WorldWideScience

Sample records for analysis uncovers hidden

  1. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  2. Uncovering the Hidden Decisions that Shape Curricula

    Science.gov (United States)

    Harlow, Danielle Boyd

    2010-10-01

    Developing explanatory models is a central practice to scientific inquiry. When students create and test explanatory models for scientific phenomenon, they develop content knowledge, knowledge of the nature of science, and creative thinking skills. Unfortunately, such instruction rarely occurs in K-12 science. This is, in part, because teachers do not have the opportunity to develop sophisticated understandings of the process of modeling, but also because teaching in this way requires teachers to make real-time instructional decisions that are responsive to students' ideas. This is challenging for teachers, especially because this decision process is often invisible. In this talk, I will highlight the importance of providing opportunities for sophisticated science thinking for our youngest learners and consider how uncovering the decisions that shape physics courses for teachers may benefit their future students.

  3. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  4. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  5. CHANG-ES VIII: Uncovering Hidden AGN Activity in Radio Polarization

    CERN Document Server

    Irwin, Judith A; Damas-Segovia, A; Beck, Rainer; English, Jayanne; Heald, George; Henriksen, Richard N; Krause, Marita; Li, Jiang-Tao; Rand, Richard J; Wang, Q Daniel; Wiegert, Theresa; Kamieneski, Patrick; Paré, Dylan; Sullivan, Kendall

    2016-01-01

    We report on C-band (5 - 7 GHz) observations of the galaxy, NGC~2992, from the CHANG-ES sample. This galaxy displays an embedded nuclear double-lobed radio morphology within its spiral disk, as revealed in linearly polarized emission but {\\it not} in total intensity emission. The radio lobes are kpc-sized, similar to what has been observed in the past for other Seyfert galaxies, and show ordered magnetic fields. NGC~2992 has shown previous evidence for AGN-related activity, but not the linearly polarized radio features that we present here. We draw attention to this galaxy as the first clear example (and prototype) of bipolar radio outflow that is revealed in linearly polarized emission only. Such polarization observations, which are unobscured by dust, provide a new tool for uncovering hidden weak AGN activity which may otherwise be masked by brighter unpolarized emission within which it is embedded. The radio lobes observed in NGC~2992 are interacting with the surrounding interstellar medium and offer new o...

  6. CHANG-ES - VIII. Uncovering hidden AGN activity in radio polarization

    Science.gov (United States)

    Irwin, Judith A.; Schmidt, Philip; Damas-Segovia, A.; Beck, Rainer; English, Jayanne; Heald, George; Henriksen, Richard N.; Krause, Marita; Li, Jiang-Tao; Rand, Richard J.; Wang, Q. Daniel; Wiegert, Theresa; Kamieneski, Patrick; Paré, Dylan; Sullivan, Kendall

    2017-01-01

    We report on C-band (5-7 GHz) observations of the galaxy, NGC 2992, from the Continuum Halos in Nearby Galaxies - an EVLA Survey (CHANG-ES) sample. This galaxy displays an embedded nuclear double-lobed radio morphology within its spiral disc, as revealed in linearly polarized emission but not in total intensity emission. The radio lobes are kpc-sized, similar to what has been observed in the past for other Seyfert galaxies, and show ordered magnetic fields. NGC 2992 has shown previous evidence for AGN-related activity, but not the linearly polarized radio features that we present here. We draw attention to this galaxy as the first clear example (and prototype) of bipolar radio outflow that is revealed in linearly polarized emission only. Such polarization observations, which are unobscured by dust, provide a new tool for uncovering hidden weak active galactic nucleus (AGN) activity which may otherwise be masked by brighter unpolarized emission within which it is embedded. The radio lobes observed in NGC 2992 are interacting with the surrounding interstellar medium (ISM) and offer new opportunities to investigate the interactions between nuclear outflows and the ISM in nearby galaxies. We also compare the radio emission with a new CHANDRA X-ray image of this galaxy. A new CHANG-ES image of NGC 3079 is also briefly shown as another example as to how much more obvious radio lobes appear in linear polarization as opposed to total intensity.

  7. Uncover the Ideology Behind News Reports Through Transitivity Analysis

    Institute of Scientific and Technical Information of China (English)

    董亚男

    2015-01-01

    When people read the reports relating to Occupy Central from different news papers, they get completely different feelings towards the event. To find out how this phenomenon happened, this paper is going to apply transitivity analysis to the news reports. The reports are selected from China Daily, CNN and BBC respectively. To have a deep application of this method, only verbal process wil be taken into consideration. This paper wil discuss the proportion of verbal process from the two sides (Occupy Central people as one side and people against them as the other), the message delivered by the verbal process, the sequence and the transformation of verbal process. The purpose is to uncover the ideology hidden behind the seemingly objective news reports through transitivity analysis.

  8. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  9. Uncovering the Hidden Web, Part II: Resources for Your Classroom. ERIC Digest.

    Science.gov (United States)

    Mardis, Marcia

    Too often, search engines don't see and directories can overlook clearinghouses, digital libraries, full-text databases, and learning objects. In contrast, the hidden Web is rich with these high quality and cutting-edge learning materials. By integrating resources from the hidden Web into the classroom, educators extend their instruction in new…

  10. Microgenetic analysis of hidden figures

    OpenAIRE

    Marković Slobodan S.; Gvozdenović Vasilije P.

    2006-01-01

    In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenes...

  11. Uncovering the Hidden Web, Part I: Finding What the Search Engines Don't. ERIC Digest.

    Science.gov (United States)

    Mardis, Marcia

    Currently, the World Wide Web contains an estimated 7.4 million sites (OCLC, 2001). Yet even the most experienced searcher, using the most robust search engines, can access only about 16% of these pages (Dahn, 2001). The other 84% of the publicly available information on the Web is referred to as the "hidden,""invisible," or…

  12. Microgenetic analysis of hidden figures

    Directory of Open Access Journals (Sweden)

    Marković Slobodan S.

    2006-01-01

    Full Text Available In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenesis of the perception of hidden figures was investigated. The primed matching paradigm and the same-different task were used. In each experiment two types of test figures were contrasted: the more frequent and the less frequent ones. There were two prime types: identical (equal to test figures and complex (the pattern with hidden test figures. The prime duration was varied, 50 ms and 400 ms. The main result indicates that in the case of complex priming the more frequent test figures were processed significantly faster than the less frequent ones in both prime duration conditions. These results suggest that the faster the processing of a figure, the more probable the perceptual generation of this figure.

  13. Networks uncover hidden lexical borrowing in Indo-European language evolution

    Science.gov (United States)

    Nelson-Sathi, Shijulal; List, Johann-Mattis; Geisler, Hans; Fangerau, Heiner; Gray, Russell D.; Martin, William; Dagan, Tal

    2011-01-01

    Language evolution is traditionally described in terms of family trees with ancestral languages splitting into descendent languages. However, it has long been recognized that language evolution also entails horizontal components, most commonly through lexical borrowing. For example, the English language was heavily influenced by Old Norse and Old French; eight per cent of its basic vocabulary is borrowed. Borrowing is a distinctly non-tree-like process—akin to horizontal gene transfer in genome evolution—that cannot be recovered by phylogenetic trees. Here, we infer the frequency of hidden borrowing among 2346 cognates (etymologically related words) of basic vocabulary distributed across 84 Indo-European languages. The dataset includes 124 (5%) known borrowings. Applying the uniformitarian principle to inventory dynamics in past and present basic vocabularies, we find that 1373 (61%) of the cognates have been affected by borrowing during their history. Our approach correctly identified 117 (94%) known borrowings. Reconstructed phylogenetic networks that capture both vertical and horizontal components of evolutionary history reveal that, on average, eight per cent of the words of basic vocabulary in each Indo-European language were involved in borrowing during evolution. Basic vocabulary is often assumed to be relatively resistant to borrowing. Our results indicate that the impact of borrowing is far more widespread than previously thought. PMID:21106583

  14. Uncovering the hidden quantum critical point in disordered massless Dirac and Weyl semimetals

    Science.gov (United States)

    Pixley, J. H.; Huse, David A.; Das Sarma, S.

    2016-09-01

    We study the properties of the avoided or hidden quantum critical point (AQCP) in three-dimensional Dirac and Weyl semimetals in the presence of short range potential disorder. By computing the averaged density of states (along with its second and fourth derivative at zero energy) with the kernel polynomial method (KPM) we systematically tune the effective length scale that eventually rounds out the transition and leads to an AQCP. We show how to determine the strength of the avoidance, establishing that it is not controlled by the long wavelength component of the disorder. Instead, the amount of avoidance can be adjusted via the tails of the probability distribution of the local random potentials. A binary distribution with no tails produces much less avoidance than a Gaussian distribution. We introduce a double Gaussian distribution to interpolate between these two limits. As a result we are able to make the length scale of the avoidance sufficiently large so that we can accurately study the properties of the underlying transition (that is eventually rounded out), unambiguously identify its location, and provide accurate estimates of the critical exponents ν =1.01 ±0.06 and z =1.50 ±0.04 . We also show that the KPM expansion order introduces an effective length scale that can also round out the transition in the scaling regime near the AQCP.

  15. Curvature of co-links uncovers hidden thematic layers in the World Wide Web.

    Science.gov (United States)

    Eckmann, Jean-Pierre; Moses, Elisha

    2002-04-30

    Beyond the information stored in pages of the World Wide Web, novel types of "meta-information" are created when pages connect to each other. Such meta-information is a collective effect of independent agents writing and linking pages, hidden from the casual user. Accessing it and understanding the interrelation between connectivity and content in the World Wide Web is a challenging problem [Botafogo, R. A. & Shneiderman, B. (1991) in Proceedings of Hypertext (Assoc. Comput. Mach., New York), pp. 63-77 and Albert, R. & Barabási, A.-L. (2002) Rev. Mod. Phys. 74, 47-97]. We demonstrate here how thematic relationships can be located precisely by looking only at the graph of hyperlinks, gleaning content and context from the Web without having to read what is in the pages. We begin by noting that reciprocal links (co-links) between pages signal a mutual recognition of authors and then focus on triangles containing such links, because triangles indicate a transitive relation. The importance of triangles is quantified by the clustering coefficient [Watts, D. J. & Strogatz, S. H. (1999) Nature (London) 393, 440-442], which we interpret as a curvature [Bridson, M. R. & Haefliger, A. (1999) Metric Spaces of Non-Positive Curvature (Springer, Berlin)]. This curvature defines a World Wide Web landscape whose connected regions of high curvature characterize a common topic. We show experimentally that reciprocity and curvature, when combined, accurately capture this meta-information for a wide variety of topics. As an example of future directions we analyze the neural network of Caenorhabditis elegans, using the same methods.

  16. Learning analytics in serious gaming: uncovering the hidden treasury of game log files

    NARCIS (Netherlands)

    Westera, Wim; Nadolski, Rob; Hummel, Hans

    2014-01-01

    This paper presents an exploratory analysis of existing log files of the VIBOA environmental policy games at Utrecht University. For reasons of statistical power we’ve combined student cohorts 2008, 2009, 2010, and 2011, which led to a sample size of 118 students. The VIBOA games are inquiry-based g

  17. An "inverse square law" for the currency market: Uncovering hidden universality in heterogeneous complex systems

    CERN Document Server

    Chakraborty, Abhijit; Sinha, Sitabhra

    2016-01-01

    Identifying universal behavior is a challenging task for far-from-equilibrium complex systems. Here we investigate the collective dynamics of the international currency exchange market and show the existence of a semi-invariant signature masked by the high degree of heterogeneity in this complex system. The cumulative fluctuation distribution in the exchange rates of different currencies possess heavy tails characterized by exponents varying around a median value of 2. The systematic deviation of individual currencies from this putative universal form (the "inverse square law") can be partly ascribed to the differences in their economic prosperity and diversity of export products. The distinct nature of the fluctuation dynamics for currencies of developed, emerging and frontier economies are characterized in detail by detrended fluctuation analysis and variance-ratio tests, which shows that less developed economies are associated with sub-diffusive random walk processes. We hierarchically cluster the currenci...

  18. SNP and mutation data on the web - hidden treasures for uncovering.

    Science.gov (United States)

    Barnes, Michael R

    2002-01-01

    SNP data has grown exponentially over the last two years, SNP database evolution has matched this growth, as initial development of several independent SNP databases has given way to one central SNP database, dbSNP. Other SNP databases have instead evolved to complement this central database by providing gene specific focus and an increased level of curation and analysis on subsets of data, derived from the central data set. By contrast, human mutation data, which has been collected over many years, is still stored in disparate sources, although moves are afoot to move to a similar central database. These developments are timely, human mutation and polymorphism data both hold complementary keys to a better understanding of how genes function and malfunction in disease. The impending availability of a complete human genome presents us with an ideal framework to integrate both these forms of data, as our understanding of the mechanisms of disease increase, the full genomic context of variation may become increasingly significant.

  19. Uncovering the Hidden Routes

    DEFF Research Database (Denmark)

    Tsirogiannis, Constantinos; Tsirogiannis, Christos

    2016-01-01

    In the present work we model and analyse the global network of the illegal trade in antiquities. Our goal is to use this network to estimate for any given artefact the potential sequence of people in the network among whom this artefact was traded. For this reason, we have implemented and evaluated...

  20. Performance based analysis of hidden beams in reinforced concrete structures

    Directory of Open Access Journals (Sweden)

    Helou Samir H.

    2014-01-01

    Full Text Available Local and perhaps regional vernacular reinforced concrete building construction leans heavily against designing slabs with imbedded hidden beams for flooring systems in most structures including major edifices. The practice is distinctive in both framed and in shear wall structures. Hidden beams are favoured structural elements due to their many inherent features that characterize them; they save on floor height clearance; they also save on formwork, labour and material cost. Moreover, hidden beams form an acceptable aesthetic appearance that does not hinder efficient interior space partitioning. Such beams have the added advantage of clearing the way for horizontal electromechanical ductwork. However, seismic considerations, in all likelihood, are seldom seriously addressed. The mentioned structural system of shallow beams is adopted in ribbed slabs, waffle slabs and at times with solid slabs. Ribbed slabs and waffle slabs are more prone to hidden beam inclusion due to the added effective height of the concrete section. Due to the presence of a relatively high reinforcement ratio at the joints the sections at such location tend to become less ductile with unreliable contribution to spandrel force resistance. In the following study the structural influence of hidden beams within slabs is investigated. With the primary focus on a performance based analysis of such elements within a structure. This is investigated with due attention to shear wall contribution to the overall behaviour of such structures. Numerical results point in the direction that the function of hidden beams is not as adequate as desired. Therefore it is strongly believed that they are generally superfluous and maybe eliminated altogether. Conversely, shallow beams seem to render the overall seismic capacity of the structure unreliable. Since such an argument is rarely manifested within the linear analysis domain; a pushover analysis exercise is thus mandatory for behaviour

  1. Simple yet Hidden Counterexamples in Undergraduate Real Analysis

    Science.gov (United States)

    Shipman, Barbara A.; Shipman, Patrick D.

    2013-01-01

    We study situations in introductory analysis in which students affirmed false statements as true, despite simple counterexamples that they easily recognized afterwards. The study draws attention to how simple counterexamples can become hidden in plain sight, even in an active learning atmosphere where students proposed simple (as well as more…

  2. Uncovering the hidden part of a large ice stream of the Laurentide Ice Sheet, northern Ontario, Canada

    Science.gov (United States)

    Veillette, J. J.; Roy, M.; Paulen, R. C.; Ménard, M.; St-Jacques, G.

    2017-01-01

    This investigation was prompted by an enigmatic ice-flow anomaly (Area A) on the Glacial Map of Canada which covers about 10 000 km2 in the Hearst/Kapuskasing area of northeastern Ontario. It consists of streamlined landforms and striations indicative of a major ice flow toward 130° oriented at right angle to another toward 220°. Both are late glacial flows but long-lasting disagreement exists regarding their relative age. The analysis of aerial photographs and satellite images in conjunction with a detailed survey of bedrock cross-striated surfaces over an area of about 30 000 km2 within and around Area A clearly indicate that the 130° flow preceded the 220° flow. The earlier conflicting interpretations within Area A are attributed mainly to the sporadic occurrence of relict striated surfaces formed by older southwestward (220°-240°) Wisconsinan ice flows that have locally escaped destruction by late glacial flows, with the result that the southwestward flows are older (Wisconsinan) at some sites and younger (late glacial 220°) at others relative to the 130° flow. When considered with other factors such as the maximum elevation reached by the youngest late glacial flow, these ice-flow relationships indicate that Area A is the outcropping southern part of a much larger ESE ice-flow system, which is probably related to a large fluted belt located to the north and that was identified as the Winisk Ice Stream. The distal part of the ice stream, except for Area A, escaped detection by remote sensing mapping methods because depositional and erosional features associated with it are masked by deposits laid down by the younger (220°, Cochrane) ice flow and/or by postglacial marine and organic deposits (or were destroyed by the younger ice flow). The only reliable indicators of the passage of the ice stream in this "buried" section are ESE relict striations crossed by SW striations. The advancing ice stream toward the ESE not only preceded the late Cochrane 220

  3. Stock Market Trend Analysis Using Hidden Markov Models

    OpenAIRE

    Kavitha, G.; Udhayakumar, A.; D. Nagarajan

    2013-01-01

    Price movements of stock market are not totally random. In fact, what drives the financial market and what pattern financial time series follows have long been the interest that attracts economists, mathematicians and most recently computer scientists [17]. This paper gives an idea about the trend analysis of stock market behaviour using Hidden Markov Model (HMM). The trend once followed over a particular period will sure repeat in future. The one day difference in close value of stocks for a...

  4. Analysis of changing hidden energy flow in Vietnam

    Energy Technology Data Exchange (ETDEWEB)

    Nguyen Thi Anh Tuyet [Graduate School of Energy Science, Kyoto University, Yoshida Honmachi, Sakyo-ku, Kyoto, 606-8501 (Japan)]. E-mail: a_tuyet@yahoo.com; Ishihara, Keiichi N. [Graduate School of Energy Science, Kyoto University, Yoshida Honmachi, Sakyo-ku, Kyoto, 606-8501 (Japan)]. E-mail: ishihara@energy.kyoto-u.ac.jp

    2006-09-15

    The energy consumption in production process is changing especially in developing countries by substituting technology. Input-output analysis for energy flows has been developing and is one of the best solutions for investigating macroscopic exchanges of both economy and energy. Since each element in the Leontief inverse contains both direct and indirect effects of any change in final demand, to separate those direct and indirect effects, the power series expansion is available. In this work, the changes of embodied energy intensity in Vietnam from 1996 to 2000 were analyzed using the structural decomposition and its power series expansion. By illustrating the change of causal relationship between direct energy consumption and embodied energy consumption, the change of hidden energy flow, which indicates how the changing embodied energy builds up the change of direct energy consumption in every sector, can be seen. In the case study, the rice processing sector, which is one of the important food processing sectors in Vietnam, is focused. By drawing a diagrammatic map for the change of hidden energy flow, it is clarified that in the case of raising embodied energy intensity, cultivation sector and trade and repaired service sector are the main contributors, and, on the contrary, in the case of reducing embodied energy intensity, paper pulp sector is the main contributor.

  5. Uncovering Influence through Social Network Analysis: The Role of Schools in Education for Sustainable Development

    Science.gov (United States)

    Kolleck, Nina

    2016-01-01

    This paper examines the implementation of Education for Sustainable Development (ESD) in Germany and explores the possibilities of Social Network Analysis (SNA) for uncovering influential actors in educational policy innovation processes. From the theoretical perspective, an actor's influence is inferred from its relative position within…

  6. Unveiling Hidden Dynamics of Hippo Signalling: A Systems Analysis

    Directory of Open Access Journals (Sweden)

    Sung-Young Shin

    2016-08-01

    Full Text Available The Hippo signalling pathway has recently emerged as an important regulator of cell apoptosis and proliferation with significant implications in human diseases. In mammals, the pathway contains the core kinases MST1/2, which phosphorylate and activate LATS1/2 kinases. The pro-apoptotic function of the MST/LATS signalling axis was previously linked to the Akt and ERK MAPK pathways, demonstrating that the Hippo pathway does not act alone but crosstalks with other signalling pathways to coordinate network dynamics and cellular outcomes. These crosstalks were characterised by a multitude of complex regulatory mechanisms involving competitive protein-protein interactions and phosphorylation mediated feedback loops. However, how these different mechanisms interplay in different cellular contexts to drive the context-specific network dynamics of Hippo-ERK signalling remains elusive. Using mathematical modelling and computational analysis, we uncovered that the Hippo-ERK network can generate highly diverse dynamical profiles that can be clustered into distinct dose-response patterns. For each pattern, we offered mechanistic explanation that defines when and how the observed phenomenon can arise. We demonstrated that Akt displays opposing, dose-dependent functions towards ERK, which are mediated by the balance between the Raf-1/MST2 protein interaction module and the LATS1 mediated feedback regulation. Moreover, Ras displays a multi-functional role and drives biphasic responses of both MST2 and ERK activities; which are critically governed by the competitive protein interaction between MST2 and Raf-1. Our study represents the first in-depth and systematic analysis of the Hippo-ERK network dynamics and provides a concrete foundation for future studies.

  7. Generation and Analysis of Hidden Optical-Polarization States

    CERN Document Server

    Singh, Ravi S

    2010-01-01

    A hybrid Optical-Device (Phase-Conjugating Mirror Michelson Interferometer), made up of Phase-conjugate mirror along with ordinary mirror and Polarization Beam-splitter, is formally designed and investigated for the generation of an unusual Optical-Polarization States. This weird yet 'essentially single-mode' optical-polarization state has non-random 'ratio of amplitudes' and non-random 'sum of phases' in orthogonal bases-modes contrary to usual 'truly single-mode' optical-polarization states of which non-random 'ratio of amplitudes' and non-random 'difference of phases' serves as optical-polarization characteristic parameters. Since it is seen not to be characterized by Stokes parameters, one may, therefore, assign the name 'Hidden Optical-Polarization States (HOPS)'. HOPS are characterized by a set of parameters, namely, Hidden Optical-Polarization parameters. Formal experimental schemes are presented to experimentally measure these parameters and, thus, offering characterization of HOPS.

  8. Information- Theoretic Analysis for the Difficulty of Extracting Hidden Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wei-ming; LI Shi-qu; CAO Jia; LIU Jiu-fen

    2005-01-01

    The difficulty of extracting hidden information,which is essentially a kind of secrecy, is analyzed by information-theoretic method. The relations between key rate, message rate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance of stego-key, and the theoretic conclusion is used to analyze the actual extracting attack on Least Significant Bit(LSB) steganographic algorithms.

  9. Analysis of animal accelerometer data using hidden Markov models

    OpenAIRE

    2016-01-01

    Use of accelerometers is now widespread within animal biotelemetry as they provide a means of measuring an animal's activity in a meaningful and quantitative way where direct observation is not possible. In sequential acceleration data there is a natural dependence between observations of movement or behaviour, a fact that has been largely ignored in most analyses. Analyses of acceleration data where serial dependence has been explicitly modelled have largely relied on hidden Markov models (H...

  10. Computational analysis of the mechanism of chemical reactions in terms of reaction phases: hidden intermediates and hidden transition States.

    Science.gov (United States)

    Kraka, Elfi; Cremer, Dieter

    2010-05-18

    Computational approaches to understanding chemical reaction mechanisms generally begin by establishing the relative energies of the starting materials, transition state, and products, that is, the stationary points on the potential energy surface of the reaction complex. Examining the intervening species via the intrinsic reaction coordinate (IRC) offers further insight into the fate of the reactants by delineating, step-by-step, the energetics involved along the reaction path between the stationary states. For a detailed analysis of the mechanism and dynamics of a chemical reaction, the reaction path Hamiltonian (RPH) and the united reaction valley approach (URVA) are an efficient combination. The chemical conversion of the reaction complex is reflected by the changes in the reaction path direction t(s) and reaction path curvature k(s), both expressed as a function of the path length s. This information can be used to partition the reaction path, and by this the reaction mechanism, of a chemical reaction into reaction phases describing chemically relevant changes of the reaction complex: (i) a contact phase characterized by van der Waals interactions, (ii) a preparation phase, in which the reactants prepare for the chemical processes, (iii) one or more transition state phases, in which the chemical processes of bond cleavage and bond formation take place, (iv) a product adjustment phase, and (v) a separation phase. In this Account, we examine mechanistic analysis with URVA in detail, focusing on recent theoretical insights (with a variety of reaction types) from our laboratories. Through the utilization of the concept of localized adiabatic vibrational modes that are associated with the internal coordinates, q(n)(s), of the reaction complex, the chemical character of each reaction phase can be identified via the adiabatic curvature coupling coefficients, A(n,s)(s). These quantities reveal whether a local adiabatic vibrational mode supports (A(n,s) > 0) or resists

  11. Costs of Quality: Exploratory Analysis of Hidden Elements and Prioritization using Analytic Hierarchy Process

    Directory of Open Access Journals (Sweden)

    Sailaja A

    2015-02-01

    Full Text Available Cost of Quality analysis is emerged as an effective tool for the industrial managers for pinpointing the deficiencies in the system as well as for identifying the improvement areas by highlighting the cost reduction opportunities. However , this analysis will be fully effective only if it is further extended to identify the cost incurred in ensuring quality in all areas of the supply chain including the hidden costs and costs of missed out opportunities. Most of the hidden elements of quality costs are difficult to track and not accounted by the traditional accounting tools. An exploratory analysis is made in this research to identify the hidden elements of quality costs in manufacturing industry. Further, the identified cost elements are classified into various groups for better analysis and, finally, prioritized to identify the vital few among them. Analytic Hierarchy Process (AHP technique which is one of the most popular Multi Criteria Decision Method (MCDM and Pareto analysis were used in this study for prioritizing the hidden quality cost elements based on their degree of impact on overall cost of quality. By this analysis, the key cost elements which are to be addressed to reduce the overall cost of quality are identified.

  12. Uncovering Information Hidden in Web Archives: Glimpse at Web Analysis Building on Data Warehouses; Towards Continuous Web Archiving: First Results and an Agenda for the Future; The Open Video Digital Library; After Migration to an Electronic Journal Collection: Impact on Faculty and Doctoral Students; Who Is Reading On-Line Education Journals? Why? And What Are They Reading?; Report on eLibrary@UBC4: Research, Collaboration and the Digital Library - Visions for 2010.

    Science.gov (United States)

    Rauber, Andreas; Bruckner, Robert M.; Aschenbrenner, Andreas; Witvoet, Oliver; Kaiser, Max; Masanes, Julien; Marchionini, Gary; Geisler, Gary; King, Donald W.; Montgomery, Carol Hansen; Rudner, Lawrence M.; Gellmann, Jennifer S.; Miller-Whitehead, Marie; Iverson, Lee

    2002-01-01

    These six articles discuss Web archives and Web analysis building on data warehouses; international efforts at continuous Web archiving; the Open Video Digital Library; electronic journal collections in academic libraries; online education journals; and an electronic library symposium at the University of British Columbia. (LRW)

  13. Systematic Triple-Mutant Analysis Uncovers Functional Connectivity between Pathways Involved in Chromosome Regulation

    Directory of Open Access Journals (Sweden)

    James E. Haber

    2013-06-01

    Full Text Available Genetic interactions reveal the functional relationships between pairs of genes. In this study, we describe a method for the systematic generation and quantitation of triple mutants, termed triple-mutant analysis (TMA. We have used this approach to interrogate partially redundant pairs of genes in S. cerevisiae, including ASF1 and CAC1, two histone chaperones. After subjecting asf1Δ cac1Δ to TMA, we found that the Swi/Snf Rdh54 protein compensates for the absence of Asf1 and Cac1. Rdh54 more strongly associates with the chromatin apparatus and the pericentromeric region in the double mutant. Moreover, Asf1 is responsible for the synthetic lethality observed in cac1Δ strains lacking the HIRA-like proteins. A similar TMA was carried out after deleting both CLB5 and CLB6, cyclins that regulate DNA replication, revealing a strong functional connection to chromosome segregation. This approach can reveal functional redundancies that cannot be uncovered through traditional double-mutant analyses.

  14. Identification of hidden failures in process control systems through function-oriented system analysis

    Energy Technology Data Exchange (ETDEWEB)

    Jalashgar, A.

    1997-05-01

    The main subject of this thesis is to identify hidden failures in process control systems by developing and using a function-oriented system analysis method. Qualitative failure analysis and the characteristics of the classical failure analysis methods and function-oriented modelling methods are covered. The general limitations of the methods in connection with the identification and representation of hidden failures are discussed. The discussion has led to the justification of developing and using a function-oriented system analysis method to identify and represent the capabilities of the system components, which realize different sets of functions in connection with different sets of goals that the system must achieve. A terminology is introduced to define the basic aspects of technical systems including goals, functions, capabilities and physical structure. A function-oriented system analysis method using this terminology and a tailored combination of the two function-oriented modelling approaches, is also introduced. It is then explained how the method can be applied in the identification and representation of hidden failures. The building blocks of a knowledge-oriented system to perform the diagnosis on the basis of the developed method are equally described. A prototype of the knowledge-based system is developed to demonstrate the applicability of the function-oriented system analysis method and the knowledge-based system. The prototype is implemented within the object-oriented software environment G2. (au) 65 ills., 32 refs.

  15. Differential SAGE analysis in Arabidopsis uncovers increased transcriptome complexity in response to low temperature

    Directory of Open Access Journals (Sweden)

    Parkin Isobel AP

    2008-09-01

    Full Text Available Abstract Background Abiotic stress, including low temperature, limits the productivity and geographical distribution of plants, which has led to significant interest in understanding the complex processes that allow plants to adapt to such stresses. The wide range of physiological, biochemical and molecular changes that occur in plants exposed to low temperature require a robust global approach to studying the response. We have employed Serial Analysis of Gene Expression (SAGE to uncover changes in the transcriptome of Arabidopsis thaliana over a time course of low temperature stress. Results Five SAGE libraries were generated from A. thaliana leaf tissue collected at time points ranging from 30 minutes to one week of low temperature treatment (4°C. Over 240,000 high quality SAGE tags, corresponding to 16,629 annotated genes, provided a comprehensive survey of changes in the transcriptome in response to low temperature, from perception of the stress to acquisition of freezing tolerance. Interpretation of these data was facilitated by representing the SAGE data by gene identifier, allowing more robust statistical analysis, cross-platform comparisons and the identification of genes sharing common expression profiles. Simultaneous statistical calculations across all five libraries identified 920 low temperature responsive genes, only 24% of which overlapped with previous global expression analysis performed using microarrays, although similar functional categories were affected. Clustering of the differentially regulated genes facilitated the identification of novel loci correlated with the development of freezing tolerance. Analysis of their promoter sequences revealed subsets of genes that were independent of CBF and ABA regulation and could provide a mechanism for elucidating complementary signalling pathways. The SAGE data emphasised the complexity of the plant response, with alternate pre-mRNA processing events increasing at low temperatures

  16. Whose Immigration Story?: Attending to Hidden Messages of Material in Social Studies

    Science.gov (United States)

    Oikonomidoy, Eleni; Williams, Gwendolyn

    2010-01-01

    Sometimes materials used in schools with good intentions can have effects opposite from those stated. Through the microscopic analysis of a parent-student immigration interview assignment on a social studies unit on immigration, this article aims to uncover the hidden story that underlies the questions asked. In so doing, it intends not only to…

  17. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels

    DEFF Research Database (Denmark)

    Kilpeläinen, Tuomas O; Carli, Jayne F Martin; Skowronski, Alicja A

    2016-01-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered...

  18. Treatment of Hidden Heterogeneity in Event History Analysis

    OpenAIRE

    1986-01-01

    In this paper we describe some statistical tools for event history analysis when there is unobserved heterogeneity of particular types as well as measured covariates. For expository purposes we also discuss several potential applications of these statistical methods. Actual application of these methods to demographic data remains as a goal for future work.

  19. Hidden flows and waste processing--an analysis of illustrative futures.

    Science.gov (United States)

    Schiller, F; Raffield, T; Angus, A; Herben, M; Young, P J; Longhurst, P J; Pollard, S J T

    2010-12-14

    An existing materials flow model is adapted (using Excel and AMBER model platforms) to account for waste and hidden material flows within a domestic environment. Supported by national waste data, the implications of legislative change, domestic resource depletion and waste technology advances are explored. The revised methodology offers additional functionality for economic parameters that influence waste generation and disposal. We explore this accounting system under hypothetical future waste and resource management scenarios, illustrating the utility of the model. A sensitivity analysis confirms that imports, domestic extraction and their associated hidden flows impact mostly on waste generation. The model offers enhanced utility for policy and decision makers with regard to economic mass balance and strategic waste flows, and may promote further discussion about waste technology choice in the context of reducing carbon budgets.

  20. Learning From Hidden Traits: Joint Factor Analysis and Latent Clustering

    Science.gov (United States)

    Yang, Bo; Fu, Xiao; Sidiropoulos, Nicholas D.

    2017-01-01

    Dimensionality reduction techniques play an essential role in data analytics, signal processing and machine learning. Dimensionality reduction is usually performed in a preprocessing stage that is separate from subsequent data analysis, such as clustering or classification. Finding reduced-dimension representations that are well-suited for the intended task is more appealing. This paper proposes a joint factor analysis and latent clustering framework, which aims at learning cluster-aware low-dimensional representations of matrix and tensor data. The proposed approach leverages matrix and tensor factorization models that produce essentially unique latent representations of the data to unravel latent cluster structure -- which is otherwise obscured because of the freedom to apply an oblique transformation in latent space. At the same time, latent cluster structure is used as prior information to enhance the performance of factorization. Specific contributions include several custom-built problem formulations, corresponding algorithms, and discussion of associated convergence properties. Besides extensive simulations, real-world datasets such as Reuters document data and MNIST image data are also employed to showcase the effectiveness of the proposed approaches.

  1. IEEE 802.11e (EDCA analysis in the presence of hidden stations

    Directory of Open Access Journals (Sweden)

    Xijie Liu

    2011-07-01

    Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.

  2. Independent component feature-based human activity recognition via Linear Discriminant Analysis and Hidden Markov Model.

    Science.gov (United States)

    Uddin, Md; Lee, J J; Kim, T S

    2008-01-01

    In proactive computing, human activity recognition from image sequences is an active research area. This paper presents a novel approach of human activity recognition based on Linear Discriminant Analysis (LDA) of Independent Component (IC) features from shape information. With extracted features, Hidden Markov Model (HMM) is applied for training and recognition. The recognition performance using LDA of IC features has been compared to other approaches including Principle Component Analysis (PCA), LDA of PC, and ICA. The preliminary results show much improved performance in the recognition rate with our proposed method.

  3. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels

    DEFF Research Database (Denmark)

    Kilpeläinen, Tuomas O; Carli, Jayne F Martin; Skowronski, Alicja A

    2016-01-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered....... Therefore, we performed a genome-wide association study (GWAS) of circulating leptin levels from 32,161 individuals and followed up loci reaching Pleptin levels in/near LEP, SLC32A1, GCKR, CCNL1 and FTO....... Although the association of the FTO obesity locus with leptin levels is abolished by adjustment for BMI, associations of the four other loci are independent of adiposity. The GCKR locus was found associated with multiple metabolic traits in previous GWAS and the CCNL1 locus with birth weight. Knockdown...

  4. A hidden Ising model for ChIP-chip data analysis

    KAUST Repository

    Mo, Q.

    2010-01-28

    Motivation: Chromatin immunoprecipitation (ChIP) coupled with tiling microarray (chip) experiments have been used in a wide range of biological studies such as identification of transcription factor binding sites and investigation of DNA methylation and histone modification. Hidden Markov models are widely used to model the spatial dependency of ChIP-chip data. However, parameter estimation for these models is typically either heuristic or suboptimal, leading to inconsistencies in their applications. To overcome this limitation and to develop an efficient software, we propose a hidden ferromagnetic Ising model for ChIP-chip data analysis. Results: We have developed a simple, but powerful Bayesian hierarchical model for ChIP-chip data via a hidden Ising model. Metropolis within Gibbs sampling algorithm is used to simulate from the posterior distribution of the model parameters. The proposed model naturally incorporates the spatial dependency of the data, and can be used to analyze data with various genomic resolutions and sample sizes. We illustrate the method using three publicly available datasets and various simulated datasets, and compare it with three closely related methods, namely TileMap HMM, tileHMM and BAC. We find that our method performs as well as TileMap HMM and BAC for the high-resolution data from Affymetrix platform, but significantly outperforms the other three methods for the low-resolution data from Agilent platform. Compared with the BAC method which also involves MCMC simulations, our method is computationally much more efficient. Availability: A software called iChip is freely available at http://www.bioconductor.org/. Contact: moq@mskcc.org. © The Author 2010. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oxfordjournals.org.

  5. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels

    Science.gov (United States)

    Kilpeläinen, Tuomas O.; Carli, Jayne F. Martin; Skowronski, Alicja A.; Sun, Qi; Kriebel, Jennifer; Feitosa, Mary F; Hedman, Åsa K.; Drong, Alexander W.; Hayes, James E.; Zhao, Jinghua; Pers, Tune H.; Schick, Ursula; Grarup, Niels; Kutalik, Zoltán; Trompet, Stella; Mangino, Massimo; Kristiansson, Kati; Beekman, Marian; Lyytikäinen, Leo-Pekka; Eriksson, Joel; Henneman, Peter; Lahti, Jari; Tanaka, Toshiko; Luan, Jian'an; Greco M, Fabiola Del; Pasko, Dorota; Renström, Frida; Willems, Sara M.; Mahajan, Anubha; Rose, Lynda M.; Guo, Xiuqing; Liu, Yongmei; Kleber, Marcus E.; Pérusse, Louis; Gaunt, Tom; Ahluwalia, Tarunveer S.; Ju Sung, Yun; Ramos, Yolande F.; Amin, Najaf; Amuzu, Antoinette; Barroso, Inês; Bellis, Claire; Blangero, John; Buckley, Brendan M.; Böhringer, Stefan; I Chen, Yii-Der; de Craen, Anton J. N.; Crosslin, David R.; Dale, Caroline E.; Dastani, Zari; Day, Felix R.; Deelen, Joris; Delgado, Graciela E.; Demirkan, Ayse; Finucane, Francis M.; Ford, Ian; Garcia, Melissa E.; Gieger, Christian; Gustafsson, Stefan; Hallmans, Göran; Hankinson, Susan E.; Havulinna, Aki S; Herder, Christian; Hernandez, Dena; Hicks, Andrew A.; Hunter, David J.; Illig, Thomas; Ingelsson, Erik; Ioan-Facsinay, Andreea; Jansson, John-Olov; Jenny, Nancy S.; Jørgensen, Marit E.; Jørgensen, Torben; Karlsson, Magnus; Koenig, Wolfgang; Kraft, Peter; Kwekkeboom, Joanneke; Laatikainen, Tiina; Ladwig, Karl-Heinz; LeDuc, Charles A.; Lowe, Gordon; Lu, Yingchang; Marques-Vidal, Pedro; Meisinger, Christa; Menni, Cristina; Morris, Andrew P.; Myers, Richard H.; Männistö, Satu; Nalls, Mike A.; Paternoster, Lavinia; Peters, Annette; Pradhan, Aruna D.; Rankinen, Tuomo; Rasmussen-Torvik, Laura J.; Rathmann, Wolfgang; Rice, Treva K.; Brent Richards, J; Ridker, Paul M.; Sattar, Naveed; Savage, David B.; Söderberg, Stefan; Timpson, Nicholas J.; Vandenput, Liesbeth; van Heemst, Diana; Uh, Hae-Won; Vohl, Marie-Claude; Walker, Mark; Wichmann, Heinz-Erich; Widén, Elisabeth; Wood, Andrew R.; Yao, Jie; Zeller, Tanja; Zhang, Yiying; Meulenbelt, Ingrid; Kloppenburg, Margreet; Astrup, Arne; Sørensen, Thorkild I. A.; Sarzynski, Mark A.; Rao, D. C.; Jousilahti, Pekka; Vartiainen, Erkki; Hofman, Albert; Rivadeneira, Fernando; Uitterlinden, André G.; Kajantie, Eero; Osmond, Clive; Palotie, Aarno; Eriksson, Johan G.; Heliövaara, Markku; Knekt, Paul B.; Koskinen, Seppo; Jula, Antti; Perola, Markus; Huupponen, Risto K.; Viikari, Jorma S.; Kähönen, Mika; Lehtimäki, Terho; Raitakari, Olli T.; Mellström, Dan; Lorentzon, Mattias; Casas, Juan P.; Bandinelli, Stefanie; März, Winfried; Isaacs, Aaron; van Dijk, Ko W.; van Duijn, Cornelia M.; Harris, Tamara B.; Bouchard, Claude; Allison, Matthew A.; Chasman, Daniel I.; Ohlsson, Claes; Lind, Lars; Scott, Robert A.; Langenberg, Claudia; Wareham, Nicholas J.; Ferrucci, Luigi; Frayling, Timothy M.; Pramstaller, Peter P.; Borecki, Ingrid B.; Waterworth, Dawn M.; Bergmann, Sven; Waeber, Gérard; Vollenweider, Peter; Vestergaard, Henrik; Hansen, Torben; Pedersen, Oluf; Hu, Frank B.; Eline Slagboom, P; Grallert, Harald; Spector, Tim D.; Jukema, J.W.; Klein, Robert J.; Schadt, Erik E; Franks, Paul W.; Lindgren, Cecilia M.; Leibel, Rudolph L.; Loos, Ruth J. F.

    2016-01-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered. Therefore, we performed a genome-wide association study (GWAS) of circulating leptin levels from 32,161 individuals and followed up loci reaching P<10−6 in 19,979 additional individuals. We identify five loci robustly associated (P<5 × 10−8) with leptin levels in/near LEP, SLC32A1, GCKR, CCNL1 and FTO. Although the association of the FTO obesity locus with leptin levels is abolished by adjustment for BMI, associations of the four other loci are independent of adiposity. The GCKR locus was found associated with multiple metabolic traits in previous GWAS and the CCNL1 locus with birth weight. Knockdown experiments in mouse adipose tissue explants show convincing evidence for adipogenin, a regulator of adipocyte differentiation, as the novel causal gene in the SLC32A1 locus influencing leptin levels. Our findings provide novel insights into the regulation of leptin production by adipose tissue and open new avenues for examining the influence of variation in leptin levels on adiposity and metabolic health. PMID:26833098

  6. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels.

    Science.gov (United States)

    Kilpeläinen, Tuomas O; Carli, Jayne F Martin; Skowronski, Alicja A; Sun, Qi; Kriebel, Jennifer; Feitosa, Mary F; Hedman, Åsa K; Drong, Alexander W; Hayes, James E; Zhao, Jinghua; Pers, Tune H; Schick, Ursula; Grarup, Niels; Kutalik, Zoltán; Trompet, Stella; Mangino, Massimo; Kristiansson, Kati; Beekman, Marian; Lyytikäinen, Leo-Pekka; Eriksson, Joel; Henneman, Peter; Lahti, Jari; Tanaka, Toshiko; Luan, Jian'an; Del Greco M, Fabiola; Pasko, Dorota; Renström, Frida; Willems, Sara M; Mahajan, Anubha; Rose, Lynda M; Guo, Xiuqing; Liu, Yongmei; Kleber, Marcus E; Pérusse, Louis; Gaunt, Tom; Ahluwalia, Tarunveer S; Ju Sung, Yun; Ramos, Yolande F; Amin, Najaf; Amuzu, Antoinette; Barroso, Inês; Bellis, Claire; Blangero, John; Buckley, Brendan M; Böhringer, Stefan; I Chen, Yii-Der; de Craen, Anton J N; Crosslin, David R; Dale, Caroline E; Dastani, Zari; Day, Felix R; Deelen, Joris; Delgado, Graciela E; Demirkan, Ayse; Finucane, Francis M; Ford, Ian; Garcia, Melissa E; Gieger, Christian; Gustafsson, Stefan; Hallmans, Göran; Hankinson, Susan E; Havulinna, Aki S; Herder, Christian; Hernandez, Dena; Hicks, Andrew A; Hunter, David J; Illig, Thomas; Ingelsson, Erik; Ioan-Facsinay, Andreea; Jansson, John-Olov; Jenny, Nancy S; Jørgensen, Marit E; Jørgensen, Torben; Karlsson, Magnus; Koenig, Wolfgang; Kraft, Peter; Kwekkeboom, Joanneke; Laatikainen, Tiina; Ladwig, Karl-Heinz; LeDuc, Charles A; Lowe, Gordon; Lu, Yingchang; Marques-Vidal, Pedro; Meisinger, Christa; Menni, Cristina; Morris, Andrew P; Myers, Richard H; Männistö, Satu; Nalls, Mike A; Paternoster, Lavinia; Peters, Annette; Pradhan, Aruna D; Rankinen, Tuomo; Rasmussen-Torvik, Laura J; Rathmann, Wolfgang; Rice, Treva K; Brent Richards, J; Ridker, Paul M; Sattar, Naveed; Savage, David B; Söderberg, Stefan; Timpson, Nicholas J; Vandenput, Liesbeth; van Heemst, Diana; Uh, Hae-Won; Vohl, Marie-Claude; Walker, Mark; Wichmann, Heinz-Erich; Widén, Elisabeth; Wood, Andrew R; Yao, Jie; Zeller, Tanja; Zhang, Yiying; Meulenbelt, Ingrid; Kloppenburg, Margreet; Astrup, Arne; Sørensen, Thorkild I A; Sarzynski, Mark A; Rao, D C; Jousilahti, Pekka; Vartiainen, Erkki; Hofman, Albert; Rivadeneira, Fernando; Uitterlinden, André G; Kajantie, Eero; Osmond, Clive; Palotie, Aarno; Eriksson, Johan G; Heliövaara, Markku; Knekt, Paul B; Koskinen, Seppo; Jula, Antti; Perola, Markus; Huupponen, Risto K; Viikari, Jorma S; Kähönen, Mika; Lehtimäki, Terho; Raitakari, Olli T; Mellström, Dan; Lorentzon, Mattias; Casas, Juan P; Bandinelli, Stefanie; März, Winfried; Isaacs, Aaron; van Dijk, Ko W; van Duijn, Cornelia M; Harris, Tamara B; Bouchard, Claude; Allison, Matthew A; Chasman, Daniel I; Ohlsson, Claes; Lind, Lars; Scott, Robert A; Langenberg, Claudia; Wareham, Nicholas J; Ferrucci, Luigi; Frayling, Timothy M; Pramstaller, Peter P; Borecki, Ingrid B; Waterworth, Dawn M; Bergmann, Sven; Waeber, Gérard; Vollenweider, Peter; Vestergaard, Henrik; Hansen, Torben; Pedersen, Oluf; Hu, Frank B; Eline Slagboom, P; Grallert, Harald; Spector, Tim D; Jukema, J W; Klein, Robert J; Schadt, Erik E; Franks, Paul W; Lindgren, Cecilia M; Leibel, Rudolph L; Loos, Ruth J F

    2016-02-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered. Therefore, we performed a genome-wide association study (GWAS) of circulating leptin levels from 32,161 individuals and followed up loci reaching P<10(-6) in 19,979 additional individuals. We identify five loci robustly associated (P<5 × 10(-8)) with leptin levels in/near LEP, SLC32A1, GCKR, CCNL1 and FTO. Although the association of the FTO obesity locus with leptin levels is abolished by adjustment for BMI, associations of the four other loci are independent of adiposity. The GCKR locus was found associated with multiple metabolic traits in previous GWAS and the CCNL1 locus with birth weight. Knockdown experiments in mouse adipose tissue explants show convincing evidence for adipogenin, a regulator of adipocyte differentiation, as the novel causal gene in the SLC32A1 locus influencing leptin levels. Our findings provide novel insights into the regulation of leptin production by adipose tissue and open new avenues for examining the influence of variation in leptin levels on adiposity and metabolic health.

  7. Analysis on hidden blood loss of total knee arthroplasty in treating knee osteoarthritis

    Institute of Scientific and Technical Information of China (English)

    SHEN Hui-liang; LI Zheng; FENG Ming-li; CAO Guang-le

    2011-01-01

    Background Total knee arthroplasty (TKA) is an important therapy for the treatment of various late-stage knee diseases. However, it has been observed that patients have lower hemoglobin (HB) counts postoperatively, which are significantly inconsistent with the measured blood loss. Although the concept of hidden blood loss has been presented in 2000, very little clinical attention has been paid since then. In this study, we investigated the characteristics and influential factor of hidden blood loss after TKA in treating knee osteoarthritis.Methods One hundred and eight patients, with 42 males and 66 females, were retrospectively analyzed. The perioperative blood loss and the hidden blood loss following TKA were calculated by Gross formula. Potential factors affecting perioperative and hidden blood loss included gender, surgical time, tourniquet time, hemostasis (during operation with deflating tourniquet), and reinfusion of salvaged blood.Results The average perioperative blood loss was found to be (1553±356) ml and the average hidden blood loss was (793±223) ml. The hidden blood loss of the male was significantly higher than that of the female, and was reduced by hemostasis during the operation with a deflating tourniquet. Hidden blood loss was not affected by postoperative blood salvage and reinfusion, surgical time, or tourniquet time.Conclusions When calculating the value of hidden blood loss by Gross formula, the lowest value of hematocrit should be chosen as the parameter so that hidden blood loss would not be underestimated. No significant differences could be found in hidden blood loss for males compared to females. Hidden blood loss can be reduced by hemostasis during operation with a deflating tourniquet. Although reinfusion of salvaged blood could not reduce the perioperative blood loss or hidden blood loss, it was still an effective method to reduce transfusion rate.

  8. Hidden Markov model analysis of force/torque information in telemanipulation

    Science.gov (United States)

    Hannaford, Blake; Lee, Paul

    1991-01-01

    A model for the prediction and analysis of sensor information recorded during robotic performance of telemanipulation tasks is presented. The model uses the hidden Markov model to describe the task structure, the operator's or intelligent controller's goal structure, and the sensor signals. A methodology for constructing the model parameters based on engineering knowledge of the task is described. It is concluded that the model and its optimal state estimation algorithm, the Viterbi algorithm, are very succesful at the task of segmenting the data record into phases corresponding to subgoals of the task. The model provides a rich modeling structure within a statistical framework, which enables it to represent complex systems and be robust to real-world sensory signals.

  9. Meta-analysis of cancer transcriptomes: A new approach to uncover molecular pathological events in different cancer tissues

    Directory of Open Access Journals (Sweden)

    Sundus Iqbal

    2014-03-01

    Full Text Available To explore secrets of metastatic cancers, individual expression of true sets of respective genes must spread across the tissue. In this study, meta-analysis for transcriptional profiles of oncogenes was carried out to hunt critical genes or networks helping in metastasizing cancers. For this, transcriptomic analysis of different cancerous tissues causing leukemia, lung, liver, spleen, colorectal, colon, breast, bladder, and kidney cancers was performed by extracting microarray expression data from online resource; Gene Expression Omnibus. A newly developed bioinformatics technique; Dynamic Impact Approach (DIA was applied for enrichment analysis of transcriptional profiles using Database for Annotation Visualization and Integrated Discovery (DAVID. Furthermore, oPOSSUM (v. 2.0 and Cytoscape (v. 2.8.2 were used for in-depth analysis of transcription factors and regulatory gene networks respectively. DAVID analysis uncovered the most significantly enriched pathways in molecular functions that were 'Ubiquitin thiolesterase activity' up regulated in blood, breast, bladder, colorectal, lung, spleen, prostrate cancer. 'Transforming growth factor beta receptor activity' was inhibited in all cancers except leukemia, colon and liver cancer. oPOSSUM further revealed highly over-represented Transcription Factors (TFs; Broad-complex_3, Broad-complex_4, and Foxd3 except for leukemia and bladder cancer. From these findings, it is possible to target genes and networks, play a crucial role in the development of cancer. In the future, these transcription factors can serve as potential candidates for the therapeutic drug targets which can impede the deadly spread.

  10. Flux Analysis Uncovers Key Role of Functional Redundancy in Formaldehyde Metabolism

    OpenAIRE

    Christopher J Marx; Van Dien, Stephen J.; Mary E Lidstrom

    2005-01-01

    Genome-scale analysis of predicted metabolic pathways has revealed the common occurrence of apparent redundancy for specific functional units, or metabolic modules. In many cases, mutation analysis does not resolve function, and instead, direct experimental analysis of metabolic flux under changing conditions is necessary. In order to use genome sequences to build models of cellular function, it is important to define function for such apparently redundant systems. Here we describe direct flu...

  11. Network Analysis as a Communication Audit Instrument: Uncovering Communicative Strengths and Weaknesses Within Organizations

    NARCIS (Netherlands)

    Zwijze-Koning, Karen H.; Jong, de M.D.T.

    2015-01-01

    Network analysis is one of the instruments in the communication audit toolbox to diagnose communication problems within organizations. To explore its contribution to a communication audit, the authors conducted a network analysis within three secondary schools, comparing its results with those of tw

  12. An Optimization-Driven Analysis Pipeline to Uncover Biomarkers and Signaling Paths: Cervix Cancer

    Science.gov (United States)

    Lorenzo, Enery; Camacho-Caceres, Katia; Ropelewski, Alexander J.; Rosas, Juan; Ortiz-Mojer, Michael; Perez-Marty, Lynn; Irizarry, Juan; Gonzalez, Valerie; Rodríguez, Jesús A.; Cabrera-Rios, Mauricio; Isaza, Clara

    2015-01-01

    Establishing how a series of potentially important genes might relate to each other is relevant to understand the origin and evolution of illnesses, such as cancer. High-throughput biological experiments have played a critical role in providing information in this regard. A special challenge, however, is that of trying to conciliate information from separate microarray experiments to build a potential genetic signaling path. This work proposes a two-step analysis pipeline, based on optimization, to approach meta-analysis aiming to build a proxy for a genetic signaling path. PMID:26388997

  13. Analysis of the Legionella longbeachae genome and transcriptome uncovers unique strategies to cause Legionnaires' disease.

    Directory of Open Access Journals (Sweden)

    Christel Cazalet

    2010-02-01

    Full Text Available Legionella pneumophila and L. longbeachae are two species of a large genus of bacteria that are ubiquitous in nature. L. pneumophila is mainly found in natural and artificial water circuits while L. longbeachae is mainly present in soil. Under the appropriate conditions both species are human pathogens, capable of causing a severe form of pneumonia termed Legionnaires' disease. Here we report the sequencing and analysis of four L. longbeachae genomes, one complete genome sequence of L. longbeachae strain NSW150 serogroup (Sg 1, and three draft genome sequences another belonging to Sg1 and two to Sg2. The genome organization and gene content of the four L. longbeachae genomes are highly conserved, indicating strong pressure for niche adaptation. Analysis and comparison of L. longbeachae strain NSW150 with L. pneumophila revealed common but also unexpected features specific to this pathogen. The interaction with host cells shows distinct features from L. pneumophila, as L. longbeachae possesses a unique repertoire of putative Dot/Icm type IV secretion system substrates, eukaryotic-like and eukaryotic domain proteins, and encodes additional secretion systems. However, analysis of the ability of a dotA mutant of L. longbeachae NSW150 to replicate in the Acanthamoeba castellanii and in a mouse lung infection model showed that the Dot/Icm type IV secretion system is also essential for the virulence of L. longbeachae. In contrast to L. pneumophila, L. longbeachae does not encode flagella, thereby providing a possible explanation for differences in mouse susceptibility to infection between the two pathogens. Furthermore, transcriptome analysis revealed that L. longbeachae has a less pronounced biphasic life cycle as compared to L. pneumophila, and genome analysis and electron microscopy suggested that L. longbeachae is encapsulated. These species-specific differences may account for the different environmental niches and disease epidemiology of these

  14. The Correspondence Analysis Platform for Uncovering Deep Structure in Data and Information

    CERN Document Server

    Murtagh, Fionn

    2008-01-01

    We study two aspects of information semantics: (i) the collection of all relationships, (ii) tracking and spotting anomaly and change. The first is implemented by endowing all relevant information spaces with a Euclidean metric in a common projected space. The second is modelled by an induced ultrametric. A very general way to achieve a Euclidean embedding of different information spaces based on cross-tabulation counts (and from other input data formats) is provided by Correspondence Analysis. From there, the induced ultrametric that we are particularly interested in takes a sequential - e.g. temporal - ordering of the data into account. We employ such a perspective to look at narrative, "the flow of thought and the flow of language" (Chafe). In application to policy decision making, we show how we can focus analysis in a small number of dimensions.

  15. Single cell analysis of Vibrio harveyi uncovers functional heterogeneity in response to quorum sensing signals

    Directory of Open Access Journals (Sweden)

    Anetzberger Claudia

    2012-09-01

    Full Text Available Abstract Background Vibrio harveyi and closely related species are important pathogens in aquaculture. A complex quorum sensing cascade involving three autoinducers controls bioluminescence and several genes encoding virulence factors. Single cell analysis of a V. harveyi population has already indicated intercellular heterogeneity in the production of bioluminescence. This study was undertaken to analyze the expression of various autoinducer-dependent genes in individual cells. Results Here we used reporter strains bearing promoter::gfp fusions to monitor the induction/repression of three autoinducer-regulated genes in wild type conjugates at the single cell level. Two genes involved in pathogenesis - vhp and vscP, which code for an exoprotease and a component of the type III secretion system, respectively, and luxC (the first gene in the lux operon were chosen for analysis. The lux operon and the exoprotease gene are induced, while vscP is repressed at high cell density. As controls luxS and recA, whose expression is not dependent on autoinducers, were examined. The responses of the promoter::gfp fusions in individual cells from the same culture ranged from no to high induction. Importantly, simultaneous analysis of two autoinducer induced phenotypes, bioluminescence (light detection and exoproteolytic activity (fluorescence of a promoter::gfp fusion, in single cells provided evidence for functional heterogeneity within a V. harveyi population. Conclusions Autoinducers are not only an indicator for cell density, but play a pivotal role in the coordination of physiological activities within the population.

  16. Uncovering a latent multinomial: Analysis of mark-recapture data with misidentification

    Science.gov (United States)

    Link, W.A.; Yoshizaki, J.; Bailey, L.L.; Pollock, K.H.

    2010-01-01

    Natural tags based on DNA fingerprints or natural features of animals are now becoming very widely used in wildlife population biology. However, classic capture-recapture models do not allow for misidentification of animals which is a potentially very serious problem with natural tags. Statistical analysis of misidentification processes is extremely difficult using traditional likelihood methods but is easily handled using Bayesian methods. We present a general framework for Bayesian analysis of categorical data arising from a latent multinomial distribution. Although our work is motivated by a specific model for misidentification in closed population capture-recapture analyses, with crucial assumptions which may not always be appropriate, the methods we develop extend naturally to a variety of other models with similar structure. Suppose that observed frequencies f are a known linear transformation f = A???x of a latent multinomial variable x with cell probability vector ?? = ??(??). Given that full conditional distributions [?? | x] can be sampled, implementation of Gibbs sampling requires only that we can sample from the full conditional distribution [x | f, ??], which is made possible by knowledge of the null space of A???. We illustrate the approach using two data sets with individual misidentification, one simulated, the other summarizing recapture data for salamanders based on natural marks. ?? 2009, The International Biometric Society.

  17. Gene expression analysis uncovers novel hedgehog interacting protein (HHIP) effects in human bronchial epithelial cells.

    Science.gov (United States)

    Zhou, Xiaobo; Qiu, Weiliang; Sathirapongsasuti, J Fah; Cho, Michael H; Mancini, John D; Lao, Taotao; Thibault, Derek M; Litonjua, Augusto A; Bakke, Per S; Gulsvik, Amund; Lomas, David A; Beaty, Terri H; Hersh, Craig P; Anderson, Christopher; Geigenmuller, Ute; Raby, Benjamin A; Rennard, Stephen I; Perrella, Mark A; Choi, Augustine M K; Quackenbush, John; Silverman, Edwin K

    2013-05-01

    Hedgehog interacting protein (HHIP) was implicated in chronic obstructive pulmonary disease (COPD) by genome-wide association studies (GWAS). However, it remains unclear how HHIP contributes to COPD pathogenesis. To identify genes regulated by HHIP, we performed gene expression microarray analysis in a human bronchial epithelial cell line (Beas-2B) stably infected with HHIP shRNAs. HHIP silencing led to differential expression of 296 genes; enrichment for variants nominally associated with COPD was found. Eighteen of the differentially expressed genes were validated by real-time PCR in Beas-2B cells. Seven of 11 validated genes tested in human COPD and control lung tissues demonstrated significant gene expression differences. Functional annotation indicated enrichment for extracellular matrix and cell growth genes. Network modeling demonstrated that the extracellular matrix and cell proliferation genes influenced by HHIP tended to be interconnected. Thus, we identified potential HHIP targets in human bronchial epithelial cells that may contribute to COPD pathogenesis.

  18. Decision analysis and drug development portfolio management: uncovering the real options value of your projects.

    Science.gov (United States)

    Rosati, Nicoletta

    2002-04-01

    Project selection and portfolio management are particularly challenging in the pharmaceutical industry due to the high risk - high stake nature of the drug development process. In the recent years, scholars and industry experts have agreed that traditional Net-Present-Value evaluation of the projects fails to capture the value of managerial flexibility, and encouraged adopting a real options approach to recover the missed value. In this paper, we take a closer look at the drug development process and at the indices currently used to rank projects. We discuss the economic value of information and of real options arising in drug development and present decision analysis as an ideal framework for the implementation of real options valuation.

  19. Wave energy budget analysis in the Earth's radiation belts uncovers a missing energy.

    Science.gov (United States)

    Artemyev, A V; Agapitov, O V; Mourenas, D; Krasnoselskikh, V V; Mozer, F S

    2015-05-15

    Whistler-mode emissions are important electromagnetic waves pervasive in the Earth's magnetosphere, where they continuously remove or energize electrons trapped by the geomagnetic field, controlling radiation hazards to satellites and astronauts and the upper-atmosphere ionization or chemical composition. Here, we report an analysis of 10-year Cluster data, statistically evaluating the full wave energy budget in the Earth's magnetosphere, revealing that a significant fraction of the energy corresponds to hitherto generally neglected very oblique waves. Such waves, with 10 times smaller magnetic power than parallel waves, typically have similar total energy. Moreover, they carry up to 80% of the wave energy involved in wave-particle resonant interactions. It implies that electron heating and precipitation into the atmosphere may have been significantly under/over-valued in past studies considering only conventional quasi-parallel waves. Very oblique waves may turn out to be a crucial agent of energy redistribution in the Earth's radiation belts, controlled by solar activity.

  20. Face Aging Effect Simulation Using Hidden Factor Analysis Joint Sparse Representation

    Science.gov (United States)

    Yang, Hongyu; Huang, Di; Wang, Yunhong; Wang, Heng; Tang, Yuanyan

    2016-06-01

    Face aging simulation has received rising investigations nowadays, whereas it still remains a challenge to generate convincing and natural age-progressed face images. In this paper, we present a novel approach to such an issue by using hidden factor analysis joint sparse representation. In contrast to the majority of tasks in the literature that handle the facial texture integrally, the proposed aging approach separately models the person-specific facial properties that tend to be stable in a relatively long period and the age-specific clues that change gradually over time. It then merely transforms the age component to a target age group via sparse reconstruction, yielding aging effects, which is finally combined with the identity component to achieve the aged face. Experiments are carried out on three aging databases, and the results achieved clearly demonstrate the effectiveness and robustness of the proposed method in rendering a face with aging effects. Additionally, a series of evaluations prove its validity with respect to identity preservation and aging effect generation.

  1. Genome-wide analysis of single nucleotide polymorphisms uncovers population structure in Northern Europe.

    Directory of Open Access Journals (Sweden)

    Elina Salmela

    Full Text Available BACKGROUND: Genome-wide data provide a powerful tool for inferring patterns of genetic variation and structure of human populations. PRINCIPAL FINDINGS: In this study, we analysed almost 250,000 SNPs from a total of 945 samples from Eastern and Western Finland, Sweden, Northern Germany and Great Britain complemented with HapMap data. Small but statistically significant differences were observed between the European populations (F(ST = 0.0040, p<10(-4, also between Eastern and Western Finland (F(ST = 0.0032, p<10(-3. The latter indicated the existence of a relatively strong autosomal substructure within the country, similar to that observed earlier with smaller numbers of markers. The Germans and British were less differentiated than the Swedes, Western Finns and especially the Eastern Finns who also showed other signs of genetic drift. This is likely caused by the later founding of the northern populations, together with subsequent founder and bottleneck effects, and a smaller population size. Furthermore, our data suggest a small eastern contribution among the Finns, consistent with the historical and linguistic background of the population. SIGNIFICANCE: Our results warn against a priori assumptions of homogeneity among Finns and other seemingly isolated populations. Thus, in association studies in such populations, additional caution for population structure may be necessary. Our results illustrate that population history is often important for patterns of genetic variation, and that the analysis of hundreds of thousands of SNPs provides high resolution also for population genetics.

  2. Can feedback analysis be used to uncover the physical origin of climate sensitivity and efficacy differences?

    Science.gov (United States)

    Rieger, Vanessa S.; Dietmüller, Simone; Ponater, Michael

    2016-12-01

    Different strengths and types of radiative forcings cause variations in the climate sensitivities and efficacies. To relate these changes to their physical origin, this study tests whether a feedback analysis is a suitable approach. For this end, we apply the partial radiative perturbation method. Combining the forward and backward calculation turns out to be indispensable to ensure the additivity of feedbacks and to yield a closed forcing-feedback-balance at top of the atmosphere. For a set of CO2-forced simulations, the climate sensitivity changes with increasing forcing. The albedo, cloud and combined water vapour and lapse rate feedback are found to be responsible for the variations in the climate sensitivity. An O3-forced simulation (induced by enhanced NOx and CO surface emissions) causes a smaller efficacy than a CO2-forced simulation with a similar magnitude of forcing. We find that the Planck, albedo and most likely the cloud feedback are responsible for this effect. Reducing the radiative forcing impedes the statistical separability of feedbacks. We additionally discuss formal inconsistencies between the common ways of comparing climate sensitivities and feedbacks. Moreover, methodical recommendations for future work are given.

  3. Uncovering precision phenotype-biomarker associations in traumatic brain injury using topological data analysis

    Science.gov (United States)

    Nielson, Jessica L.; Cooper, Shelly R.; Sorani, Marco D.; Inoue, Tomoo; Yuh, Esther L.; Mukherjee, Pratik; Petrossian, Tanya C.; Lum, Pek Y.; Lingsma, Hester F.; Gordon, Wayne A.; Okonkwo, David O.; Manley, Geoffrey T.

    2017-01-01

    Background Traumatic brain injury (TBI) is a complex disorder that is traditionally stratified based on clinical signs and symptoms. Recent imaging and molecular biomarker innovations provide unprecedented opportunities for improved TBI precision medicine, incorporating patho-anatomical and molecular mechanisms. Complete integration of these diverse data for TBI diagnosis and patient stratification remains an unmet challenge. Methods and findings The Transforming Research and Clinical Knowledge in Traumatic Brain Injury (TRACK-TBI) Pilot multicenter study enrolled 586 acute TBI patients and collected diverse common data elements (TBI-CDEs) across the study population, including imaging, genetics, and clinical outcomes. We then applied topology-based data-driven discovery to identify natural subgroups of patients, based on the TBI-CDEs collected. Our hypothesis was two-fold: 1) A machine learning tool known as topological data analysis (TDA) would reveal data-driven patterns in patient outcomes to identify candidate biomarkers of recovery, and 2) TDA-identified biomarkers would significantly predict patient outcome recovery after TBI using more traditional methods of univariate statistical tests. TDA algorithms organized and mapped the data of TBI patients in multidimensional space, identifying a subset of mild TBI patients with a specific multivariate phenotype associated with unfavorable outcome at 3 and 6 months after injury. Further analyses revealed that this patient subset had high rates of post-traumatic stress disorder (PTSD), and enrichment in several distinct genetic polymorphisms associated with cellular responses to stress and DNA damage (PARP1), and in striatal dopamine processing (ANKK1, COMT, DRD2). Conclusions TDA identified a unique diagnostic subgroup of patients with unfavorable outcome after mild TBI that were significantly predicted by the presence of specific genetic polymorphisms. Machine learning methods such as TDA may provide a robust

  4. Genome-wide copy number analysis uncovers a new HSCR gene: NRG3.

    Directory of Open Access Journals (Sweden)

    Clara Sze-Man Tang

    Full Text Available Hirschsprung disease (HSCR is a congenital disorder characterized by aganglionosis of the distal intestine. To assess the contribution of copy number variants (CNVs to HSCR, we analysed the data generated from our previous genome-wide association study on HSCR patients, whereby we identified NRG1 as a new HSCR susceptibility locus. Analysis of 129 Chinese patients and 331 ethnically matched controls showed that HSCR patients have a greater burden of rare CNVs (p = 1.50 × 10(-5, particularly for those encompassing genes (p = 5.00 × 10(-6. Our study identified 246 rare-genic CNVs exclusive to patients. Among those, we detected a NRG3 deletion (p = 1.64 × 10(-3. Subsequent follow-up (96 additional patients and 220 controls on NRG3 revealed 9 deletions (combined p = 3.36 × 10(-5 and 2 de novo duplications among patients and two deletions among controls. Importantly, NRG3 is a paralog of NRG1. Stratification of patients by presence/absence of HSCR-associated syndromes showed that while syndromic-HSCR patients carried significantly longer CNVs than the non-syndromic or controls (p = 1.50 × 10(-5, non-syndromic patients were enriched in CNV number when compared to controls (p = 4.00 × 10(-6 or the syndromic counterpart. Our results suggest a role for NRG3 in HSCR etiology and provide insights into the relative contribution of structural variants in both syndromic and non-syndromic HSCR. This would be the first genome-wide catalog of copy number variants identified in HSCR.

  5. Analysis of Decision Trees in Context Clustering of Hidden Markov Model Based Thai Speech Synthesis

    Directory of Open Access Journals (Sweden)

    Suphattharachai Chomphan

    2011-01-01

    Full Text Available Problem statement: In Thai speech synthesis using Hidden Markov model (HMM based synthesis system, the tonal speech quality is degraded due to tone distortion. This major problem must be treated appropriately to preserve the tone characteristics of each syllable unit. Since tone brings about the intelligibility of the synthesized speech. It is needed to establish the tone questions and other phonetic questions in tree-based context clustering process accordingly. Approach: This study describes the analysis of questions in tree-based context clustering process of an HMM-based speech synthesis system for Thai language. In the system, spectrum, pitch or F0 and state duration are modeled simultaneously in a unified framework of HMM, their parameter distributions are clustered independently by using a decision-tree based context clustering technique. The contextual factors which affect spectrum, pitch and duration, i.e., part of speech, position and number of phones in a syllable, position and number of syllables in a word, position and number of words in a sentence, phone type and tone type, are taken into account for constructing the questions of the decision tree. All in all, thirteen sets of questions are analyzed in comparison. Results: In the experiment, we analyzed the decision trees by counting the number of questions in each node coming from those thirteen sets and by calculating the dominance score given to each question as the reciprocal of the distance from the root node to the question node. The highest number and dominance score are of the set of phonetic type, while the second, third highest ones are of the set of part of speech and tone type. Conclusion: By counting the number of questions in each node and calculating the dominance score, we can set the priority of each question set. All in all, the analysis results bring about further development of Thai speech synthesis with efficient context clustering process in

  6. PERSONAL NETWORK SAMPLING, OUTDEGREE ANALYSIS AND MULTILEVEL ANALYSIS - INTRODUCING THE NETWORK CONCEPT IN STUDIES OF HIDDEN POPULATIONS

    NARCIS (Netherlands)

    SPREEN, M; ZWAAGSTRA, R

    1994-01-01

    Populations, such as heroin and cocaine users, the homeless and the like (hidden populations), are among the most difficult populations to which to apply classic random sampling procedures. A frequently used data collection method for these hidden populations is the snowball procedure. The prerequis

  7. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    Science.gov (United States)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-10-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  8. Functional Evaluation of Hidden Figures Object Analysis in Children with Autistic Disorder

    Science.gov (United States)

    Malisza, Krisztina L.; Clancy, Christine; Shiloff, Deborah; Foreman, Derek; Holden, Jeanette; Jones, Cheryl; Paulson, K.; Summers, Randy; Yu, C. T.; Chudley, Albert E.

    2011-01-01

    Functional magnetic resonance imaging (fMRI) during performance of a hidden figures task (HFT) was used to compare differences in brain function in children diagnosed with autism disorder (AD) compared to children with attention-deficit/hyperactivity disorder (ADHD) and typical controls (TC). Overall greater functional MRI activity was observed in…

  9. A Bourdieusian Analysis of Cultural Reproduction: Socialisation and the "Hidden Curriculum" in Professional Football

    Science.gov (United States)

    Cushion, Christopher J.; Jones, Robyn L.

    2014-01-01

    This article draws on the theoretical concepts of Pierre Bourdieu to provide an explanatory account of how socialisation and the hidden curriculum within coaching practice contribute toward the formation of social identities and powerful schemes of internalised dispositions. Drawing on a 10 month ethnography within professional football, the…

  10. Uncovering the Links between Prospective Teachers' Personal Responsibility, Academic Optimism, Hope, and Emotions about Teaching: A Mediation Analysis

    Science.gov (United States)

    Eren, Altay

    2014-01-01

    Prospective teachers' sense of personal responsibility has not been examined together with their academic optimism, hope, and emotions about teaching in a single study to date. However, to consider hope, academic optimism, and emotions about teaching together with personal responsibility is important to uncover the factors affecting…

  11. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main...... the ill parent. These findings contribute to a deeper understanding of the traumatic process of parental ABI that some children experience and emphasize the importance of family-centred interventions that include the children....

  12. Comparative analysis of the Photorhabdus luminescens and the Yersinia enterocolitica genomes: uncovering candidate genes involved in insect pathogenicity

    Directory of Open Access Journals (Sweden)

    Fuchs Thilo M

    2008-01-01

    Full Text Available Abstract Background Photorhabdus luminescens and Yersinia enterocolitica are both enteric bacteria which are associated with insects. P. luminescens lives in symbiosis with soil nematodes and is highly pathogenic towards insects but not to humans. In contrast, Y. enterocolitica is widely found in the environment and mainly known to cause gastroenteritis in men, but has only recently been shown to be also toxic for insects. It is expected that both pathogens share an overlap of genetic determinants that play a role within the insect host. Results A selective genome comparison was applied. Proteins belonging to the class of two-component regulatory systems, quorum sensing, universal stress proteins, and c-di-GMP signalling have been analysed. The interorganismic synopsis of selected regulatory systems uncovered common and distinct signalling mechanisms of both pathogens used for perception of signals within the insect host. Particularly, a new class of LuxR-like regulators was identified, which might be involved in detecting insect-specific molecules. In addition, the genetic overlap unravelled a two-component system that is unique for the genera Photorhabdus and Yersinia and is therefore suggested to play a major role in the pathogen-insect relationship. Our analysis also highlights factors of both pathogens that are expressed at low temperatures as encountered in insects in contrast to higher (body temperature, providing evidence that temperature is a yet under-investigated environmental signal for bacterial adaptation to various hosts. Common degradative metabolic pathways are described that might be used to explore nutrients within the insect gut or hemolymph, thus enabling the proliferation of P. luminescens and Y. enterocolitica in their invertebrate hosts. A strikingly higher number of genes encoding insecticidal toxins and other virulence factors in P. luminescens compared to Y. enterocolitica correlates with the higher virulence of P

  13. Similarity matrix analysis and divergence measures for statistical detection of unknown deterministic signals hidden in additive noise

    Energy Technology Data Exchange (ETDEWEB)

    Le Bot, O., E-mail: lebotol@gmail.com [Univ. Grenoble Alpes, GIPSA-Lab, F-38000 Grenoble (France); CNRS, GIPSA-Lab, F-38000 Grenoble (France); Mars, J.I. [Univ. Grenoble Alpes, GIPSA-Lab, F-38000 Grenoble (France); CNRS, GIPSA-Lab, F-38000 Grenoble (France); Gervaise, C. [Univ. Grenoble Alpes, GIPSA-Lab, F-38000 Grenoble (France); CNRS, GIPSA-Lab, F-38000 Grenoble (France); Chaire CHORUS, Foundation of Grenoble Institute of Technology, 46 Avenue Félix Viallet, 38031 Grenoble Cedex 1 (France)

    2015-10-23

    This Letter proposes an algorithm to detect an unknown deterministic signal hidden in additive white Gaussian noise. The detector is based on recurrence analysis. It compares the distribution of the similarity matrix coefficients of the measured signal with an analytic expression of the distribution expected in the noise-only case. This comparison is achieved using divergence measures. Performance analysis based on the receiver operating characteristics shows that the proposed detector outperforms the energy detector, giving a probability of detection 10% to 50% higher, and has a similar performance to that of a sub-optimal filter detector. - Highlights: • We model the distribution of the similarity matrix coefficients of a Gaussian noise. • We use divergence measures for goodness-of-fit test between a model and measured data. • We distinguish deterministic signal and Gaussian noise with similarity matrix analysis. • Similarity matrix analysis outperforms energy detector.

  14. HIDDEN MARKOV MODELS WITH COVARIATES FOR ANALYSIS OF DEFECTIVE INDUSTRIAL MACHINE PARTS

    OpenAIRE

    2014-01-01

    Monthly counts of industrial machine part errors are modeled using a two-state Hidden Markov Model (HMM) in order to describe the effect of machine part error correction and the amount of time spent on the error correction on the likelihood of the machine part to be in a “defective” or “non-defective” state. The number of machine parts errors were collected from a thermo plastic injection molding machine in a car bumper auto parts manufacturer in Liberec city, Czech Re...

  15. Uncovering the hidden demographic history of the USSR.

    Science.gov (United States)

    Blum, A

    1991-01-01

    After the results of the 1937 census were calculated and the figures were lower than expected, Stalin arrested the census takers, altered the figures, and cancelled it. But, he did not destroy the records; they have remained in the archives of the Central National Archives for 50 years. They are now finally open to inspection thanks to glasnost. The records that are being examined are confirming what some in the West had suspected all along. Stalin wanted the 1937 census to show 170 million people, but because of famine, the actual number was more like 162 million. Stalin wanted the census to show the world that socialism was better than capitalism in terms of growth. However the forced collectivization of farms and the forced relocations of people resulted in a famine in 1933 which wiped out about 2.5 times more people over and above normal death rates. In some regions this figure is 4.5 times what is normally was. The number of people lost during WWII is also being revised in light of these new records. It appears that 26 million people died as the result of hostilities between 1941-45. This is in addition to the number normally expected to die during the same time.

  16. Uncovering the Hidden Molecular Signatures of Breast Cancer

    Science.gov (United States)

    2013-05-01

    lines were generated using TNE lysis buffer (50 mM Tris at pH 8.0, 150 mM NaCl, 1% Nonidet P - 40 , 2 mMEDTA at pH 8.0, 1 mM phenylmethylsulfonyl fluoride, 1...Jeffrey! SS,! Thorsen! T,! Quist! H,! Matese! JC,! Brown! PO,! Botstein! D,! Eystein! Lønning! P ,! BørresenLDale! AL.! Gene! expression! patterns! of...Langerød! A,! Green! A,! Provenzano! E,!Wishart! G,! Pinder! S,!Watson! P ,!Markowetz! F,! Murphy!L,!Ellis!I,!Purushotham!A,!BørresenLDale!AL,!Brenton!JD

  17. Hidden Stories: Uncovering the Visual Metaphor for Education and Communication

    Science.gov (United States)

    Hube, Amy M.; Tremblay, Kenneth R., Jr.; Leigh, Katharine E.

    2015-01-01

    Design solutions have become increasingly complex and based on a rapidly growing body of knowledge. In order to articulate a design solution to a client, the graphic use of the design narrative can effectively communicate complex ideas. Two case study interventions were conducted in an interior design program in which students were introduced to…

  18. In the Minds of OSCE Examiners: Uncovering Hidden Assumptions

    Science.gov (United States)

    Chahine, Saad; Holmes, Bruce; Kowalewski, Zbigniew

    2016-01-01

    The Objective Structured Clinical Exam (OSCE) is a widely used method of assessment in medical education. Rater cognition has become an important area of inquiry in the medical education assessment literature generally, and in the OSCE literature specifically, because of concerns about potential compromises of validity. In this study, a novel…

  19. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  20. Spatially Enhanced Differential RNA Methylation Analysis from Affinity-Based Sequencing Data with Hidden Markov Model.

    Science.gov (United States)

    Zhang, Yu-Chen; Zhang, Shao-Wu; Liu, Lian; Liu, Hui; Zhang, Lin; Cui, Xiaodong; Huang, Yufei; Meng, Jia

    2015-01-01

    With the development of new sequencing technology, the entire N6-methyl-adenosine (m(6)A) RNA methylome can now be unbiased profiled with methylated RNA immune-precipitation sequencing technique (MeRIP-Seq), making it possible to detect differential methylation states of RNA between two conditions, for example, between normal and cancerous tissue. However, as an affinity-based method, MeRIP-Seq has yet provided base-pair resolution; that is, a single methylation site determined from MeRIP-Seq data can in practice contain multiple RNA methylation residuals, some of which can be regulated by different enzymes and thus differentially methylated between two conditions. Since existing peak-based methods could not effectively differentiate multiple methylation residuals located within a single methylation site, we propose a hidden Markov model (HMM) based approach to address this issue. Specifically, the detected RNA methylation site is further divided into multiple adjacent small bins and then scanned with higher resolution using a hidden Markov model to model the dependency between spatially adjacent bins for improved accuracy. We tested the proposed algorithm on both simulated data and real data. Result suggests that the proposed algorithm clearly outperforms existing peak-based approach on simulated systems and detects differential methylation regions with higher statistical significance on real dataset.

  1. Uncovering the Math Curriculum

    Science.gov (United States)

    Burns, Marilyn

    2014-01-01

    Teachers often express to Marulyn Burns their worry about the need to "cover the curriculum." In response, she draws on one of her favorite quotes: "You don't want to cover a subject; you want to uncover it." This quote is from "The Having of Wonderful Ideas and Other Essays on Teaching and Learning" by Eleanor…

  2. A hidden Markov model for decoding and the analysis of replay in spike trains.

    Science.gov (United States)

    Box, Marc; Jones, Matt W; Whiteley, Nick

    2016-12-01

    We present a hidden Markov model that describes variation in an animal's position associated with varying levels of activity in action potential spike trains of individual place cell neurons. The model incorporates a coarse-graining of position, which we find to be a more parsimonious description of the system than other models. We use a sequential Monte Carlo algorithm for Bayesian inference of model parameters, including the state space dimension, and we explain how to estimate position from spike train observations (decoding). We obtain greater accuracy over other methods in the conditions of high temporal resolution and small neuronal sample size. We also present a novel, model-based approach to the study of replay: the expression of spike train activity related to behaviour during times of motionlessness or sleep, thought to be integral to the consolidation of long-term memories. We demonstrate how we can detect the time, information content and compression rate of replay events in simulated and real hippocampal data recorded from rats in two different environments, and verify the correlation between the times of detected replay events and of sharp wave/ripples in the local field potential.

  3. HIDDEN MARKOV MODELS WITH COVARIATES FOR ANALYSIS OF DEFECTIVE INDUSTRIAL MACHINE PARTS

    Directory of Open Access Journals (Sweden)

    Pornpit Sirima

    2014-01-01

    Full Text Available Monthly counts of industrial machine part errors are modeled using a two-state Hidden Markov Model (HMM in order to describe the effect of machine part error correction and the amount of time spent on the error correction on the likelihood of the machine part to be in a “defective” or “non-defective” state. The number of machine parts errors were collected from a thermo plastic injection molding machine in a car bumper auto parts manufacturer in Liberec city, Czech Republic from January 2012 to November 2012. A Bayesian method is used for parameter estimation. The results of this study indicate that the machine part error correction and the amount of time spent on the error correction do not improve the machine part status of the individual part, but there is a very strong month-to-month dependence of the machine part states. Using the Mean Absolute Error (MAE criterion, the performance of the proposed model (MAE = 1.62 and the HMM including machine part error correction only (MAE = 1.68, from our previous study, is not significantly different. However, the proposed model has more advantage in the fact that the machine part state can be explained by both the machine part error correction and the amount of time spent on the error correction.

  4. Qualitative Analysis of Hidden Components of Pesticides%浅谈农药隐性成分的定性分析

    Institute of Scientific and Technical Information of China (English)

    毕富春; 吴国旭

    2015-01-01

    This paper introduced some methods for the analysis of the hidden components of pesticides. The liquid chromatography with high performance and the gas chromatography were used, and 8 analysis examples were offered here. The combination of the analysis of hidden components of pesticides with the experienced users of pesticides could greatly reduce the scope of analysis.%介绍某些农药隐性成分的分析方法。剖析时主要使用高效液相色谱仪和气相色谱仪,并给出8个剖析实例。农药隐性成分剖析应和使用农药经验丰富者相结合,这样可大大缩小分析范围。

  5. Parsimonious higher-order hidden Markov models for improved array-CGH analysis with applications to Arabidopsis thaliana.

    Directory of Open Access Journals (Sweden)

    Michael Seifert

    2012-01-01

    Full Text Available Array-based comparative genomic hybridization (Array-CGH is an important technology in molecular biology for the detection of DNA copy number polymorphisms between closely related genomes. Hidden Markov Models (HMMs are popular tools for the analysis of Array-CGH data, but current methods are only based on first-order HMMs having constrained abilities to model spatial dependencies between measurements of closely adjacent chromosomal regions. Here, we develop parsimonious higher-order HMMs enabling the interpolation between a mixture model ignoring spatial dependencies and a higher-order HMM exhaustively modeling spatial dependencies. We apply parsimonious higher-order HMMs to the analysis of Array-CGH data of the accessions C24 and Col-0 of the model plant Arabidopsis thaliana. We compare these models against first-order HMMs and other existing methods using a reference of known deletions and sequence deviations. We find that parsimonious higher-order HMMs clearly improve the identification of these polymorphisms. Moreover, we perform a functional analysis of identified polymorphisms revealing novel details of genomic differences between C24 and Col-0. Additional model evaluations are done on widely considered Array-CGH data of human cell lines indicating that parsimonious HMMs are also well-suited for the analysis of non-plant specific data. All these results indicate that parsimonious higher-order HMMs are useful for Array-CGH analyses. An implementation of parsimonious higher-order HMMs is available as part of the open source Java library Jstacs (www.jstacs.de/index.php/PHHMM.

  6. Parsimonious higher-order hidden Markov models for improved array-CGH analysis with applications to Arabidopsis thaliana.

    Science.gov (United States)

    Seifert, Michael; Gohr, André; Strickert, Marc; Grosse, Ivo

    2012-01-01

    Array-based comparative genomic hybridization (Array-CGH) is an important technology in molecular biology for the detection of DNA copy number polymorphisms between closely related genomes. Hidden Markov Models (HMMs) are popular tools for the analysis of Array-CGH data, but current methods are only based on first-order HMMs having constrained abilities to model spatial dependencies between measurements of closely adjacent chromosomal regions. Here, we develop parsimonious higher-order HMMs enabling the interpolation between a mixture model ignoring spatial dependencies and a higher-order HMM exhaustively modeling spatial dependencies. We apply parsimonious higher-order HMMs to the analysis of Array-CGH data of the accessions C24 and Col-0 of the model plant Arabidopsis thaliana. We compare these models against first-order HMMs and other existing methods using a reference of known deletions and sequence deviations. We find that parsimonious higher-order HMMs clearly improve the identification of these polymorphisms. Moreover, we perform a functional analysis of identified polymorphisms revealing novel details of genomic differences between C24 and Col-0. Additional model evaluations are done on widely considered Array-CGH data of human cell lines indicating that parsimonious HMMs are also well-suited for the analysis of non-plant specific data. All these results indicate that parsimonious higher-order HMMs are useful for Array-CGH analyses. An implementation of parsimonious higher-order HMMs is available as part of the open source Java library Jstacs (www.jstacs.de/index.php/PHHMM).

  7. The effects of motivation on response rate: a hidden semi-Markov model analysis of behavioral dynamics.

    Science.gov (United States)

    Eldar, Eran; Morris, Genela; Niv, Yael

    2011-09-30

    A central goal of neuroscience is to understand how neural dynamics bring about the dynamics of behavior. However, neural and behavioral measures are noisy, requiring averaging over trials and subjects. Unfortunately, averaging can obscure the very dynamics that we are interested in, masking abrupt changes and artificially creating gradual processes. We develop a hidden semi-Markov model for precisely characterizing dynamic processes and their alteration due to experimental manipulations. This method takes advantage of multiple trials and subjects without compromising the information available in individual events within a trial. We apply our model to studying the effects of motivation on response rates, analyzing data from hungry and sated rats trained to press a lever to obtain food rewards on a free-operant schedule. Our method can accurately account for punctate changes in the rate of responding and for sequential dependencies between responses. It is ideal for inferring the statistics of underlying response rates and the probability of switching from one response rate to another. Using the model, we show that hungry rats have more distinct behavioral states that are characterized by high rates of responding and they spend more time in these high-press-rate states. Moreover, hungry rats spend less time in, and have fewer distinct states that are characterized by a lack of responding (Waiting/Eating states). These results demonstrate the utility of our analysis method, and provide a precise quantification of the effects of motivation on response rates.

  8. RNA-Seq and Gene Network Analysis Uncover Activation of an ABA-Dependent Signalosome During the Cork Oak Root Response to Drought

    Science.gov (United States)

    Magalhães, Alexandre P.; Verde, Nuno; Reis, Francisca; Martins, Inês; Costa, Daniela; Lino-Neto, Teresa; Castro, Pedro H.; Tavares, Rui M.; Azevedo, Herlânder

    2016-01-01

    Quercus suber (cork oak) is a West Mediterranean species of key economic interest, being extensively explored for its ability to generate cork. Like other Mediterranean plants, Q. suber is significantly threatened by climatic changes, imposing the need to quickly understand its physiological and molecular adaptability to drought stress imposition. In the present report, we uncovered the differential transcriptome of Q. suber roots exposed to long-term drought, using an RNA-Seq approach. 454-sequencing reads were used to de novo assemble a reference transcriptome, and mapping of reads allowed the identification of 546 differentially expressed unigenes. These were enriched in both effector genes (e.g., LEA, chaperones, transporters) as well as regulatory genes, including transcription factors (TFs) belonging to various different classes, and genes associated with protein turnover. To further extend functional characterization, we identified the orthologs of differentially expressed unigenes in the model species Arabidopsis thaliana, which then allowed us to perform in silico functional inference, including gene network analysis for protein function, protein subcellular localization and gene co-expression, and in silico enrichment analysis for TFs and cis-elements. Results indicated the existence of extensive transcriptional regulatory events, including activation of ABA-responsive genes and ABF-dependent signaling. We were then able to establish that a core ABA-signaling pathway involving PP2C-SnRK2-ABF components was induced in stressed Q. suber roots, identifying a key mechanism in this species’ response to drought. PMID:26793200

  9. RNA-Seq and gene network analysis uncover activation of an ABA-dependent signalosome during the cork oak root response to drought

    Directory of Open Access Journals (Sweden)

    Alexandre Papadopoulos Magalhães

    2016-01-01

    Full Text Available Quercus suber (cork oak is a West Mediterranean species of key economic interest, being extensively explored for its ability to generate cork. Like other Mediterranean plants, Q. suber is significantly threatened by climatic changes, imposing the need to quickly understand its physiological and molecular adaptability to drought stress imposition. In the present report, we uncovered the differential transcriptome of Q. suber roots exposed to long-term drought, using an RNA-Seq approach. 454 sequencing reads were used to de novo assemble a reference transcriptome, and mapping of reads allowed the identification of 546 differentially expressed unigenes. These were enriched in both effector genes (e.g. LEA, chaperones, transporters as well as regulatory genes, including transcription factors (TFs belonging to various different classes, and genes associated with protein turnover. To further extend functional characterization, we identified the orthologs of differentially expressed unigenes in the model species Arabidopsis thaliana, which then allowed us to perform in silico functional inference, including gene network analysis for protein function, protein subcellular localization and gene co-expression, and in silico enrichment analysis for TFs and cis-elements. Results indicated the existence of extensive transcriptional regulatory events, including activation of ABA-responsive genes and ABF-dependent signaling. We were then able to establish that all components of a core ABA-signaling pathway involving PP2C-SnRK2-ABF components was induced in stressed Q. suber roots, identifying a key mechanism in this species’ response to drought.

  10. RNA-Seq and Gene Network Analysis Uncover Activation of an ABA-Dependent Signalosome During the Cork Oak Root Response to Drought.

    Science.gov (United States)

    Magalhães, Alexandre P; Verde, Nuno; Reis, Francisca; Martins, Inês; Costa, Daniela; Lino-Neto, Teresa; Castro, Pedro H; Tavares, Rui M; Azevedo, Herlânder

    2015-01-01

    Quercus suber (cork oak) is a West Mediterranean species of key economic interest, being extensively explored for its ability to generate cork. Like other Mediterranean plants, Q. suber is significantly threatened by climatic changes, imposing the need to quickly understand its physiological and molecular adaptability to drought stress imposition. In the present report, we uncovered the differential transcriptome of Q. suber roots exposed to long-term drought, using an RNA-Seq approach. 454-sequencing reads were used to de novo assemble a reference transcriptome, and mapping of reads allowed the identification of 546 differentially expressed unigenes. These were enriched in both effector genes (e.g., LEA, chaperones, transporters) as well as regulatory genes, including transcription factors (TFs) belonging to various different classes, and genes associated with protein turnover. To further extend functional characterization, we identified the orthologs of differentially expressed unigenes in the model species Arabidopsis thaliana, which then allowed us to perform in silico functional inference, including gene network analysis for protein function, protein subcellular localization and gene co-expression, and in silico enrichment analysis for TFs and cis-elements. Results indicated the existence of extensive transcriptional regulatory events, including activation of ABA-responsive genes and ABF-dependent signaling. We were then able to establish that a core ABA-signaling pathway involving PP2C-SnRK2-ABF components was induced in stressed Q. suber roots, identifying a key mechanism in this species' response to drought.

  11. Climate change adaptation: Uncovering constraints to the use of adaptation strategies among food crop farmers in South-west, Nigeria using principal component analysis (PCA

    Directory of Open Access Journals (Sweden)

    Moradeyo Adebanjo Otitoju

    2016-12-01

    Full Text Available This study focused on the constraints to the use of climate variability/change adaptation strategies in South-west Nigeria. Multistage random technique was employed to select the location and the respondents. Descriptive statistics and principal component analysis (PCA were the analytical tools engaged in this study. The constraints to climate variability and change examined before did not use PCA but generalized factor analysis. Hence, there is need to examine these constraints extensively using PCA. Uncovering the constraints to the use of climate variability/change adaptation strategies among crop framers is important to give a realistic direction in the development of farmer-inclusive climate policies in Nigeria. The PCA result showed that the principal constraints that the farmers faced in climate change adaptation were public, institutional and labour constraint; land, neighbourhood norms and religious beliefs constraint; high cost of inputs, technological and information constraint; farm distance, access to climate information, off-farm job and credit constraint; and poor agricultural programmes and service delivery constraint. These findings pointed out the need for both the government and non-government organizations to intensify efforts on institutional, technological and farmers’ friendly land tenure and information systems as effective measures to guide inclusive climate change adaptation policies and development in South-west Nigeria.

  12. Association of Protein Translation and Extracellular Matrix Gene Sets with Breast Cancer Metastasis: Findings Uncovered on Analysis of Multiple Publicly Available Datasets Using Individual Patient Data Approach.

    Directory of Open Access Journals (Sweden)

    Nilotpal Chowdhury

    Full Text Available Microarray analysis has revolutionized the role of genomic prognostication in breast cancer. However, most studies are single series studies, and suffer from methodological problems. We sought to use a meta-analytic approach in combining multiple publicly available datasets, while correcting for batch effects, to reach a more robust oncogenomic analysis.The aim of the present study was to find gene sets associated with distant metastasis free survival (DMFS in systemically untreated, node-negative breast cancer patients, from publicly available genomic microarray datasets.Four microarray series (having 742 patients were selected after a systematic search and combined. Cox regression for each gene was done for the combined dataset (univariate, as well as multivariate - adjusted for expression of Cell cycle related genes and for the 4 major molecular subtypes. The centre and microarray batch effects were adjusted by including them as random effects variables. The Cox regression coefficients for each analysis were then ranked and subjected to a Gene Set Enrichment Analysis (GSEA.Gene sets representing protein translation were independently negatively associated with metastasis in the Luminal A and Luminal B subtypes, but positively associated with metastasis in Basal tumors. Proteinaceous extracellular matrix (ECM gene set expression was positively associated with metastasis, after adjustment for expression of cell cycle related genes on the combined dataset. Finally, the positive association of the proliferation-related genes with metastases was confirmed.To the best of our knowledge, the results depicting mixed prognostic significance of protein translation in breast cancer subtypes are being reported for the first time. We attribute this to our study combining multiple series and performing a more robust meta-analytic Cox regression modeling on the combined dataset, thus discovering 'hidden' associations. This methodology seems to yield new and

  13. Structural and Phylogenetic Analysis of Rhodobacter capsulatus NifF: Uncovering General Features of Nitrogen-fixation (nif)-Flavodoxins

    OpenAIRE

    Inmaculada Pérez-Dorado; Ana Bortolotti; Néstor Cortez; Hermoso, Juan A.

    2013-01-01

    Analysis of the crystal structure of NifF from Rhodobacter capsulatus and its homologues reported so far reflects the existence of unique structural features in nif flavodoxins: a leucine at the re face of the isoalloxazine, an eight-residue insertion at the C-terminus of the 50’s loop and a remarkable difference in the electrostatic potential surface with respect to non-nif flavodoxins. A phylogenetic study on 64 sequences from 52 bacterial species revealed four clusters, including...

  14. Cochlear neuropathy in human presbycusis: Confocal analysis of hidden hearing loss in post-mortem tissue.

    Science.gov (United States)

    Viana, Lucas M; O'Malley, Jennifer T; Burgess, Barbara J; Jones, Dianne D; Oliveira, Carlos A C P; Santos, Felipe; Merchant, Saumil N; Liberman, Leslie D; Liberman, M Charles

    2015-09-01

    Recent animal work has suggested that cochlear synapses are more vulnerable than hair cells in both noise-induced and age-related hearing loss. This synaptopathy is invisible in conventional histopathological analysis, because cochlear nerve cell bodies in the spiral ganglion survive for years, and synaptic analysis requires special immunostaining or serial-section electron microscopy. Here, we show that the same quadruple-immunostaining protocols that allow synaptic counts, hair cell counts, neuronal counts and differentiation of afferent and efferent fibers in mouse can be applied to human temporal bones, when harvested within 9 h post-mortem and prepared as dissected whole mounts of the sensory epithelium and osseous spiral lamina. Quantitative analysis of five "normal" ears, aged 54-89 yrs, without any history of otologic disease, suggests that cochlear synaptopathy and the degeneration of cochlear nerve peripheral axons, despite a near-normal hair cell population, may be an important component of human presbycusis. Although primary cochlear nerve degeneration is not expected to affect audiometric thresholds, it may be key to problems with hearing in noise that are characteristic of declining hearing abilities in the aging ear.

  15. Structural and phylogenetic analysis of Rhodobacter capsulatus NifF: uncovering general features of nitrogen-fixation (nif)-flavodoxins.

    Science.gov (United States)

    Pérez-Dorado, Inmaculada; Bortolotti, Ana; Cortez, Néstor; Hermoso, Juan A

    2013-01-09

    Analysis of the crystal structure of NifF from Rhodobacter capsulatus and its homologues reported so far reflects the existence of unique structural features in nif flavodoxins: a leucine at the re face of the isoalloxazine, an eight-residue insertion at the C-terminus of the 50's loop and a remarkable difference in the electrostatic potential surface with respect to non-nif flavodoxins. A phylogenetic study on 64 sequences from 52 bacterial species revealed four clusters, including different functional prototypes, correlating the previously defined as "short-chain" with the firmicutes flavodoxins and the "long-chain" with gram-negative species. The comparison of Rhodobacter NifF structure with other bacterial flavodoxin prototypes discloses the concurrence of specific features of these functional electron donors to nitrogenase.

  16. Structural and Phylogenetic Analysis of Rhodobacter capsulatus NifF: Uncovering General Features of Nitrogen-fixation (nif-Flavodoxins

    Directory of Open Access Journals (Sweden)

    Inmaculada Pérez-Dorado

    2013-01-01

    Full Text Available Analysis of the crystal structure of NifF from Rhodobacter capsulatus and its homologues reported so far reflects the existence of unique structural features in nif flavodoxins: a leucine at the re face of the isoalloxazine, an eight-residue insertion at the C-terminus of the 50’s loop and a remarkable difference in the electrostatic potential surface with respect to non-nif flavodoxins. A phylogenetic study on 64 sequences from 52 bacterial species revealed four clusters, including different functional prototypes, correlating the previously defined as “short-chain” with the firmicutes flavodoxins and the “long-chain” with gram-negative species. The comparison of Rhodobacter NifF structure with other bacterial flavodoxin prototypes discloses the concurrence of specific features of these functional electron donors to nitrogenase.

  17. Using Co-Expression Analysis and Stress-Based Screens to Uncover Arabidopsis Peroxisomal Proteins Involved in Drought Response.

    Directory of Open Access Journals (Sweden)

    Jiying Li

    Full Text Available Peroxisomes are essential organelles that house a wide array of metabolic reactions important for plant growth and development. However, our knowledge regarding the role of peroxisomal proteins in various biological processes, including plant stress response, is still incomplete. Recent proteomic studies of plant peroxisomes significantly increased the number of known peroxisomal proteins and greatly facilitated the study of peroxisomes at the systems level. The objectives of this study were to determine whether genes that encode peroxisomal proteins with related functions are co-expressed in Arabidopsis and identify peroxisomal proteins involved in stress response using in silico analysis and mutant screens. Using microarray data from online databases, we performed hierarchical clustering analysis to generate a comprehensive view of transcript level changes for Arabidopsis peroxisomal genes during development and under abiotic and biotic stress conditions. Many genes involved in the same metabolic pathways exhibited co-expression, some genes known to be involved in stress response are regulated by the corresponding stress conditions, and function of some peroxisomal proteins could be predicted based on their co-expression pattern. Since drought caused expression changes to the highest number of genes that encode peroxisomal proteins, we subjected a subset of Arabidopsis peroxisomal mutants to a drought stress assay. Mutants of the LON2 protease and the photorespiratory enzyme hydroxypyruvate reductase 1 (HPR1 showed enhanced susceptibility to drought, suggesting the involvement of peroxisomal quality control and photorespiration in drought resistance. Our study provided a global view of how genes that encode peroxisomal proteins respond to developmental and environmental cues and began to reveal additional peroxisomal proteins involved in stress response, thus opening up new avenues to investigate the role of peroxisomes in plant adaptation to

  18. Genomic analysis of host - Peste des petits ruminants vaccine viral transcriptome uncovers transcription factors modulating immune regulatory pathways.

    Science.gov (United States)

    Manjunath, Siddappa; Kumar, Gandham Ravi; Mishra, Bishnu Prasad; Mishra, Bina; Sahoo, Aditya Prasad; Joshi, Chaitanya G; Tiwari, Ashok K; Rajak, Kaushal Kishore; Janga, Sarath Chandra

    2015-02-24

    Peste des petits ruminants (PPR), is an acute transboundary viral disease of economic importance, affecting goats and sheep. Mass vaccination programs around the world resulted in the decline of PPR outbreaks. Sungri 96 is a live attenuated vaccine, widely used in Northern India against PPR. This vaccine virus, isolated from goat works efficiently both in sheep and goat. Global gene expression changes under PPR vaccine virus infection are not yet well defined. Therefore, in this study we investigated the host-vaccine virus interactions by infecting the peripheral blood mononuclear cells isolated from goat with PPRV (Sungri 96 vaccine virus), to quantify the global changes in the transcriptomic signature by RNA-sequencing. Viral genome of Sungri 96 vaccine virus was assembled from the PPRV infected transcriptome confirming the infection and demonstrating the feasibility of building a complete non-host genome from the blood transcriptome. Comparison of infected transcriptome with control transcriptome revealed 985 differentially expressed genes. Functional analysis showed enrichment of immune regulatory pathways under PPRV infection. Key genes involved in immune system regulation, spliceosomal and apoptotic pathways were identified to be dysregulated. Network analysis revealed that the protein - protein interaction network among differentially expressed genes is significantly disrupted in infected state. Several genes encoding TFs that govern immune regulatory pathways were identified to co-regulate the differentially expressed genes. These data provide insights into the host - PPRV vaccine virus interactome for the first time. Our findings suggested dysregulation of immune regulatory pathways and genes encoding Transcription Factors (TFs) that govern these pathways in response to viral infection.

  19. Enhancement of hidden structures of early skin fibrosis using polarization degree patterns and Pearson correlation analysis.

    Science.gov (United States)

    Sviridov, Alexander P; Chernomordik, Victor; Hassan, Moinuddin; Boccara, Albert C; Russo, Angelo; Smith, Paul; Gandjbakhche, Amir

    2005-01-01

    The skin of athymic nude mice is irradiated with a single dose of x-ray irradiation that initiated fibrosis. Digital photographs of the irradiated mice are taken by illuminating the mouse skin with linearly polarized probe light of 650 nm. The specific pattern of the surface distribution of the degree of polarization enables the detection of initial skin fibrosis structures that were not visually apparent. Data processing of the raw spatial distributions of the degree of polarization based on Fourier filtering of the high-frequency noise improves subjective perception of the revealed structure in the images. In addition, Pearson correlation analysis provides information about skin structural size and directionality.

  20. Hidden or uninvited? A content analysis of elder LGBT of color literature in gerontology.

    Science.gov (United States)

    Van Sluytman, Laurens G; Torres, Denise

    2014-01-01

    As longevity increases and marginalized communities achieve greater visibility in the United States, a content analysis of 64 articles in social work, health, medicine and nursing, and gerontology/psychology examined the extent to which the literature examines the needs and concerns of lesbian, gay, bisexual, and transgender (LGBT) seniors of color (SOC). We found recognition of the distinct cultural needs of sexual orientation and gender minorities. However the distinctive needs of LGBT SOC remains underexplored and poorly documented. Gerontologists, social workers, policymakers, and advocates must support research that values the experience and multiple vulnerabilities of LGBT seniors and questions the structures preventing inclusion and participation.

  1. Whole genomic sequencing of RT98 mitochondria derived from Oryza rufipogon and northern blot analysis to uncover a cytoplasmic male sterility-associated gene.

    Science.gov (United States)

    Igarashi, Keisuke; Kazama, Tomohiko; Motomura, Keiji; Toriyama, Kinya

    2013-02-01

    Cytoplasmic male sterility (CMS) is a maternally inherited trait resulting in the failure to produce functional pollen and is often observed when an alien cytoplasm is transferred into a cultivated species. An RT98A CMS line and an RT98C fertility restorer line were obtained by successive backcrossing between Oryza rufipogon W1109 and Oryza sativa cultivar Taichung 65. To uncover the CMS-associated mitochondrial genes, we determined the complete sequence of the RT98-CMS mitochondrial genome using next-generation pyrosequencing, and searched new open reading frames (orfs) absent in a reported mitochondrial genome of O. sativa Nipponbare. Then, six candidates were selected for the CMS-associated genes based on the criteria in which they were chimeric in structure or encoded a peptide with transmembrane domains. One of the candidates, orf113, showed different transcript sizes between RT98A and RT98C on Northern blot analysis. The orf113 gene was shown to be co-transcribed with atp4 and cox3 encoding ATP synthase F0 subunit 4 and Cyt c oxidase subunit 3, respectively, and their transcripts were distinctly processed in the presence of a fertility restorer gene. Our results indicate that orf113 is a CMS-associated gene of RT98-CMS.

  2. Multiple-locus variable number of tandem repeat analysis (MLVA of Irish verocytotoxigenic Escherichia coli O157 from feedlot cattle: uncovering strain dissemination routes

    Directory of Open Access Journals (Sweden)

    O'Mahony Micheál

    2008-01-01

    Full Text Available Abstract Background The identification of the routes of dissemination of Escherichia coli (E. coli O157 through a cohort of cattle is a critical step to control this pathogen at farm level. The aim of this study was to identify potential routes of dissemination of E. coli O157 using Multiple-Locus Variable number of tandem repeat Analysis (MLVA. Results Thirty-eight environmental and sixteen cattle faecal isolates, which were detected in four adjacent pens over a four-month period were sub-typed. MLVA could separate these isolates into broadly defined clusters consisting of twelve MLVA types. Strain diversity was observed within pens, individual cattle and the environment. Conclusion Application of MLVA is a broadly useful and convenient tool when applied to uncover the dissemination of E. coli O157 in the environment and in supporting improved on-farm management of this important pathogen. These data identified diverse strain types based on amplification of VNTR markers in each case.

  3. Phylogenomic analysis uncovers the evolutionary history of nutrition and infection mode in rice blast fungus and other Magnaporthales.

    Science.gov (United States)

    Luo, Jing; Qiu, Huan; Cai, Guohong; Wagner, Nicole E; Bhattacharya, Debashish; Zhang, Ning

    2015-03-30

    The order Magnaporthales (Ascomycota, Fungi) includes devastating pathogens of cereals, such as the rice blast fungus Pyricularia (Magnaporthe) oryzae, which is a model in host-pathogen interaction studies. Magnaporthales also includes saprotrophic species associated with grass roots and submerged wood. Despite its scientific and economic importance, the phylogenetic position of Magnaporthales within Sordariomycetes and the interrelationships of its constituent taxa, remain controversial. In this study, we generated novel transcriptome data from 21 taxa that represent key Magnaporthales lineages of different infection and nutrition modes and phenotypes. Phylogenomic analysis of >200 conserved genes allowed the reconstruction of a robust Sordariomycetes tree of life that placed the monophyletic group of Magnaporthales sister to Ophiostomatales. Among Magnaporthales, three major clades were recognized: 1) an early diverging clade A comprised of saprotrophs associated with submerged woods; 2) clade B that includes the rice blast fungus and other pathogens that cause blast diseases of monocot plants. These species infect the above-ground tissues of host plants using the penetration structure, appressorium; and 3) clade C comprised primarily of root-associated species that penetrate the root tissue with hyphopodia. The well-supported phylogenies provide a robust framework for elucidating evolution of pathogenesis, nutrition modes, and phenotypic characters in Magnaporthales.

  4. Comprehensive analysis of the gene encoding filaggrin uncovers prevalent and rare mutations in ichthyosis vulgaris and atopic eczema.

    Science.gov (United States)

    Sandilands, Aileen; Terron-Kwiatkowski, Ana; Hull, Peter R; O'Regan, Gráinne M; Clayton, Timothy H; Watson, Rosemarie M; Carrick, Thomas; Evans, Alan T; Liao, Haihui; Zhao, Yiwei; Campbell, Linda E; Schmuth, Matthias; Gruber, Robert; Janecke, Andreas R; Elias, Peter M; van Steensel, Maurice A M; Nagtzaam, Ivo; van Geel, Michel; Steijlen, Peter M; Munro, Colin S; Bradley, Daniel G; Palmer, Colin N A; Smith, Frances J D; McLean, W H Irwin; Irvine, Alan D

    2007-05-01

    We recently reported two common filaggrin (FLG) null mutations that cause ichthyosis vulgaris and predispose to eczema and secondary allergic diseases. We show here that these common European mutations are ancestral variants carried on conserved haplotypes. To facilitate comprehensive analysis of other populations, we report a strategy for full sequencing of this large, highly repetitive gene, and we describe 15 variants, including seven that are prevalent. All the variants are either nonsense or frameshift mutations that, in representative cases, resulted in loss of filaggrin production in the epidermis. In an Irish case-control study, the five most common European mutations showed a strong association with moderate-to-severe childhood eczema (chi2 test: P = 2.12 x 10(-51); Fisher's exact test: heterozygote odds ratio (OR) = 7.44 (95% confidence interval (c.i.) = 4.9-11.3), and homozygote OR = 151 (95% c.i. = 20-1,136)). We found three additional rare null mutations in this case series, suggesting that the genetic architecture of filaggrin-related atopic dermatitis consists of both prevalent and rare risk alleles.

  5. Phylogenetic analysis of eukaryotic NEET proteins uncovers a link between a key gene duplication event and the evolution of vertebrates

    Science.gov (United States)

    Inupakutika, Madhuri A.; Sengupta, Soham; Nechushtai, Rachel; Jennings, Patricia A.; Onuchic, Jose’ N.; Azad, Rajeev K.; Padilla, Pamela; Mittler, Ron

    2017-02-01

    NEET proteins belong to a unique family of iron-sulfur proteins in which the 2Fe-2S cluster is coordinated by a CDGSH domain that is followed by the “NEET” motif. They are involved in the regulation of iron and reactive oxygen metabolism, and have been associated with the progression of diabetes, cancer, aging and neurodegenerative diseases. Despite their important biological functions, the evolution and diversification of eukaryotic NEET proteins are largely unknown. Here we used the three members of the human NEET protein family (CISD1, mitoNEET; CISD2, NAF-1 or Miner 1; and CISD3, Miner2) as our guides to conduct a phylogenetic analysis of eukaryotic NEET proteins and their evolution. Our findings identified the slime mold Dictyostelium discoideum’s CISD proteins as the closest to the ancient archetype of eukaryotic NEET proteins. We further identified CISD3 homologs in fungi that were previously reported not to contain any NEET proteins, and revealed that plants lack homolog(s) of CISD3. Furthermore, our study suggests that the mammalian NEET proteins, mitoNEET (CISD1) and NAF-1 (CISD2), emerged via gene duplication around the origin of vertebrates. Our findings provide new insights into the classification and expansion of the NEET protein family, as well as offer clues to the diverged functions of the human mitoNEET and NAF-1 proteins.

  6. Analysis of gas exchange, stomatal behaviour and micronutrients uncovers dynamic response and adaptation of tomato plants to monochromatic light treatments.

    Science.gov (United States)

    O'Carrigan, Andrew; Babla, Mohammad; Wang, Feifei; Liu, Xiaohui; Mak, Michelle; Thomas, Richard; Bellotti, Bill; Chen, Zhong-Hua

    2014-09-01

    Light spectrum affects the yield and quality of greenhouse tomato, especially over a prolonged period of monochromatic light treatments. Physiological and chemical analysis was employed to investigate the influence of light spectral (blue, green and red) changes on growth, photosynthesis, stomatal behaviour, leaf pigment, and micronutrient levels. We found that plants are less affected under blue light treatment, which was evident by the maintenance of higher A, gs, Tr, and stomatal parameters and significantly lower VPD and Tleaf as compared to those plants grown in green and red light treatments. Green and red light treatments led to significantly larger increase in the accumulation of Fe, B, Zn, and Cu than blue light. Moreover, guard cell length, width, and volume all showed highly significant positive correlations to gs, Tr and negative links to VPD. There was negative impact of monochromatic lights-induced accumulation of Mn, Cu, and Zn on photosynthesis, leaf pigments and plant growth. Furthermore, most of the light-induced significant changes of the physiological traits were partially recovered at the end of experiment. A high degree of morphological and physiological plasticity to blue, green and red light treatments suggested that tomato plants may have developed mechanisms to adapt to the light treatments. Thus, understanding the optimization of light spectrum for photosynthesis and growth is one of the key components for greenhouse tomato production.

  7. Hidden Layers of Hafiz’s Psyche (a new analysis of Hafiz’s poetry based on collective unconscious’ archetypes

    Directory of Open Access Journals (Sweden)

    M Rozatian

    2013-03-01

    Full Text Available There are many words about Hafiz and his poetry, perhaps more than other Persian poets. The reason for this can be sought in his ambiguous poems. Thus, a critic calls him a broad-minded mystic whose poems have mystical implications, whereas another one considers him as a fickle person who changes his opinions every moment. For some critics he is a smart poet who has simply created a literary work without inserting his mindset into it. For this reason, there are a number of paradoxical and even opposite interpretations for most of his verses and it seems that new interpretations are still possible. One reason for the interpretability of his poems is the presence of various characters such as Rend (the libertine, Pire Moghan (the old Magian, Saghi (the cup-bearer, Sufi, Mohtaseb (the reckoner in his Divan for some of which historical equivalents have been presented in several works and some scholars have tried to prove that each of these characters refers to real persons in Hafiz’s epoch or past epochs. Contemplation on the atmosphere of his poetry brings this question to the mind that if it is possible to consider each of these characters as hidden layers of Hafiz’s psyche that his consciousness tries to achieve self-knowledge and Perfection through recognition of such layers and creating balance and harmony between them. Using the idea proposed in analytical psychology about archetypes of collective unconscious, this article tries to find an answer for the mentioned question to achieve a new horizon in the analysis of Hafiz’s poems.

  8. Comparative genomic analysis uncovers 3 novel loci encoding type six secretion systems differentially distributed in Salmonella serotypes

    Directory of Open Access Journals (Sweden)

    Santiviago Carlos A

    2009-08-01

    Full Text Available Abstract Background The recently described Type VI Secretion System (T6SS represents a new paradigm of protein secretion in bacteria. A number of bioinformatic studies have been conducted to identify T6SS gene clusters in the available bacterial genome sequences. According to these studies, Salmonella harbors a unique T6SS encoded in the Salmonella Pathogenicity Island 6 (SPI-6. Since these studies only considered few Salmonella genomes, the present work aimed to identify novel T6SS loci by in silico analysis of every genome sequence of Salmonella available. Results The analysis of sequencing data from 44 completed or in progress Salmonella genome projects allowed the identification of 3 novel T6SS loci. These clusters are located in differentially-distributed genomic islands we designated SPI-19, SPI-20 and SPI-21, respectively. SPI-19 was identified in a subset of S. enterica serotypes including Dublin, Weltevreden, Agona, Gallinarum and Enteritidis. In the later, an internal deletion eliminated most of the island. On the other hand, SPI-20 and SPI-21 were restricted to S. enterica subspecies arizonae (IIIa serotype 62:z4,z23:-. Remarkably, SPI-21 encodes a VgrG protein containing a C-terminal extension similar to S-type pyocins of Pseudomonas aeruginosa. This is not only the first evolved VgrG described in Salmonella, but also the first evolved VgrG including a pyocin domain described so far in the literature. In addition, the data indicate that SPI-6 T6SS is widely distributed in S. enterica and absent in serotypes Enteritidis, Gallinarum, Agona, Javiana, Paratyphi B, Virchow, IIIa 62:z4,z23:- and IIIb 61:1,v:1,5,(7. Interestingly, while some serotypes harbor multiple T6SS (Dublin, Weltvreden and IIIa 62:z4,z23:- others do not encode for any (Enteritidis, Paratyphi B, Javiana, Virchow and IIIb 61:1,v:1,5,(7. Comparative and phylogenetic analyses indicate that the 4 T6SS loci in Salmonella have a distinct evolutionary history. Finally, we

  9. Identification and Analysis of Medicago truncatula Auxin Transporter Gene Families Uncover their Roles in Responses to Sinorhizobium meliloti Infection.

    Science.gov (United States)

    Shen, Chenjia; Yue, Runqing; Bai, Youhuang; Feng, Rong; Sun, Tao; Wang, Xiaofei; Yang, Yanjun; Tie, Shuanggui; Wang, Huizhong

    2015-10-01

    Auxin transport plays a pivotal role in the interaction between legume species and nitrogen-fixing bacteria to form symbioses. Auxin influx carriers auxin resistant 1/like aux 1 (AUX/LAX), efflux carriers pin-formed (PIN) and efflux/conditional P-glycoprotein (PGP/ABCB) are three major protein families participating in auxin polar transport. We used the latest Medicago truncatula genome sequence to characterize and analyze the M. truncatula LAX (MtLAX), M. truncatula PIN (MtPIN) and M. truncatula ABCB (MtABCB) families. Transient expression experiments indicated that three representative auxin transporters (MtLAX3, MtPIN7 and MtABCB1) showed cell plasma membrane localizations. The expression of most MtLAX, MtPIN and MtABCB genes was up-regulated in the roots and was down-regulated in the shoots by Sinorhizobium meliloti infection in the wild type (WT). However, the expression of these genes was down-regulated in both the roots and shoots of an infection-resistant mutant, dmi3. The different expression patterns between the WT and the mutant roots indicated that auxin relocation may be involved in rhizobial infection responses. Furthermore, IAA contents were significantly up-regulated in the shoots and down-regulated in the roots after Sinorhizobium meliloti infection in the WT. Inoculation of roots with rhizobia may reduce the auxin loading from shoots to roots by inhibiting the expression of most auxin transporter genes. However, the rate of change of gene expression and IAA contents in the dmi3 mutant were obviously lower than in the WT. The identification and expression analysis of auxin transporter genes helps us to understand the roles of auxin in the regulation of nodule formation in M. truncatula.

  10. Functional analysis of Arabidopsis immune-related MAPKs uncovers a role for MPK3 as negative regulator of inducible defences

    KAUST Repository

    Frei dit Frey, Nicolas

    2014-06-30

    Background Mitogen-activated protein kinases (MAPKs) are key regulators of immune responses in animals and plants. In Arabidopsis, perception of microbe-associated molecular patterns (MAMPs) activates the MAPKs MPK3, MPK4 and MPK6. Increasing information depicts the molecular events activated by MAMPs in plants, but the specific and cooperative contributions of the MAPKs in these signalling events are largely unclear. Results In this work, we analyse the behaviour of MPK3, MPK4 and MPK6 mutants in early and late immune responses triggered by the MAMP flg22 from bacterial flagellin. A genome-wide transcriptome analysis reveals that 36% of the flg22-upregulated genes and 68% of the flg22-downregulated genes are affected in at least one MAPK mutant. So far MPK4 was considered as a negative regulator of immunity, whereas MPK3 and MPK6 were believed to play partially redundant positive functions in defence. Our work reveals that MPK4 is required for the regulation of approximately 50% of flg22-induced genes and we identify a negative role for MPK3 in regulating defence gene expression, flg22-induced salicylic acid accumulation and disease resistance to Pseudomonas syringae. Among the MAPK-dependent genes, 27% of flg22-upregulated genes and 76% of flg22-downregulated genes require two or three MAPKs for their regulation. The flg22-induced MAPK activities are differentially regulated in MPK3 and MPK6 mutants, both in amplitude and duration, revealing a highly interdependent network. Conclusions These data reveal a new set of distinct functions for MPK3, MPK4 and MPK6 and indicate that the plant immune signalling network is choreographed through the interplay of these three interwoven MAPK pathways.

  11. The Biophysical Characterisation and SAXS Analysis of Human NLRP1 Uncover a New Level of Complexity of NLR Proteins

    Science.gov (United States)

    Martino, Luigi; Holland, Louise; Christodoulou, Evangelos; Kunzelmann, Simone; Esposito, Diego

    2016-01-01

    NOD-like receptors represent an important class of germline-encoded pattern recognition receptors that play key roles in the regulation of inflammatory signalling pathways. They function as danger sensors and initiate inflammatory responses and the production of cytokines. Since NLR malfunction results in chronic inflammation and auto-immune diseases, there is a great interest in understanding how they work on a molecular level. To date, a lot of insight into the biological functions of NLRs is available but biophysical and structural studies have been hampered by the difficulty to produce soluble and stable recombinant NLR proteins. NLRP1 is an inflammasome forming NLR that is believed to be activated by binding to MDP and induces activation of caspase 1. Here, we report the identification of a soluble fragment of NLRP1 that contains the NACHT oligomerization domain and the putative MDP-sensing LRR domain. We describe the biophysical and biochemical characterization of this construct and a SEC-SAXS analysis that allowed the calculation of a low resolution molecular envelope. Our data indicate that the protein is constitutively bound to ATP with a negligible ability to hydrolyse the triphosphate nucleotide and that it adopts a monomeric extended conformation that is reminiscent of the structure adopted by NLRC4 in the inflammasome complex. Furthermore, we show that the presence of MDP is not sufficient to promote self-oligomerization of the NACHT-LRR fragment suggesting that MDP may either bind to regions outside the NACHT-LRR module or that it may not be the natural ligand of NLRP1. Taken together, our data suggest that the NLRP1 mechanism of action differs from that recently reported for other NLRs. PMID:27727326

  12. Can (13)C stable isotope analysis uncover essential amino acid provisioning by termite-associated gut microbes?

    Science.gov (United States)

    Ayayee, Paul A; Jones, Susan C; Sabree, Zakee L

    2015-01-01

    Gut-associated microbes of insects are postulated to provide a variety of nutritional functions including provisioning essential amino acids (EAAs). Demonstrations of EAA provisioning in insect-gut microbial systems, nonetheless, are scant. In this study, we investigated whether the eastern subterranean termite Reticulitermes flavipes sourced EAAs from its gut-associated microbiota. δ (13)CEAA data from termite carcass, termite gut filtrate and dietary (wood) samples were determined following (13)C stable isotope analysis. Termite carcass samples (-27.0 ± 0.4‰, mean ± s.e.) were significantly different from termite gut filtrate samples (-27.53 ± 0.5‰), but not the wood diet (-26.0 ± 0.5‰) (F (2,64) = 6, P gut-associated bacteria and fungi, respectively as potential major and minor sources of EAAs in both termite carcass and gut filtrate samples, based on δ (13)CEAA data of four and three EAAs from representative bacteria, fungi and plant data. The wood diet, however, was classified as fungal rather than plant in origin by the model. This is attributed to fungal infestation of the wood diet in the termite colony. This lowers the confidence with which gut microbes (bacteria and fungi) can be attributed with being the source of EAA input to the termite host. Despite this limitation, this study provides tentative data in support of hypothesized EAA provisioning by gut microbes, and also a baseline/framework upon which further work can be carried out to definitively verify this function.

  13. Analysis of the transcriptome of Panax notoginseng root uncovers putative triterpene saponin-biosynthetic genes and genetic markers

    Directory of Open Access Journals (Sweden)

    Luo Hongmei

    2011-12-01

    Full Text Available Abstract Background Panax notoginseng (Burk F.H. Chen is important medicinal plant of the Araliacease family. Triterpene saponins are the bioactive constituents in P. notoginseng. However, available genomic information regarding this plant is limited. Moreover, details of triterpene saponin biosynthesis in the Panax species are largely unknown. Results Using the 454 pyrosequencing technology, a one-quarter GS FLX titanium run resulted in 188,185 reads with an average length of 410 bases for P. notoginseng root. These reads were processed and assembled by 454 GS De Novo Assembler software into 30,852 unique sequences. A total of 70.2% of unique sequences were annotated by Basic Local Alignment Search Tool (BLAST similarity searches against public sequence databases. The Kyoto Encyclopedia of Genes and Genomes (KEGG assignment discovered 41 unique sequences representing 11 genes involved in triterpene saponin backbone biosynthesis in the 454-EST dataset. In particular, the transcript encoding dammarenediol synthase (DS, which is the first committed enzyme in the biosynthetic pathway of major triterpene saponins, is highly expressed in the root of four-year-old P. notoginseng. It is worth emphasizing that the candidate cytochrome P450 (Pn02132 and Pn00158 and UDP-glycosyltransferase (Pn00082 gene most likely to be involved in hydroxylation or glycosylation of aglycones for triterpene saponin biosynthesis were discovered from 174 cytochrome P450s and 242 glycosyltransferases by phylogenetic analysis, respectively. Putative transcription factors were detected in 906 unique sequences, including Myb, homeobox, WRKY, basic helix-loop-helix (bHLH, and other family proteins. Additionally, a total of 2,772 simple sequence repeat (SSR were identified from 2,361 unique sequences, of which, di-nucleotide motifs were the most abundant motif. Conclusion This study is the first to present a large-scale EST dataset for P. notoginseng root acquired by next

  14. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  15. Consolidity: Mystery of inner property of systems uncovered

    Directory of Open Access Journals (Sweden)

    Hassen T. Dorrah

    2012-10-01

    Full Text Available This paper uncovers the mystery of consolidity, an inner property of systems that was amazingly hidden. Consolidity also reveals the secrecy of why strong stable and highly controllable systems are not invulnerable of falling and collapsing. Consolidity is measured by its Consolidity Index, defined as the ratio of overall changes of output parameters over combined changes of input and system parameters, all operating in fully fuzzy environment. Under this notion, systems are classified into consolidated, quasi-consolidated, neutrally consolidated, unconsolidated, quasi-unconsolidated and mixed types. The strategy for the implementation of consolidity is elaborated for both natural and man-made existing systems as well as the new developed ones. An important critique arises that the by-product consolidity of natural or built-as-usual system could lead to trapping such systems into a completely undesired unconsolidity. This suggests that the ample number of conventional techniques that do not take system consolidity into account should gradually be changed, and adjusted with improved consolidity-based techniques. Four Golden Rules are highlighted for handling system consolidity, and applied to several illustrative case studies. These case studies cover the consolidity analysis of the Drug Concentration problem, Predator-Prey Population problem, Spread of Infectious Disease problem, AIDS Epidemic problem and Arm Race model. It is demonstrated that consolidity changes are contrary (opposite in sign to changes of both stability and controllability. This is a very significant result showing that our present practice of stressing on building strong stable and highly controllable systems could have already jeopardized the consolidity behavior of an ample family of existing real life systems. It is strongly recommended that the four Golden Rules of consolidity should be enforced as future strict regulations of systems modeling, analysis, design and

  16. Analysis of secretome changes uncovers an autocrine/paracrine component in the modulation of cell proliferation and motility by c-Myc.

    Science.gov (United States)

    Pocsfalvi, Gabriella; Votta, Giuseppina; De Vincenzo, Anna; Fiume, Immacolata; Raj, Delfin Albert Amal; Marra, Giancarlo; Stoppelli, Maria Patrizia; Iaccarino, Ingram

    2011-12-02

    Proteins secreted by cancer cells are a major component of tumor microenvironment. However, little is known on the impact of single oncogenic lesions on the expression of secreted proteins at early stages of tumor development. Because c-Myc overexpression is among the most frequent alterations in cancer, here we investigated the effect of sustained c-Myc expression on the secretome of a nontransformed human epithelial cell line (hT-RPE). By using a quantitative proteomic approach, we have identified 125 proteins in conditioned media of hT-RPE/MycER cells upon c-Myc induction. Analysis of the 49 proteins significantly down-regulated by c-Myc revealed a marked enrichment of factors associated with growth inhibition and cellular senescence. Accordingly, media conditioned by hT-RPE cells expressing c-Myc show an increased ability to sustain hT-RPE cellular proliferation/viability. We also find a marked down-regulation of several structural and regulatory components of the extracellular matrix (ECM), which correlates with an increased chemotactic potency of the conditioned media toward fibroblasts, a major cellular component of tumor stroma. In accordance with these data, the expression of the majority of the genes encoding proteins down-regulated in hT-RPE was significantly reduced also in colorectal adenomatous polyps, early tumors in which c-Myc is invariably overexpressed. These findings help to elucidate the significance of c-Myc overexpression at early stages of tumor development and uncover a remarkable autocrine/paracrine component in the ability of c-Myc to stimulate proliferation, sustain tumor maintenance, and modulate cell migration.

  17. Carotta: Revealing Hidden Confounder Markers in Metabolic Breath Profiles

    Directory of Open Access Journals (Sweden)

    Anne-Christin Hauschild

    2015-06-01

    Full Text Available Computational breath analysis is a growing research area aiming at identifying volatile organic compounds (VOCs in human breath to assist medical diagnostics of the next generation. While inexpensive and non-invasive bioanalytical technologies for metabolite detection in exhaled air and bacterial/fungal vapor exist and the first studies on the power of supervised machine learning methods for profiling of the resulting data were conducted, we lack methods to extract hidden data features emerging from confounding factors. Here, we present Carotta, a new cluster analysis framework dedicated to uncovering such hidden substructures by sophisticated unsupervised statistical learning methods. We study the power of transitivity clustering and hierarchical clustering to identify groups of VOCs with similar expression behavior over most patient breath samples and/or groups of patients with a similar VOC intensity pattern. This enables the discovery of dependencies between metabolites. On the one hand, this allows us to eliminate the effect of potential confounding factors hindering disease classification, such as smoking. On the other hand, we may also identify VOCs associated with disease subtypes or concomitant diseases. Carotta is an open source software with an intuitive graphical user interface promoting data handling, analysis and visualization. The back-end is designed to be modular, allowing for easy extensions with plugins in the future, such as new clustering methods and statistics. It does not require much prior knowledge or technical skills to operate. We demonstrate its power and applicability by means of one artificial dataset. We also apply Carotta exemplarily to a real-world example dataset on chronic obstructive pulmonary disease (COPD. While the artificial data are utilized as a proof of concept, we will demonstrate how Carotta finds candidate markers in our real dataset associated with confounders rather than the primary disease (COPD

  18. Entanglement without hidden nonlocality

    Science.gov (United States)

    Hirsch, Flavien; Túlio Quintino, Marco; Bowles, Joseph; Vértesi, Tamás; Brunner, Nicolas

    2016-11-01

    We consider Bell tests in which the distant observers can perform local filtering before testing a Bell inequality. Notably, in this setup, certain entangled states admitting a local hidden variable model in the standard Bell scenario can nevertheless violate a Bell inequality after filtering, displaying so-called hidden nonlocality. Here we ask whether all entangled states can violate a Bell inequality after well-chosen local filtering. We answer this question in the negative by showing that there exist entangled states without hidden nonlocality. Specifically, we prove that some two-qubit Werner states still admit a local hidden variable model after any possible local filtering on a single copy of the state.

  19. 隐性课程的概念探析%Analysis of The Concept of Hidden Curriculum

    Institute of Scientific and Technical Information of China (English)

    孟二萍

    2011-01-01

    The hidden curriculum is after in the 1960 of the 20th century,gradually causing a world-wide education topics of interest.Although its history is not long,but soon caused great interest of many experts and scholars.This article from the perspective of curriculum theory,the predecessors of research results on the basis of learning and reference,the concept of hidden curriculum has been defined.%隐性课程是20世纪60年代以后,逐渐引起世界范围关注的教育课题。我国对其研究历史不长,但很快引起众多专家学者的极大兴趣。从课程理论的视角,在对前人研究成果的学习和借鉴基础上,隐性课程可界定为,教育者为了实现教育目标,在课堂内外的教育情景中,有计划地以间接、内隐的方式,通过受教育者无意识的非特定心理反应,使受教育者获得知情意行等整体性教育经验的那些内容和要素的总和。

  20. Uncovering Earth's virome.

    Science.gov (United States)

    Paez-Espino, David; Eloe-Fadrosh, Emiley A; Pavlopoulos, Georgios A; Thomas, Alex D; Huntemann, Marcel; Mikhailova, Natalia; Rubin, Edward; Ivanova, Natalia N; Kyrpides, Nikos C

    2016-08-25

    Viruses are the most abundant biological entities on Earth, but challenges in detecting, isolating, and classifying unknown viruses have prevented exhaustive surveys of the global virome. Here we analysed over 5 Tb of metagenomic sequence data from 3,042 geographically diverse samples to assess the global distribution, phylogenetic diversity, and host specificity of viruses. We discovered over 125,000 partial DNA viral genomes, including the largest phage yet identified, and increased the number of known viral genes by 16-fold. Half of the predicted partial viral genomes were clustered into genetically distinct groups, most of which included genes unrelated to those in known viruses. Using CRISPR spacers and transfer RNA matches to link viral groups to microbial host(s), we doubled the number of microbial phyla known to be infected by viruses, and identified viruses that can infect organisms from different phyla. Analysis of viral distribution across diverse ecosystems revealed strong habitat-type specificity for the vast majority of viruses, but also identified some cosmopolitan groups. Our results highlight an extensive global viral diversity and provide detailed insight into viral habitat distribution and host–virus interactions.

  1. Hidden circuits and argumentation

    Science.gov (United States)

    Leinonen, Risto; Kesonen, Mikko H. P.; Hirvonen, Pekka E.

    2016-11-01

    Despite the relevance of DC circuits in everyday life and schools, they have been shown to cause numerous learning difficulties at various school levels. In the course of this article, we present a flexible method for teaching DC circuits at lower secondary level. The method is labelled as hidden circuits, and the essential idea underlying hidden circuits is in hiding the actual wiring of DC circuits, but to make their behaviour evident for pupils. Pupils are expected to find out the wiring of the circuit which should enhance their learning of DC circuits. We present two possible ways to utilise hidden circuits in a classroom. First, they can be used to test and enhance pupils’ conceptual understanding when pupils are expected to find out which one of the offered circuit diagram options corresponds to the actual circuit shown. This method aims to get pupils to evaluate the circuits holistically rather than locally, and as a part of that aim this method highlights any learning difficulties of pupils. Second, hidden circuits can be used to enhance pupils’ argumentation skills with the aid of argumentation sheet that illustrates the main elements of an argument. Based on the findings from our co-operating teachers and our own experiences, hidden circuits offer a flexible and motivating way to supplement teaching of DC circuits.

  2. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  3. Comparative analysis of gene expression: uncovering expression conservation and divergence between Salmonella enterica serovar Typhimurium strains LT2 and 14028S.

    Science.gov (United States)

    Sonego, Paolo; Meysman, Pieter; Moretto, Marco; Viola, Roberto; Laukens, Kris; Cavalieri, Duccio; Engelen, Kristof

    2015-01-01

    Different strains of the same organism can share a large amount of their genetic material, the so called core pangenome. Nevertheless, these species can display different lifestyles and it is still not well known to what extent the core pangenome plays a role in the divergence of lifestyles between the two organisms. Here, we present a procedure for uncovering the conservation and divergence of gene expression by using large expression compendia. We will use data from two Salmonella enterica serovar Typhimurium strains as an example here, strain LT2 and strain 14028S, to assess if there are orthologous gene pairs with different expression domains related in both strains.

  4. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  5. Solar Hidden Photon Search

    CERN Document Server

    Schwarz, Matthias; Redondo, Javier; Ringwald, Andreas; Wiedemann, Guenter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope.

  6. Solar Hidden Photon Search

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Max-Planck-Institut fuer Physik und Astrophysik, Muenchen (Germany)

    2011-11-15

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope. (orig.)

  7. Power System N-k Contingency Analysis in Consideration of Protection Hidden Failure%考虑保护隐藏故障的系统N-k故障分析

    Institute of Scientific and Technical Information of China (English)

    许婧; 白晓民

    2012-01-01

    存在隐藏故障的继电保护会在系统发生N-1故障时,导致保护误动,对连锁故障扩大起着推波助澜的作用。从保护隐藏故障的动作机制出发,计及不同原理的保护装置和线路故障位置,对保护的隐藏故障模式进行分析,确定保护的风险区段,提出一种基于保护隐藏故障模式分析的N-k故障分析方法,将保护的隐藏故障反映到预想事故的选择和故障组合上。算例表明,采用该方法可定量评估电网中继电保护隐藏故障对系统可靠性的影响,发现系统的薄弱环节。%Hidden failure of protection leads to protection misoperation when N-1 contingency occurs in power system, which contributes to the expansion of cascading failure. Based on investigation of hidden failure mechanism, protection hidden failure modes were analyzed and vulnerability zone of protections were identified by consideration of different protective device and different fault location of the first contingency. N-k contingency analysis method based on protection hidden failure modes analysis was proposed, which linked protection hidden failures with contingency screening and false tripping line set identification. A case study shows the effectiveness of the proposed method by assessing effects of relay hidden failures on system reliability.

  8. Hidden attractor in the Rabinovich system, Chua circuits and PLL

    Science.gov (United States)

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Seledzhi, S. M.

    2016-06-01

    In this report the existence of hidden attractors in Rabinovich system, phase-locked loop and coupled Chua circuits is considered. It is shown that the existence of hidden attractors may complicate the analysis of the systems and significantly affect the synchronization.

  9. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  10. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  11. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  12. Human β Cell Transcriptome Analysis Uncovers lncRNAs That Are Tissue-Specific, Dynamically Regulated, and Abnormally Expressed in Type 2 Diabetes

    Science.gov (United States)

    Morán, Ignasi; Akerman, İldem; van de Bunt, Martijn; Xie, Ruiyu; Benazra, Marion; Nammo, Takao; Arnes, Luis; Nakić, Nikolina; García-Hurtado, Javier; Rodríguez-Seguí, Santiago; Pasquali, Lorenzo; Sauty-Colace, Claire; Beucher, Anthony; Scharfmann, Raphael; van Arensbergen, Joris; Johnson, Paul R; Berry, Andrew; Lee, Clarence; Harkins, Timothy; Gmyr, Valery; Pattou, François; Kerr-Conte, Julie; Piemonti, Lorenzo; Berney, Thierry; Hanley, Neil A; Gloyn, Anna L; Sussel, Lori; Langman, Linda; Brayman, Kenneth L; Sander, Maike; McCarthy, Mark I.; Ravassard, Philippe; Ferrer, Jorge

    2012-01-01

    SUMMARY A significant portion of the genome is transcribed as long non-coding RNAs (lncRNAs), several of which are known to control gene expression. The repertoire and regulation of lncRNAs in disease-relevant tissues, however, has not been systematically explored. We report a comprehensive strand-specific transcriptome map of human pancreatic islets and β-cells, and uncover >1100 intergenic and antisense islet-cell lncRNA genes. We find islet lncRNAs that are dynamically regulated, and show that they are an integral component of the β-cell differentiation and maturation program. We sequenced the mouse islet transcriptome, and identify lncRNA orthologs that are regulated like their human counterparts. Depletion of HI-LNC25, a β-cell specific lncRNA, downregulated GLIS3 mRNA, thus exemplifying a gene regulatory function of islet lncRNAs. Finally, selected islet lncRNAs were dysregulated in type 2 diabetes or mapped to genetic loci underlying diabetes susceptibility. These findings reveal a new class of islet-cell genes relevant to β-cell programming and diabetes pathophysiology. PMID:23040067

  13. Hidden variables and hidden time in quantum theory

    OpenAIRE

    Kurakin, Pavel V.

    2005-01-01

    Bell's theorem proves only that hidden variables evolving in true physical time can't exist; still the theorem's meaning is usually interpreted intolerably wide. The concept of hidden time (and, in general, hidden space-time) is introduced. Such concept provides a whole new class of physical theories, fully compatible with current knowledge, but giving new tremendous possibilities. Those theories do not violate Bell's theorem.

  14. The movement age of hidden fault and analysis on width of its effect zone from shallow seismic sounding and drilling data

    Institute of Scientific and Technical Information of China (English)

    杨晓平; 李德庆; 赵成斌; 刘保金; 孙振国; 赵景尧

    2004-01-01

    Field experimental seismic sounding permitted us to obtain optimal shallow seismic reflection sounding parame-ters. In process of data processing, we obtained a high-qualitative shallow seismic reflection sounding profile byusing the techniques such as filtering, edition surgical blanking, prediction deconvolution, fitting static correlationof first arrival time, and velocity analysis. Comprehensive analysis on the information of reflection wave groupsalong the seismic sounding profile and the stratigraphic and neogeochronological data obtained from many drillsnear the sounding line reveals that the upper termination of the detected fault zone is located at depth of 75~80 m,in the Middle Pleistocene deposits dated to be about 220 ka BP. The continuity, discontinuity, increasing and de-creasing amount of reflection wave groups and change of their configurations, in combination with geologicalcolumns of drills, permitted us to know that the width of upper termination of the fault zone is 100 m. It can beinferred from the variation of number of reflection wave groups along the profile that the scarp of hidden fault is200 m wide and the fault is a synsedimentary active fault in the Early Pleistocene and the early stage of MiddlePleistocene. No tectonic movement, which offset the covering deposits, had occurred since the late stage of Middle Pleistocene.

  15. Data mining-based statistical analysis of biological data uncovers hidden significance: clustering Hashimoto's thyroiditis patients based on the response of their PBMC with IL-2 and IFN-γ secretion to stimulation with Hsp60.

    Science.gov (United States)

    Tonello, Lucio; Conway de Macario, Everly; Marino Gammazza, Antonella; Cocchi, Massimo; Gabrielli, Fabio; Zummo, Giovanni; Cappello, Francesco; Macario, Alberto J L

    2015-03-01

    The pathogenesis of Hashimoto's thyroiditis includes autoimmunity involving thyroid antigens, autoantibodies, and possibly cytokines. It is unclear what role plays Hsp60, but our recent data indicate that it may contribute to pathogenesis as an autoantigen. Its role in the induction of cytokine production, pro- or anti-inflammatory, was not elucidated, except that we found that peripheral blood mononucleated cells (PBMC) from patients or from healthy controls did not respond with cytokine production upon stimulation by Hsp60 in vitro with patterns that would differentiate patients from controls with statistical significance. This "negative" outcome appeared when the data were pooled and analyzed with conventional statistical methods. We re-analyzed our data with non-conventional statistical methods based on data mining using the classification and regression tree learning algorithm and clustering methodology. The results indicate that by focusing on IFN-γ and IL-2 levels before and after Hsp60 stimulation of PBMC in each patient, it is possible to differentiate patients from controls. A major general conclusion is that when trying to identify disease markers such as levels of cytokines and Hsp60, reference to standards obtained from pooled data from many patients may be misleading. The chosen biomarker, e.g., production of IFN-γ and IL-2 by PBMC upon stimulation with Hsp60, must be assessed before and after stimulation and the results compared within each patient and analyzed with conventional and data mining statistical methods.

  16. Extraction of hidden information by efficient community detection in networks

    CERN Document Server

    Lee, Juyong; Lee, Jooyoung

    2012-01-01

    Currently, we are overwhelmed by a deluge of experimental data, and network physics has the potential to become an invaluable method to increase our understanding of large interacting datasets. However, this potential is often unrealized for two reasons: uncovering the hidden community structure of a network, known as community detection, is difficult, and further, even if one has an idea of this community structure, it is not a priori obvious how to efficiently use this information. Here, to address both of these issues, we, first, identify optimal community structure of given networks in terms of modularity by utilizing a recently introduced community detection method. Second, we develop an approach to use this community information to extract hidden information from a network. When applied to a protein-protein interaction network, the proposed method outperforms current state-of-the-art methods that use only the local information of a network. The method is generally applicable to networks from many areas.

  17. Determination of hidden hazelnut oil proteins in extra virgin olive oil by cold acetone precipitation followed by in-solution tryptic digestion and MALDI-TOF-MS analysis.

    Science.gov (United States)

    De Ceglie, Cristina; Calvano, Cosima Damiana; Zambonin, Carlo Giorgio

    2014-10-01

    Adulteration of extra-virgin olive oil (EVOO) with hazelnut oil (HO) is an illegal practice that could have severe health consequences for consumers due to the possible exposure to hidden hazelnut allergens. Here, matrix-assisted laser-desorption/ionization (MALDI) mass spectrometry (MS) was used as a rapid and sensitive technique for the detection of a low concentration of hazelnut proteins in oil samples. Different protocols were tested for protein extraction, and the most efficient (cold acetone) was applied to HO and EVOO adulterated with HO. The subsequent in-solution tryptic digestion of protein extracts and MALDI-MS analysis, using α-cyano-4-chlorocinnamic acid as matrix, allowed the detection of stable hazelnut peptide markers (i.e., the m/z ions 1002.52, 1356.71, 1394.70, 1440.81, 1453.85, 1555.76, 1629.83, 1363.73, and 1528.67) attributable to the main hazelnut proteins Cor a 9, Cor a 11, and Cor a 1. Thus, the approach might allow the direct detection of specific hazelnut allergens in EVOO at low concentration without time-consuming pretreatments.

  18. Global analysis of ion dependence unveils hidden steps in DNA binding and bending by integration host factor

    Science.gov (United States)

    Vivas, Paula; Velmurugu, Yogambigai; Kuznetsov, Serguei V.; Rice, Phoebe A.; Ansari, Anjum

    2013-09-01

    Proteins that recognize and bind to specific sites on DNA often distort the DNA at these sites. The rates at which these DNA distortions occur are considered to be important in the ability of these proteins to discriminate between specific and nonspecific sites. These rates have proven difficult to measure for most protein-DNA complexes in part because of the difficulty in separating the kinetics of unimolecular conformational rearrangements (DNA bending and kinking) from the kinetics of bimolecular complex association and dissociation. A notable exception is the Integration Host Factor (IHF), a eubacterial architectural protein involved in chromosomal compaction and DNA recombination, which binds with subnanomolar affinity to specific DNA sites and bends them into sharp U-turns. The unimolecular DNA bending kinetics has been resolved using both stopped-flow and laser temperature-jump perturbation. Here we expand our investigation by presenting a global analysis of the ionic strength dependence of specific binding affinity and relaxation kinetics of an IHF-DNA complex. This analysis enables us to obtain each of the underlying elementary rates (DNA bending/unbending and protein-DNA association/dissociation), and their ionic strength dependence, even under conditions where the two processes are coupled. Our analysis indicates interesting differences in the ionic strength dependence of the bi- versus unimolecular steps. At moderate [KCl] (100-500 mM), nearly all the ionic strength dependence to the overall equilibrium binding affinity appears in the bimolecular association/dissociation of an initial, presumably weakly bent, encounter complex, with a slope SKbi ≈ 8 describing the loglog-dependence of the equilibrium constant to form this complex on [KCl]. In contrast, the unimolecular equilibrium constant to form the fully wrapped specific complex from the initial complex is nearly independent of [KCl], with SKuni water molecules, which is osmotically favored by

  19. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  20. Extracting hidden trails and roads under canopy using LIDAR

    OpenAIRE

    Krougios, Prokopios

    2008-01-01

    The field of Remote Sensing has been greatly benefited by the development of LIDAR. The extraction of bare earth under tree canopies and especially the identification of hidden trails are important tools for military and civilian operations in dense forests. LIDAR data from Sequoia National Park in California (2008) and Fort Belvoir Military Base in Virginia (2007) were two areas that were selected for analysis. Quick Terrain Modeler software was used in order to recognize hidden trails....

  1. Genome-wide transcriptional profiling and metabolic analysis uncover multiple molecular responses of the grass species Lolium perenne under low-intensity xenobiotic stress

    Directory of Open Access Journals (Sweden)

    Anne-Antonella eSerra

    2015-12-01

    Full Text Available Lolium perenne, which is a major component of pastures, lawns, and grass strips, can be exposed to xenobiotic stresses due to diffuse and residual contaminations of soil. L. perenne was recently shown to undergo metabolic adjustments in response to sub-toxic levels of xenobiotics. To gain insight in such chemical stress responses, a de novo transcriptome analysis was carried out on leaves from plants subjected at the root level to low levels of xenobiotics, glyphosate, tebuconazole, and a combination of the two, leading to no adverse physiological effect. Chemical treatments influenced significantly the relative proportions of functional categories and of transcripts related to carbohydrate processes, to signalling, to protein-kinase cascades, as Serine/Threonine-protein kinases, to transcriptional regulations, to responses to abiotic or biotic stimuli and to responses to phytohormones. Transcriptomics-based expressions of genes encoding different types of SNF1 (sucrose non-fermenting 1-related kinases involved in sugar and stress signalling or encoding key metabolic enzymes were in line with specific qRT-PCR analysis or with the important metabolic and regulatory changes revealed by metabolomic analysis. The effects of pesticide treatments on metabolites and gene expression strongly suggest that pesticides at low levels, as single molecule or as mixture, affect cell signalling and functioning even in the absence of major physiological impact. This global analysis of L. perenne therefore highlighted the interactions between molecular regulation of responses to xenobiotics, and also carbohydrate dynamics, energy dysfunction, phytohormones and calcium signalling.

  2. The invisible Web uncovering information sources search engines can't see

    CERN Document Server

    Sherman, Chris

    2001-01-01

    Enormous expanses of the Internet are unreachable with standard web search engines. This book provides the key to finding these hidden resources by identifying how to uncover and use invisible web resources. Mapping the invisible Web, when and how to use it, assessing the validity of the information, and the future of Web searching are topics covered in detail. Only 16 percent of Net-based information can be located using a general search engine. The other 84 percent is what is referred to as the invisible Web-made up of information stored in databases. Unlike pages on the visible Web, informa

  3. #fitspo on Instagram: A mixed-methods approach using Netlytic and photo analysis, uncovering the online discussion and author/image characteristics.

    Science.gov (United States)

    Santarossa, Sara; Coyne, Paige; Lisinski, Carly; Woodruff, Sarah J

    2016-11-15

    The #fitspo 'tag' is a recent trend on Instagram, which is used on posts to motivate others towards a healthy lifestyle through exercise/eating habits. This study used a mixed-methods approach consisting of text and network analysis via the Netlytic program (N = 10,000 #fitspo posts), and content analysis of #fitspo images (N = 122) was used to examine author and image characteristics. Results suggest that #fitspo posts may motivate through appearance-mediated themes, as the largest content categories (based on the associated text) were 'feeling good' and 'appearance'. Furthermore, #fitspo posts may create peer influence/support as personal (opposed to non-personal) accounts were associated with higher popularity of images (i.e. number of likes/followers). Finally, most images contained posed individuals with some degree of objectification.

  4. Uncovering the Hidden Histories: Black and Asian People in the Two World Wars

    Science.gov (United States)

    Gaze, Rupert

    2005-01-01

    The stories we tell in history are often stories about ourselves. This can lead to tremendous distortion. Rupert Gaze was shocked when a young black student told him that there was no point in his studying the Second World War because it had nothing to do with him or his family. While Gaze has worked for the Imperial War Museum (IWM) North, it has…

  5. A dynamical network approach to uncovering hidden causality relationships in collective neuron firings

    CERN Document Server

    Ruszczycki, Bła\\ zej; Johnson, Neil F

    2009-01-01

    We analyze the synchronous firings of the salamander ganglion cells from the perspective of the complex network viewpoint where the network's links reflect the correlated behavior of firings. We study the time-aggregated properties of the resulting network focusing on its topological features. The behavior of pairwise correlations has been inspected in order to construct an appropriate measure that will serve as a weight of network connection.

  6. How to Show One-Fourth? Uncovering Hidden Context through Reciprocal Learning

    Science.gov (United States)

    Abramovich, S.; Brouwer, P.

    2007-01-01

    This paper suggests that mathematics teacher educators should listen carefully to what their students are saying. More specifically, it demonstrates how from one pre-teacher's non-traditional geometric representation of a unit fraction, a variety of learning environments that lead to the enrichment of mathematics for teaching can be developed. The…

  7. Self-Efficacy Beliefs and Mental Time Travel Ability: Uncovering a Hidden Relationship in Educational Settings

    Science.gov (United States)

    Eren, Altay

    2009-01-01

    The aim of this study was threefold: first, it was to explore the profiles of student teachers' mental time travel ability; second, it was to examine the relationship between student teachers' mental time travel ability and self-efficacy beliefs; and third, it was to investigate the role of self-efficacy beliefs in relationship between the past…

  8. Uncovering Hidden Dimensions of Australian Early Childhood Policy History: Insights from Interviews with Policy "Elites"

    Science.gov (United States)

    Logan, Helen; Sumsion, Jennifer; Press, Frances

    2014-01-01

    This article considers the value of elite interviews as a frequently overlooked methodology in investigations of policymaking in early childhood education and care (ECEC). We contextualise the discussion within a study that examines constructions of quality in Australian ECEC policymaking between 1972 and 2009. We conclude that, despite their…

  9. Uncovering the Hidden Structure of Platoons: Formal and Emergent Leaders’ Perceptions of Organizational Networks

    Science.gov (United States)

    2008-12-01

    tested by calculating the Quadratic Assignment Procedure ( QAP ) correlation between leadership ratings and advice network ties as well as the QAP ...correlation between leadership ratings and friendship network ties, in each of the three infantry platoons. QAP correlations (Hubert & Schultz, 1976...inflated estimates of statistical significance if ordinary least squares (OLS) regression is used. The QAP technique is designed to provide unbiased

  10. Mitochondrial D-loop analysis for uncovering the population structure and genetic diversity among the indigenous duck (Anas platyrhynchos) populations of India.

    Science.gov (United States)

    Gaur, Uma; Tantia, Madhu Sudan; Mishra, Bina; Bharani Kumar, Settypalli Tirumala; Vijh, Ramesh Kumar; Chaudhury, Ashok

    2017-01-24

    The indigenous domestic duck (Anas platyrhynchos domestica) which is domesticated from Mallard (Anas platyrhynchos) contributes significantly to poor farming community in coastal and North Eastern regions of India. For conservation and maintenance of indigenous duck populations it is very important to know the existing genetic diversity and population structure. To unravel the population structure and genetic diversity among the five indigenous duck populations of India, the mitochondrial D-loop sequences of 120 ducks were analyzed. The sequence analysis by comparison of mtDNA D-loop region (470 bp) of five Indian duck populations revealed 25 mitochondrial haplotypes. Pairwise FST value among populations was 0.4243 (p populations was 0.00034-0.00555, and the net divergence (Da) was 0-0.00355. The phylogenetic analysis in the present study unveiled three clades. The analysis revealed genetic continuity among ducks of coastal region of the country which formed a separate group from the ducks of the inland area. Both coastal as well as the land birds revealed introgression of the out group breed Khaki Campbell, which is used for breed improvement programs in India. The observations revealed very less selection and a single matrilineal lineage of indigenous domestic ducks.

  11. Putative Vitis vinifera Rop- and Rab-GAP-, GEF-, and GDI-interacting proteins uncovered with novel methods for public genomic and EST database analysis.

    Science.gov (United States)

    Abbal, Philippe; Tesniere, Catherine

    2010-01-01

    To understand how grapevine Rop and Rab proteins achieve their functional versatility in signalling, identification of the putative VvRop- and VvRab-interacting proteins was performed using newly designed tools. In this study, sequences encoding eight full-length proteins for VvRop GTPase-activating proteins (GAPs), five for VvRabGAPs, six for VvRop guanine nucleotide exchange factors (GEFs), one for VvRabGEF, five for VvRop GDP dissociation inhibitors (GDIs), and three for VvRabGDIs were identified. These proteins had a CRIB motif or PH domain, a TBC domain, a PRONE domain, a DENN domain, or GDI signatures, respectively. By bootstrap analysis, an unrooted consensus phylogenetic tree was constructed which indicated that VvRopGDIs and VvRopGEFs--but not VvRopGAP--belonged to the same clade, and that VvRabGEF1 protein was more closely related to VvRopGAPs than to the other putative VvRab-interacting proteins. Twenty-two genes out of 28 encoding putative VvRop- and VvRab-interacting proteins could be located on identified grapevine chromosomes. Generally one gene was anchored on one chromosome, but in some cases up to four genes were located on the same chromosome. Expression patterns of the genes encoding putative VvRop- and VvRab-interacting proteins were also examined using a newly developed tool based on public expressed sequence tag (EST) database analysis. Expression patterns were sometimes found to be specific to an organ or a developmental stage. Although some limitations exist, the use of EST database analysis is stressed, in particular in the case of species where expression data are obtained at high costs in terms of time and effort.

  12. Transcriptome Analysis of a Ustilago maydis ust1 Deletion Mutant Uncovers Involvement of Laccase and Polyketide Synthase Genes in Spore Development.

    Science.gov (United States)

    Islamovic, Emir; García-Pedrajas, María D; Chacko, Nadia; Andrews, David L; Covert, Sarah F; Gold, Scott E

    2015-01-01

    Ustilago maydis, causal agent of corn smut disease, is a dimorphic fungus alternating between a saprobic budding haploid and an obligate pathogenic filamentous dikaryon. Maize responds to U. maydis colonization by producing tumorous structures, and only within these does the fungus sporulate, producing melanized sexual teliospores. Previously we identified Ust1, an APSES (Asm1p, Phd1p, Sok2p, Efg1p, and StuAp) transcription factor, whose deletion led to filamentous haploid growth and the production of highly pigmented teliospore-like structures in culture. In this study, we analyzed the transcriptome of a ust1 deletion mutant and functionally characterized two highly upregulated genes with potential roles in melanin biosynthesis: um05361, encoding a putative laccase (lac1), and um06414, encoding a polyketide synthase (pks1). The Δlac1 mutant strains showed dramatically reduced virulence on maize seedlings and fewer, less-pigmented teliospores in adult plants. The Δpks1 mutant was unaffected in seedling virulence but adult plant tumors generated hyaline, nonmelanized teliospores. Thus, whereas pks1 appeared to be restricted to the synthesis of melanin, lac1 showed a broader role in virulence. In conclusion, the ust1 deletion mutant provided an in vitro model for sporulation in U. maydis, and functional analysis supports the efficacy of this in vitro mutant analysis for identification of genes involved in in planta teliosporogenesis.

  13. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  14. Giving Voice to Emotion: Voice Analysis Technology Uncovering Mental States is Playing a Growing Role in Medicine, Business, and Law Enforcement.

    Science.gov (United States)

    Allen, Summer

    2016-01-01

    It's tough to imagine anything more frustrating than interacting with a call center. Generally, people don't reach out to call centers when they?re happy-they're usually trying to get help with a problem or gearing up to do battle over a billing error. Add in an automatic phone tree, and you have a recipe for annoyance. But what if that robotic voice offering you a smorgasbord of numbered choices could tell that you were frustrated and then funnel you to an actual human being? This type of voice analysis technology exists, and it's just one example of the many ways that computers can use your voice to extract information about your mental and emotional state-including information you may not think of as being accessible through your voice alone.

  15. Comparative analysis of the Spirulina platensis subcellular proteome in response to low- and high-temperature stresses: uncovering cross-talk of signaling components

    Science.gov (United States)

    2011-01-01

    The present study focused on comparative proteome analyses of low- and high-temperature stresses and potential protein-protein interaction networks, constructed by using a bioinformatics approach, in response to both stress conditions. The data revealed two important points: first, the results indicate that low-temperature stress is tightly linked with oxidative stress as well as photosynthesis; however, no specific mechanism is revealed in the case of the high-temperature stress response. Second, temperature stress was revealed to be linked with nitrogen and ammonia assimilation. Moreover, the data also highlighted the cross-talk of signaling pathways. Some of the detected signaling proteins, e.g., Hik14, Hik26 and Hik28, have potential interactions with differentially expressed proteins identified in both temperature stress conditions. Some differentially expressed proteins found in the Spirulina protein-protein interaction network were also examined for their physical interactions by a yeast two hybrid system (Y2H). The Y2H results obtained in this study suggests that the potential PPI network gives quite reliable potential interactions for Spirulina. Therefore, the bioinformatics approach employed in this study helps in the analysis of phenomena where proteome analyses of knockout mutants have not been carried out to directly examine for specificity or cross-talk of signaling components. PMID:21756373

  16. Comparative analysis of the Spirulina platensis subcellular proteome in response to low- and high-temperature stresses: uncovering cross-talk of signaling components

    Directory of Open Access Journals (Sweden)

    Roytrakul Sittiruk

    2011-07-01

    Full Text Available Abstract The present study focused on comparative proteome analyses of low- and high-temperature stresses and potential protein-protein interaction networks, constructed by using a bioinformatics approach, in response to both stress conditions. The data revealed two important points: first, the results indicate that low-temperature stress is tightly linked with oxidative stress as well as photosynthesis; however, no specific mechanism is revealed in the case of the high-temperature stress response. Second, temperature stress was revealed to be linked with nitrogen and ammonia assimilation. Moreover, the data also highlighted the cross-talk of signaling pathways. Some of the detected signaling proteins, e.g., Hik14, Hik26 and Hik28, have potential interactions with differentially expressed proteins identified in both temperature stress conditions. Some differentially expressed proteins found in the Spirulina protein-protein interaction network were also examined for their physical interactions by a yeast two hybrid system (Y2H. The Y2H results obtained in this study suggests that the potential PPI network gives quite reliable potential interactions for Spirulina. Therefore, the bioinformatics approach employed in this study helps in the analysis of phenomena where proteome analyses of knockout mutants have not been carried out to directly examine for specificity or cross-talk of signaling components.

  17. Uncovering introductory astronomy students' conceptual modules of lunar phases

    Science.gov (United States)

    Lindell, Rebecca; Traxler, Adrienne

    2017-01-01

    Brewe, Bruun and Bearden developed Module Analysis of Multiple Choice Responses (MAMCR) methodology for using network analysis to uncover the underlying conceptual modules of student performance on multiple-choice assessments. The Lunar Phases Concept Inventory (LPCI) assesses students understanding of lunar phases across 8 separate dimensions of understanding based on the results of a detailed qualitative phenomenology of college students' understanding of lunar phases. Unlike many concept inventories, the LPCI has multiple items for each dimension of understanding and each response corresponds to either the scientifically correct answer or to an alternative idea uncovered from the qualitative investigation. In this study, we have combined MAMCR with the database of nearly 2000 LPCI pre-test results. We will report on the preliminary different conceptual modules of lunar phases and the relationship of these modules to previous qualitative research.

  18. Quantitative and Qualitative Analysis of Bone Marrow CD8(+) T Cells from Different Bones Uncovers a Major Contribution of the Bone Marrow in the Vertebrae.

    Science.gov (United States)

    Geerman, Sulima; Hickson, Sarah; Brasser, Giso; Pascutti, Maria Fernanda; Nolte, Martijn A

    2015-01-01

    Bone marrow (BM) plays an important role in the long-term maintenance of memory T cells. Yet, BM is found in numerous bones throughout the body, which are not equal in structure, as they differ in their ratio of cortical and trabecular bone. This implies that BM cells within different bones are subjected to different microenvironments, possibly leading to differences in their frequencies and function. To address this, we examined BM from murine tibia, femur, pelvis, sternum, radius, humerus, calvarium, and the vertebrae and analyzed the presence of effector memory (TEM), central memory (TCM), and naïve (TNV) CD8(+) T cells. During steady-state conditions, the frequency of the total CD8(+) T cell population was comparable between all bones. Interestingly, most CD8(+) T cells were located in the vertebrae, as it contained the highest amount of BM cells. Furthermore, the frequencies of TEM, TCM, and TNV cells were similar between all bones, with a majority of TNV cells. Additionally, CD8(+) T cells collected from different bones similarly expressed the key survival receptors IL-7Rα and IL-15Rβ. We also examined BM for memory CD8(+) T cells with a tissue-resident memory phenotype and observed that approximately half of all TEM cells expressed the retention marker CD69. Remarkably, in the memory phase of acute infection with the lymphocytic choriomeningitis virus (LCMV), we found a massive compositional change in the BM CD8(+) T cell population, as the TEM cells became the dominant subset at the cost of TNV cells. Analysis of Ki-67 expression established that these TEM cells were in a quiescent state. Finally, we detected higher frequencies of LCMV-specific CD8(+) T cells in BM compared to spleen and found that BM in its entirety contained fivefold more LCMV-specific CD8(+) T cells. In conclusion, although infection with LCMV caused a dramatic change in the BM CD8(+) T cell population, this did not result in noticeable differences between BM collected from different

  19. HITS-CLIP analysis uncovers a link between the Kaposi's sarcoma-associated herpesvirus ORF57 protein and host pre-mRNA metabolism.

    Directory of Open Access Journals (Sweden)

    Emi Sei

    2015-02-01

    Full Text Available The Kaposi's sarcoma associated herpesvirus (KSHV is an oncogenic virus that causes Kaposi's sarcoma, primary effusion lymphoma (PEL, and some forms of multicentric Castleman's disease. The KSHV ORF57 protein is a conserved posttranscriptional regulator of gene expression that is essential for virus replication. ORF57 is multifunctional, but most of its activities are directly linked to its ability to bind RNA. We globally identified virus and host RNAs bound by ORF57 during lytic reactivation in PEL cells using high-throughput sequencing of RNA isolated by cross-linking immunoprecipitation (HITS-CLIP. As expected, ORF57-bound RNA fragments mapped throughout the KSHV genome, including the known ORF57 ligand PAN RNA. In agreement with previously published ChIP results, we observed that ORF57 bound RNAs near the oriLyt regions of the genome. Examination of the host RNA fragments revealed that a subset of the ORF57-bound RNAs was derived from transcript 5' ends. The position of these 5'-bound fragments correlated closely with the 5'-most exon-intron junction of the pre-mRNA. We selected four candidates (BTG1, EGR1, ZFP36, and TNFSF9 and analyzed their pre-mRNA and mRNA levels during lytic phase. Analysis of both steady-state and newly made RNAs revealed that these candidate ORF57-bound pre-mRNAs persisted for longer periods of time throughout infection than control RNAs, consistent with a role for ORF57 in pre-mRNA metabolism. In addition, exogenous expression of ORF57 was sufficient to increase the pre-mRNA levels and, in one case, the mRNA levels of the putative ORF57 targets. These results demonstrate that ORF57 interacts with specific host pre-mRNAs during lytic reactivation and alters their processing, likely by stabilizing pre-mRNAs. These data suggest that ORF57 is involved in modulating host gene expression in addition to KSHV gene expression during lytic reactivation.

  20. Revelando sentidos na prática docente: a abordagem de corpus na análise do discurso Uncovering meanings in pedagogical practice: the corpus approach in discourse analysis

    Directory of Open Access Journals (Sweden)

    Vander Viana

    2011-01-01

    Full Text Available Este artigo discute a viabilidade da utilização de ferramentas da Linguística de Corpus na análise do discurso pedagógico. Para tanto, são apresentados dois estudos de caso. O primeiro focaliza o discurso de professores de língua inglesa de um renomado curso de idiomas do Rio de Janeiro acerca da implementação de recursos tecnológicos na sala de aula. O segundo estudo, por sua vez, busca perceber qual é o posicionamento de professores universitários de literaturas em língua inglesa sobre literatura e seu ensino. Os resultados apontam para a riqueza dos dados contextuais que podem ser depreendidos a partir de uma análise linguística de base empírica. Em última análise, o artigo revela a importância e a flexibilidade da abordagem de corpus na análise do discurso, que pode ser aplicada a inúmeros contextos.This paper discusses the feasibility of using Corpus Linguistics tools in the analysis of pedagogic discourse. For doing this, two case studies are presented. The first one focuses on the discourse of English language teachers of a well-known languages course in Rio de Janeiro about the implementation of technological resources in the classroom. The second study, in its turn, seeks to realize the position held by university professors of literatures in English language with regard to literature and its teaching. The results point out to the richness of contextual data which can be inferred from a linguistic analysis with an empirical basis. All in all, the paper uncovers the importance and flexibility of the corpus approach in discourse analysis, which may be applied to several contexts.

  1. Uncovering the nutritional landscape of food.

    Directory of Open Access Journals (Sweden)

    Seunghyeon Kim

    Full Text Available Recent progresses in data-driven analysis methods, including network-based approaches, are revolutionizing many classical disciplines. These techniques can also be applied to food and nutrition, which must be studied to design healthy diets. Using nutritional information from over 1,000 raw foods, we systematically evaluated the nutrient composition of each food in regards to satisfying daily nutritional requirements. The nutrient balance of a food was quantified and termed nutritional fitness; this measure was based on the food's frequency of occurrence in nutritionally adequate food combinations. Nutritional fitness offers a way to prioritize recommendable foods within a global network of foods, in which foods are connected based on the similarities of their nutrient compositions. We identified a number of key nutrients, such as choline and α-linolenic acid, whose levels in foods can critically affect the nutritional fitness of the foods. Analogously, pairs of nutrients can have the same effect. In fact, two nutrients can synergistically affect the nutritional fitness, although the individual nutrients alone may not have an impact. This result, involving the tendency among nutrients to exhibit correlations in their abundances across foods, implies a hidden layer of complexity when exploring for foods whose balance of nutrients within pairs holistically helps meet nutritional requirements. Interestingly, foods with high nutritional fitness successfully maintain this nutrient balance. This effect expands our scope to a diverse repertoire of nutrient-nutrient correlations, which are integrated under a common network framework that yields unexpected yet coherent associations between nutrients. Our nutrient-profiling approach combined with a network-based analysis provides a more unbiased, global view of the relationships between foods and nutrients, and can be extended towards nutritional policies, food marketing, and personalized nutrition.

  2. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  3. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  4. Uncovering Topological Structures in Unstructured Data

    Science.gov (United States)

    2015-04-20

    AFRL-OSR-VA-TR-2015-0091 Uncovering Topological Structures in Unstructured Data Keith Bowman ILLINOIS INSTITUTE OF TECHNOLOGY Final Report 04/20/2015...COVERED (From - To)      01-05-2012 to 30-04-2015 4.  TITLE AND SUBTITLE Uncovering Topological Structures in Unstructured Data 5a.  CONTRACT NUMBER 5b...scanned point-cloud data . It has two stages. In the first stage, we analyzed scan data and extracted topologically critical points. We used these critical

  5. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  6. Hidden Variables or Positive Probabilities?

    CERN Document Server

    Rothman, T; Rothman, Tony

    2001-01-01

    Despite claims that Bell's inequalities are based on the Einstein locality condition, or equivalent, all derivations make an identical mathematical assumption: that local hidden-variable theories produce a set of positive-definite probabilities for detecting a particle with a given spin orientation. The standard argument is that because quantum mechanics assumes that particles are emitted in a superposition of states the theory cannot produce such a set of probabilities. We examine a paper by Eberhard who claims to show that a generalized Bell inequality, the CHSH inequality, can be derived solely on the basis of the locality condition, without recourse to hidden variables. We point out that he nonetheless assumes a set of positive-definite probabilities, which supports the claim that hidden variables or "locality" is not at issue here, positive-definite probabilities are. We demonstrate that quantum mechanics does predict a set of probabilities that violate the CHSH inequality; however these probabilities ar...

  7. Hidden symmetries in jammed systems

    Science.gov (United States)

    Morse, Peter K.; Corwin, Eric I.

    2016-07-01

    There are deep, but hidden, geometric structures within jammed systems, associated with hidden symmetries. These can be revealed by repeated transformations under which these structures lead to fixed points. These geometric structures can be found in the Voronoi tesselation of space defined by the packing. In this paper we examine two iterative processes: maximum inscribed sphere (MIS) inversion and a real-space coarsening scheme. Under repeated iterations of the MIS inversion process we find invariant systems in which every particle is equal to the maximum inscribed sphere within its Voronoi cell. Using a real-space coarsening scheme we reveal behavior in geometric order parameters which is length-scale invariant.

  8. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  9. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  10. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  11. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The estimation of the HMM is conducted using a variant of the Iterative Conditional Expectation-Generalized Mixture (ICE-GEMI) algorithm proposed by Delignon et al. (1997), that permits analysis of the conditional distributions of economic data and allows for different functional forms across regimes...

  12. Modeling Multiple Risks: Hidden Domain of Attraction

    CERN Document Server

    Mitra, Abhimanyu

    2011-01-01

    Hidden regular variation is a sub-model of multivariate regular variation and facilitates accurate estimation of joint tail probabilities. We generalize the model of hidden regular variation to what we call hidden domain of attraction. We exhibit examples that illustrate the need for a more general model and discuss detection and estimation techniques.

  13. Social network analysis as hidden advertising value of the carrier and application of countermeasures%社交网络作为隐性广告载体的价值分析及应用对策

    Institute of Scientific and Technical Information of China (English)

    周志平

    2012-01-01

    随着社交网络的产生和发展,直至流行和普及,社交网络给现代生活带来了巨大的改变和冲击,社交网络的商业价值也日益凸显。本文传播方式和受众两个层面全面系统地分析了社交网络作为隐性广告载体的价值优势,并提出了社交网络植入隐性广告的一些可行性建议。%With the emergence and development of the social network,until the prevalence and popularity of social networks to modern life has brought a huge change and the impact of the commercial value of the social network has become increasingly prominent.The two levels of this article mode of transmission and audience a comprehensive and systematic analysis of the social network as hidden advertising value of the carrier edge,and put forward some feasible suggestions of hidden advertising in social networks implanted.

  14. The Reasons Analysis of the Prevalence of Hidden Rules in Medical Profession%医学职业潜规则流行原因解析

    Institute of Scientific and Technical Information of China (English)

    方毅; 任守双; 王莉媛; 朴金花; 方睿哲; 孙福川

    2012-01-01

    This survey showed that the creation and prevalence of hidden rules in medical profession was formed by the interaction of multiple factors together. The major factors were wrong orientation of health reform policy, system such as "one body of medicine and drugs", "medicine supported by drugs" and errors of specific measures, hospital management to pursuit excessively economic efficiency, the reduction of the medical ethics level of doctors leaded by social money worship and so on. The wrong orientation of health reform policy, the defect of system and the errors of specific measures were crucial, and those induced the interaction and influence of other factors each other, eventually led to the prevalence of hidden rules in medical profession.%调查显示,医学职业潜规则的产生和流行是由多重因素相互作用形成的合力导致的.主要因素有医改政策取向、“医药合一、以药养医”的体制及具体措施失误、医院管理过分追求经济效益、拜金主义影响导致医德水平下降等,其中起决定作用的因素是医改政策取向、体制缺陷及具体措施失误,由此诱发其它因素的相互作用和相互影响,最终导致潜规则 逐渐流行.

  15. 急诊科药嘱相关隐患原因分析及对策%Analysis and countermeasures of emergency medicine related hidden dangers

    Institute of Scientific and Technical Information of China (English)

    姜艳; 李素玲

    2014-01-01

    Objective To investigate the related problems and countermeasures of emergency medicine pre-scription. Methods The related problems of drug related orders in the second half of 2013 were analyzed,and the cau-ses of the trouble,measures to eliminate the drug hidden dangers were found. Results The hidden danger of drug order was related to doctors unfamiliar with interaction,usage and dosage of drugs,drug administration personnel lack of re-sponsibility. Conclusion Strengthening the verification link in nursing work,the training of medical staff rotation,drug administration responsibility,the training of clinical staff,can reduce the drug related risks,so as to reduce medication errors.%目的:探讨急诊科药嘱相关问题及对策。方法对2013年下半年用药医嘱中的隐患进行分析,发现造成药嘱隐患的原因,寻找消除药嘱隐患的对策。结果隐患药嘱与医生对药物作用、用法、剂量不熟悉,药局人员缺乏责任心有着直接的关系。结论加强护理工作中的核对环节,对轮转医生加强培训,加强药局工作人员的责任心,对临床医护人员加强相关培训,可以减少药嘱相关隐患,从而减少用药错误。

  16. Uncovering student ideas in physical science

    CERN Document Server

    Keeley, Page

    2014-01-01

    If you and your students can't get enough of a good thing, Volume 2 of Uncovering Student Ideas in Physical Science is just what you need. The book offers 39 new formative assessment probes, this time with a focus on electric charge, electric current, and magnets and electromagnetism. It can help you do everything from demystify electromagnetic fields to explain the real reason balloons stick to the wall after you rub them on your hair.

  17. Extraction of hidden information by efficient community detection in networks

    Science.gov (United States)

    Lee, Jooyoung; Lee, Juyong; Gross, Steven

    2013-03-01

    Currently, we are overwhelmed by a deluge of experimental data, and network physics has the potential to become an invaluable method to increase our understanding of large interacting datasets. However, this potential is often unrealized for two reasons: uncovering the hidden community structure of a network, known as community detection, is difficult, and further, even if one has an idea of this community structure, it is not a priori obvious how to efficiently use this information. Here, to address both of these issues, we, first, identify optimal community structure of given networks in terms of modularity by utilizing a recently introduced community detection method. Second, we develop an approach to use this community information to extract hidden information from a network. When applied to a protein-protein interaction network, the proposed method outperforms current state-of-the-art methods that use only the local information of a network. The method is generally applicable to networks from many areas. This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MEST) (No. 20120001222).

  18. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De...

  19. Parameter estimation of hidden periodic model in random fields

    Institute of Scientific and Technical Information of China (English)

    何书元

    1999-01-01

    Two-dimensional hidden periodic model is an important model in random fields. The model is used in the field of two-dimensional signal processing, prediction and spectral analysis. A method of estimating the parameters for the model is designed. The strong consistency of the estimators is proved.

  20. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving...

  1. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  2. The Consensus String Problem and the Complexity of Comparing Hidden Markov Models

    DEFF Research Database (Denmark)

    Lyngsø, Rune Bang; Pedersen, Christian Nørgaard Storm

    2002-01-01

    The basic theory of hidden Markov models was developed and applied to problems in speech recognition in the late 1960s, and has since then been applied to numerous problems, e.g. biological sequence analysis. Most applications of hidden Markov models are based on efficient algorithms for computing...... the probability of generating a given string, or computing the most likely path generating a given string. In this paper we consider the problem of computing the most likely string, or consensus string, generated by a given model, and its implications on the complexity of comparing hidden Markov models. We show...... that computing the consensus string, and approximating its probability within any constant factor, is NP-hard, and that the same holds for the closely related labeling problem for class hidden Markov models. Furthermore, we establish the NP-hardness of comparing two hidden Markov models under the L∞- and L1...

  3. Analysis of Hidden Danger in Farmer’s Rights and Interests during Farmland Transfer——An Evaluation of Rights Safeguarding Effect of Farmland Transfer Contract

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Taking Shuangliu County,Chengdu City,China as an example,evaluation index system for the rights protection effects of farmland transfer is established contract from three aspects of basic information,transfer agreement and legal safeguards in the contracts.According to the investigation data,weight of evaluation index is determined by both entropy weight and Analytic Hierarchy Process.Comprehensive index method is used to evaluate the rights protection effects of farmland transfer contract in the flat dam,high hill and low hill in Shuangliu County,Chengdu,China.Result shows that the transfer agreement of farmland and the basic information of contract greatly affect the rights protection effects of farmland transfer contract.There are differences in the five indices of the information of the signature of contract,pricing for payment,time limit for farmland transfer,transfer mode of farmland,and use range of farmland transfer.During the farmland transfer in reality,there are three hidden dangers in farmer’s land rights and interests,which are the ill-formed transfer behavior,the relatively low income of farmers from farmland transfer,and the quality decline of farmland and difficult full reclamation in transfer period.Based on the evaluation result and investigation data,countermeasures are put forward to improve the rights protection effects of farmland transfer contract.

  4. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  5. An Analysis of the Dialectical of the Hidden Facts Hypothesis in Everlasting Regret%《长恨歌》“隐事”说辨证

    Institute of Scientific and Technical Information of China (English)

    张中宇

    2011-01-01

    The "Hidden Facts" hypothesis claims that when the Mawei Incident happened, Emperor Xuanzong of Tang was forced to agree to sentence the Imperial Concubine Yang into death. However, Gao Lishi and Chen Xuanli, who took part in this thing, were the trusted fellows of Emperor Xuanzong. Concubine Yang might escape after making up. She had been living a wondering life among ordinary people, therefore, she was too shameful to go back to the palace. So, what the Everlasting Regret expresses was not the bitterness of the parting by death, but the hatred of parting. However, according to the credible literature, although Chen Xuanli and Gao Lishi had the time and conditions to let Yang escape, the fact is that both of them were the plotter and executor of the death of Yang and her kin. Thus, the death of Yang was related to their own safety in the future. Therefore, undoubtedly they would confirm the death of Yang. There was no possibility of helping Yang's escaption. The "Hidden Facts" hypothesis, with very strong speculation arose from the academic environment where the trend of doubting ancient history was prevailing, so it has been often caught in all sorts of art search of words and forced interpretation. It does not belong to serious academic establishment, but only a bold assumption.%“隐事”说认为,马嵬事变时唐玄宗迫于形势,同意赐死杨贵妃,但参与其事的高力士和陈玄礼都是唐玄宗亲信,杨贵妃可能在夜间换装逃走,但已流落风尘,无颜回宫面见唐玄宗,因此“长恨歌》表达的不是死别之苦,而是生离之恨。但根据可信材料,陈玄礼、高力士固然有时间、也有条件让杨贵妃逃脱,问题在于二人是诛杀杨氏一族的具体策划者和执行者,结果又关系到自身将来的安危,所以必定要确认杨贵妃之死才会罢休,而不存在协助杨贵妃潜逃的可能性。臆测性很浓的“隐事”说产生于疑古之风盛行的

  6. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  7. Data-driven security analysis, visualization and dashboards

    CERN Document Server

    Jacobs, Jay

    2014-01-01

    Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and ma

  8. Systematic Analysis of Majorization in Quantum Algorithms

    CERN Document Server

    Orus, R; Martín-Delgado, M A; Orus, Roman; Latorre, Jose I.; Martin-Delgado, Miguel A.

    2002-01-01

    Motivated by the need to uncover some underlying mathematical structure of efficient quantum computation, we carry out a systematic analysis of a wide variety of quantum algorithms from the majorization theory point of view. We conclude that step-by-step majorization is found in the known instances of efficient algorithms, namely in the quantum Fourier transform, in Grover's algorithm, in the hidden affine function problem, in searching by quantum adiabatic evolution and in deterministic quantum walks in continuous time solving a classically hard problem. On the other hand, the optimal quantum algorithm for parity determination, which does not provide any computational speed up, does not show step-by-step majorization. Furthermore, the efficient quantum algorithm for the hidden affine function problem does not make use of any entanglement while it does obey majorization. All the above results give support to a step-by-step Majorization Principle necessary for efficient quantum computation.

  9. Estimating an Activity Driven Hidden Markov Model

    OpenAIRE

    Meyer, David A.; Shakeel, Asif

    2015-01-01

    We define a Hidden Markov Model (HMM) in which each hidden state has time-dependent $\\textit{activity levels}$ that drive transitions and emissions, and show how to estimate its parameters. Our construction is motivated by the problem of inferring human mobility on sub-daily time scales from, for example, mobile phone records.

  10. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  11. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  12. Revealing the Hidden Language of Complex Networks

    Science.gov (United States)

    Yaveroğlu, Ömer Nebil; Malod-Dognin, Noël; Davis, Darren; Levnajic, Zoran; Janjic, Vuk; Karapandza, Rasa; Stojmirovic, Aleksandar; Pržulj, Nataša

    2014-04-01

    Sophisticated methods for analysing complex networks promise to be of great benefit to almost all scientific disciplines, yet they elude us. In this work, we make fundamental methodological advances to rectify this. We discover that the interaction between a small number of roles, played by nodes in a network, can characterize a network's structure and also provide a clear real-world interpretation. Given this insight, we develop a framework for analysing and comparing networks, which outperforms all existing ones. We demonstrate its strength by uncovering novel relationships between seemingly unrelated networks, such as Facebook, metabolic, and protein structure networks. We also use it to track the dynamics of the world trade network, showing that a country's role of a broker between non-trading countries indicates economic prosperity, whereas peripheral roles are associated with poverty. This result, though intuitive, has escaped all existing frameworks. Finally, our approach translates network topology into everyday language, bringing network analysis closer to domain scientists.

  13. Hepatitis C virus host cell interactions uncovered

    DEFF Research Database (Denmark)

    Gottwein, Judith; Bukh, Jens

    2007-01-01

      Insights into virus-host cell interactions as uncovered by Randall et al. (1) in a recent issue of PNAS further our understanding of the hepatitis C virus (HCV) life cycle, persistence, and pathogenesis and might lead to the identification of new therapeutic targets. HCV persistently infects 180...... million individuals worldwide, causing chronic hepatitis, liver cirrhosis, and hepatocellular carcinoma. The only approved treatment, combination therapy with IFN- and ribavirin, targets cellular pathways (2); however, a sustained virologic response is achieved only in approximately half of the patients...... treated. Therefore, there is a pressing need for the identification of novel drugs against hepatitis C. Although most research focuses on the development of HCV-specific antivirals, such as protease and polymerase inhibitors (3), cellular targets could be pursued and might allow the development of broad...

  14. Hidden Web信息获取

    Institute of Scientific and Technical Information of China (English)

    陈珂; 陈小英; 徐科

    2007-01-01

    如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词.由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面.然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值.文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息.

  15. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  16. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  17. Algorithms for Hidden Markov Models Restricted to Occurrences of Regular Expressions

    DEFF Research Database (Denmark)

    Tataru, Paula; Sand, Andreas; Hobolth, Asger;

    2013-01-01

    Hidden Markov Models (HMMs) are widely used probabilistic models, particularly for annotating sequential data with an underlying hidden structure. Patterns in the annotation are often more relevant to study than the hidden structure itself. A typical HMM analysis consists of annotating the observed...... data using a decoding algorithm and analyzing the annotation to study patterns of interest. For example, given an HMM modeling genes in DNA sequences, the focus is on occurrences of genes in the annotation. In this paper, we define a pattern through a regular expression and present a restriction...

  18. Hidden scale in quantum mechanics

    CERN Document Server

    Giri, Pulak Ranjan

    2007-01-01

    We show that the intriguing localization of a free particle wave-packet is possible due to a hidden scale present in the system. Self-adjoint extensions (SAE) is responsible for introducing this scale in quantum mechanical models through the nontrivial boundary conditions. We discuss a couple of classically scale invariant free particle systems to illustrate the issue. In this context it has been shown that a free quantum particle moving on a full line may have localized wave-packet around the origin. As a generalization, it has also been shown that particles moving on a portion of a plane or on a portion of a three dimensional space can have unusual localized wave-packet.

  19. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...

  20. DOES UNCOVERED INTEREST RATE PARITY HOLD IN TURKEY?

    Directory of Open Access Journals (Sweden)

    Ozcan Karahan

    2012-01-01

    Full Text Available Most of the earlier empirical studies focusing on developed countries failed to give evidence in favor of the Uncovered Interest Rate Parity (UIP. After intensive financial liberalization processes and mostly preferred free exchange rate regimes, a new area of research starts to involve the investigation whether UIP holds for developing economies differently. Accordingly, we tested the UIP for Turkey’s monthly interest rate and exchange rate data between 2002 and 2011. We run conventional regressions in the form of Ordinary Least Squares (OLS and used a simple Generalized Autoregressive Conditional Heteroskedasticity (GARCH analysis. The empirical results of both methods do not support the validity of UIP for Turkey. Thus, together with most of the earlier empirical studies focusing on developed countries and detecting the invalidity of UIP, we can argue that the experience of Turkey and developed economies are not different.

  1. Uncovering transcriptional regulation of metabolism by using metabolic network topology

    DEFF Research Database (Denmark)

    Patil, Kiran Raosaheb; Nielsen, Jens

    2005-01-01

    therefore developed an algorithm that is based on hypothesis-driven data analysis to uncover the transcriptional regulatory architecture of metabolic networks. By using information on the metabolic network topology from genome-scale metabolic reconstruction, we show that it is possible to reveal patterns...... in the metabolic network that follow a common transcriptional response. Thus, the algorithm enables identification of so-called reporter metabolites (metabolites around which the most significant transcriptional changes occur) and a set of connected genes with significant and coordinated response to genetic...... changes induced by complex regulatory mechanisms coordinating the activity of different metabolic pathways. It is difficult to map such global transcriptional responses by using traditional methods, because many genes in the metabolic network have relatively small changes at their transcription level. We...

  2. Perpetual points and hidden attractors in dynamical systems

    Energy Technology Data Exchange (ETDEWEB)

    Dudkowski, Dawid, E-mail: dawid.dudkowski@p.lodz.pl [Division of Dynamics, Technical University of Lodz, Stefanowskiego 1/15, 90-924 Lodz (Poland); Prasad, Awadhesh [Department of Physics and Astrophysics, University of Delhi, Delhi 110007 (India); Kapitaniak, Tomasz [Division of Dynamics, Technical University of Lodz, Stefanowskiego 1/15, 90-924 Lodz (Poland)

    2015-10-23

    We discuss the use of perpetual points for tracing the hidden and the rare attractors of dynamical systems. The analysis of perpetual points and their co-existence due to the parameters values is presented and the impact of these points on the behavior of the systems is shown. The results are obtained for single as well as coupled externally excited van der Pol–Duffing oscillators. The presented results can be generalized to other systems having different dynamics. - Highlights: • Computation of perpetual points in forced nonlinear dynamical systems. • Locating the hidden and rare attractors using perpetual points. • Analysis of states and different types of synchronization in coupled systems. • Understanding the complexity in coupled and uncoupled forced van der Pol–Duffing oscillator.

  3. Reading Hidden Messages Through Deciphered Manual Alphabets on Classic Artwork

    Science.gov (United States)

    Castronovo, Joseph Anthony, Jr.

    1998-10-01

    Decipherment is the tool used to uncover several types of hand signs that played vital roles in the creation of hidden messages in classic artwork. A 3,100 B.C. bas-relief of The 'Kaph' Telescope, formerly named The Narmer Palette, and Michaelangelo Buonarrotte's Battle of Cascina of 1506 were two key works of art that show certain similarities even though separated by 4,500 years. It is evident that Renaissance humanists provided artists with certain knowledge of the ancients. Results of incorporating a number of minor works of art showed that the competence of ancient Egyptians, Cretans and Australian Aboriginals, to name a few, as astronomers, was underestimated. Some deciphered Indus seals attested to a global understanding of the universe, with Gemini and the star of Thuban at the center of their attention. Certain forms of secrecy had to be undertaken for various reasons throughout the millennia. Three examples are: (1) In Italy, to keep controversial and truthful teachings discreet and hidden, artists embedded them in artwork long before the plight of Galileo Galilei and his discoveries. (2) Among Jewish Kabbalists, a well-known design was obscured in The Arnolfini Wedding painting for fear it would be lost due to persecution. (3) Michaelangelo Buonarrotte indicated several meanings through the hands of The Statue of Moses. They were overlooked by several societies, including the gesticulating culture of Italy, because they oppressed the value of signed languages. Spatial decipherment may testify to a need for the restoration of a spatial writing system for expanded linguistic accessibility. A 21st century model community for sign language residents and employees will benefit visual learners, particularly visual artists and non-phonetic decipherers, to better uncover, understand and perhaps use ancient hand forms to restore ancient knowledge. Moreover, the National Association of Teaching English (NATE) has recently endorsed the addition of two skills

  4. Called to respond: The potential of unveiling hiddens

    Directory of Open Access Journals (Sweden)

    Alison L Black

    2014-12-01

    Full Text Available Interested in exploring how personal stories and aesthetic modes of representing experiences can nudge open academic and educational spaces, this article/collection of particles seeks to document our encounters of being affected and called to respond to things the other has written and represented. As a way of engaging with questions about what research and research data might be and become, our attention has been drawn to stories and images from our lives that we have not shaken off – and to how, as we have opened these to the other, making once private moments public, our hiddens have morphed tenderly into a shared knowing and being. As we have acted on the call we have felt to respond we have found ourselves entering spaces of collaboration, communion, contemplation, and conversation – spaces illuminated by what we have not been able to – and cannot – set aside. Using visual and poetic materials we explore heartfelt and heartbroken aspects of our educational worlds and lives, to be present with each other and our (reemerging personal and professional meanings. We see the shared body (of work, of writing, of image that develops from the taking of brave steps and the risky slipping off of academic masks and language, as a manifestation of the trusted and nurturing spaces that can be generated through collaborative opportunities to gather together. These steps towards unveiling hiddens are producing in us and of us a friendship, fluency, and fluidity as we write new ways of becoming. In turn, we hope the uncovering and revealing of our dialogue in the public gathering of this journal might supports readers’ telling of their own life stories through what calls them to respond.

  5. Feminist Approaches to Triangulation: Uncovering Subjugated Knowledge and Fostering Social Change in Mixed Methods Research

    Science.gov (United States)

    Hesse-Biber, Sharlene

    2012-01-01

    This article explores the deployment of triangulation in the service of uncovering subjugated knowledge and promoting social change for women and other oppressed groups. Feminist approaches to mixed methods praxis create a tight link between the research problem and the research design. An analysis of selected case studies of feminist praxis…

  6. Perpetual points and hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Prasad, Awadhesh; Kapitaniak, Tomasz

    2015-10-01

    We discuss the use of perpetual points for tracing the hidden and the rare attractors of dynamical systems. The analysis of perpetual points and their co-existence due to the parameters values is presented and the impact of these points on the behavior of the systems is shown. The results are obtained for single as well as coupled externally excited van der Pol-Duffing oscillators. The presented results can be generalized to other systems having different dynamics.

  7. Extraction of Hidden Social Networks from Wiki-Environment Involved in Information Conflict

    OpenAIRE

    Alguliyev, Rasim M.; Ramiz M. Aliguliyev; Irada Y. Alakbarova

    2016-01-01

    Social network analysis is a widely used technique to analyze relationships among wiki-users in Wikipedia. In this paper the method to identify hidden social networks participating in information conflicts in wiki-environment is proposed. In particular, we describe how text clustering techniques can be used for extraction of hidden social networks of wiki-users caused information conflict. By clustering unstructured text articles caused information conflict we ...

  8. Visible Effects of Invisible Hidden Valley Radiation

    CERN Document Server

    Carloni, Lisa

    2010-01-01

    Assuming there is a new gauge group in a Hidden Valley, and a new type of radiation, can we observe it through its effect on the kinematic distributions of recoiling visible particles? Specifically, what are the collider signatures of radiation in a hidden sector? We address these questions using a generic SU(N)-like Hidden Valley model that we implement in Pythia. We find that in both the e+e- and the LHC cases the kinematic distributions of the visible particles can be significantly affected by the valley radiation. Without a proper understanding of such effects, inferred masses of "communicators" and of invisible particles can be substantially off.

  9. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  10. Hidden torsion, 3-manifolds, and homology cobordism

    CERN Document Server

    Cha, Jae Choon

    2011-01-01

    This paper continues our exploration of homology cobordism of 3-manifolds using our recent results on Cheeger-Gromov rho-invariants associated to amenable representations. We introduce a new type of torsion in 3-manifold groups we call hidden torsion, and an algebraic approximation we call local hidden torsion. We construct infinitely many hyperbolic 3-manifolds which have local hidden torsion in the transfinite lower central subgroup. By realizing Cheeger-Gromov invariants over amenable groups, we show that our hyperbolic 3-manifolds are not pairwise homology cobordant, yet remain indistinguishable by any prior known homology cobordism invariants.

  11. Uncovering the architecture of action semantics.

    Science.gov (United States)

    Watson, Christine E; Buxbaum, Laurel J

    2014-10-01

    Despite research suggesting that stored sensorimotor information about tool use is a component of the semantic representations of tools, little is known about the action features or organizing principles that underlie this knowledge. We used methods similar to those applied in other semantic domains to examine the "architecture" of action semantic knowledge. In Experiment 1, participants sorted photographs of tools into groups according to the similarity of their associated "use" actions and rated tools on dimensions related to action. The results suggest that the magnitude of arm movement, configuration of the hand, and manner of motion during tool use play a role in determining how tools cluster in action "semantic space." In Experiment 2, we validated the architecture uncovered in Experiment 1 using an implicit semantic task for which tool use knowledge was not ostensibly relevant (blocked cyclic word-picture matching). Using stimuli from Experiment 1, we found that participants performed more poorly during blocks of trials containing tools used with similar versus unrelated actions, and the amount of semantic interference depended on the magnitude of action similarity among tools. Thus, the degree of featural overlap between tool use actions plays a role in determining the overall semantic similarity of tools.

  12. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  13. HMMEditor: a visual editing tool for profile hidden Markov model

    Directory of Open Access Journals (Sweden)

    Cheng Jianlin

    2008-03-01

    Full Text Available Abstract Background Profile Hidden Markov Model (HMM is a powerful statistical model to represent a family of DNA, RNA, and protein sequences. Profile HMM has been widely used in bioinformatics research such as sequence alignment, gene structure prediction, motif identification, protein structure prediction, and biological database search. However, few comprehensive, visual editing tools for profile HMM are publicly available. Results We develop a visual editor for profile Hidden Markov Models (HMMEditor. HMMEditor can visualize the profile HMM architecture, transition probabilities, and emission probabilities. Moreover, it provides functions to edit and save HMM and parameters. Furthermore, HMMEditor allows users to align a sequence against the profile HMM and to visualize the corresponding Viterbi path. Conclusion HMMEditor provides a set of unique functions to visualize and edit a profile HMM. It is a useful tool for biological sequence analysis and modeling. Both HMMEditor software and web service are freely available.

  14. Faddeev-Jackiw approach to hidden symmetries

    CERN Document Server

    Wotzasek, C

    1994-01-01

    The study of hidden symmetries within Dirac's formalism does not possess a systematic procedure due to the lack of first-class constraints to act as symmetry generators. On the other hand, in the Faddeev-Jackiw approach, gauge and reparametrization symmetries are generated by the null eigenvectors of the sympletic matrix and not by constraints, suggesting the possibility of dealing systematically with hidden symmetries through this formalism. It is shown in this paper that indeed hidden symmetries of noninvariant or gauge fixed systems are equally well described by null eigenvectors of the sympletic matrix, just as the explicit invariances. The Faddeev-Jackiw approach therefore provide a systematic algorithm for treating all sorts of symmetries in an unified way. This technique is illustrated here by the SL(2,R) Kac-Moody current algebra of the 2-D induced gravity proposed by Polyakov, which is a hidden symmetry in the canonical approach of constrained systems via Dirac's method, after conformal and reparamet...

  15. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  16. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  17. Hidden Regular Variation: Detection and Estimation

    CERN Document Server

    Mitra, Abhimanyu

    2010-01-01

    Hidden regular variation defines a subfamily of distributions satisfying multivariate regular variation on $\\mathbb{E} = [0, \\infty]^d \\backslash \\{(0,0, ..., 0) \\} $ and models another regular variation on the sub-cone $\\mathbb{E}^{(2)} = \\mathbb{E} \\backslash \\cup_{i=1}^d \\mathbb{L}_i$, where $\\mathbb{L}_i$ is the $i$-th axis. We extend the concept of hidden regular variation to sub-cones of $\\mathbb{E}^{(2)}$ as well. We suggest a procedure of detecting the presence of hidden regular variation, and if it exists, propose a method of estimating the limit measure exploiting its semi-parametric structure. We exhibit examples where hidden regular variation yields better estimates of probabilities of risk sets.

  18. Fibroid Tumors in Women: A Hidden Epidemic?

    Science.gov (United States)

    ... Issue Past Issues Fibroid Tumors in Women: A Hidden Epidemic? Past Issues / Spring 2007 Table of Contents ... fibroids@rics.bwh.harvard.edu , or visit our Web site: www.fibroids.net . You may also write ...

  19. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  20. Hidden figures are ever present.

    Science.gov (United States)

    Mens, L H; Leeuwenberg, E L

    1988-11-01

    Preference judgments about alternative interpretations of unambiguous patterns can be explained in terms of a rivalry between a preferred and a second-best interpretation (cf. Leeuwenberg & Buffart, 1983). We tested whether this second-best interpretation corresponds to a suppressed but concurrently present interpretation or whether it merely reflects an alternative view that happens to be preferred less often. Two patterns were present immediately following each other with a very short onset asynchrony: a complete pattern and one out of three possible subpatterns of it, corresponding to the best, the second best, or an odd interpretation of the complete pattern. Subjects indicated which subpattern was presented by choosing among the three subpatterns shown after each trial. The scores, corrected for response-bias effects, indicated a relative facilitation of the second-best interpretation, in agreement with its predicted "hidden" presence. This result is more in line with theories that capitalize on the quality of the finally selected representation than with processing models aimed at reaching one single solution as fast and as economically as possible.

  1. Uncovering Wolbachia diversity upon artificial host transfer.

    Directory of Open Access Journals (Sweden)

    Daniela I Schneider

    Full Text Available The common endosymbiotic Wolbachia bacteria influence arthropod hosts in multiple ways. They are mostly recognized for their manipulations of host reproduction, yet, more recent studies demonstrate that Wolbachia also impact host behavior, metabolic pathways and immunity. Besides their biological and evolutionary roles, Wolbachia are new potential biological control agents for pest and vector management. Importantly, Wolbachia-based control strategies require controlled symbiont transfer between host species and predictable outcomes of novel Wolbachia-host associations. Theoretically, this artificial horizontal transfer could inflict genetic changes within transferred Wolbachia populations. This could be facilitated through de novo mutations in the novel recipient host or changes of haplotype frequencies of polymorphic Wolbachia populations when transferred from donor to recipient hosts. Here we show that Wolbachia resident in the European cherry fruit fly, Rhagoletis cerasi, exhibit ancestral and cryptic sequence polymorphism in three symbiont genes, which are exposed upon microinjection into the new hosts Drosophila simulans and Ceratitis capitata. Our analyses of Wolbachia in microinjected D. simulans over 150 generations after microinjection uncovered infections with multiple Wolbachia strains in trans-infected lines that had previously been typed as single infections. This confirms the persistence of low-titer Wolbachia strains in microinjection experiments that had previously escaped standard detection techniques. Our study demonstrates that infections by multiple Wolbachia strains can shift in prevalence after artificial host transfer driven by either stochastic or selective processes. Trans-infection of Wolbachia can claim fitness costs in new hosts and we speculate that these costs may have driven the shifts of Wolbachia strains that we saw in our model system.

  2. Bardeen variables and hidden gauge symmetries in linearized massive gravity

    CERN Document Server

    Jaccard, Maud; Mitsou, Ermis

    2012-01-01

    We give a detailed discussion of the use of the (3+1) decomposition and of Bardeen's variables in massive gravity linearized over a Minkowski as well as over a de Sitter background. In Minkowski space the Bardeen "potential" \\Phi, that in the massless case is a non-radiative degree of freedom, becomes radiative and describes the helicity-0 component of the massive graviton. Its dynamics is governed by a simple Klein-Gordon action, supplemented by a term (\\Box \\Phi)^2 if we do not make the Fierz-Pauli tuning of the mass term. In de Sitter the identification of the variable that describes the radiative degree of freedom in the scalar sector is more subtle, and even involves expressions non-local in time. The use of this new variable provides a simple and transparent derivation of the Higuchi bound and of the disappearance of the scalar degree of freedom at a special value of $m_g^2/H^2$. The use of this formalism also allows us to uncover the existence of a hidden gauge symmetry of the massive theory, that beco...

  3. Investigation and analysis on situation of checking and governing the hidden trouble in Zhenjiang New District%镇江新区隐患排查治理现状调查与分析

    Institute of Scientific and Technical Information of China (English)

    刘宏; 吴刚; 程宇和

    2013-01-01

    Base on the research data of 17 indicators,such as the establishment and revision of relevant systems about checking and governing the hidden trouble,the hidden trouble checking frequency and method,the training education of enterprise staff,the hidden trouble governing equipment and material parameter,the record of the hidden trouble governing and other survey data and according to the relevant methods of mathematical statistics,the survey data were analyzed.The results showed that Hong Kong and Taiwan-funded enterprises,foreign-funded enterprises,state-owned enterprises and sino-foreign joint ventures were still having a lack of the revision of relevant system about checking and governing the hidden trouble and the implementation of governing the hidden trouble;The private enterprises were relatively weak in hidden trouble checking and governing,which concentrated in the aspects that the establishment of relevant systems was not reasonable and standardized,lacked of the training and education and the materials investment about hidden trouble checking and governing,and failed the record parameter of the hidden trouble governing.According to issues identified in the research,the establishment of hidden trouble checking and governing information systems were proposed,so as to make use of network technology record the situation of hidden trouble checking and governing in enterprise,to strengthen government regulation on the enterprise and improve the efficiency of enterprise hidden trouble governing.%以隐患排查治理相关制度建立与修订,隐患排查频次及方法,企业员工培训教育,隐患治理设备物资台账,隐患治理跟踪记录等17项指标调研数据为基础,根据数理统计的相关方法,对调研数据进行统计分析.结果表明:港、台资企业、外资企业、国有企业和中外合资企业在隐患排查治理相关制度修订和隐患治理落实方面仍有欠缺;私营企业在隐患排查治理方面相对

  4. Culturing and environmental DNA sequencing uncover hidden kinetoplastid biodiversity and a major marine clade within ancestrally freshwater Neobodo designis.

    Science.gov (United States)

    von der Heyden, Sophie; Cavalier-Smith, Thomas

    2005-11-01

    Bodonid flagellates (class Kinetoplastea) are abundant, free-living protozoa in freshwater, soil and marine habitats, with undersampled global biodiversity. To investigate overall bodonid diversity, kinetoplastid-specific PCR primers were used to amplify and sequence 18S rRNA genes from DNA extracted from 16 diverse environmental samples; of 39 different kinetoplastid sequences, 35 belong to the subclass Metakinetoplastina, where most group with the genus Neobodo or the species Bodo saltans, whilst four group with the subclass Prokinetoplastina (Ichthyobodo). To study divergence between freshwater and marine members of the genus Neobodo, 26 new Neobodo designis strains were cultured and their 18S rRNA genes were sequenced. It is shown that the morphospecies N. designis is a remarkably ancient species complex with a major marine clade nested among older freshwater clades, suggesting that these lineages were constrained physiologically from moving between these environments for most of their long history. Other major bodonid clades show less-deep separation between marine and freshwater strains, but have extensive genetic diversity within all lineages and an apparently biogeographically distinct distribution of B. saltans subclades. Clade-specific 18S rRNA gene primers were used for two N. designis subclades to test their global distribution and genetic diversity. The non-overlap between environmental DNA sequences and those from cultures suggests that there are hundreds, possibly thousands, of different rRNA gene sequences of free-living bodonids globally.

  5. Uncovering hierarchical data structure in single molecule transport

    Science.gov (United States)

    Wu, Ben H.; Ivie, Jeffrey A.; Johnson, Tyler K.; Monti, Oliver L. A.

    2017-03-01

    Interpretation of single molecule transport data is complicated by the fact that all such data are inherently highly stochastic in nature. Features are often broad, seemingly unstructured and distributed over more than an order of magnitude. However, the distribution contains information necessary for capturing the full variety of processes relevant in nanoscale transport, and a better understanding of its hierarchical structure is needed to gain deeper insight into the physics and chemistry of single molecule electronics. Here, we describe a novel data analysis approach based on hierarchical clustering to aid in the interpretation of single molecule conductance-displacement histograms. The primary purpose of statistically partitioning transport data is to provide avenues for unbiased hypothesis generation in single molecule break junction experiments by revealing otherwise potentially hidden aspects in the conductance data. Our approach is generalizable to the analysis of a wide variety of other single molecule experiments in molecular electronics, as well as in single molecule fluorescence spectroscopy, force microscopy, and ion-channel conductance measurements.

  6. DNA barcodes, species delimitation, and bioassessment: issues of diversity, analysis, and standardization

    Science.gov (United States)

    DNA barcoding has the capability to uncover cryptic diversity otherwise undetectable using morphology alone. For aquatic bioassessment, this opportunity to discover hidden biodiversity presents new data for incorporation into environmental monitoring programs. Unfortunately, the ...

  7. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  8. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  9. A Hidden Pitfall for REDD: Analysis of Power Relation in Participatory Forest Management on Whether It Is an Obstacle or a Reliever on REDD Pathway

    Directory of Open Access Journals (Sweden)

    Angelingis Akwilini Makatta

    2015-01-01

    Full Text Available Power relation among stakeholders is a key concept in collaborative approaches. This study aims to examine the reality of the acclaimed power sharing in Participatory Forest Management (PFM and implication of existing power relation to the national REDD+ programme in Tanzania. The study involved a review of PFM policy and legal supporting documents; meta-analysis of previous studies done at two sites known to have succeeded in PFM; and empirical study at Kolo-Hills forests. Methods used include the meta-analysis of existing literature; Household Questionnaire Survey; Focused Group Discussion; and key person unstructured interviews. Results revealed that a large part of the PFM processes involved power struggle instead of power sharing. REDD+ pilot was perceived to have succeeded in improving PFM only in villages where the majority of the community about 70% experienced higher levels of inclusiveness and power balance with other PFM stakeholders in PFM processes. Power imbalance and power struggle were also noted in the REDD+ project adoption processes. Thus power relations exercised under PFM fall under potential obstacle rather than a reliever to the REDD+ programme. The study recommends reviewing of PFM legal frameworks to strengthen community empowerment for effectiveness of REDD+ on PFM platform.

  10. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  11. Skryté kurikulum vo svetle metodologického holizmu a metodologického individualizmu. / Hidden curriculum in the light of methodological holism and methodological individualism.

    Directory of Open Access Journals (Sweden)

    Lukáš Bomba

    2013-02-01

    Full Text Available The article analyses theoretical and methodological problem of hidden curriculum at school. It compares individualistic and holistic approach in connection to research, measurement and analysis of hidden curriculum. The goal of the study is to present the inconsistency in understanding and explaining the concept of hidden curriculum. The inconsistency is grounded in the absence of paradigmatical background. The theories of hidden curriculum are devided into two groups. The first group is grounded in individualistic approach and the second group is grounded in holistic approach. The examples of empirical studies are used as tools to grasp hidden curriculum at school. The study concludes that the deϐinitions and understanding of the concept of hidden curriculum are logical conclusions of methodologicalapproach and empirical investigation of hidden curriculum in research. The methodological approach and empirical investigation reversely constitute the theory of hidden curriculum. The individualistic paradigm grasps hidden curriculum as a an implicit socialization of a child through the actions of individuals in the school. The holistic paradigm understands hidden curriculum as institutionalized nature of ideology or the tool for reproduction of society.

  12. Uncovering transcriptional interactions via an adaptive fuzzy logic approach

    Directory of Open Access Journals (Sweden)

    Chen Chung-Ming

    2009-12-01

    Full Text Available Abstract Background To date, only a limited number of transcriptional regulatory interactions have been uncovered. In a pilot study integrating sequence data with microarray data, a position weight matrix (PWM performed poorly in inferring transcriptional interactions (TIs, which represent physical interactions between transcription factors (TF and upstream sequences of target genes. Inferring a TI means that the promoter sequence of a target is inferred to match the consensus sequence motifs of a potential TF, and their interaction type such as AT or RT is also predicted. Thus, a robust PWM (rPWM was developed to search for consensus sequence motifs. In addition to rPWM, one feature extracted from ChIP-chip data was incorporated to identify potential TIs under specific conditions. An interaction type classifier was assembled to predict activation/repression of potential TIs using microarray data. This approach, combining an adaptive (learning fuzzy inference system and an interaction type classifier to predict transcriptional regulatory networks, was named AdaFuzzy. Results AdaFuzzy was applied to predict TIs using real genomics data from Saccharomyces cerevisiae. Following one of the latest advances in predicting TIs, constrained probabilistic sparse matrix factorization (cPSMF, and using 19 transcription factors (TFs, we compared AdaFuzzy to four well-known approaches using over-representation analysis and gene set enrichment analysis. AdaFuzzy outperformed these four algorithms. Furthermore, AdaFuzzy was shown to perform comparably to 'ChIP-experimental method' in inferring TIs identified by two sets of large scale ChIP-chip data, respectively. AdaFuzzy was also able to classify all predicted TIs into one or more of the four promoter architectures. The results coincided with known promoter architectures in yeast and provided insights into transcriptional regulatory mechanisms. Conclusion AdaFuzzy successfully integrates multiple types of

  13. NLM Grantee's "HealthMap" Helps Uncover Measles Vaccination Gap

    Science.gov (United States)

    ... courtesy of NLM NLM Grantee's "HealthMap" Helps Uncover Measles Vaccination Gap Inadequate vaccine coverage is likely a driving force behind the ongoing Disneyland measles outbreak, according to calculations by a research team ...

  14. An analysis of England's nursing policy on compassion and the 6Cs: the hidden presence of M. Simone Roach's model of caring.

    Science.gov (United States)

    Bradshaw, Ann

    2016-03-01

    In 2012, chief nursing officers (CNO) in England published a policy on compassion in response to serious criticisms of patients' care. Because their objective is fundamentally to shape nursing, this study argues, following Popper, that the policy should be analysed. An appraisal tool, developed from Popper, Gadamer, Jauss and Thiselton, is the framework for this analysis. The CNO policy document identified six values and behaviours, termed '6Cs', required by all nurses, midwives and care staff. The document contains no data, references or acknowledgements, but is similar to the 6Cs defined by the Canadian nursing nun, Sister M. Simone Roach, in her theory of caring published 30 years earlier. Roach considered caring and the components of it, including compassion, to be moral virtues, an inner motivation to care. This study suggests that without explicit reference to Roach's ideas, and her underlying theoretical base, the CNO requirement has the effect of turning virtues into commodities and a form of external control, described by Ritzer as a McDonaldized dehumanization. This study, which has international relevance beyond England and the UK, suggests that the CNO revise their policy by acknowledging Roach's 6Cs and openly discuss the implications of her work for their policy.

  15. Innate health threat among a visibly hidden immigrant group: a formative field data analysis for HIV/AIDS prevention among Zimbabwean workers in Botswana.

    Science.gov (United States)

    Kim, Do Kyun; Chikombero, Mandi; Modie-Moroka, Tirelo

    2013-01-01

    As a result of the collapse of the national economy and political instability, Zimbabwe has experienced a diaspora in recent years. Although Zimbabweans are now the largest immigrant group in most sub-Saharan countries, Zimbabwean immigrants are a mostly illegal and socioeconomically marginalized population. This study explores the lives of Zimbabwean workers in Botswana from a health communication perspective and provides suggestions for accelerating the diffusion of HIV/AIDS prevention information and practices among the target population. In particular, this ethnographic report portrays how the Zimbabwean workers in Botswana make sense of their surroundings and perceive information on HIV/AIDS prevention and other public health risks. Field data analysis highlights several communication features among the immigrants, including reliance on interpersonal communication, high rate of mobile phone adoption, inaccurate public awareness on HIV/AIDS and prevention messages, and stagnated communication with health care services. By connecting Dervin's sensemaking theory to Roger's diffusion of innovations theory, the suggestions from this study can be applied to design HIV/AIDS prevention interventions for the immigrants and socioeconomically marginalized groups.

  16. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  17. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  18. Macroscopic model for biological fixation and its uncover-ing idea in Chinese Mongolian traditional osteopathy

    Institute of Scientific and Technical Information of China (English)

    ZHAO Namula; LI Xue-en; WANG Mei; HU Da-lai

    2009-01-01

    Splintage external fixation in Chinese Mongolian oste-opathy is a biological macroscopic model. In this model, the ideas of self-life "unity of mind and body" and vital natural "correspondence of nature and human" combine the physi-ological and psychological self-fixation with supplementary external fixation of fracture using small splints. This model implies macroscopic ideas of uncovering fixation and healing: structural stability integrating geometrical "dy-namic" stability with mechanical "dynamic" equilibrium and the stability of state integrating statics with dynamics, and osteoblasts with osteoclasts, and psychological stability in-tegrating closed and open systems of human and nature. These ideas indicate a trend of development in modem osteopathy.

  19. Probing Hidden Sector Photons through the Higgs Window.

    OpenAIRE

    Ahlers, M.; Jaeckel, J; Redondo, J.; Ringwald, A.

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light...

  20. Unethical conduct by the nurse: a critical discourse analysis of Nurses Tribunal inquiries.

    Science.gov (United States)

    Dixon, Kathleen A

    2013-08-01

    The aim of this study was to uncover and critically examine hidden assumptions that underpin the findings of nurses' unethical conduct arising from inquiries conducted by the Nurses Tribunal in New South Wales. This was a qualitative study located within a post-structural theoretical framework. Transcripts of five inquiries conducted between 1998 and 2003 were analysed using critical discourse analysis. The findings revealed two dominant discourses that were drawn upon in the inquiries to construct nurses' conduct as unethical. These were discourses of trust and accountability. The way the nurses were spoken about during the inquiries was shaped by normalising judgements that were used to discursively position the nurse through narrative.

  1. Supersymmetric leptogenesis and light hidden sectors

    CERN Document Server

    Weniger, Christoph

    2010-01-01

    Thermal leptogenesis and supergravity are attractive scenarios for physics beyond the standard model. However, it is well known that the super-weak interaction of the gravitino often leads to problems with primordial nucleosynthesis in the standard scenario of matter parity conserving MSSM + three right-handed neutrinos. We will present and compare two related solutions to these problems: 1) The conflict between BBN and leptogenesis can be avoided in presence of a hidden sector with light supersymmetric particles which open new decay channels for the dangerous long-lived particles. 2) If there is a condensate in the hidden sector, such additional decay channels can be alternatively opened by dynamical breaking of matter parity in the hidden sector.

  2. Urban association rules: uncovering linked trips for shopping behavior

    CERN Document Server

    Yoshimura, Yuji; Hobin, Juan N Bautista; Ratti, Carlo; Blat, Josep

    2016-01-01

    In this article, we introduce the method of urban association rules and its uses for extracting frequently appearing combinations of stores that are visited together to characterize shoppers' behaviors. The Apriori algorithm is used to extract the association rules (i.e., if -> result) from customer transaction datasets in a market-basket analysis. An application to our large-scale and anonymized bank card transaction dataset enables us to output linked trips for shopping all over the city: the method enables us to predict the other shops most likely to be visited by a customer given a particular shop that was already visited as an input. In addition, our methodology can consider all transaction activities conducted by customers for a whole city in addition to the location of stores dispersed in the city. This approach enables us to uncover not only simple linked trips such as transition movements between stores but also the edge weight for each linked trip in the specific district. Thus, the proposed methodo...

  3. Losartan ameliorates dystrophic epidermolysis bullosa and uncovers new disease mechanisms.

    Science.gov (United States)

    Nyström, Alexander; Thriene, Kerstin; Mittapalli, Venugopal; Kern, Johannes S; Kiritsi, Dimitra; Dengjel, Jörn; Bruckner-Tuderman, Leena

    2015-07-20

    Genetic loss of collagen VII causes recessive dystrophic epidermolysis bullosa (RDEB)-a severe skin fragility disorder associated with lifelong blistering and disabling progressive soft tissue fibrosis. Causative therapies for this complex disorder face major hurdles, and clinical implementation remains elusive. Here, we report an alternative evidence-based approach to ameliorate fibrosis and relieve symptoms in RDEB. Based on the findings that TGF-β activity is elevated in injured RDEB skin, we targeted TGF-β activity with losartan in a preclinical setting. Long-term treatment of RDEB mice efficiently reduced TGF-β signaling in chronically injured forepaws and halted fibrosis and subsequent fusion of the digits. In addition, proteomics analysis of losartan- vs. vehicle-treated RDEB skin uncovered changes in multiple proteins related to tissue inflammation. In line with this, losartan reduced inflammation and diminished TNF-α and IL-6 expression in injured forepaws. Collectively, the data argue that RDEB fibrosis is a consequence of a cascade encompassing tissue damage, TGF-β-mediated inflammation, and matrix remodeling. Inhibition of TGF-β activity limits these unwanted outcomes and thereby substantially ameliorates long-term symptoms.

  4. Dark Radiation from a hidden U(1)

    CERN Document Server

    Vogel, Hendrik

    2015-01-01

    We discuss the impact of a hidden sector consisting of Minicharged Particles (MCPs) and massless hidden photons on the expansion history of our Universe. We present parameter scans for the amount of extra relativistic particles (Neff) and the abundance of light nuclei for fermionic MCPs with masses between ~100 keV and 10 GeV and minicharges in the range 10^(-11)-1. Current CMB and BBN data significantly constrain the available parameter space of MCPs. The shown results are a valuable indicator for future experimental searches and are presented in a flexible way so that more accurate results on Neff can be easily interpreted.

  5. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...

  6. Hidden Symmetries, Central Charges and All That

    CERN Document Server

    de Wit, Bernard; Wit, Bernard de; Nicolai, Hermann

    2001-01-01

    In this review we discuss hidden symmetries of toroidal compactifications of eleven-dimensional supergravity. We recall alternative versions of this theory which exhibit traces of the hidden symmetries when still retaining the massive Kaluza-Klein states. We reconsider them in the broader perspective of M-theory which incorporates a more extended variety of BPS states. We also argue for a new geometry that may underly these theories. All our arguments point towards an extension of the number of space-time coordinates beyond eleven.

  7. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  8. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  9. Geophysical Investigations at Hidden Dam, Raymond, California Flow Simulations

    Science.gov (United States)

    Minsley, Burke J.; Ikard, Scott

    2010-01-01

    Numerical flow modeling and analysis of observation-well data at Hidden Dam are carried out to supplement recent geophysical field investigations at the site (Minsley and others, 2010). This work also is complementary to earlier seepage-related studies at Hidden Dam documented by Cedergren (1980a, b). Known seepage areas on the northwest right abutment area of the downstream side of the dam was documented by Cedergren (1980a, b). Subsequent to the 1980 seepage study, a drainage blanket with a sub-drain system was installed to mitigate downstream seepage. Flow net analysis provided by Cedergren (1980a, b) suggests that the primary seepage mechanism involves flow through the dam foundation due to normal reservoir pool elevations, which results in upflow that intersects the ground surface in several areas on the downstream side of the dam. In addition to the reservoir pool elevations and downstream surface topography, flow is also controlled by the existing foundation geology as well as the presence or absence of a horizontal drain in the downstream portion of the dam. The current modeling study is aimed at quantifying how variability in dam and foundation hydrologic properties influences seepage as a function of reservoir stage. Flow modeling is implemented using the COMSOL Multiphysics software package, which solves the partially saturated flow equations in a two-dimensional (2D) cross-section of Hidden Dam that also incorporates true downstream topography. Use of the COMSOL software package provides a more quantitative approach than the flow net analysis by Cedergren (1980a, b), and allows for rapid evaluation of the influence of various parameters such as reservoir level, dam structure and geometry, and hydrogeologic properties of the dam and foundation materials. Historical observation-well data are used to help validate the flow simulations by comparing observed and predicted water levels for a range of reservoir elevations. The flow models are guided by, and

  10. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2015-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  11. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  12. The Corporate Illiterates: The Hidden Illiterates of Silicon Valley.

    Science.gov (United States)

    Chase, Sharon

    1991-01-01

    Describes the writing and business communication problems of college-educated workers in Silicon Valley. Discusses hidden illiterates in the universities and in the workplace. Offers solutions for professors and managers faced with the problem of hidden illiterates. (PRA)

  13. Spitzer Digs Up Hidden Stars

    Science.gov (United States)

    2007-01-01

    heated by shockwaves from a previous stellar outburst. By the time these shockwaves reach the end of the jet, they have slowed down so significantly that the gas is only heated a little, and looks red. The combination of views also brings out some striking details that evaded visible-light detection. For example, the yellow dots scattered throughout the image are actually young stars forming inside BHR 71. Spitzer also uncovered another young star with jets, located to the right of the powerful jet seen in the visible-light image. Spitzer can see details that visible-light telescopes don't, because its infrared instruments are sensitive to 'heat.' The infrared image is made up of data from Spitzer's infrared array camera. Blue shows infrared light at 3.6 microns, green is light at 4.5 microns, and red is light at 8.0 microns.

  14. Inference with Constrained Hidden Markov Models in PRISM

    CERN Document Server

    Christiansen, Henning; Lassen, Ole Torp; Petit, Matthieu

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. Defining HMMs with side-constraints in Constraint Logic Programming have advantages in terms of more compact expression and pruning opportunities during inference. We present a PRISM-based framework for extending HMMs with side-constraints and show how well-known constraints such as cardinality and all different are integrated. We experimentally validate our approach on the biologically motivated problem of global pairwise alignment.

  15. Design and Implementation of Domain based Semantic Hidden Web Crawler

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Web is a wide term which mainly consists of surface web and hidden web. One can easily access the surface web using traditional web crawlers, but they are not able to crawl the hidden portion of the web. These traditional crawlers retrieve contents from web pages, which are linked by hyperlinks ignoring the information hidden behind form pages, which cannot be extracted using simple hyperlink structure. Thus, they ignore large amount of data hidden behind search forms. This paper emphasizes o...

  16. Analysis of obstetric nursing safety hidden reasons and preventive measures%妇产科护理安全隐患原因分析及防范措施

    Institute of Scientific and Technical Information of China (English)

    卿立艳

    2015-01-01

    目的:对妇产科护理安全隐患原因及防范措施进行综合分析。方法:采取2013年5月份至2014年7月份期间本院妇产科收治的70例患者,对这70例患者的临床资料进行回顾性分析,综合妇产科护理安全隐患的原因以及防范措施。结果:妇产科护理安全隐患的主要原因有护理人员、患者以及医院制度,通过采取相应的防范措施后,妇产科护理安全隐患明显降低,护理质量有了显著的提高。结论:在妇产科护理工作中,找出护理隐患发生的原因,从而有针对性的采取措施,能有效地降低妇产科护理安全隐患的发生率,提高护理质量,为患者的健康提供保障。%objective to make a comprehensive analysis of the causes of nursing safety hazard and prevention measures of Obstetrics and gynecology.Methods from May to 2014during July 2013 to 70 cases in our hospital patients,the clinical data of70 patients were analyzed retrospectively,reasons of Obstetrics and gynecol-ogy nursing safety hazards and preventive measures.Results the major causes of nursing safety of obstetrics nursing staff,patients and hospital system,by taking appropriate preventive measures,safety andreduce risks of obstetric nursing,the nursing quality was improved significantly.Conclusionin obstetric care,find out the reasons of nursing hidden trouble occurred,and targeted measures,can effectively reduce the obstetrics nursing safety hazard occurrence rate,improve the quality of nursing care,to provide protection for the health of patients.

  17. 人工关节置换术隐性失血量及其相关因素分析%Hidden blood loss after artificial joint replacement and its correlation analysis

    Institute of Scientific and Technical Information of China (English)

    李洪飞; 吕德成; 张卫国; 张羽飞

    2011-01-01

    Objective To calculate the volume and to study the correlated risk factors of hidden blood loss after artificial hip or knee joint replacement. Methods From July to November in 2008, 38patients with age of (65.11±13.51) years old were treated with artificial hip or knee joint replacement, and were divided by age into four groups. Using Gross formula, total blood loss was calculated depending on height, weight and pre- and post-operation hematocrit, and the hidden blood loss was acquired by subtracting the visible blood loss from the total blood loss. The correlation between age,body mass index( BMI),gender and hidden blood blood loss was observed. Differences of hidden blood loss of artificial hip or knee joint replacement were compared. Results The total blood loss of all arthroplasties was ( 1563.52 ± 693.10) ml,and the hidden blood loss was (538.70 ± 529.77) ml,the percentage of hidden blood loss was 33%. The hidden blood loss was inversely related to age (P< 0.05 ). There was no correlation between BMI and hidden blood loss (P>0.05). The percentage of hidden blood loss in total blood loss in woman was significantly higher than that in man. With age and gender paired, the percentage of hidden blood loss in total blood loss in artificial hip joint replacement was significantly higher than that in artificial knee joint replacement (P<0.05 ). Conclusions Both of age and gender are risk factors influencing hidden blood loss after artificial hip or knee joint replacement. And compared with artificial knee joint replacement, the percentage of hidden blood loss in artificial hip joint replacement is higher.%目的 通过计算人工髋关节置换术和人工膝关节置换术隐性失血量,分析其相关的危险因素,并探讨其发生机制.方法 2008年7-11月行人工关节置换术38例,年龄(65.11±13.51)岁,其中人工髋关节置换术25例,人工膝关节置换术13例.根据身高、体质指数和手术前后的红细胞压积计算总失血

  18. Dermatologic hazards from hidden contacts with penicillin

    Energy Technology Data Exchange (ETDEWEB)

    Boonk, W.J.

    1981-01-01

    The unbridled use of penicillin after its discovery by Fleming has resulted in possible hazards to human health due to traces of the drug being present in food and other hidden sources. These hazards may include toxic effects, hypersensitivity reactions and possibly a raising of the frequency and duration of allergy to penicillin.

  19. Computerized Testing: The Hidden Figures Test.

    Science.gov (United States)

    Jacobs, Ronald L.; And Others

    1985-01-01

    This study adapted the Hidden Figures Test for use on PLATO and determined the reliability of the computerized version compared to the paper and pencil version. Results indicate the test was successfully adapted with some modifications, and it was judged reliable although it may be measuring additional constructs. (MBR)

  20. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  1. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves;

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover com...

  2. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements incr

  3. Perceptual consequences of "hidden" hearing loss.

    Science.gov (United States)

    Plack, Christopher J; Barker, Daphne; Prendergast, Garreth

    2014-09-09

    Dramatic results from recent animal experiments show that noise exposure can cause a selective loss of high-threshold auditory nerve fibers without affecting absolute sensitivity permanently. This cochlear neuropathy has been described as hidden hearing loss, as it is not thought to be detectable using standard measures of audiometric threshold. It is possible that hidden hearing loss is a common condition in humans and may underlie some of the perceptual deficits experienced by people with clinically normal hearing. There is some evidence that a history of noise exposure is associated with difficulties in speech discrimination and temporal processing, even in the absence of any audiometric loss. There is also evidence that the tinnitus experienced by listeners with clinically normal hearing is associated with cochlear neuropathy, as measured using Wave I of the auditory brainstem response. To date, however, there has been no direct link made between noise exposure, cochlear neuropathy, and perceptual difficulties. Animal experiments also reveal that the aging process itself, in the absence of significant noise exposure, is associated with loss of auditory nerve fibers. Evidence from human temporal bone studies and auditory brainstem response measures suggests that this form of hidden loss is common in humans and may have perceptual consequences, in particular, regarding the coding of the temporal aspects of sounds. Hidden hearing loss is potentially a major health issue, and investigations are ongoing to identify the causes and consequences of this troubling condition.

  4. Discovering Hidden Treasures with GPS Technology

    Science.gov (United States)

    Nagel, Paul; Palmer, Roger

    2014-01-01

    "I found it!" Addison proudly proclaimed, as she used an iPhone and Global Positioning System (GPS) software to find the hidden geocache along the riverbank. Others in Lisa Bostick's fourth grade class were jealous, but there would be other geocaches to find. With the excitement of movies like "Pirates of the Caribbean" and…

  5. Uncovering Multiple Populations in Globular Clusters with Washington Photometry

    Science.gov (United States)

    Geisler, Douglas; Cummings, Jeff; Villanova, Sandro; Carraro, Giovanni

    2015-01-01

    Globular Clusters (GCs), long considered as ideal Simple Stellar Populations, are now known to harbor a wide variety of chemical inhomogeneities. Multiple populations (MP) are being found in a growing number of Galactic globular clusters (GCs) via both photometric and spectroscopic techniques. Indeed, it has been suggested that a GC is an object that possesses MP. A definitive investigation of MP in GCs will undoubtedly provide a profound improvement in our understanding of their formation and evolution.However, most studies employ either high resolution VLT spectroscopy, HST photometry or inefficient filters from the ground. A ground-based photometric system which is both efficient and effective would be especially excellent for uncovering MP. We demonstrate that the Washington system meets these goals. The Washington C filter, in addition to being specifically designed for the purpose of detecting MPs, is both much broader and redder than competing UV filters, making it far more efficient at detecting MPs and much less sensitive to reddening and extinction.Our analysis of the well-studied GC NGC 1851 shows indeed that the C filter is both very efficient and effective at detecting its previously discovered MPs in the RGB and SGB, using relatively little telescope time on only a 1-meter telescope. Remarkably, we have also detected an intrinsically broad MS best characterized by two distinct but heavily overlapping populations that cannot be explained by binaries, field stars, or photometric errors. Detailed analysis shows that the MS distribution is in very good agreement with that seen on the RGB. This is the first time MPs in a MS have been discovered from the ground, and just as strikingly, using only a 1-meter telescope. The Washington system thus proves to be a very powerful tool for investigating MPs, and holds particular promise for extragalactic objects where photons are limited.

  6. Thermal Behavior of a Single Spent Fuel in Water Pool Storage Under Partially Uncovered Condition

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Woo Ram; Park, Hee Sung; Song, Sub Lee; Lee, Jae Young [Handong Global Univ, Pohang (Korea, Republic of)

    2015-10-15

    LOCA in SFP can be led by a partial drain-down or a boil off scenario. In order to predict the response and consequence in such case, exact model on the partially uncovered SFP has to be established. Most studies on accidents in SFP have been done by safety analysis codes such as ATHLET-CD, ASTEC, MAAP, and MELCOR. However, an experimental investigation has not been conducted so far. Schultz et al.(2014) studied experimentally the response of air cooled BWR fuel assembly which is blocked at lower side fluid path. In this study, we experimentally investigated the thermal response of a partially uncovered single nuclear fuel rod (SNFR) in the SFP. The SNFR was 1/4 scaled down in axial length. 1-dimensional numerical analysis model was developed and compared with the result of experiment. An experimental study was conducted for obtaining transient temperature profile data of a modeled single nuclear fuel rod in heating condition under partially uncovered condition. Numerical prediction model was developed also and the prediction result was compared with the experimental result.

  7. A Systems Biology-Based Approach to Uncovering the Molecular Mechanisms Underlying the Effects of Dragon's Blood Tablet in Colitis, Involving the Integration of Chemical Analysis, ADME Prediction, and Network Pharmacology

    OpenAIRE

    Haiyu Xu; Yanqiong Zhang; Yun Lei; Xiumei Gao; Huaqiang Zhai; Na Lin; Shihuan Tang; Rixin Liang; Yan Ma; Defeng Li; Yi Zhang; Guangrong Zhu; Hongjun Yang; Luqi Huang

    2014-01-01

    Traditional Chinese medicine (TCM) is one of the oldest East Asian medical systems. The present study adopted a systems biology-based approach to provide new insights relating to the active constituents and molecular mechanisms underlying the effects of dragon's blood (DB) tablets for the treatment of colitis. This study integrated chemical analysis, prediction of absorption, distribution, metabolism, and excretion (ADME), and network pharmacology. Firstly, a rapid, reliable, and accurate ult...

  8. Uncovering ecosystem service bundles through social preferences.

    Directory of Open Access Journals (Sweden)

    Berta Martín-López

    Full Text Available Ecosystem service assessments have increasingly been used to support environmental management policies, mainly based on biophysical and economic indicators. However, few studies have coped with the social-cultural dimension of ecosystem services, despite being considered a research priority. We examined how ecosystem service bundles and trade-offs emerge from diverging social preferences toward ecosystem services delivered by various types of ecosystems in Spain. We conducted 3,379 direct face-to-face questionnaires in eight different case study sites from 2007 to 2011. Overall, 90.5% of the sampled population recognized the ecosystem's capacity to deliver services. Formal studies, environmental behavior, and gender variables influenced the probability of people recognizing the ecosystem's capacity to provide services. The ecosystem services most frequently perceived by people were regulating services; of those, air purification held the greatest importance. However, statistical analysis showed that socio-cultural factors and the conservation management strategy of ecosystems (i.e., National Park, Natural Park, or a non-protected area have an effect on social preferences toward ecosystem services. Ecosystem service trade-offs and bundles were identified by analyzing social preferences through multivariate analysis (redundancy analysis and hierarchical cluster analysis. We found a clear trade-off among provisioning services (and recreational hunting versus regulating services and almost all cultural services. We identified three ecosystem service bundles associated with the conservation management strategy and the rural-urban gradient. We conclude that socio-cultural preferences toward ecosystem services can serve as a tool to identify relevant services for people, the factors underlying these social preferences, and emerging ecosystem service bundles and trade-offs.

  9. Testing string vacua in the lab. From a hidden CMB to dark forces in flux compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Cicoli, Michele; Goodsell, Mark; Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Hamburg (Germany). Theory Group; Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenolgy

    2011-03-15

    We perform a detailed analysis of the phenomenological properties of hidden Abelian gauge bosons with a kinetic mixing with the ordinary photon within type IIB flux compactifications. We study the interplay between moduli stabilisation and the Green-Schwarz mechanism that gives mass to the hidden photon paying particular attention to the role of D-terms. We present two generic classes of explicit Calabi-Yau examples with an isotropic and an anisotropic shape of the extra dimensions showing how the last case turns out to be very promising to make contact with current experiments. In fact, anisotropic compactifications lead naturally to a GeV-scale hidden photon (''dark forces'' that can be searched for in beam dump experiments) for an intermediate string scale; or even to an meV-scale hidden photon (which could lead to a ''hidden CMB'' and can be tested by light-shining-through-a-wall experiments) in the case of TeV-scale strings. (orig.)

  10. Extraction of Hidden Social Networks from Wiki-Environment Involved in Information Conflict

    Directory of Open Access Journals (Sweden)

    Rasim M. Alguliyev

    2016-03-01

    Full Text Available Social network analysis is a widely used technique to analyze relationships among wiki-users in Wikipedia. In this paper the method to identify hidden social networks participating in information conflicts in wiki-environment is proposed. In particular, we describe how text clustering techniques can be used for extraction of hidden social networks of wiki-users caused information conflict. By clustering unstructured text articles caused information conflict we create social network of wiki-users. For clustering of the conflict articles a hybrid weighted fuzzy-c-means method is proposed.

  11. Dense baryonic matter in conformally-compensated hidden local symmetry: Vector manifestation and chiral symmetry restoration

    Science.gov (United States)

    Ma, Yong-Liang; Harada, Masayasu; Lee, Hyun Kyu; Oh, Yongseok; Park, Byung-Yoon; Rho, Mannque

    2014-08-01

    We find that, when the dilaton is implemented as a (pseudo-)Nambu-Goldstone boson using a conformal compensator or "conformon" in a hidden gauge symmetric Lagrangian written to O(p4) from which baryons arise as solitons, namely, skyrmions, the vector manifestation and chiral symmetry restoration at high density predicted in hidden local symmetry theory—which is consistent with Brown-Rho scaling—are lost or sent to infinite density. It is shown that they can be restored if in medium the behavior of the ω field is taken to deviate from that of the ρ meson in such a way that the flavor U(2) symmetry is strongly broken at increasing density. The hitherto unexposed crucial role of the ω meson in the structure of elementary baryon and multibaryon systems is uncovered in this work. In the state of half-skyrmions to which the skyrmions transform at a density n1/2≳n0 (where n0 is the normal nuclear matter density), characterized by the vanishing (space averaged) quark condensate but nonzero pion decay constant, the nucleon mass remains more or less constant at a value ≳60% of the vacuum value, indicating a large component of the nucleon mass that is not associated with the spontaneous breaking of chiral symmetry. We discuss its connection to the chiral-invariant mass m0 that figures in the parity-doublet baryon model.

  12. Metabolomic analysis using ultra-performance liquid chromatography-quadrupole-time of flight mass spectrometry (UPLC-Q-TOF MS uncovers the effects of light intensity and temperature under shading treatments on the metabolites in tea.

    Directory of Open Access Journals (Sweden)

    Qunfeng Zhang

    Full Text Available To investigate the effect of light intensity and temperature on the biosynthesis and accumulation of quality-related metabolites, field grown tea plants were shaded by Black Net and Nano-insulating Film (with additional 2-4°C cooling effect with un-shaded plants as a control. Young shoots were subjected to UPLC-Q-TOF MS followed by multivariate statistical analysis. Most flavonoid metabolites (mainly flavan-3-ols, flavonols and their glycosides decreased significantly in the shading treatments, while the contents of chlorophyll, β-carotene, neoxanthin and free amino acids, caffeine, benzoic acid derivatives and phenylpropanoids increased. Comparison between two shading treatments indicated that the lower temperature under Nano shading decreased flavonols and their glycosides but increased accumulation of flavan-3-ols and proanthocyanidins. The comparison also showed a greater effect of temperature on galloylation of catechins than light intensity. Taken together, there might be competition for substrates between the up- and down-stream branches of the phenylpropanoid/flavonoid pathway, which was influenced by light intensity and temperature.

  13. Uncovering randomness and success in society.

    Directory of Open Access Journals (Sweden)

    Sarika Jalan

    Full Text Available An understanding of how individuals shape and impact the evolution of society is vastly limited due to the unavailability of large-scale reliable datasets that can simultaneously capture information regarding individual movements and social interactions. We believe that the popular Indian film industry, "Bollywood", can provide a social network apt for such a study. Bollywood provides massive amounts of real, unbiased data that spans more than 100 years, and hence this network has been used as a model for the present paper. The nodes which maintain a moderate degree or widely cooperate with the other nodes of the network tend to be more fit (measured as the success of the node in the industry in comparison to the other nodes. The analysis carried forth in the current work, using a conjoined framework of complex network theory and random matrix theory, aims to quantify the elements that determine the fitness of an individual node and the factors that contribute to the robustness of a network. The authors of this paper believe that the method of study used in the current paper can be extended to study various other industries and organizations.

  14. Scratching below the surface to uncover HRM practices in Denmark

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Ulhøi, John Parm

    2010-01-01

    firms. The empirical part of this research stems from an ongoing in-depth study aimed at uncovering and describing the relationship between HRM and innovation, highlighting possible areas for misinterpretations that have contributed to the assumption that Danish firms do not prioritize HRM....

  15. Weaving Social Foundations through Dance Pedagogy: A Pedagogy of Uncovering

    Science.gov (United States)

    Barr, Sherrie; Risner, Doug

    2014-01-01

    Today's dance educators enter classrooms populated by increasingly diverse students in which teachers' pedagogical knowledge necessitates heightened understandings of race, ethnicity, social class, gender, and sexuality. Uncovering taken-for-granted assumptions, dominant stereotypes, and educational structures that reproduce social…

  16. Uncovering Students' Thinking about Thinking Using Concept Maps

    Science.gov (United States)

    Ritchhart, Ron; Turner, Terri; Hadar, Linor

    2009-01-01

    A method for uncovering students' thinking about thinking, specifically their meta-strategic knowledge, is explored within the context of an ongoing, multi-year intervention designed to promote the development of students' thinking dispositions. The development of a concept-map instrument that classroom teachers can use and an analytic framework…

  17. Cause analysis and preventive measures of nursing safety hidden trouble in gynaecology and obstetrics%妇产科护理安全隐患原因分析及防范措施

    Institute of Scientific and Technical Information of China (English)

    张琳

    2015-01-01

    Objective:To explore the causes and preventive measures of nursing safety hidden trouble in gynaecology and obstetrics.Methods:35 cases of nursing staff were selected as the research objects.The causes of nursing safety hidden trouble in gynaecology and obstetrics were analyzed,and according to the practical nursing,we developed scientific and feasible prevention programs.Results:The causes of nursing safety hidden trouble in gynaecology and obstetrics included the environmental factors, irregularity of hospital system,nurses lacking good communication consciousness.Conclusion:For the effective prevention of obstetrics and gynecology nursing safety hidden trouble,it needs to strictly follow the rules and regulations of the hospital,regulate the working procedures of nursing staff,and on the basis of reducing the incidence rate of nursing disputes,promote the harmonious construction and long-term development of hospital.%目的:探讨妇产科护理安全隐患的原因及防范措施。方法:选择35名护理人员为研究对象,对妇产科护理安全隐患存在的原因展开分析,并根据实际护理情况,制定出科学、可行的防范方案。结果:妇产科护理安全隐患的原因包括环境、医院制度的不规范性以及护理人员缺乏良好的沟通意识。结论:为有效防止妇产科护理安全隐患的产生,需要严格遵循医院的规章制度,对护理人员的工作程序进行规范,从而在降低护理纠纷发生率的基础上,促进医院和谐建设与长远发展。

  18. Detecting Hidden Diversification Shifts in Models of Trait-Dependent Speciation and Extinction.

    Science.gov (United States)

    Beaulieu, Jeremy M; O'Meara, Brian C

    2016-07-01

    The distribution of diversity can vary considerably from clade to clade. Attempts to understand these patterns often employ state-dependent speciation and extinction models to determine whether the evolution of a particular novel trait has increased speciation rates and/or decreased extinction rates. It is still unclear, however, whether these models are uncovering important drivers of diversification, or whether they are simply pointing to more complex patterns involving many unmeasured and co-distributed factors. Here we describe an extension to the popular state-dependent speciation and extinction models that specifically accounts for the presence of unmeasured factors that could impact diversification rates estimated for the states of any observed trait, addressing at least one major criticism of BiSSE (Binary State Speciation and Extinction) methods. Specifically, our model, which we refer to as HiSSE (Hidden State Speciation and Extinction), assumes that related to each observed state in the model are "hidden" states that exhibit potentially distinct diversification dynamics and transition rates than the observed states in isolation. We also demonstrate how our model can be used as character-independent diversification models that allow for a complex diversification process that is independent of the evolution of a character. Under rigorous simulation tests and when applied to empirical data, we find that HiSSE performs reasonably well, and can at least detect net diversification rate differences between observed and hidden states and detect when diversification rate differences do not correlate with the observed states. We discuss the remaining issues with state-dependent speciation and extinction models in general, and the important ways in which HiSSE provides a more nuanced understanding of trait-dependent diversification.

  19. The Great 1787 Corralero, Oaxaca, Tsunami Uncovered

    Science.gov (United States)

    Ramirez-Herrera, M.; Lagos, M.; Goguitchaichrili, A.; Aguilar, B.; Machain-Castillo, M. L.; Caballero, M.; Ruíz-Fernández, A. C.; Suarez, G.; Ortuño, M.

    2013-05-01

    In 28th March 1787, more than two centuries ago, a deadly tsunami (related to the the San Sixto earthquake) poured over the coast of Oaxaca, Guerrero, and Chiapas, along more than 500 km of the Mexican Pacific coast and up to 6 km inland, the tsunami destroyed mostly farmlands, and livestock and few villages since the density of population was sparse at the time, according to known historical accounts. We report the first geological evidence from the Corralero (Alotengo) lagoon coastal area to support these historical accounts. A transect was made with coring and test pits every 100 m from the coastline and up to 1.6 km inland. The test pits showed an anomalous sand layer that had been deposited in a single event in the swales of a series of beach ridges. The anomalous layer is continuous along the transect, about a 1000 m-long, and is formed of coarse to medium sand, at about 36 to 64 cm depth. It thickness varies, averaging 28 cm in the middle of a swale. Based on the accounts of the 1787 earthquake (M 8.6) and tsunami, we deduced that this might be the evidence of its existence. As the only major tsunami described at that time, the San Sixto earthquake-triggered tsunami. We used the stratigraphy, grain size, microfossils (foraminifera and diatoms), magnetic properties such as magnetic susceptibility, remanent magnetization analyses to reveal the nature of this anomalous sand layer. These proxies support a sudden and rapid event, consisting of sands transported by an extreme sea-wave inland. Further analysis will confirm the estimated age of this event.

  20. Finding cis-regulatory modules in Drosophila using phylogenetic hidden Markov models

    DEFF Research Database (Denmark)

    Wong, Wendy S W; Nielsen, Rasmus

    2007-01-01

    of the increasing availability of comparative genomic data. RESULTS: We develop a method for finding regulatory modules in Eukaryotic species using phylogenetic data. Using computer simulations and analysis of real data, we show that the use of phylogenetic hidden Markov model can lead to an increase in accuracy...

  1. A Generative Approach to the Modeling of Isomorphic Hidden-Figure Items.

    Science.gov (United States)

    Bejar, Isaac I.; Yocom, Peter

    1991-01-01

    An approach to test modeling is illustrated that encompasses both response consistency and response difficulty. This generative approach makes validation an ongoing process. An analysis of hidden figure items with 60 high school students supports the feasibility of the method. (SLD)

  2. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  3. Hidden penis release: adjunctive suprapubic lipectomy.

    Science.gov (United States)

    Horton, C E; Vorstman, B; Teasley, D; Winslow, B

    1987-08-01

    We believe the hidden penis may be caused and concealed by a prominent suprapubic fat pad in addition to the restrictive fibrous bands of the dartos fascia fixing the shaft of the penis proximally while loose skin folds prolapse distally over the phallus. A penis of inadequate length or appearance may affect body image. Patients with this problem often require psychological support. Hidden penis may be distinguished from micropenis by palpating adequate corpora and showing a stretched penile length within 2 SD of normal. Excision of suprapubic fat with sectioning of the tethering dartos bands will release and increase the length of the penis. Suprapubic fat pad resection may also be helpful to elongate a short penis in cases of adult microphallus, or after partial penectomy because of trauma or cancer. Circumcision is contraindicated.

  4. Hidden geometric correlations in real multiplex networks

    Science.gov (United States)

    Kleineberg, Kaj-Kolja; Boguñá, Marián; Ángeles Serrano, M.; Papadopoulos, Fragkiskos

    2016-11-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.

  5. Laser experiments explore the hidden sector

    CERN Document Server

    Ahlers, M; Jaeckel, J; Redondo, J; Ringwald, A

    2007-01-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses <~0.05 eV, the charge is now restricted to be less than (3-4)x10^(-7) times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background.

  6. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  7. Comparative De Novo Transcriptome Analysis of Fertilized Ovules in Xanthoceras sorbifolium Uncovered a Pool of Genes Expressed Specifically or Preferentially in the Selfed Ovule That Are Potentially Involved in Late-Acting Self-Incompatibility.

    Directory of Open Access Journals (Sweden)

    Qingyuan Zhou

    Full Text Available Xanthoceras sorbifolium, a tree species endemic to northern China, has high oil content in its seeds and is recognized as an important biodiesel crop. The plant is characterized by late-acting self-incompatibility (LSI. LSI was found to occur in many angiosperm species and plays an important role in reducing inbreeding and its harmful effects, as do gametophytic self-incompatibility (GSI and sporophytic self-incompatibility (SSI. Molecular mechanisms of conventional GSI and SSI have been well characterized in several families, but no effort has been made to identify the genes involved in the LSI process. The present studies indicated that there were no significant differences in structural and histological features between the self- and cross-pollinated ovules during the early stages of ovule development until 5 days after pollination (DAP. This suggests that 5 DAP is likely to be a turning point for the development of the selfed ovules. Comparative de novo transcriptome analysis of the selfed and crossed ovules at 5 DAP identified 274 genes expressed specifically or preferentially in the selfed ovules. These genes contained a significant proportion of genes predicted to function in the biosynthesis of secondary metabolites, consistent with our histological observations in the fertilized ovules. The genes encoding signal transduction-related components, such as protein kinases and protein phosphatases, are overrepresented in the selfed ovules. X. sorbifolium selfed ovules also specifically or preferentially express many unique transcription factor (TF genes that could potentially be involved in the novel mechanisms of LSI. We also identified 42 genes significantly up-regulated in the crossed ovules compared to the selfed ovules. The expression of all 16 genes selected from the RNA-seq data was validated using PCR in the selfed and crossed ovules. This study represents the first genome-wide identification of genes expressed in the fertilized

  8. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  9. Caldera rim collapse: A hidden volcanic hazard

    OpenAIRE

    Merle, Olivier; Michon, Laurent; Bachèlery, Patrick

    2008-01-01

    International audience; Following the emblematic flank collapse of Mount St Helens in 1981, numerous models of flank sliding have been proposed. These models have allowed to largely improve the understanding of mechanisms involved in such landslides, which represent a tremendous risk for populations living around volcanoes. In this article, a new mode of landslide formation, related to buried calderas, is described. The model emphasizes the paramount importance of the hidden ring fault that, ...

  10. Hidden symmetries in dilaton-axion gravity

    CERN Document Server

    Kechkin, O V

    1996-01-01

    Four--dimensional Einstein--Maxwell--dilaton--axion system restricted to space--times with one non--null Killing symmetry is formulated as the three--dimensional gravity coupled sigma--model. Several alternative representations are discussed and the associated hidden symmetries are revealed. The action of target space isometries on the initial set of (non--dualized ) variables is found. New mulicenter solutions are obtained via generating technique based on the formulation in terms of the non--dualized variables.

  11. Online Learning in Discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2007-01-01

    We present and analyse three online algorithms for learning in discrete Hidden Markov Models (HMMs) and compare them with the Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalisation error we draw learning curves in simplified situations. The performance for learning drifting concepts of one of the presented algorithms is analysed and compared with the Baldi-Chauvin algorithm in the same situations. A brief discussion about learning and symmetry breaking b...

  12. UNCOVERING THE NUCLEUS CANDIDATE FOR NGC 253

    Energy Technology Data Exchange (ETDEWEB)

    Günthardt, G. I.; Camperi, J. A. [Observatorio Astronómico, Universidad Nacional de Córdoba (Argentina); Agüero, M. P. [Observatorio Astronómico, Universidad Nacional de Córdoba, and CONICET (Argentina); Díaz, R. J.; Gomez, P. L.; Schirmer, M. [Gemini Observatory, AURA (United States); Bosch, G., E-mail: gunth@oac.uncor.edu, E-mail: camperi@oac.uncor.edu, E-mail: mpaguero@oac.uncor.edu, E-mail: rdiaz@gemini.edu, E-mail: pgomez@gemini.edu, E-mail: mschirmer@gemini.edu, E-mail: guille@fcaglp.unlp.edu.ar [Instituto de Astrofísica de La Plata (CONICET-UNLP) (Argentina)

    2015-11-15

    NGC 253 is the nearest spiral galaxy with a nuclear starburst that becomes the best candidate for studying the relationship between starburst and active galactic nucleus activity. However, this central region is veiled by large amounts of dust, and it has been so far unclear which is the true dynamical nucleus to the point that there is no strong evidence that the galaxy harbors a supermassive black hole co-evolving with the starburst as was supposed earlier. Near-infrared (NIR) spectroscopy, especially NIR emission line analysis, could be advantageous in shedding light on the true nucleus identity. Using Flamingos-2 at Gemini South we have taken deep K-band spectra along the major axis of the central structure and through the brightest infrared source. In this work, we present evidence showing that the brightest NIR and mid-infrared source in the central region, already known as radio source TH7 and so far considered just a large stellar supercluster, in fact presents various symptoms of a genuine galactic nucleus. Therefore, it should be considered a valid nucleus candidate. Mentioning some distinctive aspects, it is the most massive compact infrared object in the central region, located at 2.″0 of the symmetry center of the galactic bar, as measured in the K-band emission. Moreover, our data indicate that this object is surrounded by a large circumnuclear stellar disk and it is also located at the rotation center of the large molecular gas disk of NGC 253. Furthermore, a kinematic residual appears in the H{sub 2} rotation curve with a sinusoidal shape consistent with an outflow centered in the candidate nucleus position. The maximum outflow velocity is located about 14 pc from TH7, which is consistent with the radius of a shell detected around the nucleus candidate, observed at 18.3 μm (Qa) and 12.8 μm ([Ne ii]) with T-ReCS. Also, the Brγ emission line profile shows a pronounced blueshift and this emission line also has the highest equivalent width at this

  13. Otoendoscopic treatment of hidden lesions in otomastoiditis

    Institute of Scientific and Technical Information of China (English)

    LIU Yang; SUN Jian-jun; LIN Yong-sheng; ZHAO Dan-heng; ZHAO Jing; LEI Fei

    2010-01-01

    Background Surgical treatments for chronic suppurative and cholesteatoma otitis media have been discussed for several decades, but recurrences still occur because of the complex dissection required and hidden lesions associated with otomastoiditis. This study investigated the technology and strategy behind the use of otoendoscopic-assisted otosurgery.Methods We reported on hidden lesions in 32 ears of patients with otomastoiditis between November 2006 and January 2009. All the patients were treated with the aid of an otoendoscope. The advantages of otoendoscopy, including multi-angle light scattering, aperture illumination, and magnification of the local operative field, were utilized in otologic microsurgery, and otoendoscopic operative techniques were introduced for operative sites such as the epitympanum, aditus of the antrum, facial recess, sinus tympani and the mastoid tip.Results All patients were followed up from 3 months to 2 years after surgery. All patients recovered well within 3 months following surgery, except for one case of epithelialization of the mastoid cavity occurring 6 months after surgery for cholesteatoma on the cerebellar surface and another case with Bezold's abscess, hyperplastic granulation tissue developed at the antrum.Conclusions Otoendoscopy can overcome the technical deficiency of rectilinearity of the visual axis associated with otomicroscopic illumination, which presents a problem when dealing with otomastoiditis lesions in hidden areas. This technique allows such lesions within the complex three-dimensional structure to be visualized and cleaned. Otoendoscopy thus has significant potential for improving the quality of surgery and reducing the risk of postoperative recurrence.

  14. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  15. Dark matter in the hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2014-01-01

    The cosmological scenario of the dark matter generated in the hidden gauge theory based on the grand unification is discussed. It is found that the stability of the dark matter halo of our Galaxy and the cosmic ray observation constrain, respectively, the dark matter mass and the unification scale between the standard model and the hidden gauge theory sectors. To obtain a phenomenologically consistent thermal evolution, the entropy of the standard model sector needs to be increased. We therefore propose a scenario where the mini-inflation is induced from the potential coupled to the Standard model sector, in particular the Higgs sector. This scenario makes consistent the current dark matter density as well as the baryon-to-photon ratio for the case of pion dark matter. For the glueball or heavy pion of hidden gauge theory, an additional mini-inflation in the standard model sector before the leptogenesis is required. We also propose the possibility to confirm this scenario by known prospective experimental app...

  16. Uncovering deformation processes from surface displacements

    Science.gov (United States)

    Stramondo, Salvatore

    2013-04-01

    The aim of this talk is to provide an overview about the most recent outcomes in Earth Sciences, describe the role of satellite remote sensing, together with GPS, ground measurement and further data, for geophysical parameter retrieval in well known case studies where the combined approach dealing with the use of two or more techniques/datasets have demonstrated their effectiveness. The Earth Sciences have today a wide availability of instruments and sensors able to provide scientists with an unprecedented capability to study the physical processes driving earthquakes, volcanic eruptions, landslides, and other dynamic Earth systems. Indeed measurements from satellites allow systematic observation of the Earth surface covering large areas, over a long time period and characterized by growing sample intervals. Interferometric Synthetic Aperture Radar (InSAR) technique has demonstrated its effectiveness to investigate processes responsible for crustal faulting stemming from the detection of surface deformation patterns. Indeed using satellite data along ascending and descending orbits, as well as different incident angles, it is possible in principle to retrieve the full 3D character of the ground motion. To such aim the use of GPS stations providing 3D displacement components is a reliable complementary instrument. Finally, offset tracking techniques and Multiple Aperture Interferometry (MAI) may provide a contribution to the analysis of horizontal and NS deformation vectors. The estimation of geophysical parameters using InSAR has been widely discussed in seismology and volcanology, and also applied to deformation associated with groundwater and other subsurface fluids. These applications often involve the solution of an inverse problem, which means the retrieval of optimal source parameters at depth for volcanoes and earthquakes, from the knowledge of surface deformation from InSAR. In recent years, InSAR measurements combined with traditional seismological and

  17. Results from the Solar Hidden Photon Search (SHIPS)

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany); Knabbe, Ernst-Axel; Lindner, Axel [Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, D-22607 Hamburg (Germany); Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik (Werner-Heisenberg-Institut), Föhringer Ring 6, D-80805 München (Germany); Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, D-22607 Hamburg (Germany); Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Günter [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany)

    2015-08-07

    We present the results of a search for transversely polarised hidden photons (HPs) with ∼3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon ↔ HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m{sup 2} at the 95% C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  18. Results from the solar hidden photon search (SHIPS)

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Knabbe, Ernst-Axel; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Zaragoza Univ. (Spain). Dept. de Fisica Teorica; Max-Planck-Institut fuer Physik, Muenchen (Germany)

    2015-02-15

    We present the results of a search for transversely polarised hidden photons (HPs) with ∝3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon<->HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m{sup 2} at the 95%C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  19. Results from the Solar Hidden Photon Search (SHIPS)

    CERN Document Server

    Schwarz, Matthias; Lindner, Axel; Redondo, Javier; Ringwald, Andreas; Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Günter

    2015-01-01

    We present the results of a search for transversely polarised hidden photons (HPs) with $\\sim 3$ eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon$\\leftrightarrow$HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and {330 h} of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m$^2$ at the 95$%$ C.L. Using this and a recent model of solar HP emission, we set stringent constraints on $\\ch...

  20. Hidden temporal order unveiled in stock market volatility variance

    Directory of Open Access Journals (Sweden)

    Y. Shapira

    2011-06-01

    Full Text Available When analyzed by standard statistical methods, the time series of the daily return of financial indices appear to behave as Markov random series with no apparent temporal order or memory. This empirical result seems to be counter intuitive since investor are influenced by both short and long term past market behaviors. Consequently much effort has been devoted to unveil hidden temporal order in the market dynamics. Here we show that temporal order is hidden in the series of the variance of the stocks volatility. First we show that the correlation between the variances of the daily returns and means of segments of these time series is very large and thus cannot be the output of random series, unless it has some temporal order in it. Next we show that while the temporal order does not show in the series of the daily return, rather in the variation of the corresponding volatility series. More specifically, we found that the behavior of the shuffled time series is equivalent to that of a random time series, while that of the original time series have large deviations from the expected random behavior, which is the result of temporal structure. We found the same generic behavior in 10 different stock markets from 7 different countries. We also present analysis of specially constructed sequences in order to better understand the origin of the observed temporal order in the market sequences. Each sequence was constructed from segments with equal number of elements taken from algebraic distributions of three different slopes.

  1. 威金斯煤气柜几种典型危险性隐患原因分析及对策%Analysis of the Causes of Several Typical Hidden Dangers in Wiggins Gasholder and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    丛占柱; 赵琦

    2016-01-01

    威金斯煤气柜在煤气系统运行当中具有十分突出的重要作用.威金斯煤气柜在本钢已经有了超过20年的服役历史,运行实际中,威金斯煤气柜也出现了多种隐患,其中一些尤为典型并具有危险性.结合威金斯煤气柜在本钢20余年的运行经验,分析和总结威金斯煤气柜几种典型危险性隐患的原因及对策,对于掌握威金斯煤气柜缺陷处理及维护具有十分重要的意义.%Wiggins gasholder has a very prominent role in gas system and has served in Benxi Steel for more than 20 years. In the past Wiggins gasholder has had various hidden dangers in actual operation, some of which were quite typical and dangerous. Combining with 20 years of experience, the paper analyzes and summarizes the causes and countermeasures of several typical hidden troubles in Wiggins gasholder, bearing much importance for defect treatment and maintenance of Wiggins gasholder.

  2. Analysis of Typical Hidden Safety Troubles and Characteristics of Old Housings of Shanghai%上海市老旧住房典型安全隐患及特征分析

    Institute of Scientific and Technical Information of China (English)

    朱杰

    2015-01-01

    The safety of old housings, as an important content of urban public safety and operational safety, concerns the safety of people’s life and property. On the basis of old housings inspection work of Shanghai in 2014, this paper teases out typical hidden safety troubles and damage characteristics of old housings of all kinds of structure as well as analyzes main reasons causing safety problems of old housings, thus providing technical support for disposal of hidden safety trouble of old housings of Shanghai.%老旧住房的安全关系到人民群众的生命财产安全,是城市公共安全和运行安全的重要内容。文章以2014年上海市老旧住房安全排查工作为基础,梳理了各种结构类型老旧住房的典型安全隐患及损坏特征,并分析了引起老旧住房安全问题的主要原因,为上海市老旧住房安全隐患处置工作提供技术支持。

  3. Scale-Free Networks Hidden in Chaotic Dynamical Systems

    CERN Document Server

    Iba, Takashi

    2010-01-01

    In this paper, we show our discovery that state-transition networks in several chaotic dynamical systems are "scale-free networks," with a technique to understand a dynamical system as a whole, which we call the analysis for "Discretized-State Transition" (DST) networks; This scale-free nature is found universally in the logistic map, the sine map, the cubic map, the general symmetric map, the sine-circle map, the Gaussian map, and the delayed logistic map. Our findings prove that there is a hidden order in chaos, which has not detected yet. Furthermore, we anticipate that our study opens up a new way to a "network analysis approach to dynamical systems" for understanding complex phenomena.

  4. Mind's historicity: its hidden history.

    Science.gov (United States)

    Pizarroso, Noemí

    2013-02-01

    Whereas psychological research can hardly accept the idea of a changing psychological architecture, mind's historicity seems to be commonplace among historians of psychology, at least in recent decades. Attempts to promote a convergence between psychology and history have always existed, though mainly in the margins of both disciplines. Among these attempts, there is a tradition in French psychology that remains quite marginal even to the history of the discipline and is practically unknown out of the French context. Our goal is to introduce this approach, through the work of its main architect, Ignace Meyerson, to an English speaking reader, in the light of current pleas for historicity. Developed within the core of the discipline of psychology, though in dialogue with many others disciplines, Meyerson's historical psychology appears to be more ambitious than other attempts, as it aims at studying psychological activity itself, beyond the history of its conceptualizations. It is concerned not with the analysis of fragmented, isolated, and mechanistic behaviors or cognitive process, but with the study of mind in its functioning through the multiple and changing fields of experience where human beings are involved.

  5. Structural Analysis Uncovers Lipid-Binding Properties of Notch Ligands

    Directory of Open Access Journals (Sweden)

    Chandramouli R. Chillakuri

    2013-11-01

    Full Text Available The Notch pathway is a core cell-cell signaling system in metazoan organisms with key roles in cell-fate determination, stem cell maintenance, immune system activation, and angiogenesis. Signals are initiated by extracellular interactions of the Notch receptor with Delta/Serrate/Lag-2 (DSL ligands, whose structure is highly conserved throughout evolution. To date, no structure or activity has been associated with the extreme N termini of the ligands, even though numerous mutations in this region of Jagged-1 ligand lead to human disease. Here, we demonstrate that the N terminus of human Jagged-1 is a C2 phospholipid recognition domain that binds phospholipid bilayers in a calcium-dependent fashion. Furthermore, we show that this activity is shared by a member of the other class of Notch ligands, human Delta-like-1, and the evolutionary distant Drosophila Serrate. Targeted mutagenesis of Jagged-1 C2 domain residues implicated in calcium-dependent phospholipid binding leaves Notch interactions intact but can reduce Notch activation. These results reveal an important and previously unsuspected role for phospholipid recognition in control of this key signaling system.

  6. Hidden laser communications through matter. An application of meV-scale hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-04-15

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  7. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  8. Hidden History: A Mobile Application for Discovering Surrounding Landscapes

    OpenAIRE

    2016-01-01

    This thesis work describes the design, development and evaluation of a mobile application called Hidden History. This application lets users discover and explore three types of landscapes (Historic, Scenic and Cultural) using three different modes of discovery (Route, Explore and Tour). Before designing Hidden History, the feature set of other applications that help users explore surrounding landscapes were identified and analyzed. Hidden History was then designed to implement the best fea...

  9. Hidden Photons in Aharonov-Bohm-Type Experiments

    OpenAIRE

    Arias, Paola; Diaz, Christian; Diaz, Marco Aurelio; Jaeckel, Joerg; Koch, Benjamin; Redondo, Javier

    2016-01-01

    We discuss the Aharonov-Bohm effect in the presence of hidden photons kinetically mixed with the ordinary electromagnetic photons. The hidden photon field causes a slight phase shift in the observable interference pattern. It is then shown how the limited sensitivity of this experiment can be largely improved. The key observation is that the hidden photon field causes a leakage of the ordinary magnetic field into the supposedly field-free region. The direct measurement of this magnetic field ...

  10. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  11. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  12. Uncovering Student Ideas in Astronomy 45 Formative Assessment Probes

    CERN Document Server

    Keeley, Page

    2012-01-01

    What do your students know-or think they know-about what causes night and day, why days are shorter in winter, and how to tell a planet from a star? Find out with this book on astronomy, the latest in NSTA's popular Uncovering Student Ideas in Science series. The 45 astronomy probes provide situations that will pique your students' interest while helping you understand how your students think about key ideas related to the universe and how it operates.

  13. Critical scaling in hidden state inference for linear Langevin dynamics

    OpenAIRE

    Bravi, Barbara; Sollich, Peter

    2016-01-01

    We consider the problem of inferring the dynamics of unknown (i.e. hidden) nodes from a set of observed trajectories and we study analytically the average prediction error given by the Extended Plefka Expansion applied to it, as presented in [1]. We focus on a stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings in the infinite network size limit. The expected error on the hidden time courses can be found as the equal-time hidden-to-hidden cova...

  14. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  15. Scaling dimensions in hidden Kerr/CFT

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2011-01-01

    It has been proposed that a hidden conformal field theory (CFT) governs the dynamics of low frequency scattering in a general Kerr black hole background. We further investigate this correspondence by mapping higher order corrections to the massless wave equations in a Kerr background to an expansion within the CFT in terms of higher dimension operators. This implies the presence of infinite towers of CFT primary operators with positive conformal dimensions compatible with unitarity. The exact Kerr background softly breaks the conformal symmetry and the scaling dimensions of these operators run with frequency. The scale-invariant fixed point is dual to a degenerate case of flat spacetime.

  16. Hidden Kerr/CFT at finite frequencies

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2013-01-01

    Massless fields propagating in a generic Kerr black hole background enjoy a hidden SL(2,R)xSL(2,R) symmetry. We determine how the exact mode functions decompose into representations of this symmetry group. This extends earlier results on the low frequency limit of the massless scalar case to finite frequencies and general spin. As an application, we numerically determine the parameters of the representations that appear in quasinormal modes. These results represent a first step to formulating a more precise mapping to a holographic dual conformal field theory for generic black holes.

  17. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  18. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  19. Hidden photon CDM search at Tokyo

    CERN Document Server

    Suzuki, Jun'ya; Horie, Tomoki; Minowa, Makoto

    2015-01-01

    We report on a search for hidden photon cold dark matter (HP CDM) using a novel technique with a dish antenna. We constructed two independent apparatus: one is aiming at the detection of the HP with a mass of $\\sim\\,\\rm{eV}$ which employs optical instruments, and the other is for a mass of $\\sim5\\times10^{-5}\\, \\rm{eV}$ utilizing a commercially available parabolic antenna facing on a plane reflector. From the result of the measurements, we found no evidence for the existence of HP CDM and set upper limits on the photon-HP mixing parameter $\\chi$.

  20. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  1. OFDM System Channel Estimation with Hidden Pilot

    Institute of Scientific and Technical Information of China (English)

    YANG Feng; LIN Cheng-yu; ZHANG Wen-jun

    2007-01-01

    Channel estimation using pilot is common used in OFDM system. The pilot is usually time division multiplexed with the informative sequence. One of the main drawbacks is bandwidth losing. In this paper, a new method was proposed to perform channel estimation in OFDM system. The pilot is arithmetically added to the output of OFDM modulator. Receiver uses the hidden pilot to get an accurate estimation of the channel. Then pilot is removed after channel estimation. The Cramer-Rao lower bound for this method was deprived. The performance of the algorithm is then shown. Compared with traditional methods, the proposed algorithm increases the bandwidth efficiency dramatically.

  2. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  3. Clinical feature analysis of 36 primary lung hidden ball yeast disease%原发性肺隐球酵母菌病36例临床特点分析

    Institute of Scientific and Technical Information of China (English)

    曾能永; 徐云欢; 孔晋亮

    2015-01-01

    Objective To explore the clinical feature of primary lung hidden ball yeast disease and provide basis for clinical diagnosis of primary lung hidden ball yeast disease to reduce misdiagnosis and missed diagnosis. Methods Clinical data feature of pathologically confirmed 36 primary lung hidden ball yeast disease patients from October 2003 to November 2013 of our hospital were retrospectively analyzed.The clinical data feature contained demographic char-acteristic,clinical symptoms,imaging data,therapy method and follow-up results of patients were analyzed. Results A-mong 36 primary lung hidden ball yeast disease patients,34 cases were normal immune function,only 2 cases had ab-normal immune functions;about 50% patients with a clear contact history with poultry waste,without any special contact accounted for 47.22%;clinical symptoms were mainly of cough,expectoration,chest pain and fever,and the incidence rate were respectively 69.44%,44.44%,36.11%and 33.33%,obvious higher than other symptoms.Imaging examination mainly showed in low lung periphery,and were in the majority of consolidation shadows (58.33%) and nodular type (30.56%). Pathological obtained way was mostly application with percutaneous puncture lung biopsy (41.67%).After treated with operation or antifungal and followed-up for 5 to 131 months,no death,general body scattering or local recurrence oc-curred. Conclusion Primary lung hidden ball yeast disease also have a higher morbidity in people without any poultry waste special contact history,most without basic diseases,clinical symptoms were mainly of cough,expectoration,chest pain and fever,imaging mainly shows consolidation shadows and nodular type that close to the subpleural and percuta-neous puncture lung biopsy is an effective way for diagnosis.Operation therapy is feasibility for pathological changes limited patients.Fluconazole is an effective drug of primary lung hidden ball yeast disease.%目的:探讨原发性肺隐球酵母菌病的临床特

  4. Statistical patterns of visual search for hidden objects

    Science.gov (United States)

    Credidio, Heitor F.; Teixeira, Elisângela N.; Reis, Saulo D. S.; Moreira, André A.; Andrade, José S., Jr.

    2012-12-01

    The movement of the eyes has been the subject of intensive research as a way to elucidate inner mechanisms of cognitive processes. A cognitive task that is rather frequent in our daily life is the visual search for hidden objects. Here we investigate through eye-tracking experiments the statistical properties associated with the search of target images embedded in a landscape of distractors. Specifically, our results show that the twofold process of eye movement, composed of sequences of fixations (small steps) intercalated by saccades (longer jumps), displays characteristic statistical signatures. While the saccadic jumps follow a log-normal distribution of distances, which is typical of multiplicative processes, the lengths of the smaller steps in the fixation trajectories are consistent with a power-law distribution. Moreover, the present analysis reveals a clear transition between a directional serial search to an isotropic random movement as the difficulty level of the searching task is increased.

  5. Characterization of prokaryotic and eukaryotic promoters using hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Anders Gorm; Baldi, P.; Chauvin, Y.

    1996-01-01

    that bind to them. We find that HMMs trained on such subclasses of Escherichia coli promoters (specifically, the so-called sigma 70 and sigma 54 classes) give an excellent classification of unknown promoters with respect to sigma-class. HMMs trained on eukaryotic sequences from human genes also model nicely......In this paper we utilize hidden Markov models (HMMs) and information theory to analyze prokaryotic and eukaryotic promoters. We perform this analysis with special emphasis on the fact that promoters are divided into a number of different classes, depending on which polymerase-associated factors...... have at the same time the ability to find clusters and the ability to model the sequential structure in the input data. This is highly relevant in situations where the variance in the data is high, as is the case for the subclass structure in for example promoter sequences....

  6. Combining Wavelet Transform and Hidden Markov Models for ECG Segmentation

    Directory of Open Access Journals (Sweden)

    Jérôme Boudy

    2007-01-01

    Full Text Available This work aims at providing new insights on the electrocardiogram (ECG segmentation problem using wavelets. The wavelet transform has been originally combined with a hidden Markov models (HMMs framework in order to carry out beat segmentation and classification. A group of five continuous wavelet functions commonly used in ECG analysis has been implemented and compared using the same framework. All experiments were realized on the QT database, which is composed of a representative number of ambulatory recordings of several individuals and is supplied with manual labels made by a physician. Our main contribution relies on the consistent set of experiments performed. Moreover, the results obtained in terms of beat segmentation and premature ventricular beat (PVC detection are comparable to others works reported in the literature, independently of the type of the wavelet. Finally, through an original concept of combining two wavelet functions in the segmentation stage, we achieve our best performances.

  7. Hidden Markov modelling of movement data from fish

    DEFF Research Database (Denmark)

    Pedersen, Martin Wæver

    Movement data from marine animals tagged with electronic tags are becoming increasingly diverse and plentiful. This trend entails a need for statistical methods that are able to filter the observations to extract the ecologically relevant content. This dissertation focuses on the development...... and application of hidden Markov models (HMMs) for analysis of movement data from sh. The main contributions are represented by six scientific publications. Estimation of animal location from uncertain and possibly indirect observations is the starting point of most movement data analyses. In this work a discrete...... at the population level and allows ecologists to identify individuals that deviate from the rest of the tagged population. The thesis also deals with geolocation on state-spaces with complicated geometries. Using an unstructured discretisation and the finite element method tortuous shore line geometries are closely...

  8. Survey of Techniques for Deep Web Source Selection and Surfacing the Hidden Web Content

    OpenAIRE

    Khushboo Khurana; M B Chandak

    2016-01-01

    Large and continuously growing dynamic web content has created new opportunities for large-scale data analysis in the recent years. There is huge amount of information that the traditional web crawlers cannot access, since they use link analysis technique by which only the surface web can be accessed. Traditional search engine crawlers require the web pages to be linked to other pages via hyperlinks causing large amount of web data to be hidden from the crawlers. Enormous data is available in...

  9. Review on hidden trouble detection and health diagnosis of hydraulic concrete structures

    Institute of Scientific and Technical Information of China (English)

    WU; ZhongRu; LI; Ji; GU; ChongShi; SU; HuaiZhi

    2007-01-01

    A large number of hydraulic concrete structures have hidden defects such as cracks,erosion,freeze and thaw,thermal fatigue,carbonization.These hidden defects seriously affect the strength,stability and durability of structures.These problems are studied mainly by single monitoring or diagnosis methods at present.The integration of multiple monitoring and diagnosis methods is not applied widely.Besides,the analysis theory on these problems is not developed very well.The systemic study on the aging mechanism of hydraulic concrete structures,timevariation model and health diagnosis is still not enough.The support for engineering practice is limited.Aimed at these major scientific and technological problems and combined with specific projects,study on detection of hidden defects and health diagnosis of hydraulic concrete structure has been carried out.This study includes the following content: field non-destructive examination of hidden defects of hydraulic concrete structures,seepage detection,the construction of in-situ sensing system,the combination of field detection and in-situ monitoring,the mechanism of crack,freeze and thaw,erosion and carbonization of hydraulic concrete structure,mechanism of combination aging; time-variation model of hydraulic concrete structure,theories and methods for health diagnosis of hydraulic concrete structures.

  10. Quantum Hidden Subgroup Problems A Mathematical Perspective

    CERN Document Server

    Lomonaco, S J; Lomonaco, Samuel J.; Kauffman, Louis H.

    2002-01-01

    The ultimate objective of this paper is to create a stepping stone to the development of new quantum algorithms. The strategy chosen is to begin by focusing on the class of abelian quantum hidden subgroup algorithms, i.e., the class of abelian algorithms of the Shor/Simon genre. Our strategy is to make this class of algorithms as mathematically transparent as possible. By the phrase "mathematically transparent" we mean to expose, to bring to the surface, and to make explicit the concealed mathematical structures that are inherently and fundamentally a part of such algorithms. In so doing, we create symbolic abelian quantum hidden subgroup algorithms that are analogous to the those symbolic algorithms found within such software packages as Axiom, Cayley, Maple, Mathematica, and Magma. As a spin-off of this effort, we create three different generalizations of Shor's quantum factoring algorithm to free abelian groups of finite rank. We refer to these algorithms as wandering (or vintage Z_Q) Shor algorithms. They...

  11. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  12. Hidden charm molecules in finite volume

    CERN Document Server

    Albaladejo, Miguel; Nieves, Juan; Oset, Eulogio

    2013-01-01

    In the present paper we address the interaction of pairs of charmed mesons with hidden charm in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and from them some synthetic data are generated. These data are then employed to study the inverse problem of getting the energies of the bound states and phase shifts for $D \\bar D$ or $D^* {\\bar D}^*$. Different strategies are investigated using the lowest two levels for different values of the box size, carrying a study of the errors produced. Starting from the upper level, fits to the synthetic data are carried out to determine the scattering length and effective range plus the binding energy of the ground state. A similar strategy using the effective range formula is considered with a simultaneous fit to the two levels, one above and the other one below threshold. This method turns out to be more...

  13. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  14. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  15. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  16. Women's hidden transcripts about abortion in Brazil.

    Science.gov (United States)

    Nations, M K; Misago, C; Fonseca, W; Correia, L L; Campbell, O M

    1997-06-01

    Two folk medical conditions, "delayed" (atrasada) and "suspended" (suspendida) menstruation, are described as perceived by poor Brazilian women in Northeast Brazil. Culturally prescribed methods to "regulate" these conditions and provoke menstrual bleeding are also described, including ingesting herbal remedies, patent drugs, and modern pharmaceuticals. The ingestion of such self-administered remedies is facilitated by the cognitive ambiguity, euphemisms, folklore, etc., which surround conception and gestation. The authors argue that the ethnomedical conditions of "delayed" and "suspended" menstruation and subsequent menstrual regulation are part of the "hidden reproductive transcript" of poor and powerless Brazilian women. Through popular culture, they voice their collective dissent to the official, public opinion about the illegality and immorality of induced abortion and the chronic lack of family planning services in Northeast Brazil. While many health professionals consider women's explanations of menstrual regulation as a "cover-up" for self-induced abortions, such popular justifications may represent either an unconscious or artful manipulation of hegemonic, anti-abortion ideology expressed in prudent, unobtrusive and veiled ways. The development of safer abortion alternatives should consider women's hidden reproductive transcripts.

  17. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  18. Analysis of High Degree Nodes in a Social Network

    Directory of Open Access Journals (Sweden)

    Nadeem Akhtar

    2013-05-01

    Full Text Available Online Social Network platforms(e.g. Facebook, LinkedIn, Flickr, Instant Messenger etc provide a deeper comprehension of social networks and hence render the basis for social network analysis. The huge amount of data from these sites has given a boost to the researchers who examine a network from different perspectives through various SNA methods. The development of network analysis tools have further helped to extract actionable patterns which are useful for business, consumers, and users. This study is a part of the growing body of research on Social Network Analysis and make use of a Facebook network to analyze the attributes of high degree nodes (users having greater number of friends and to uncover the hidden relationships of that network. Results show that there is little association among high degree nodes

  19. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  20. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    Decker, T.; Draisma, J.; Wocjan, P.

    2009-01-01

    We consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be m-variate po

  1. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in Seuss's…

  2. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  3. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  4. From detecting astrocyte connectivity to uncovering drug effects in living tissues

    CERN Document Server

    Pires, Marcelo; Vaz, Sandra; Sebastião, Ana; Lind, Pedro G

    2013-01-01

    We introduce a simple procedure of multivariate signal analysis to uncover the connectivity structure among cells composing a living tissue and describe how to apply it for extracting insight on the effect of drugs in the tissue. The procedure is based in the covariance matrix of time resolved activity signals. By determining the time-lag that maximizes covariance one derives the weight of the corresponding connection between cells. Introducing simple constraints, it is possible to conclude if pairs of cells are connected or not and in which direction. After testing the method against synthetic data we apply it to study propagation of $Ca^{2+}$ waves in astrocytes, with the aim of uncovering the cell connectivity structure. Our method shows to be particularly suited for this type of networking signal propagation where signals are pulse-like and have short time-delays, and is shown to be superior to standard methods, namely a multivariate Granger algorithm. Finally, based the statistical analysis of the connec...

  5. Secluded Dark Matter Coupled to a Hidden CFT

    CERN Document Server

    von Harling, Benedict

    2012-01-01

    Models of secluded dark matter offer a variant on the standard WIMP picture and can modify our expectations for hidden sector phenomenology and detection. In this work we extend a minimal model of secluded dark matter, comprised of a U(1)'-charged dark matter candidate, to include a confining hidden-sector CFT. This provides a technically natural explanation for the hierarchically small mediator-scale, with hidden-sector confinement generating m_{gamma'}>0. Furthermore, the thermal history of the universe can differ markedly from the WIMP picture due to (i) new annihilation channels, (ii) a (potentially) large number of hidden-sector degrees of freedom, and (iii) a hidden-sector phase transition at temperatures T << M_{dm} after freeze out. The mediator allows both the dark matter and the Standard Model to communicate with the CFT, thus modifying the low-energy phenomenology and cosmic-ray signals from the secluded sector.

  6. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  7. Gauge Coupling Unification with Hidden Photon, and Minicharged Dark Matter

    CERN Document Server

    Daido, Ryuji; Yokozaki, Norimi

    2016-01-01

    We show that gauge coupling unification is realized with a greater accuracy in the presence of a massless hidden photon which has a large kinetic mixing with hypercharge. We solve the renormalization group equations at two-loop level and find that the GUT unification scale is around $10^{16.5}$ GeV which sufficiently suppresses the proton decay rate, and that the unification depends only on the kinetic mixing, but not on the hidden gauge coupling nor the presence of vector-like matter fields charged under U(1)$_H$ and/or SU(5). Matter fields charged under the unbroken hidden U(1)$_H$ are stable and they contribute to dark matter. Interestingly, they become minicharged dark matter which carries a small but non-zero electric charge, if the hidden gauge coupling is tiny. The minicharged dark matter is a natural outcome of the gauge coupling unification with a hidden photon.

  8. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  9. 'Hidden poverty' of teachers: Status, consequences and overcoming strategies

    Directory of Open Access Journals (Sweden)

    Bogunović Blanka

    2008-01-01

    Full Text Available The consequences of reduced financial and other possibilities in the period of social transition are reflected on the quality of life and work of teachers, and thereby indirectly on education of pupils as well. Aims: (1 to determine teachers' estimation of their own financial status and subjective perception of teachers' poverty; (2 to examine in which way the personal perception of poverty of teachers is linked with the quality of their engagement in curricular and extracurricular activities; (3 to examine which economic and psychological strategies teachers use in overcoming stress because of the lower financial status; (4 to examine whether there are differences between teachers with regard to socio-demographic variables and the previously established goals. Sample consists of 141 teachers of music and general education schools in Belgrade and the interior of the country. Method: research is explorative and uses qualitative and psychometric methods of analysis. Results point out to the structure of 'hidden poverty' of teachers: average and poor financial status, financial and logistic support of the extended family, additional job, unfulfilled financial expectations regarding the educational status and ungratified higher needs. Teachers estimate that real poverty of educational system and 'hidden poverty' of teachers are reflected on the quality of certain aspects of educational process as a whole and in certain elements: teacher's personal life and work motivation, authority in school, quality of teacher's engagement in tuition and the possibility of professional specialization. Teachers use financial and psychological strategies for overcoming stress that can be determined as: moralist compensatory, evasive, inappropriate, emotional, relying on family and friendly supportive systems and activist. Conclusion: primarily subjective and spiritual impoverishment of the stratum of highly educated people, who are, in addition to this, the bearers

  10. Uncovering light scalars with exotic Higgs decays to bbmumu

    CERN Document Server

    Curtin, David; Zhong, Yi-Ming

    2014-01-01

    The search for exotic Higgs decays are an essential probe of new physics. In particular, the small width of the Higgs boson makes its decay uniquely sensitive to the existence of light hidden sectors. Here we assess the potential of an exotic Higgs decay search for h -> 2X -> bbmumu to constrain theories with light CP-even (X = s) and CP-odd (X = a) singlet scalars in the mass range of 15 to 60 GeV. This decay channel arises naturally in many scenarios, such as the Standard Model augmented with a singlet, the two-Higgs-doublet model with a singlet (2HDM+S) -- which includes the Next-to-Minimal Supersymmetric Standard Model (NMSSM) -- and in hidden valley models. The 2b2mu channel may represent the best discovery avenue for many models. It has competitive reach, and is less reliant on low-pT b- and tau-reconstruction compared to other channels like 4b, 4tau, and 2tau2mu. We analyze the sensitivity of a 2b2mu search for the 8 and 14 TeV LHC, including the HL-LHC. We consider three types of analyses, employing c...

  11. A Fast SVD-Hidden-nodes based Extreme Learning Machine for Large-Scale Data Analytics.

    Science.gov (United States)

    Deng, Wan-Yu; Bai, Zuo; Huang, Guang-Bin; Zheng, Qing-Hua

    2016-05-01

    Big dimensional data is a growing trend that is emerging in many real world contexts, extending from web mining, gene expression analysis, protein-protein interaction to high-frequency financial data. Nowadays, there is a growing consensus that the increasing dimensionality poses impeding effects on the performances of classifiers, which is termed as the "peaking phenomenon" in the field of machine intelligence. To address the issue, dimensionality reduction is commonly employed as a preprocessing step on the Big dimensional data before building the classifiers. In this paper, we propose an Extreme Learning Machine (ELM) approach for large-scale data analytic. In contrast to existing approaches, we embed hidden nodes that are designed using singular value decomposition (SVD) into the classical ELM. These SVD nodes in the hidden layer are shown to capture the underlying characteristics of the Big dimensional data well, exhibiting excellent generalization performances. The drawback of using SVD on the entire dataset, however, is the high computational complexity involved. To address this, a fast divide and conquer approximation scheme is introduced to maintain computational tractability on high volume data. The resultant algorithm proposed is labeled here as Fast Singular Value Decomposition-Hidden-nodes based Extreme Learning Machine or FSVD-H-ELM in short. In FSVD-H-ELM, instead of identifying the SVD hidden nodes directly from the entire dataset, SVD hidden nodes are derived from multiple random subsets of data sampled from the original dataset. Comprehensive experiments and comparisons are conducted to assess the FSVD-H-ELM against other state-of-the-art algorithms. The results obtained demonstrated the superior generalization performance and efficiency of the FSVD-H-ELM.

  12. Open and hidden agendas of "asymptomatic" patients who request check-up exams

    Directory of Open Access Journals (Sweden)

    Nüesch Reto

    2011-04-01

    Full Text Available Abstract Background Current guidelines for a check-up recommend routine screening not triggered by specific symptoms for some known risk factors and diseases in the general population. Patients' perceptions and expectations regarding a check-up exam may differ from these principles. However, quantitative and qualitative data about the discrepancy between patient- and provider expectations for this type of clinic consultation is lacking. Methods For a year, we prospectively enrolled 66 patients who explicitly requested a "check-up" at our medical outpatient division. All patients actively denied upon prompting having any symptoms or specific health concerns at the time they made their appointment. All consultations were videotaped and analysed for information about spontaneously mentioned symptoms and reasons for the clinic consultation ("open agendas" and for cues to hidden patient agendas using the Roter interaction analysis system (RIAS. Results All patients initially declared to be asymptomatic but this was ultimately the case in only 7 out of 66 patients. The remaining 59 patients spontaneously mentioned a mean of 4.2 ± 3.3 symptoms during their first consultation. In 23 patients a total of 31 hidden agendas were revealed. The primary categories for hidden agendas were health concerns, psychosocial concerns and the patient's concept of disease. Conclusions The majority of patients requesting a general check-up tend to be motivated by specific symptoms and health concerns and are not "asymptomatic" patients who primarily come for preventive issues. Furthermore, physicians must be alert for possible hidden agendas, as one in three patients have one or more hidden reasons for requesting a check-up.

  13. Hidden fungi, emergent properties: endophytes and microbiomes.

    Science.gov (United States)

    Porras-Alfaro, Andrea; Bayman, Paul

    2011-01-01

    Endophytes are microorganisms that live within plant tissues without causing symptoms of disease. They are important components of plant microbiomes. Endophytes interact with, and overlap in function with, other core microbial groups that colonize plant tissues, e.g., mycorrhizal fungi, pathogens, epiphytes, and saprotrophs. Some fungal endophytes affect plant growth and plant responses to pathogens, herbivores, and environmental change; others produce useful or interesting secondary metabolites. Here, we focus on new techniques and approaches that can provide an integrative understanding of the role of fungal endophytes in the plant microbiome. Clavicipitaceous endophytes of grasses are not considered because they have unique properties distinct from other endophytes. Hidden from view and often overlooked, endophytes are emerging as their diversity, importance for plant growth and survival, and interactions with other organisms are revealed.

  14. Wavelet domain hidden markovian bayesian document segmentation

    Institute of Scientific and Technical Information of China (English)

    Sun Junxi; Xiao Changyan; Zhang Su; Chen Yazhu

    2005-01-01

    A novel algorithm for Bayesian document segmentation is proposed based on the wavelet domain hidden Markov tree (HMT) model. Once the parameters of model are known, according to the sequential maximum a posterior probability (SMAP) rule, firstly, the likelihood probability of HMT model for each pattern is computed from fine to coarse procedure. Then, the interscale state transition probability is solved using Expectation Maximum (EM) algorithm based on hybrid-quadtree and multiscale context information is fused from coarse to fine procedure. In order to get pixellevel segmentation, the redundant wavelet domain Gaussian mixture model (GMM) is employed to formulate pixel-level statistical property. The experiment results show that the proposed scheme is feasible and robust.

  15. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  16. Hidden baryons: The physics of Compton composites

    Science.gov (United States)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  17. Aluminium Diphosphamethanides: Hidden Frustrated Lewis Pairs.

    Science.gov (United States)

    Styra, Steffen; Radius, Michael; Moos, Eric; Bihlmeier, Angela; Breher, Frank

    2016-07-04

    The synthesis and characterisation of two aluminium diphosphamethanide complexes, [Al(tBu)2 {κ(2) P,P'-Mes*PCHPMes*}] (3) and [Al(C6 F5 )2 {κ(2) P,P'-Mes*PCHPMes*}] (4), and the silylated analogue, Mes*PCHP(SiMe3 )Mes* (5), are reported. The aluminium complexes feature four-membered PCPAl core structures consisting of diphosphaallyl ligands. The silylated phosphine 5 was found to be a valuable precursor for the synthesis of 4 as it cleanly reacts with the diaryl aluminium chloride [(C6 F5 )2 AlCl]2 . The aluminium complex 3 reacts with molecular dihydrogen at room temperature under formation of the acyclic σ(2) λ(3) ,σ(3) λ(3) -diphosphine Mes*PCHP(H)Mes* and the corresponding dialkyl aluminium hydride [tBu2 AlH]3 . Thus, 3 belongs to the family of so-called hidden frustrated Lewis pairs.

  18. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  19. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  20. Hidden caries’ challenge diagnosis: case report

    Directory of Open Access Journals (Sweden)

    Fernanda Mara de Paiva Bertoli

    2013-06-01

    Full Text Available Introduction: Hidden caries is a term used to describe occlusal dentine caries that is missed on a visual examination, but is large and demineralised enough to be detected by another exam for example, radiographs. Case report: This article reports a case of large dentine caries, which presented as to be a small pit-and-fissure carious lesion on the occlusal surface of the right mandibular permanent first molar in a 10-year-old girl. The treatment included root canal treatment and the sealing of the cavity with composite resin. Conclusion: Careful visual examination, with cleaning and drying of teeth, associated to bitewing radiographs may improve occlusal caries detection. Dentists should examine bitewing radiographs carefully for proximal caries and occlusal demineralization. Radiographs are an effective method of caries diagnosis that can avoid large destruction and allows less invasive treatment.

  1. Nuclear scissors modes and hidden angular momenta

    CERN Document Server

    Balbutsev, E B; Schuck, P

    2016-01-01

    The coupled dynamics of low lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time Dependent Hartree-Fock-Bogoliubov equations. The model of the harmonic oscillator including spin-orbit potential plus quadrupole-quadrupole and spin-spin interactions is considered. New low lying spin dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  2. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  3. Grand unified hidden-sector dark matter

    Science.gov (United States)

    Lonsdale, Stephen J.; Volkas, Raymond R.

    2014-10-01

    We explore G×G unified theories with the visible and the hidden or dark sectors paired under a Z2 symmetry. Developing a system of "asymmetric symmetry breaking" we motivate such models on the basis of their ability to generate dark baryons that are confined with a mass scale just above that of the proton, as motivated by asymmetric dark matter. This difference is achieved from the distinct but related confinement scales that develop in unified theories that have the two factors of G spontaneously breaking in an asymmetric manner. We show how Higgs potentials that admit different gauge group breaking chains in each sector can be constructed, and demonstrate the capacity for generating different fermion mass scales. Lastly we discuss supersymmetric extensions of such schemes.

  4. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments.

  5. Hidden Diversity in Sardines: Genetic and Morphological Evidence for Cryptic Species in the Goldstripe Sardinella, Sardinella gibbosa (Bleeker, 1849)

    Science.gov (United States)

    Thomas, Rey C.; Willette, Demian A.; Carpenter, Kent E.; Santos, Mudjekeewis D.

    2014-01-01

    Cryptic species continue to be uncovered in many fish taxa, posing challenges for fisheries conservation and management. In Sardinella gibbosa, previous investigations revealed subtle intra-species variations, resulting in numerous synonyms and a controversial taxonomy for this sardine. Here, we tested for cryptic diversity within S. gibbosa using genetic data from two mitochondrial and one nuclear gene regions of 248 individuals of S. gibbosa, collected from eight locations across the Philippine archipelago. Deep genetic divergence and subsequent clustering was consistent across both mitochondrial and nuclear markers. Clade distribution is geographically limited: Clade 1 is widely distributed in the central Philippines, while Clade 2 is limited to the northernmost sampling site. In addition, morphometric analyses revealed a unique head shape that characterized each genetic clade. Hence, both genetic and morphological evidence strongly suggests a hidden diversity within this common and commercially-important sardine. PMID:24416271

  6. Hidden diversity in sardines: genetic and morphological evidence for cryptic species in the goldstripe sardinella, Sardinella gibbosa (Bleeker, 1849.

    Directory of Open Access Journals (Sweden)

    Rey C Thomas

    Full Text Available Cryptic species continue to be uncovered in many fish taxa, posing challenges for fisheries conservation and management. In Sardinella gibbosa, previous investigations revealed subtle intra-species variations, resulting in numerous synonyms and a controversial taxonomy for this sardine. Here, we tested for cryptic diversity within S. gibbosa using genetic data from two mitochondrial and one nuclear gene regions of 248 individuals of S. gibbosa, collected from eight locations across the Philippine archipelago. Deep genetic divergence and subsequent clustering was consistent across both mitochondrial and nuclear markers. Clade distribution is geographically limited: Clade 1 is widely distributed in the central Philippines, while Clade 2 is limited to the northernmost sampling site. In addition, morphometric analyses revealed a unique head shape that characterized each genetic clade. Hence, both genetic and morphological evidence strongly suggests a hidden diversity within this common and commercially-important sardine.

  7. PT -breaking threshold in spatially asymmetric Aubry-André and Harper models: Hidden symmetry and topological states

    Science.gov (United States)

    Harter, Andrew K.; Lee, Tony E.; Joglekar, Yogesh N.

    2016-06-01

    Aubry-André-Harper lattice models, characterized by a reflection-asymmetric sinusoidally varying nearest-neighbor tunneling profile, are well known for their topological properties. We consider the fate of such models in the presence of balanced gain and loss potentials ±i γ located at reflection-symmetric sites. We predict that these models have a finite PT -breaking threshold only for specific locations of the gain-loss potential and uncover a hidden symmetry that is instrumental to the finite threshold strength. We also show that the topological edge states remain robust in the PT -symmetry-broken phase. Our predictions substantially broaden the possible experimental realizations of a PT -symmetric system.

  8. An uncovered XIII century icon: particular use of organic pigments and gilding techniques highlighted by analytical methods.

    Science.gov (United States)

    Daveri, Alessia; Doherty, Brenda; Moretti, Patrizia; Grazia, Chiara; Romani, Aldo; Fiorin, Enrico; Brunetti, Brunetto Giovanni; Vagnini, Manuela

    2015-01-25

    The restoration of a panel painting depicting a Madonna and Child listed as an unknown Tuscan artist of the nineteenth century, permitted the hidden original version, a XIII century Medieval icon to be uncovered. It is discovery provided the opportunity for an extensive in situ campaign of non-invasive analytical investigations by portable imaging and spectroscopic techniques (infrared, X-ray fluorescence and diffraction, UV-Vis absorption and emission), followed by aimed micro-destructive investigations (Raman and SEM-EDS). This approach permitted characterization of the original ground and paint layers by complementary techniques. Furthermore, this protocol allowed supplementary particularities of great interest to be highlighted. Namely, numerous original gilding techniques have been accentuated in diverse areas and include the use of surrogate gold (disulphur tin), orpiment as a further false gold and an area with an original silver rich layer. Moreover, pigments including azurite mixed with indigo have been non-invasively identified. Micro-invasive analyses also allowed the diagnosis of organic colorants, namely, an animal anthraquinone lake, kermes and an unusual vegetal chalcone pigment, possibly safflower. The identification of the latter is extremely rare as a painting pigment and has been identified using an innovative adaption to surface enhanced Raman techniques on a cross-section. The resulting data contributes new hypotheses to the historic and artistic knowledge of materials and techniques utilized in XIII century icon paintings and ultimately provides scientific technical support of the recent restoration.

  9. An uncovered XIII century icon: Particular use of organic pigments and gilding techniques highlighted by analytical methods

    Science.gov (United States)

    Daveri, Alessia; Doherty, Brenda; Moretti, Patrizia; Grazia, Chiara; Romani, Aldo; Fiorin, Enrico; Brunetti, Brunetto Giovanni; Vagnini, Manuela

    2015-01-01

    The restoration of a panel painting depicting a Madonna and Child listed as an unknown Tuscan artist of the nineteenth century, permitted the hidden original version, a XIII century Medieval icon to be uncovered. It is discovery provided the opportunity for an extensive in situ campaign of non-invasive analytical investigations by portable imaging and spectroscopic techniques (infrared, X-ray fluorescence and diffraction, UV-Vis absorption and emission), followed by aimed micro-destructive investigations (Raman and SEM-EDS). This approach permitted characterization of the original ground and paint layers by complementary techniques. Furthermore, this protocol allowed supplementary particularities of great interest to be highlighted. Namely, numerous original gilding techniques have been accentuated in diverse areas and include the use of surrogate gold (disulphur tin), orpiment as a further false gold and an area with an original silver rich layer. Moreover, pigments including azurite mixed with indigo have been non-invasively identified. Micro-invasive analyses also allowed the diagnosis of organic colorants, namely, an animal anthraquinone lake, kermes and an unusual vegetal chalcone pigment, possibly safflower. The identification of the latter is extremely rare as a painting pigment and has been identified using an innovative adaption to surface enhanced Raman techniques on a cross-section. The resulting data contributes new hypotheses to the historic and artistic knowledge of materials and techniques utilized in XIII century icon paintings and ultimately provides scientific technical support of the recent restoration.

  10. AdS/QCD approach to the scale invariant extension of the standard model with a strongly interacting hidden sector

    CERN Document Server

    Hatanaka, Hisaki; Ko, Pyungwon

    2016-01-01

    In this paper, we revisit a scale-invariant extension of the standard model (SM) with a strongly interacting hidden sector within AdS/QCD approach. Using the AdS/QCD, we reduce the number of input parameters to three, i.e. hidden pion decay constant, hidden pion mass and $\\tan\\beta$ that is defined as the ratio of the vacuum expectation values (VEV) of the singlet scalar field and the SM Higgs boson. As a result, our model has sharp predictability. We perform the phenomenological analysis of the hidden pions which is one of the dark matter (DM) candidates in this model. With various theoretical and experimental constraints we search for the allowed parameter space and find that both resonance and non-resonance solutions are possible. Some typical correlations among various observables such as thermal relic density of hidden pions, Higgs signal strengths and DM-nucleon cross section are investigated. We provide some benchmark points for experimental tests.

  11. The hidden curriculum in radiology residency programs: A path to isolation or integration?

    Energy Technology Data Exchange (ETDEWEB)

    Van Deven, T. [Department of Medical Imaging, Schulich School of Medicine and Dentistry (Canada); Hibbert, K., E-mail: khibbert@uwo.ca [Faculty of Education, Schulich School of Medicine and Dentistry (Canada); Faden, L. [Faculty of Education, The University of Western Ontario (Canada); Chhem, R.K. [Institute of History, Philosophy and Ethics of Medicine, Ulm University, Ulm (Germany)

    2013-05-15

    Purpose: In this qualitative case study involving five academic Radiology centres across Canada, the authors seek to identify the hidden curriculum. Methods: A qualitative case study methodology was used for its potential to explore and provide rich descriptions and allow for the in-depth analysis of multiple data sources that include official institutional documents, surveys, observations and interviews (including undergraduate students, postgraduate, radiologists, imaging scientists, residents, faculty and administrators). This study relied on 48 interviews and involved primary data analysis by the core research team, and a secondary analysis by external examiners. Results: The results revealed that in four of the five major centres studied, a hidden curriculum of isolation prevailed, reinforcing an image of the radiologist as an independent operator within an organization dependent upon collaboration for optimal performance. The fifth site exhibited a hidden curriculum of collaboration and support, although the messages received were conflicting when addressing issues around teaching. Conclusions: The authors conclude by noting two possibilities for medical imaging departments to consider that of isolation or that of integration. They examine the implications of each and propose a way forward that situates Radiology as the crossroads of medicine. As such, the need for a new, generative metaphor reasserts the importance of recognizing the role and function of scholarship in teaching and learning contexts across Canada.

  12. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  13. Hidden photon dark matter search with large metallic mirror

    Energy Technology Data Exchange (ETDEWEB)

    Doebrich, Babette; Lindner, Axel [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Daumiller, Kai; Engel, Ralph; Roth, Markus [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany); Kowalski, Marek [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Redondo, Javier [Zaragoza Univ. (Spain)

    2014-10-15

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  14. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  15. Suppressing the QCD axion abundance by hidden monopoles

    Directory of Open Access Journals (Sweden)

    Masahiro Kawasaki

    2016-02-01

    Full Text Available We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 1012GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei–Quinn symmetry is spontaneously broken after inflation.

  16. Uncovering Metaethical Assumptions in Bioethical Discourse across Cultures.

    Science.gov (United States)

    Sullivan, Laura Specker

    2016-03-01

    Much of bioethical discourse now takes place across cultures. This does not mean that cross-cultural understanding has increased. Many cross-cultural bioethical discussions are marked by entrenched disagreement about whether and why local practices are justified. In this paper, I argue that a major reason for these entrenched disagreements is that problematic metaethical commitments are hidden in these cross-cultural discourses. Using the issue of informed consent in East Asia as an example of one such discourse, I analyze two representative positions in the discussion and identify their metaethical commitments. I suggest that the metaethical assumptions of these positions result from their shared method of ethical justification: moral principlism. I then show why moral principlism is problematic in cross-cultural analyses and propose a more useful method for pursuing ethical justification across cultures.

  17. 隐性网站资源的开发与利用%Development and Utilization of Hidden Website Resources

    Institute of Scientific and Technical Information of China (English)

    宋希香

    2012-01-01

    The world's developing IT application process,people's information needs of the growing and diversified needs,fast and effective access to network information has become increasingly important.In this paper,the definition of hidden sites,the analysis of the hidden cause and site type,hidden on a Web site development and utilization of resources of the ways and means.%随着全球信息化进程的发展,人们对信息需求的不断增加和需求多元化,快速而有效的获取网络中的所需信息日益重要。文中介绍隐性网站的定义,分析隐性网站产生原因及类型,阐述隐性网站资源开发利用的途径和方法。

  18. Uncovering growth-suppressive MicroRNAs in lung cancer

    DEFF Research Database (Denmark)

    Liu, Xi; Sempere, Lorenzo F; Galimberti, Fabrizio

    2009-01-01

    PURPOSE: MicroRNA (miRNA) expression profiles improve classification, diagnosis, and prognostic information of malignancies, including lung cancer. This study uncovered unique growth-suppressive miRNAs in lung cancer. EXPERIMENTAL DESIGN: miRNA arrays were done on normal lung tissues...... and adenocarcinomas from wild-type and proteasome degradation-resistant cyclin E transgenic mice to reveal repressed miRNAs in lung cancer. Real-time and semiquantitative reverse transcription-PCR as well as in situ hybridization assays validated these findings. Lung cancer cell lines were derived from each...... transgenic line (designated as ED-1 and ED-2 cells, respectively). Each highlighted miRNA was independently transfected into these cells. Growth-suppressive mechanisms were explored. Expression of a computationally predicted miRNA target was examined. These miRNAs were studied in a paired normal...

  19. Uncovering Transcriptional Regulatory Networks by Sparse Bayesian Factor Model

    Directory of Open Access Journals (Sweden)

    Qi Yuan(Alan

    2010-01-01

    Full Text Available Abstract The problem of uncovering transcriptional regulation by transcription factors (TFs based on microarray data is considered. A novel Bayesian sparse correlated rectified factor model (BSCRFM is proposed that models the unknown TF protein level activity, the correlated regulations between TFs, and the sparse nature of TF-regulated genes. The model admits prior knowledge from existing database regarding TF-regulated target genes based on a sparse prior and through a developed Gibbs sampling algorithm, a context-specific transcriptional regulatory network specific to the experimental condition of the microarray data can be obtained. The proposed model and the Gibbs sampling algorithm were evaluated on the simulated systems, and results demonstrated the validity and effectiveness of the proposed approach. The proposed model was then applied to the breast cancer microarray data of patients with Estrogen Receptor positive ( status and Estrogen Receptor negative ( status, respectively.

  20. Laughing It Off: Uncovering the Everyday Work Experience of Nurses

    Directory of Open Access Journals (Sweden)

    Valerie M. Adams

    2007-03-01

    Full Text Available During research towards her doctoral dissertation, the author noticed that nurses understated the conditions in which they worked. Seeking to understand how nursing culture shapes how nurses describe their work, she developed a “toolbox” of reflexive methods. She used metaphors of nursing and emotion expressed as laughter to identify aspects of nursing culture in semistructured interviews with nurses working in Australian residential aged care facilities. She also incorporated autoethnography, as she had worked as a registered nurse while studying economics. The inclusion of her voice in the data illustrates the difference between nursing culture and another worldview. These pluralist methods made explicit some of the effects of gendered socialization, such as understatement and self-consciousness, and demonstrate how they are embedded in nursing culture. Awareness of such norms is important for understanding marketized caring labor. This combination of methods has significance for uncovering workplace culture in other forms of marketized caring.

  1. Charge uncovering effects on flute instabilities in hot electron plasmas

    Energy Technology Data Exchange (ETDEWEB)

    Spong, D.A.

    1985-01-01

    Recent measurements and concurrent theoretical equilibrium models of the ELMO Bumpy Torus (EBT) edge plasma region (as described by E. F. Jaeger et al. in Magnetic Well Depth in EBT and Sensitivity to Hot Electron Ring Geometry, ORNL/TM-9185 (1984)) have indicated that the hot electron ring beta ..beta../sub hot/ at the C-T transition may not always be sufficient to produce the local minimum in the magnetic field thought to be necessary for MHD stability. This has led to the examination of other mechanisms that could account for the observed stability of the T-mode. In this report, an effect known as charge uncovering, which depends not on the value of ..beta../sub hot/ but rather on the ratio n/sub hot//n/sub core/, is studied.

  2. Uncovering Transcriptional Regulatory Networks by Sparse Bayesian Factor Model

    Science.gov (United States)

    Meng, Jia; Zhang, Jianqiu(Michelle); Qi, Yuan(Alan); Chen, Yidong; Huang, Yufei

    2010-12-01

    The problem of uncovering transcriptional regulation by transcription factors (TFs) based on microarray data is considered. A novel Bayesian sparse correlated rectified factor model (BSCRFM) is proposed that models the unknown TF protein level activity, the correlated regulations between TFs, and the sparse nature of TF-regulated genes. The model admits prior knowledge from existing database regarding TF-regulated target genes based on a sparse prior and through a developed Gibbs sampling algorithm, a context-specific transcriptional regulatory network specific to the experimental condition of the microarray data can be obtained. The proposed model and the Gibbs sampling algorithm were evaluated on the simulated systems, and results demonstrated the validity and effectiveness of the proposed approach. The proposed model was then applied to the breast cancer microarray data of patients with Estrogen Receptor positive ([InlineEquation not available: see fulltext.]) status and Estrogen Receptor negative ([InlineEquation not available: see fulltext.]) status, respectively.

  3. TIME HORIZON AND UNCOVERED INTEREST PARITY IN EMERGING ECONOMIES

    Directory of Open Access Journals (Sweden)

    Norlida Hanim Mohd Salleh

    2011-07-01

    Full Text Available The aim of this study is to re-examine the well-known empirical puzzle of uncovered interest parity (UIP for emerging market economies with different prediction time horizons. The empirical results obtained using dynamic panel and time series techniques for monthly data from January 1995 to December 2009 eventually show that the panel data estimates are more powerful than those obtained by applying individual time series estimations and the significant contribution of the exchange rate prediction horizons in determining the status of UIP. This finding reveals that at the longer time horizon, the model has better econometric specification and thus more predictive power for exchange rate movements compared to the shorter time period. The findings can also be a signalling of well-integrated currency markets and a reliable guide to international investors as well as for the orderly conduct of monetary authorities.

  4. Using a Multi-Cathode Counter (MCC) in the Search for Hidden Photon CDM

    CERN Document Server

    Kopylov, A V; Petukhov, V V

    2015-01-01

    We report on a new technique of a Multi-Cathode Counter (MCC) developed to search for hidden photon (HP) cold dark matter (CDM) with a mass from 5 to 10 eV. The method suggested in the assumption that hidden photons of the mass greater than a work function of the metal, the cathode of the counter is fabricated induce emission of single electrons from a cathode. Three configurations of the same counter are used to measure the count rates R1, R2 and R3 of the single electron events sequentially each week, where the difference R1- R2 measures the effect from HP and R3 is used as a reference sequence to monitor the counting process. At present the work is aimed to refine the procedure of data treatment and to look for long term variations which should be accounted for in the final analysis of data.

  5. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  6. Modelling proteins' hidden conformations to predict antibiotic resistance

    Science.gov (United States)

    Hart, Kathryn M.; Ho, Chris M. W.; Dutta, Supratik; Gross, Michael L.; Bowman, Gregory R.

    2016-10-01

    TEM β-lactamase confers bacteria with resistance to many antibiotics and rapidly evolves activity against new drugs. However, functional changes are not easily explained by differences in crystal structures. We employ Markov state models to identify hidden conformations and explore their role in determining TEM's specificity. We integrate these models with existing drug-design tools to create a new technique, called Boltzmann docking, which better predicts TEM specificity by accounting for conformational heterogeneity. Using our MSMs, we identify hidden states whose populations correlate with activity against cefotaxime. To experimentally detect our predicted hidden states, we use rapid mass spectrometric footprinting and confirm our models' prediction that increased cefotaxime activity correlates with reduced Ω-loop flexibility. Finally, we design novel variants to stabilize the hidden cefotaximase states, and find their populations predict activity against cefotaxime in vitro and in vivo. Therefore, we expect this framework to have numerous applications in drug and protein design.

  7. Isovector and hidden-beauty partners of the X(3872)

    Energy Technology Data Exchange (ETDEWEB)

    Høgaasen, Hallstein, E-mail: hallstein.hogasen@fys.uio.no [Department of Physics, University of Oslo, Box 1048, NO-0316 Oslo (Norway); Kou, Emi, E-mail: kou@lal.in2p3.fr [Laboratoire de l' Accélérateur Linéaire, Université Paris-Sud, IN2P3-CNRS, Centre Scientifique d' Orsay, 91898 Orsay Cedex (France); Richard, Jean-Marc, E-mail: j-m.richard@ipnl.in2p3.fr [Université de Lyon, Institut de Physique Nucléaire de Lyon, UCBL–IN2P3-CNRS, 4, rue Enrico Fermi, 69622 Villeurbanne Cedex (France); Sorba, Paul, E-mail: paul.sorba@lapth.cnrs.fr [LAPTh, Laboratoire d' Annecy-le-Vieux de Physique Théorique, CNRS, Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France)

    2014-05-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  8. A Bell-type Theorem Without Hidden Variables

    CERN Document Server

    Stapp, Henry P

    2002-01-01

    Bell's theorem rules out local hidden-variable theories. The locality condition is the demand that what an experimenter freely chooses to measure in one space-time region has no influence in a second space-time region that is spacelike separated from the first. The hidden-variable stipulation means that this demand is implemented through requirements on an assumed-to-exist substructure involving hidden variables. The question thus arises whether the locality condition itself fails, or only its implementation by means of the assumed hidden-variable structure. This paper shows that any theory that satisfies two generally accepted features of orthodox quantum theory and that yields certain predictions of quantum theory cannot satisfy the afore-mentioned locality condition. These two features are that the choices made by the experimenters can be treated as localized free variables and that such free choices do not affect outcomes that have already occurred.

  9. Recent Applications of Hidden Markov Models in Computational Biology

    Institute of Scientific and Technical Information of China (English)

    Khar Heng Choo; Joo Chuan Tong; Louxin Zhang

    2004-01-01

    This paper examines recent developments and applications of Hidden Markov Models (HMMs) to various problems in computational biology, including multiple sequence alignment, homology detection, protein sequences classification, and genomic annotation.

  10. Dark matter in the nonabelian hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2015-01-01

    We discuss the dark matter in the hidden gauge theory. We propose a scenario where the mini-inflation dilutes the dark matter density. This scenario is consistent with the current baryon number asymmetry.

  11. Analyzing Hidden Semantics in Social Bookmarking of Open Educational Resources

    Science.gov (United States)

    Minguillón, Julià

    Web 2.0 services such as social bookmarking allow users to manage and share the links they find interesting, adding their own tags for describing them. This is especially interesting in the field of open educational resources, as delicious is a simple way to bridge the institutional point of view (i.e. learning object repositories) with the individual one (i.e. personal collections), thus promoting the discovering and sharing of such resources by other users. In this paper we propose a methodology for analyzing such tags in order to discover hidden semantics (i.e. taxonomies and vocabularies) that can be used to improve descriptions of learning objects and make learning object repositories more visible and discoverable. We propose the use of a simple statistical analysis tool such as principal component analysis to discover which tags create clusters that can be semantically interpreted. We will compare the obtained results with a collection of resources related to open educational resources, in order to better understand the real needs of people searching for open educational resources.

  12. Discovering Hidden Networks in On-line Social Networks

    Directory of Open Access Journals (Sweden)

    Pooja Wadhwa

    2014-04-01

    Full Text Available Rapid developments in information technology and Web 2.0 have provided a platform for the evolution of terrorist organizations, extremists from a traditional pyramidal structure to a technology enabled networked structure. Growing presence of these subversive groups on social networking sites has emerged as one of the prominent threats to the society, governments and law enforcement agencies across the world. Identifying messages relevant to the domain of security can serve as a stepping stone in criminal network analysis. In this paper, we deploy a rule based approach for classifying messages in Twitter which can also successfully reveal overlapping clusters. The approach incorporates dictionaries of enriched themes where each theme is categorized by semantically related words. The message is vectorized according to the security dictionaries and is termed as ‘Security Vector’. The documents are classified in categories on the basis of security associations. Further, the approach can also be used along the temporal dimension for classifying messages into topics and rank the most prominent topics of conversation at a particular instance of time. We further employ social network analysis techniques to visualize the hidden network at a particular time. Some of the results of our approach obtained through experiment with information network of Twitter are also discussed.

  13. Nonlinear dynamics of hidden modes in a system with internal symmetry

    Science.gov (United States)

    Perchikov, Nathan; Gendelman, O. V.

    2016-09-01

    We consider a discrete dynamical system with internal degrees of freedom (DOF). Due to the symmetry between the internal DOFs, certain internal modes cannot be excited by external forcing (in a case of linear interactions) and thus are considered "hidden". If such a system is weakly asymmetric, the internal modes remain approximately "hidden" from the external excitation, given that small damping is taken into account. However, already in the case of weak cubic nonlinearity, these hidden modes can be excited, even as the exact symmetry is preserved. This excitation occurs through parametric resonance. Floquet analysis reveals instability patterns for the explored modes. To perform this analysis with the required accuracy, we suggest a special method for obtaining the Fourier series of the unperturbed solution for the nonlinear normal mode. This method does not require explicit integration of the arising quadratures. Instead, it employs expansion of the solution at the stage of the implicit quadrature in terms of Chebyshev polynomials. The emerging implicit equations are solved by using a fixed-point iteration scheme. Poincaré sections help to clarify the correspondence between the loss of stability of the modes and the global structure of the dynamical flow. In particular, the conditions for intensive energy exchange in the system are characterized.

  14. Physical nature of a hidden mass in the Universe

    Energy Technology Data Exchange (ETDEWEB)

    Doroshkevich, A.G.; Khlopov, M.Yu. (AN SSSR, Moscow. Inst. Prikladnoj Matematiki)

    1984-04-01

    The problem of an origin of the hidden mass of the Universe is discussed. Observation astronomic data on large-scale Universe structure and hidden mass distribution within the framework of the adiabatic theory of galaxies formation point out the dominance in nowadays Universe of weakly-interacting particles with 15-60 eV mass. Restrictions are obtained for a possible admixture of other relict particles.

  15. Hidden Markov Models with Factored Gaussian Mixtures Densities

    Institute of Scientific and Technical Information of China (English)

    LI Hao-zheng; LIU Zhi-qiang; ZHU Xiang-hua

    2004-01-01

    We present a factorial representation of Gaussian mixture models for observation densities in Hidden Markov Models(HMMs), which uses the factorial learning in the HMM framework. We derive the reestimation formulas for estimating the factorized parameters by the Expectation Maximization (EM) algorithm. We conduct several experiments to compare the performance of this model structure with Factorial Hidden Markov Models(FHMMs) and HMMs, some conclusions and promising empirical results are presented.

  16. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...

  17. Stabilization of stochastic systems with hidden Markovian jumps

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper considers the adaptive control of discrete-time hybrid stochastic systems with unknown randomly jumping parameters described by a finite-state hidden Markov chain. An intuitive yet longstanding conjecture in this area is that such hybrid systems can be adaptively stabilized whenever the rate of transition of the hidden Markov chain is small enough. This paper provides a rigorous positive answer to this conjecture by establishing the global stability of a gradient-algorithm-based adaptive linear-quadratic control.

  18. Hidden Symmetry from Supersymmetry in One-Dimensional Quantum Mechanics

    Directory of Open Access Journals (Sweden)

    Alexander A. Andrianov

    2009-06-01

    Full Text Available When several inequivalent supercharges form a closed superalgebra in Quantum Mechanics it entails the appearance of hidden symmetries of a Super-Hamiltonian. We examine this problem in one-dimensional QM for the case of periodic potentials and potentials with finite number of bound states. After the survey of the results existing in the subject the algebraic and analytic properties of hidden-symmetry differential operators are rigorously elaborated in the Theorems and illuminated by several examples.

  19. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linea...... and thus the proper weight is pruned at each pruning step. In all our experiments in small problems, pruning reduces the generalization error; in most cases the pruned networks facilitate interpretation as well......We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  20. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  1. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  2. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  3. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  4. Reduced-Rank Hidden Markov Models

    CERN Document Server

    Siddiqi, Sajid M; Gordon, Geoffrey J

    2009-01-01

    We introduce the Reduced-Rank Hidden Markov Model (RR-HMM), a generalization of HMMs that can model smooth state evolution as in Linear Dynamical Systems (LDSs) as well as non-log-concave predictive distributions as in continuous-observation HMMs. RR-HMMs assume an m-dimensional latent state and n discrete observations, with a transition matrix of rank k <= m. This implies the dynamics evolve in a k-dimensional subspace, while the shape of the set of predictive distributions is determined by m. Latent state belief is represented with a k-dimensional state vector and inference is carried out entirely in R^k, making RR-HMMs as computationally efficient as k-state HMMs yet more expressive. To learn RR-HMMs, we relax the assumptions of a recently proposed spectral learning algorithm for HMMs (Hsu, Kakade and Zhang 2009) and apply it to learn k-dimensional observable representations of rank-k RR-HMMs. The algorithm is consistent and free of local optima, and we extend its performance guarantees to cover the RR-...

  5. A hidden classical symmetry of QCD

    CERN Document Server

    Glozman, L Ya

    2016-01-01

    The classical part of the QCD partition function (the integrand) has, ignoring irrelevant exact zero modes of the Dirac operator, a local SU(2N_F) \\supset SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A symmetry which is absent at the Lagrangian level. This symmetry is broken anomalously and spontaneously. Effects of spontaneous breaking of chiral symmetry are contained in the near-zero modes of the Dirac operator. If physics of anomaly is also encoded in the same near-zero modes, then their truncation on the lattice should recover a hidden classical SU(2N_F) symmetry in correlators and spectra. This naturally explains observation on the lattice of a large degeneracy of hadrons, that is higher than the SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A chiral symmetry, upon elimination by hands of the lowest-lying modes of the Dirac operator. We also discuss an implication of this symmetry for the high temperature QCD.

  6. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  7. Coulomb gauge model for hidden charm tetraquarks

    Science.gov (United States)

    Xie, W.; Mo, L. Q.; Wang, Ping; Cotanch, Stephen R.

    2013-08-01

    The spectrum of tetraquark states with hidden charm is studied within an effective Coulomb gauge Hamiltonian approach. Of the four independent color schemes, two are investigated, the (qcbar)1(cqbar)1 singlet-singlet (molecule) and the (qc)3(qbarcbar)3 triplet-triplet (diquark), for selected JPC states using a variational method. The predicted masses of triplet-triplet tetraquarks are roughly a GeV heavier than the singlet-singlet states. There is also an interesting flavor dependence with (qqbar)1 (ccbar1) states about half a GeV lighter than (qcbar)1(qbarc)1. The lightest 1++ and 1-- predictions are in agreement with the observed X (3872) and Y (4008) masses suggesting they are molecules with ωJ / ψ and ηhc, rather than D*Dbar* and DDbar, type structure, respectively. Similarly, the lightest isovector 1++ molecule, having a ρJ / ψ flavor composition, has mass near the recently observed charged Zc (3900) value. These flavor configurations are consistent with observed X, Y and Zc decays to ππJ / ψ.

  8. Hidden topological angles and Lefschetz thimbles

    CERN Document Server

    Behtash, Alireza; Schaefer, Thomas; Unsal, Mithat

    2015-01-01

    We demonstrate the existence of hidden topological angles (HTAs) in a large class of quantum field theories and quantum mechanical systems. HTAs are distinct from theta-parameters in the lagrangian. They arise as invariant angle associated with saddle points of the complexified path integral and their descent manifolds (Lefschetz thimbles). Physical effects of HTAs become most transparent upon analytic continuation in $n_f$ to non-integer number of flavors, reducing in the integer $n_f$ limit to a $\\mathbb Z_2$ valued phase difference between dominant saddles. In ${\\cal N}=1$ super Yang-Mills theory we demonstrate the microscopic mechanism for the vanishing of the gluon condensate. The same effect leads to an anomalously small condensate in a QCD-like $SU(N)$ gauge theory with fermions in the two-index representation. The basic phenomenon is that, contrary to folklore, the gluon condensate can receive both positive and negative contributions in a semi-classical expansion. In quantum mechanics, a HTA leads to ...

  9. Hidden Web Data Extraction Using Dynamic Rule Generation

    Directory of Open Access Journals (Sweden)

    Anuradha

    2011-08-01

    Full Text Available World Wide Web is a global information medium of interlinked hypertext documents accessed via computers connected to the internet. Most of the users rely on traditional search engines to search theinformation on the web. These search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called Hidden Web which is hidden to present-day search engines. It lies behind search forms and this part of the web containing an almost endless amount of sources providing high quality information stored in specialized databases can be found in the depths of the WWW. A large amount of this Hidden web is structured i.e Hidden websites contain the information in the form of lists and tables. However visiting dozens of these sites and analyzing the results is very much time consuming task for user. Hence, it is desirable to build a prototype which will minimize user’s effort and give him high quality information in integrated form. This paper proposes a novel method that extracts the data records from the lists and tables of various hidden web sites of same domain using dynamic rule generation and forms a repository which is used for later searching. By searching the data from this repository, user will find the desired data at one place. It reduces the user’s effort to look at various result pages of different hidden websites.

  10. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  11. QCD sum rule study of hidden-charm pentaquarks

    CERN Document Server

    Chen, Hua-Xing; Chen, Wei; Steele, T G; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    We study the mass spectra of hidden-charm pentaquarks having spin $J = {1\\over2},{3\\over2},{5\\over2}$ and quark contents $uud c \\bar c$. We systematically construct all the relevant local hidden-charm pentaquark currents, and select some of them to perform QCD sum rule analyses. We find that the $P_c(4380)$ and $P_c(4450)$ can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. We also find the lowest-lying hidden-charm $J^P = 1/2^-$ pentaquark state of mass $4.33^{+0.17}_{-0.13}$ GeV, while the $J^P = 1/2^+$ mass prediction of 4.7--4.9 GeV is significantly higher. Similarly, the lowest-lying hidden-charm $J^P = 3/2^-$ pentaquark state mass is $4.37^{+0.18}_{-0.13}$ GeV, consistent with the $J^P = 3/2^-$ $P_c(4380)$, while the $J^P = 3/2^+$ is also significantly higher with a mass above 4.6 GeV. The hidden-charm $J^P = 5/2^-$ pentaquark state mass is 4.5--4.6 GeV, slightly larger than the $J^P = 5/2^+$ $P_c(4450)$.

  12. Rotating saddle trap as Foucault's pendulum: a hidden 'Coriolis' force in an inertial frame

    CERN Document Server

    Kirillov, Oleg N

    2016-01-01

    According to Earnshaw's theorem an electrostatic potential cannot have stable equilibria, i.e. the minima, since such potentials are harmonic functions. However, the 1989 Nobel Prize in physics was awarded to W. Paul for his invention of the trap for suspending charged particles in an oscillating electric field. Paul's idea was to stabilize the saddle by "vibrating" the electrostatic field, by analogy with the so-called Stephenson-Kapitsa pendulum in which the upside-down equilibrium is stabilized by vibration of the pivot. Instead of vibration, the saddle can also be stabilized by rotation of the potential (in two dimensions); this has been known for nearly a century, since 1918. Particles confined in rotating saddle traps exhibit precession in the laboratory frame, which up to now has been explained by analyzing explicit solutions. Here we show that this precession is actually due to a hidden Coriolis-like force, which we uncover by a normal form transformation. Unlike the conventional Coriolis force, this ...

  13. Was ist das Hidden Web? Die Entstehung, Eigenschaften und gesellschaftliche Bedeutung von anonymer Kommunikation im Hidden Web.

    OpenAIRE

    Papsdorf, Christian

    2016-01-01

    More than two-and-a-half million people currently use the Tor network to communicate anonymously via the Internet and gain access to online media that are not accessible using standard Internet technology. This sphere of communication can be described as the hidden web. In part because this phenomenon is very recent, the subject has scarcely been studied in the social sciences. It is therefore the purpose of this paper to answer four fundamental questions: What is the hidden web? What charact...

  14. Enzyme kinetics: the whole picture reveals hidden meanings.

    Science.gov (United States)

    Pinto, Maria F; Estevinho, Berta N; Crespo, Rosa; Rocha, Fernando A; Damas, Ana M; Martins, Pedro M

    2015-06-01

    The methodology adopted by Michaelis and Menten in 1913 is still routinely used to characterize the catalytic power and selectivity of enzymes. These kinetic measurements must be performed soon after the purified enzyme is mixed with a large excess of substrate. Other time scales and solution compositions are no less physiologically relevant, but fall outside the range of applicability of the classical formalism. Here we show that the complete picture of an enzyme's mode of function is critically obscured by the limited scope of conventional kinetic analysis, even in the simplest case of a single active site without inhibition. This picture is now unveiled in a mathematically closed form that remains valid over the reaction time for all combinations of enzyme/substrate concentrations and rate constants. Algebraic simplicity is maintained in the new formalism when stationary reaction phases are considered. By achieving this century-old objective, the otherwise hidden role of the reversible binding step is revealed and atypical kinetic profiles are explained. Most singular kinetic behaviors are identified in a critical region of conditions that coincide with typical cell conditions. Because it is not covered by the Michaelis-Menten model, the critical region has been missed until now by low- and high-throughput screenings of new drugs. New possibilities are therefore raised for novel and once-promising inhibitors to therapeutically target enzymes.

  15. Human taeniasis in the Republic of Korea: hidden or gone?

    Science.gov (United States)

    Chai, Jong-Yil

    2013-02-01

    History and current status of human taeniasis in the Republic of Korea, due to Taenia solium, Taenia asiatica, and Taenia saginata, are briefly reviewed. Until the 1980s, human taeniasis had been quite common in various localities of Korea. A study from 1924 reported 12.0% egg prevalence in fecal examinations. Thereafter, the prevalence of Taenia spp. ranged from 3% to 14% depending on the time and locality. Jeju-do, where pigs were reared in a conventional way, was the highest endemic area of taeniasis. An analysis of internal transcribed spacer 2 and mitochondrial cytochrome c oxidase 1 genes of 68 taeniasis cases reported from 1935 to 2005 in Korea by a research group revealed the relative occurrence of the 3 Taenia spp. as follows: T. solium (4.4%), T. asiatica (75.0%), and T. saginata (20.6%). However, national surveys on intestinal helminths conducted every 5 years on randomly selected people revealed that the Taenia egg prevalence dropped from 1.9% in 1971 to 0.02% in 1997 and finally to 0.0% in 2004. With the exception of 3 egg-positive cases reported in 2008 and 2 worm-proven cases in 2011, no more cases have been officially recorded. Based on these surveys and also on other literature, it can be concluded that taeniasis has virtually disappeared from Korea, although a few sporadic cases may remain hidden. Human cysticercosis is also expected to disappear within a couple of decades in Korea.

  16. Fano resonance and the hidden order in URu2 Si 2 probed by quasiparticle scattering spectroscopy*

    Science.gov (United States)

    Park, W. K.; Greene, L. H.; Bauer, E. D.; Tobash, P. H.; Ronning, F.; Lu, X.; Sarrao, J. L.; Thompson, J. D.

    2011-03-01

    The nature of the hidden order transition occurring at 17.5 K in URu 2 Si 2 remains puzzling despite intensive investigations over the past two and half decades. Recent experimental and theoretical developments render it a timely subject to probe the hidden order state using quasiparticle tunneling and scattering techniques. We report on the Fano resonance in pure and Rh-doped URu 2 Si 2 single crystals using point-contact spectroscopy. The conductance spectra reproducibly reveal asymmetric double peak structures slightly off-centered around zero bias with the two peaks merging well above the hidden order transition temperature. An analysis using the Fano resonance model in a Kondo lattice [1] shows that the conductance peaks arise from the hybridization gap opening. Our estimated gap size agrees well with those reported from other measurements. We will present experimental results over a wide parameter space including temperature and doping dependences and discuss their underlying physics. M. Maltseva, M. Dzero, and P. Coleman, Phys. Rev. Lett. 103, 206402 (2009). * The work at UIUC is supported by the U.S. DOE under Award Nos. DE-FG02-07ER46453 and DE-AC02-98CH10886, and the work at LANL is carried out under the auspices of the U.S. DOE, Office of Science.

  17. The perception of the hidden curriculum on medical education: an exploratory study

    Directory of Open Access Journals (Sweden)

    Murakami Manabu

    2009-12-01

    Full Text Available Abstract Background Major curriculum reform of undergraduate medical education occurred during the past decades in the United Kingdom (UK; however, the effects of the hidden curriculum, which influence the choice of primary care as a career, have not been sufficiently recognized. While Japan, where traditionally few institutions systematically foster primary care physicians and very few have truly embraced family medicine as their guiding discipline, has also experienced meaningful curriculum reform, the effect of the hidden curriculum is not well known. The aim of this study is to identify themes pertaining to the students' perceptions of the hidden curriculum affecting undergraduate medical education in bedside learning in Japan. Methods Semi-structured interviews with thematic content analysis were implemented. Undergraduate year-5 students from a Japanese medical school at a Japanese teaching hospital were recruited. Interview were planned to last between 30 to 60 minutes each, over an 8-month period in 2007. The interviewees' perceptions concerning the quality of teaching in their bedside learning and related experiences were collected and analysed thematically. Results Twenty five medical students (18 males and 7 females, mean age 25 years old consented to participate in the interviews, and seven main themes emerged: "the perception of education as having a low priority," "the prevalence of positive/negative role models," "the persistence of hierarchy and exclusivity," "the existence of gender issues," "an overburdened medical knowledge," "human relationships with colleagues and medical team members," and "first experience from the practical wards and their patients." Conclusions Both similarities and differences were found when comparing the results to those of previous studies in the UK. Some effects of the hidden curriculum in medical education likely exist in common between the UK and Japan, despite the differences in their demographic

  18. Foundational Forces & Hidden Variables in Technology Commercialization

    Science.gov (United States)

    Barnett, Brandon

    2011-03-01

    The science of physics seems vastly different from the process of technology commercialization. Physics strives to understand our world through the experimental deduction of immutable laws and dependent variables and the resulting macro-scale phenomenon. In comparison, the~goal of business is to make a profit by addressing the needs, preferences, and whims of individuals in a market. It may seem that this environment is too dynamic to identify all the hidden variables and deduct the foundational forces that impact a business's ability to commercialize innovative technologies. One example of a business ``force'' is found in the semiconductor industry. In 1965, Intel co-founder Gordon Moore predicted that the number of transistors incorporated in a chip will approximately double every 24 months. Known as Moore's Law, this prediction has become the guiding principle for the semiconductor industry for the last 40 years. Of course, Moore's Law is not really a law of nature; rather it is the result of efforts by Intel and the entire semiconductor industry. A closer examination suggests that there are foundational principles of business that underlie the macro-scale phenomenon of Moore's Law. Principles of profitability, incentive, and strategic alignment have resulted in a coordinated influx of resources that has driven technologies to market, increasing the profitability of the semiconductor industry and optimizing the fitness of its participants. New innovations in technology are subject to these same principles. So, in addition to traditional market forces, these often unrecognized forces and variables create challenges for new technology commercialization. In this talk, I will draw from ethnographic research, complex adaptive theory, and industry data to suggest a framework with which to think about new technology commercialization. Intel's bio-silicon initiative provides a case study.

  19. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  20. Disease surveillance using a hidden Markov model

    Directory of Open Access Journals (Sweden)

    Wright Graeme

    2009-08-01

    Full Text Available Abstract Background Routine surveillance of disease notification data can enable the early detection of localised disease outbreaks. Although hidden Markov models (HMMs have been recognised as an appropriate method to model disease surveillance data, they have been rarely applied in public health practice. We aimed to develop and evaluate a simple flexible HMM for disease surveillance which is suitable for use with sparse small area count data and requires little baseline data. Methods A Bayesian HMM was designed to monitor routinely collected notifiable disease data that are aggregated by residential postcode. Semi-synthetic data were used to evaluate the algorithm and compare outbreak detection performance with the established Early Aberration Reporting System (EARS algorithms and a negative binomial cusum. Results Algorithm performance varied according to the desired false alarm rate for surveillance. At false alarm rates around 0.05, the cusum-based algorithms provided the best overall outbreak detection performance, having similar sensitivity to the HMMs and a shorter average time to detection. At false alarm rates around 0.01, the HMM algorithms provided the best overall outbreak detection performance, having higher sensitivity than the cusum-based Methods and a generally shorter time to detection for larger outbreaks. Overall, the 14-day HMM had a significantly greater area under the receiver operator characteristic curve than the EARS C3 and 7-day negative binomial cusum algorithms. Conclusion Our findings suggest that the HMM provides an effective method for the surveillance of sparse small area notifiable disease data at low false alarm rates. Further investigations are required to evaluation algorithm performance across other diseases and surveillance contexts.

  1. Uncovering Aberrant Mutant PKA Function with Flow Cytometric FRET

    Directory of Open Access Journals (Sweden)

    Shin-Rong Lee

    2016-03-01

    Full Text Available Biology has been revolutionized by tools that allow the detection and characterization of protein-protein interactions (PPIs. Förster resonance energy transfer (FRET-based methods have become particularly attractive as they allow quantitative studies of PPIs within the convenient and relevant context of living cells. We describe here an approach that allows the rapid construction of live-cell FRET-based binding curves using a commercially available flow cytometer. We illustrate a simple method for absolutely calibrating the cytometer, validating our binding assay against the gold standard isothermal calorimetry (ITC, and using flow cytometric FRET to uncover the structural and functional effects of the Cushing-syndrome-causing mutation (L206R on PKA’s catalytic subunit. We discover that this mutation not only differentially affects PKAcat’s binding to its multiple partners but also impacts its rate of catalysis. These findings improve our mechanistic understanding of this disease-causing mutation, while illustrating the simplicity, general applicability, and power of flow cytometric FRET.

  2. Uncovering disassortativity in large scale-free networks

    Science.gov (United States)

    Litvak, Nelly; van der Hofstad, Remco

    2013-02-01

    Mixing patterns in large self-organizing networks, such as the Internet, the World Wide Web, and social and biological networks, are often characterized by degree-degree dependencies between neighboring nodes. In this paper, we propose a new way of measuring degree-degree dependencies. One of the problems with the commonly used assortativity coefficient is that in disassortative networks its magnitude decreases with the network size. We mathematically explain this phenomenon and validate the results on synthetic graphs and real-world network data. As an alternative, we suggest to use rank correlation measures such as Spearman's ρ. Our experiments convincingly show that Spearman's ρ produces consistent values in graphs of different sizes but similar structure, and it is able to reveal strong (positive or negative) dependencies in large graphs. In particular, we discover much stronger negative degree-degree dependencies in Web graphs than was previously thought. Rank correlations allow us to compare the assortativity of networks of different sizes, which is impossible with the assortativity coefficient due to its genuine dependence on the network size. We conclude that rank correlations provide a suitable and informative method for uncovering network mixing patterns.

  3. Charting the Vasculome: Uncovering the Principles of Vascular Organization

    Science.gov (United States)

    Oppenheim, Jacob; Magnasco, Marcelo

    2014-03-01

    The efficient distribution of resources in any system requires a carefully designed architecture that is both space filling and efficient. While the principles of such networks are beginning to be uncovered in plants, they remain poorly elucidated in the case of higher animals. We have developed a high-throughput, easily implemented method of mapping vascular networks in mammalian tissue. By combining high resolution, rapid fluorescence blockface imaging with serial sectioning, we are able to map the vasculature of the rat liver at a resolution of 10 microns, revealing the structure above the level of the capillaries, constituting the largest vascular dataset yet assembled. We have developed algorithms for the efficient three-dimensional reconstruction from two-dimensional images, allowing skeletonization and investigation of its geometry and topology. We are able to calculate the scaling properties of these networks as well as the frequency of loops at each level. Using sophisticated topological tools, we are beginning to elucidate the principles of their organization. Ultimately, a greater understanding of vasculature is necessary for the success of efforts in synthetic and regenerative biology along with the better understanding of the growth and development of cancers.

  4. Greenhouse gas emissions from shallow uncovered coal seams

    Institute of Scientific and Technical Information of China (English)

    Saghafi Abouna

    2014-01-01

    This study discusses a method of quantifying emissions from surface coal mining that has been trialled in Australia. The method is based on direct measurement of surface emissions from uncovered coal seams in mine pits, concurrent measurement of residual gas content of blasted coal in mine pits, and measurement of pre-mining gas content of the same seam from cores retrieved from exploration boreholes drilled away from active mining. The results from one of the mines studied are presented in this paper. In this mine, the pre-mining gas content of the target seam was measured using cores from an exploration borehole away from active mining. Gas content varied from 0.7 to 0.8 m3/t and gas composition varied from 16% to 21% CH4 (84-79% CO2). In-pit measurements included seam surface emissions and residual gas content of blasted and ripped coal. Residual gas content varied from 0.09 to 0.15 m3/t, less than twofold across the mine pit. Composition of the residual gas was in general 90%CO2 and 10%CH4, with slight var-iation between samples. Coal seam surface emissions varied from 1.03 to 7.50 mL of CO2-e per minute and per square meter of the coal seam surface, a sevenfold variation across the mine pit.

  5. Uncovering patterns of technology use in consumer health informatics.

    Science.gov (United States)

    Hung, Man; Conrad, Jillian; Hon, Shirley D; Cheng, Christine; Franklin, Jeremy D; Tang, Philip

    2013-11-01

    Internet usage and accessibility has grown at a staggering rate, influencing technology use for healthcare purposes. The amount of health information technology (Health IT) available through the Internet is immeasurable and growing daily. Health IT is now seen as a fundamental aspect of patient care as it stimulates patient engagement and encourages personal health management. It is increasingly important to understand consumer health IT patterns including who is using specific technologies, how technologies are accessed, factors associated with use, and perceived benefits. To fully uncover consumer patterns it is imperative to recognize common barriers and which groups they disproportionately affect. Finally, exploring future demand and predictions will expose significant opportunities for health IT. The most frequently used health information technologies by consumers are gathering information online, mobile health (mHealth) technologies, and personal health records (PHRs). Gathering health information online is the favored pathway for healthcare consumers as it is used by more consumers and more frequently than any other technology. In regard to mHealth technologies, minority Americans, compared with White Americans utilize social media, mobile Internet, and mobile applications more frequently. Consumers believe PHRs are the most beneficial health IT. PHR usage is increasing rapidly due to PHR integration with provider health systems and health insurance plans. Key issues that have to be explicitly addressed in health IT are privacy and security concerns, health literacy, unawareness, and usability. Privacy and security concerns are rated the number one reason for the slow rate of health IT adoption.

  6. Constraints on Hidden Photon Models from Electron g-2 and Hydrogen Spectroscopy

    CERN Document Server

    Endo, Motoi; Mishima, Go

    2012-01-01

    The hidden photon model is one of the simplest models which can explain the anomaly of the muon anomalous magnetic moment (g-2). The experimental constraints are studied in detail, which come from the electron g-2 and the hydrogen transition frequencies. The input parameters are set carefully in order to take dark photon contributions into account and to prevent the analysis from being self-inconsistent. It is shown that the new analysis provides a constraint severer by more than one order of magnitude than the previous result.

  7. Hidden Gauge Structure of Supersymmetric Free Differential Algebras

    CERN Document Server

    Andrianopoli, L; Ravera, L

    2016-01-01

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q' introduced in Ref. [3] and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B^(2) and B^(3) in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of t...

  8. Riboswitch Detection Using Profile Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Krishnamachari A

    2009-10-01

    Full Text Available Abstract Background Riboswitches are a type of noncoding RNA that regulate gene expression by switching from one structural conformation to another on ligand binding. The various classes of riboswitches discovered so far are differentiated by the ligand, which on binding induces a conformational switch. Every class of riboswitch is characterized by an aptamer domain, which provides the site for ligand binding, and an expression platform that undergoes conformational change on ligand binding. The sequence and structure of the aptamer domain is highly conserved in riboswitches belonging to the same class. We propose a method for fast and accurate identification of riboswitches using profile Hidden Markov Models (pHMM. Our method exploits the high degree of sequence conservation that characterizes the aptamer domain. Results Our method can detect riboswitches in genomic databases rapidly and accurately. Its sensitivity is comparable to the method based on the Covariance Model (CM. For six out of ten riboswitch classes, our method detects more than 99.5% of the candidates identified by the much slower CM method while being several hundred times faster. For three riboswitch classes, our method detects 97-99% of the candidates relative to the CM method. Our method works very well for those classes of riboswitches that are characterized by distinct and conserved sequence motifs. Conclusion Riboswitches play a crucial role in controlling the expression of several prokaryotic genes involved in metabolism and transport processes. As more and more new classes of riboswitches are being discovered, it is important to understand the patterns of their intra and inter genomic distribution. Understanding such patterns will enable us to better understand the evolutionary history of these genetic regulatory elements. However, a complete picture of the distribution pattern of riboswitches will emerge only after accurate identification of riboswitches across genomes

  9. A hidden efficacy of seemingly unproductive production

    Science.gov (United States)

    Kapur, Manu

    Contrary to the fairly established notion in the learning sciences that un-scaffolded, ill-structured problem-solving processes rarely lead to meaningful learning, this study reports a hidden efficacy of such processes in a synchronous, computer-supported, collaborative learning (CSCL) environment. A contrasting-case, double-transfer design investigated the effect of problem type (well- vs. ill-structured problems in Newtonian Kinematics) on collaborative processes and outcomes as well as the transfer of problem-solving skills to the individual. N = 104 triads of 11th-grade science students were randomly assigned to solve either well- or ill-structured problems. Thereafter, all participants individually solved well-structured problems followed by ill-structured problems. Findings suggested that compared to well-structured problem-solving groups, ill-structured problem-solving groups struggled with defining the problem and spent much of their sustained interactional effort around problem critiquing and solution evaluation within a discussion that was highly complex, chaotic, and divergent. As such, they found it difficult to converge on the causes of the problem, set appropriate criteria for a solution, and develop a solution, which, in turn, decreased their group performance. Thus, on many counts, production in ill-structured problem-solving groups seemed unproductive when compared to production in well-structured problem-solving groups. Notwithstanding, the contrasting-case, double-transfer design of this study provided participants in the ill-structured condition with an opportunity to spontaneously contrast the ill-structured problems that they had solved in groups with the well-structured problems they solved on an individual basis afterwards. This contrast helped them separate the relevant from the irrelevant components of ill-structured problems, thereby facilitating a spontaneous transfer of problem-solving skills, which, in the absence of the contrast

  10. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  11. Evidence Feed Forward Hidden Markov Model: A New Type of Hidden Markov Model

    CERN Document Server

    DelRose, Michael; Frederick, Philip; 10.5121/ijaia.2011.2101

    2011-01-01

    The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM), and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important...

  12. Evidence Feed Forward Hidden Markov Model: A New Type Of Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Michael Del Rose

    2011-01-01

    Full Text Available The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM, and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important in creating intelligent algorithms for determining human actions based on visual observations. The Evidence Feed Forward Hidden Markov Model is a newly developed algorithm which provides observation to observation linkages. The following research addresses the theory behind Evidence Feed Forward HMMs, provides mathematical proofs of their learning of these parameters to optimize the likelihood of observations with a Evidence Feed Forwards HMM, which is important in all computational intelligence algorithm, and gives comparative examples with standard HMMs in classification of both visual action data and measurement data; thus providing a strong base for Evidence Feed Forward HMMs in classification of many types of problems.

  13. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  14. Hidden Galilean symmetry, conservation laws and emergence of spin current in the soliton sector of chiral helimagnet

    Energy Technology Data Exchange (ETDEWEB)

    Bostrem, I.G. [Department of Physics, Ural State University, Ekaterinburg 620083 (Russian Federation); Kishine, J. [Faculty of Engineering, Kyushu Institute of Technology, Kitakyushu 804-8550 (Japan); Lavrov, R.V. [Department of Physics, Ural State University, Ekaterinburg 620083 (Russian Federation); Ovchinnikov, A.S. [Department of Physics, Ural State University, Ekaterinburg 620083 (Russian Federation)], E-mail: alexander.ovchinnikov@usu.ru

    2009-01-26

    An appearance of the transport spin current in chiral helimagnet is mathematically justified based on the symmetry arguments. Although the starting Lagrangian of the chiral magnet with the Berry phase term and the parity-violating Dzyaloshinskii-Morya coupling is not manifestly Galilean invariant, the Lie point group symmetry analysis and the variational symmetry analysis elucidate the hidden Galilean symmetry and the existence of the linear momentum as a conserved Noether current, respectively.

  15. Applications of hidden symmetries to black hole physics

    Energy Technology Data Exchange (ETDEWEB)

    Frolov, Valeri, E-mail: vfrolov@ualberta.ca [Institute of Theoretical Physics, Department of Physics University of Alberta, Edmonton, Alberta, T6G 2G7 (Canada)

    2011-02-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  16. Recent Progress in Search for Hidden/Dark Photon

    CERN Document Server

    Deliyergiyev, M A

    2015-01-01

    We will try to communicate the many difficulties that we encounter when attempting to pinpoint a common origin for the several observed anomalies, or assessing their tension with existing exclusion limits. These include systematics affecting the operation of the detectors, our knowledge of their response, astrophysical uncertainties, and the broad range of particle couplings that can mediate the interaction with a detector target. The interesting astrophysical evidence that motivates a search for dark-photon and focuses our attention on a Hidden Valleys model with a GeV-scale dark sector that produces the exciting signatures, which may include the possible constituent of dark matter, the possible existence of extra gauge groups. Results from the recent underground experiments are also considered. Many models of new physics beyond the Standard Model contain a 'light' hidden sector (dark sector) with a colorful spectrum of new particles. Recently, it has been shown that the hidden sector can give rise to unique...

  17. Ontology-based Knowledge Extraction from Hidden Web

    Institute of Scientific and Technical Information of China (English)

    SONG Hui; MA Fan-yuan; LIU Xiao-qiang

    2004-01-01

    Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not refer how to make extracted information available for knowledge system. This paper describes a novel approach to build a domain-specific knowledge service with the data retrieved from Hidden Web. Ontology serves to model the domain knowledge. Queries forms of different Web sites are translated into machine-understandable format, defined knowledge concepts, so that they can be accessed automatically. Also knowledge data are extracted from Web pages and organized in ontology format knowledge. The experiment proves the algorithm achieves high accuracy and the system facilitates constructing knowledge services greatly.

  18. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  19. Uncovering labially impacted teeth: apically positioned flap and closed-eruption techniques.

    Science.gov (United States)

    Vermette, M E; Kokich, V G; Kennedy, D B

    1995-01-01

    The purpose of this study was to examine the esthetic and periodontal differences between two methods of uncovering labially impacted maxillary anterior teeth: the apically positioned flap and closed-eruption techniques. The sample consisted of 30 patients who were recalled a minimum of three months after orthodontic treatment of a unilateral labially impacted maxillary anterior tooth. Eighteen of the patients had undergone an apically positioned flap (APF) procedure, and the remaining twelve had undergone the closed-eruption (CE) technique. In the CE group, clinical examination showed less width of attached gingiva on the distal surface and increased probing bone level on the facial surface of the uncovered teeth relative to their contralateral controls. Uncovered teeth in the APF group showed more apical gingival margins on the mesial and facial surfaces; greater crown length on the midfacial surface; increased probing attachment level on the facial surface; increased width of attached gingiva on the facial surface; increased probing bone level on mesial, facial, and distal surfaces; and gingival scarring. Radiographic examination showed shorter roots on the uncovered teeth in both groups. Photographic examination revealed vertical relapse of the uncovered teeth in the APF group. We conclude that labially impacted maxillary anterior teeth uncovered with an apically positioned flap technique have more unesthetic sequalae than those uncovered with a closed-eruption technique.

  20. Unveiling hidden black holes in the cosmic web: Dark matter halos of WISE quasars from Planck CMB lensing

    Science.gov (United States)

    Hickox, Ryan

    The WISE and Planck surveys have now produced groundbreaking data sets which, in concert, can be exploited to obtain revolutionary constraints on the evolution of structure in the Universe. One particularly powerful application of WISE has been to uncover millions of the previously "hidden" obscured quasars, rapidly growing supermassive black holes that are shrouded in gas and dust and so are not detectable using traditional ground-based optical and near-IR techniques. Recently, Planck has produced the most precise all-sky map to date of dark matter structures via the lensing of the cosmic microwave background (CMB). We propose to combine these data sets to obtain a uniquely powerful measurement of the link between rapidly growing black holes and their host dark matter structures, by cross-correlating the density field of WISE-selected quasars with the CMB lensing convergence maps obtained from Planck. This proposal will build on our current ADAP program (NNX12AE38G), which studies the host dark matter halos of WISE-selected quasars via spatial clustering. NNX12AE38G involves a detailed characterization of the redshifts, luminosities, and spectral energy distributions of WISE-selected quasars and uses new techniques to measure how quasars cluster around themselves. NNX12AE38G has contributed to more than 10 journal articles and 5 conference proceedings. Building on our current work, an even more complete understanding of the link between black holes and their host dark matter structures is possible if we employ an independent method for measuring the clustering bias (and thus characteristic halo mass) of the quasar population. This has recently become possible using CMB lensing maps. In the past two years, our team has conducted an initial analysis covering 2500 square degrees using WISE-selected quasars and lensing maps from the South Pole Telescope (Geach, Hickox, Myers et al., 2013), and have implemented this technique with Planck over part of the SDSS region

  1. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-02-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  2. How to Find a Hidden World at the LHC

    CERN Document Server

    Wells, James D

    2008-01-01

    I discuss how the Large Hadron Collider era should broaden our view of particle physics research, and apply this thinking to the case of Hidden Worlds. I focus on one of the simplest representative cases of a Hidden World, and detail the rich implications it has for LHC physics, including universal suppression of Higgs boson production, trans-TeV heavy Higgs boson signatures, heavy-to-light Higgs boson decays, weakly coupled exotic gauge bosons, and Higgs boson decays to four fermions via light exotic gauge bosons. Some signatures may be accessible in the very early stages of collider operation, whereas others motivate a later high-lumonosity upgrade.

  3. Reheating the Standard Model from a Hidden Sector

    CERN Document Server

    Tenkanen, Tommi

    2016-01-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before Big Bang Nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful Big Bang Nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  4. Dynamically Generated Open and Hidden Charm Meson Systems

    CERN Document Server

    Gamermann, D; Strottman, D D; Vacas, M J V

    2006-01-01

    The lowest order chiral Lagrangian successfully applied to study the interaction of the SU(3) octet of pseudo-scalar mesons is generalized to include all mesons from the SU(4) 15-plet of pseudo-scalar mesons. Exchanges of heavy vector mesons, which are indirectly taken into account via this approach, are suppressed. Unitarization in coupled channels leads to dynamical generation of resonances in the open and hidden charm sectors. In particular, for reasonable values of the input, a new narrow scalar resonance in the hidden charm sector appears with a mass of 3.7 GeV.

  5. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-01-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  6. Backward causation, hidden variables and the meaning of completeness

    Indian Academy of Sciences (India)

    Huw Price

    2001-02-01

    Bell’s theorem requires the assumption that hidden variables are independent of future measurement settings. This independence assumption rests on surprisingly shaky ground. In particular, it is puzzlingly time-asymmetric. The paper begins with a summary of the case for considering hidden variable models which, in abandoning this independence assumption, allow a degree of ‘backward causation’. The remainder of the paper clarifies the physical significance of such models, in relation to the issue as to whether quantum mechanics provides a complete description of physical reality.

  7. Reheating the Standard Model from a hidden sector

    Science.gov (United States)

    Tenkanen, Tommi; Vaskonen, Ville

    2016-10-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before big bang nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful big bang nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  8. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    CERN Document Server

    Feintzeig, Benjamin H

    2016-01-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  9. 78 FR 17744 - Culturally Significant Objects Imported for Exhibition Determinations: “Maya: Hidden Worlds...

    Science.gov (United States)

    2013-03-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Culturally Significant Objects Imported for Exhibition Determinations: ``Maya: Hidden Worlds Revealed... determine that the objects to be included in the exhibition ``Maya: Hidden Worlds Revealed,'' imported...

  10. The Function and the Utilization of Hidden Curriculum in College English Teaching

    Institute of Scientific and Technical Information of China (English)

    张英

    2013-01-01

    Explore the nature of the hidden curriculum, and utilize the positive functions of hidden curriculum with theory on English teaching and psychological linguistics to obtain desirable effects in College English teaching.

  11. Three-dimensional imaging of hidden objects using positron emission backscatter

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Dongwon [Los Alamos National Laboratory; Cowee, Misa [Los Alamos National Laboratory; Fenimore, Ed [Los Alamos National Laboratory; Galassi, Mark [Los Alamos National Laboratory; Looker, Quinn [Los Alamos National Laboratory; Mcneil, Wendy V [Los Alamos National Laboratory; Stonehill, Laura [Los Alamos National Laboratory; Wallace, Mark [Los Alamos National Laboratory

    2009-01-01

    Positron emission backscatter imaging is a technique for interrogation and three-dimensional (3-D) reconstruction of hidden objects when we only have access to the objects from one side. Using time-of-flight differences in detected direct and backscattered positron-emitted photons, we construct 3-D images of target objects. Recently at Los Alamos National Laboratory, a fully three-dimensional imaging system has been built and the experimental results are discussed in this paper. Quantitative analysis of images reconstructed in both two- and three-dimensions are also presented.

  12. 2D-HIDDEN MARKOV MODEL FEATURE EXTRACTION STRATEGY OF ROTATING MACHINERY FAULT DIAGNOSIS

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A new feature extraction method based on 2D-hidden Markov model(HMM) is proposed.Meanwhile the time index and frequency index are introduced to represent the new features. The new feature extraction strategy is tested by the experimental data that collected from Bently rotor experiment system. The results show that this methodology is very effective to extract the feature of vibration signals in the rotor speed-up course and can be extended to other non-stationary signal analysis fields in the future.

  13. A hidden Markov model approach for determining expression from genomic tiling micro arrays

    DEFF Research Database (Denmark)

    Terkelsen, Kasper Munch; Gardner, P. P.; Arctander, Peter;

    2006-01-01

    HMM, that adaptively models tiling data prior to predicting expression on genomic sequence. A hidden Markov model (HMM) is used to model the distributions of tiling array probe scores in expressed and non-expressed regions. The HMM is trained on sets of probes mapped to regions of annotated expression and non......]. Results can be downloaded and viewed from our web site [2]. Conclusion The value of adaptive modelling of fluorescence scores prior to categorisation into expressed and non-expressed probes is demonstrated. Our results indicate that our adaptive approach is superior to the previous analysis in terms...

  14. Next generation sequencing reveals the hidden diversity of zooplankton assemblages.

    Directory of Open Access Journals (Sweden)

    Penelope K Lindeque

    Full Text Available BACKGROUND: Zooplankton play an important role in our oceans, in biogeochemical cycling and providing a food source for commercially important fish larvae. However, difficulties in correctly identifying zooplankton hinder our understanding of their roles in marine ecosystem functioning, and can prevent detection of long term changes in their community structure. The advent of massively parallel next generation sequencing technology allows DNA sequence data to be recovered directly from whole community samples. Here we assess the ability of such sequencing to quantify richness and diversity of a mixed zooplankton assemblage from a productive time series site in the Western English Channel. METHODOLOGY/PRINCIPLE FINDINGS: Plankton net hauls (200 µm were taken at the Western Channel Observatory station L4 in September 2010 and January 2011. These samples were analysed by microscopy and metagenetic analysis of the 18S nuclear small subunit ribosomal RNA gene using the 454 pyrosequencing platform. Following quality control a total of 419,041 sequences were obtained for all samples. The sequences clustered into 205 operational taxonomic units using a 97% similarity cut-off. Allocation of taxonomy by comparison with the National Centre for Biotechnology Information database identified 135 OTUs to species level, 11 to genus level and 1 to order, <2.5% of sequences were classified as unknowns. By comparison a skilled microscopic analyst was able to routinely enumerate only 58 taxonomic groups. CONCLUSIONS: Metagenetics reveals a previously hidden taxonomic richness, especially for Copepoda and hard-to-identify meroplankton such as Bivalvia, Gastropoda and Polychaeta. It also reveals rare species and parasites. We conclude that Next Generation Sequencing of 18S amplicons is a powerful tool for elucidating the true diversity and species richness of zooplankton communities. While this approach allows for broad diversity assessments of plankton it may

  15. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    Indian Academy of Sciences (India)

    H Itoh; N Okada; T Yamashita

    2007-11-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden.

  16. Coarse-grained hidden entropy production in partially inaccessible quantum jump trajectories

    OpenAIRE

    Frenzel, Max F.; Sagawa, Takahiro

    2016-01-01

    We consider an open quantum system for which only a subset of all possible transitions are accessible, while the remaining ones are hidden from direct observation. Using a modification of the notion of quantum jump trajectories we introduce the coarse-grained hidden entropy, which quantifies the entropy production in the hidden subsystem conditioned on our observations of the visible part. The entropy production consisting of the sum of visible and coarse-grained hidden entropy is shown to sa...

  17. Uncovering stem-cell heterogeneity in the microniche with label-free microfluidics

    Science.gov (United States)

    Sohn, Lydia L.

    2013-03-01

    Better suited for large number of cells from bulk tissue, traditional cell-screening techniques, such as fluorescence-activated cell sorting (FACS) and magnetic-activated cell sorting (MACS), cannot easily screen stem or progenitor cells from minute populations found in their physiological niches. Furthermore, they rely upon irreversible antibody binding, potentially altering cell properties, including gene expression and regenerative capacity. We have developed a label-free, single-cell analysis microfluidic platform capable of quantifying cell-surface marker expression of functional organ stem cells directly isolated from their micro-anatomical niche. With this platform, we have screened single quiescent muscle stem (satellite) cells derived from single myofibers, and we have uncovered an important heterogeneity in the surface-marker expression of these cells. By sorting the screened cells with our microfluidic device, we have determined what this heterogeneity means in terms of muscle stem-cell functionality. For instance, we show that the levels of beta1-integrin can predict the differentiation capacity of quiescent satellite cells, and in contrast to recent literature, that some CXCR4 + cells are not myogenic. Our results provide the first direct demonstration of a microniche-specific variation in gene expression in stem cells of the same lineage. Overall, our label-free, single-cell analysis and cell-sorting platform could be extended to other systems involving rare-cell subsets. This work was funded by the W. M. Keck Foundation, NIH, and California Institute of Regenerative Medicine

  18. Uncovering Multiple Populations with Washington Photometry: I. The Globular Cluster NGC 1851

    CERN Document Server

    Cummings, Jeffrey D; Villanova, S; Carraro, G

    2014-01-01

    The analysis of multiple populations (MPs) in globular clusters (GCs) has become a forefront area of research in astronomy. Multiple red giant branches (RGBs), subgiant branches (SGBs), and even main sequences (MSs) have now been observed photometrically in many GCs. UV photometry has been crucial in discovering and analyzing these MPs, but the Johnson U and the Stromgren and Sloan u filters that have generally been used are relatively inefficient and very sensitive to reddening and atmospheric extinction. In contrast, the Washington C filter is much broader and redder than these competing UV filters. Here we investigate the use of the Washington system to uncover MPs using only a 1-meter telescope. Our analysis of the well-studied GC NGC 1851 finds that the C filter is both very efficient and effective at detecting its previously discovered MPs in the RGB and SGB. Remarkably, we have also detected an intrinsically broad MS best characterized by two distinct but heavily overlapping populations that cannot be ...

  19. Thermoelectric generator hidden in a shirt with a fabric radiator

    Science.gov (United States)

    Leonov, Vladimir; Vullers, Ruud J. M.; Hoof, Chris Van

    2012-06-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers of a shirt and its characteristics are reported.

  20. Evolving the Topology of Hidden Markov Models using Evolutionary Algorithms

    DEFF Research Database (Denmark)

    Thomsen, Réne

    2002-01-01

    Hidden Markov models (HMM) are widely used for speech recognition and have recently gained a lot of attention in the bioinformatics community, because of their ability to capture the information buried in biological sequences. Usually, heuristic algorithms such as Baum-Welch are used to estimate...

  1. Local clustering in scale-free networks with hidden variables

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A. J. E. M.; van Leeuwaarden, Johan S. H.; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ ∈(2 ,3 ) , so that the degrees have infinite variance. The natural cutoff hc characterizes the largest degrees in the hidden variable models, and a structural cutoff hs introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N , as a function of hs and hc. For scale-free networks with exponent 2 universality class at hand. We characterize the extremely slow decay of C when τ ≈2 and show that for τ =2.1 , say, clustering starts to vanish only for networks as large as N =109 .

  2. Multistability and hidden attractors in a relay system with hysteresis

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.

    2015-01-01

    For nonlinear dynamic systems with switching control, the concept of a "hidden attractor" naturally applies to a stable dynamic state that either (1) coexists with the stable switching cycle or (2), if the switching cycle is unstable, has a basin of attraction that does not intersect with the nei...

  3. Is the Hidden Curriculum a Relevant Issue in Educational Processes

    Directory of Open Access Journals (Sweden)

    Patarroyo Esther

    2004-08-01

    Full Text Available This paper explores some ideas about the hidden curriculum as an amount of ideas and beliefs which are implicit in an indirect way into the scholar life. Those ideas are regarding to gender equality, social status and racial difference, among others. We consider teachers are able to integrate the hidden curriculum as a pedagogical strategy in the classroom. Examples of integration include activities such as observation techniques, role-plays, peer modeling and particularly, the portfolio as a useful tool for reflection which reveals the hidden curriculum. Key words: Hidden Curriculum, Pedagogical Strategy, Portfolio, ELT Processes, Stereotypes Este documento explora algunas ideas acerca del currículo oculto como una suma de ideas y creencias que están implícitos de una forma indirecta dentro de la vida escolar. Estas ideas están relacionadas con la equidad de género, diferencias sociales y raciales, entre otros. Consideramos que es posible para los docentes integrar el currículo como estrategia pedagógica en el aula. Ejemplos de esta integración incluyen técnicas de observación, juegos de roles, modelamiento en parejas y particularmente, el portafolio como herramienta de reflexión que permita hacer evidente el currículo oculto. Palabras claves: Currículo Oculto, Estrategia Pedagógica, Estereotipos, Enseñanza de Inglés, Portafolio

  4. On local-hidden-variable no-go theorems

    Science.gov (United States)

    Methot, A. A.

    2006-06-01

    The strongest attack against quantum mechanics came in 1935 in the form of a paper by Einstein, Podolsky, and Rosen. It was argued that the theory of quantum mechanics could not be called a complete theory of Nature, for every element of reality is not represented in the formalism as such. The authors then put forth a proposition: we must search for a theory where, upon knowing everything about the system, including possible hidden variables, one could make precise predictions concerning elements of reality. This project was ultimately doomed in 1964 with the work of Bell, who showed that the most general local hidden variable theory could not reproduce correlations that arise in quantum mechanics. There exist mainly three forms of no-go theorems for local hidden variable theories. Although almost every physicist knows the consequences of these no-go theorems, not every physicist is aware of the distinctions between the three or even their exact definitions. Thus, we will discuss here the three principal forms of no-go theorems for local hidden variable theories of Nature. We will define Bell theorems, Bell theorems without inequalities, and pseudo-telepathy. A discussion of the similarities and differences will follow.

  5. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  6. Optical Test of Local Hidden-Variable Model

    Institute of Scientific and Technical Information of China (English)

    WU XiaoHua; ZONG HongShi; PANG HouRong

    2001-01-01

    An inequality is deduced from local realism and a supplementary assumption. This inequality defines an experiment that can be actually performed with the present technology to test local hidden-variable models, and it is violated by quantum mechanics with a factor 1.92, while it can be simplified into a form where just two measurements are required.``

  7. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel

    2016-01-01

    Most signatures of new physics in colliders have been studied so far on the transverse plane with respect to the beam direction. In this work however we study the impact of a hidden sector beyond the Standard Model (SM) on inclusive (pseudo)rapidity correlations and moments of the multiplicity distributions, with special emphasis in the LHC results.

  8. The Hidden Curriculum of Youth Policy: A Dutch Example

    NARCIS (Netherlands)

    Hopman, M.; De Winter, M.; Koops, W.

    2014-01-01

    Youth policy is more than a mere response to the actual behavior of children, but it is equally influenced by values and beliefs of policy makers. These values are however rarely made explicit and, therefore, the authors refer to them as “the hidden curriculum” of youth policy. The study investigati

  9. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  10. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a techniqu

  11. Old, New and Hidden Causes of Perioperative Hypersensitivity.

    Science.gov (United States)

    Garvey, Lene Heise

    2016-01-01

    Perioperative hypersensitivity reactions are rare, often life-threatening events, and subsequent investigations to identify the culprit are important to avoid re-exposure. All exposures in the perioperative setting may potentially be the cause of a hypersensitivity reaction, but drugs administered intravenously such as neuromuscular blocking agents (NMBA), induction agents and antibiotics have traditionally been reported to be implicated most commonly. It has recently become apparent that there are geographical differences in sensitization patterns related to variation in exposures, referral patterns and performance and interpretation of investigations. Differences in sensitization to NMBAs are partly explained by cross sensitization to pholcodine, an ingredient in cough-medicines available in some countries. While NMBAs are the most common causes of perioperative hypersensitivity in some countries, this may not necessarily be the case in all countries. New and hidden allergens have emerged as causes of perioperative hypersensitivity such as blue dyes, chlorhexidine and excipients. Detailed knowledge of the events at the time of reaction is necessary to identify potential culprits including rare and hidden allergens. Cooperation between allergists and anaesthetists, or other staff present perioperatively, is often needed to identify hidden or even undocumented exposures. The objectives of this review are to provide an overview of the history of investigation of perioperative hypersensitivity, to describe the differences in causes of perioperative hypersensitivity emerging over time and to increase awareness about the "hidden allergens" in the perioperative setting. Some practical advice on how to approach the patient testing negative on all initial investigations is also included.

  12. Recognizing Strokes in Tennis Videos Using Hidden Markov Models

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, W.; Zivkovic, Z.

    2001-01-01

    This paper addresses content-based video retrieval with an emphasis on recognizing events in tennis game videos. In particular, we aim at recognizing different classes of tennis strokes using automatic learning capability of Hidden Markov Models. Driven by our domain knowledge, a robust player segme

  13. Searching for a hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Sanchis-Lozano Miguel-Angel

    2016-01-01

    Full Text Available A hidden sector beyond the Standard Model can show up in multiparticle production altering inclusive correlations and factorial cumulants of multiplicity distributions. In this report such a study is advocated with a special emphasis on the searches at LHC.

  14. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  15. Isovector and hidden-beauty partners of the X(3872)

    CERN Document Server

    Hogaasen, Hallstein; Richard, Jean-Marc; Sorba, Paul

    2014-01-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks (H. Hogaasen, J-M. Richard and P. Sorba, Phys. Rev. D73, 054013, 2006). The extension to the hidden-beauty sector is discussed.

  16. Bayesian online algorithms for learning in discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2008-01-01

    We propose and analyze two different Bayesian online algorithms for learning in discrete Hidden Markov Models and compare their performance with the already known Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalization we draw learning curves in simplified situations for these algorithms and compare their performances.

  17. Uncovering cognitive processes: Different techniques that can contribute to cognitive load research and instruction

    NARCIS (Netherlands)

    Van Gog, Tamara; Kester, Liesbeth; Nievelstein, Fleurie; Giesbers, Bas; Fred, Paas

    2009-01-01

    Van Gog, T., Kester, L., Nievelstein, F., Giesbers, B., & Paas, F. (2009). Uncovering cognitive processes: Different techniques that can contribute to cognitive load research and instruction. Computers in Human Behavior, 25, 325-331.

  18. LDA Based Face Recognition by Using Hidden Markov Model in Current Trends

    Directory of Open Access Journals (Sweden)

    S.Sharavanan

    2009-10-01

    Full Text Available Hidden Markov model (HMM is a promising method that works well for images with variations in lighting, facial expression, and orientation. Face recognition draws attention as a complex task due to noticeable changes produced on appearance by illumination, facial expression, size, orientation and other external factors. To process images using HMM, the temporal or space sequences are to be considered. In simple terms HMM can be defined as set of finite states with associated probability distributions. Only the outcome is visible to the external user not the states and hence the name Hidden Markov Model. The paper deals with various techniques and methodologies used for resolving the problem .We discuss about appearance based, feature based, model based and hybrid methods for face identification. Conventional techniques such as Principal Component Analysis (PCA, Linear Discriminant Analysis (LDA, Independent Component Analysis (ICA, and feature based Elastic Bunch Graph Matching (EBGM and 2D and 3D face models are well-known for face detection and recognition.

  19. Hidden Owners, Hidden Profits, and Poor Nursing Home Care: A Case Study.

    Science.gov (United States)

    Harrington, Charlene; Ross, Leslie; Kang, Taewoon

    2015-01-01

    The study examined the ownership transparency, financial accountability, and quality indicators of a regional for-profit nursing home chain in California, using a case study methodology to analyze data on the chain's ownership and management structure, financial data, staffing levels, deficiencies and complaints, and litigation. Secondary data were obtained from regulatory and cost reports and litigation cases. Qualitative descriptions of ownership and management were presented and quantitative analyses were conducted by comparing financial and quality indicators with other California for-profit chains, for-profit non-chains, and nonprofit nursing home groups in 2011. The chain's complex, interlocking individual and corporate owners and property companies obscured its ownership structure and financial arrangements. Nursing and support services expenditures were lower than nonprofits and administrative costs were higher than for-profit non-chains. The chain's nurse staffing was lower than expected staffing levels; its deficiencies and citations were higher than in nonprofits; and a number of lawsuits resulted in bankruptcy. Profits were hidden in the chain's management fees, lease agreements, interest payments to owners, and purchases from related-party companies. Greater ownership transparency and financial accountability requirements are needed to ensure regulatory oversight and quality of care.

  20. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  1. Hidden-service Statistics Reported by Relays

    Science.gov (United States)

    2015-06-01

    2009. [7] Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith . Calibrating noise to sensitivity in private data analysis. In Proceedings of the...Shiva Prasad Kasiviswanathan, and Adam Smith . Composition attacks and auxiliary information in data privacy. In Proceedings of the 14th ACM SIGKDD...and Adam Smith . Smooth sensitivity and sampling in private data analysis. In Proceedings of the Thirty-ninth Annual ACM Symposium on Theory of

  2. 英语专业隐性课程中学生自主学习能力的培养策略研究%Strategies for Cultivating Students’Self-Access to English Learning through Hidden Curriculums

    Institute of Scientific and Technical Information of China (English)

    刘雨

    2015-01-01

    Hidden curriculum contains four parts:materially hidden curriculum, spiritually hidden curriculum, ethologically hid⁃den curriculum and institutionally hidden curriculum. As an independent form of curriculum, hidden curriculum plays a significant part in curriculum reform. The article first illustrates the origin of hidden curriculum, its definition, its classification and character⁃istics. It then makes an analysis of the implications of hidden curriculum in English teaching reform. The incorporation of hidden curriculum to the education system is an indispensable trend of English teaching reform. Based on the characteristics of hidden cur⁃riculum, the article puts forward some exercisable strategies on how to design them to enhance students’self-access to English learning.%隐性课程分为物质性、精神性、制度性和行为性隐性课程。隐性课程作为一种独立的课程形态,在课程体系中处于极其重要的地位。论文简要论述了隐性课程概念的提出、范畴的界定、分类及特点,阐明了隐性课程对英语教学改革的意义,认为将隐性课程纳入课程体系是英语教学改革的一种趋势和必然。根据隐性课程的特点提出了利用英语专业隐性课程培养学生自主学习能力的策略。

  3. AdS/QCD approach to the scale-invariant extension of the standard model with a strongly interacting hidden sector

    Science.gov (United States)

    Hatanaka, Hisaki; Jung, Dong-Won; Ko, Pyungwon

    2016-08-01

    In this paper, we revisit a scale-invariant extension of the standard model (SM) with a strongly interacting hidden sector within AdS/QCD approach. Using the AdS/QCD, we reduce the number of input parameters to three, i.e. hidden pion decay constant, hidden pion mass and tan β that is defined as the ratio of the vacuum expectation values (VEV) of the singlet scalar field and the SM Higgs boson. As a result, our model has sharp predictability. We perform the phenomenological analysis of the hidden pions which is one of the dark matter (DM) candidates in this model. With various theoretical and experimental constraints we search for the allowed parameter space and find that both resonance and non-resonance solutions are possible. Some typical correlations among various observables such as thermal relic density of hidden pions, Higgs boson signal strengths and DM-nucleon cross section are investigated. We provide some benchmark points for experimental tests.

  4. Application of the Viterbi Algorithm in Hidden Markov Models for Exploring Irrigation Decision Series

    Science.gov (United States)

    Andriyas, S.; McKee, M.

    2014-12-01

    Anticipating farmers' irrigation decisions can provide the possibility of improving the efficiency of canal operations in on-demand irrigation systems. Although multiple factors are considered during irrigation decision making, for any given farmer there might be one factor playing a major role. Identification of that biophysical factor which led to a farmer deciding to irrigate is difficult because of high variability of those factors during the growing season. Analysis of the irrigation decisions of a group of farmers for a single crop can help to simplify the problem. We developed a hidden Markov model (HMM) to analyze irrigation decisions and explore the factor and level at which the majority of farmers decide to irrigate. The model requires observed variables as inputs and the hidden states. The chosen model inputs were relatively easily measured, or estimated, biophysical data, including such factors (i.e., those variables which are believed to affect irrigation decision-making) as cumulative evapotranspiration, soil moisture depletion, soil stress coefficient, and canal flows. Irrigation decision series were the hidden states for the model. The data for the work comes from the Canal B region of the Lower Sevier River Basin, near Delta, Utah. The main crops of the region are alfalfa, barley, and corn. A portion of the data was used to build and test the model capability to explore that factor and the level at which the farmer takes the decision to irrigate for future irrigation events. Both group and individual level behavior can be studied using HMMs. The study showed that the farmers cannot be classified into certain classes based on their irrigation decisions, but vary in their behavior from irrigation-to-irrigation across all years and crops. HMMs can be used to analyze what factor and, subsequently, what level of that factor on which the farmer most likely based the irrigation decision. The study shows that the HMM is a capable tool to study a process

  5. Plant Phenotyping using Probabilistic Topic Models: Uncovering the Hyperspectral Language of Plants.

    Science.gov (United States)

    Wahabzada, Mirwaes; Mahlein, Anne-Katrin; Bauckhage, Christian; Steiner, Ulrike; Oerke, Erich-Christian; Kersting, Kristian

    2016-03-09

    Modern phenotyping and plant disease detection methods, based on optical sensors and information technology, provide promising approaches to plant research and precision farming. In particular, hyperspectral imaging have been found to reveal physiological and structural characteristics in plants and to allow for tracking physiological dynamics due to environmental effects. In this work, we present an approach to plant phenotyping that integrates non-invasive sensors, computer vision, as well as data mining techniques and allows for monitoring how plants respond to stress. To uncover latent hyperspectral characteristics of diseased plants reliably and in an easy-to-understand way, we "wordify" the hyperspectral images, i.e., we turn the images into a corpus of text documents. Then, we apply probabilistic topic models, a well-established natural language processing technique that identifies content and topics of documents. Based on recent regularized topic models, we demonstrate that one can track automatically the development of three foliar diseases of barley. We also present a visualization of the topics that provides plant scientists an intuitive tool for hyperspectral imaging. In short, our analysis and visualization of characteristic topics found during symptom development and disease progress reveal the hyperspectral language of plant diseases.

  6. The work is never ending: uncovering teamwork sustainability using realistic evaluation.

    Science.gov (United States)

    Frykman, Mandus; von Thiele Schwarz, Ulrica; Muntlin Athlin, Åsa; Hasson, Henna; Mazzocato, Pamela

    2017-03-20

    Purpose The purpose of this paper is to uncover the mechanisms influencing the sustainability of behavior changes following the implementation of teamwork. Design/methodology/approach Realistic evaluation was combined with a framework (DCOM®) based on applied behavior analysis to study the sustainability of behavior changes two and a half years after the initial implementation of teamwork at an emergency department. The DCOM® framework was used to categorize the mechanisms of behavior change interventions (BCIs) into the four categories of direction, competence, opportunity, and motivation. Non-participant observation and interview data were used. Findings The teamwork behaviors were not sustained. A substantial fallback in managerial activities in combination with a complex context contributed to reduced direction, opportunity, and motivation. Reduced direction made staff members unclear about how and why they should work in teams. Deterioration of opportunity was evident from the lack of problem-solving resources resulting in accumulated barriers to teamwork. Motivation in terms of management support and feedback was reduced. Practical implications The implementation of complex organizational changes in complex healthcare contexts requires continuous adaption and managerial activities well beyond the initial implementation period. Originality/value By integrating the DCOM® framework with realistic evaluation, this study responds to the call for theoretically based research on behavioral mechanisms that can explain how BCIs interact with context and how this interaction influences sustainability.

  7. Uncovering secrets behind low-resistance planing craft hull forms through optimization

    Science.gov (United States)

    Mohamad Ayob, Ahmad F.; Ray, Tapabrata; Smith, Warren F.

    2011-11-01

    There has always been significant interest within the naval architectural research community to identify ship hull forms with low resistance. While numerous design optimization frameworks have been proposed over the years to support the activity, very little attention has been paid towards the process of gaining an understanding of 'what makes a good ship design superior?'. Furthermore, there have been limited attempts to identify computationally cheap indicators that can be used to distinguish between good and poor designs. A recent technique named discovery of innovative design principles, which is aimed at understanding the relationship between the design variables, is incorporated in this work. In this article, optimal high-speed planing craft hull forms with minimum calm-water resistance are identified through the use of three state-of-the-art optimization algorithms. Collections of such designs are then used to uncover insights into the underlying relationships between the variables. The importance of such relationships is further analysed to identify computationally cheap performance indicators that can be used in lieu of detailed calm-water resistance calculations. Such indicators are useful at the concept and preliminary design stages, where one needs to sieve efficiently through a number of candidate designs to identify the better ones for further analysis.

  8. DNA barcoding uncovers cryptic diversity in 50% of deep-sea Antarctic polychaetes.

    Science.gov (United States)

    Brasier, Madeleine J; Wiklund, Helena; Neal, Lenka; Jeffreys, Rachel; Linse, Katrin; Ruhl, Henry; Glover, Adrian G

    2016-11-01

    The Antarctic marine environment is a diverse ecosystem currently experiencing some of the fastest rates of climatic change. The documentation and management of these changes requires accurate estimates of species diversity. Recently, there has been an increased recognition of the abundance and importance of cryptic species, i.e. those that are morphologically identical but genetically distinct. This article presents the largest genetic investigation into the prevalence of cryptic polychaete species within the deep Antarctic benthos to date. We uncover cryptic diversity in 50% of the 15 morphospecies targeted through the comparison of mitochondrial DNA sequences, as well as 10 previously overlooked morphospecies, increasing the total species richness in the sample by 233%. Our ability to describe universal rules for the detection of cryptic species within polychaetes, or normalization to expected number of species based on genetic data is prevented by taxon-specific differences in phylogenetic outputs and genetic variation between and within potential cryptic species. These data provide the foundation for biogeographic and functional analysis that will provide insight into the drivers of species diversity and its role in ecosystem function.

  9. Unexpected novel relational links uncovered by extensive developmental profiling of nuclear receptor expression.

    Directory of Open Access Journals (Sweden)

    Stéphanie Bertrand

    2007-11-01

    Full Text Available Nuclear receptors (NRs are transcription factors that are implicated in several biological processes such as embryonic development, homeostasis, and metabolic diseases. To study the role of NRs in development, it is critically important to know when and where individual genes are expressed. Although systematic expression studies using reverse transcriptase PCR and/or DNA microarrays have been performed in classical model systems such as Drosophila and mouse, no systematic atlas describing NR involvement during embryonic development on a global scale has been assembled. Adopting a systems biology approach, we conducted a systematic analysis of the dynamic spatiotemporal expression of all NR genes as well as their main transcriptional coregulators during zebrafish development (101 genes using whole-mount in situ hybridization. This extensive dataset establishes overlapping expression patterns among NRs and coregulators, indicating hierarchical transcriptional networks. This complete developmental profiling provides an unprecedented examination of expression of NRs during embryogenesis, uncovering their potential function during central nervous system and retina formation. Moreover, our study reveals that tissue specificity of hormone action is conferred more by the receptors than by their coregulators. Finally, further evolutionary analyses of this global resource led us to propose that neofunctionalization of duplicated genes occurs at the levels of both protein sequence and RNA expression patterns. Altogether, this expression database of NRs provides novel routes for leading investigation into the biological function of each individual NR as well as for the study of their combinatorial regulatory circuitry within the superfamily.

  10. Antisocial behaviour and psychopathy: uncovering the externalizing link in the P3 modulation.

    Science.gov (United States)

    Pasion, Rita; Fernandes, Carina; Pereira, Mariana R; Barbosa, Fernando

    2017-03-22

    In 2009, Gao and Raine's meta-analysis analysed P3 modulation over the antisocial spectrum. However, some questions remained open regarding the P3 modulation patterns across impulsive and violent manifestations of antisocial behaviour, phenotypic components of psychopathy, and P3 components. A systematic review of 36 studies was conducted (N=3514) to extend previous results and to address these unresolved questions. A clear link between decreased P3 amplitude and antisocial behaviour was found. In psychopathy, dimensional approaches become more informative than taxonomic models. Distinct etiological pathways of psychopathy were evidenced in cognitive tasks: impulsive-antisocial psychopathic traits mainly predicted blunted P3 amplitude, while interpersonal-affective psychopathic traits explained enhanced P3 amplitude. Supporting the low fear hypothesis, the interpersonal-affective traits were associated with reduced P3 amplitude in emotional-affective learning tasks. From the accumulated knowledge we propose a framework of P3 amplitude modulation that uncovers the externalizing link between psychopathy and antisocial behaviour. However, the main hypotheses are exploratory and call for more data before stablishing robust conclusions.

  11. Methods uncovering usability issues in medication-related alerting functions: results from a systematic review.

    Science.gov (United States)

    Marcilly, Romaric; Vasseur, Francis; Ammenwerth, Elske; Beuscart-Zephir, Marie-Catherine

    2014-01-01

    This paper aims at listing the methods used to evaluate the usability of medication-related alerting functions and at knowing what type of usability issues those methods allow to detect. A sub-analysis of data from this systematic review has been performed. Methods applied in the included papers were collected. Then, included papers were sorted in four types of evaluation: "expert evaluation", "user- testing/simulation", "on site observation" and "impact studies". The types of usability issues (usability flaws, usage problems and negative outcomes) uncovered by those evaluations were analyzed. Results show that a large set of methods are used. The largest proportion of papers uses "on site observation" evaluation. This is the only evaluation type for which every kind of usability flaws, usage problems and outcomes are detected. It is somehow surprising that, in a usability systematic review, most of the papers included use a method that is not often presented as a usability method. Results are discussed about the opportunity to provide usability information collected after the implementation of the technology during their design process, i.e. before their implementation.

  12. The proteome and phosphoproteome of maize pollen uncovers fertility candidate proteins.

    Science.gov (United States)

    Chao, Qing; Gao, Zhi-Fang; Wang, Yue-Feng; Li, Zhe; Huang, Xia-He; Wang, Ying-Chun; Mei, Ying-Chang; Zhao, Biligen-Gaowa; Li, Liang; Jiang, Yu-Bo; Wang, Bai-Chen

    2016-06-01

    Maize is unique since it is both monoecious and diclinous (separate male and female flowers on the same plant). We investigated the proteome and phosphoproteome of maize pollen containing modified proteins and here we provide a comprehensive pollen proteome and phosphoproteome which contain 100,990 peptides from 6750 proteins and 5292 phosphorylated sites corresponding to 2257 maize phosphoproteins, respectively. Interestingly, among the total 27 overrepresented phosphosite motifs we identified here, 11 were novel motifs, which suggested different modification mechanisms in plants compared to those of animals. Enrichment analysis of pollen phosphoproteins showed that pathways including DNA synthesis/chromatin structure, regulation of RNA transcription, protein modification, cell organization, signal transduction, cell cycle, vesicle transport, transport of ions and metabolisms, which were involved in pollen development, the following germination and pollen tube growth, were regulated by phosphorylation. In this study, we also found 430 kinases and 105 phosphatases in the maize pollen phosphoproteome, among which calcium dependent protein kinases (CDPKs), leucine rich repeat kinase, SNF1 related protein kinases and MAPK family proteins were heavily enriched and further analyzed. From our research, we also uncovered hundreds of male sterility-associated proteins and phosphoproteins that might influence maize productivity and serve as targets for hybrid maize seed production. At last, a putative complex signaling pathway involving CDPKs, MAPKs, ubiquitin ligases and multiple fertility proteins was constructed. Overall, our data provides new insight for further investigation of protein phosphorylation status in mature maize pollen and construction of maize male sterile mutants in the future.

  13. Classification of EEG Single Trial Microstates Using Local Global Graphs and Discrete Hidden Markov Models.

    Science.gov (United States)

    Michalopoulos, Kostas; Zervakis, Michalis; Deiber, Marie-Pierre; Bourbakis, Nikolaos

    2016-09-01

    We present a novel synergistic methodology for the spatio-temporal analysis of single Electroencephalogram (EEG) trials. This new methodology is based on the novel synergy of Local Global Graph (LG graph) to characterize define the structural features of the EEG topography as a global descriptor for robust comparison of dominant topographies (microstates) and Hidden Markov Models (HMM) to model the topographic sequence in a unique way. In particular, the LG graph descriptor defines similarity and distance measures that can be successfully used for the difficult comparison of the extracted LG graphs in the presence of noise. In addition, hidden states represent periods of stationary distribution of topographies that constitute the equivalent of the microstates in the model. The transitions between the different microstates and the formed syntactic patterns can reveal differences in the processing of the input stimulus between different pathologies. We train the HMM model to learn the transitions between the different microstates and express the syntactic patterns that appear in the single trials in a compact and efficient way. We applied this methodology in single trials consisting of normal subjects and patients with Progressive Mild Cognitive Impairment (PMCI) to discriminate these two groups. The classification results show that this approach is capable to efficiently discriminate between control and Progressive MCI single trials. Results indicate that HMMs provide physiologically meaningful results that can be used in the syntactic analysis of Event Related Potentials.

  14. Hidden Photon Compton and Bremsstrahlung in White Dwarf Anomalous Cooling and Luminosity Functions

    CERN Document Server

    Chang, Chia-Feng

    2016-01-01

    We computed the contribution of the Compton and Bremsstrahlung processes with a hidden light $U(1)_D$ neutral boson $\\gamma_D$ to the white dwarf G117-B15A anomalous cooling rate, as well as the white dwarf luminosity functions (WDLF). We demonstrated that for a light mass of hidden photon ($m_{\\gamma_D} \\ll$ a few keV), compatible results are obtained for the recent Sloan Digital Sky Survey and the SuperCOSMOS Sky Survey observation, but the stringent limits would be imposed on the kinetic mixing $\\epsilon$. We performed $\\chi^2$-tests to acquire a quantitative assessment on the WDLF data in the context of our model, computed under the assumption of different kinetic mixing $\\epsilon$, the age of the oldest computed stars $T_D$, and a constant star formation rate $\\psi$. Then taken together, the WDLF analysis of 2$\\sigma$ confidence interval $\\epsilon = \\left( 0.37^{+0.35}_{-0.37}\\right) \\times 10^{-14}$ is barely consistent with the cooling rate analysis at 2$\\sigma$ regime $\\epsilon = \\left( 0.97^{+0.35}_{...

  15. New axion and hidden photon constraints from a solar data global fit

    CERN Document Server

    Vinyoles, Núria; Villante, Francesco L; Basu, Sarbani; Redondo, Javier; Isern, Jordi

    2015-01-01

    We present a new statistical analysis that combines helioseismology (sound speed, surface helium and convective radius) and solar neutrino observations (boron and beryllium fluxes) to place upper limits to the properties of non standard weakly interacting particles. Our analysis includes theoretical and observational errors, accounts for tensions between input parameters of solar models and can be easily extended to include other observational constraints. We present two applications to test the method: the well studied case of axions and axion-like particles and the more novel case of low mass hidden photons. For axions we obtain an upper limit at 3 sigma for the axion-photon coupling constant of g_a-gamma < 4 x 10^-10 GeV^-1. For hidden photons we obtain the most restrictive upper limit for the product of the kinetic mixing and mass of chi < 1.82 x 10^-12 eV/m at 3 sigma. Both cases improve the previous solar constraints based on the Standard Solar Models showing the power of our global statistical ap...

  16. Deepest Image of Exploded Star Uncovers Bipolar Jets

    Science.gov (United States)

    2004-08-01

    A spectacular new image of Cassiopeia A from NASA's Chandra X-ray Observatory released today has nearly 200 times more data than the "First Light" Chandra image of this object made five years ago. The new image reveals clues that the initial explosion caused by the collapse of a massive star was far more complicated than suspected. Chandra Broadband Image of Cassiopeia A Chandra Broadband Image of Cassiopeia A "Although this young supernova remnant has been intensely studied for years, this deep observation is the most detailed ever made of the remains of an exploded star," said Martin Laming of the Naval Research Laboratory in Washington, D.C. Laming is part of a team of scientists led by Una Hwang of the Goddard Space Flight Center in Greenbelt, Maryland. "It is a gold mine of data that astronomers will be panning through for years to come." The one-million-second (about 11.5-day) observation of Cassiopeia A uncovered two large, opposed jet-like structures that extend to about 10 light years from the center of the remnant. Clouds of iron that have remained nearly pure for the approximately 340 years since the explosion were also detected. "The presence of the bipolar jets suggests that jets could be more common in relatively normal supernova explosions than supposed by astronomers," said Hwang. A paper by Hwang, Laming and others on the Cassiopeia A observation will appear in an upcoming issue of The Astrophysical Journal Letters. Chandra Enhanced Silicon Image of Cassiopeia A Chandra Enhanced Silicon Image of Cassiopeia A X-ray spectra show that the jets are rich in silicon atoms and relatively poor in iron atoms. In contrast, fingers of almost pure iron gas extend in a direction nearly perpendicular to the jets. This iron was produced in the central, hottest regions of the star. The high silicon and low iron abundances in the jets indicate that massive, matter-dominated jets were not the immediate cause of the explosion, as these should have carried out large

  17. Hidden Genetic Variation in LCA9-Associated Congenital Blindness Explained by 5'UTR Mutations and Copy-Number Variations of NMNAT1.

    Science.gov (United States)

    Coppieters, Frauke; Todeschini, Anne Laure; Fujimaki, Takuro; Baert, Annelot; De Bruyne, Marieke; Van Cauwenbergh, Caroline; Verdin, Hannah; Bauwens, Miriam; Ongenaert, Maté; Kondo, Mineo; Meire, Françoise; Murakami, Akira; Veitia, Reiner A; Leroy, Bart P; De Baere, Elfride

    2015-12-01

    Leber congenital amaurosis (LCA) is a severe autosomal-recessive retinal dystrophy leading to congenital blindness. A recently identified LCA gene is NMNAT1, located in the LCA9 locus. Although most mutations in blindness genes are coding variations, there is accumulating evidence for hidden noncoding defects or structural variations (SVs). The starting point of this study was an LCA9-associated consanguineous family in which no coding mutations were found in the LCA9 region. Exploring the untranslated regions of NMNAT1 revealed a novel homozygous 5'UTR variant, c.-70A>T. Moreover, an adjacent 5'UTR variant, c.-69C>T, was identified in a second consanguineous family displaying a similar phenotype. Both 5'UTR variants resulted in decreased NMNAT1 mRNA abundance in patients' lymphocytes, and caused decreased luciferase activity in human retinal pigment epithelial RPE-1 cells. Second, we unraveled pseudohomozygosity of a coding NMNAT1 mutation in two unrelated LCA patients by the identification of two distinct heterozygous partial NMNAT1 deletions. Molecular characterization of the breakpoint junctions revealed a complex Alu-rich genomic architecture. Our study uncovered hidden genetic variation in NMNAT1-associated LCA and emphasized a shift from coding to noncoding regulatory mutations and repeat-mediated SVs in the molecular pathogenesis of heterogeneous recessive disorders such as hereditary blindness.

  18. Dense baryonic matter in the hidden local symmetry approach: Half-skyrmions and nucleon mass

    Science.gov (United States)

    Ma, Yong-Liang; Harada, Masayasu; Lee, Hyun Kyu; Oh, Yongseok; Park, Byung-Yoon; Rho, Mannque

    2013-07-01

    Hadron properties in dense medium are treated in a unified way in a skyrmion model constructed with an effective Lagrangian, in which the ρ and ω vector mesons are introduced as hidden gauge bosons, valid up to O(p4) terms in chiral expansion including the homogeneous Wess-Zumino terms. All the low energy constants of the Lagrangian—apart from the pion decay constant and the vector meson mass—are fixed by the master formula derived from the relation between the five-dimensional holographic QCD and the four-dimensional hidden local symmetry Lagrangian. This Lagrangian allows one to pin down the density n1/2 at which the skyrmions in medium fractionize into half-skyrmions, bringing in a drastic change in the equation of state of dense baryonic matter. We find that the U(1) field that figures in the Chern-Simons term in the five-dimensional holographic QCD action or equivalently the ω field in the homogeneous Wess-Zumino term in the dimensionally reduced hidden local symmetry action plays a crucial role in the half-skyrmion phase. The importance of the ω degree of freedom may be connected to what happens in the instanton structure of elementary baryon noticed in holographic QCD. The most striking and intriguing in what is found in the model is that the pion decay constant that smoothly drops with increasing density in the skyrmion phase stops decreasing at n1/2 and remains nearly constant in the half-skyrmion phase. In accordance with the large Nc consideration, the baryon mass also stays nonscaling in the half-skyrmion phase. This feature which is reminiscent of the parity-doublet baryon model with a chirally invariant mass m0 is supported by the nuclear effective field theory with the parameters of the Lagrangian scaling modified at the skyrmion-half-skyrmion phase transition. It also matches with one-loop renormalization group analysis based on hidden local symmetry. A link between a nonvanishing m0 and the origin of nucleon mass distinctive from

  19. Backpropagation-Based Cooperative Localization of Primary User for Avoiding Hidden-Node Problem in Cognitive Networks

    Directory of Open Access Journals (Sweden)

    Lin Liu

    2010-01-01

    Full Text Available Cognitive radio (CR is a technology to implement opportunistic spectrum sharing to improve the spectrum utilization. However, there exists a hidden-node problem, which can be a big challenge to solve especially when the primary receiver is passive listening. We aim to provide a solution to the hidden-node problem for passive-listening receiver based on cooperation of multiple CRs. Specifically, we consider a cooperative GPS-enabled cognitive network. Once the existence of PU is detected, a localization algorithm will be employed to first estimate the path loss model for the environment based on backpropagation method and then to locate the position of PU. Finally, a disable region is identified taking into account the communication range of both the PU and the CR. The CRs within the disabled region are prohibited to transmit in order to avoid interfering with the primary receiver. Both analysis and simulation results are provided.

  20. Cyberbullying: The hidden side of college students

    OpenAIRE

    Martins, Maria José D.; Francisco, Sofia Mateus; Simão, Ana Margarida Veiga; Ferreira, Paula Costa

    2015-01-01

    The purpose of this study was to investigate how university students perceive their involvement in the cyberbullying phenomenon, and its impact on their well-being. Thus, this study presents a preliminary approach of how college students’ perceived involvement in acts of cyberbullying can be measured. Firstly, Exploratory Factor Analysis (N = 349) revealed a unidimensional structure of the four scales included in the Cyberbullying Inventory for College Students. Then, Item Respons...