) of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the transfer of

  13. Operational Interventions to Maintenance Error

    NASA Technical Reports Server (NTRS)

    Kanki, Barbara G.; Walter, Diane; Dulchinos, VIcki

    1997-01-01

    A significant proportion of aviation accidents and incidents are known to be tied to human error. However, research of flight operational errors has shown that so-called pilot error often involves a variety of human factors issues and not a simple lack of individual technical skills. In aircraft maintenance operations, there is similar concern that maintenance errors which may lead to incidents and accidents are related to a large variety of human factors issues. Although maintenance error data and research are limited, industry initiatives involving human factors training in maintenance have become increasingly accepted as one type of maintenance error intervention. Conscientious efforts have been made in re-inventing the team7 concept for maintenance operations and in tailoring programs to fit the needs of technical opeRAtions. Nevertheless, there remains a dual challenge: 1) to develop human factors interventions which are directly supported by reliable human error data, and 2) to integrate human factors concepts into the procedures and practices of everyday technical tasks. In this paper, we describe several varieties of human factors interventions and focus on two specific alternatives which target problems related to procedures and practices; namely, 1) structured on-the-job training and 2) procedure re-design. We hope to demonstrate that the key to leveraging the impact of these solutions comes from focused interventions; that is, interventions which are derived from a clear understanding of specific maintenance errors, their operational context and human factors components.

  14. Human Error: A Concept Analysis

    NASA Technical Reports Server (NTRS)

    Hansen, Frederick D.

    2007-01-01

    Human error is the subject of research in almost every industry and profession of our times. This term is part of our daily language and intuitively understood by most people however, it would be premature to assume that everyone's understanding of human error s the same. For example, human error is used to describe the outcome or consequence of human action, the causal factor of an accident, deliberate violations,a nd the actual action taken by a human being. As a result, researchers rarely agree on the either a specific definition or how to prevent human error. The purpose of this article is to explore the specific concept of human error using Concept Analysis as described by Walker and Avant (1995). The concept of human error is examined as currently used in the literature of a variety of industries and professions. Defining attributes and examples of model, borderline, and contrary cases are described. The antecedents and consequences of human error are also discussed and a definition of human error is offered.

  15. Explaining Errors in Children's Questions

    ERIC Educational Resources Information Center

    Rowland, Caroline F.

    2007-01-01

    The ability to explain the occurrence of errors in children's speech is an essential component of successful theories of language acquisition. The present study tested some generativist and constructivist predictions about error on the questions produced by ten English-learning children between 2 and 5 years of age. The analyses demonstrated that,…

  16. Dual Processing and Diagnostic Errors

    ERIC Educational Resources Information Center

    Norman, Geoff

    2009-01-01

    In this paper, I review evidence from two theories in psychology relevant to diagnosis and diagnostic errors. "Dual Process" theories of thinking, frequently mentioned with respect to diagnostic error, propose that categorization decisions can be made with either a fast, unconscious, contextual process called System 1 or a slow, analytical,…

  17. Children's Scale Errors with Tools

    ERIC Educational Resources Information Center

    Casler, Krista; Eshleman, Angelica; Greene, Kimberly; Terziyan, Treysi

    2011-01-01

    Children sometimes make "scale errors," attempting to interact with tiny object replicas as though they were full size. Here, we demonstrate that instrumental tools provide special insight into the origins of scale errors and, moreover, into the broader nature of children's purpose-guided reasoning and behavior with objects. In Study 1, 1.5- to…

  18. Left neglect dyslexia: Perseveration and reading error types.

    PubMed

    Ronchi, Roberta; Algeri, Lorella; Chiapella, Laura; Gallucci, Marcello; Spada, Maria Simonetta; Vallar, Giuseppe

    2016-08-01

    Right-brain-damaged patients may show a reading disorder termed neglect dyslexia. Patients with left neglect dyslexia omit letters on the left-hand-side (the beginning, when reading left-to-right) part of the letter string, substitute them with other letters, and add letters to the left of the string. The aim of this study was to investigate the pattern of association, if any, between error types in patients with left neglect dyslexia and recurrent perseveration (a productive visuo-motor deficit characterized by addition of marks) in target cancellation. Specifically, we aimed at assessing whether different productive symptoms (relative to the reading and the visuo-motor domains) could be associated in patients with left spatial neglect. Fifty-four right-brain-damaged patients took part in the study: 50 out of the 54 patients showed left spatial neglect, with 27 of them also exhibiting left neglect dyslexia. Neglect dyslexic patients who showed perseveration produced mainly substitution neglect errors in reading. Conversely, omissions were the prevailing reading error pattern in neglect dyslexic patients without perseveration. Addition reading errors were much infrequent. Different functional pathological mechanisms may underlie omission and substitution reading errors committed by right-brain-damaged patients with left neglect dyslexia. One such mechanism, involving the defective stopping of inappropriate responses, may contribute to both recurrent perseveration in target cancellation, and substitution errors in reading. Productive pathological phenomena, together with deficits of spatial attention to events taking place on the left-hand-side of space, shape the manifestations of neglect dyslexia, and, more generally, of spatial neglect. PMID:27450268

  19. Left neglect dyslexia: Perseveration and reading error types.

    PubMed

    Ronchi, Roberta; Algeri, Lorella; Chiapella, Laura; Gallucci, Marcello; Spada, Maria Simonetta; Vallar, Giuseppe

    2016-08-01

    Right-brain-damaged patients may show a reading disorder termed neglect dyslexia. Patients with left neglect dyslexia omit letters on the left-hand-side (the beginning, when reading left-to-right) part of the letter string, substitute them with other letters, and add letters to the left of the string. The aim of this study was to investigate the pattern of association, if any, between error types in patients with left neglect dyslexia and recurrent perseveration (a productive visuo-motor deficit characterized by addition of marks) in target cancellation. Specifically, we aimed at assessing whether different productive symptoms (relative to the reading and the visuo-motor domains) could be associated in patients with left spatial neglect. Fifty-four right-brain-damaged patients took part in the study: 50 out of the 54 patients showed left spatial neglect, with 27 of them also exhibiting left neglect dyslexia. Neglect dyslexic patients who showed perseveration produced mainly substitution neglect errors in reading. Conversely, omissions were the prevailing reading error pattern in neglect dyslexic patients without perseveration. Addition reading errors were much infrequent. Different functional pathological mechanisms may underlie omission and substitution reading errors committed by right-brain-damaged patients with left neglect dyslexia. One such mechanism, involving the defective stopping of inappropriate responses, may contribute to both recurrent perseveration in target cancellation, and substitution errors in reading. Productive pathological phenomena, together with deficits of spatial attention to events taking place on the left-hand-side of space, shape the manifestations of neglect dyslexia, and, more generally, of spatial neglect.

  20. Challenge and error: critical events and attention-related errors.

    PubMed

    Cheyne, James Allan; Carriere, Jonathan S A; Solman, Grayden J F; Smilek, Daniel

    2011-12-01

    Attention lapses resulting from reactivity to task challenges and their consequences constitute a pervasive factor affecting everyday performance errors and accidents. A bidirectional model of attention lapses (error↔attention-lapse: Cheyne, Solman, Carriere, & Smilek, 2009) argues that errors beget errors by generating attention lapses; resource-depleting cognitions interfering with attention to subsequent task challenges. Attention lapses lead to errors, and errors themselves are a potent consequence often leading to further attention lapses potentially initiating a spiral into more serious errors. We investigated this challenge-induced error↔attention-lapse model using the Sustained Attention to Response Task (SART), a GO-NOGO task requiring continuous attention and response to a number series and withholding of responses to a rare NOGO digit. We found response speed and increased commission errors following task challenges to be a function of temporal distance from, and prior performance on, previous NOGO trials. We conclude by comparing and contrasting the present theory and findings to those based on choice paradigms and argue that the present findings have implications for the generality of conflict monitoring and control models.

  1. Human error in recreational boating.

    PubMed

    McKnight, A James; Becker, Wayne W; Pettit, Anthony J; McKnight, A Scott

    2007-03-01

    Each year over 600 people die and more than 4000 are reported injured in recreational boating accidents. As with most other accidents, human error is the major contributor. U.S. Coast Guard reports of 3358 accidents were analyzed to identify errors in each of the boat types by which statistics are compiled: auxiliary (motor) sailboats, cabin motorboats, canoes and kayaks, house boats, personal watercraft, open motorboats, pontoon boats, row boats, sail-only boats. The individual errors were grouped into categories on the basis of similarities in the behavior involved. Those presented here are the categories accounting for at least 5% of all errors when summed across boat types. The most revealing and significant finding is the extent to which the errors vary across types. Since boating is carried out with one or two types of boats for long periods of time, effective accident prevention measures, including safety instruction, need to be geared to individual boat types.

  2. Angle interferometer cross axis errors

    SciTech Connect

    Bryan, J.B.; Carter, D.L.; Thompson, S.L.

    1994-01-01

    Angle interferometers are commonly used to measure surface plate flatness. An error can exist when the centerline of the double comer cube mirror assembly is not square to the surface plate and the guide bar for the mirror sled is curved. Typical errors can be one to two microns per meter. A similar error can exist in the calibration of rotary tables when the centerline of the double comer cube mirror assembly is not square to the axes of rotation of the angle calibrator and the calibrator axis is not parallel to the rotary table axis. Commercial double comer cube assemblies typically have non-parallelism errors of ten milli-radians between their centerlines and their sides and similar values for non-squareness between their centerlines and end surfaces. The authors have developed a simple method for measuring these errors and correcting them by remachining the reference surfaces.

  3. Onorbit IMU alignment error budget

    NASA Technical Reports Server (NTRS)

    Corson, R. W.

    1980-01-01

    The Star Tracker, Crew Optical Alignment Sight (COAS), and Inertial Measurement Unit (IMU) from a complex navigation system with a multitude of error sources were combined. A complete list of the system errors is presented. The errors were combined in a rational way to yield an estimate of the IMU alignment accuracy for STS-1. The expected standard deviation in the IMU alignment error for STS-1 type alignments was determined to be 72 arc seconds per axis for star tracker alignments and 188 arc seconds per axis for COAS alignments. These estimates are based on current knowledge of the star tracker, COAS, IMU, and navigation base error specifications, and were partially verified by preliminary Monte Carlo analysis.

  4. A theory of human error

    NASA Technical Reports Server (NTRS)

    Mcruer, D. T.; Clement, W. F.; Allen, R. W.

    1981-01-01

    Human errors tend to be treated in terms of clinical and anecdotal descriptions, from which remedial measures are difficult to derive. Correction of the sources of human error requires an attempt to reconstruct underlying and contributing causes of error from the circumstantial causes cited in official investigative reports. A comprehensive analytical theory of the cause-effect relationships governing propagation of human error is indispensable to a reconstruction of the underlying and contributing causes. A validated analytical theory of the input-output behavior of human operators involving manual control, communication, supervisory, and monitoring tasks which are relevant to aviation, maritime, automotive, and process control operations is highlighted. This theory of behavior, both appropriate and inappropriate, provides an insightful basis for investigating, classifying, and quantifying the needed cause-effect relationships governing propagation of human error.

  5. Novel, real-time standoff detection of explosives and other substances concealed under clothing, integrated into standard TV images via data fusion

    NASA Astrophysics Data System (ADS)

    Diamond, G. G.; Gohel, R. B.

    2009-05-01

    A novel and low-cost technique of standoff detection is presented that permits the detection of explosives and other contraband substances that are hidden under clothing at standoff distances . The technique uses NIR beams of wavelengths found in ordinary domestic remote controls, combined with various signal recovery techniques commonly used in astronomy. This alternative technique, whilst sophisticated, utilises readily available optoelectronic components. It is inherently far more portable than currently available commercial alternatives and is easy to use. A pre-production prototype successfully detected and identified the common homemade explosives, ammonium nitrate and hydrogen peroxide, which were concealed behind clothing from a distance of 5 metres under daytime conditions. In principle, this distance could be extended as far as 50 metres without a significant increase in cost or complexity. Another advantage of this device is that apart from providing standoff chemical signatures and analyses of concealed substances, this it can simultaneously superimpose the chemical information on top of a normal TV image in a data fusion approach; that is, an image appears on the screen , the area/subject of interest can be zoomed in on and enlarged and a representation of a chemical spectrum appears on the screen underneath the image. A supplemental technique is also reported upon that, under the appropriate circumstances, enable actual imaging of concealed objects to be accomplished.

  6. Sulfur-containing particles emitted by concealed sulfide ore deposits: an unknown source of sulfur-containing particles in the atmosphere

    NASA Astrophysics Data System (ADS)

    Cao, J. J.; Li, Y. K.; Jiang, T.; Hu, G.

    2015-06-01

    Sources of sulfur dioxide, sulfates, and organic sulfur compounds, such as fossil fuels, volcanic eruptions, and animal feeding operations, have attracted considerable attention. In this study, we collected particles carried by geogas flows ascending through soil, geogas flows above the soil that had passed through the soil, and geogas flows ascending through deep faults of concealed sulfide ore deposits, and analysed them using transmission electron microscopy. Numerous crystalline and amorphous sulfur-containing particles or particle aggregations were found in the ascending geogas flows. In addition to S, the particles contained O, Ca, K, Mg, Fe, Na, Pb, Hg, Cu, Zn, As, Ti, Sr, Ba, Si, etc. Such particles are usually a few to several hundred nanometres in diameter with either regular or irregular morphology. The sulfur-containing particles originated from deep-seated weathering or faulting products of concealed sulfide ore deposits. The particles suspended in the ascending geogas flow migrated through faults from deep-seated sources to the atmosphere. This is a previously unknown source of the atmospheric particles. This paper reports, for the first time, the emission of sulfur-containing particles into the atmosphere from concealed sulfide ore deposits. The climatic and ecological influences of these sulfur-containing particles and particle aggregations should be assessed.

  7. Sulfur-containing particles emitted by concealed sulfide ore deposits: an unknown source of sulfur-containing particles in the atmosphere

    NASA Astrophysics Data System (ADS)

    Cao, J.; Li, Y.; Jiang, T.; Hu, G.

    2014-11-01

    Sources of sulfur dioxide, sulfates, and organic sulfur compounds, such as fossil fuels, volcanic eruptions, and animal feeding operations, have attracted considerable attention. In this study, we collected particles carried by geogas flows ascending through soil, geogas flows above the soil that had passed through the soil, and geogas flows ascending through deep faults of concealed sulfide ore deposits and analyzed them using transmission electron microscopy. Numerous crystalline and amorphous sulfur-containing particles or particle aggregations were found in the ascending geogas flows. In addition to S, the particles contained O, Ca, K, Mg, Fe, Na, Pb, Hg, Cu, Zn, As, Ti, Sr, Ba, Si, etc. Such particles are usually a few to several hundred nanometers in diameter with either regular or irregular morphology. The sulfur-containing particles originated from deep-seated weathering or faulting products of concealed sulfide ore deposits. The particles suspended in the ascending geogas flow migrated through faults from deep-seated sources to the atmosphere. This is a previously unknown source of the atmospheric particles. This paper reports, for the first time, the emission of sulfur-containing particles into the atmosphere from concealed sulfide ore deposits. The climatic and ecological influences of these sulfur-containing particles and particle aggregations should to be assessed.

  8. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    PubMed

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information. PMID:24531833

  9. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    PubMed

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.

  10. Error diffusion with a more symmetric error distribution

    NASA Astrophysics Data System (ADS)

    Fan, Zhigang

    1994-05-01

    In this paper a new error diffusion algorithm is presented that effectively eliminates the `worm' artifacts appearing in the standard methods. The new algorithm processes each scanline of the image in two passes, a forward pass followed by a backward one. This enables the error made at one pixel to be propagated to all the `future' pixels. A much more symmetric error distribution is achieved than that of the standard methods. The frequency response of the noise shaping filter associated with the new algorithm is mirror-symmetric in magnitude.

  11. Errors as allies: error management training in health professions education.

    PubMed

    King, Aimee; Holder, Michael G; Ahmed, Rami A

    2013-06-01

    This paper adopts methods from the organisational team training literature to outline how health professions education can improve patient safety. We argue that health educators can improve training quality by intentionally encouraging errors during simulation-based team training. Preventable medical errors are inevitable, but encouraging errors in low-risk settings like simulation can allow teams to have better emotional control and foresight to manage the situation if it occurs again with live patients. Our paper outlines an innovative approach for delivering team training.

  12. Phase measurement error in summation of electron holography series.

    PubMed

    McLeod, Robert A; Bergen, Michael; Malac, Marek

    2014-06-01

    Off-axis electron holography is a method for the transmission electron microscope (TEM) that measures the electric and magnetic properties of a specimen. The electrostatic and magnetic potentials modulate the electron wavefront phase. The error in measurement of the phase therefore determines the smallest observable changes in electric and magnetic properties. Here we explore the summation of a hologram series to reduce the phase error and thereby improve the sensitivity of electron holography. Summation of hologram series requires independent registration and correction of image drift and phase wavefront drift, the consequences of which are discussed. Optimization of the electro-optical configuration of the TEM for the double biprism configuration is examined. An analytical model of image and phase drift, composed of a combination of linear drift and Brownian random-walk, is derived and experimentally verified. The accuracy of image registration via cross-correlation and phase registration is characterized by simulated hologram series. The model of series summation errors allows the optimization of phase error as a function of exposure time and fringe carrier frequency for a target spatial resolution. An experimental example of hologram series summation is provided on WS2 fullerenes. A metric is provided to measure the object phase error from experimental results and compared to analytical predictions. The ultimate experimental object root-mean-square phase error is 0.006 rad (2π/1050) at a spatial resolution less than 0.615 nm and a total exposure time of 900 s. The ultimate phase error in vacuum adjacent to the specimen is 0.0037 rad (2π/1700). The analytical prediction of phase error differs with the experimental metrics by +7% inside the object and -5% in the vacuum, indicating that the model can provide reliable quantitative predictions.

  13. Error compensation for thermally induced errors on a machine tool

    SciTech Connect

    Krulewich, D.A.

    1996-11-08

    Heat flow from internal and external sources and the environment create machine deformations, resulting in positioning errors between the tool and workpiece. There is no industrially accepted method for thermal error compensation. A simple model has been selected that linearly relates discrete temperature measurements to the deflection. The biggest problem is how to locate the temperature sensors and to determine the number of required temperature sensors. This research develops a method to determine the number and location of temperature measurements.

  14. Error resilient image transmission based on virtual SPIHT

    NASA Astrophysics Data System (ADS)

    Liu, Rongke; He, Jie; Zhang, Xiaolin

    2007-02-01

    SPIHT is one of the most efficient image compression algorithms. It had been successfully applied to a wide variety of images, such as medical and remote sensing images. However, it is highly susceptible to channel errors. A single bit error could potentially lead to decoder derailment. In this paper, we integrate new error resilient tools into wavelet coding algorithm and present an error-resilient image transmission scheme based on virtual set partitioning in hierarchical trees (SPIHT), EREC and self truncation mechanism. After wavelet decomposition, the virtual spatial-orientation trees in the wavelet domain are individually encoded using virtual SPIHT. Since the self-similarity across sub bands is preserved, a high source coding efficiency can be achieved. The scheme is essentially a tree-based coding, thus error propagation is limited within each virtual tree. The number of virtual trees may be adjusted according to the channel conditions. When the channel is excellent, we may decrease the number of trees to further improve the compression efficiency, otherwise increase the number of trees to guarantee the error resilience to channel. EREC is also adopted to enhance the error resilience capability of the compressed bit streams. At the receiving side, the self-truncation mechanism based on self constraint of set partition trees is introduced. The decoding of any sub-tree halts in case the violation of self-constraint relationship occurs in the tree. So the bits impacted by the error propagation are limited and more likely located in the low bit-layers. In additional, inter-trees interpolation method is applied, thus some errors are compensated. Preliminary experimental results demonstrate that the proposed scheme can achieve much more benefits on error resilience.

  15. Errors, error detection, error correction and hippocampal-region damage: data and theories.

    PubMed

    MacKay, Donald G; Johnson, Laura W

    2013-11-01

    This review and perspective article outlines 15 observational constraints on theories of errors, error detection, and error correction, and their relation to hippocampal-region (HR) damage. The core observations come from 10 studies with H.M., an amnesic with cerebellar and HR damage but virtually no neocortical damage. Three studies examined the detection of errors planted in visual scenes (e.g., a bird flying in a fish bowl in a school classroom) and sentences (e.g., I helped themselves to the birthday cake). In all three experiments, H.M. detected reliably fewer errors than carefully matched memory-normal controls. Other studies examined the detection and correction of self-produced errors, with controls for comprehension of the instructions, impaired visual acuity, temporal factors, motoric slowing, forgetting, excessive memory load, lack of motivation, and deficits in visual scanning or attention. In these studies, H.M. corrected reliably fewer errors than memory-normal and cerebellar controls, and his uncorrected errors in speech, object naming, and reading aloud exhibited two consistent features: omission and anomaly. For example, in sentence production tasks, H.M. omitted one or more words in uncorrected encoding errors that rendered his sentences anomalous (incoherent, incomplete, or ungrammatical) reliably more often than controls. Besides explaining these core findings, the theoretical principles discussed here explain H.M.'s retrograde amnesia for once familiar episodic and semantic information; his anterograde amnesia for novel information; his deficits in visual cognition, sentence comprehension, sentence production, sentence reading, and object naming; and effects of aging on his ability to read isolated low frequency words aloud. These theoretical principles also explain a wide range of other data on error detection and correction and generate new predictions for future test.

  16. Errors, error detection, error correction and hippocampal-region damage: data and theories.

    PubMed

    MacKay, Donald G; Johnson, Laura W

    2013-11-01

    This review and perspective article outlines 15 observational constraints on theories of errors, error detection, and error correction, and their relation to hippocampal-region (HR) damage. The core observations come from 10 studies with H.M., an amnesic with cerebellar and HR damage but virtually no neocortical damage. Three studies examined the detection of errors planted in visual scenes (e.g., a bird flying in a fish bowl in a school classroom) and sentences (e.g., I helped themselves to the birthday cake). In all three experiments, H.M. detected reliably fewer errors than carefully matched memory-normal controls. Other studies examined the detection and correction of self-produced errors, with controls for comprehension of the instructions, impaired visual acuity, temporal factors, motoric slowing, forgetting, excessive memory load, lack of motivation, and deficits in visual scanning or attention. In these studies, H.M. corrected reliably fewer errors than memory-normal and cerebellar controls, and his uncorrected errors in speech, object naming, and reading aloud exhibited two consistent features: omission and anomaly. For example, in sentence production tasks, H.M. omitted one or more words in uncorrected encoding errors that rendered his sentences anomalous (incoherent, incomplete, or ungrammatical) reliably more often than controls. Besides explaining these core findings, the theoretical principles discussed here explain H.M.'s retrograde amnesia for once familiar episodic and semantic information; his anterograde amnesia for novel information; his deficits in visual cognition, sentence comprehension, sentence production, sentence reading, and object naming; and effects of aging on his ability to read isolated low frequency words aloud. These theoretical principles also explain a wide range of other data on error detection and correction and generate new predictions for future test. PMID:23999403

  17. BFC: correcting Illumina sequencing errors

    PubMed Central

    2015-01-01

    Summary: BFC is a free, fast and easy-to-use sequencing error corrector designed for Illumina short reads. It uses a non-greedy algorithm but still maintains a speed comparable to implementations based on greedy methods. In evaluations on real data, BFC appears to correct more errors with fewer overcorrections in comparison to existing tools. It particularly does well in suppressing systematic sequencing errors, which helps to improve the base accuracy of de novo assemblies. Availability and implementation: https://github.com/lh3/bfc Contact: hengli@broadinstitute.org Supplementary information: Supplementary data are available at Bioinformatics online. PMID:25953801

  18. Guaranteed error bounds for structured complexity reduction of biochemical networks.

    PubMed

    Prescott, Thomas P; Papachristodoulou, Antonis

    2012-07-01

    Biological systems are typically modelled by nonlinear differential equations. In an effort to produce high fidelity representations of the underlying phenomena, these models are usually of high dimension and involve multiple temporal and spatial scales. However, this complexity and associated stiffness makes numerical simulation difficult and mathematical analysis impossible. In order to understand the functionality of these systems, these models are usually approximated by lower dimensional descriptions. These can be analysed and simulated more easily, and the reduced description also simplifies the parameter space of the model. This model reduction inevitably introduces error: the accuracy of the conclusions one makes about the system, based on reduced models, depends heavily on the error introduced in the reduction process. In this paper we propose a method to calculate the error associated with a model reduction algorithm, using ideas from dynamical systems. We first define an error system, whose output is the error between observables of the original and reduced systems. We then use convex optimisation techniques in order to find approximations to the error as a function of the initial conditions. In particular, we use the Sum of Squares decomposition of polynomials in order to compute an upper bound on the worst-case error between the original and reduced systems. We give biological examples to illustrate the theory, which leads us to a discussion about how these techniques can be used to model-reduce large, structured models typical of systems biology.

  19. Examining Effects of Anticipated Stigma, Centrality, Salience, Internalization, and Outness on Psychological Distress for People with Concealable Stigmatized Identities

    PubMed Central

    Quinn, Diane M.; Williams, Michelle K.; Quintana, Francisco; Gaskins, Jennifer L.; Overstreet, Nicole M.; Pishori, Alefiyah; Earnshaw, Valerie A.; Perez, Giselle; Chaudoir, Stephenie R.

    2014-01-01

    Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI). We targeted 5 specific CSIs – mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse – that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma), the level of defining oneself by the stigmatized identity (centrality), the frequency of thinking about the identity (salience), the extent of agreement with negative stereotypes about the identity (internalized stigma), and extent to which other people currently know about the identity (outness). Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety). In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault). Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress. PMID:24817189

  20. FORCE: FORtran for Cosmic Errors

    NASA Astrophysics Data System (ADS)

    Colombi, Stéphane; Szapudi, István

    We review the theory of cosmic errors we have recently developed for count-in-cells statistics. The corresponding FORCE package provides a simple and useful way to compute cosmic covariance on factorial moments and cumulants measured in galaxy catalogs.

  1. Human errors and measurement uncertainty

    NASA Astrophysics Data System (ADS)

    Kuselman, Ilya; Pennecchi, Francesca

    2015-04-01

    Evaluating the residual risk of human errors in a measurement and testing laboratory, remaining after the error reduction by the laboratory quality system, and quantifying the consequences of this risk for the quality of the measurement/test results are discussed based on expert judgments and Monte Carlo simulations. A procedure for evaluation of the contribution of the residual risk to the measurement uncertainty budget is proposed. Examples are provided using earlier published sets of expert judgments on human errors in pH measurement of groundwater, elemental analysis of geological samples by inductively coupled plasma mass spectrometry, and multi-residue analysis of pesticides in fruits and vegetables. The human error contribution to the measurement uncertainty budget in the examples was not negligible, yet also not dominant. This was assessed as a good risk management result.

  2. Quantile Regression With Measurement Error

    PubMed Central

    Wei, Ying; Carroll, Raymond J.

    2010-01-01

    Regression quantiles can be substantially biased when the covariates are measured with error. In this paper we propose a new method that produces consistent linear quantile estimation in the presence of covariate measurement error. The method corrects the measurement error induced bias by constructing joint estimating equations that simultaneously hold for all the quantile levels. An iterative EM-type estimation algorithm to obtain the solutions to such joint estimation equations is provided. The finite sample performance of the proposed method is investigated in a simulation study, and compared to the standard regression calibration approach. Finally, we apply our methodology to part of the National Collaborative Perinatal Project growth data, a longitudinal study with an unusual measurement error structure. PMID:20305802

  3. Robust characterization of leakage errors

    NASA Astrophysics Data System (ADS)

    Wallman, Joel J.; Barnhill, Marie; Emerson, Joseph

    2016-04-01

    Leakage errors arise when the quantum state leaks out of some subspace of interest, for example, the two-level subspace of a multi-level system defining a computational ‘qubit’, the logical code space of a quantum error-correcting code, or a decoherence-free subspace. Leakage errors pose a distinct challenge to quantum control relative to the more well-studied decoherence errors and can be a limiting factor to achieving fault-tolerant quantum computation. Here we present a scalable and robust randomized benchmarking protocol for quickly estimating the leakage rate due to an arbitrary Markovian noise process on a larger system. We illustrate the reliability of the protocol through numerical simulations.

  4. Static Detection of Disassembly Errors

    SciTech Connect

    Krishnamoorthy, Nithya; Debray, Saumya; Fligg, Alan K

    2009-10-13

    Static disassembly is a crucial first step in reverse engineering executable files, and there is a consider- able body of work in reverse-engineering of binaries, as well as areas such as semantics-based security anal- ysis, that assumes that the input executable has been correctly disassembled. However, disassembly errors, e.g., arising from binary obfuscations, can render this assumption invalid. This work describes a machine- learning-based approach, using decision trees, for stat- ically identifying possible errors in a static disassem- bly; such potential errors may then be examined more closely, e.g., using dynamic analyses. Experimental re- sults using a variety of input executables indicate that our approach performs well, correctly identifying most disassembly errors with relatively few false positives.

  5. Dual processing and diagnostic errors.

    PubMed

    Norman, Geoff

    2009-09-01

    In this paper, I review evidence from two theories in psychology relevant to diagnosis and diagnostic errors. "Dual Process" theories of thinking, frequently mentioned with respect to diagnostic error, propose that categorization decisions can be made with either a fast, unconscious, contextual process called System 1 or a slow, analytical, conscious, and conceptual process, called System 2. Exemplar theories of categorization propose that many category decisions in everyday life are made by unconscious matching to a particular example in memory, and these remain available and retrievable individually. I then review studies of clinical reasoning based on these theories, and show that the two processes are equally effective; System 1, despite its reliance in idiosyncratic, individual experience, is no more prone to cognitive bias or diagnostic error than System 2. Further, I review evidence that instructions directed at encouraging the clinician to explicitly use both strategies can lead to consistent reduction in error rates.

  6. Prospective errors determine motor learning

    PubMed Central

    Takiyama, Ken; Hirashima, Masaya; Nozaki, Daichi

    2015-01-01

    Diverse features of motor learning have been reported by numerous studies, but no single theoretical framework concurrently accounts for these features. Here, we propose a model for motor learning to explain these features in a unified way by extending a motor primitive framework. The model assumes that the recruitment pattern of motor primitives is determined by the predicted movement error of an upcoming movement (prospective error). To validate this idea, we perform a behavioural experiment to examine the model’s novel prediction: after experiencing an environment in which the movement error is more easily predictable, subsequent motor learning should become faster. The experimental results support our prediction, suggesting that the prospective error might be encoded in the motor primitives. Furthermore, we demonstrate that this model has a strong explanatory power to reproduce a wide variety of motor-learning-related phenomena that have been separately explained by different computational models. PMID:25635628

  7. Orbital and Geodetic Error Analysis

    NASA Technical Reports Server (NTRS)

    Felsentreger, T.; Maresca, P.; Estes, R.

    1985-01-01

    Results that previously required several runs determined in more computer-efficient manner. Multiple runs performed only once with GEODYN and stored on tape. ERODYN then performs matrix partitioning and linear algebra required for each individual error-analysis run.

  8. Interpolation Errors in Spectrum Analyzers

    NASA Technical Reports Server (NTRS)

    Martin, J. L.

    1996-01-01

    To obtain the proper measurement amplitude with a spectrum analyzer, the correct frequency-dependent transducer factor must be added to the voltage measured by the transducer. This report examines how entering transducer factors into a spectrum analyzer can cause significant errors in field amplitude due to the misunderstanding of the analyzer's interpolation methods. It also discusses how to reduce these errors to obtain a more accurate field amplitude reading.

  9. Relative-Error-Covariance Algorithms

    NASA Technical Reports Server (NTRS)

    Bierman, Gerald J.; Wolff, Peter J.

    1991-01-01

    Two algorithms compute error covariance of difference between optimal estimates, based on data acquired during overlapping or disjoint intervals, of state of discrete linear system. Provides quantitative measure of mutual consistency or inconsistency of estimates of states. Relative-error-covariance concept applied, to determine degree of correlation between trajectories calculated from two overlapping sets of measurements and construct real-time test of consistency of state estimates based upon recently acquired data.

  10. Quantifying errors without random sampling

    PubMed Central

    Phillips, Carl V; LaPole, Luwanna M

    2003-01-01

    Background All quantifications of mortality, morbidity, and other health measures involve numerous sources of error. The routine quantification of random sampling error makes it easy to forget that other sources of error can and should be quantified. When a quantification does not involve sampling, error is almost never quantified and results are often reported in ways that dramatically overstate their precision. Discussion We argue that the precision implicit in typical reporting is problematic and sketch methods for quantifying the various sources of error, building up from simple examples that can be solved analytically to more complex cases. There are straightforward ways to partially quantify the uncertainty surrounding a parameter that is not characterized by random sampling, such as limiting reported significant figures. We present simple methods for doing such quantifications, and for incorporating them into calculations. More complicated methods become necessary when multiple sources of uncertainty must be combined. We demonstrate that Monte Carlo simulation, using available software, can estimate the uncertainty resulting from complicated calculations with many sources of uncertainty. We apply the method to the current estimate of the annual incidence of foodborne illness in the United States. Summary Quantifying uncertainty from systematic errors is practical. Reporting this uncertainty would more honestly represent study results, help show the probability that estimated values fall within some critical range, and facilitate better targeting of further research. PMID:12892568

  11. Medical Error and Moral Luck.

    PubMed

    Hubbeling, Dieneke

    2016-09-01

    This paper addresses the concept of moral luck. Moral luck is discussed in the context of medical error, especially an error of omission that occurs frequently, but only rarely has adverse consequences. As an example, a failure to compare the label on a syringe with the drug chart results in the wrong medication being administered and the patient dies. However, this error may have previously occurred many times with no tragic consequences. Discussions on moral luck can highlight conflicting intuitions. Should perpetrators receive a harsher punishment because of an adverse outcome, or should they be dealt with in the same way as colleagues who have acted similarly, but with no adverse effects? An additional element to the discussion, specifically with medical errors, is that according to the evidence currently available, punishing individual practitioners does not seem to be effective in preventing future errors. The following discussion, using relevant philosophical and empirical evidence, posits a possible solution for the moral luck conundrum in the context of medical error: namely, making a distinction between the duty to make amends and assigning blame. Blame should be assigned on the basis of actual behavior, while the duty to make amends is dependent on the outcome. PMID:26662613

  12. Error image aware content restoration

    NASA Astrophysics Data System (ADS)

    Choi, Sungwoo; Lee, Moonsik; Jung, Byunghee

    2015-12-01

    As the resolution of TV significantly increased, content consumers have become increasingly sensitive to the subtlest defect in TV contents. This rising standard in quality demanded by consumers has posed a new challenge in today's context where the tape-based process has transitioned to the file-based process: the transition necessitated digitalizing old archives, a process which inevitably produces errors such as disordered pixel blocks, scattered white noise, or totally missing pixels. Unsurprisingly, detecting and fixing such errors require a substantial amount of time and human labor to meet the standard demanded by today's consumers. In this paper, we introduce a novel, automated error restoration algorithm which can be applied to different types of classic errors by utilizing adjacent images while preserving the undamaged parts of an error image as much as possible. We tested our method to error images detected from our quality check system in KBS(Korean Broadcasting System) video archive. We are also implementing the algorithm as a plugin of well-known NLE(Non-linear editing system), which is a familiar tool for quality control agent.

  13. Meteor radar signal processing and error analysis

    NASA Astrophysics Data System (ADS)

    Kang, Chunmei

    Meteor wind radar systems are a powerful tool for study of the horizontal wind field in the mesosphere and lower thermosphere (MLT). While such systems have been operated for many years, virtually no literature has focused on radar system error analysis. The instrumental error may prevent scientists from getting correct conclusions on geophysical variability. The radar system instrumental error comes from different sources, including hardware, software, algorithms and etc. Radar signal processing plays an important role in radar system and advanced signal processing algorithms may dramatically reduce the radar system errors. In this dissertation, radar system error propagation is analyzed and several advanced signal processing algorithms are proposed to optimize the performance of radar system without increasing the instrument costs. The first part of this dissertation is the development of a time-frequency waveform detector, which is invariant to noise level and stable to a wide range of decay rates. This detector is proposed to discriminate the underdense meteor echoes from the background white Gaussian noise. The performance of this detector is examined using Monte Carlo simulations. The resulting probability of detection is shown to outperform the often used power and energy detectors for the same probability of false alarm. Secondly, estimators to determine the Doppler shift, the decay rate and direction of arrival (DOA) of meteors are proposed and evaluated. The performance of these estimators is compared with the analytically derived Cramer-Rao bound (CRB). The results show that the fast maximum likelihood (FML) estimator for determination of the Doppler shift and decay rate and the spatial spectral method for determination of the DOAs perform best among the estimators commonly used on other radar systems. For most cases, the mean square error (MSE) of the estimator meets the CRB above a 10dB SNR. Thus meteor echoes with an estimated SNR below 10dB are

  14. Multiscale measurement error models for aggregated small area health data.

    PubMed

    Aregay, Mehreteab; Lawson, Andrew B; Faes, Christel; Kirby, Russell S; Carroll, Rachel; Watjou, Kevin

    2016-08-01

    Spatial data are often aggregated from a finer (smaller) to a coarser (larger) geographical level. The process of data aggregation induces a scaling effect which smoothes the variation in the data. To address the scaling problem, multiscale models that link the convolution models at different scale levels via the shared random effect have been proposed. One of the main goals in aggregated health data is to investigate the relationship between predictors and an outcome at different geographical levels. In this paper, we extend multiscale models to examine whether a predictor effect at a finer level hold true at a coarser level. To adjust for predictor uncertainty due to aggregation, we applied measurement error models in the framework of multiscale approach. To assess the benefit of using multiscale measurement error models, we compare the performance of multiscale models with and without measurement error in both real and simulated data. We found that ignoring the measurement error in multiscale models underestimates the regression coefficient, while it overestimates the variance of the spatially structured random effect. On the other hand, accounting for the measurement error in multiscale models provides a better model fit and unbiased parameter estimates. PMID:27566773

  15. Multiscale measurement error models for aggregated small area health data.

    PubMed

    Aregay, Mehreteab; Lawson, Andrew B; Faes, Christel; Kirby, Russell S; Carroll, Rachel; Watjou, Kevin

    2016-08-01

    Spatial data are often aggregated from a finer (smaller) to a coarser (larger) geographical level. The process of data aggregation induces a scaling effect which smoothes the variation in the data. To address the scaling problem, multiscale models that link the convolution models at different scale levels via the shared random effect have been proposed. One of the main goals in aggregated health data is to investigate the relationship between predictors and an outcome at different geographical levels. In this paper, we extend multiscale models to examine whether a predictor effect at a finer level hold true at a coarser level. To adjust for predictor uncertainty due to aggregation, we applied measurement error models in the framework of multiscale approach. To assess the benefit of using multiscale measurement error models, we compare the performance of multiscale models with and without measurement error in both real and simulated data. We found that ignoring the measurement error in multiscale models underestimates the regression coefficient, while it overestimates the variance of the spatially structured random effect. On the other hand, accounting for the measurement error in multiscale models provides a better model fit and unbiased parameter estimates.

  16. Elimination of error factors, affecting EM and seismic inversions

    NASA Astrophysics Data System (ADS)

    Magomedov, M.; Zuev, M. A.; Korneev, V. A.; Goloshubin, G.; Zuev, J.; Brovman, Y.

    2013-12-01

    EM or seismic data inversions are affected by many factors, which may conceal the responses from target objects. We address here the contributions from the following effects: 1) Pre-survey spectral sensitivity factor. Preliminary information about a target layer can be used for a pre-survey estimation of the required frequency domain and signal level. A universal approach allows making such estimations in real time, helping the survey crew to optimize an acquisition process. 2) Preliminary velocities' identification and their dispersions for all the seismic waves, arising in a stratified media became a fast working tool, based on the exact analytical solution. 3) Vertical gradients effect. For most layers the log data scatter, requiring an averaging pattern. A linear gradient within each representative layer is a reasonable compromise between required inversion accuracy and forward modeling complexity. 4) An effect from the seismic source's radial component becomes comparable with vertical part for explosive sources. If this effect is not taken into account, a serious modeling error takes place. This problem has an algorithmic solution. 5) Seismic modeling is often based on different representations for a source formulated either for a force or to a potential. The wave amplitudes depend on the formulation, making an inversion result sensitive to it. 6) Asymmetrical seismic waves (modified Rayleigh) in symmetrical geometry around liquid fracture come from S-wave and merge with the modified Krauklis wave at high frequencies. A detail analysis of this feature allows a spectral range optimization for the proper wave's extraction. 7) An ultrasonic experiment was conducted to show different waves appearance for a super-thin water-saturated fracture between two Plexiglas plates, being confirmed by comparison with theoretical computations. 8) A 'sandwich effect' was detected by comparison with averaged layer's effect. This opens an opportunity of the shale gas direct

  17. Leveraging Spatial Model to Improve Indoor Tracking

    NASA Astrophysics Data System (ADS)

    Liu, L.; Xu, W.; Penard, W.; Zlatanova, S.

    2015-05-01

    In this paper, we leverage spatial model to process indoor localization results and then improve the track consisting of measured locations. We elaborate different parts of spatial model such as geometry, topology and semantics, and then present how they contribute to the processing of indoor tracks. The initial results of our experiment reveal that spatial model can support us to overcome problems such as tracks intersecting with obstacles and unstable shifts between two location measurements. In the future, we will investigate more exceptions of indoor tracking results and then develop additional spatial methods to reduce errors of indoor tracks.

  18. Application of spatially weighted Technology for mapping intermediate and felsic igneous rocks in Fujian Province, China

    NASA Astrophysics Data System (ADS)

    Zhang, Daojun

    2016-04-01

    Magmatic activity is of great significance to mineralization not only for heat and fluid it provides, but also for parts of material source it brings. Due to the cover of soil and vegetation and its spatial nonuniformity detected singals from the ground's surface may be weak and of spatial variability, and this brings serious challenges to mineral exploration in these areas. Two models based on spatially weighted technology, i.e., local singularity analysis (LSA) and spatially weighted logistic regression (SWLR) are applied in this study to deal with this challenge. Coverage cannot block the migration of geochemical elements, it is possible that the geochemical features of soil above concealed rocks can be different from surrounding environment, although this kind of differences are weak; coverage may also weaken the surface expression of geophysical fields. LSA is sensitive to weak changes in density or energy, which makes it effective to map the distribution of concealed igneous rock based on geochemical and geophysical properties. Data integration can produce better classification results than any single data analysis, but spatial variability of spatial variables caused by non-stationary coverage can greatly affect the results since sometimes it is hard to establish a global model. In this paper, SWLR is used to integrate all spatial layers extracted from both geochemical and geophysical data, and the iron polymetallic metallogenic belt in sours-west of Fujian Province is used as s study case. It is found that LSA technique effectively extracts different sources of geologic anomalies; and the spatial distribution of intermediate and felsic igneous rocks delineated by SWLR shows higher accuracy compared with the result obtained via global model.

  19. Explaining errors in children's questions.

    PubMed

    Rowland, Caroline F

    2007-07-01

    The ability to explain the occurrence of errors in children's speech is an essential component of successful theories of language acquisition. The present study tested some generativist and constructivist predictions about error on the questions produced by ten English-learning children between 2 and 5 years of age. The analyses demonstrated that, as predicted by some generativist theories [e.g. Santelmann, L., Berk, S., Austin, J., Somashekar, S. & Lust. B. (2002). Continuity and development in the acquisition of inversion in yes/no questions: dissociating movement and inflection, Journal of Child Language, 29, 813-842], questions with auxiliary DO attracted higher error rates than those with modal auxiliaries. However, in wh-questions, questions with modals and DO attracted equally high error rates, and these findings could not be explained in terms of problems forming questions with why or negated auxiliaries. It was concluded that the data might be better explained in terms of a constructivist account that suggests that entrenched item-based constructions may be protected from error in children's speech, and that errors occur when children resort to other operations to produce questions [e.g. Dabrowska, E. (2000). From formula to schema: the acquisition of English questions. Cognitive Liguistics, 11, 83-102; Rowland, C. F. & Pine, J. M. (2000). Subject-auxiliary inversion errors and wh-question acquisition: What children do know? Journal of Child Language, 27, 157-181; Tomasello, M. (2003). Constructing a language: A usage-based theory of language acquisition. Cambridge, MA: Harvard University Press]. However, further work on constructivist theory development is required to allow researchers to make predictions about the nature of these operations.

  20. Absolute vs. relative error characterization of electromagnetic tracking accuracy

    NASA Astrophysics Data System (ADS)

    Matinfar, Mohammad; Narayanasamy, Ganesh; Gutierrez, Luis; Chan, Raymond; Jain, Ameet

    2010-02-01

    Electromagnetic (EM) tracking systems are often used for real time navigation of medical tools in an Image Guided Therapy (IGT) system. They are specifically advantageous when the medical device requires tracking within the body of a patient where line of sight constraints prevent the use of conventional optical tracking. EM tracking systems are however very sensitive to electromagnetic field distortions. These distortions, arising from changes in the electromagnetic environment due to the presence of conductive ferromagnetic surgical tools or other medical equipment, limit the accuracy of EM tracking, in some cases potentially rendering tracking data unusable. We present a mapping method for the operating region over which EM tracking sensors are used, allowing for characterization of measurement errors, in turn providing physicians with visual feedback about measurement confidence or reliability of localization estimates. In this instance, we employ a calibration phantom to assess distortion within the operating field of the EM tracker and to display in real time the distribution of measurement errors, as well as the location and extent of the field associated with minimal spatial distortion. The accuracy is assessed relative to successive measurements. Error is computed for a reference point and consecutive measurement errors are displayed relative to the reference in order to characterize the accuracy in near-real-time. In an initial set-up phase, the phantom geometry is calibrated by registering the data from a multitude of EM sensors in a non-ferromagnetic ("clean") EM environment. The registration results in the locations of sensors with respect to each other and defines the geometry of the sensors in the phantom. In a measurement phase, the position and orientation data from all sensors are compared with the known geometry of the sensor spacing, and localization errors (displacement and orientation) are computed. Based on error thresholds provided by the

  1. Importance of Ionospheric Gradients for error Correction

    NASA Astrophysics Data System (ADS)

    Ravula, Ramprasad

    Importance of Ionospheric Gradients for error Correction R. Ram Prasad1, P.Nagasekhar2 1Sai Spurthi Institute of Technology-JNTU Hyderabad,2Sai Spurthi Institute of Technology-JNTU Hyderabad Email ID:rams.ravula@gmail.com In India, Indian Space Research Organization (ISRO) has established with an objective to develop space technology and its application to various national tasks. To cater to the needs of civil aviation applications, GPS Aided Geo Augmented Navigation (GAGAN) system is being jointly implemented along with Airports Authority of India (AAI) over the Indian region. The most predominant parameter affecting the navigation accuracy of GAGAN is ionospheric delay which is a function of total number of electrons present in one square meter cylindrical cross sectional area in the line of site direction between the satellite and the user on the earth i.e. Total Electron Content (TEC).The irregular distribution of electron densities i.e. rate of TEC variation, causes Ionospheric gradients such as spatial gradients (Expressed in TECu/km) and temporal gradients (Expressed in TECu /minute). Among the satellite signals arriving to the earth in multiple directions, the signals which suffer from severe ionospheric gradients can be estimated i.e. Rate of TEC Index (ROTI) and Rate of TEC (ROT). These aspects which contribute to errors can be treated for improving GAGAN positional accuracy.

  2. Error-associated behaviors and error rates for robotic geology

    NASA Technical Reports Server (NTRS)

    Anderson, Robert C.; Thomas, Geb; Wagner, Jacob; Glasgow, Justin

    2004-01-01

    This study explores human error as a function of the decision-making process. One of many models for human decision-making is Rasmussen's decision ladder [9]. The decision ladder identifies the multiple tasks and states of knowledge involved in decision-making. The tasks and states of knowledge can be classified by the level of cognitive effort required to make the decision, leading to the skill, rule, and knowledge taxonomy (Rasmussen, 1987). Skill based decisions require the least cognitive effort and knowledge based decisions require the greatest cognitive effort. Errors can occur at any of the cognitive levels.

  3. Spatial pattern separation of chemicals and frequency-independent components by terahertz spectroscopic imaging

    NASA Astrophysics Data System (ADS)

    Watanabe, Yuuki; Kawase, Kodo; Ikari, Tomofumi; Ito, Hiromasa; Ishikawa, Youichi; Minamide, Hiroaki

    2003-10-01

    We separated the component spatial patterns of frequency-dependent absorption in chemicals and frequency-independent components such as plastic, paper, and measurement noise in terahertz (THz) spectroscopic images, using known spectral curves. Our measurement system, which uses a widely tunable coherent THz-wave parametric oscillator source, can image at a specific frequency in the range 1-2 THz. The component patterns of chemicals can easily be extracted by use of the frequency-independent components. This method could be successfully used for nondestructive inspection for the detection of illegal drugs and devices of bioterrorism concealed, e.g., inside mail and packages.

  4. Concealed/Revealed

    ERIC Educational Resources Information Center

    Parsons, Kate

    2005-01-01

    This article deals with a cross-cultural, interdisciplinary approach to sculpture in a practice-based PhD. The research centred on context in relationship to the Giriama Commemorative Grave Posts of Kenya and my art practice in the UK. This heuristic investigation culminated in the construction of wall and floor fragments relating to vernacular…

  5. Error Analyses of the North Alabama Lightning Mapping Array (LMA)

    NASA Technical Reports Server (NTRS)

    Koshak, W. J.; Solakiewicz, R. J.; Blakeslee, R. J.; Goodman, S. J.; Christian, H. J.; Hall, J. M.; Bailey, J. C.; Krider, E. P.; Bateman, M. G.; Boccippio, D. J.

    2003-01-01

    Two approaches are used to characterize how accurately the North Alabama Lightning Mapping Array (LMA) is able to locate lightning VHF sources in space and in time. The first method uses a Monte Carlo computer simulation to estimate source retrieval errors. The simulation applies a VHF source retrieval algorithm that was recently developed at the NASA-MSFC and that is similar, but not identical to, the standard New Mexico Tech retrieval algorithm. The second method uses a purely theoretical technique (i.e., chi-squared Curvature Matrix theory) to estimate retrieval errors. Both methods assume that the LMA system has an overall rms timing error of 50ns, but all other possible errors (e.g., multiple sources per retrieval attempt) are neglected. The detailed spatial distributions of retrieval errors are provided. Given that the two methods are completely independent of one another, it is shown that they provide remarkably similar results, except that the chi-squared theory produces larger altitude error estimates than the (more realistic) Monte Carlo simulation.

  6. Neural systems for error monitoring: recent findings and theoretical perspectives.

    PubMed

    Taylor, Stephan F; Stern, Emily R; Gehring, William J

    2007-04-01

    Complex behavior requires a flexible system that maintains task performance in the context of specific goals, evaluating behavioral progress, adjusting behavior as needed, and adapting to changing contingencies. Generically referred to as performance monitoring, a key component concerns the identification and correction of differences between an intended and an executed response (i.e., an error). Brain mapping experiments have now identified the temporal and spatial components of a putative error-processing system in the large-scale networks of the human brain. Most of this work has focused on the medial frontal cortex and an associated electrophysiological component known as the error-related negativity (or error negativity). Although the precise role, or roles, of this region still remain unknown, investigations of error processing have identified a cluster of modules in the medial frontal cortex involved in monitoring/maintaining ongoing behavior and motivating task sets. Other regions include bilateral anterior insula/inferior operculum and lateral prefrontal cortex. Recent work has begun to uncover how individual differences might affect the modules recruited for a task, in addition to the identification of associations between pathological states and aberrant error signals, leading to insights about possible mechanisms of neuropsychiatric illness.

  7. Neural systems for error monitoring: recent findings and theoretical perspectives.

    PubMed

    Taylor, Stephan F; Stern, Emily R; Gehring, William J

    2007-04-01

    Complex behavior requires a flexible system that maintains task performance in the context of specific goals, evaluating behavioral progress, adjusting behavior as needed, and adapting to changing contingencies. Generically referred to as performance monitoring, a key component concerns the identification and correction of differences between an intended and an executed response (i.e., an error). Brain mapping experiments have now identified the temporal and spatial components of a putative error-processing system in the large-scale networks of the human brain. Most of this work has focused on the medial frontal cortex and an associated electrophysiological component known as the error-related negativity (or error negativity). Although the precise role, or roles, of this region still remain unknown, investigations of error processing have identified a cluster of modules in the medial frontal cortex involved in monitoring/maintaining ongoing behavior and motivating task sets. Other regions include bilateral anterior insula/inferior operculum and lateral prefrontal cortex. Recent work has begun to uncover how individual differences might affect the modules recruited for a task, in addition to the identification of associations between pathological states and aberrant error signals, leading to insights about possible mechanisms of neuropsychiatric illness. PMID:17404376

  8. Spatial perception and control.

    PubMed

    Jordan, J Scott; Knoblich, Günther

    2004-02-01

    We investigated whether the perceived vanishing point of a moving stimulus becomes more accurate as one's degree of control over the stimulus increases. Either alone or as a member of a pair, participants controlled the progression of a dot stimulus back and forth across a computer monitor. They did so via right and left buttonpresses that incremented the dot's velocity rightward and leftward, respectively. The participants in the individual condition had control of both buttons. Those in the group condition had control of only one. As the participants slowed the dot to change its direction of travel, it unexpectedly disappeared. Localizations of the vanishing point became more accurate as the participants' control over the dot increased. The data bridge a gap between accounts of localization error that rely solely on stimulus and cognitive factors, and accounts derived from research on action and spatial perception, which tend to rely on action-planning factors.

  9. An enhanced MMW and SMMW/THz imaging system performance prediction and analysis tool for concealed weapon detection and pilotage obstacle avoidance

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Jacobs, Eddie L.; Franck, Charmaine C.; Petkie, Douglas T.; De Lucia, Frank C.

    2015-10-01

    The U.S. Army Research Laboratory (ARL) has continued to develop and enhance a millimeter-wave (MMW) and submillimeter- wave (SMMW)/terahertz (THz)-band imaging system performance prediction and analysis tool for both the detection and identification of concealed weaponry, and for pilotage obstacle avoidance. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security and Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). Further development of this tool that includes a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures was reported on at the 2011 SPIE Europe Security and Defence Symposium (Prague). This paper provides a comprehensive review of a newly enhanced MMW and SMMW/THz imaging system analysis and design tool that now includes an improved noise sub-model for more accurate and reliable performance predictions, the capability to account for postcapture image contrast enhancement, and the capability to account for concealment material backscatter with active-illumination- based systems. Present plans for additional expansion of the model's predictive capabilities are also outlined.

  10. Obstacle avoidance and concealed target detection using the Army Research Lab ultra-wideband synchronous impulse reconstruction (UWB SIRE) forward imaging radar

    NASA Astrophysics Data System (ADS)

    Nguyen, Lam; Wong, David; Ressler, Marc; Koenig, Francois; Stanton, Brian; Smith, Gregory; Sichina, Jeffrey; Kappra, Karl

    2007-04-01

    The U.S. Army Research Laboratory (ARL), as part of a mission and customer funded exploratory program, has developed a new low-frequency, ultra-wideband (UWB) synthetic aperture radar (SAR) for forward imaging to support the Army's vision of an autonomous navigation system for robotic ground vehicles. These unmanned vehicles, equipped with an array of imaging sensors, will be tasked to help detect man-made obstacles such as concealed targets, enemy minefields, and booby traps, as well as other natural obstacles such as ditches, and bodies of water. The ability of UWB radar technology to help detect concealed objects has been documented in the past and could provide an important obstacle avoidance capability for autonomous navigation systems, which would improve the speed and maneuverability of these vehicles and consequently increase the survivability of the U. S. forces on the battlefield. One of the primary features of the radar is the ability to collect and process data at combat pace in an affordable, compact, and lightweight package. To achieve this, the radar is based on the synchronous impulse reconstruction (SIRE) technique where several relatively slow and inexpensive analog-to-digital (A/D) converters are used to sample the wide bandwidth of the radar signals. We conducted an experiment this winter at Aberdeen Proving Ground (APG) to support the phenomenological studies of the backscatter from positive and negative obstacles for autonomous robotic vehicle navigation, as well as the detection of concealed targets of interest to the Army. In this paper, we briefly describe the UWB SIRE radar and the test setup in the experiment. We will also describe the signal processing and the forward imaging techniques used in the experiment. Finally, we will present imagery of man-made obstacles such as barriers, concertina wires, and mines.

  11. Case study of concealed weapons detection at stand-off distances using a compact, large field-of-view THz camera

    NASA Astrophysics Data System (ADS)

    Marchese, Linda E.; Terroux, Marc; Dufour, Denis; Bolduc, Martin; Chevalier, Claude; Généreux, Francis; Jerominek, Hubert; Bergeron, Alain

    2014-06-01

    The detection of concealed weapons in crowd situations is a critical need and solutions are being sought after by security agencies at the federal, state and municipal levels. Millimeter waves have been evaluated for these kinds of applications, but the currently available technologies are typically too large and bulky to allow for widespread deployment. Alternatively soft X-rays have been considered but safety issues hinder their acceptance. Terahertz technology is ideally suited for such an application as it has the ability to see through clothing, and offers higher resolution than in the millimeter band, also being more compact. THz photons have lower energy than infrared and do not show the ionizing properties of X-ray radiation. The longer Terahertz waves penetrate deeper into various materials then their visible and infrared counterparts. Though the wavelength is longer it has been shown that high resolution in a small form factor can be obtained in the THz wavebands thanks to the use of small pixel pitch detectors. In this paper, a case study for the use of a compact THz camera for active see-through imaging at stand-off distances is presented. More specifically, the cases of seeing through packages and clothing are analyzed in the perspective of concealed weapons detection. The paper starts with a review of the characteristics of a high resolution THz camera exhibiting small pixel size and large field-of-view. Some laboratory results of concealed object imaging along with details of a concept for live surveillance using a compact see-through imaging system are reviewed.

  12. Serial order in spatial immediate memory.

    PubMed

    Smyth, M M; Scholey, K A

    1996-02-01

    Serial order effects in spatial memory are investigated in three experiments. In the first an analysis of errors in recall data suggested that immediate transpositions were the most common error and that order errors over 2 or 3 adjacent items accounted for the majority of errors in recall. The first and last serial positions are less error-prone than is the middle position in sets of six and seven items. A second experiment investigated recognition of transpositions and found that immediate transpositions were hardest to recognize but that a traditional serial position effect was not found. This may be due to the difficulty of maintaining one set of spatial items when another set is presented for comparison. A probe experiment, in which subjects were asked to recognize whether a single item came from a memory set and then to assign it to its position in the set indicated that the first and last positions were remembered more accurately than were central positions. The combination of serial order data in recall and position data suggests that there are similarities between serial order and position effects in the verbal and spatial domains and that serial order in spatial sequences is position-based.

  13. Spacecraft and propulsion technician error

    NASA Astrophysics Data System (ADS)

    Schultz, Daniel Clyde

    Commercial aviation and commercial space similarly launch, fly, and land passenger vehicles. Unlike aviation, the U.S. government has not established maintenance policies for commercial space. This study conducted a mixed methods review of 610 U.S. space launches from 1984 through 2011, which included 31 failures. An analysis of the failure causal factors showed that human error accounted for 76% of those failures, which included workmanship error accounting for 29% of the failures. With the imminent future of commercial space travel, the increased potential for the loss of human life demands that changes be made to the standardized procedures, training, and certification to reduce human error and failure rates. Several recommendations were made by this study to the FAA's Office of Commercial Space Transportation, space launch vehicle operators, and maintenance technician schools in an effort to increase the safety of the space transportation passengers.

  14. Synthetic aperture interferometry: error analysis

    SciTech Connect

    Biswas, Amiya; Coupland, Jeremy

    2010-07-10

    Synthetic aperture interferometry (SAI) is a novel way of testing aspherics and has a potential for in-process measurement of aspherics [Appl. Opt.42, 701 (2003)].APOPAI0003-693510.1364/AO.42.000701 A method to measure steep aspherics using the SAI technique has been previously reported [Appl. Opt.47, 1705 (2008)].APOPAI0003-693510.1364/AO.47.001705 Here we investigate the computation of surface form using the SAI technique in different configurations and discuss the computational errors. A two-pass measurement strategy is proposed to reduce the computational errors, and a detailed investigation is carried out to determine the effect of alignment errors on the measurement process.

  15. Orbit IMU alignment: Error analysis

    NASA Technical Reports Server (NTRS)

    Corson, R. W.

    1980-01-01

    A comprehensive accuracy analysis of orbit inertial measurement unit (IMU) alignments using the shuttle star trackers was completed and the results are presented. Monte Carlo techniques were used in a computer simulation of the IMU alignment hardware and software systems to: (1) determine the expected Space Transportation System 1 Flight (STS-1) manual mode IMU alignment accuracy; (2) investigate the accuracy of alignments in later shuttle flights when the automatic mode of star acquisition may be used; and (3) verify that an analytical model previously used for estimating the alignment error is a valid model. The analysis results do not differ significantly from expectations. The standard deviation in the IMU alignment error for STS-1 alignments was determined to the 68 arc seconds per axis. This corresponds to a 99.7% probability that the magnitude of the total alignment error is less than 258 arc seconds.

  16. Error Field Correction in ITER

    SciTech Connect

    Park, Jong-kyu; Boozer, Allen H.; Menard, Jonathan E.; Schaffer, Michael J.

    2008-05-22

    A new method for correcting magnetic field errors in the ITER tokamak is developed using the Ideal Perturbed Equilibrium Code (IPEC). The dominant external magnetic field for driving islands is shown to be localized to the outboard midplane for three ITER equilibria that represent the projected range of operational scenarios. The coupling matrices between the poloidal harmonics of the external magnetic perturbations and the resonant fields on the rational surfaces that drive islands are combined for different equilibria and used to determine an ordered list of the dominant errors in the external magnetic field. It is found that efficient and robust error field correction is possible with a fixed setting of the correction currents relative to the currents in the main coils across the range of ITER operating scenarios that was considered.

  17. Reward positivity: Reward prediction error or salience prediction error?

    PubMed

    Heydari, Sepideh; Holroyd, Clay B

    2016-08-01

    The reward positivity is a component of the human ERP elicited by feedback stimuli in trial-and-error learning and guessing tasks. A prominent theory holds that the reward positivity reflects a reward prediction error signal that is sensitive to outcome valence, being larger for unexpected positive events relative to unexpected negative events (Holroyd & Coles, 2002). Although the theory has found substantial empirical support, most of these studies have utilized either monetary or performance feedback to test the hypothesis. However, in apparent contradiction to the theory, a recent study found that unexpected physical punishments also elicit the reward positivity (Talmi, Atkinson, & El-Deredy, 2013). The authors of this report argued that the reward positivity reflects a salience prediction error rather than a reward prediction error. To investigate this finding further, in the present study participants navigated a virtual T maze and received feedback on each trial under two conditions. In a reward condition, the feedback indicated that they would either receive a monetary reward or not and in a punishment condition the feedback indicated that they would receive a small shock or not. We found that the feedback stimuli elicited a typical reward positivity in the reward condition and an apparently delayed reward positivity in the punishment condition. Importantly, this signal was more positive to the stimuli that predicted the omission of a possible punishment relative to stimuli that predicted a forthcoming punishment, which is inconsistent with the salience hypothesis. PMID:27184070

  18. Reward positivity: Reward prediction error or salience prediction error?

    PubMed

    Heydari, Sepideh; Holroyd, Clay B

    2016-08-01

    The reward positivity is a component of the human ERP elicited by feedback stimuli in trial-and-error learning and guessing tasks. A prominent theory holds that the reward positivity reflects a reward prediction error signal that is sensitive to outcome valence, being larger for unexpected positive events relative to unexpected negative events (Holroyd & Coles, 2002). Although the theory has found substantial empirical support, most of these studies have utilized either monetary or performance feedback to test the hypothesis. However, in apparent contradiction to the theory, a recent study found that unexpected physical punishments also elicit the reward positivity (Talmi, Atkinson, & El-Deredy, 2013). The authors of this report argued that the reward positivity reflects a salience prediction error rather than a reward prediction error. To investigate this finding further, in the present study participants navigated a virtual T maze and received feedback on each trial under two conditions. In a reward condition, the feedback indicated that they would either receive a monetary reward or not and in a punishment condition the feedback indicated that they would receive a small shock or not. We found that the feedback stimuli elicited a typical reward positivity in the reward condition and an apparently delayed reward positivity in the punishment condition. Importantly, this signal was more positive to the stimuli that predicted the omission of a possible punishment relative to stimuli that predicted a forthcoming punishment, which is inconsistent with the salience hypothesis.

  19. 20 Tips to Help Prevent Medical Errors

    MedlinePlus

    ... Prevent Medical Errors 20 Tips to Help Prevent Medical Errors: Patient Fact Sheet This information is for ... current information. Select to Download PDF (295 KB). Medical errors can occur anywhere in the health care ...

  20. Medication errors: definitions and classification.

    PubMed

    Aronson, Jeffrey K

    2009-06-01

    1. To understand medication errors and to identify preventive strategies, we need to classify them and define the terms that describe them. 2. The four main approaches to defining technical terms consider etymology, usage, previous definitions, and the Ramsey-Lewis method (based on an understanding of theory and practice). 3. A medication error is 'a failure in the treatment process that leads to, or has the potential to lead to, harm to the patient'. 4. Prescribing faults, a subset of medication errors, should be distinguished from prescription errors. A prescribing fault is 'a failure in the prescribing [decision-making] process that leads to, or has the potential to lead to, harm to the patient'. The converse of this, 'balanced prescribing' is 'the use of a medicine that is appropriate to the patient's condition and, within the limits created by the uncertainty that attends therapeutic decisions, in a dosage regimen that optimizes the balance of benefit to harm'. This excludes all forms of prescribing faults, such as irrational, inappropriate, and ineffective prescribing, underprescribing and overprescribing. 5. A prescription error is 'a failure in the prescription writing process that results in a wrong instruction about one or more of the normal features of a prescription'. The 'normal features' include the identity of the recipient, the identity of the drug, the formulation, dose, route, timing, frequency, and duration of administration. 6. Medication errors can be classified, invoking psychological theory, as knowledge-based mistakes, rule-based mistakes, action-based slips, and memory-based lapses. This classification informs preventive strategies.