WorldWideScience

Sample records for analysis uncovers hidden

  1. Clinical role modelling: uncovering hidden knowledge.

    Science.gov (United States)

    Davies, E

    1993-04-01

    Those responsible for the education of nurses are well aware of the need to reconcile the art and science of nursing so that future practitioners can be prepared to offer a humanistic and professional service to society. One way to assist students in this integration is to provide them with opportunities for role modelling as a means of discovering the knowledge embedded in clinical practice. A study of first-year undergraduate students undertaking a course which provides such opportunities in a number of practice settings was carried out to determine whether the observation of clinical role models does lead to knowledge discovery. The study, which used a grounded theory approach, indicated that the major aspect of nursing uncovered by the students through observation of clinical role models was that of provision of direct care. They articulated their values in relation to 'good' and 'bad' care and identified those attributes of nurses which they considered contributed to these care positions. In addition, they were able to recognize creativity and flexibility in practitioners and to relate these attributes to the ability to provide individualized, context-specific care. There was some uncovering of aspects of the nurse's role in maintaining their own professional competence, socializing neophytes into the profession and collaborating with the members of the multi-disciplinary health care team. PMID:8496511

  2. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    -estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our......This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost...... findings contribute to research on the effectiveness of sourcing and global strategies by stressing the importance of organizational design and experience in dealing with increasing complexity....

  3. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  4. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  5. In the minds of OSCE examiners: uncovering hidden assumptions.

    Science.gov (United States)

    Chahine, Saad; Holmes, Bruce; Kowalewski, Zbigniew

    2016-08-01

    The Objective Structured Clinical Exam (OSCE) is a widely used method of assessment in medical education. Rater cognition has become an important area of inquiry in the medical education assessment literature generally, and in the OSCE literature specifically, because of concerns about potential compromises of validity. In this study, a novel approach to mixed methods that combined Ordinal Logistic Hierarchical Linear Modeling and cognitive interviews was used to gain insights about what examiners were thinking during an OSCE. This study is based on data from the 2010 to 2014 administrations of the Clinician Assessment for Practice Program OSCE for International Medical Graduates (IMGs) in Nova Scotia. An IMG is a physician trained outside of Canada who was a licensed practitioner in a different country. The quantitative data were examined alongside four follow-up cognitive interviews of examiners conducted after the 2014 administration. The quantitative results show that competencies of (1) Investigation and Management and (2) Counseling were highly predictive of the Overall Global score. These competencies were also described in the cognitive interviews as the most salient parts of OSCE. Examiners also found Communication Skills and Professional Behavior to be relevant but the quantitative results revealed these to be less predictive of the Overall Global score. The interviews also reveal that there is a tacit sequence by which IMGs are expected to proceed in an OSCE, starting with more basic competencies such as History Taking and building up to Investigation Management and Counseling. The combined results confirm that a hidden pattern exists with respect to how examiners rate candidates. This study has potential implications for research into rater cognition, and the design and scoring of practice-ready OSCEs. PMID:26661783

  6. CHANG-ES VIII: Uncovering Hidden AGN Activity in Radio Polarization

    CERN Document Server

    Irwin, Judith A; Damas-Segovia, A; Beck, Rainer; English, Jayanne; Heald, George; Henriksen, Richard N; Krause, Marita; Li, Jiang-Tao; Rand, Richard J; Wang, Q Daniel; Wiegert, Theresa; Kamieneski, Patrick; Paré, Dylan; Sullivan, Kendall

    2016-01-01

    We report on C-band (5 - 7 GHz) observations of the galaxy, NGC~2992, from the CHANG-ES sample. This galaxy displays an embedded nuclear double-lobed radio morphology within its spiral disk, as revealed in linearly polarized emission but {\\it not} in total intensity emission. The radio lobes are kpc-sized, similar to what has been observed in the past for other Seyfert galaxies, and show ordered magnetic fields. NGC~2992 has shown previous evidence for AGN-related activity, but not the linearly polarized radio features that we present here. We draw attention to this galaxy as the first clear example (and prototype) of bipolar radio outflow that is revealed in linearly polarized emission only. Such polarization observations, which are unobscured by dust, provide a new tool for uncovering hidden weak AGN activity which may otherwise be masked by brighter unpolarized emission within which it is embedded. The radio lobes observed in NGC~2992 are interacting with the surrounding interstellar medium and offer new o...

  7. Uncover the Ideology Behind News Reports Through Transitivity Analysis

    Institute of Scientific and Technical Information of China (English)

    董亚男

    2015-01-01

    When people read the reports relating to Occupy Central from different news papers, they get completely different feelings towards the event. To find out how this phenomenon happened, this paper is going to apply transitivity analysis to the news reports. The reports are selected from China Daily, CNN and BBC respectively. To have a deep application of this method, only verbal process wil be taken into consideration. This paper wil discuss the proportion of verbal process from the two sides (Occupy Central people as one side and people against them as the other), the message delivered by the verbal process, the sequence and the transformation of verbal process. The purpose is to uncover the ideology hidden behind the seemingly objective news reports through transitivity analysis.

  8. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  9. Uncovering the Hidden Web, Part I: Finding What the Search Engines Don't. ERIC Digest.

    Science.gov (United States)

    Mardis, Marcia

    Currently, the World Wide Web contains an estimated 7.4 million sites (OCLC, 2001). Yet even the most experienced searcher, using the most robust search engines, can access only about 16% of these pages (Dahn, 2001). The other 84% of the publicly available information on the Web is referred to as the "hidden,""invisible," or "deep" Web. This…

  10. Uncovering the hidden quantum critical point in disordered massless Dirac and Weyl semimetals

    Science.gov (United States)

    Pixley, J. H.; Huse, David A.; Das Sarma, S.

    2016-09-01

    We study the properties of the avoided or hidden quantum critical point (AQCP) in three-dimensional Dirac and Weyl semimetals in the presence of short range potential disorder. By computing the averaged density of states (along with its second and fourth derivative at zero energy) with the kernel polynomial method (KPM) we systematically tune the effective length scale that eventually rounds out the transition and leads to an AQCP. We show how to determine the strength of the avoidance, establishing that it is not controlled by the long wavelength component of the disorder. Instead, the amount of avoidance can be adjusted via the tails of the probability distribution of the local random potentials. A binary distribution with no tails produces much less avoidance than a Gaussian distribution. We introduce a double Gaussian distribution to interpolate between these two limits. As a result we are able to make the length scale of the avoidance sufficiently large so that we can accurately study the properties of the underlying transition (that is eventually rounded out), unambiguously identify its location, and provide accurate estimates of the critical exponents ν =1.01 ±0.06 and z =1.50 ±0.04 . We also show that the KPM expansion order introduces an effective length scale that can also round out the transition in the scaling regime near the AQCP.

  11. Learning analytics in serious gaming: uncovering the hidden treasury of game log files

    NARCIS (Netherlands)

    Westera, Wim; Nadolski, Rob; Hummel, Hans

    2014-01-01

    This paper presents an exploratory analysis of existing log files of the VIBOA environmental policy games at Utrecht University. For reasons of statistical power we’ve combined student cohorts 2008, 2009, 2010, and 2011, which led to a sample size of 118 students. The VIBOA games are inquiry-based g

  12. SNP and Mutation Data on the Web – Hidden Treasures for Uncovering

    OpenAIRE

    Barnes, Michael R.

    2002-01-01

    SNP data has grown exponentially over the last two years, SNP database evolution has matched this growth, as initial development of several independent SNP databases has given way to one central SNP database, dbSNP. Other SNP databases have instead evolved to complement this central database by providing gene specific focus and an increased level of curation and analysis on subsets of data, derived from the central data set. By contrast, human mutation data, which has been collected over many...

  13. An "inverse square law" for the currency market: Uncovering hidden universality in heterogeneous complex systems

    CERN Document Server

    Chakraborty, Abhijit; Sinha, Sitabhra

    2016-01-01

    Identifying universal behavior is a challenging task for far-from-equilibrium complex systems. Here we investigate the collective dynamics of the international currency exchange market and show the existence of a semi-invariant signature masked by the high degree of heterogeneity in this complex system. The cumulative fluctuation distribution in the exchange rates of different currencies possess heavy tails characterized by exponents varying around a median value of 2. The systematic deviation of individual currencies from this putative universal form (the "inverse square law") can be partly ascribed to the differences in their economic prosperity and diversity of export products. The distinct nature of the fluctuation dynamics for currencies of developed, emerging and frontier economies are characterized in detail by detrended fluctuation analysis and variance-ratio tests, which shows that less developed economies are associated with sub-diffusive random walk processes. We hierarchically cluster the currenci...

  14. Performance based analysis of hidden beams in reinforced concrete structures

    Directory of Open Access Journals (Sweden)

    Helou Samir H.

    2014-01-01

    Full Text Available Local and perhaps regional vernacular reinforced concrete building construction leans heavily against designing slabs with imbedded hidden beams for flooring systems in most structures including major edifices. The practice is distinctive in both framed and in shear wall structures. Hidden beams are favoured structural elements due to their many inherent features that characterize them; they save on floor height clearance; they also save on formwork, labour and material cost. Moreover, hidden beams form an acceptable aesthetic appearance that does not hinder efficient interior space partitioning. Such beams have the added advantage of clearing the way for horizontal electromechanical ductwork. However, seismic considerations, in all likelihood, are seldom seriously addressed. The mentioned structural system of shallow beams is adopted in ribbed slabs, waffle slabs and at times with solid slabs. Ribbed slabs and waffle slabs are more prone to hidden beam inclusion due to the added effective height of the concrete section. Due to the presence of a relatively high reinforcement ratio at the joints the sections at such location tend to become less ductile with unreliable contribution to spandrel force resistance. In the following study the structural influence of hidden beams within slabs is investigated. With the primary focus on a performance based analysis of such elements within a structure. This is investigated with due attention to shear wall contribution to the overall behaviour of such structures. Numerical results point in the direction that the function of hidden beams is not as adequate as desired. Therefore it is strongly believed that they are generally superfluous and maybe eliminated altogether. Conversely, shallow beams seem to render the overall seismic capacity of the structure unreliable. Since such an argument is rarely manifested within the linear analysis domain; a pushover analysis exercise is thus mandatory for behaviour

  15. Uncovering Influence through Social Network Analysis: The Role of Schools in Education for Sustainable Development

    Science.gov (United States)

    Kolleck, Nina

    2016-01-01

    This paper examines the implementation of Education for Sustainable Development (ESD) in Germany and explores the possibilities of Social Network Analysis (SNA) for uncovering influential actors in educational policy innovation processes. From the theoretical perspective, an actor's influence is inferred from its relative position within…

  16. A Framework for Bioacoustic Vocalization Analysis Using Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Ebenezer Out-Nyarko

    2009-11-01

    Full Text Available Using Hidden Markov Models (HMMs as a recognition framework for automatic classification of animal vocalizations has a number of benefits, including the ability to handle duration variability through nonlinear time alignment, the ability to incorporate complex language or recognition constraints, and easy extendibility to continuous recognition and detection domains. In this work, we apply HMMs to several different species and bioacoustic tasks using generalized spectral features that can be easily adjusted across species and HMM network topologies suited to each task. This experimental work includes a simple call type classification task using one HMM per vocalization for repertoire analysis of Asian elephants, a language-constrained song recognition task using syllable models as base units for ortolan bunting vocalizations, and a stress stimulus differentiation task in poultry vocalizations using a non-sequential model via a one-state HMM with Gaussian mixtures. Results show strong performance across all tasks and illustrate the flexibility of the HMM framework for a variety of species, vocalization types, and analysis tasks.

  17. Analysis of nanopore data using hidden Markov models

    Science.gov (United States)

    Schreiber, Jacob; Karplus, Kevin

    2015-01-01

    Motivation: Nanopore-based sequencing techniques can reconstruct properties of biosequences by analyzing the sequence-dependent ionic current steps produced as biomolecules pass through a pore. Typically this involves alignment of new data to a reference, where both reference construction and alignment have been performed by hand. Results: We propose an automated method for aligning nanopore data to a reference through the use of hidden Markov models. Several features that arise from prior processing steps and from the class of enzyme used can be simply incorporated into the model. Previously, the M2MspA nanopore was shown to be sensitive enough to distinguish between cytosine, methylcytosine and hydroxymethylcytosine. We validated our automated methodology on a subset of that data by automatically calculating an error rate for the distinction between the three cytosine variants and show that the automated methodology produces a 2–3% error rate, lower than the 10% error rate from previous manual segmentation and alignment. Availability and implementation: The data, output, scripts and tutorials replicating the analysis are available at https://github.com/UCSCNanopore/Data/tree/master/Automation. Contact: karplus@soe.ucsc.edu or jmschreiber91@gmail.com Supplementary information: Supplementary data are available from Bioinformatics online. PMID:25649617

  18. Infinite hidden conditional random fields for human behavior analysis.

    Science.gov (United States)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja

    2013-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF), which is a nonparametric model based on hierarchical Dirichlet processes and is capable of automatically learning the optimal number of hidden states for a classification task. We show how we learn the model hyperparameters with an effective Markov-chain Monte Carlo sampling technique, and we explain the process that underlines our iHCRF model with the Restaurant Franchise Rating Agencies analogy. We show that the iHCRF is able to converge to a correct number of represented hidden states, and outperforms the best finite HCRFs--chosen via cross-validation--for the difficult tasks of recognizing instances of agreement, disagreement, and pain. Moreover, the iHCRF manages to achieve this performance in significantly less total training, validation, and testing time. PMID:24808217

  19. Multivariate longitudinal data analysis with mixed effects hidden Markov models.

    Science.gov (United States)

    Raffa, Jesse D; Dubin, Joel A

    2015-09-01

    Multiple longitudinal responses are often collected as a means to capture relevant features of the true outcome of interest, which is often hidden and not directly measurable. We outline an approach which models these multivariate longitudinal responses as generated from a hidden disease process. We propose a class of models which uses a hidden Markov model with separate but correlated random effects between multiple longitudinal responses. This approach was motivated by a smoking cessation clinical trial, where a bivariate longitudinal response involving both a continuous and a binomial response was collected for each participant to monitor smoking behavior. A Bayesian method using Markov chain Monte Carlo is used. Comparison of separate univariate response models to the bivariate response models was undertaken. Our methods are demonstrated on the smoking cessation clinical trial dataset, and properties of our approach are examined through extensive simulation studies. PMID:25761965

  20. ACTIVITY ANALYSIS WITH HIDDEN MARKOV MODEL FOR AMBIENT ASSISTED LIVING

    Directory of Open Access Journals (Sweden)

    Dietmar Bruckner

    2012-06-01

    Full Text Available In an Ambient Assisted Living (AAL project the activities of the user will be analyzed. The raw data is from a motion detector. Through data processing the huge amount of dynamic raw data was translated to state data. With hidden Markov model, forward algorithm to analyze these state data the daily activity model of the user was built. Thirdly by comparing the model with observed activity sequences, and finding out the similarities between them, defined the best adapt routine in the model. Furthermore an activity routine net was built and used to compare with the hidden Markov model.

  1. Unveiling Hidden Dynamics of Hippo Signalling: A Systems Analysis.

    Science.gov (United States)

    Shin, Sung-Young; Nguyen, Lan K

    2016-01-01

    The Hippo signalling pathway has recently emerged as an important regulator of cell apoptosis and proliferation with significant implications in human diseases. In mammals, the pathway contains the core kinases MST1/2, which phosphorylate and activate LATS1/2 kinases. The pro-apoptotic function of the MST/LATS signalling axis was previously linked to the Akt and ERK MAPK pathways, demonstrating that the Hippo pathway does not act alone but crosstalks with other signalling pathways to coordinate network dynamics and cellular outcomes. These crosstalks were characterised by a multitude of complex regulatory mechanisms involving competitive protein-protein interactions and phosphorylation mediated feedback loops. However, how these different mechanisms interplay in different cellular contexts to drive the context-specific network dynamics of Hippo-ERK signalling remains elusive. Using mathematical modelling and computational analysis, we uncovered that the Hippo-ERK network can generate highly diverse dynamical profiles that can be clustered into distinct dose-response patterns. For each pattern, we offered mechanistic explanation that defines when and how the observed phenomenon can arise. We demonstrated that Akt displays opposing, dose-dependent functions towards ERK, which are mediated by the balance between the Raf-1/MST2 protein interaction module and the LATS1 mediated feedback regulation. Moreover, Ras displays a multi-functional role and drives biphasic responses of both MST2 and ERK activities; which are critically governed by the competitive protein interaction between MST2 and Raf-1. Our study represents the first in-depth and systematic analysis of the Hippo-ERK network dynamics and provides a concrete foundation for future studies. PMID:27527217

  2. Unveiling Hidden Dynamics of Hippo Signalling: A Systems Analysis

    Directory of Open Access Journals (Sweden)

    Sung-Young Shin

    2016-08-01

    Full Text Available The Hippo signalling pathway has recently emerged as an important regulator of cell apoptosis and proliferation with significant implications in human diseases. In mammals, the pathway contains the core kinases MST1/2, which phosphorylate and activate LATS1/2 kinases. The pro-apoptotic function of the MST/LATS signalling axis was previously linked to the Akt and ERK MAPK pathways, demonstrating that the Hippo pathway does not act alone but crosstalks with other signalling pathways to coordinate network dynamics and cellular outcomes. These crosstalks were characterised by a multitude of complex regulatory mechanisms involving competitive protein-protein interactions and phosphorylation mediated feedback loops. However, how these different mechanisms interplay in different cellular contexts to drive the context-specific network dynamics of Hippo-ERK signalling remains elusive. Using mathematical modelling and computational analysis, we uncovered that the Hippo-ERK network can generate highly diverse dynamical profiles that can be clustered into distinct dose-response patterns. For each pattern, we offered mechanistic explanation that defines when and how the observed phenomenon can arise. We demonstrated that Akt displays opposing, dose-dependent functions towards ERK, which are mediated by the balance between the Raf-1/MST2 protein interaction module and the LATS1 mediated feedback regulation. Moreover, Ras displays a multi-functional role and drives biphasic responses of both MST2 and ERK activities; which are critically governed by the competitive protein interaction between MST2 and Raf-1. Our study represents the first in-depth and systematic analysis of the Hippo-ERK network dynamics and provides a concrete foundation for future studies.

  3. Clutter Reduction Based on Principal Component Analysis Technique for Hidden Objects Detection

    OpenAIRE

    V. Kabourek; P. Cerny; Mazanek, M.

    2012-01-01

    This paper brings a brief overview of the statistical method called Principal Component Analysis (PCA). It is used for clutter reduction in detection of hidden objects, targets hidden behind walls, buried landmines, etc. Since the measured data, imaged in time domain, suffer from the hyperbolic character of objects’ reflections, utilization of the Synthetic Aperture Radar (SAR) method is briefly described. Besides, the mathematical basics of PCA as well as its comparison with Singular Value D...

  4. Information- Theoretic Analysis for the Difficulty of Extracting Hidden Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wei-ming; LI Shi-qu; CAO Jia; LIU Jiu-fen

    2005-01-01

    The difficulty of extracting hidden information,which is essentially a kind of secrecy, is analyzed by information-theoretic method. The relations between key rate, message rate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance of stego-key, and the theoretic conclusion is used to analyze the actual extracting attack on Least Significant Bit(LSB) steganographic algorithms.

  5. Analysis of animal accelerometer data using hidden Markov models

    OpenAIRE

    Leos-Barajas, Vianey; Photopoulou, Theoni; Langrock, Roland; Patterson, Toby A; Watanabe, Yuuki; Murgatroyd, Megan; Papastamatiou, Yannis P.

    2016-01-01

    Use of accelerometers is now widespread within animal biotelemetry as they provide a means of measuring an animal's activity in a meaningful and quantitative way where direct observation is not possible. In sequential acceleration data there is a natural dependence between observations of movement or behaviour, a fact that has been largely ignored in most analyses. Analyses of acceleration data where serial dependence has been explicitly modelled have largely relied on hidden Markov models (H...

  6. Costs of Quality: Exploratory Analysis of Hidden Elements and Prioritization using Analytic Hierarchy Process

    Directory of Open Access Journals (Sweden)

    Sailaja A

    2015-02-01

    Full Text Available Cost of Quality analysis is emerged as an effective tool for the industrial managers for pinpointing the deficiencies in the system as well as for identifying the improvement areas by highlighting the cost reduction opportunities. However , this analysis will be fully effective only if it is further extended to identify the cost incurred in ensuring quality in all areas of the supply chain including the hidden costs and costs of missed out opportunities. Most of the hidden elements of quality costs are difficult to track and not accounted by the traditional accounting tools. An exploratory analysis is made in this research to identify the hidden elements of quality costs in manufacturing industry. Further, the identified cost elements are classified into various groups for better analysis and, finally, prioritized to identify the vital few among them. Analytic Hierarchy Process (AHP technique which is one of the most popular Multi Criteria Decision Method (MCDM and Pareto analysis were used in this study for prioritizing the hidden quality cost elements based on their degree of impact on overall cost of quality. By this analysis, the key cost elements which are to be addressed to reduce the overall cost of quality are identified.

  7. Clutter Reduction Based on Principal Component Analysis Technique for Hidden Objects Detection

    Directory of Open Access Journals (Sweden)

    V. Kabourek

    2012-04-01

    Full Text Available This paper brings a brief overview of the statistical method called Principal Component Analysis (PCA. It is used for clutter reduction in detection of hidden objects, targets hidden behind walls, buried landmines, etc. Since the measured data, imaged in time domain, suffer from the hyperbolic character of objects’ reflections, utilization of the Synthetic Aperture Radar (SAR method is briefly described. Besides, the mathematical basics of PCA as well as its comparison with Singular Value Decomposition are presented. The principles of ground and clutter subtraction from image are then demonstrated using training data set and SAR processed measured data.

  8. Identification of hidden failures in process control systems through function-oriented system analysis

    Energy Technology Data Exchange (ETDEWEB)

    Jalashgar, A.

    1997-05-01

    The main subject of this thesis is to identify hidden failures in process control systems by developing and using a function-oriented system analysis method. Qualitative failure analysis and the characteristics of the classical failure analysis methods and function-oriented modelling methods are covered. The general limitations of the methods in connection with the identification and representation of hidden failures are discussed. The discussion has led to the justification of developing and using a function-oriented system analysis method to identify and represent the capabilities of the system components, which realize different sets of functions in connection with different sets of goals that the system must achieve. A terminology is introduced to define the basic aspects of technical systems including goals, functions, capabilities and physical structure. A function-oriented system analysis method using this terminology and a tailored combination of the two function-oriented modelling approaches, is also introduced. It is then explained how the method can be applied in the identification and representation of hidden failures. The building blocks of a knowledge-oriented system to perform the diagnosis on the basis of the developed method are equally described. A prototype of the knowledge-based system is developed to demonstrate the applicability of the function-oriented system analysis method and the knowledge-based system. The prototype is implemented within the object-oriented software environment G2. (au) 65 ills., 32 refs.

  9. Systematic Triple-Mutant Analysis Uncovers Functional Connectivity between Pathways Involved in Chromosome Regulation

    Directory of Open Access Journals (Sweden)

    James E. Haber

    2013-06-01

    Full Text Available Genetic interactions reveal the functional relationships between pairs of genes. In this study, we describe a method for the systematic generation and quantitation of triple mutants, termed triple-mutant analysis (TMA. We have used this approach to interrogate partially redundant pairs of genes in S. cerevisiae, including ASF1 and CAC1, two histone chaperones. After subjecting asf1Δ cac1Δ to TMA, we found that the Swi/Snf Rdh54 protein compensates for the absence of Asf1 and Cac1. Rdh54 more strongly associates with the chromatin apparatus and the pericentromeric region in the double mutant. Moreover, Asf1 is responsible for the synthetic lethality observed in cac1Δ strains lacking the HIRA-like proteins. A similar TMA was carried out after deleting both CLB5 and CLB6, cyclins that regulate DNA replication, revealing a strong functional connection to chromosome segregation. This approach can reveal functional redundancies that cannot be uncovered through traditional double-mutant analyses.

  10. Explodet Project:. Methods of Automatic Data Processing and Analysis for the Detection of Hidden Explosive

    Science.gov (United States)

    Lecca, Paola

    2003-12-01

    The research of the INFN Gruppo Collegato di Trento in the ambit of EXPLODET project for the humanitarian demining, is devoted to the development of a software procedure for the automatization of data analysis and decision taking about the presence of hidden explosive. Innovative algorithms of likely background calculation, a system based on neural networks for energy calibration and simple statistical methods for the qualitative consistency check of the signals are the main parts of the software performing the automatic data elaboration.

  11. Whose Immigration Story?: Attending to Hidden Messages of Material in Social Studies

    Science.gov (United States)

    Oikonomidoy, Eleni; Williams, Gwendolyn

    2010-01-01

    Sometimes materials used in schools with good intentions can have effects opposite from those stated. Through the microscopic analysis of a parent-student immigration interview assignment on a social studies unit on immigration, this article aims to uncover the hidden story that underlies the questions asked. In so doing, it intends not only to…

  12. Differential SAGE analysis in Arabidopsis uncovers increased transcriptome complexity in response to low temperature

    Directory of Open Access Journals (Sweden)

    Parkin Isobel AP

    2008-09-01

    Full Text Available Abstract Background Abiotic stress, including low temperature, limits the productivity and geographical distribution of plants, which has led to significant interest in understanding the complex processes that allow plants to adapt to such stresses. The wide range of physiological, biochemical and molecular changes that occur in plants exposed to low temperature require a robust global approach to studying the response. We have employed Serial Analysis of Gene Expression (SAGE to uncover changes in the transcriptome of Arabidopsis thaliana over a time course of low temperature stress. Results Five SAGE libraries were generated from A. thaliana leaf tissue collected at time points ranging from 30 minutes to one week of low temperature treatment (4°C. Over 240,000 high quality SAGE tags, corresponding to 16,629 annotated genes, provided a comprehensive survey of changes in the transcriptome in response to low temperature, from perception of the stress to acquisition of freezing tolerance. Interpretation of these data was facilitated by representing the SAGE data by gene identifier, allowing more robust statistical analysis, cross-platform comparisons and the identification of genes sharing common expression profiles. Simultaneous statistical calculations across all five libraries identified 920 low temperature responsive genes, only 24% of which overlapped with previous global expression analysis performed using microarrays, although similar functional categories were affected. Clustering of the differentially regulated genes facilitated the identification of novel loci correlated with the development of freezing tolerance. Analysis of their promoter sequences revealed subsets of genes that were independent of CBF and ABA regulation and could provide a mechanism for elucidating complementary signalling pathways. The SAGE data emphasised the complexity of the plant response, with alternate pre-mRNA processing events increasing at low temperatures

  13. Hidden Trends in 90 Years of Harvard Business Review

    OpenAIRE

    Tsai, Chia-Chi; Liu, Chao-Lin; Huang, Wei-Jie; Shan, Man-Kwan

    2012-01-01

    In this paper, we demonstrate and discuss results of our mining the abstracts of the publications in Harvard Business Review between 1922 and 2012. Techniques for computing n-grams, collocations, basic sentiment analysis, and named-entity recognition were employed to uncover trends hidden in the abstracts. We present findings about international relationships, sentiment in HBR's abstracts, important international companies, influential technological inventions, renown researchers in managemen...

  14. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels

    DEFF Research Database (Denmark)

    Kilpeläinen, Tuomas O; Carli, Jayne F Martin; Skowronski, Alicja A;

    2016-01-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered...

  15. IEEE 802.11e (EDCA analysis in the presence of hidden stations

    Directory of Open Access Journals (Sweden)

    Xijie Liu

    2011-07-01

    Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.

  16. Theoretical analysis of hidden photon searches in high-precision experiments

    Energy Technology Data Exchange (ETDEWEB)

    Beranek, Tobias

    2014-04-11

    Although the Standard Model of particle physics (SM) provides an extremely successful description of the ordinary matter, one knows from astronomical observations that it accounts only for around 5% of the total energy density of the Universe, whereas around 30% are contributed by the dark matter. Motivated by anomalies in cosmic ray observations and by attempts to solve questions of the SM like the (g-2){sub μ} discrepancy, proposed U(1) extensions of the Standard Model gauge group SU(3) x SU(2) x U(1) have raised attention in recent years. In the considered U(1) extensions a new, light messenger particle γ', the hidden photon, couples to the hidden sector as well as to the electromagnetic current of the SM by kinetic mixing. This allows for a search for this particle in laboratory experiments exploring the electromagnetic interaction. Various experimental programs have been started to search for the γ' boson, such as in electron-scattering experiments, which are a versatile tool to explore various physics phenomena. One approach is the dedicated search in fixed-target experiments at modest energies as performed at MAMI or at JLAB. In these experiments the scattering of an electron beam off a hadronic target e→e(A,Z)l{sup +}l{sup -} is investigated and a search for a very narrow resonance in the invariant mass distribution of the l{sup +}l{sup -} pair is performed. This requires an accurate understanding of the theoretical basis of the underlying processes. For this purpose it is demonstrated in the first part of this work, in which way the hidden photon can be motivated from existing puzzles encountered at the precision frontier of the SM. The main part of this thesis deals with the analysis of the theoretical framework for electron scattering fixed-target experiments searching for hidden photons. As a first step, the cross section for the bremsstrahlung emission of hidden photons in such experiments is studied. Based on these results, the

  17. A hidden Ising model for ChIP-chip data analysis

    KAUST Repository

    Mo, Q.

    2010-01-28

    Motivation: Chromatin immunoprecipitation (ChIP) coupled with tiling microarray (chip) experiments have been used in a wide range of biological studies such as identification of transcription factor binding sites and investigation of DNA methylation and histone modification. Hidden Markov models are widely used to model the spatial dependency of ChIP-chip data. However, parameter estimation for these models is typically either heuristic or suboptimal, leading to inconsistencies in their applications. To overcome this limitation and to develop an efficient software, we propose a hidden ferromagnetic Ising model for ChIP-chip data analysis. Results: We have developed a simple, but powerful Bayesian hierarchical model for ChIP-chip data via a hidden Ising model. Metropolis within Gibbs sampling algorithm is used to simulate from the posterior distribution of the model parameters. The proposed model naturally incorporates the spatial dependency of the data, and can be used to analyze data with various genomic resolutions and sample sizes. We illustrate the method using three publicly available datasets and various simulated datasets, and compare it with three closely related methods, namely TileMap HMM, tileHMM and BAC. We find that our method performs as well as TileMap HMM and BAC for the high-resolution data from Affymetrix platform, but significantly outperforms the other three methods for the low-resolution data from Agilent platform. Compared with the BAC method which also involves MCMC simulations, our method is computationally much more efficient. Availability: A software called iChip is freely available at http://www.bioconductor.org/. Contact: moq@mskcc.org. © The Author 2010. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oxfordjournals.org.

  18. Analysis on hidden blood loss of total knee arthroplasty in treating knee osteoarthritis

    Institute of Scientific and Technical Information of China (English)

    SHEN Hui-liang; LI Zheng; FENG Ming-li; CAO Guang-le

    2011-01-01

    Background Total knee arthroplasty (TKA) is an important therapy for the treatment of various late-stage knee diseases. However, it has been observed that patients have lower hemoglobin (HB) counts postoperatively, which are significantly inconsistent with the measured blood loss. Although the concept of hidden blood loss has been presented in 2000, very little clinical attention has been paid since then. In this study, we investigated the characteristics and influential factor of hidden blood loss after TKA in treating knee osteoarthritis.Methods One hundred and eight patients, with 42 males and 66 females, were retrospectively analyzed. The perioperative blood loss and the hidden blood loss following TKA were calculated by Gross formula. Potential factors affecting perioperative and hidden blood loss included gender, surgical time, tourniquet time, hemostasis (during operation with deflating tourniquet), and reinfusion of salvaged blood.Results The average perioperative blood loss was found to be (1553±356) ml and the average hidden blood loss was (793±223) ml. The hidden blood loss of the male was significantly higher than that of the female, and was reduced by hemostasis during the operation with a deflating tourniquet. Hidden blood loss was not affected by postoperative blood salvage and reinfusion, surgical time, or tourniquet time.Conclusions When calculating the value of hidden blood loss by Gross formula, the lowest value of hematocrit should be chosen as the parameter so that hidden blood loss would not be underestimated. No significant differences could be found in hidden blood loss for males compared to females. Hidden blood loss can be reduced by hemostasis during operation with a deflating tourniquet. Although reinfusion of salvaged blood could not reduce the perioperative blood loss or hidden blood loss, it was still an effective method to reduce transfusion rate.

  19. Hidden Markov model analysis of maternal behavior patterns in inbred and reciprocal hybrid mice.

    Directory of Open Access Journals (Sweden)

    Valeria Carola

    Full Text Available Individual variation in maternal care in mammals shows a significant heritable component, with the maternal behavior of daughters resembling that of their mothers. In laboratory mice, genetically distinct inbred strains show stable differences in maternal care during the first postnatal week. Moreover, cross fostering and reciprocal breeding studies demonstrate that differences in maternal care between inbred strains persist in the absence of genetic differences, demonstrating a non-genetic or epigenetic contribution to maternal behavior. In this study we applied a mathematical tool, called hidden Markov model (HMM, to analyze the behavior of female mice in the presence of their young. The frequency of several maternal behaviors in mice has been previously described, including nursing/grooming pups and tending to the nest. However, the ordering, clustering, and transitions between these behaviors have not been systematically described and thus a global description of maternal behavior is lacking. Here we used HMM to describe maternal behavior patterns in two genetically distinct mouse strains, C57BL/6 and BALB/c, and their genetically identical reciprocal hybrid female offspring. HMM analysis is a powerful tool to identify patterns of events that cluster in time and to determine transitions between these clusters, or hidden states. For the HMM analysis we defined seven states: arched-backed nursing, blanket nursing, licking/grooming pups, grooming, activity, eating, and sleeping. By quantifying the frequency, duration, composition, and transition probabilities of these states we were able to describe the pattern of maternal behavior in mouse and identify aspects of these patterns that are under genetic and nongenetic inheritance. Differences in these patterns observed in the experimental groups (inbred and hybrid females were detected only after the application of HMM analysis whereas classical statistical methods and analyses were not able to

  20. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels.

    Science.gov (United States)

    Kilpeläinen, Tuomas O; Carli, Jayne F Martin; Skowronski, Alicja A; Sun, Qi; Kriebel, Jennifer; Feitosa, Mary F; Hedman, Åsa K; Drong, Alexander W; Hayes, James E; Zhao, Jinghua; Pers, Tune H; Schick, Ursula; Grarup, Niels; Kutalik, Zoltán; Trompet, Stella; Mangino, Massimo; Kristiansson, Kati; Beekman, Marian; Lyytikäinen, Leo-Pekka; Eriksson, Joel; Henneman, Peter; Lahti, Jari; Tanaka, Toshiko; Luan, Jian'an; Del Greco M, Fabiola; Pasko, Dorota; Renström, Frida; Willems, Sara M; Mahajan, Anubha; Rose, Lynda M; Guo, Xiuqing; Liu, Yongmei; Kleber, Marcus E; Pérusse, Louis; Gaunt, Tom; Ahluwalia, Tarunveer S; Ju Sung, Yun; Ramos, Yolande F; Amin, Najaf; Amuzu, Antoinette; Barroso, Inês; Bellis, Claire; Blangero, John; Buckley, Brendan M; Böhringer, Stefan; I Chen, Yii-Der; de Craen, Anton J N; Crosslin, David R; Dale, Caroline E; Dastani, Zari; Day, Felix R; Deelen, Joris; Delgado, Graciela E; Demirkan, Ayse; Finucane, Francis M; Ford, Ian; Garcia, Melissa E; Gieger, Christian; Gustafsson, Stefan; Hallmans, Göran; Hankinson, Susan E; Havulinna, Aki S; Herder, Christian; Hernandez, Dena; Hicks, Andrew A; Hunter, David J; Illig, Thomas; Ingelsson, Erik; Ioan-Facsinay, Andreea; Jansson, John-Olov; Jenny, Nancy S; Jørgensen, Marit E; Jørgensen, Torben; Karlsson, Magnus; Koenig, Wolfgang; Kraft, Peter; Kwekkeboom, Joanneke; Laatikainen, Tiina; Ladwig, Karl-Heinz; LeDuc, Charles A; Lowe, Gordon; Lu, Yingchang; Marques-Vidal, Pedro; Meisinger, Christa; Menni, Cristina; Morris, Andrew P; Myers, Richard H; Männistö, Satu; Nalls, Mike A; Paternoster, Lavinia; Peters, Annette; Pradhan, Aruna D; Rankinen, Tuomo; Rasmussen-Torvik, Laura J; Rathmann, Wolfgang; Rice, Treva K; Brent Richards, J; Ridker, Paul M; Sattar, Naveed; Savage, David B; Söderberg, Stefan; Timpson, Nicholas J; Vandenput, Liesbeth; van Heemst, Diana; Uh, Hae-Won; Vohl, Marie-Claude; Walker, Mark; Wichmann, Heinz-Erich; Widén, Elisabeth; Wood, Andrew R; Yao, Jie; Zeller, Tanja; Zhang, Yiying; Meulenbelt, Ingrid; Kloppenburg, Margreet; Astrup, Arne; Sørensen, Thorkild I A; Sarzynski, Mark A; Rao, D C; Jousilahti, Pekka; Vartiainen, Erkki; Hofman, Albert; Rivadeneira, Fernando; Uitterlinden, André G; Kajantie, Eero; Osmond, Clive; Palotie, Aarno; Eriksson, Johan G; Heliövaara, Markku; Knekt, Paul B; Koskinen, Seppo; Jula, Antti; Perola, Markus; Huupponen, Risto K; Viikari, Jorma S; Kähönen, Mika; Lehtimäki, Terho; Raitakari, Olli T; Mellström, Dan; Lorentzon, Mattias; Casas, Juan P; Bandinelli, Stefanie; März, Winfried; Isaacs, Aaron; van Dijk, Ko W; van Duijn, Cornelia M; Harris, Tamara B; Bouchard, Claude; Allison, Matthew A; Chasman, Daniel I; Ohlsson, Claes; Lind, Lars; Scott, Robert A; Langenberg, Claudia; Wareham, Nicholas J; Ferrucci, Luigi; Frayling, Timothy M; Pramstaller, Peter P; Borecki, Ingrid B; Waterworth, Dawn M; Bergmann, Sven; Waeber, Gérard; Vollenweider, Peter; Vestergaard, Henrik; Hansen, Torben; Pedersen, Oluf; Hu, Frank B; Eline Slagboom, P; Grallert, Harald; Spector, Tim D; Jukema, J W; Klein, Robert J; Schadt, Erik E; Franks, Paul W; Lindgren, Cecilia M; Leibel, Rudolph L; Loos, Ruth J F

    2016-01-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered. Therefore, we performed a genome-wide association study (GWAS) of circulating leptin levels from 32,161 individuals and followed up loci reaching P<10(-6) in 19,979 additional individuals. We identify five loci robustly associated (P<5 × 10(-8)) with leptin levels in/near LEP, SLC32A1, GCKR, CCNL1 and FTO. Although the association of the FTO obesity locus with leptin levels is abolished by adjustment for BMI, associations of the four other loci are independent of adiposity. The GCKR locus was found associated with multiple metabolic traits in previous GWAS and the CCNL1 locus with birth weight. Knockdown experiments in mouse adipose tissue explants show convincing evidence for adipogenin, a regulator of adipocyte differentiation, as the novel causal gene in the SLC32A1 locus influencing leptin levels. Our findings provide novel insights into the regulation of leptin production by adipose tissue and open new avenues for examining the influence of variation in leptin levels on adiposity and metabolic health. PMID:26833098

  1. Proteomic Analysis of Cytokeratin Isoforms Uncovers Association with Survival in Lung Adenocarcinoma

    Directory of Open Access Journals (Sweden)

    Tarek G. Gharib

    2002-01-01

    Full Text Available Cytokeratins. (CK are intermediate filaments whose expression is often altered in epithelial cancer. Systematic identification of lung adenocarcinoma proteins using two-dimensional polyacrylamide gel electrophoresis and mass spectrometry has uncovered numerous CK isoforms. In this study, 93 lung adenocarcinomas. (64 stage I and 29 stage III and 10 uninvolved lung samples were quantitatively examined for protein expression. Fourteen of 21 isoforms of CK 7, 8, 18, 19 occurred at significantly higher levels. (P<.05 in tumors compared to uninvolved adjacent tissue. Specific isoforms of the four types of CK identified correlated with either clinical outcome or individual clinical-pathological parameters. All five of the CK7 isoforms associated with patient survival represented cleavage products. Two of five CK7 isoforms. (nos. 2165 and 2091, one of eight CK8 isoforms. (no. 439, one of three CK19 isoforms. (no. 1955 were associated with survival and significantly correlated to their mRNA levels, suggesting that transcription underlies overexpression of these CK isoforms. Our data indicate substantial heterogeneity among CK in lung adenocarcinomas resulting from posttranslational modifications, some of which correlated with patient survival and other clinical parameters. Therefore, specific isoforms of individual CK may have utility as diagnostic or predictive markers in lung adenocarcinomas.

  2. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels

    Science.gov (United States)

    Kilpeläinen, Tuomas O.; Carli, Jayne F. Martin; Skowronski, Alicja A.; Sun, Qi; Kriebel, Jennifer; Feitosa, Mary F; Hedman, Åsa K.; Drong, Alexander W.; Hayes, James E.; Zhao, Jinghua; Pers, Tune H.; Schick, Ursula; Grarup, Niels; Kutalik, Zoltán; Trompet, Stella; Mangino, Massimo; Kristiansson, Kati; Beekman, Marian; Lyytikäinen, Leo-Pekka; Eriksson, Joel; Henneman, Peter; Lahti, Jari; Tanaka, Toshiko; Luan, Jian'an; Greco M, Fabiola Del; Pasko, Dorota; Renström, Frida; Willems, Sara M.; Mahajan, Anubha; Rose, Lynda M.; Guo, Xiuqing; Liu, Yongmei; Kleber, Marcus E.; Pérusse, Louis; Gaunt, Tom; Ahluwalia, Tarunveer S.; Ju Sung, Yun; Ramos, Yolande F.; Amin, Najaf; Amuzu, Antoinette; Barroso, Inês; Bellis, Claire; Blangero, John; Buckley, Brendan M.; Böhringer, Stefan; I Chen, Yii-Der; de Craen, Anton J. N.; Crosslin, David R.; Dale, Caroline E.; Dastani, Zari; Day, Felix R.; Deelen, Joris; Delgado, Graciela E.; Demirkan, Ayse; Finucane, Francis M.; Ford, Ian; Garcia, Melissa E.; Gieger, Christian; Gustafsson, Stefan; Hallmans, Göran; Hankinson, Susan E.; Havulinna, Aki S; Herder, Christian; Hernandez, Dena; Hicks, Andrew A.; Hunter, David J.; Illig, Thomas; Ingelsson, Erik; Ioan-Facsinay, Andreea; Jansson, John-Olov; Jenny, Nancy S.; Jørgensen, Marit E.; Jørgensen, Torben; Karlsson, Magnus; Koenig, Wolfgang; Kraft, Peter; Kwekkeboom, Joanneke; Laatikainen, Tiina; Ladwig, Karl-Heinz; LeDuc, Charles A.; Lowe, Gordon; Lu, Yingchang; Marques-Vidal, Pedro; Meisinger, Christa; Menni, Cristina; Morris, Andrew P.; Myers, Richard H.; Männistö, Satu; Nalls, Mike A.; Paternoster, Lavinia; Peters, Annette; Pradhan, Aruna D.; Rankinen, Tuomo; Rasmussen-Torvik, Laura J.; Rathmann, Wolfgang; Rice, Treva K.; Brent Richards, J; Ridker, Paul M.; Sattar, Naveed; Savage, David B.; Söderberg, Stefan; Timpson, Nicholas J.; Vandenput, Liesbeth; van Heemst, Diana; Uh, Hae-Won; Vohl, Marie-Claude; Walker, Mark; Wichmann, Heinz-Erich; Widén, Elisabeth; Wood, Andrew R.; Yao, Jie; Zeller, Tanja; Zhang, Yiying; Meulenbelt, Ingrid; Kloppenburg, Margreet; Astrup, Arne; Sørensen, Thorkild I. A.; Sarzynski, Mark A.; Rao, D. C.; Jousilahti, Pekka; Vartiainen, Erkki; Hofman, Albert; Rivadeneira, Fernando; Uitterlinden, André G.; Kajantie, Eero; Osmond, Clive; Palotie, Aarno; Eriksson, Johan G.; Heliövaara, Markku; Knekt, Paul B.; Koskinen, Seppo; Jula, Antti; Perola, Markus; Huupponen, Risto K.; Viikari, Jorma S.; Kähönen, Mika; Lehtimäki, Terho; Raitakari, Olli T.; Mellström, Dan; Lorentzon, Mattias; Casas, Juan P.; Bandinelli, Stefanie; März, Winfried; Isaacs, Aaron; van Dijk, Ko W.; van Duijn, Cornelia M.; Harris, Tamara B.; Bouchard, Claude; Allison, Matthew A.; Chasman, Daniel I.; Ohlsson, Claes; Lind, Lars; Scott, Robert A.; Langenberg, Claudia; Wareham, Nicholas J.; Ferrucci, Luigi; Frayling, Timothy M.; Pramstaller, Peter P.; Borecki, Ingrid B.; Waterworth, Dawn M.; Bergmann, Sven; Waeber, Gérard; Vollenweider, Peter; Vestergaard, Henrik; Hansen, Torben; Pedersen, Oluf; Hu, Frank B.; Eline Slagboom, P; Grallert, Harald; Spector, Tim D.; Jukema, J.W.; Klein, Robert J.; Schadt, Erik E; Franks, Paul W.; Lindgren, Cecilia M.; Leibel, Rudolph L.; Loos, Ruth J. F.

    2016-01-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered. Therefore, we performed a genome-wide association study (GWAS) of circulating leptin levels from 32,161 individuals and followed up loci reaching P<10−6 in 19,979 additional individuals. We identify five loci robustly associated (P<5 × 10−8) with leptin levels in/near LEP, SLC32A1, GCKR, CCNL1 and FTO. Although the association of the FTO obesity locus with leptin levels is abolished by adjustment for BMI, associations of the four other loci are independent of adiposity. The GCKR locus was found associated with multiple metabolic traits in previous GWAS and the CCNL1 locus with birth weight. Knockdown experiments in mouse adipose tissue explants show convincing evidence for adipogenin, a regulator of adipocyte differentiation, as the novel causal gene in the SLC32A1 locus influencing leptin levels. Our findings provide novel insights into the regulation of leptin production by adipose tissue and open new avenues for examining the influence of variation in leptin levels on adiposity and metabolic health. PMID:26833098

  3. Hidden corrosion detection in aircraft aluminum structures using laser ultrasonics and wavelet transform signal analysis.

    Science.gov (United States)

    Silva, M Z; Gouyon, R; Lepoutre, F

    2003-06-01

    Preliminary results of hidden corrosion detection in aircraft aluminum structures using a noncontact laser based ultrasonic technique are presented. A short laser pulse focused to a line spot is used as a broadband source of ultrasonic guided waves in an aluminum 2024 sample cut from an aircraft structure and prepared with artificially corroded circular areas on its back surface. The out of plane surface displacements produced by the propagating ultrasonic waves were detected with a heterodyne Mach-Zehnder interferometer. Time-frequency analysis of the signals using a continuous wavelet transform allowed the identification of the generated Lamb modes by comparison with the calculated dispersion curves. The presence of back surface corrosion was detected by noting the loss of the S(1) mode near its cutoff frequency. This method is applicable to fast scanning inspection techniques and it is particularly suited for early corrosion detection. PMID:12782263

  4. Regularized Deterministic Annealing Hidden Markov Models for Identificationand Analysis of Seismic and Aseismic events.

    Science.gov (United States)

    Granat, R. A.; Clayton, R.; Kedar, S.; Kaneko, Y.

    2003-12-01

    We employ a robust hidden Markov model (HMM) based technique to perform statistical pattern analysis of suspected seismic and aseismic events in the poorly explored period band of minutes to hours. The technique allows us to classify known events and provides a statistical basis for finding and cataloging similar events represented elsewhere in the observations. In this work, we focus on data collected by the Southern California TriNet system. The hidden Markov model (HMM) approach assumes that the observed data has been generated by an unobservable dynamical statistical process. The process is of a particular form such that each observation is coincident with the system being in a particular discrete state. The dynamics are the model are constructed so that the next state is directly dependent only on the current state -- it is a first order Markov process. The model is completely described by a set of parameters: the initial state probabilities, the first order Markov chain state-to-state transition probabilities, and the probability distribution of observable outputs associated with each state. Application of the model to data involves optimizing these model parameters with respect to some function of the observations, typically the likelihood of the observations given the model. Our work focused on the fact that this objective function has a number of local maxima that is exponential in the model size (the number of states). This means that not only is it very difficult to discover the global maximum, but also that results can vary widely between applications of the model. For some domains which employ HMMs for such purposes, such as speech processing, sufficient a priori information about the system is available to avoid this problem. However, for seismic data in general such a priori information is not available. Our approach involves analytical location of sub-optimal local maxima; once the locations of these maxima have been found, then we can employ a

  5. Computational analysis of the mechanism of chemical reactions in terms of reaction phases: hidden intermediates and hidden transition States.

    Science.gov (United States)

    Kraka, Elfi; Cremer, Dieter

    2010-05-18

    Computational approaches to understanding chemical reaction mechanisms generally begin by establishing the relative energies of the starting materials, transition state, and products, that is, the stationary points on the potential energy surface of the reaction complex. Examining the intervening species via the intrinsic reaction coordinate (IRC) offers further insight into the fate of the reactants by delineating, step-by-step, the energetics involved along the reaction path between the stationary states. For a detailed analysis of the mechanism and dynamics of a chemical reaction, the reaction path Hamiltonian (RPH) and the united reaction valley approach (URVA) are an efficient combination. The chemical conversion of the reaction complex is reflected by the changes in the reaction path direction t(s) and reaction path curvature k(s), both expressed as a function of the path length s. This information can be used to partition the reaction path, and by this the reaction mechanism, of a chemical reaction into reaction phases describing chemically relevant changes of the reaction complex: (i) a contact phase characterized by van der Waals interactions, (ii) a preparation phase, in which the reactants prepare for the chemical processes, (iii) one or more transition state phases, in which the chemical processes of bond cleavage and bond formation take place, (iv) a product adjustment phase, and (v) a separation phase. In this Account, we examine mechanistic analysis with URVA in detail, focusing on recent theoretical insights (with a variety of reaction types) from our laboratories. Through the utilization of the concept of localized adiabatic vibrational modes that are associated with the internal coordinates, q(n)(s), of the reaction complex, the chemical character of each reaction phase can be identified via the adiabatic curvature coupling coefficients, A(n,s)(s). These quantities reveal whether a local adiabatic vibrational mode supports (A(n,s) > 0) or resists

  6. Meta-analysis of cancer transcriptomes: A new approach to uncover molecular pathological events in different cancer tissues

    Directory of Open Access Journals (Sweden)

    Sundus Iqbal

    2014-03-01

    Full Text Available To explore secrets of metastatic cancers, individual expression of true sets of respective genes must spread across the tissue. In this study, meta-analysis for transcriptional profiles of oncogenes was carried out to hunt critical genes or networks helping in metastasizing cancers. For this, transcriptomic analysis of different cancerous tissues causing leukemia, lung, liver, spleen, colorectal, colon, breast, bladder, and kidney cancers was performed by extracting microarray expression data from online resource; Gene Expression Omnibus. A newly developed bioinformatics technique; Dynamic Impact Approach (DIA was applied for enrichment analysis of transcriptional profiles using Database for Annotation Visualization and Integrated Discovery (DAVID. Furthermore, oPOSSUM (v. 2.0 and Cytoscape (v. 2.8.2 were used for in-depth analysis of transcription factors and regulatory gene networks respectively. DAVID analysis uncovered the most significantly enriched pathways in molecular functions that were 'Ubiquitin thiolesterase activity' up regulated in blood, breast, bladder, colorectal, lung, spleen, prostrate cancer. 'Transforming growth factor beta receptor activity' was inhibited in all cancers except leukemia, colon and liver cancer. oPOSSUM further revealed highly over-represented Transcription Factors (TFs; Broad-complex_3, Broad-complex_4, and Foxd3 except for leukemia and bladder cancer. From these findings, it is possible to target genes and networks, play a crucial role in the development of cancer. In the future, these transcription factors can serve as potential candidates for the therapeutic drug targets which can impede the deadly spread.

  7. Network Analysis as a Communication Audit Instrument: Uncovering Communicative Strengths and Weaknesses Within Organizations

    NARCIS (Netherlands)

    Zwijze-Koning, Karen H.; Jong, de M.D.T.

    2015-01-01

    Network analysis is one of the instruments in the communication audit toolbox to diagnose communication problems within organizations. To explore its contribution to a communication audit, the authors conducted a network analysis within three secondary schools, comparing its results with those of tw

  8. Temporal structure analysis of broadcast tennis video using hidden Markov models

    Science.gov (United States)

    Kijak, Ewa; Oisel, Lionel; Gros, Patrick

    2003-01-01

    This work aims at recovering the temporal structure of a broadcast tennis video from an analysis of the raw footage. Our method relies on a statistical model of the interleaving of shots, in order to group shots into predefined classes representing structural elements of a tennis video. This stochastic modeling is performed in the global framework of Hidden Markov Models (HMMs). The fundamental units are shots and transitions. In a first step, colors and motion attributes of segmented shots are used to map shots into 2 classes: game (view of the full tennis court) and not game (medium, close up views, and commercials). In a second step, a trained HMM is used to analyze the temporal interleaving of shots. This analysis results in the identification of more complex structures, such as first missed services, short rallies that could be aces or services, long rallies, breaks that are significant of the end of a game and replays that highlight interesting points. These higher-level unit structures can be used either to create summaries, or to allow non-linear browsing of the video.

  9. Near-Surface CO2 Monitoring And Analysis To Detect Hidden Geothermal Systems

    OpenAIRE

    Lewicki, Jennifer L.; Oldenburg, Curtis M.

    2005-01-01

    "Hidden" geothermal systems are systems devoid of obvious surface hydrothermal manifestations. Emissions of moderate-to-low solubility gases may be one of the primary near-surface signals from these systems. We investigate the potential for CO2 detection and monitoring below and above ground in the near-surface environment as an approach to exploration targeting hidden geothermal systems. We focus on CO2 because it is the dominant noncondensible gas species in most geothermal systems and...

  10. A Procedure for Uncovering Acceptable and Nonacceptable Mortgage Applications through Discriminant Analysis Using Ranked Data

    OpenAIRE

    Larry G. Perry; Timothy P. Cronan; Donald A. Epley

    1987-01-01

    The procedure developed in this paper uses a less biased statistical technique than conventional discriminant analysis and parallels the ranking procedure used by loan officers. A variety of univariate and multivariate statistical procedures as well as comprehensive validation methods are used to develop a "best" model. The resulting model provides more accurate classification than other studies have shown, without violating federal law regarding discrimination.

  11. Analysis of the Legionella longbeachae genome and transcriptome uncovers unique strategies to cause Legionnaires' disease.

    Directory of Open Access Journals (Sweden)

    Christel Cazalet

    2010-02-01

    Full Text Available Legionella pneumophila and L. longbeachae are two species of a large genus of bacteria that are ubiquitous in nature. L. pneumophila is mainly found in natural and artificial water circuits while L. longbeachae is mainly present in soil. Under the appropriate conditions both species are human pathogens, capable of causing a severe form of pneumonia termed Legionnaires' disease. Here we report the sequencing and analysis of four L. longbeachae genomes, one complete genome sequence of L. longbeachae strain NSW150 serogroup (Sg 1, and three draft genome sequences another belonging to Sg1 and two to Sg2. The genome organization and gene content of the four L. longbeachae genomes are highly conserved, indicating strong pressure for niche adaptation. Analysis and comparison of L. longbeachae strain NSW150 with L. pneumophila revealed common but also unexpected features specific to this pathogen. The interaction with host cells shows distinct features from L. pneumophila, as L. longbeachae possesses a unique repertoire of putative Dot/Icm type IV secretion system substrates, eukaryotic-like and eukaryotic domain proteins, and encodes additional secretion systems. However, analysis of the ability of a dotA mutant of L. longbeachae NSW150 to replicate in the Acanthamoeba castellanii and in a mouse lung infection model showed that the Dot/Icm type IV secretion system is also essential for the virulence of L. longbeachae. In contrast to L. pneumophila, L. longbeachae does not encode flagella, thereby providing a possible explanation for differences in mouse susceptibility to infection between the two pathogens. Furthermore, transcriptome analysis revealed that L. longbeachae has a less pronounced biphasic life cycle as compared to L. pneumophila, and genome analysis and electron microscopy suggested that L. longbeachae is encapsulated. These species-specific differences may account for the different environmental niches and disease epidemiology of these

  12. Face Aging Effect Simulation Using Hidden Factor Analysis Joint Sparse Representation

    Science.gov (United States)

    Yang, Hongyu; Huang, Di; Wang, Yunhong; Wang, Heng; Tang, Yuanyan

    2016-06-01

    Face aging simulation has received rising investigations nowadays, whereas it still remains a challenge to generate convincing and natural age-progressed face images. In this paper, we present a novel approach to such an issue by using hidden factor analysis joint sparse representation. In contrast to the majority of tasks in the literature that handle the facial texture integrally, the proposed aging approach separately models the person-specific facial properties that tend to be stable in a relatively long period and the age-specific clues that change gradually over time. It then merely transforms the age component to a target age group via sparse reconstruction, yielding aging effects, which is finally combined with the identity component to achieve the aged face. Experiments are carried out on three aging databases, and the results achieved clearly demonstrate the effectiveness and robustness of the proposed method in rendering a face with aging effects. Additionally, a series of evaluations prove its validity with respect to identity preservation and aging effect generation.

  13. The Correspondence Analysis Platform for Uncovering Deep Structure in Data and Information

    CERN Document Server

    Murtagh, Fionn

    2008-01-01

    We study two aspects of information semantics: (i) the collection of all relationships, (ii) tracking and spotting anomaly and change. The first is implemented by endowing all relevant information spaces with a Euclidean metric in a common projected space. The second is modelled by an induced ultrametric. A very general way to achieve a Euclidean embedding of different information spaces based on cross-tabulation counts (and from other input data formats) is provided by Correspondence Analysis. From there, the induced ultrametric that we are particularly interested in takes a sequential - e.g. temporal - ordering of the data into account. We employ such a perspective to look at narrative, "the flow of thought and the flow of language" (Chafe). In application to policy decision making, we show how we can focus analysis in a small number of dimensions.

  14. Decision analysis and drug development portfolio management: uncovering the real options value of your projects.

    Science.gov (United States)

    Rosati, Nicoletta

    2002-04-01

    Project selection and portfolio management are particularly challenging in the pharmaceutical industry due to the high risk - high stake nature of the drug development process. In the recent years, scholars and industry experts have agreed that traditional Net-Present-Value evaluation of the projects fails to capture the value of managerial flexibility, and encouraged adopting a real options approach to recover the missed value. In this paper, we take a closer look at the drug development process and at the indices currently used to rank projects. We discuss the economic value of information and of real options arising in drug development and present decision analysis as an ideal framework for the implementation of real options valuation. PMID:19807328

  15. Genome-wide analysis of single nucleotide polymorphisms uncovers population structure in Northern Europe.

    Directory of Open Access Journals (Sweden)

    Elina Salmela

    Full Text Available BACKGROUND: Genome-wide data provide a powerful tool for inferring patterns of genetic variation and structure of human populations. PRINCIPAL FINDINGS: In this study, we analysed almost 250,000 SNPs from a total of 945 samples from Eastern and Western Finland, Sweden, Northern Germany and Great Britain complemented with HapMap data. Small but statistically significant differences were observed between the European populations (F(ST = 0.0040, p<10(-4, also between Eastern and Western Finland (F(ST = 0.0032, p<10(-3. The latter indicated the existence of a relatively strong autosomal substructure within the country, similar to that observed earlier with smaller numbers of markers. The Germans and British were less differentiated than the Swedes, Western Finns and especially the Eastern Finns who also showed other signs of genetic drift. This is likely caused by the later founding of the northern populations, together with subsequent founder and bottleneck effects, and a smaller population size. Furthermore, our data suggest a small eastern contribution among the Finns, consistent with the historical and linguistic background of the population. SIGNIFICANCE: Our results warn against a priori assumptions of homogeneity among Finns and other seemingly isolated populations. Thus, in association studies in such populations, additional caution for population structure may be necessary. Our results illustrate that population history is often important for patterns of genetic variation, and that the analysis of hundreds of thousands of SNPs provides high resolution also for population genetics.

  16. Analysis of Decision Trees in Context Clustering of Hidden Markov Model Based Thai Speech Synthesis

    Directory of Open Access Journals (Sweden)

    Suphattharachai Chomphan

    2011-01-01

    Full Text Available Problem statement: In Thai speech synthesis using Hidden Markov model (HMM based synthesis system, the tonal speech quality is degraded due to tone distortion. This major problem must be treated appropriately to preserve the tone characteristics of each syllable unit. Since tone brings about the intelligibility of the synthesized speech. It is needed to establish the tone questions and other phonetic questions in tree-based context clustering process accordingly. Approach: This study describes the analysis of questions in tree-based context clustering process of an HMM-based speech synthesis system for Thai language. In the system, spectrum, pitch or F0 and state duration are modeled simultaneously in a unified framework of HMM, their parameter distributions are clustered independently by using a decision-tree based context clustering technique. The contextual factors which affect spectrum, pitch and duration, i.e., part of speech, position and number of phones in a syllable, position and number of syllables in a word, position and number of words in a sentence, phone type and tone type, are taken into account for constructing the questions of the decision tree. All in all, thirteen sets of questions are analyzed in comparison. Results: In the experiment, we analyzed the decision trees by counting the number of questions in each node coming from those thirteen sets and by calculating the dominance score given to each question as the reciprocal of the distance from the root node to the question node. The highest number and dominance score are of the set of phonetic type, while the second, third highest ones are of the set of part of speech and tone type. Conclusion: By counting the number of questions in each node and calculating the dominance score, we can set the priority of each question set. All in all, the analysis results bring about further development of Thai speech synthesis with efficient context clustering process in

  17. PERSONAL NETWORK SAMPLING, OUTDEGREE ANALYSIS AND MULTILEVEL ANALYSIS - INTRODUCING THE NETWORK CONCEPT IN STUDIES OF HIDDEN POPULATIONS

    NARCIS (Netherlands)

    SPREEN, M; ZWAAGSTRA, R

    1994-01-01

    Populations, such as heroin and cocaine users, the homeless and the like (hidden populations), are among the most difficult populations to which to apply classic random sampling procedures. A frequently used data collection method for these hidden populations is the snowball procedure. The prerequis

  18. A Bourdieusian Analysis of Cultural Reproduction: Socialisation and the "Hidden Curriculum" in Professional Football

    Science.gov (United States)

    Cushion, Christopher J.; Jones, Robyn L.

    2014-01-01

    This article draws on the theoretical concepts of Pierre Bourdieu to provide an explanatory account of how socialisation and the hidden curriculum within coaching practice contribute toward the formation of social identities and powerful schemes of internalised dispositions. Drawing on a 10 month ethnography within professional football, the…

  19. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    Science.gov (United States)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-10-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  20. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    Science.gov (United States)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-07-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  1. Similarity matrix analysis and divergence measures for statistical detection of unknown deterministic signals hidden in additive noise

    Science.gov (United States)

    Le Bot, O.; Mars, J. I.; Gervaise, C.

    2015-10-01

    This Letter proposes an algorithm to detect an unknown deterministic signal hidden in additive white Gaussian noise. The detector is based on recurrence analysis. It compares the distribution of the similarity matrix coefficients of the measured signal with an analytic expression of the distribution expected in the noise-only case. This comparison is achieved using divergence measures. Performance analysis based on the receiver operating characteristics shows that the proposed detector outperforms the energy detector, giving a probability of detection 10% to 50% higher, and has a similar performance to that of a sub-optimal filter detector.

  2. Uncovering the Links between Prospective Teachers' Personal Responsibility, Academic Optimism, Hope, and Emotions about Teaching: A Mediation Analysis

    Science.gov (United States)

    Eren, Altay

    2014-01-01

    Prospective teachers' sense of personal responsibility has not been examined together with their academic optimism, hope, and emotions about teaching in a single study to date. However, to consider hope, academic optimism, and emotions about teaching together with personal responsibility is important to uncover the factors affecting…

  3. Covered versus Uncovered Self-Expandable Metal Stents for Managing Malignant Distal Biliary Obstruction: A Meta-Analysis.

    Directory of Open Access Journals (Sweden)

    Jinjin Li

    Full Text Available To compare the efficacy of using covered self-expandable metal stents (CSEMSs and uncovered self-expandable metal stents (UCSEMSs to treat objective jaundice caused by an unresectable malignant tumor.We performed a comprehensive electronic search from 1980 to May 2015. All randomized controlled trials comparing the use of CSEMSs and UCSEMSs to treat malignant distal biliary obstruction were included.The analysis included 1417 patients enrolled in 14 trials. We did not detect significant differences between the UCSEMS group and the CSEMS group in terms of cumulative stent patency (hazard ratio (HR 0.93, 95% confidence interval (CI 0.19-4.53; p = 0.93, I2 = 0%, patient survival (HR 0.77, 95% CI 0.05-10.87; p = 0.85, I2 = 0%, overall stent dysfunction (relative ratio (RR 0.85, M-H, random, 95% CI 0.57-1.25; p = 0.83, I2 = 63%, the overall complication rate (RR 1.26, M-H, fixed, 95% CI 0.94-1.68; p = 0.12, I2 = 0% or the change in serum bilirubin (weighted mean difference (WMD -0.13, IV fixed, 95% CI 0.56-0.3; p = 0.55, I2 = 0%. However, we did detect a significant difference in the main causes of stent dysfunction between the two groups. In particular, the CSEMS group exhibited a lower rate of tumor ingrowth (RR 0.25, M-H, random, 95% CI 0.12-0.52; p = 0.002, I2 = 40% but a higher rate of tumor overgrowth (RR 1.76, M-H, fixed, 95% CI 1.03-3.02; p = 0.04, I2 = 0%. Patients with CSEMSs also exhibited a higher migration rate (RR 9.33, M-H, fixed, 95% CI 2.54-34.24; p = 0.008, I2 = 0% and a higher rate of sludge formation (RR 2.47, M-H, fixed, 95% CI 1.36-4.50; p = 0.003, I2 = 0%.Our meta-analysis indicates that there is no significant difference in primary stent patency and stent dysfunction between CSEMSs and UCSEMSs during the period from primary stent insertion to primary stent dysfunction or patient death. However, when taking further management for occluded stents into consideration, CSEMSs is a better choice for patients with malignant biliary

  4. Comparative analysis of the Photorhabdus luminescens and the Yersinia enterocolitica genomes: uncovering candidate genes involved in insect pathogenicity

    Directory of Open Access Journals (Sweden)

    Fuchs Thilo M

    2008-01-01

    Full Text Available Abstract Background Photorhabdus luminescens and Yersinia enterocolitica are both enteric bacteria which are associated with insects. P. luminescens lives in symbiosis with soil nematodes and is highly pathogenic towards insects but not to humans. In contrast, Y. enterocolitica is widely found in the environment and mainly known to cause gastroenteritis in men, but has only recently been shown to be also toxic for insects. It is expected that both pathogens share an overlap of genetic determinants that play a role within the insect host. Results A selective genome comparison was applied. Proteins belonging to the class of two-component regulatory systems, quorum sensing, universal stress proteins, and c-di-GMP signalling have been analysed. The interorganismic synopsis of selected regulatory systems uncovered common and distinct signalling mechanisms of both pathogens used for perception of signals within the insect host. Particularly, a new class of LuxR-like regulators was identified, which might be involved in detecting insect-specific molecules. In addition, the genetic overlap unravelled a two-component system that is unique for the genera Photorhabdus and Yersinia and is therefore suggested to play a major role in the pathogen-insect relationship. Our analysis also highlights factors of both pathogens that are expressed at low temperatures as encountered in insects in contrast to higher (body temperature, providing evidence that temperature is a yet under-investigated environmental signal for bacterial adaptation to various hosts. Common degradative metabolic pathways are described that might be used to explore nutrients within the insect gut or hemolymph, thus enabling the proliferation of P. luminescens and Y. enterocolitica in their invertebrate hosts. A strikingly higher number of genes encoding insecticidal toxins and other virulence factors in P. luminescens compared to Y. enterocolitica correlates with the higher virulence of P

  5. Similarity matrix analysis and divergence measures for statistical detection of unknown deterministic signals hidden in additive noise

    International Nuclear Information System (INIS)

    This Letter proposes an algorithm to detect an unknown deterministic signal hidden in additive white Gaussian noise. The detector is based on recurrence analysis. It compares the distribution of the similarity matrix coefficients of the measured signal with an analytic expression of the distribution expected in the noise-only case. This comparison is achieved using divergence measures. Performance analysis based on the receiver operating characteristics shows that the proposed detector outperforms the energy detector, giving a probability of detection 10% to 50% higher, and has a similar performance to that of a sub-optimal filter detector. - Highlights: • We model the distribution of the similarity matrix coefficients of a Gaussian noise. • We use divergence measures for goodness-of-fit test between a model and measured data. • We distinguish deterministic signal and Gaussian noise with similarity matrix analysis. • Similarity matrix analysis outperforms energy detector

  6. Similarity matrix analysis and divergence measures for statistical detection of unknown deterministic signals hidden in additive noise

    Energy Technology Data Exchange (ETDEWEB)

    Le Bot, O., E-mail: lebotol@gmail.com [Univ. Grenoble Alpes, GIPSA-Lab, F-38000 Grenoble (France); CNRS, GIPSA-Lab, F-38000 Grenoble (France); Mars, J.I. [Univ. Grenoble Alpes, GIPSA-Lab, F-38000 Grenoble (France); CNRS, GIPSA-Lab, F-38000 Grenoble (France); Gervaise, C. [Univ. Grenoble Alpes, GIPSA-Lab, F-38000 Grenoble (France); CNRS, GIPSA-Lab, F-38000 Grenoble (France); Chaire CHORUS, Foundation of Grenoble Institute of Technology, 46 Avenue Félix Viallet, 38031 Grenoble Cedex 1 (France)

    2015-10-23

    This Letter proposes an algorithm to detect an unknown deterministic signal hidden in additive white Gaussian noise. The detector is based on recurrence analysis. It compares the distribution of the similarity matrix coefficients of the measured signal with an analytic expression of the distribution expected in the noise-only case. This comparison is achieved using divergence measures. Performance analysis based on the receiver operating characteristics shows that the proposed detector outperforms the energy detector, giving a probability of detection 10% to 50% higher, and has a similar performance to that of a sub-optimal filter detector. - Highlights: • We model the distribution of the similarity matrix coefficients of a Gaussian noise. • We use divergence measures for goodness-of-fit test between a model and measured data. • We distinguish deterministic signal and Gaussian noise with similarity matrix analysis. • Similarity matrix analysis outperforms energy detector.

  7. Hidden Stories: Uncovering the Visual Metaphor for Education and Communication

    Science.gov (United States)

    Hube, Amy M.; Tremblay, Kenneth R., Jr.; Leigh, Katharine E.

    2015-01-01

    Design solutions have become increasingly complex and based on a rapidly growing body of knowledge. In order to articulate a design solution to a client, the graphic use of the design narrative can effectively communicate complex ideas. Two case study interventions were conducted in an interior design program in which students were introduced to…

  8. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main......PRIMARY OBJECTIVE: The purpose of this study was to listen to and learn from children showing high levels of post-traumatic stress symptoms after parental acquired brain injury (ABI), in order to achieve an in-depth understanding of the difficulties the children face in their everyday lives...... finding indicates that the children experienced numerous losses, many of which were often suppressed or neglected by the children to protect the ill parents. CONCLUSIONS: The findings indicated that the children seemed to make a special effort to hide their feelings of loss and grief in order to protect...

  9. Department-level change: Using social network analysis to map the hidden structure of academic departments

    Science.gov (United States)

    Henderson, Charles; Quardokus, Kathleen

    2013-01-01

    Efforts to improve teaching in higher education have often focused on individual faculty. However, there is a growing consensus that the academic department is a more productive focus of change initiatives. Yet, academic departments are not all the same. Understanding the structure of relationships within a department is important for identifying who should be involved in the change effort and in what roles. It is also likely that a successful change effort will modify the structure of relationships within a department. This paper presents the preliminary results from a study of two academic departments at a research university. A social network for each department was constructed based on a web survey that asked faculty to identify colleagues with whom they had teaching-related conversations. We identify characteristics of the individuals and departments and describe how learning about this hidden structure can be beneficial to change agents.

  10. Risk of Post-ERCP Pancreatitis after placement of Covered versus Uncovered Self-Expandable Biliary Metal Stents: A Systematic Review and Meta-Analysis

    Directory of Open Access Journals (Sweden)

    Yaseen Alastal

    2008-09-01

    Full Text Available Background Self-expandable metal stents are commonly used in the management of malignant biliary obstruction due to higher patency rates compared to plastic stents. Development of covered self-expandable metal stents has led to extended stent patency compared to uncovered self-expandable metal stents. However, there are concerns that deployment of covered self-expandable metal stents may be associated with higher risk of post-endoscopic retrograde cholangio-pancreatography pancreatitis, acute cholecystitis and stent migration. Objective We performed this meta-analysis to assess the risk of post-endoscopic retrograde cholangio-pancreatography pancreatitis and other adverse events (acute cholecystitis and stent migration with biliary covered self-expandable metal stents compared to uncovered self-expandable metal stents. We also assessed the proportion of stent patency at 6 and 12 months between the two groups. Methods We searched MedLine, EMBASE, Cochrane database, ISI Web of Science and Scopus from January 1989 through June, 2014, to identify randomized controlled trials and observational studies that provided data on the risk of post-endoscopic retrograde cholangio-pancreatography pancreatitis and other adverse events following the placement of covered self-expandable metal stents versus uncovered self-expandable metal stents in patients with biliary obstruction. The Mantel–Haenszel method was used to pool data of post-endoscopic retrograde cholangio- pancreatography pancreatitis, acute cholecystitis, stent migration and proportion of stent patency over 6 and 12 months into fixed or random effect model of meta-analyses. Odds ratio was used to generate an overall effect estimate of the outcome. Results Eight studies (6 randomized controlled trials and 2 observational studies with a total of 1078 patients were included in the meta-analysis. The pooled odds ratio with 95% confidence intervals for risk of post-endoscopic retrograde cholangio

  11. Evaluation of chronic lymphocytic leukemia by oligonucleotide-based microarray analysis uncovers novel aberrations not detected by FISH or cytogenetic analysis

    Directory of Open Access Journals (Sweden)

    Kolquist Kathryn A

    2011-11-01

    Full Text Available Abstract Background Cytogenetic evaluation is a key component of the diagnosis and prognosis of chronic lymphocytic leukemia (CLL. We performed oligonucleotide-based comparative genomic hybridization microarray analysis on 34 samples with CLL and known abnormal karyotypes previously determined by cytogenetics and/or fluorescence in situ hybridization (FISH. Results Using a custom designed microarray that targets >1800 genes involved in hematologic disease and other malignancies, we identified additional cryptic aberrations and novel findings in 59% of cases. These included gains and losses of genes associated with cell cycle regulation, apoptosis and susceptibility loci on 3p21.31, 5q35.2q35.3, 10q23.31q23.33, 11q22.3, and 22q11.23. Conclusions Our results show that microarray analysis will detect known aberrations, including microscopic and cryptic alterations. In addition, novel genomic changes will be uncovered that may become important prognostic predictors or treatment targets for CLL in the future.

  12. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    . In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning......This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group....

  13. HIDDEN MARKOV MODELS WITH COVARIATES FOR ANALYSIS OF DEFECTIVE INDUSTRIAL MACHINE PARTS

    Directory of Open Access Journals (Sweden)

    Pornpit Sirima

    2014-01-01

    Full Text Available Monthly counts of industrial machine part errors are modeled using a two-state Hidden Markov Model (HMM in order to describe the effect of machine part error correction and the amount of time spent on the error correction on the likelihood of the machine part to be in a “defective” or “non-defective” state. The number of machine parts errors were collected from a thermo plastic injection molding machine in a car bumper auto parts manufacturer in Liberec city, Czech Republic from January 2012 to November 2012. A Bayesian method is used for parameter estimation. The results of this study indicate that the machine part error correction and the amount of time spent on the error correction do not improve the machine part status of the individual part, but there is a very strong month-to-month dependence of the machine part states. Using the Mean Absolute Error (MAE criterion, the performance of the proposed model (MAE = 1.62 and the HMM including machine part error correction only (MAE = 1.68, from our previous study, is not significantly different. However, the proposed model has more advantage in the fact that the machine part state can be explained by both the machine part error correction and the amount of time spent on the error correction.

  14. Global gene expression analysis using RNA-seq uncovered a new role for SR1/CAMTA3 transcription factor in salt stress.

    Science.gov (United States)

    Prasad, Kasavajhala V S K; Abdel-Hameed, Amira A E; Xing, Denghui; Reddy, Anireddy S N

    2016-01-01

    Abiotic and biotic stresses cause significant yield losses in all crops. Acquisition of stress tolerance in plants requires rapid reprogramming of gene expression. SR1/CAMTA3, a member of signal responsive transcription factors (TFs), functions both as a positive and a negative regulator of biotic stress responses and as a positive regulator of cold stress-induced gene expression. Using high throughput RNA-seq, we identified ~3000 SR1-regulated genes. Promoters of about 60% of the differentially expressed genes have a known DNA binding site for SR1, suggesting that they are likely direct targets. Gene ontology analysis of SR1-regulated genes confirmed previously known functions of SR1 and uncovered a potential role for this TF in salt stress. Our results showed that SR1 mutant is more tolerant to salt stress than the wild type and complemented line. Improved tolerance of sr1 seedlings to salt is accompanied with the induction of salt-responsive genes. Furthermore, ChIP-PCR results showed that SR1 binds to promoters of several salt-responsive genes. These results suggest that SR1 acts as a negative regulator of salt tolerance by directly repressing the expression of salt-responsive genes. Overall, this study identified SR1-regulated genes globally and uncovered a previously uncharacterized role for SR1 in salt stress response. PMID:27251464

  15. RNA-Seq and Gene Network Analysis Uncover Activation of an ABA-Dependent Signalosome During the Cork Oak Root Response to Drought.

    Science.gov (United States)

    Magalhães, Alexandre P; Verde, Nuno; Reis, Francisca; Martins, Inês; Costa, Daniela; Lino-Neto, Teresa; Castro, Pedro H; Tavares, Rui M; Azevedo, Herlânder

    2015-01-01

    Quercus suber (cork oak) is a West Mediterranean species of key economic interest, being extensively explored for its ability to generate cork. Like other Mediterranean plants, Q. suber is significantly threatened by climatic changes, imposing the need to quickly understand its physiological and molecular adaptability to drought stress imposition. In the present report, we uncovered the differential transcriptome of Q. suber roots exposed to long-term drought, using an RNA-Seq approach. 454-sequencing reads were used to de novo assemble a reference transcriptome, and mapping of reads allowed the identification of 546 differentially expressed unigenes. These were enriched in both effector genes (e.g., LEA, chaperones, transporters) as well as regulatory genes, including transcription factors (TFs) belonging to various different classes, and genes associated with protein turnover. To further extend functional characterization, we identified the orthologs of differentially expressed unigenes in the model species Arabidopsis thaliana, which then allowed us to perform in silico functional inference, including gene network analysis for protein function, protein subcellular localization and gene co-expression, and in silico enrichment analysis for TFs and cis-elements. Results indicated the existence of extensive transcriptional regulatory events, including activation of ABA-responsive genes and ABF-dependent signaling. We were then able to establish that a core ABA-signaling pathway involving PP2C-SnRK2-ABF components was induced in stressed Q. suber roots, identifying a key mechanism in this species' response to drought.

  16. RNA-Seq and gene network analysis uncover activation of an ABA-dependent signalosome during the cork oak root response to drought

    Directory of Open Access Journals (Sweden)

    Alexandre Papadopoulos Magalhães

    2016-01-01

    Full Text Available Quercus suber (cork oak is a West Mediterranean species of key economic interest, being extensively explored for its ability to generate cork. Like other Mediterranean plants, Q. suber is significantly threatened by climatic changes, imposing the need to quickly understand its physiological and molecular adaptability to drought stress imposition. In the present report, we uncovered the differential transcriptome of Q. suber roots exposed to long-term drought, using an RNA-Seq approach. 454 sequencing reads were used to de novo assemble a reference transcriptome, and mapping of reads allowed the identification of 546 differentially expressed unigenes. These were enriched in both effector genes (e.g. LEA, chaperones, transporters as well as regulatory genes, including transcription factors (TFs belonging to various different classes, and genes associated with protein turnover. To further extend functional characterization, we identified the orthologs of differentially expressed unigenes in the model species Arabidopsis thaliana, which then allowed us to perform in silico functional inference, including gene network analysis for protein function, protein subcellular localization and gene co-expression, and in silico enrichment analysis for TFs and cis-elements. Results indicated the existence of extensive transcriptional regulatory events, including activation of ABA-responsive genes and ABF-dependent signaling. We were then able to establish that all components of a core ABA-signaling pathway involving PP2C-SnRK2-ABF components was induced in stressed Q. suber roots, identifying a key mechanism in this species’ response to drought.

  17. Climate change adaptation: Uncovering constraints to the use of adaptation strategies among food crop farmers in South-west, Nigeria using principal component analysis (PCA

    Directory of Open Access Journals (Sweden)

    Moradeyo Adebanjo Otitoju

    2016-12-01

    Full Text Available This study focused on the constraints to the use of climate variability/change adaptation strategies in South-west Nigeria. Multistage random technique was employed to select the location and the respondents. Descriptive statistics and principal component analysis (PCA were the analytical tools engaged in this study. The constraints to climate variability and change examined before did not use PCA but generalized factor analysis. Hence, there is need to examine these constraints extensively using PCA. Uncovering the constraints to the use of climate variability/change adaptation strategies among crop framers is important to give a realistic direction in the development of farmer-inclusive climate policies in Nigeria. The PCA result showed that the principal constraints that the farmers faced in climate change adaptation were public, institutional and labour constraint; land, neighbourhood norms and religious beliefs constraint; high cost of inputs, technological and information constraint; farm distance, access to climate information, off-farm job and credit constraint; and poor agricultural programmes and service delivery constraint. These findings pointed out the need for both the government and non-government organizations to intensify efforts on institutional, technological and farmers’ friendly land tenure and information systems as effective measures to guide inclusive climate change adaptation policies and development in South-west Nigeria.

  18. Association of Protein Translation and Extracellular Matrix Gene Sets with Breast Cancer Metastasis: Findings Uncovered on Analysis of Multiple Publicly Available Datasets Using Individual Patient Data Approach.

    Directory of Open Access Journals (Sweden)

    Nilotpal Chowdhury

    Full Text Available Microarray analysis has revolutionized the role of genomic prognostication in breast cancer. However, most studies are single series studies, and suffer from methodological problems. We sought to use a meta-analytic approach in combining multiple publicly available datasets, while correcting for batch effects, to reach a more robust oncogenomic analysis.The aim of the present study was to find gene sets associated with distant metastasis free survival (DMFS in systemically untreated, node-negative breast cancer patients, from publicly available genomic microarray datasets.Four microarray series (having 742 patients were selected after a systematic search and combined. Cox regression for each gene was done for the combined dataset (univariate, as well as multivariate - adjusted for expression of Cell cycle related genes and for the 4 major molecular subtypes. The centre and microarray batch effects were adjusted by including them as random effects variables. The Cox regression coefficients for each analysis were then ranked and subjected to a Gene Set Enrichment Analysis (GSEA.Gene sets representing protein translation were independently negatively associated with metastasis in the Luminal A and Luminal B subtypes, but positively associated with metastasis in Basal tumors. Proteinaceous extracellular matrix (ECM gene set expression was positively associated with metastasis, after adjustment for expression of cell cycle related genes on the combined dataset. Finally, the positive association of the proliferation-related genes with metastases was confirmed.To the best of our knowledge, the results depicting mixed prognostic significance of protein translation in breast cancer subtypes are being reported for the first time. We attribute this to our study combining multiple series and performing a more robust meta-analytic Cox regression modeling on the combined dataset, thus discovering 'hidden' associations. This methodology seems to yield new and

  19. Problem of hidden variables

    Science.gov (United States)

    Santos, Emilio

    1992-10-01

    The problem of hidden variables in quantum mechanics is formalized as follows. A general or contextual (noncontextual) hidden-variables theory is defined as a mapping f: Q×M → C (f: Q→C) where Q is the set of projection operators in the appropriate (quantum) Hilbert space, M is the set of maximal Boolean subalgebras of Q and C is a (classical) Boolean algebra. It is shown that contextual (noncontextual) hidden-variables always exist (do not exist).

  20. Integration of Next Generation Sequencing and EPR Analysis to Uncover Molecular Mechanism Underlying Shell Color Variation in Scallops.

    Science.gov (United States)

    Sun, Xiujun; Liu, Zhihong; Zhou, Liqing; Wu, Biao; Dong, Yinghui; Yang, Aiguo

    2016-01-01

    The Yesso scallop Patinopecten yessoensis displays polymorphism in shell colors, which is of great interest for the scallop industry. To identify genes involved in the shell coloration, in the present study, we investigate the transcriptome differences by Illumina digital gene expression (DGE) analysis in two extreme color phenotypes, Red and White. Illumina sequencing yields a total of 62,715,364 clean sequence reads, and more than 85% reads are mapped into our previously sequenced transcriptome. There are 25 significantly differentially expressed genes between Red and White scallops. EPR (Electron paramagnetic resonance) analysis has identified EPR spectra of pheomelanin and eumelanin in the red shells, but not in the white shells. Compared to the Red scallops, the White scallops have relatively higher mRNA expression in tyrosinase genes, but lower expression in other melanogensis-associated genes. Meantime, the relatively lower tyrosinase protein and decreased tyrosinase activity in White scallops are suggested to be associated with the lack of melanin in the white shells. Our findings highlight the functional roles of melanogensis-associated genes in the melanization process of scallop shells, and shed new lights on the transcriptional and post-transcriptional mechanisms in the regulation of tyrosinase activity during the process of melanin synthesis. The present results will assist our molecular understanding of melanin synthesis underlying shell color polymorphism in scallops, as well as other bivalves, and also help the color-based breeding in shellfish aquaculture. PMID:27563719

  1. Dynamics of the risk of smoking-induced lung cancer : A compartmental hidden markov model for longitudinal analysis

    NARCIS (Netherlands)

    Chadeau-Hyam, Marc; Tubert-Bitter, Pascale; Guihenneuc-Jouyaux, Chantal; Campanella, Gianluca; Richardson, Sylvia; Vermeulen, Roel; De Iorio, Maria; Galea, Sandro; Vineis, Paolo

    2014-01-01

    BACKGROUND:: To account for the dynamic aspects of carcinogenesis, we propose a compartmental hidden Markov model in which each person is healthy, asymptomatically affected, diagnosed, or deceased. Our model is illustrated using the example of smoking-induced lung cancer. METHODS:: The model was fit

  2. Semi-Markov Chains and Hidden Semi-Markov Models toward Applications Their Use in Reliability and DNA Analysis

    CERN Document Server

    Barbu, Vlad

    2008-01-01

    Semi-Markov processes are much more general and better adapted to applications than the Markov ones because sojourn times in any state can be arbitrarily distributed, as opposed to the geometrically distributed sojourn time in the Markov case. This book concerns with the estimation of discrete-time semi-Markov and hidden semi-Markov processes

  3. Structural and Phylogenetic Analysis of Rhodobacter capsulatus NifF: Uncovering General Features of Nitrogen-fixation (nif-Flavodoxins

    Directory of Open Access Journals (Sweden)

    Inmaculada Pérez-Dorado

    2013-01-01

    Full Text Available Analysis of the crystal structure of NifF from Rhodobacter capsulatus and its homologues reported so far reflects the existence of unique structural features in nif flavodoxins: a leucine at the re face of the isoalloxazine, an eight-residue insertion at the C-terminus of the 50’s loop and a remarkable difference in the electrostatic potential surface with respect to non-nif flavodoxins. A phylogenetic study on 64 sequences from 52 bacterial species revealed four clusters, including different functional prototypes, correlating the previously defined as “short-chain” with the firmicutes flavodoxins and the “long-chain” with gram-negative species. The comparison of Rhodobacter NifF structure with other bacterial flavodoxin prototypes discloses the concurrence of specific features of these functional electron donors to nitrogenase.

  4. Structural and phylogenetic analysis of Rhodobacter capsulatus NifF: uncovering general features of nitrogen-fixation (nif)-flavodoxins.

    Science.gov (United States)

    Pérez-Dorado, Inmaculada; Bortolotti, Ana; Cortez, Néstor; Hermoso, Juan A

    2013-01-09

    Analysis of the crystal structure of NifF from Rhodobacter capsulatus and its homologues reported so far reflects the existence of unique structural features in nif flavodoxins: a leucine at the re face of the isoalloxazine, an eight-residue insertion at the C-terminus of the 50's loop and a remarkable difference in the electrostatic potential surface with respect to non-nif flavodoxins. A phylogenetic study on 64 sequences from 52 bacterial species revealed four clusters, including different functional prototypes, correlating the previously defined as "short-chain" with the firmicutes flavodoxins and the "long-chain" with gram-negative species. The comparison of Rhodobacter NifF structure with other bacterial flavodoxin prototypes discloses the concurrence of specific features of these functional electron donors to nitrogenase.

  5. A Comprehensive Analysis of the Dynamic Response to Aphidicolin-Mediated Replication Stress Uncovers Targets for ATM and ATMIN

    Directory of Open Access Journals (Sweden)

    Abdelghani Mazouzi

    2016-04-01

    Full Text Available The cellular response to replication stress requires the DNA-damage-responsive kinase ATM and its cofactor ATMIN; however, the roles of this signaling pathway following replication stress are unclear. To identify the functions of ATM and ATMIN in response to replication stress, we utilized both transcriptomics and quantitative mass-spectrometry-based phosphoproteomics. We found that replication stress induced by aphidicolin triggered widespread changes in both gene expression and protein phosphorylation patterns. These changes gave rise to distinct early and late replication stress responses. Furthermore, our analysis revealed previously unknown targets of ATM and ATMIN downstream of replication stress. We demonstrate ATMIN-dependent phosphorylation of H2AX and of CRMP2, a protein previously implicated in Alzheimer’s disease but not in the DNA damage response. Overall, our dataset provides a comprehensive resource for discovering the cellular responses to replication stress and, potentially, associated pathologies.

  6. Genomic analysis of host - Peste des petits ruminants vaccine viral transcriptome uncovers transcription factors modulating immune regulatory pathways.

    Science.gov (United States)

    Manjunath, Siddappa; Kumar, Gandham Ravi; Mishra, Bishnu Prasad; Mishra, Bina; Sahoo, Aditya Prasad; Joshi, Chaitanya G; Tiwari, Ashok K; Rajak, Kaushal Kishore; Janga, Sarath Chandra

    2015-01-01

    Peste des petits ruminants (PPR), is an acute transboundary viral disease of economic importance, affecting goats and sheep. Mass vaccination programs around the world resulted in the decline of PPR outbreaks. Sungri 96 is a live attenuated vaccine, widely used in Northern India against PPR. This vaccine virus, isolated from goat works efficiently both in sheep and goat. Global gene expression changes under PPR vaccine virus infection are not yet well defined. Therefore, in this study we investigated the host-vaccine virus interactions by infecting the peripheral blood mononuclear cells isolated from goat with PPRV (Sungri 96 vaccine virus), to quantify the global changes in the transcriptomic signature by RNA-sequencing. Viral genome of Sungri 96 vaccine virus was assembled from the PPRV infected transcriptome confirming the infection and demonstrating the feasibility of building a complete non-host genome from the blood transcriptome. Comparison of infected transcriptome with control transcriptome revealed 985 differentially expressed genes. Functional analysis showed enrichment of immune regulatory pathways under PPRV infection. Key genes involved in immune system regulation, spliceosomal and apoptotic pathways were identified to be dysregulated. Network analysis revealed that the protein - protein interaction network among differentially expressed genes is significantly disrupted in infected state. Several genes encoding TFs that govern immune regulatory pathways were identified to co-regulate the differentially expressed genes. These data provide insights into the host - PPRV vaccine virus interactome for the first time. Our findings suggested dysregulation of immune regulatory pathways and genes encoding Transcription Factors (TFs) that govern these pathways in response to viral infection. PMID:25827022

  7. Hidden costs of a typical embodied energy analysis: Brazilian sugarcane ethanol as a case study

    International Nuclear Information System (INIS)

    Worldwide human production systems are tightly coupled to fossil-based energy, the source of which will not be available at low cost in the foreseeable future. Alternative energy sources are being sought for, among which those derived from biomass are considered to have great potential. Brazilian ethanol sugarcane produced at a large scale is being classified in scientific papers and politics as a renewable energy source. However, only the energy return on investment (EROI) and/or the amount of CO2 released to atmosphere have been considered as indicators of renewability. This work aims to discuss some theoretical points, within an embodied energy analysis, that make its use inappropriate for answering all issues related to the concept of renewability. Emergy accounting (with an “m”) is used as a comparative tool and the Brazilian sugarcane ethanol is evaluated as case study. An EROI of 6.7 for ethanol was obtained, showing that for each unit of “commercial energy” invested within the process, 6.7 units of another kind of energy is obtained – this index shows an excellent value for energy efficiency, but it does not reflect the renewability of ethanol. On the other hand, emergy accounting shows a renewability index of 19%, indicating a low rating for sugarcane ethanol. All scientific methodologies available to assess potential energy sources have their pros and cons, but the analyst must be aware that each methodology supplies different indicators with different meanings. Energy analysts should use methodologies appropriately, avoiding wider conclusions not actually represented by indices calculated. - Highlights: • The renewability discourse of biofuels is discussed focusing on the Brazilian sugarcane ethanol. • Both energy efficiency and CO2 emitted hardly indicate the renewability of biofuels. • Emergy evaluation is introduced as a potential tool when assessing renewability. • Analysts must use methodologies accordingly and avoid general

  8. Autoregressive higher-order hidden Markov models: exploiting local chromosomal dependencies in the analysis of tumor expression profiles.

    Directory of Open Access Journals (Sweden)

    Michael Seifert

    Full Text Available Changes in gene expression programs play a central role in cancer. Chromosomal aberrations such as deletions, duplications and translocations of DNA segments can lead to highly significant positive correlations of gene expression levels of neighboring genes. This should be utilized to improve the analysis of tumor expression profiles. Here, we develop a novel model class of autoregressive higher-order Hidden Markov Models (HMMs that carefully exploit local data-dependent chromosomal dependencies to improve the identification of differentially expressed genes in tumor. Autoregressive higher-order HMMs overcome generally existing limitations of standard first-order HMMs in the modeling of dependencies between genes in close chromosomal proximity by the simultaneous usage of higher-order state-transitions and autoregressive emissions as novel model features. We apply autoregressive higher-order HMMs to the analysis of breast cancer and glioma gene expression data and perform in-depth model evaluation studies. We find that autoregressive higher-order HMMs clearly improve the identification of overexpressed genes with underlying gene copy number duplications in breast cancer in comparison to mixture models, standard first- and higher-order HMMs, and other related methods. The performance benefit is attributed to the simultaneous usage of higher-order state-transitions in combination with autoregressive emissions. This benefit could not be reached by using each of these two features independently. We also find that autoregressive higher-order HMMs are better able to identify differentially expressed genes in tumors independent of the underlying gene copy number status in comparison to the majority of related methods. This is further supported by the identification of well-known and of previously unreported hotspots of differential expression in glioblastomas demonstrating the efficacy of autoregressive higher-order HMMs for the analysis of individual

  9. Comprehensive analysis of the gene encoding filaggrin uncovers prevalent and rare mutations in ichthyosis vulgaris and atopic eczema.

    Science.gov (United States)

    Sandilands, Aileen; Terron-Kwiatkowski, Ana; Hull, Peter R; O'Regan, Gráinne M; Clayton, Timothy H; Watson, Rosemarie M; Carrick, Thomas; Evans, Alan T; Liao, Haihui; Zhao, Yiwei; Campbell, Linda E; Schmuth, Matthias; Gruber, Robert; Janecke, Andreas R; Elias, Peter M; van Steensel, Maurice A M; Nagtzaam, Ivo; van Geel, Michel; Steijlen, Peter M; Munro, Colin S; Bradley, Daniel G; Palmer, Colin N A; Smith, Frances J D; McLean, W H Irwin; Irvine, Alan D

    2007-05-01

    We recently reported two common filaggrin (FLG) null mutations that cause ichthyosis vulgaris and predispose to eczema and secondary allergic diseases. We show here that these common European mutations are ancestral variants carried on conserved haplotypes. To facilitate comprehensive analysis of other populations, we report a strategy for full sequencing of this large, highly repetitive gene, and we describe 15 variants, including seven that are prevalent. All the variants are either nonsense or frameshift mutations that, in representative cases, resulted in loss of filaggrin production in the epidermis. In an Irish case-control study, the five most common European mutations showed a strong association with moderate-to-severe childhood eczema (chi2 test: P = 2.12 x 10(-51); Fisher's exact test: heterozygote odds ratio (OR) = 7.44 (95% confidence interval (c.i.) = 4.9-11.3), and homozygote OR = 151 (95% c.i. = 20-1,136)). We found three additional rare null mutations in this case series, suggesting that the genetic architecture of filaggrin-related atopic dermatitis consists of both prevalent and rare risk alleles.

  10. Genome-wide transcriptomic analysis uncovers the molecular basis underlying early flowering and apetalous characteristic in Brassica napus L.

    Science.gov (United States)

    Yu, Kunjiang; Wang, Xiaodong; Chen, Feng; Chen, Song; Peng, Qi; Li, Hongge; Zhang, Wei; Hu, Maolong; Chu, Pu; Zhang, Jiefu; Guan, Rongzhan

    2016-01-01

    Floral transition and petal onset, as two main aspects of flower development, are crucial to rapeseed evolutionary success and yield formation. Currently, very little is known regarding the genetic architecture that regulates flowering time and petal morphogenesis in Brassica napus. In the present study, a genome-wide transcriptomic analysis was performed with an absolutely apetalous and early flowering line, APL01, and a normally petalled line, PL01, using high-throughput RNA sequencing. In total, 13,205 differential expressed genes were detected, of which 6111 genes were significantly down-regulated, while 7094 genes were significantly up-regulated in the young inflorescences of APL01 compared with PL01. The expression levels of a vast number of genes involved in protein biosynthesis were altered in response to the early flowering and apetalous character. Based on the putative rapeseed flowering genes, an early flowering network, mainly comprised of vernalization and photoperiod pathways, was built. Additionally, 36 putative upstream genes possibly governing the apetalous character of line APL01 were identified, and six genes potentially regulating petal origination were obtained by combining with three petal-related quantitative trait loci. These findings will facilitate understanding of the molecular mechanisms underlying floral transition and petal initiation in B. napus. PMID:27460760

  11. Phylogenomic analysis uncovers the evolutionary history of nutrition and infection mode in rice blast fungus and other Magnaporthales.

    Science.gov (United States)

    Luo, Jing; Qiu, Huan; Cai, Guohong; Wagner, Nicole E; Bhattacharya, Debashish; Zhang, Ning

    2015-01-01

    The order Magnaporthales (Ascomycota, Fungi) includes devastating pathogens of cereals, such as the rice blast fungus Pyricularia (Magnaporthe) oryzae, which is a model in host-pathogen interaction studies. Magnaporthales also includes saprotrophic species associated with grass roots and submerged wood. Despite its scientific and economic importance, the phylogenetic position of Magnaporthales within Sordariomycetes and the interrelationships of its constituent taxa, remain controversial. In this study, we generated novel transcriptome data from 21 taxa that represent key Magnaporthales lineages of different infection and nutrition modes and phenotypes. Phylogenomic analysis of >200 conserved genes allowed the reconstruction of a robust Sordariomycetes tree of life that placed the monophyletic group of Magnaporthales sister to Ophiostomatales. Among Magnaporthales, three major clades were recognized: 1) an early diverging clade A comprised of saprotrophs associated with submerged woods; 2) clade B that includes the rice blast fungus and other pathogens that cause blast diseases of monocot plants. These species infect the above-ground tissues of host plants using the penetration structure, appressorium; and 3) clade C comprised primarily of root-associated species that penetrate the root tissue with hyphopodia. The well-supported phylogenies provide a robust framework for elucidating evolution of pathogenesis, nutrition modes, and phenotypic characters in Magnaporthales. PMID:25819715

  12. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  13. Comparative genomic analysis uncovers 3 novel loci encoding type six secretion systems differentially distributed in Salmonella serotypes

    Directory of Open Access Journals (Sweden)

    Santiviago Carlos A

    2009-08-01

    Full Text Available Abstract Background The recently described Type VI Secretion System (T6SS represents a new paradigm of protein secretion in bacteria. A number of bioinformatic studies have been conducted to identify T6SS gene clusters in the available bacterial genome sequences. According to these studies, Salmonella harbors a unique T6SS encoded in the Salmonella Pathogenicity Island 6 (SPI-6. Since these studies only considered few Salmonella genomes, the present work aimed to identify novel T6SS loci by in silico analysis of every genome sequence of Salmonella available. Results The analysis of sequencing data from 44 completed or in progress Salmonella genome projects allowed the identification of 3 novel T6SS loci. These clusters are located in differentially-distributed genomic islands we designated SPI-19, SPI-20 and SPI-21, respectively. SPI-19 was identified in a subset of S. enterica serotypes including Dublin, Weltevreden, Agona, Gallinarum and Enteritidis. In the later, an internal deletion eliminated most of the island. On the other hand, SPI-20 and SPI-21 were restricted to S. enterica subspecies arizonae (IIIa serotype 62:z4,z23:-. Remarkably, SPI-21 encodes a VgrG protein containing a C-terminal extension similar to S-type pyocins of Pseudomonas aeruginosa. This is not only the first evolved VgrG described in Salmonella, but also the first evolved VgrG including a pyocin domain described so far in the literature. In addition, the data indicate that SPI-6 T6SS is widely distributed in S. enterica and absent in serotypes Enteritidis, Gallinarum, Agona, Javiana, Paratyphi B, Virchow, IIIa 62:z4,z23:- and IIIb 61:1,v:1,5,(7. Interestingly, while some serotypes harbor multiple T6SS (Dublin, Weltvreden and IIIa 62:z4,z23:- others do not encode for any (Enteritidis, Paratyphi B, Javiana, Virchow and IIIb 61:1,v:1,5,(7. Comparative and phylogenetic analyses indicate that the 4 T6SS loci in Salmonella have a distinct evolutionary history. Finally, we

  14. Functional analysis of Arabidopsis immune-related MAPKs uncovers a role for MPK3 as negative regulator of inducible defences

    KAUST Repository

    Frei dit Frey, Nicolas

    2014-06-30

    Background Mitogen-activated protein kinases (MAPKs) are key regulators of immune responses in animals and plants. In Arabidopsis, perception of microbe-associated molecular patterns (MAMPs) activates the MAPKs MPK3, MPK4 and MPK6. Increasing information depicts the molecular events activated by MAMPs in plants, but the specific and cooperative contributions of the MAPKs in these signalling events are largely unclear. Results In this work, we analyse the behaviour of MPK3, MPK4 and MPK6 mutants in early and late immune responses triggered by the MAMP flg22 from bacterial flagellin. A genome-wide transcriptome analysis reveals that 36% of the flg22-upregulated genes and 68% of the flg22-downregulated genes are affected in at least one MAPK mutant. So far MPK4 was considered as a negative regulator of immunity, whereas MPK3 and MPK6 were believed to play partially redundant positive functions in defence. Our work reveals that MPK4 is required for the regulation of approximately 50% of flg22-induced genes and we identify a negative role for MPK3 in regulating defence gene expression, flg22-induced salicylic acid accumulation and disease resistance to Pseudomonas syringae. Among the MAPK-dependent genes, 27% of flg22-upregulated genes and 76% of flg22-downregulated genes require two or three MAPKs for their regulation. The flg22-induced MAPK activities are differentially regulated in MPK3 and MPK6 mutants, both in amplitude and duration, revealing a highly interdependent network. Conclusions These data reveal a new set of distinct functions for MPK3, MPK4 and MPK6 and indicate that the plant immune signalling network is choreographed through the interplay of these three interwoven MAPK pathways.

  15. The Biophysical Characterisation and SAXS Analysis of Human NLRP1 Uncover a New Level of Complexity of NLR Proteins

    Science.gov (United States)

    Martino, Luigi; Holland, Louise; Christodoulou, Evangelos; Kunzelmann, Simone; Esposito, Diego

    2016-01-01

    NOD-like receptors represent an important class of germline-encoded pattern recognition receptors that play key roles in the regulation of inflammatory signalling pathways. They function as danger sensors and initiate inflammatory responses and the production of cytokines. Since NLR malfunction results in chronic inflammation and auto-immune diseases, there is a great interest in understanding how they work on a molecular level. To date, a lot of insight into the biological functions of NLRs is available but biophysical and structural studies have been hampered by the difficulty to produce soluble and stable recombinant NLR proteins. NLRP1 is an inflammasome forming NLR that is believed to be activated by binding to MDP and induces activation of caspase 1. Here, we report the identification of a soluble fragment of NLRP1 that contains the NACHT oligomerization domain and the putative MDP-sensing LRR domain. We describe the biophysical and biochemical characterization of this construct and a SEC-SAXS analysis that allowed the calculation of a low resolution molecular envelope. Our data indicate that the protein is constitutively bound to ATP with a negligible ability to hydrolyse the triphosphate nucleotide and that it adopts a monomeric extended conformation that is reminiscent of the structure adopted by NLRC4 in the inflammasome complex. Furthermore, we show that the presence of MDP is not sufficient to promote self-oligomerization of the NACHT-LRR fragment suggesting that MDP may either bind to regions outside the NACHT-LRR module or that it may not be the natural ligand of NLRP1. Taken together, our data suggest that the NLRP1 mechanism of action differs from that recently reported for other NLRs. PMID:27727326

  16. Zinc flexes its muscle: Correcting a novel analysis of calcium for zinc interference uncovers a method to measure zinc.

    Science.gov (United States)

    Qian, Cheng; Colvin, Robert A

    2016-01-01

    The divalent cation chelator 1,2-bis(o-aminophenoxy)ethane-N,N,N',N'-tetraacetic acid (BAPTA), often used to buffer physiological changes in cytosolic Ca(2+), also binds Zn(2+) with high affinity. In a recently published method (Lamboley et al. 2015. J. Gen. Physiol. http://dx.doi.org/10.1085/jgp.201411250), the absorbance shift of BAPTA at 292 nm was successfully used to determine the total calcium concentrations of various skeletal muscle tissues. In the present study, we show that endogenous Zn(2+) in rat skeletal muscle tissue can be unknowingly measured as "Ca(2+)," unless appropriate measures are taken to eliminate Zn(2+) interference. We analyzed two rat skeletal muscle tissues, soleus and plantaris, for total calcium and zinc using either inductively coupled plasma mass spectrometry (ICP-MS) or the BAPTA method described above. ICP-MS analysis showed that total zinc contents in soleus and plantaris were large enough to affect the determination of total calcium by the BAPTA method (calcium = 1.72 ± 0.31 and 1.96 ± 0.14, and zinc = 0.528 ± 0.04 and 0.192 ± 0.01; mean ± standard error of the mean [SEM]; n = 5; mmole/kg, respectively). We next analyzed total calcium using BAPTA but included the Zn(2+)-specific chelator N,N,N',N'-tetrakis(2-pyridylmethyl)ethylenediamine (TPEN) that buffers Zn(2+) without affecting Ca(2+)/BAPTA binding. We found that estimated concentrations of total calcium ([CaT]WM) in soleus and plantaris were reduced after TPEN addition ([CaT]WM = 3.71 ± 0.62 and 3.57 ± 0.64 without TPEN and 3.39 ± 0.64 and 3.42 ± 0.62 with TPEN; mean ± SEM; n = 3; mmole/kg, respectively). Thus, we show that a straightforward correction can be applied to the BAPTA method to improve the accuracy of the determination of total calcium that should be applicable to most any tissue studied. In addition, we show that using TPEN in combination with the BAPTA method allows one to make reasonable estimates of total zinc concentration that are in agreement

  17. Analysis of the transcriptome of Panax notoginseng root uncovers putative triterpene saponin-biosynthetic genes and genetic markers

    Directory of Open Access Journals (Sweden)

    Luo Hongmei

    2011-12-01

    Full Text Available Abstract Background Panax notoginseng (Burk F.H. Chen is important medicinal plant of the Araliacease family. Triterpene saponins are the bioactive constituents in P. notoginseng. However, available genomic information regarding this plant is limited. Moreover, details of triterpene saponin biosynthesis in the Panax species are largely unknown. Results Using the 454 pyrosequencing technology, a one-quarter GS FLX titanium run resulted in 188,185 reads with an average length of 410 bases for P. notoginseng root. These reads were processed and assembled by 454 GS De Novo Assembler software into 30,852 unique sequences. A total of 70.2% of unique sequences were annotated by Basic Local Alignment Search Tool (BLAST similarity searches against public sequence databases. The Kyoto Encyclopedia of Genes and Genomes (KEGG assignment discovered 41 unique sequences representing 11 genes involved in triterpene saponin backbone biosynthesis in the 454-EST dataset. In particular, the transcript encoding dammarenediol synthase (DS, which is the first committed enzyme in the biosynthetic pathway of major triterpene saponins, is highly expressed in the root of four-year-old P. notoginseng. It is worth emphasizing that the candidate cytochrome P450 (Pn02132 and Pn00158 and UDP-glycosyltransferase (Pn00082 gene most likely to be involved in hydroxylation or glycosylation of aglycones for triterpene saponin biosynthesis were discovered from 174 cytochrome P450s and 242 glycosyltransferases by phylogenetic analysis, respectively. Putative transcription factors were detected in 906 unique sequences, including Myb, homeobox, WRKY, basic helix-loop-helix (bHLH, and other family proteins. Additionally, a total of 2,772 simple sequence repeat (SSR were identified from 2,361 unique sequences, of which, di-nucleotide motifs were the most abundant motif. Conclusion This study is the first to present a large-scale EST dataset for P. notoginseng root acquired by next

  18. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression where...

  19. Hidden Symmetry Subgroup Problems

    CERN Document Server

    Decker, Thomas; Santha, Miklos; Wocjan, Pawel

    2011-01-01

    We advocate a new approach of addressing hidden structure problems and finding efficient quantum algorithms. We introduce and investigate the Hidden Symmetry Subgroup Problem (HSSP), which is a generalization of the well-studied Hidden Subgroup Problem (HSP). Given a group acting on a set and an oracle whose level sets define a partition of the set, the task is to recover the subgroup of symmetries of this partition inside the group. The HSSP provides a unifying framework that, besides the HSP, encompasses a wide range of algebraic oracle problems, including quadratic hidden polynomial problems. While the HSSP can have provably exponential quantum query complexity, we obtain efficient quantum algorithms for various interesting cases. To achieve this, we present a general method for reducing the HSSP to the HSP, which works efficiently in several cases related to symmetries of polynomials. The HSSP therefore connects in a rather surprising way certain hidden polynomial problems with the HSP. Using this connect...

  20. Hidden Charged Dark Matter

    CERN Document Server

    Feng, Jonathan L; Tu, Huitzu; Yu, Hai-Bo

    2009-01-01

    We examine the possibility that dark matter is hidden, that is, neutral under all standard model gauge interactions, but charged under an exact U(1) gauge symmetry of the hidden sector. Such candidates are predicted in simple WIMPless models, supersymmetric models in which hidden dark matter has the desired thermal relic density for a wide range of masses. Hidden charged dark matter has many potentially disastrous implications for astrophysics: (1) bound state formation and Sommerfeld-enhanced annihilation after chemical freeze out may destroy its relic density, (2) similar effects greatly enhance dark matter annihilation in protohalos at redshifts of z ~ 30, (3) Compton scattering off hidden photons delays kinetic decoupling, suppressing small scale structure, and (4) Rutherford scattering makes such dark matter self-interacting and collisional, potentially violating constraints from the Bullet Cluster and the observed morphology of galactic halos. We show that all of these constraints are satisfied and are ...

  1. Risk of Post-ERCP Pancreatitis after placement of Covered versus Uncovered Self-Expandable Biliary Metal Stents: A Systematic Review and Meta-Analysis

    OpenAIRE

    Yaseen Alastal; Tariq Hammad; Muhammad Ali Khan; Khalil, Basmah W.; Sobia Khan; Mohammad Kashif Ismail; Ali Nawras; Aijaz Sofi

    2008-01-01

    Background Self-expandable metal stents are commonly used in the management of malignant biliary obstruction due to higher patency rates compared to plastic stents. Development of covered self-expandable metal stents has led to extended stent patency compared to uncovered self-expandable metal stents. However, there are concerns that deployment of covered self-expandable metal stents may be associated with higher risk of post-endoscopic retrograde cholangio-pancreatography pancreatitis, acute...

  2. Uncovering Plagiarism Networks

    OpenAIRE

    Freire, Manuel; Cebrian, Manuel; del Rosal, Emilio

    2007-01-01

    Plagiarism detection in educational programming assignments is still a problematic issue in terms of resource waste, ethical controversy, legal risks, and technical complexity. This paper presents AC, a modular plagiarism detection system. The design is portable across platforms and assignment formats and provides easy extraction into the internal assignment representation. Multiple similarity measures have been incorporated, both existing and newly-developed. Statistical analysis and several...

  3. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  4. Uncovering Earth's virome.

    Science.gov (United States)

    Paez-Espino, David; Eloe-Fadrosh, Emiley A; Pavlopoulos, Georgios A; Thomas, Alex D; Huntemann, Marcel; Mikhailova, Natalia; Rubin, Edward; Ivanova, Natalia N; Kyrpides, Nikos C

    2016-08-25

    Viruses are the most abundant biological entities on Earth, but challenges in detecting, isolating, and classifying unknown viruses have prevented exhaustive surveys of the global virome. Here we analysed over 5 Tb of metagenomic sequence data from 3,042 geographically diverse samples to assess the global distribution, phylogenetic diversity, and host specificity of viruses. We discovered over 125,000 partial DNA viral genomes, including the largest phage yet identified, and increased the number of known viral genes by 16-fold. Half of the predicted partial viral genomes were clustered into genetically distinct groups, most of which included genes unrelated to those in known viruses. Using CRISPR spacers and transfer RNA matches to link viral groups to microbial host(s), we doubled the number of microbial phyla known to be infected by viruses, and identified viruses that can infect organisms from different phyla. Analysis of viral distribution across diverse ecosystems revealed strong habitat-type specificity for the vast majority of viruses, but also identified some cosmopolitan groups. Our results highlight an extensive global viral diversity and provide detailed insight into viral habitat distribution and host–virus interactions. PMID:27533034

  5. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  6. Hidden attractor in the Rabinovich system, Chua circuits and PLL

    Science.gov (United States)

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Seledzhi, S. M.

    2016-06-01

    In this report the existence of hidden attractors in Rabinovich system, phase-locked loop and coupled Chua circuits is considered. It is shown that the existence of hidden attractors may complicate the analysis of the systems and significantly affect the synchronization.

  7. What the Shadow Knows: Exploring the Hidden Dimensions of the Consumer Metaphor in Management Education

    Science.gov (United States)

    Gross, Michael A.; Hogler, Raymond

    2005-01-01

    This article aims to uncover hidden dimensions of the metaphor of consumerism in management education. By exploring the metaphor, the authors elucidate the implicit claims in the assertion that teachers produce business education and students consume that product. The image of commodification structures a discourse that involves conceptions of…

  8. An automated inverse analysis system using neural networks and computational mechanics with its application to identification of 3-D crack shape hidden in solid

    International Nuclear Information System (INIS)

    This paper describes a new inverse analysis system using the hierarchical (multilayer) neural networks and the computational mechanics. The present inverse analysis basically consists of the following three subprocesses: by parametrically varying system parameters, their corresponding responses of the system are calculated through computational mechanics simulations, each of which is an ordinary direct analysis. Each data pair of system parameters system responses is called training pattern; the back-propagation neural network is iteratively trained using a number of training patterns. The system responses are given to the input units of the network, while the system parameters to be identified are given to its output units as teacher signal; some system responses measured are given to the well trained network, which immediately outputs appropriate system parameters even for untrained patterns. This is an inverse analysis. To demonstrate its practical performances, the present system is applied to identify locations and shapes of two adjacent dissimilar surface cracks hidden in a pipe with the electric potential drop method. The results clearly show that the present system is very efficient and accurate. (author). 7 refs., 10 figs

  9. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  10. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  11. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  12. Data mining-based statistical analysis of biological data uncovers hidden significance: clustering Hashimoto's thyroiditis patients based on the response of their PBMC with IL-2 and IFN-γ secretion to stimulation with Hsp60.

    Science.gov (United States)

    Tonello, Lucio; Conway de Macario, Everly; Marino Gammazza, Antonella; Cocchi, Massimo; Gabrielli, Fabio; Zummo, Giovanni; Cappello, Francesco; Macario, Alberto J L

    2015-03-01

    The pathogenesis of Hashimoto's thyroiditis includes autoimmunity involving thyroid antigens, autoantibodies, and possibly cytokines. It is unclear what role plays Hsp60, but our recent data indicate that it may contribute to pathogenesis as an autoantigen. Its role in the induction of cytokine production, pro- or anti-inflammatory, was not elucidated, except that we found that peripheral blood mononucleated cells (PBMC) from patients or from healthy controls did not respond with cytokine production upon stimulation by Hsp60 in vitro with patterns that would differentiate patients from controls with statistical significance. This "negative" outcome appeared when the data were pooled and analyzed with conventional statistical methods. We re-analyzed our data with non-conventional statistical methods based on data mining using the classification and regression tree learning algorithm and clustering methodology. The results indicate that by focusing on IFN-γ and IL-2 levels before and after Hsp60 stimulation of PBMC in each patient, it is possible to differentiate patients from controls. A major general conclusion is that when trying to identify disease markers such as levels of cytokines and Hsp60, reference to standards obtained from pooled data from many patients may be misleading. The chosen biomarker, e.g., production of IFN-γ and IL-2 by PBMC upon stimulation with Hsp60, must be assessed before and after stimulation and the results compared within each patient and analyzed with conventional and data mining statistical methods.

  13. Extraction of hidden information by efficient community detection in networks

    CERN Document Server

    Lee, Juyong; Lee, Jooyoung

    2012-01-01

    Currently, we are overwhelmed by a deluge of experimental data, and network physics has the potential to become an invaluable method to increase our understanding of large interacting datasets. However, this potential is often unrealized for two reasons: uncovering the hidden community structure of a network, known as community detection, is difficult, and further, even if one has an idea of this community structure, it is not a priori obvious how to efficiently use this information. Here, to address both of these issues, we, first, identify optimal community structure of given networks in terms of modularity by utilizing a recently introduced community detection method. Second, we develop an approach to use this community information to extract hidden information from a network. When applied to a protein-protein interaction network, the proposed method outperforms current state-of-the-art methods that use only the local information of a network. The method is generally applicable to networks from many areas.

  14. The hidden values

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Jensen, Karsten Klint

    the complicated technical basis of such decisions transparent to the rest of society. And when decisions involve political considerations it can be hard to clarify the criteria of political acceptability. These difficulties notwithstanding, we believe that we have taken some important steps forward in the project...... “The Hidden Values - Transparency in Decision-Making Processes Dealing with Hazardous Activities”. The report seeks to shed light on what is needed to create a transparent framework for political and administrative decisions on the use of GMOs and chemical products. It is our hope that the report...

  15. CoCoRaHS (The Community Collaborative Rain, Hail and Snow Network): Analysis of Participant Survey Data to Uncover Learning through Participation

    Science.gov (United States)

    Holzer, M. A.; Zimmerman, T.; Doesken, N. J.; Reges, H. W.; Newman, N.; Turner, J.; Schwalbe, Z.

    2010-12-01

    CoCoRaHS (The Community Collaborative Rain, Hail and Snow network) is based out of Fort Collins Colorado and is an extremely successful citizen science project with over 15,000 volunteers collecting valuable precipitation data. Forecasters and scientists use data from this dense network to illuminate and illustrate the high small-scale variability of precipitation across the nation. This presentation will discuss the results of a survey of CoCoRaHS participants as related to 1) citizen scientists’ motivation and learning; 2) the challenges of identifying how people learn science in citizen science projects; and 3) a potential research-based framework for how people learn through engaging in the data collection within in a citizen science project. A comprehensive survey of 14,500 CoCoRaHS observers was recently conducted to uncover participant perceptions of numerous aspects of the CoCoRaHS program, including its goal of increasing climate literacy. The survey yielded a response rate of over 50%, and included measures of motivation, engagement and learning. In relationship to motivation and learning, the survey revealed that most (57.1%) observers would make precipitation observations regardless of being a CoCoRaHS volunteer, therefore their motivation is related to their inherent level of interest in weather. Others are motivated by their desire to learn more about weather and climate, they want to contribute to a scientific project, they think its fun, and/or it provides a sense of community. Because so many respondents already had knowledge and interest in weather and climate, identifying how and what people learn through participating was a challenge. However, the narrow project focus of collecting and reporting of local precipitation assisted in identifying aspects of learning. For instance, most (46.4%) observers said they increased their knowledge about the local variability in precipitation even though they had been collecting precipitation data for many

  16. Global analysis of ion dependence unveils hidden steps in DNA binding and bending by integration host factor

    Science.gov (United States)

    Vivas, Paula; Velmurugu, Yogambigai; Kuznetsov, Serguei V.; Rice, Phoebe A.; Ansari, Anjum

    2013-09-01

    Proteins that recognize and bind to specific sites on DNA often distort the DNA at these sites. The rates at which these DNA distortions occur are considered to be important in the ability of these proteins to discriminate between specific and nonspecific sites. These rates have proven difficult to measure for most protein-DNA complexes in part because of the difficulty in separating the kinetics of unimolecular conformational rearrangements (DNA bending and kinking) from the kinetics of bimolecular complex association and dissociation. A notable exception is the Integration Host Factor (IHF), a eubacterial architectural protein involved in chromosomal compaction and DNA recombination, which binds with subnanomolar affinity to specific DNA sites and bends them into sharp U-turns. The unimolecular DNA bending kinetics has been resolved using both stopped-flow and laser temperature-jump perturbation. Here we expand our investigation by presenting a global analysis of the ionic strength dependence of specific binding affinity and relaxation kinetics of an IHF-DNA complex. This analysis enables us to obtain each of the underlying elementary rates (DNA bending/unbending and protein-DNA association/dissociation), and their ionic strength dependence, even under conditions where the two processes are coupled. Our analysis indicates interesting differences in the ionic strength dependence of the bi- versus unimolecular steps. At moderate [KCl] (100-500 mM), nearly all the ionic strength dependence to the overall equilibrium binding affinity appears in the bimolecular association/dissociation of an initial, presumably weakly bent, encounter complex, with a slope SKbi ≈ 8 describing the loglog-dependence of the equilibrium constant to form this complex on [KCl]. In contrast, the unimolecular equilibrium constant to form the fully wrapped specific complex from the initial complex is nearly independent of [KCl], with SKuni water molecules, which is osmotically favored by

  17. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  18. Phonocardiogram segmentation by using Hidden Markov Models

    OpenAIRE

    Lima, C. S.; Cardoso, Manuel J.

    2007-01-01

    This paper is concerned to the segmentation of heart sounds by using state of art Hidden Markov Models technology. Concerning to several heart pathologies the analysis of the intervals between the first and second heart sounds is of utmost importance. Such intervals are silent for a normal subject and the presence of murmurs indicate certain cardiovascular defects and diseases. While the first heart sound can easily be detected if the ECG is available, the second heart sound is much more diff...

  19. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  20. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to anoth...... in the monetary policy of United States, the dierent functional form being variants of the Taylor (1993) rule.......Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The estimation of the HMM is conducted using a variant of the Iterative Conditional Expectation-Generalized Mixture (ICE-GEMI) algorithm proposed by Delignon et al. (1997), that permits analysis of the conditional distributions of economic data and allows for different functional forms across regimes...

  1. Child Abuse: The Hidden Bruises

    Science.gov (United States)

    ... AACAP Facts for Families Guide Skip breadcrumb navigation Child Abuse - The Hidden Bruises Quick Links Facts For Families ... 5; Updated November 2014 The statistics on physical child abuse are alarming. It is estimated hundreds of thousands ...

  2. Hidden structures in quantum mechanics

    OpenAIRE

    Dzhunushaliev, Vladimir

    2008-01-01

    It is shown that some operators in quantum mechanics have hidden structures that are unobservable in principle. These structures are based on a supersymmetric decomposition of the momentum operator, and a nonassociative decomposition of the spin operator.

  3. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...... experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...

  4. Self-Efficacy Beliefs and Mental Time Travel Ability: Uncovering a Hidden Relationship in Educational Settings

    Science.gov (United States)

    Eren, Altay

    2009-01-01

    The aim of this study was threefold: first, it was to explore the profiles of student teachers' mental time travel ability; second, it was to examine the relationship between student teachers' mental time travel ability and self-efficacy beliefs; and third, it was to investigate the role of self-efficacy beliefs in relationship between the past…

  5. A dynamical network approach to uncovering hidden causality relationships in collective neuron firings

    CERN Document Server

    Ruszczycki, Bła\\ zej; Johnson, Neil F

    2009-01-01

    We analyze the synchronous firings of the salamander ganglion cells from the perspective of the complex network viewpoint where the network's links reflect the correlated behavior of firings. We study the time-aggregated properties of the resulting network focusing on its topological features. The behavior of pairwise correlations has been inspected in order to construct an appropriate measure that will serve as a weight of network connection.

  6. Contract Faculty in Canada: Using Access to Information Requests to Uncover Hidden Academics in Canadian Universities

    Science.gov (United States)

    Brownlee, Jamie

    2015-01-01

    In Canada, universities are undergoing a process of corporatization where business interests, values and practices are assuming a more prominent place in higher education. A key feature of this process has been the changing composition of academic labor. While it is generally accepted that universities are relying more heavily on contract faculty,…

  7. How to Show One-Fourth? Uncovering Hidden Context through Reciprocal Learning

    Science.gov (United States)

    Abramovich, S.; Brouwer, P.

    2007-01-01

    This paper suggests that mathematics teacher educators should listen carefully to what their students are saying. More specifically, it demonstrates how from one pre-teacher's non-traditional geometric representation of a unit fraction, a variety of learning environments that lead to the enrichment of mathematics for teaching can be developed. The…

  8. Uncovering the Hidden Meaning of Cross-Curriculum Comparison Results on the Force Concept Inventory

    Science.gov (United States)

    Ding, Lin; Caballero, Marcos D.

    2014-01-01

    In a recent study, Caballero and colleagues conducted a large-scale evaluation using the Force Concept Inventory (FCI) to compare student learning outcomes between two introductory physics curricula: the Matter and Interactions (M&I) mechanics course and a pedagogically-reformed-traditional-content (PRTC) mechanics course. Using a conventional…

  9. Uncovering Hidden Dimensions of Australian Early Childhood Policy History: Insights from Interviews with Policy "Elites"

    Science.gov (United States)

    Logan, Helen; Sumsion, Jennifer; Press, Frances

    2014-01-01

    This article considers the value of elite interviews as a frequently overlooked methodology in investigations of policymaking in early childhood education and care (ECEC). We contextualise the discussion within a study that examines constructions of quality in Australian ECEC policymaking between 1972 and 2009. We conclude that, despite their…

  10. Sensitivity of hidden Markov models

    OpenAIRE

    Mitrophanov, Alexander Yu.; Lomsadze, Alexandre; Borodovsky, Mark

    2005-01-01

    We derive a tight perturbation bound for hidden Markov models. Using this bound, we show that, in many cases, the distribution of a hidden Markov model is considerably more sensitive to perturbations in the emission probabilities than to perturbations in the transition probability matrix and the initial distribution of the underlying Markov chain. Our approach can also be used to assess the sensitivity of other stochastic models, such as mixture processes and semi-Markov ...

  11. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  12. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index.

    Directory of Open Access Journals (Sweden)

    Julie C Ruel-Bergeron

    Full Text Available Deficiencies in essential vitamins and minerals-also termed hidden hunger-are pervasive and hold negative consequences for the cognitive and physical development of children.This analysis evaluates the change in hidden hunger over time in the form of one composite indicator-the Hidden Hunger Index (HHI-using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency. Net changes from 1995-2011 and population weighted regional means for various time periods are measured.Globally, hidden hunger improved (-6.7 net change in HHI from 1995-2011. Africa was the only region to see a deterioration in hidden hunger (+1.9 over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0, while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased.This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs. However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda.Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish.

  13. Genome analysis of a clinical isolate of Shewanella sp. uncovered an active hybrid integrative and conjugative element carrying an integron platform inserted in a novel genomic locus.

    Science.gov (United States)

    Parmeciano Di Noto, Gisela; Jara, Eugenio; Iriarte, Andrés; Centrón, Daniela; Quiroga, Cecilia

    2016-08-01

    Shewanella spp. are currently considered to be emerging pathogens that can code for a blaOXA carbapenemase in their chromosome. Complete genome analysis of the clinical isolate Shewanella sp. Sh95 revealed that this strain is a novel species, which shares a lineage with marine isolates. Characterization of its resistome showed that it codes for genes drfA15, qacH and blaOXA-48. We propose that Shewanella sp. Sh95 acts as reservoir of blaOXA-48. Moreover, analysis of mobilome showed that it contains a novel integrative and conjugative element (ICE), named ICESh95. Comparative analysis between the close relatives ICESpuPO1 from Shewanella sp. W3-18-1 and ICE SXTMO10 from Vibrio cholerae showed that ICESh95 encompassed two new regions, a type III restriction modification system and a multidrug resistance integron. The integron platform contained a novel arrangement formed by gene cassettes drfA15 and qacH, and a class C-attC group II intron. Furthermore, insertion of ICESh95 occurred at a unique target site, which correlated with the presence of a different xis/int module. Mobility of ICESh95 was assessed and demonstrated its ability to self-transfer with high efficiency to different species of bacteria. Our results show that ICESh95 is a self-transmissible, mobile element, which can contribute to the dissemination of antimicrobial resistance; this is clearly a threat when natural bacteria from water ecosystems, such as Shewanella, act as vectors in its propagation. PMID:27215217

  14. Uncovering Plagiarism - Author Profiling at PAN

    OpenAIRE

    Rosso, Paolo; RANGEL PARDO, FRANCISCO MANUEL

    2014-01-01

    PAN is a yearly workshop and evaluation lab on uncovering plagiarism, authorship, and social software misuse. Since 2009, PAN has been organizing benchmark activities on uncovering plagiarism, authorship, and social software misuse . An additional task - author profiling - has also recently been proposed. Author profiling, instead of focusing on individual authors, studies how language is shared by a class of people. Author profiling is a problem of growing importance in applications in foren...

  15. Transcriptome Analysis of a Ustilago maydis ust1 Deletion Mutant Uncovers Involvement of Laccase and Polyketide Synthase Genes in Spore Development.

    Science.gov (United States)

    Islamovic, Emir; García-Pedrajas, María D; Chacko, Nadia; Andrews, David L; Covert, Sarah F; Gold, Scott E

    2015-01-01

    Ustilago maydis, causal agent of corn smut disease, is a dimorphic fungus alternating between a saprobic budding haploid and an obligate pathogenic filamentous dikaryon. Maize responds to U. maydis colonization by producing tumorous structures, and only within these does the fungus sporulate, producing melanized sexual teliospores. Previously we identified Ust1, an APSES (Asm1p, Phd1p, Sok2p, Efg1p, and StuAp) transcription factor, whose deletion led to filamentous haploid growth and the production of highly pigmented teliospore-like structures in culture. In this study, we analyzed the transcriptome of a ust1 deletion mutant and functionally characterized two highly upregulated genes with potential roles in melanin biosynthesis: um05361, encoding a putative laccase (lac1), and um06414, encoding a polyketide synthase (pks1). The Δlac1 mutant strains showed dramatically reduced virulence on maize seedlings and fewer, less-pigmented teliospores in adult plants. The Δpks1 mutant was unaffected in seedling virulence but adult plant tumors generated hyaline, nonmelanized teliospores. Thus, whereas pks1 appeared to be restricted to the synthesis of melanin, lac1 showed a broader role in virulence. In conclusion, the ust1 deletion mutant provided an in vitro model for sporulation in U. maydis, and functional analysis supports the efficacy of this in vitro mutant analysis for identification of genes involved in in planta teliosporogenesis.

  16. Tracing hidden herbivores: Time-resolved non-invasive analysis of belowground volatiles by proton-transfer-reaction mass spectrometry (PTR-MS)

    OpenAIRE

    Danner, H.; Samudrala, D.; Cristescu, S M; Van Dam, N.M.

    2012-01-01

    Root herbivores are notoriously difficult to study, as they feed hidden in the soil. However, root herbivores may be traced by analyzing specific volatile organic compounds (VOCs) that are produced by damaged roots. These VOCs not only support parasitoids in the localization of their host, but also may help scientists study belowground plant-herbivore interactions. Herbivore-induced VOCs are usually analyzed by gas-chromatography mass spectrometry (GC-MS), but with this off-line method, the g...

  17. Giving Voice to Emotion: Voice Analysis Technology Uncovering Mental States is Playing a Growing Role in Medicine, Business, and Law Enforcement.

    Science.gov (United States)

    Allen, Summer

    2016-01-01

    It's tough to imagine anything more frustrating than interacting with a call center. Generally, people don't reach out to call centers when they?re happy-they're usually trying to get help with a problem or gearing up to do battle over a billing error. Add in an automatic phone tree, and you have a recipe for annoyance. But what if that robotic voice offering you a smorgasbord of numbered choices could tell that you were frustrated and then funnel you to an actual human being? This type of voice analysis technology exists, and it's just one example of the many ways that computers can use your voice to extract information about your mental and emotional state-including information you may not think of as being accessible through your voice alone. PMID:27187541

  18. Giving Voice to Emotion: Voice Analysis Technology Uncovering Mental States is Playing a Growing Role in Medicine, Business, and Law Enforcement.

    Science.gov (United States)

    Allen, Summer

    2016-01-01

    It's tough to imagine anything more frustrating than interacting with a call center. Generally, people don't reach out to call centers when they?re happy-they're usually trying to get help with a problem or gearing up to do battle over a billing error. Add in an automatic phone tree, and you have a recipe for annoyance. But what if that robotic voice offering you a smorgasbord of numbered choices could tell that you were frustrated and then funnel you to an actual human being? This type of voice analysis technology exists, and it's just one example of the many ways that computers can use your voice to extract information about your mental and emotional state-including information you may not think of as being accessible through your voice alone.

  19. Uncovering patterns of interest in useful plants. Frequency analysis of individual students’ interest types as a tool for planning botany teaching units

    Directory of Open Access Journals (Sweden)

    Peter Pany

    2014-12-01

    Full Text Available The paper presented examines how useful plants can help counteracting “plant blindness” – a phenomenon leading people to overlook plants in everyday-life. Recent research indicates that people are most likely interested in useful plants, hence this group of plants could be used to trigger interest in botanical content in general. This study has investigated the structure of interest in five subgroups of useful plants (medicinal plants, stimulant herbal drugs, spice plants, edible plants, and ornamental plants. For this purpose, the FEIN-questionnaire (Fragebogen zur Erhebung des Interesses an Nutzpflanzen = Questionnaire acquiring interest in useful plants was filled in by N = 1299 pupils from grade 5 to 12. Data analysis shows (for all age groups and both genders that medicinal plants and stimulant herbal drugs trigger high interest while spice plants, edible plants and ornamental plants raise only lower interest. However, mean values do not allow conclusions on individual level (e.g. in a school class. In order to gain information about the interest structure in a specific target group teachers deal with in practice, we have analysed the interests on individual level using frequency analysis of different interest types. Results show that stimulant herbal drugs seem to strongly polarize students, whereas medicinal plants are interesting for almost the whole sample. Eventually, medicinal plants turned out to be well suited to introduce botanical content by means of plants catching the interest of as many students as possible. Therefore, medicinal plants should be established as flagships counteracting plant blindness.

  20. Hidden variables and nonlocality in quantum mechanics

    Science.gov (United States)

    Hemmick, Douglas Lloyd

    1997-05-01

    Most physicists hold a skeptical attitude toward a 'hidden variables' interpretation of quantum theory, despite David Bohm's successful construction of such a theory and John S. Bell's strong arguments in favor of the idea. The first reason for doubt concerns certain mathematical theorems (von Neumann's, Gleason's, Kochen and Specker's, and Bell's) which can be applied to the hidden variables issue. These theorems are often credited with proving that hidden variables are indeed 'impossible', in the sense that they cannot replicate the predictions of quantum mechanics. Many who do not draw such a strong conclusion nevertheless accept that hidden variables have been shown to exhibit prohibitively complicated features. The second concern is that the most sophisticated example of a hidden variables theory-that of David Bohm-exhibits non-locality, i.e., consequences of events at one place can propagate to other places instantaneously. However, neither the mathematical theorems in question nor the attribute of nonlocality detract from the importance of a hidden variables interpretation of quantum theory. Nonlocality is present in quantum mechanics itself, and is a required characteristic of any theory that agrees with the quantum mechanical predictions. We first discuss the earliest analysis of hidden variables-that of von Neumann's theorem-and review John S. Bell's refutation of von Neumann's 'impossibility proof'. We recall and elaborate on Bell's arguments regarding the theorems of Gleason, and Kochen and Specker. According to Bell, these latter theorems do not imply that hidden variables interpretations are untenable, but instead that such theories must exhibit contextuality, i.e., they must allow for the dependence of measurement results on the characteristics of both measured system and measuring apparatus. We demonstrate a new way to understand the implications of both Gleason's theorem and Kochen and Specker's theorem by noting that they prove a result we call

  1. Population genomic analysis uncovers African and European admixture in Drosophila melanogaster populations from the south-eastern United States and Caribbean Islands.

    Science.gov (United States)

    Kao, Joyce Y; Zubair, Asif; Salomon, Matthew P; Nuzhdin, Sergey V; Campo, Daniel

    2015-04-01

    Drosophila melanogaster is postulated to have colonized North America in the past several 100 years in two waves. Flies from Europe colonized the east coast United States while flies from Africa inhabited the Caribbean, which if true, make the south-east US and Caribbean Islands a secondary contact zone for African and European D. melanogaster. This scenario has been proposed based on phenotypes and limited genetic data. In our study, we have sequenced individual whole genomes of flies from populations in the south-east US and Caribbean Islands and examined these populations in conjunction with population sequences from the west coast US, Africa, and Europe. We find that west coast US populations are closely related to the European population, likely reflecting a rapid westward expansion upon first settlements into North America. We also find genomic evidence of African and European admixture in south-east US and Caribbean populations, with a clinal pattern of decreasing proportions of African ancestry with higher latitude. Our genomic analysis of D. melanogaster populations from the south-east US and Caribbean Islands provides more evidence for the Caribbean Islands as the source of previously reported novel African alleles found in other east coast US populations. We also find the border between the south-east US and the Caribbean island to be the admixture hot zone where distinctly African-like Caribbean flies become genomically more similar to European-like south-east US flies. Our findings have important implications for previous studies examining the generation of east coast US clines via selection. PMID:25735402

  2. Revelando sentidos na prática docente: a abordagem de corpus na análise do discurso Uncovering meanings in pedagogical practice: the corpus approach in discourse analysis

    Directory of Open Access Journals (Sweden)

    Vander Viana

    2011-01-01

    Full Text Available Este artigo discute a viabilidade da utilização de ferramentas da Linguística de Corpus na análise do discurso pedagógico. Para tanto, são apresentados dois estudos de caso. O primeiro focaliza o discurso de professores de língua inglesa de um renomado curso de idiomas do Rio de Janeiro acerca da implementação de recursos tecnológicos na sala de aula. O segundo estudo, por sua vez, busca perceber qual é o posicionamento de professores universitários de literaturas em língua inglesa sobre literatura e seu ensino. Os resultados apontam para a riqueza dos dados contextuais que podem ser depreendidos a partir de uma análise linguística de base empírica. Em última análise, o artigo revela a importância e a flexibilidade da abordagem de corpus na análise do discurso, que pode ser aplicada a inúmeros contextos.This paper discusses the feasibility of using Corpus Linguistics tools in the analysis of pedagogic discourse. For doing this, two case studies are presented. The first one focuses on the discourse of English language teachers of a well-known languages course in Rio de Janeiro about the implementation of technological resources in the classroom. The second study, in its turn, seeks to realize the position held by university professors of literatures in English language with regard to literature and its teaching. The results point out to the richness of contextual data which can be inferred from a linguistic analysis with an empirical basis. All in all, the paper uncovers the importance and flexibility of the corpus approach in discourse analysis, which may be applied to several contexts.

  3. HITS-CLIP analysis uncovers a link between the Kaposi's sarcoma-associated herpesvirus ORF57 protein and host pre-mRNA metabolism.

    Directory of Open Access Journals (Sweden)

    Emi Sei

    2015-02-01

    Full Text Available The Kaposi's sarcoma associated herpesvirus (KSHV is an oncogenic virus that causes Kaposi's sarcoma, primary effusion lymphoma (PEL, and some forms of multicentric Castleman's disease. The KSHV ORF57 protein is a conserved posttranscriptional regulator of gene expression that is essential for virus replication. ORF57 is multifunctional, but most of its activities are directly linked to its ability to bind RNA. We globally identified virus and host RNAs bound by ORF57 during lytic reactivation in PEL cells using high-throughput sequencing of RNA isolated by cross-linking immunoprecipitation (HITS-CLIP. As expected, ORF57-bound RNA fragments mapped throughout the KSHV genome, including the known ORF57 ligand PAN RNA. In agreement with previously published ChIP results, we observed that ORF57 bound RNAs near the oriLyt regions of the genome. Examination of the host RNA fragments revealed that a subset of the ORF57-bound RNAs was derived from transcript 5' ends. The position of these 5'-bound fragments correlated closely with the 5'-most exon-intron junction of the pre-mRNA. We selected four candidates (BTG1, EGR1, ZFP36, and TNFSF9 and analyzed their pre-mRNA and mRNA levels during lytic phase. Analysis of both steady-state and newly made RNAs revealed that these candidate ORF57-bound pre-mRNAs persisted for longer periods of time throughout infection than control RNAs, consistent with a role for ORF57 in pre-mRNA metabolism. In addition, exogenous expression of ORF57 was sufficient to increase the pre-mRNA levels and, in one case, the mRNA levels of the putative ORF57 targets. These results demonstrate that ORF57 interacts with specific host pre-mRNAs during lytic reactivation and alters their processing, likely by stabilizing pre-mRNAs. These data suggest that ORF57 is involved in modulating host gene expression in addition to KSHV gene expression during lytic reactivation.

  4. Ranked prediction of p53 targets using hidden variable dynamic modeling

    OpenAIRE

    Barenco, M.; Tomescu, D; Brewer, D; Callard, R.; Stark, J.(Laboratoire de Physique Subatomique et de Cosmologie, Université Grenoble-Alpes, CNRS/IN2P3, Grenoble, France); Hubank, M.

    2006-01-01

    Full exploitation of microarray data requires hidden information that cannot be extracted using current analysis methodologies. We present a new approach, hidden variable dynamic modeling (HVDM), which derives the hidden profile of a transcription factor from time series microarray data, and generates a ranked list of predicted targets. We applied HVDM to the p53 network, validating predictions experimentally using small interfering RNA. HVDM can be applied in many systems biology contexts to...

  5. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  6. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  7. Decaying into the Hidden Sector

    CERN Document Server

    Ruderman, Joshua T

    2009-01-01

    The existence of light hidden sectors is an exciting possibility that may be tested in the near future. If DM is allowed to decay into such a hidden sector through GUT suppressed operators, it can accommodate the recent cosmic ray observations without over-producing antiprotons or interfering with the attractive features of the thermal WIMP. Models of this kind are simple to construct, generic and evade all astrophysical bounds. We provide tools for constructing such models and present several distinct examples. The light hidden spectrum and DM couplings can be probed in the near future, by measuring astrophysical photon and neutrino fluxes. These indirect signatures are complimentary to the direct production signals, such as lepton jets, predicted by these models.

  8. Adaptive Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rasmussen, Tage

    1996-01-01

    Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding.......Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding....

  9. Hidden symmetries in jammed systems

    Science.gov (United States)

    Morse, Peter K.; Corwin, Eric I.

    2016-07-01

    There are deep, but hidden, geometric structures within jammed systems, associated with hidden symmetries. These can be revealed by repeated transformations under which these structures lead to fixed points. These geometric structures can be found in the Voronoi tesselation of space defined by the packing. In this paper we examine two iterative processes: maximum inscribed sphere (MIS) inversion and a real-space coarsening scheme. Under repeated iterations of the MIS inversion process we find invariant systems in which every particle is equal to the maximum inscribed sphere within its Voronoi cell. Using a real-space coarsening scheme we reveal behavior in geometric order parameters which is length-scale invariant.

  10. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  11. Analysis on Malware's Hidden Information Detection based onVM's vmem File%基于vmem文件的隐藏信息检测研究

    Institute of Scientific and Technical Information of China (English)

    何祥; 周安民; 蒲伟; 周妍

    2012-01-01

    针对采用Rootkit技术进行隐藏的恶意程序,文中提出了一种基于虚拟机内外视图交叉比对的恶意程序检测方案来提取其隐藏的信息。该方案通过将虚拟机内部获取的不可信系统信息和虚拟机外部通过vmem文件分析得到的可信系统信息进行交叉比对,发现系统中被Rootkit所隐藏的进程信息,使得Rootkit类型恶意代码检测的有效性得到了保障。%For detection of malware's hidden information with Rootkit, a new scheme based on VM Cross-view comparison is proposed. In this scheme, malwares are analyzed in a virtual machine and the information of the virtual machine is acquired from virtual machine itself and the vmem file in the host machine. By comparing the information, the process information hidden in the malware could thus be found.

  12. Rewards and Copyrights with Hidden Information

    OpenAIRE

    Sandén, Klas

    2008-01-01

    This paper makes a theoretical contribution by investigating how the optimal copyright legislation depend on hidden information. A mixed hidden action – hidden information model is used. The regulator neither observes the type of firm nor the quality choice of firms. The paper provides no evidence that hidden information can motivate a copyright legislation. In fact it shows that the optimal policy, with asymmetric information, is a reward system that is second best.

  13. Social network analysis as hidden advertising value of the carrier and application of countermeasures%社交网络作为隐性广告载体的价值分析及应用对策

    Institute of Scientific and Technical Information of China (English)

    周志平

    2012-01-01

    随着社交网络的产生和发展,直至流行和普及,社交网络给现代生活带来了巨大的改变和冲击,社交网络的商业价值也日益凸显。本文传播方式和受众两个层面全面系统地分析了社交网络作为隐性广告载体的价值优势,并提出了社交网络植入隐性广告的一些可行性建议。%With the emergence and development of the social network,until the prevalence and popularity of social networks to modern life has brought a huge change and the impact of the commercial value of the social network has become increasingly prominent.The two levels of this article mode of transmission and audience a comprehensive and systematic analysis of the social network as hidden advertising value of the carrier edge,and put forward some feasible suggestions of hidden advertising in social networks implanted.

  14. Modeling Multiple Risks: Hidden Domain of Attraction

    CERN Document Server

    Mitra, Abhimanyu

    2011-01-01

    Hidden regular variation is a sub-model of multivariate regular variation and facilitates accurate estimation of joint tail probabilities. We generalize the model of hidden regular variation to what we call hidden domain of attraction. We exhibit examples that illustrate the need for a more general model and discuss detection and estimation techniques.

  15. 急诊科药嘱相关隐患原因分析及对策%Analysis and countermeasures of emergency medicine related hidden dangers

    Institute of Scientific and Technical Information of China (English)

    姜艳; 李素玲

    2014-01-01

    Objective To investigate the related problems and countermeasures of emergency medicine pre-scription. Methods The related problems of drug related orders in the second half of 2013 were analyzed,and the cau-ses of the trouble,measures to eliminate the drug hidden dangers were found. Results The hidden danger of drug order was related to doctors unfamiliar with interaction,usage and dosage of drugs,drug administration personnel lack of re-sponsibility. Conclusion Strengthening the verification link in nursing work,the training of medical staff rotation,drug administration responsibility,the training of clinical staff,can reduce the drug related risks,so as to reduce medication errors.%目的:探讨急诊科药嘱相关问题及对策。方法对2013年下半年用药医嘱中的隐患进行分析,发现造成药嘱隐患的原因,寻找消除药嘱隐患的对策。结果隐患药嘱与医生对药物作用、用法、剂量不熟悉,药局人员缺乏责任心有着直接的关系。结论加强护理工作中的核对环节,对轮转医生加强培训,加强药局工作人员的责任心,对临床医护人员加强相关培训,可以减少药嘱相关隐患,从而减少用药错误。

  16. Stochastic Analysis of Exit-Fluid Temperature Time-Series Data from the TAG Hydrothermal Mound: Events, States, and Hidden Markov Models

    Science.gov (United States)

    Reves-Sohn, R.; Humphris, S.; Canales, J.

    2005-12-01

    The TAG hydrothermal mound is a dynamic structure that is continuously growing via mineral deposition, collapsing from gravitational instabilities and anhydrite dissolution, and shaking from frequent seismic activity on the adjacent normal faults. As a result, the sub-surface fluid circulation patterns beneath the mound are continually re-organizing in response to events that close and open flow paths. These characteristics are clearly evident in time series exit-fluid temperature data acquired from June 2003 through July 2004 as part of the Seismicity and Fluid Flow of TAG (STAG) experiment. Twenty one temperature probes were deployed in actively venting cracks across the TAG mound, and temperature measurements were acquired at each site every ~10 minutes. A key insight for understanding the exit-fluid temperature data is that the measurements can be modeled as Markov chains, where each measurement is a random variable drawn from a finite set of probability distributions associated with the hidden states of the system (i.e., Hidden Markov Models). The Markov chain changes states in response to events that can affect multiple probes, but not necessarily in the same way. For example, an event may cause temperatures at one probe to rapidly increase while temperatures at another probe rapidly decrease. The data from many probes can be explained with a two-state Markov chain, with one state corresponding to "crack open" and the second state corresponding to "crack closed", but still other probes require three or more states, possibly in a nested structure. These stochastic models are deepening our understanding of shallow circulation patterns beneath the TAG mound, and we hope to use them to condition subsurface flow models incorporating the relevant physics of permeable flow in fractures and heat flow.

  17. Nonintentional behavioural responses to psi : hidden targets and hidden observers

    OpenAIRE

    Anderson, Mary-Jane Charlotte

    2012-01-01

    Psi is the phenomenon of apparently responding to or receiving information by means other than the recognised senses. Psi information may influence human behaviour, without the individual intending this or even being aware of it. This thesis seeks to investigate nonintentional behavioural responses to psi. We present five empirical studies that investigated nonintentional behavioural responses to psi information. In each study, the psi information was hidden from participants, ...

  18. How Hidden are Hidden Processes? A Primer on Crypticity and Entropy Convergence

    CERN Document Server

    Mahoney, John R; James, Ryan G; Crutchfield, James P

    2011-01-01

    We investigate a stationary process's crypticity---a measure of the difference between its hidden state information and its observed information---using the causal states of computational mechanics. Here, we motivate crypticity and cryptic order as physically meaningful quantities that monitor how hidden a hidden process is. This is done by recasting previous results on the convergence of block entropy and block-state entropy in a geometric setting, one that is more intuitive and that leads to a number of new results. For example, we connect crypticity to how an observer synchronizes to a process. We show that the block-causal-state entropy is a convex function of block length. We give a complete analysis of spin chains. We present a classification scheme that surveys stationary processes in terms of their possible cryptic and Markov orders. We illustrate related entropy convergence behaviors using a new form of foliated information diagram. Finally, along the way, we provide a variety of interpretations of c...

  19. How hidden are hidden processes? A primer on crypticity and entropy convergence

    Science.gov (United States)

    Mahoney, John R.; Ellison, Christopher J.; James, Ryan G.; Crutchfield, James P.

    2011-09-01

    We investigate a stationary process's crypticity—a measure of the difference between its hidden state information and its observed information—using the causal states of computational mechanics. Here, we motivate crypticity and cryptic order as physically meaningful quantities that monitor how hidden a hidden process is. This is done by recasting previous results on the convergence of block entropy and block-state entropy in a geometric setting, one that is more intuitive and that leads to a number of new results. For example, we connect crypticity to how an observer synchronizes to a process. We show that the block-causal-state entropy is a convex function of block length. We give a complete analysis of spin chains. We present a classification scheme that surveys stationary processes in terms of their possible cryptic and Markov orders. We illustrate related entropy convergence behaviors using a new form of foliated information diagram. Finally, along the way, we provide a variety of interpretations of crypticity and cryptic order to establish their naturalness and pervasiveness. This is also a first step in developing applications in spatially extended and network dynamical systems.

  20. Parameter estimation of hidden periodic model in random fields

    Institute of Scientific and Technical Information of China (English)

    何书元

    1999-01-01

    Two-dimensional hidden periodic model is an important model in random fields. The model is used in the field of two-dimensional signal processing, prediction and spectral analysis. A method of estimating the parameters for the model is designed. The strong consistency of the estimators is proved.

  1. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp;

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving...

  2. 'Mystery shoppers' can uncover ED weaknesses.

    Science.gov (United States)

    2006-12-01

    One veteran "mystery shopper" has uncovered several common ED practices that can hurt patient satisfaction. You can learn from her observations to improve your ED's customer service: Be sure to let all of your patients know how long they might expect to wait before seeing a doctor. Wash your hands where the patient can see you, so they can be confident you are practicing good hygiene. Clearly explain all forms and discharge instructions to help ensure patient compliance. PMID:17209484

  3. Uncovering student ideas in physical science

    CERN Document Server

    Keeley, Page

    2014-01-01

    If you and your students can't get enough of a good thing, Volume 2 of Uncovering Student Ideas in Physical Science is just what you need. The book offers 39 new formative assessment probes, this time with a focus on electric charge, electric current, and magnets and electromagnetism. It can help you do everything from demystify electromagnetic fields to explain the real reason balloons stick to the wall after you rub them on your hair.

  4. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  5. Analysis of Hidden Danger in Farmer’s Rights and Interests during Farmland Transfer——An Evaluation of Rights Safeguarding Effect of Farmland Transfer Contract

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Taking Shuangliu County,Chengdu City,China as an example,evaluation index system for the rights protection effects of farmland transfer is established contract from three aspects of basic information,transfer agreement and legal safeguards in the contracts.According to the investigation data,weight of evaluation index is determined by both entropy weight and Analytic Hierarchy Process.Comprehensive index method is used to evaluate the rights protection effects of farmland transfer contract in the flat dam,high hill and low hill in Shuangliu County,Chengdu,China.Result shows that the transfer agreement of farmland and the basic information of contract greatly affect the rights protection effects of farmland transfer contract.There are differences in the five indices of the information of the signature of contract,pricing for payment,time limit for farmland transfer,transfer mode of farmland,and use range of farmland transfer.During the farmland transfer in reality,there are three hidden dangers in farmer’s land rights and interests,which are the ill-formed transfer behavior,the relatively low income of farmers from farmland transfer,and the quality decline of farmland and difficult full reclamation in transfer period.Based on the evaluation result and investigation data,countermeasures are put forward to improve the rights protection effects of farmland transfer contract.

  6. Review of hidden carbon emissions, trade, and labor income share in China, 2001–2011

    International Nuclear Information System (INIS)

    Coordinated development between the economy and the environment is currently one of the most important issues in China. By establishing models concerning labor income share and hidden carbon emissions, and taking trade as the link in their relationship, this study puts forward the scale effects, technological effects, and structural effects that relate to labor income share under the function of trade. We then establish multi-index and multi-indicator constitutive (MIMIC) equation to measure the ratio of hidden carbon emissions to total emissions, which is further considered the basis of the measurement model. Results of regression analysis carried out on labor income share show that hidden carbon emissions do have a positive effect on labor income share. In the meantime, we also prove that under scale effects, technological effects, and the structural effects of trade, hidden carbon emissions affect labor income shares in different directions. Our conclusions and policy implications are obtained from the calculated results. - Highlights: • This study establishes models concerning labor income share and hidden carbon emissions. • MIMIC is established to measure the ratio of hidden carbon emissions to total discharge. • Hidden carbon emissions have a positive effect on labor income share. • Hidden carbon emissions have various effects on the labor income share

  7. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  8. Von Neumann's `No Hidden Variables' Proof: A Re-Appraisal

    Science.gov (United States)

    Bub, Jeffrey

    2010-10-01

    Since the analysis by John Bell in 1965, the consensus in the literature is that von Neumann’s ‘no hidden variables’ proof fails to exclude any significant class of hidden variables. Bell raised the question whether it could be shown that any hidden variable theory would have to be nonlocal, and in this sense ‘like Bohm’s theory.’ His seminal result provides a positive answer to the question. I argue that Bell’s analysis misconstrues von Neumann’s argument. What von Neumann proved was the impossibility of recovering the quantum probabilities from a hidden variable theory of dispersion free (deterministic) states in which the quantum observables are represented as the ‘beables’ of the theory, to use Bell’s term. That is, the quantum probabilities could not reflect the distribution of pre-measurement values of beables, but would have to be derived in some other way, e.g., as in Bohm’s theory, where the probabilities are an artefact of a dynamical process that is not in fact a measurement of any beable of the system.

  9. Hepatitis C virus host cell interactions uncovered

    DEFF Research Database (Denmark)

    Gottwein, Judith; Bukh, Jens

    2007-01-01

      Insights into virus-host cell interactions as uncovered by Randall et al. (1) in a recent issue of PNAS further our understanding of the hepatitis C virus (HCV) life cycle, persistence, and pathogenesis and might lead to the identification of new therapeutic targets. HCV persistently infects 180...... treated. Therefore, there is a pressing need for the identification of novel drugs against hepatitis C. Although most research focuses on the development of HCV-specific antivirals, such as protease and polymerase inhibitors (3), cellular targets could be pursued and might allow the development of broad...

  10. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  11. Supersymmetric leptogenesis with a light hidden sector

    International Nuclear Information System (INIS)

    Supersymmetric scenarios incorporating thermal leptogenesis as the origin of the observed matter-antimatter asymmetry generically predict abundances of the primordial elements which are in conflict with observations. In this paper we propose a simple way to circumvent this tension and accommodate naturally thermal leptogenesis and primordial nucleosynthesis. We postulate the existence of a light hidden sector, coupled very weakly to the Minimal Supersymmetric Standard Model, which opens up new decay channels for the next-to-lightest supersymmetric particle, thus diluting its abundance during nucleosynthesis. We present a general model-independent analysis of this mechanism as well as two concrete realizations, and describe the relevant cosmological and astrophysical bounds and implications for this dark matter scenario. Possible experimental signatures at colliders and in cosmic-ray observations are also discussed

  12. Environmental Shotgun Sequencing: Its Potential and Challenges for Studying the Hidden World of Microbes

    OpenAIRE

    Eisen, Jonathan A.

    2007-01-01

    Environmental shotgun sequencing promises to reveal novel and fundamental insights into the hidden world of microbes, but the complexity of analysis required to realize this potential poses unique interdisciplinary challenges.

  13. Specialized Hidden Markov Model Databases for Microbial Genomics

    OpenAIRE

    Martin Gollery

    2003-01-01

    As hidden Markov models (HMMs) become increasingly more important in the analysis of biological sequences, so too have databases of HMMs expanded in size, number and importance. While the standard paradigm a short while ago was the analysis of one or a few sequences at a time, it has now become standard procedure to submit an entire microbial genome. In the future, it will be common to submit large groups of completed genomes to run simultaneously against a dozen public databas...

  14. Hidden scale invariance of metals

    Science.gov (United States)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.; Pedersen, Ulf R.

    2015-11-01

    Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general "hidden" scale invariance of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant inverse power-law (IPL) pair interactions. However, crystal packings of several transition metals (V, Cr, Mn, Fe, Nb, Mo, Ta, W, and Hg), most post-transition metals (Ga, In, Sn, and Tl), and the metalloids Si and Ge cannot be explained by the IPL assumption. The virial-energy correlation coefficients of iron and phosphorous are shown to increase at elevated pressures. Finally, we discuss how scale invariance explains the Grüneisen equation of state and a number of well-known empirical melting and freezing rules.

  15. Data-driven security analysis, visualization and dashboards

    CERN Document Server

    Jacobs, Jay

    2014-01-01

    Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and ma

  16. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  17. Building Simple Hidden Markov Models. Classroom Notes

    Science.gov (United States)

    Ching, Wai-Ki; Ng, Michael K.

    2004-01-01

    Hidden Markov models (HMMs) are widely used in bioinformatics, speech recognition and many other areas. This note presents HMMs via the framework of classical Markov chain models. A simple example is given to illustrate the model. An estimation method for the transition probabilities of the hidden states is also discussed.

  18. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  19. Heating up the Galaxy with Hidden Photons

    CERN Document Server

    Dubovsky, Sergei

    2015-01-01

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order $10^{-20}$ eV.

  20. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  1. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  2. Algorithms for Hidden Markov Models Restricted to Occurrences of Regular Expressions

    DEFF Research Database (Denmark)

    Tataru, Paula; Sand, Andreas; Hobolth, Asger;

    2013-01-01

    Hidden Markov Models (HMMs) are widely used probabilistic models, particularly for annotating sequential data with an underlying hidden structure. Patterns in the annotation are often more relevant to study than the hidden structure itself. A typical HMM analysis consists of annotating the observed...... data using a decoding algorithm and analyzing the annotation to study patterns of interest. For example, given an HMM modeling genes in DNA sequences, the focus is on occurrences of genes in the annotation. In this paper, we define a pattern through a regular expression and present a restriction...

  3. The Consensus String Problem and the Complexity of Comparing Hidden Markov Models

    DEFF Research Database (Denmark)

    Lyngsø, Rune Bang; Pedersen, Christian Nørgaard Storm

    2002-01-01

    The basic theory of hidden Markov models was developed and applied to problems in speech recognition in the late 1960s, and has since then been applied to numerous problems, e.g. biological sequence analysis. Most applications of hidden Markov models are based on efficient algorithms for computing...... the probability of generating a given string, or computing the most likely path generating a given string. In this paper we consider the problem of computing the most likely string, or consensus string, generated by a given model, and its implications on the complexity of comparing hidden Markov models. We show...

  4. Hidden scale in quantum mechanics

    CERN Document Server

    Giri, Pulak Ranjan

    2007-01-01

    We show that the intriguing localization of a free particle wave-packet is possible due to a hidden scale present in the system. Self-adjoint extensions (SAE) is responsible for introducing this scale in quantum mechanical models through the nontrivial boundary conditions. We discuss a couple of classically scale invariant free particle systems to illustrate the issue. In this context it has been shown that a free quantum particle moving on a full line may have localized wave-packet around the origin. As a generalization, it has also been shown that particles moving on a portion of a plane or on a portion of a three dimensional space can have unusual localized wave-packet.

  5. Stochastic thermodynamics of hidden pumps

    Science.gov (United States)

    Esposito, Massimiliano; Parrondo, Juan M. R.

    2015-05-01

    We show that a reversible pumping mechanism operating between two states of a kinetic network can give rise to Poisson transitions between these two states. An external observer, for whom the pumping mechanism is not accessible, will observe a Markov chain satisfying local detailed balance with an emerging effective force induced by the hidden pump. Due to the reversibility of the pump, the actual entropy production turns out to be lower than the coarse-grained entropy production estimated from the flows and affinities of the resulting Markov chain. Moreover, in presence of a large time scale separation between the fast-pumping dynamics and the slow-network dynamics, a finite current with zero dissipation may be produced. We make use of these general results to build a synthetase-like kinetic scheme able to reversibly produce high free-energy molecules at a finite rate and a rotatory motor achieving 100% efficiency at finite speed.

  6. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.;

    2015-01-01

    of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...... available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...

  7. Reading Hidden Messages Through Deciphered Manual Alphabets on Classic Artwork

    Science.gov (United States)

    Castronovo, Joseph Anthony, Jr.

    1998-10-01

    Decipherment is the tool used to uncover several types of hand signs that played vital roles in the creation of hidden messages in classic artwork. A 3,100 B.C. bas-relief of The 'Kaph' Telescope, formerly named The Narmer Palette, and Michaelangelo Buonarrotte's Battle of Cascina of 1506 were two key works of art that show certain similarities even though separated by 4,500 years. It is evident that Renaissance humanists provided artists with certain knowledge of the ancients. Results of incorporating a number of minor works of art showed that the competence of ancient Egyptians, Cretans and Australian Aboriginals, to name a few, as astronomers, was underestimated. Some deciphered Indus seals attested to a global understanding of the universe, with Gemini and the star of Thuban at the center of their attention. Certain forms of secrecy had to be undertaken for various reasons throughout the millennia. Three examples are: (1) In Italy, to keep controversial and truthful teachings discreet and hidden, artists embedded them in artwork long before the plight of Galileo Galilei and his discoveries. (2) Among Jewish Kabbalists, a well-known design was obscured in The Arnolfini Wedding painting for fear it would be lost due to persecution. (3) Michaelangelo Buonarrotte indicated several meanings through the hands of The Statue of Moses. They were overlooked by several societies, including the gesticulating culture of Italy, because they oppressed the value of signed languages. Spatial decipherment may testify to a need for the restoration of a spatial writing system for expanded linguistic accessibility. A 21st century model community for sign language residents and employees will benefit visual learners, particularly visual artists and non-phonetic decipherers, to better uncover, understand and perhaps use ancient hand forms to restore ancient knowledge. Moreover, the National Association of Teaching English (NATE) has recently endorsed the addition of two skills

  8. Called to respond: The potential of unveiling hiddens

    Directory of Open Access Journals (Sweden)

    Alison L Black

    2014-12-01

    Full Text Available Interested in exploring how personal stories and aesthetic modes of representing experiences can nudge open academic and educational spaces, this article/collection of particles seeks to document our encounters of being affected and called to respond to things the other has written and represented. As a way of engaging with questions about what research and research data might be and become, our attention has been drawn to stories and images from our lives that we have not shaken off – and to how, as we have opened these to the other, making once private moments public, our hiddens have morphed tenderly into a shared knowing and being. As we have acted on the call we have felt to respond we have found ourselves entering spaces of collaboration, communion, contemplation, and conversation – spaces illuminated by what we have not been able to – and cannot – set aside. Using visual and poetic materials we explore heartfelt and heartbroken aspects of our educational worlds and lives, to be present with each other and our (reemerging personal and professional meanings. We see the shared body (of work, of writing, of image that develops from the taking of brave steps and the risky slipping off of academic masks and language, as a manifestation of the trusted and nurturing spaces that can be generated through collaborative opportunities to gather together. These steps towards unveiling hiddens are producing in us and of us a friendship, fluency, and fluidity as we write new ways of becoming. In turn, we hope the uncovering and revealing of our dialogue in the public gathering of this journal might supports readers’ telling of their own life stories through what calls them to respond.

  9. Variational Infinite Hidden Conditional Random Fields.

    Science.gov (United States)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-09-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of hidden states, which rids us not only of the necessity to specify a priori a fixed number of hidden states available but also of the problem of overfitting. Markov chain Monte Carlo (MCMC) sampling algorithms are often employed for inference in such models. However, convergence of such algorithms is rather difficult to verify, and as the complexity of the task at hand increases the computational cost of such algorithms often becomes prohibitive. These limitations can be overcome by variational techniques. In this paper, we present a generalized framework for infinite HCRF models, and a novel variational inference approach on a model based on coupled Dirichlet Process Mixtures, the HCRF-DPM. We show that the variational HCRF-DPM is able to converge to a correct number of represented hidden states, and performs as well as the best parametric HCRFs-chosen via cross-validation-for the difficult tasks of recognizing instances of agreement, disagreement, and pain in audiovisual sequences. PMID:26353136

  10. Hidden Markov Modeling for humpback whale (Megaptera novaeangliae) call classification

    OpenAIRE

    PACE, Federica; White, Paul; Adam, Olivier

    2012-01-01

    International audience This study proposes a new approach for the classification of the calls detected in the songs with the use of Hidden Markov Models (HMMs) based on the concept of subunits as building blocks. HMMs have been used once before for such task but in an unsupervised algorithm with promising results, and they are used extensively in speech recognition and in few bioacoustics studies. Their flexibility suggests that they may be suitable for the analysis of the varied repertoir...

  11. Extraction of Hidden Social Networks from Wiki-Environment Involved in Information Conflict

    OpenAIRE

    Alguliyev, Rasim M.; Aliguliyev, Ramiz M.; Irada Y. Alakbarova

    2016-01-01

    Social network analysis is a widely used technique to analyze relationships among wiki-users in Wikipedia. In this paper the method to identify hidden social networks participating in information conflicts in wiki-environment is proposed. In particular, we describe how text clustering techniques can be used for extraction of hidden social networks of wiki-users caused information conflict. By clustering unstructured text articles caused information conflict we ...

  12. Feminist Approaches to Triangulation: Uncovering Subjugated Knowledge and Fostering Social Change in Mixed Methods Research

    Science.gov (United States)

    Hesse-Biber, Sharlene

    2012-01-01

    This article explores the deployment of triangulation in the service of uncovering subjugated knowledge and promoting social change for women and other oppressed groups. Feminist approaches to mixed methods praxis create a tight link between the research problem and the research design. An analysis of selected case studies of feminist praxis…

  13. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  14. 大型露天停车场雷电灾害分析与防护措施的研究%Lightning Hazard Analysis and Protective Measures of Large Uncovered Parking

    Institute of Scientific and Technical Information of China (English)

    赵涛; 李斐

    2014-01-01

    近年来,由于气候变化使强对流性天气不断增多,雷击事件频发。特别是空旷地区防雷设施不完善,防雷设施的缺乏,致使雷击造成人员伤亡和经济损失的事故时有发生。通过武汉经济技术开发区神龙汽车公司的露天停车场两次成品车遭受雷击事故的实地调查,就该村地理位置、气象资料、雷灾产生的原因进行了分析,提出了相应的雷电防护对策及建议。%In recent years, the climate change makes strong convective weather increasing and frequent lightning events. Especially in open areas, the lightning protection facilities in open areas are imperfect, even lack of lightning protection facilities, so the lightning casualties and economic losses occurred often. Through the fieldwork of the two lightning accident of finished car in uncovered parking of Shenlong Car company in Wuhan Economic and Technological Development Zone, the paper analyzes the location, meteorological data and the reasons of lightning disaster, and puts forward the corresponding countermeasures and suggestions for lightning protection.

  15. HMMEditor: a visual editing tool for profile hidden Markov model

    Directory of Open Access Journals (Sweden)

    Cheng Jianlin

    2008-03-01

    Full Text Available Abstract Background Profile Hidden Markov Model (HMM is a powerful statistical model to represent a family of DNA, RNA, and protein sequences. Profile HMM has been widely used in bioinformatics research such as sequence alignment, gene structure prediction, motif identification, protein structure prediction, and biological database search. However, few comprehensive, visual editing tools for profile HMM are publicly available. Results We develop a visual editor for profile Hidden Markov Models (HMMEditor. HMMEditor can visualize the profile HMM architecture, transition probabilities, and emission probabilities. Moreover, it provides functions to edit and save HMM and parameters. Furthermore, HMMEditor allows users to align a sequence against the profile HMM and to visualize the corresponding Viterbi path. Conclusion HMMEditor provides a set of unique functions to visualize and edit a profile HMM. It is a useful tool for biological sequence analysis and modeling. Both HMMEditor software and web service are freely available.

  16. Hidden Regular Variation: Detection and Estimation

    CERN Document Server

    Mitra, Abhimanyu

    2010-01-01

    Hidden regular variation defines a subfamily of distributions satisfying multivariate regular variation on $\\mathbb{E} = [0, \\infty]^d \\backslash \\{(0,0, ..., 0) \\} $ and models another regular variation on the sub-cone $\\mathbb{E}^{(2)} = \\mathbb{E} \\backslash \\cup_{i=1}^d \\mathbb{L}_i$, where $\\mathbb{L}_i$ is the $i$-th axis. We extend the concept of hidden regular variation to sub-cones of $\\mathbb{E}^{(2)}$ as well. We suggest a procedure of detecting the presence of hidden regular variation, and if it exists, propose a method of estimating the limit measure exploiting its semi-parametric structure. We exhibit examples where hidden regular variation yields better estimates of probabilities of risk sets.

  17. Uncovering the architecture of action semantics.

    Science.gov (United States)

    Watson, Christine E; Buxbaum, Laurel J

    2014-10-01

    Despite research suggesting that stored sensorimotor information about tool use is a component of the semantic representations of tools, little is known about the action features or organizing principles that underlie this knowledge. We used methods similar to those applied in other semantic domains to examine the "architecture" of action semantic knowledge. In Experiment 1, participants sorted photographs of tools into groups according to the similarity of their associated "use" actions and rated tools on dimensions related to action. The results suggest that the magnitude of arm movement, configuration of the hand, and manner of motion during tool use play a role in determining how tools cluster in action "semantic space." In Experiment 2, we validated the architecture uncovered in Experiment 1 using an implicit semantic task for which tool use knowledge was not ostensibly relevant (blocked cyclic word-picture matching). Using stimuli from Experiment 1, we found that participants performed more poorly during blocks of trials containing tools used with similar versus unrelated actions, and the amount of semantic interference depended on the magnitude of action similarity among tools. Thus, the degree of featural overlap between tool use actions plays a role in determining the overall semantic similarity of tools.

  18. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  19. Bardeen variables and hidden gauge symmetries in linearized massive gravity

    CERN Document Server

    Jaccard, Maud; Mitsou, Ermis

    2012-01-01

    We give a detailed discussion of the use of the (3+1) decomposition and of Bardeen's variables in massive gravity linearized over a Minkowski as well as over a de Sitter background. In Minkowski space the Bardeen "potential" \\Phi, that in the massless case is a non-radiative degree of freedom, becomes radiative and describes the helicity-0 component of the massive graviton. Its dynamics is governed by a simple Klein-Gordon action, supplemented by a term (\\Box \\Phi)^2 if we do not make the Fierz-Pauli tuning of the mass term. In de Sitter the identification of the variable that describes the radiative degree of freedom in the scalar sector is more subtle, and even involves expressions non-local in time. The use of this new variable provides a simple and transparent derivation of the Higuchi bound and of the disappearance of the scalar degree of freedom at a special value of $m_g^2/H^2$. The use of this formalism also allows us to uncover the existence of a hidden gauge symmetry of the massive theory, that beco...

  20. Estimating hidden semi-Markov chains from discrete sequences.

    OpenAIRE

    Guédon, Yann

    2003-01-01

    International audience This article addresses the estimation of hidden semi-Markov chains from nonstationary discrete sequences. Hidden semi-Markov chains are particularly useful to model the succession of homogeneous zones or segments along sequences. A discrete hidden semi-Markov chain is composed of a nonobservable state process, which is a semi-Markov chain, and a discrete output process. Hidden semi-Markov chains generalize hidden Markov chains and enable the modeling of various durat...

  1. A Hidden Pitfall for REDD: Analysis of Power Relation in Participatory Forest Management on Whether It Is an Obstacle or a Reliever on REDD Pathway

    Directory of Open Access Journals (Sweden)

    Angelingis Akwilini Makatta

    2015-01-01

    Full Text Available Power relation among stakeholders is a key concept in collaborative approaches. This study aims to examine the reality of the acclaimed power sharing in Participatory Forest Management (PFM and implication of existing power relation to the national REDD+ programme in Tanzania. The study involved a review of PFM policy and legal supporting documents; meta-analysis of previous studies done at two sites known to have succeeded in PFM; and empirical study at Kolo-Hills forests. Methods used include the meta-analysis of existing literature; Household Questionnaire Survey; Focused Group Discussion; and key person unstructured interviews. Results revealed that a large part of the PFM processes involved power struggle instead of power sharing. REDD+ pilot was perceived to have succeeded in improving PFM only in villages where the majority of the community about 70% experienced higher levels of inclusiveness and power balance with other PFM stakeholders in PFM processes. Power imbalance and power struggle were also noted in the REDD+ project adoption processes. Thus power relations exercised under PFM fall under potential obstacle rather than a reliever to the REDD+ programme. The study recommends reviewing of PFM legal frameworks to strengthen community empowerment for effectiveness of REDD+ on PFM platform.

  2. Uncovering the hidden signature of a magmatic recharge at Piton de la Fournaise volcano using small earthquakes

    Science.gov (United States)

    Lengliné, O.; Duputel, Z.; Ferrazzini, V.

    2016-05-01

    We apply a template matching method to detect and locate preeruptive earthquakes at Piton de la Fournaise volcano in 2014 and 2015. This approach enabled the detection of many events and unveiled persistent seismicity features through multiple eruptions. Shallow earthquakes define a ring-shaped structure beneath the main crater. The repetitive occurrence of events along this structure suggests that it corresponds to a preexisting zone of weakness within the edifice. We also show evidence of deep magma transfer in 2015. More than 5000 deep earthquakes define an upward migration immediately followed by the occurrence of shallow events leading to an eruption 20 days later. This suggests the creation of a hydraulic connection between the lower part of the volcanic system and a magma reservoir located near sea level. We can envisage than such replenishments of the shallow reservoir occurred in the past but were undetected because of limited deep earthquake detections.

  3. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  4. Stability analysis of networked control systems based on hidden Markov models%基于隐马尔可夫的网络控制系统稳定性分析

    Institute of Scientific and Technical Information of China (English)

    葛愿; 陈其工; 江明; 刘振安

    2008-01-01

    讨论了一类具有随机通信时延的网络控制系统的建模及稳定性分析,其中网络诱导时延受控于一概率分布未知的马尔可夫链,其概率分布可通过Baum-Welch算法计算.基于隐马尔町夫模型理论,将采用状态反馈的闭环网络控制系统建模成跳变线性系统,给出了这类网络控制系统随机稳定的允分条件,并将状态反馈控制器的求解问题转化为线性矩阵不等式的解的问题.最后,通过一个仿真算例说明了上述判定系统稳定性条件的有效性.%The modeling and stability analysis for a kind of networked control systems (NCSs) with random commu-nication delays are discussed. The network-induced delays are considered to be governed by an underlying Markov chain with unknown probability distribution, which can be calculated by using Baum-Welch algorithm. Based on hidden Markov model (HMM) theory, the resulting closed-loop systems are jump linear systems, and the sufficient conditions on the existence of the stabilizing controller are established by solving a set of linear matrix inequalities (LMIs). Finally, a numerical example is given to show the efficiency and feasibility of our proposed approach.

  5. Grammatical-Restrained Hidden Conditional Random Fields for Bioinformatics applications

    Directory of Open Access Journals (Sweden)

    Martelli Pier

    2009-10-01

    Full Text Available Abstract Background Discriminative models are designed to naturally address classification tasks. However, some applications require the inclusion of grammar rules, and in these cases generative models, such as Hidden Markov Models (HMMs and Stochastic Grammars, are routinely applied. Results We introduce Grammatical-Restrained Hidden Conditional Random Fields (GRHCRFs as an extension of Hidden Conditional Random Fields (HCRFs. GRHCRFs while preserving the discriminative character of HCRFs, can assign labels in agreement with the production rules of a defined grammar. The main GRHCRF novelty is the possibility of including in HCRFs prior knowledge of the problem by means of a defined grammar. Our current implementation allows regular grammar rules. We test our GRHCRF on a typical biosequence labeling problem: the prediction of the topology of Prokaryotic outer-membrane proteins. Conclusion We show that in a typical biosequence labeling problem the GRHCRF performs better than CRF models of the same complexity, indicating that GRHCRFs can be useful tools for biosequence analysis applications. Availability GRHCRF software is available under GPLv3 licence at the website http://www.biocomp.unibo.it/~savojard/biocrf-0.9.tar.gz.

  6. ENSO informed Drought Forecasting Using Nonhomogeneous Hidden Markov Chain Model

    Science.gov (United States)

    Kwon, H.; Yoo, J.; Kim, T.

    2013-12-01

    The study aims at developing a new scheme to investigate the potential use of ENSO (El Niño/Southern Oscillation) for drought forecasting. In this regard, objective of this study is to extend a previously developed nonhomogeneous hidden Markov chain model (NHMM) to identify climate states associated with drought that can be potentially used to forecast drought conditions using climate information. As a target variable for forecasting, SPI(standardized precipitation index) is mainly utilized. This study collected monthly precipitation data over 56 stations that cover more than 30 years and K-means cluster analysis using drought properties was applied to partition regions into mutually exclusive clusters. In this study, six main clusters were distinguished through the regionalization procedure. For each cluster, the NHMM was applied to estimate the transition probability of hidden states as well as drought conditions informed by large scale climate indices (e.g. SOI, Nino1.2, Nino3, Nino3.4, MJO and PDO). The NHMM coupled with large scale climate information shows promise as a technique for forecasting drought scenarios. A more detailed explanation of large scale climate patterns associated with the identified hidden states will be provided with anomaly composites of SSTs and SLPs. Acknowledgement This research was supported by a grant(11CTIPC02) from Construction Technology Innovation Program (CTIP) funded by Ministry of Land, Transport and Maritime Affairs of Korean government.

  7. New hidden beauty molecules predicted by the local hidden gauge approach and heavy quark spin symmetry

    Science.gov (United States)

    Xiao, C. W.; Ozpineci, A.; Oset, E.

    2015-10-01

    Using a coupled channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-meson interaction with hidden beauty. We obtain several new states of isospin I = 0: six bound states, and weakly bound six more possible states which depend on the influence of the coupled channel effects.

  8. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  9. Geolocating fish using Hidden Markov Models and Data Storage Tags

    DEFF Research Database (Denmark)

    Thygesen, Uffe Høgsbro; Pedersen, Martin Wæver; Madsen, Henrik

    2009-01-01

    of inference in state-space models of animals. The technique can be applied to geolocation based on light, on tidal patterns, or measurement of other variables that vary with space. We illustrate the method through application to a simulated data set where geolocation relies on depth data exclusively.......Geolocation of fish based on data from archival tags typically requires a statistical analysis to reduce the effect of measurement errors. In this paper we present a novel technique for this analysis, one based on Hidden Markov Models (HMM's). We assume that the actual path of the fish is generated...

  10. Skryté kurikulum vo svetle metodologického holizmu a metodologického individualizmu. / Hidden curriculum in the light of methodological holism and methodological individualism.

    Directory of Open Access Journals (Sweden)

    Lukáš Bomba

    2013-02-01

    Full Text Available The article analyses theoretical and methodological problem of hidden curriculum at school. It compares individualistic and holistic approach in connection to research, measurement and analysis of hidden curriculum. The goal of the study is to present the inconsistency in understanding and explaining the concept of hidden curriculum. The inconsistency is grounded in the absence of paradigmatical background. The theories of hidden curriculum are devided into two groups. The first group is grounded in individualistic approach and the second group is grounded in holistic approach. The examples of empirical studies are used as tools to grasp hidden curriculum at school. The study concludes that the deϐinitions and understanding of the concept of hidden curriculum are logical conclusions of methodologicalapproach and empirical investigation of hidden curriculum in research. The methodological approach and empirical investigation reversely constitute the theory of hidden curriculum. The individualistic paradigm grasps hidden curriculum as a an implicit socialization of a child through the actions of individuals in the school. The holistic paradigm understands hidden curriculum as institutionalized nature of ideology or the tool for reproduction of society.

  11. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  12. Detecting targets hidden in random forests

    Science.gov (United States)

    Kouritzin, Michael A.; Luo, Dandan; Newton, Fraser; Wu, Biao

    2009-05-01

    Military tanks, cargo or troop carriers, missile carriers or rocket launchers often hide themselves from detection in the forests. This plagues the detection problem of locating these hidden targets. An electro-optic camera mounted on a surveillance aircraft or unmanned aerial vehicle is used to capture the images of the forests with possible hidden targets, e.g., rocket launchers. We consider random forests of longitudinal and latitudinal correlations. Specifically, foliage coverage is encoded with a binary representation (i.e., foliage or no foliage), and is correlated in adjacent regions. We address the detection problem of camouflaged targets hidden in random forests by building memory into the observations. In particular, we propose an efficient algorithm to generate random forests, ground, and camouflage of hidden targets with two dimensional correlations. The observations are a sequence of snapshots consisting of foliage-obscured ground or target. Theoretically, detection is possible because there are subtle differences in the correlations of the ground and camouflage of the rocket launcher. However, these differences are well beyond human perception. To detect the presence of hidden targets automatically, we develop a Markov representation for these sequences and modify the classical filtering equations to allow the Markov chain observation. Particle filters are used to estimate the position of the targets in combination with a novel random weighting technique. Furthermore, we give positive proof-of-concept simulations.

  13. Uncovering transcriptional interactions via an adaptive fuzzy logic approach

    Directory of Open Access Journals (Sweden)

    Chen Chung-Ming

    2009-12-01

    Full Text Available Abstract Background To date, only a limited number of transcriptional regulatory interactions have been uncovered. In a pilot study integrating sequence data with microarray data, a position weight matrix (PWM performed poorly in inferring transcriptional interactions (TIs, which represent physical interactions between transcription factors (TF and upstream sequences of target genes. Inferring a TI means that the promoter sequence of a target is inferred to match the consensus sequence motifs of a potential TF, and their interaction type such as AT or RT is also predicted. Thus, a robust PWM (rPWM was developed to search for consensus sequence motifs. In addition to rPWM, one feature extracted from ChIP-chip data was incorporated to identify potential TIs under specific conditions. An interaction type classifier was assembled to predict activation/repression of potential TIs using microarray data. This approach, combining an adaptive (learning fuzzy inference system and an interaction type classifier to predict transcriptional regulatory networks, was named AdaFuzzy. Results AdaFuzzy was applied to predict TIs using real genomics data from Saccharomyces cerevisiae. Following one of the latest advances in predicting TIs, constrained probabilistic sparse matrix factorization (cPSMF, and using 19 transcription factors (TFs, we compared AdaFuzzy to four well-known approaches using over-representation analysis and gene set enrichment analysis. AdaFuzzy outperformed these four algorithms. Furthermore, AdaFuzzy was shown to perform comparably to 'ChIP-experimental method' in inferring TIs identified by two sets of large scale ChIP-chip data, respectively. AdaFuzzy was also able to classify all predicted TIs into one or more of the four promoter architectures. The results coincided with known promoter architectures in yeast and provided insights into transcriptional regulatory mechanisms. Conclusion AdaFuzzy successfully integrates multiple types of

  14. Influence of Introducing an Additional Hidden Layer on the Character Recognition Capability of a BP Neural Network having One Hidden Layer

    Directory of Open Access Journals (Sweden)

    Vijaypal Singh Dhaka,

    2010-02-01

    Full Text Available Objective of this paper is to study the character recognition capability of feed-forward back-propagation algorithm using more than one hidden layer. This analysis was conducted on 182 different letters from English alphabet. After binarization, these characters were clubbed together to form training patterns for the neural network. Network was trained to learn its behavior by adjusting the connection strengths on every iteration. The conjugate gradient descent of each presented training pattern was calculated to identify the minima on the error surface for each training pattern. xperiments were performed by using one and two hidden layers and the results revealed that as the number of hidden layers is increased, a lower final mean square error is achieved in large number of epochsand the performance of the neural network was observed to be more accurate.

  15. Massive hidden photons as lukewarm dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Postma, Marieke [Nationaal Inst. voor Kernfysica en Hoge-Energiefysica (NIKHEF), Amsterdam (Netherlands)

    2008-11-15

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  16. Massive hidden photons as lukewarm dark matter

    CERN Document Server

    Postma, Marieke

    2008-01-01

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative.

  17. Uncovering Research Topics of Academic Communities of Scientific Collaboration Network

    OpenAIRE

    Hongqi Han; Shuo Xu; Jie Gui; Xiaodong Qiao; Lijun Zhu; Han Zhang

    2014-01-01

    In order to improve the quality of applications, such as recommendation or retrieval in knowledge-based service system, it is very helpful to uncover research topics of academic communities in scientific collaboration network (SCN). Previous research mainly focuses on network characteristics measurement and community evolution, but it remains largely understudied on how to uncover research topics of each community. This paper proposes a nonjoint approach, consisting of three simple steps: (1)...

  18. Hidden treasures - 50 km points of interests

    Science.gov (United States)

    Lommi, Matias; Kortelainen, Jaana

    2015-04-01

    Tampere is third largest city in Finland and a regional centre. During 70's there occurred several communal mergers. Nowadays this local area has both strong and diversed identity - from wilderness and agricultural fields to high density city living. Outside the city center there are interesting geological points unknown for modern city settlers. There is even a local proverb, "Go abroad to Teisko!". That is the area the Hidden Treasures -student project is focused on. Our school Tammerkoski Upper Secondary School (or Gymnasium) has emphasis on visual arts. We are going to offer our art students scientific and artistic experiences and knowledge about the hidden treasures of Teisko area and involve the Teisko inhabitants into this project. Hidden treasures - Precambrian subduction zone and a volcanism belt with dense bed of gold (Au) and arsenic (As), operating goldmines and quarries of minerals and metamorphic slates. - North of subduction zone a homogenic precambrian magmastone area with quarries, products known as Kuru Grey. - Former ashores of post-glasial Lake Näsijärvi and it's sediments enabled the developing agriculture and sustained settlement. Nowadays these ashores have both scenery and biodiversity values. - Old cattle sheds and dairy buildings made of local granite stones related to cultural stonebuilding inheritance. - Local active community of Kapee, about 100 inhabitants. Students will discover information of these "hidden" phenomena, and rendering this information trough Enviromental Art Method. Final form of this project will be published in several artistic and informative geocaches. These caches are achieved by a GPS-based special Hidden Treasures Cycling Route and by a website guiding people to find these hidden points of interests.

  19. Towards gauge unified, supersymmetric hidden strong dynamics

    OpenAIRE

    Chiang, Cheng-Wei; Sun, Sichun; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also f...

  20. Atlas of solar hidden photon emission

    OpenAIRE

    Redondo, Javier(Arnold Sommerfeld Center, Ludwig-Maximilians-University, Theresienstr. 37, 80333 München, Germany)

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provi...

  1. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  2. Hidden SU(N) Glueball Dark Matter

    OpenAIRE

    Soni, Amarjit; Zhang, Yue(Walter Burke Institute for Theoretical Physics, California Institute of Technology, Pasadena, CA, 91125, U.S.A.)

    2016-01-01

    We investigate the possibility that the dark matter candidate is from a pure non-Abelian gauge theory of the hidden sector, motivated in large part by its elegance and simplicity. The dark matter is the lightest bound state made of the confined gauge fields, the hidden glueball. We point out that this simple setup is capable of providing rich and novel phenomena in the dark sector, especially in the parameter space of large N. They include self-interacting and warm dark matter scenarios, Bose...

  3. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...... networks...

  4. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  5. Macroscopic model for biological fixation and its uncover-ing idea in Chinese Mongolian traditional osteopathy

    Institute of Scientific and Technical Information of China (English)

    ZHAO Namula; LI Xue-en; WANG Mei; HU Da-lai

    2009-01-01

    Splintage external fixation in Chinese Mongolian oste-opathy is a biological macroscopic model. In this model, the ideas of self-life "unity of mind and body" and vital natural "correspondence of nature and human" combine the physi-ological and psychological self-fixation with supplementary external fixation of fracture using small splints. This model implies macroscopic ideas of uncovering fixation and healing: structural stability integrating geometrical "dy-namic" stability with mechanical "dynamic" equilibrium and the stability of state integrating statics with dynamics, and osteoblasts with osteoclasts, and psychological stability in-tegrating closed and open systems of human and nature. These ideas indicate a trend of development in modem osteopathy.

  6. Geophysical Investigations at Hidden Dam, Raymond, California Flow Simulations

    Science.gov (United States)

    Minsley, Burke J.; Ikard, Scott

    2010-01-01

    Numerical flow modeling and analysis of observation-well data at Hidden Dam are carried out to supplement recent geophysical field investigations at the site (Minsley and others, 2010). This work also is complementary to earlier seepage-related studies at Hidden Dam documented by Cedergren (1980a, b). Known seepage areas on the northwest right abutment area of the downstream side of the dam was documented by Cedergren (1980a, b). Subsequent to the 1980 seepage study, a drainage blanket with a sub-drain system was installed to mitigate downstream seepage. Flow net analysis provided by Cedergren (1980a, b) suggests that the primary seepage mechanism involves flow through the dam foundation due to normal reservoir pool elevations, which results in upflow that intersects the ground surface in several areas on the downstream side of the dam. In addition to the reservoir pool elevations and downstream surface topography, flow is also controlled by the existing foundation geology as well as the presence or absence of a horizontal drain in the downstream portion of the dam. The current modeling study is aimed at quantifying how variability in dam and foundation hydrologic properties influences seepage as a function of reservoir stage. Flow modeling is implemented using the COMSOL Multiphysics software package, which solves the partially saturated flow equations in a two-dimensional (2D) cross-section of Hidden Dam that also incorporates true downstream topography. Use of the COMSOL software package provides a more quantitative approach than the flow net analysis by Cedergren (1980a, b), and allows for rapid evaluation of the influence of various parameters such as reservoir level, dam structure and geometry, and hydrogeologic properties of the dam and foundation materials. Historical observation-well data are used to help validate the flow simulations by comparing observed and predicted water levels for a range of reservoir elevations. The flow models are guided by, and

  7. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    Peres, Yuval; Quas, Anthony

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  8. The Corporate Illiterates: The Hidden Illiterates of Silicon Valley.

    Science.gov (United States)

    Chase, Sharon

    1991-01-01

    Describes the writing and business communication problems of college-educated workers in Silicon Valley. Discusses hidden illiterates in the universities and in the workplace. Offers solutions for professors and managers faced with the problem of hidden illiterates. (PRA)

  9. Analysis of the Effect of the Hidden Curriculum in Moral Education on College Students'Core Values%探析高校隐性德育课程对大学生核心价值观的影响

    Institute of Scientific and Technical Information of China (English)

    何斌

    2014-01-01

    高校隐性德育课程中的隐性物质文化、精神文化、制度文化、网络文化,对于当代中国大学生核心价值观的形成发展有着潜移默化的影响作用,需要我们重视隐性德育课程的建设,深化高校思想政治理论课程改革。%Moral education hidden curriculum in colleges and universities recessive material culture ,spiritual culture ,system cul-ture ,network culture ,have great effect on the formation and development of college students'core values in China ,we need to pay attention to the construction of hidden curriculum in moral education ,deepening the reform of ideological and political theo-ry course in colleges and universities.

  10. Losartan ameliorates dystrophic epidermolysis bullosa and uncovers new disease mechanisms.

    Science.gov (United States)

    Nyström, Alexander; Thriene, Kerstin; Mittapalli, Venugopal; Kern, Johannes S; Kiritsi, Dimitra; Dengjel, Jörn; Bruckner-Tuderman, Leena

    2015-07-20

    Genetic loss of collagen VII causes recessive dystrophic epidermolysis bullosa (RDEB)-a severe skin fragility disorder associated with lifelong blistering and disabling progressive soft tissue fibrosis. Causative therapies for this complex disorder face major hurdles, and clinical implementation remains elusive. Here, we report an alternative evidence-based approach to ameliorate fibrosis and relieve symptoms in RDEB. Based on the findings that TGF-β activity is elevated in injured RDEB skin, we targeted TGF-β activity with losartan in a preclinical setting. Long-term treatment of RDEB mice efficiently reduced TGF-β signaling in chronically injured forepaws and halted fibrosis and subsequent fusion of the digits. In addition, proteomics analysis of losartan- vs. vehicle-treated RDEB skin uncovered changes in multiple proteins related to tissue inflammation. In line with this, losartan reduced inflammation and diminished TNF-α and IL-6 expression in injured forepaws. Collectively, the data argue that RDEB fibrosis is a consequence of a cascade encompassing tissue damage, TGF-β-mediated inflammation, and matrix remodeling. Inhibition of TGF-β activity limits these unwanted outcomes and thereby substantially ameliorates long-term symptoms.

  11. Urban association rules: uncovering linked trips for shopping behavior

    CERN Document Server

    Yoshimura, Yuji; Hobin, Juan N Bautista; Ratti, Carlo; Blat, Josep

    2016-01-01

    In this article, we introduce the method of urban association rules and its uses for extracting frequently appearing combinations of stores that are visited together to characterize shoppers' behaviors. The Apriori algorithm is used to extract the association rules (i.e., if -> result) from customer transaction datasets in a market-basket analysis. An application to our large-scale and anonymized bank card transaction dataset enables us to output linked trips for shopping all over the city: the method enables us to predict the other shops most likely to be visited by a customer given a particular shop that was already visited as an input. In addition, our methodology can consider all transaction activities conducted by customers for a whole city in addition to the location of stores dispersed in the city. This approach enables us to uncover not only simple linked trips such as transition movements between stores but also the edge weight for each linked trip in the specific district. Thus, the proposed methodo...

  12. Hidden Markov modelling of movement data from fish

    DEFF Research Database (Denmark)

    Pedersen, Martin Wæver

    and application of hidden Markov models (HMMs) for analysis of movement data from sh. The main contributions are represented by six scientific publications. Estimation of animal location from uncertain and possibly indirect observations is the starting point of most movement data analyses. In this work a discrete...... approximated. This furthermore enables accurate probability densities of location to be computed. Finally, the performance of the HMM approach in analysing nonlinear state space models is compared with two alternatives: the AD Model Builder framework and BUGS, which relies on Markov chain Monte Carlo...

  13. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp;

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference....... Defining HMMs with side-constraints in Constraint Logic Programming has advantages in terms of more compact expression and pruning opportunities during inference. We present a PRISM-based framework for extending HMMs with side-constraints and show how well-known constraints such as cardinality and all...

  14. AdS/QCD approach to the scale invariant extension of the standard model with a strongly interacting hidden sector

    OpenAIRE

    Hatanaka, Hisaki(School of Physics, Korea Institute for Advanced Study, Seoul 130-722, Republic of Korea); Jung, Dong-Won; Ko, Pyungwon

    2016-01-01

    In this paper, we revisit a scale-invariant extension of the standard model (SM) with a strongly interacting hidden sector within AdS/QCD approach. Using the AdS/QCD, we reduce the number of input parameters to three, i.e. hidden pion decay constant, hidden pion mass and $\\tan\\beta$ that is defined as the ratio of the vacuum expectation values (VEV) of the singlet scalar field and the SM Higgs boson. As a result, our model has sharp predictability. We perform the phenomenological analysis of ...

  15. 人工关节置换术隐性失血量及其相关因素分析%Hidden blood loss after artificial joint replacement and its correlation analysis

    Institute of Scientific and Technical Information of China (English)

    李洪飞; 吕德成; 张卫国; 张羽飞

    2011-01-01

    Objective To calculate the volume and to study the correlated risk factors of hidden blood loss after artificial hip or knee joint replacement. Methods From July to November in 2008, 38patients with age of (65.11±13.51) years old were treated with artificial hip or knee joint replacement, and were divided by age into four groups. Using Gross formula, total blood loss was calculated depending on height, weight and pre- and post-operation hematocrit, and the hidden blood loss was acquired by subtracting the visible blood loss from the total blood loss. The correlation between age,body mass index( BMI),gender and hidden blood blood loss was observed. Differences of hidden blood loss of artificial hip or knee joint replacement were compared. Results The total blood loss of all arthroplasties was ( 1563.52 ± 693.10) ml,and the hidden blood loss was (538.70 ± 529.77) ml,the percentage of hidden blood loss was 33%. The hidden blood loss was inversely related to age (P< 0.05 ). There was no correlation between BMI and hidden blood loss (P>0.05). The percentage of hidden blood loss in total blood loss in woman was significantly higher than that in man. With age and gender paired, the percentage of hidden blood loss in total blood loss in artificial hip joint replacement was significantly higher than that in artificial knee joint replacement (P<0.05 ). Conclusions Both of age and gender are risk factors influencing hidden blood loss after artificial hip or knee joint replacement. And compared with artificial knee joint replacement, the percentage of hidden blood loss in artificial hip joint replacement is higher.%目的 通过计算人工髋关节置换术和人工膝关节置换术隐性失血量,分析其相关的危险因素,并探讨其发生机制.方法 2008年7-11月行人工关节置换术38例,年龄(65.11±13.51)岁,其中人工髋关节置换术25例,人工膝关节置换术13例.根据身高、体质指数和手术前后的红细胞压积计算总失血

  16. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements incr

  17. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  18. Discovering Hidden Treasures with GPS Technology

    Science.gov (United States)

    Nagel, Paul; Palmer, Roger

    2014-01-01

    "I found it!" Addison proudly proclaimed, as she used an iPhone and Global Positioning System (GPS) software to find the hidden geocache along the riverbank. Others in Lisa Bostick's fourth grade class were jealous, but there would be other geocaches to find. With the excitement of movies like "Pirates of the Caribbean"…

  19. Hidden Transcripts of Flight Attendant Resistance.

    Science.gov (United States)

    Murphy, Alexandra G.

    1998-01-01

    Analyzes (using flight attendants) hidden transcripts--interactions, stories, myths, and rituals in which employees participate beyond direct observation--to provide an avenue to identify resistance and change in the organizing process. Challenges the outdated ideal of transmissional meaning, questions organizational power by including the…

  20. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves;

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover com...

  1. Variational Hidden Conditional Random Fields with Coupled Dirichlet Process Mixtures

    NARCIS (Netherlands)

    Bousmalis, K.; Zafeiriou, S.; Morency, L.P.; Pantic, M.; Ghahramani, Z.

    2013-01-01

    Hidden Conditional Random Fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An infinite HCRF is an HCRF with a countably infinite number of hidden states, which rids us not only of the necessit

  2. Analysing drivers of and barriers to the sustainable development: hidden economy and hidden migration

    OpenAIRE

    Albu, Lucian-Liviu; Ion GHIZDEANU; Iorgulescu, Raluca

    2011-01-01

    The actual global crisis seems to influence negatively the sustainable development in EU countries. At least partially the informal economy escapes from the official registered GDP and hidden migration from the official demographic statistics. This can affect in a significant way the measurement of sustainable development and consequently policies in this field. Coming from general accepted findings of the theory, we concentrate on evaluating the reasons of agents to be involved in hidden eco...

  3. Hidden with Sufficient Reason: A Cumulative Case against J. L. Schellenberg s Hiddenness of God Argument

    OpenAIRE

    Ottosen, Espen

    2015-01-01

    J. L. Schellenberg argues in the book Divine Hiddenness and Human Reason that the apparent hiddenness of God is—in itself—an atheistic argument. His argument takes as the starting premise: If a perfectly loving God exists, reasonable nonbelief does not occur. Then he tries to show that reasonable nonbelief does occur. Thus, the conclusion is that he has an argument of considerable force from the reasonableness of nonbelief to the nonexistence of God. I find that the argument of Schellenbe...

  4. Hidden Conformal Symmetry of the Warped AdS_3 Black Holes

    CERN Document Server

    Fareghbal, Reza

    2010-01-01

    We show that for a certain low frequency limit the wave equation of a generic massive scalar field in the background of the spacelike warped AdS_3 black hole can be written as the Casimir of an SL(2,R) symmetry. Two sets of SL(2,R) generators are found which uncover the hidden SL(2,R)\\times SL(2,R) symmetry of the solution. This symmetry is only locally defined and is spontaneously broken to U(1)\\times U(1) by a periodic identification of the \\phi coordinate. By using the generator of the identification we read the left and right temperatures (T_L,T_R) of the proposed dual conformal field theory which are in complete agreement with the WAdS/CFT conjecture. Moreover, under the above condition of the scalar wave frequency, absorption cross section of the scalar field is consistent with the two-point function of the dual CFT.

  5. Nontargeted Analysis Using Ultraperformance Liquid Chromatography-Quadrupole Time-of-Flight Mass Spectrometry Uncovers the Effects of Harvest Season on the Metabolites and Taste Quality of Tea (Camellia sinensis L.).

    Science.gov (United States)

    Dai, Weidong; Qi, Dandan; Yang, Ting; Lv, Haipeng; Guo, Li; Zhang, Yue; Zhu, Yin; Peng, Qunhua; Xie, Dongchao; Tan, Junfeng; Lin, Zhi

    2015-11-11

    The chemical composition and taste quality of tea fluctuate seasonally. However, the compounds responsible for the seasonal variation of metabolic pattern and taste quality are far from clear. This study compared the metabolite profiles of green teas of nine varieties that were plucked in spring, summer, and autumn by using ultraperformance liquid chromatography-quadrupole time-of-flight mass spectrometry (UPLC-Q-TOF/MS) on a reversed phase column. A multivariate analysis indicated distinct differences among the metabolite phenotypes of teas harvested in different seasons. Heat-map analysis and metabolic pathway analysis demonstrated that flavan-3-ols, theasinensins, procyanidins, quercetin-O-glycosides, apigenin-C-glycosides, and amino acids exhibited sharp seasonal fluctuations. An equivalent quantification of tea tastes showed that in summer and autumn teas, the bitterness and astringency were significantly elevated, whereas umami declined. Metabolite content comparisons and partial least-squares analysis suggested that several flavonoids and amino acids are mainly responsible for the seasonal variations in taste quality. PMID:26494158

  6. Uncovering Multiple Populations in Globular Clusters with Washington Photometry

    Science.gov (United States)

    Geisler, Douglas; Cummings, Jeff; Villanova, Sandro; Carraro, Giovanni

    2015-01-01

    Globular Clusters (GCs), long considered as ideal Simple Stellar Populations, are now known to harbor a wide variety of chemical inhomogeneities. Multiple populations (MP) are being found in a growing number of Galactic globular clusters (GCs) via both photometric and spectroscopic techniques. Indeed, it has been suggested that a GC is an object that possesses MP. A definitive investigation of MP in GCs will undoubtedly provide a profound improvement in our understanding of their formation and evolution.However, most studies employ either high resolution VLT spectroscopy, HST photometry or inefficient filters from the ground. A ground-based photometric system which is both efficient and effective would be especially excellent for uncovering MP. We demonstrate that the Washington system meets these goals. The Washington C filter, in addition to being specifically designed for the purpose of detecting MPs, is both much broader and redder than competing UV filters, making it far more efficient at detecting MPs and much less sensitive to reddening and extinction.Our analysis of the well-studied GC NGC 1851 shows indeed that the C filter is both very efficient and effective at detecting its previously discovered MPs in the RGB and SGB, using relatively little telescope time on only a 1-meter telescope. Remarkably, we have also detected an intrinsically broad MS best characterized by two distinct but heavily overlapping populations that cannot be explained by binaries, field stars, or photometric errors. Detailed analysis shows that the MS distribution is in very good agreement with that seen on the RGB. This is the first time MPs in a MS have been discovered from the ground, and just as strikingly, using only a 1-meter telescope. The Washington system thus proves to be a very powerful tool for investigating MPs, and holds particular promise for extragalactic objects where photons are limited.

  7. Testing string vacua in the lab. From a hidden CMB to dark forces in flux compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Cicoli, Michele; Goodsell, Mark; Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Hamburg (Germany). Theory Group; Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenolgy

    2011-03-15

    We perform a detailed analysis of the phenomenological properties of hidden Abelian gauge bosons with a kinetic mixing with the ordinary photon within type IIB flux compactifications. We study the interplay between moduli stabilisation and the Green-Schwarz mechanism that gives mass to the hidden photon paying particular attention to the role of D-terms. We present two generic classes of explicit Calabi-Yau examples with an isotropic and an anisotropic shape of the extra dimensions showing how the last case turns out to be very promising to make contact with current experiments. In fact, anisotropic compactifications lead naturally to a GeV-scale hidden photon (''dark forces'' that can be searched for in beam dump experiments) for an intermediate string scale; or even to an meV-scale hidden photon (which could lead to a ''hidden CMB'' and can be tested by light-shining-through-a-wall experiments) in the case of TeV-scale strings. (orig.)

  8. Testing String Vacua in the Lab: From a Hidden CMB to Dark Forces in Flux Compactifications

    CERN Document Server

    Cicoli, Michele; Jaeckel, Joerg; Ringwald, Andreas

    2011-01-01

    We perform a detailed analysis of the phenomenological properties of hidden Abelian gauge bosons with a kinetic mixing with the ordinary photon within type IIB flux compactifications. We study the interplay between moduli stabilisation and the Green-Schwarz mechanism that gives mass to the hidden photon paying particular attention to the role of D-terms. We present two generic classes of explicit Calabi-Yau examples with an isotropic and an anisotropic shape of the extra dimensions showing how the last case turns out to be very promising to make contact with current experiments. In fact, anisotropic compactifications lead naturally to a GeV-scale hidden photon ("dark forces" that can be searched for in beam dump experiments) for an intermediate string scale; or even to an meV-scale hidden photon (which could lead to a "hidden CMB" and can be tested by light-shining-through-a-wall experiments) in the case of TeV-scale strings.

  9. Thermal Behavior of a Single Spent Fuel in Water Pool Storage Under Partially Uncovered Condition

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Woo Ram; Park, Hee Sung; Song, Sub Lee; Lee, Jae Young [Handong Global Univ, Pohang (Korea, Republic of)

    2015-10-15

    LOCA in SFP can be led by a partial drain-down or a boil off scenario. In order to predict the response and consequence in such case, exact model on the partially uncovered SFP has to be established. Most studies on accidents in SFP have been done by safety analysis codes such as ATHLET-CD, ASTEC, MAAP, and MELCOR. However, an experimental investigation has not been conducted so far. Schultz et al.(2014) studied experimentally the response of air cooled BWR fuel assembly which is blocked at lower side fluid path. In this study, we experimentally investigated the thermal response of a partially uncovered single nuclear fuel rod (SNFR) in the SFP. The SNFR was 1/4 scaled down in axial length. 1-dimensional numerical analysis model was developed and compared with the result of experiment. An experimental study was conducted for obtaining transient temperature profile data of a modeled single nuclear fuel rod in heating condition under partially uncovered condition. Numerical prediction model was developed also and the prediction result was compared with the experimental result.

  10. Endoscopic management of occluded biliary uncovered metal stents:A multicenter experience

    Institute of Scientific and Technical Information of China (English)

    Panagiotis Katsinelos; Kostas Fasoulas; Stefanos Atmatzidis; Christos Zavos; Jannis Kountouras; Athanasios Beltsis; Grigoris Chatzimavroudis; Dimitris Paikos; George Paroutoglou; Dimitris Kapetanos; Sotiris Terzoudis; Georgia Lazaraki; Ioannis Pilpilidis

    2011-01-01

    AIM:To compare diverse endoscopic interventions in the management of occluded uncovered self-expanding metal stents(SEMSs)that had been placed for palliative treatment of unresectable malignant biliary obstruction.METHODS:A retrospective review was undertaken in 4 tertiary endoscopic centers to determine optimal management of different types of occluded SEMSs.The technical success of performed treatment in occluded SEMSs,the patency of the stent,the need for re-intervention and the financial costs of each treatment were analyzed.RESULTS:Fifty four patients were included in the analysis;21 received Hanaro,19 Wallstent and 14 Flexus.For the relief of obstruction,a plastic stent was inserted in 24 patients,a second SEMS in 25 and mechanical cleaning was performed in 5 patients.The overall median second patency rates between second SEMSs and plastic stents did not differ(133 d for SEMSs vs 106 d for plastic stents;P = 0.856).Similarly,no difference was found between the overall survival of SEMS and plastic stent groups,and no procedure-related complications occurred.Incremental cost analysis showed that successive plastic stenting was a cost-saving strategy at least in Greece.CONCLUSION:Insertion of uncovered SEMSs or plastic stents is a safe and effective treatment for occluded uncovered SEMSs;insertion of plastic stents appears to be the most cost-effective strategy.

  11. Uncovering Curriculum: Language performance through culture by design

    Directory of Open Access Journals (Sweden)

    Jennifer Eddy

    2015-01-01

    Full Text Available This article discusses a model curriculum design framework designed to both uncover and integrate culture perspectives and performance assessment throughout the span of an articulated language program. For two years, the NALRC has hosted a leadership institute on curriculum design. This curricular framework aligns the three stages of Understanding by Design with the World Readiness (National standards. Uncovering Content: Assessment Design Aligning Performance and Transfer, facilitates design of performance based assessments derived from cultural perspectives and big ideas essential to understanding the culture or cultures. The framework can be used to design one course or an entire articulated program of study, minor, or major for any language. The framework enables continuity of recurring ideas, perspectives, and issues from beginning to end of a program. Students leave the program with key understandings, a core cadre of tasks that uncover these, and questions they will continue to unpack over time as they become self-directed learners.

  12. A Systems Biology-Based Approach to Uncovering the Molecular Mechanisms Underlying the Effects of Dragon's Blood Tablet in Colitis, Involving the Integration of Chemical Analysis, ADME Prediction, and Network Pharmacology

    OpenAIRE

    Haiyu Xu; Yanqiong Zhang; Yun Lei; Xiumei Gao; Huaqiang Zhai; Na Lin; Shihuan Tang; Rixin Liang; Yan Ma; Defeng Li; Yi Zhang; Guangrong Zhu; Hongjun Yang; Luqi Huang

    2014-01-01

    Traditional Chinese medicine (TCM) is one of the oldest East Asian medical systems. The present study adopted a systems biology-based approach to provide new insights relating to the active constituents and molecular mechanisms underlying the effects of dragon's blood (DB) tablets for the treatment of colitis. This study integrated chemical analysis, prediction of absorption, distribution, metabolism, and excretion (ADME), and network pharmacology. Firstly, a rapid, reliable, and accurate ult...

  13. Acousto-optical detection of hidden objects via speckle based imaging.

    Science.gov (United States)

    Lev, Aner; Sfez, Bruno

    2015-10-01

    Optical detection of objects hidden behind opaque screening layers is a challenging problem. We demonstrate an optically detected echographic-like method that combines collimated acoustic and laser beams. The acoustic waves cross the screening layers, and their back-reflection from the hidden objects is detected through the analysis of a dynamic laser speckle pattern created at the outer surface of the screening layer. Real-time remote detection of moving targets 15 meters away, with a few mm resolution is demonstrated using a very sensitive camera detection scheme. PMID:26480159

  14. Risk Assessment of Power System Catastrophic Failures and Hidden Failure Monitoring & Control System

    OpenAIRE

    Qiu, Qun

    2003-01-01

    One of the objectives of this study is to develop a methodology, together with a set of software programs that evaluate, in a power system, the risks of catastrophic failures caused by hidden failures in the hardware or software components of the protection system. The disturbance propagation mechanism is revealed by the analysis of the 1977 New York Blackout. The step-by-step process of estimating the relay hidden failure probability is presented. A Dynamic Event Tree for the risk-based ana...

  15. Extraction of Hidden Social Networks from Wiki-Environment Involved in Information Conflict

    Directory of Open Access Journals (Sweden)

    Rasim M. Alguliyev

    2016-03-01

    Full Text Available Social network analysis is a widely used technique to analyze relationships among wiki-users in Wikipedia. In this paper the method to identify hidden social networks participating in information conflicts in wiki-environment is proposed. In particular, we describe how text clustering techniques can be used for extraction of hidden social networks of wiki-users caused information conflict. By clustering unstructured text articles caused information conflict we create social network of wiki-users. For clustering of the conflict articles a hybrid weighted fuzzy-c-means method is proposed.

  16. … To be hidden does not mean to be merely revealed – Part 2

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-12-01

    Full Text Available This text revisits the long-term project Hidden Curriculum (HC, initiated by Annette Krauss, that addresses unquestioned routines, hierarchies of knowledge and the role of the body in learning processes from the perspective of secondary/high school education (in the research on a hidden curriculum. The first part of this text (www.medienimpulse.at/articles/view/848 entailed a deeper analysis of educational studies on the phenomenon of hidden curriculum in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire and Jacques Rancière. The aim of the second part is to address academic canons and corporeality within educational settings and to investigate the physicality of everyday norms through revisiting the framework, results and processes of the collaborative research of the HC project with secondary/high school students.

  17. Uncovering ecosystem service bundles through social preferences.

    Directory of Open Access Journals (Sweden)

    Berta Martín-López

    Full Text Available Ecosystem service assessments have increasingly been used to support environmental management policies, mainly based on biophysical and economic indicators. However, few studies have coped with the social-cultural dimension of ecosystem services, despite being considered a research priority. We examined how ecosystem service bundles and trade-offs emerge from diverging social preferences toward ecosystem services delivered by various types of ecosystems in Spain. We conducted 3,379 direct face-to-face questionnaires in eight different case study sites from 2007 to 2011. Overall, 90.5% of the sampled population recognized the ecosystem's capacity to deliver services. Formal studies, environmental behavior, and gender variables influenced the probability of people recognizing the ecosystem's capacity to provide services. The ecosystem services most frequently perceived by people were regulating services; of those, air purification held the greatest importance. However, statistical analysis showed that socio-cultural factors and the conservation management strategy of ecosystems (i.e., National Park, Natural Park, or a non-protected area have an effect on social preferences toward ecosystem services. Ecosystem service trade-offs and bundles were identified by analyzing social preferences through multivariate analysis (redundancy analysis and hierarchical cluster analysis. We found a clear trade-off among provisioning services (and recreational hunting versus regulating services and almost all cultural services. We identified three ecosystem service bundles associated with the conservation management strategy and the rural-urban gradient. We conclude that socio-cultural preferences toward ecosystem services can serve as a tool to identify relevant services for people, the factors underlying these social preferences, and emerging ecosystem service bundles and trade-offs.

  18. Uncovering the Costs of the Iraq War

    OpenAIRE

    Fred E. Foldvary

    2008-01-01

    Fred Foldvary reviews the recent book by Joseph Stiglitz and Linda Bilmes, The Three Trillion Dollar War: The True Cost of the Iraq Conflict. Foldvary commends the book for its assembly of both the budgeted and implicit costs of the war, and its analysis of the economic impact of the war. The review posits that the better knowledge and accounting of the war costs as provided by this work will aid in establishing a more coherent dialog on policy for dealing with this and future conflicts abroad.

  19. Hidden SU (N ) glueball dark matter

    Science.gov (United States)

    Soni, Amarjit; Zhang, Yue

    2016-06-01

    We investigate the possibility that the dark matter candidate is from a pure non-Abelian gauge theory of the hidden sector, motivated in large part by its elegance and simplicity. The dark matter is the lightest bound state made of the confined gauge fields, the hidden glueball. We point out that this simple setup is capable of providing rich and novel phenomena in the dark sector, especially in the parameter space of large N . They include self-interacting and warm dark matter scenarios, Bose-Einstein condensation leading to massive dark stars possibly millions of times heavier than our sun giving rise to gravitational lensing effects, and indirect detections through higher dimensional operators as well as interesting collider signatures.

  20. Hidden SU(N) Glueball Dark Matter

    CERN Document Server

    Soni, Amarjit

    2016-01-01

    We investigate the possibility that the dark matter candidate is from a pure non-abelian gauge theory of the hidden sector, motivated in large part by its simplicity. The dark matter is the lightest bound state made of the confined gauge fields, the hidden glueball. We point out this simple setup is capable of providing rich and novel phenomena in the dark sector, especially in the parameter space of large N. They include self-interacting and warm dark matter scenarios, Bose-Einstein condensation leading to massive dark stars possibly much heavier than our sun leading to gravitational lensing effects, and indirect detections through higher dimensional operators as well as interesting collider signatures.

  1. Hidden penis release: adjunctive suprapubic lipectomy.

    Science.gov (United States)

    Horton, C E; Vorstman, B; Teasley, D; Winslow, B

    1987-08-01

    We believe the hidden penis may be caused and concealed by a prominent suprapubic fat pad in addition to the restrictive fibrous bands of the dartos fascia fixing the shaft of the penis proximally while loose skin folds prolapse distally over the phallus. A penis of inadequate length or appearance may affect body image. Patients with this problem often require psychological support. Hidden penis may be distinguished from micropenis by palpating adequate corpora and showing a stretched penile length within 2 SD of normal. Excision of suprapubic fat with sectioning of the tethering dartos bands will release and increase the length of the penis. Suprapubic fat pad resection may also be helpful to elongate a short penis in cases of adult microphallus, or after partial penectomy because of trauma or cancer. Circumcision is contraindicated.

  2. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  3. Laser experiments explore the hidden sector

    CERN Document Server

    Ahlers, M; Jaeckel, J; Redondo, J; Ringwald, A

    2007-01-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses <~0.05 eV, the charge is now restricted to be less than (3-4)x10^(-7) times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background.

  4. Hidden Momentum in a moving Capacitor

    CERN Document Server

    Asti, Giovanni

    2015-01-01

    A very simple system like a parallel-plate capacitor reveals striking features when we examine the peculiar phenomena appearing when it is moving at low speed in different directions. Both hidden momentum and hidden energy appear and their addition, with their sign, to the corresponding electromagnetic component results in the expected ordinary kinetic momentum or energy of the electrostatic mass equivalent. What's happening is that passing from one inertial reference frame to another, part of the energy or momentum is transferred from the electromagnetic component to the material part of the system or the other way around. A paradoxical self-accelerating behavior is evidenced if one admits that the capacitor is discharging through an electrical resistance during its motion. It is shown that one must take into account the mass of the produced heat.

  5. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  6. Detecting Hidden Diversification Shifts in Models of Trait-Dependent Speciation and Extinction.

    Science.gov (United States)

    Beaulieu, Jeremy M; O'Meara, Brian C

    2016-07-01

    The distribution of diversity can vary considerably from clade to clade. Attempts to understand these patterns often employ state-dependent speciation and extinction models to determine whether the evolution of a particular novel trait has increased speciation rates and/or decreased extinction rates. It is still unclear, however, whether these models are uncovering important drivers of diversification, or whether they are simply pointing to more complex patterns involving many unmeasured and co-distributed factors. Here we describe an extension to the popular state-dependent speciation and extinction models that specifically accounts for the presence of unmeasured factors that could impact diversification rates estimated for the states of any observed trait, addressing at least one major criticism of BiSSE (Binary State Speciation and Extinction) methods. Specifically, our model, which we refer to as HiSSE (Hidden State Speciation and Extinction), assumes that related to each observed state in the model are "hidden" states that exhibit potentially distinct diversification dynamics and transition rates than the observed states in isolation. We also demonstrate how our model can be used as character-independent diversification models that allow for a complex diversification process that is independent of the evolution of a character. Under rigorous simulation tests and when applied to empirical data, we find that HiSSE performs reasonably well, and can at least detect net diversification rate differences between observed and hidden states and detect when diversification rate differences do not correlate with the observed states. We discuss the remaining issues with state-dependent speciation and extinction models in general, and the important ways in which HiSSE provides a more nuanced understanding of trait-dependent diversification. PMID:27016728

  7. Detecting Hidden Diversification Shifts in Models of Trait-Dependent Speciation and Extinction.

    Science.gov (United States)

    Beaulieu, Jeremy M; O'Meara, Brian C

    2016-07-01

    The distribution of diversity can vary considerably from clade to clade. Attempts to understand these patterns often employ state-dependent speciation and extinction models to determine whether the evolution of a particular novel trait has increased speciation rates and/or decreased extinction rates. It is still unclear, however, whether these models are uncovering important drivers of diversification, or whether they are simply pointing to more complex patterns involving many unmeasured and co-distributed factors. Here we describe an extension to the popular state-dependent speciation and extinction models that specifically accounts for the presence of unmeasured factors that could impact diversification rates estimated for the states of any observed trait, addressing at least one major criticism of BiSSE (Binary State Speciation and Extinction) methods. Specifically, our model, which we refer to as HiSSE (Hidden State Speciation and Extinction), assumes that related to each observed state in the model are "hidden" states that exhibit potentially distinct diversification dynamics and transition rates than the observed states in isolation. We also demonstrate how our model can be used as character-independent diversification models that allow for a complex diversification process that is independent of the evolution of a character. Under rigorous simulation tests and when applied to empirical data, we find that HiSSE performs reasonably well, and can at least detect net diversification rate differences between observed and hidden states and detect when diversification rate differences do not correlate with the observed states. We discuss the remaining issues with state-dependent speciation and extinction models in general, and the important ways in which HiSSE provides a more nuanced understanding of trait-dependent diversification.

  8. 隐Markov链驱动关联性和波动性的传染分析%Contagion Analysis Based on Correlations and Volatilities Driven by Hidden Markov Chain

    Institute of Scientific and Technical Information of China (English)

    欧阳红兵; 苏海军

    2012-01-01

    本文将隐Markov链对波动性和相关性的驱动分析引入DCC多元GARCH,对波动和相关分析建立起了直接的联系,进而考察次贷危机、欧洲债务危机在主要证券市场间的传染性。研究发现,高波动高相关机制为联动性提供了一种直接的表述方式,且这一机制在危机期间处于支配地位;次贷危机、欧洲债务危机具有传染性,传染期以区间的形式出现,且危机初期的市场在各机制间有较为频繁的转换,不可根据危机事件对样本进行武断地分割;同时,危机的传染在所考察的市场之间具有系统性,应对危机需要各国政策间的协调配合;另外,有证据显示美国次贷市场在2006年年中已显现出问题,有关国家贻误了深入分析和应对危机的时机。%A hidden Markov chain is introduced to drive both volatilities and correlations into dynamic conditional correlation multivariate GARCH model,which can put direct analysis to volatilities and correlations under one framework.Then the contagion resulted from American subprime mortgage crisis and European sovereign debt crisis among the major stock markets is in restigated.The findings are firstly,the regime of high volatility with high correlation,which dominates the market during crises,provides a direct way of expression to the concept of comovement.Second,the American subprime mortgage crisis and European sovereign debt crisis are contagious and emerge in the form of intervals,and show the market transfer between different regimes more frequent in the early stage of these crises.So it is arbitrary to investigate crisis contagion based on dividing sample into subsamples according to prior breakpoints.Third,it is necessary for countries to cooperate with each other because the contagion resulted from American subprime mortgage crisis and European sovereign debt crisis both are a systemic risk among the investigated markets.Finally,there is evidence that American subprime

  9. Cold dark matter from the hidden sector

    International Nuclear Information System (INIS)

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  10. Hidden Supersymmetry May Imply Duality Invariance

    CERN Document Server

    Carrasco, John Joseph M

    2013-01-01

    We provide evidence that a particular hidden supersymmetry, when combined with half-maximal deformed global supersymmetry, implies that the theory is invariant under duality rotations of the vector and spinor fields. Based on a complete 8+8 supersymmetric model constructed recently, we argue that this hidden supersymmetry happens if and only if there is a Born-Infeld dependence on the Maxwell field strength and a Volkov-Akulov dependence on the Goldstino, up to local non-linear field redefinitions. We have tested our proposal for the N=2 superfield action with manifest N=2 supersymmetry and hidden N=2 supersymmetry at the level W^{10}, the highest level of deformation known for this model. We have established that it is N=2 self-dual, although the self-duality was not required in the original construction of this model. Highlighting the utility of considering duality-conserving sources of deformation, we can verify this invariance directly in an alternate construction of this very same action.

  11. Otoendoscopic treatment of hidden lesions in otomastoiditis

    Institute of Scientific and Technical Information of China (English)

    LIU Yang; SUN Jian-jun; LIN Yong-sheng; ZHAO Dan-heng; ZHAO Jing; LEI Fei

    2010-01-01

    Background Surgical treatments for chronic suppurative and cholesteatoma otitis media have been discussed for several decades, but recurrences still occur because of the complex dissection required and hidden lesions associated with otomastoiditis. This study investigated the technology and strategy behind the use of otoendoscopic-assisted otosurgery.Methods We reported on hidden lesions in 32 ears of patients with otomastoiditis between November 2006 and January 2009. All the patients were treated with the aid of an otoendoscope. The advantages of otoendoscopy, including multi-angle light scattering, aperture illumination, and magnification of the local operative field, were utilized in otologic microsurgery, and otoendoscopic operative techniques were introduced for operative sites such as the epitympanum, aditus of the antrum, facial recess, sinus tympani and the mastoid tip.Results All patients were followed up from 3 months to 2 years after surgery. All patients recovered well within 3 months following surgery, except for one case of epithelialization of the mastoid cavity occurring 6 months after surgery for cholesteatoma on the cerebellar surface and another case with Bezold's abscess, hyperplastic granulation tissue developed at the antrum.Conclusions Otoendoscopy can overcome the technical deficiency of rectilinearity of the visual axis associated with otomicroscopic illumination, which presents a problem when dealing with otomastoiditis lesions in hidden areas. This technique allows such lesions within the complex three-dimensional structure to be visualized and cleaned. Otoendoscopy thus has significant potential for improving the quality of surgery and reducing the risk of postoperative recurrence.

  12. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  13. Metabolomic analysis using ultra-performance liquid chromatography-quadrupole-time of flight mass spectrometry (UPLC-Q-TOF MS uncovers the effects of light intensity and temperature under shading treatments on the metabolites in tea.

    Directory of Open Access Journals (Sweden)

    Qunfeng Zhang

    Full Text Available To investigate the effect of light intensity and temperature on the biosynthesis and accumulation of quality-related metabolites, field grown tea plants were shaded by Black Net and Nano-insulating Film (with additional 2-4°C cooling effect with un-shaded plants as a control. Young shoots were subjected to UPLC-Q-TOF MS followed by multivariate statistical analysis. Most flavonoid metabolites (mainly flavan-3-ols, flavonols and their glycosides decreased significantly in the shading treatments, while the contents of chlorophyll, β-carotene, neoxanthin and free amino acids, caffeine, benzoic acid derivatives and phenylpropanoids increased. Comparison between two shading treatments indicated that the lower temperature under Nano shading decreased flavonols and their glycosides but increased accumulation of flavan-3-ols and proanthocyanidins. The comparison also showed a greater effect of temperature on galloylation of catechins than light intensity. Taken together, there might be competition for substrates between the up- and down-stream branches of the phenylpropanoid/flavonoid pathway, which was influenced by light intensity and temperature.

  14. Results from the solar hidden photon search (SHIPS)

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Knabbe, Ernst-Axel; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Zaragoza Univ. (Spain). Dept. de Fisica Teorica; Max-Planck-Institut fuer Physik, Muenchen (Germany)

    2015-02-15

    We present the results of a search for transversely polarised hidden photons (HPs) with ∝3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon<->HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m{sup 2} at the 95%C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  15. Results from the Solar Hidden Photon Search (SHIPS)

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany); Knabbe, Ernst-Axel; Lindner, Axel [Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, D-22607 Hamburg (Germany); Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik (Werner-Heisenberg-Institut), Föhringer Ring 6, D-80805 München (Germany); Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, D-22607 Hamburg (Germany); Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Günter [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany)

    2015-08-07

    We present the results of a search for transversely polarised hidden photons (HPs) with ∼3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon ↔ HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m{sup 2} at the 95% C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  16. Results from the solar hidden photon search (SHIPS)

    International Nuclear Information System (INIS)

    We present the results of a search for transversely polarised hidden photons (HPs) with ∝3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon<->HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m2 at the 95%C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  17. Hidden temporal order unveiled in stock market volatility variance

    Directory of Open Access Journals (Sweden)

    Y. Shapira

    2011-06-01

    Full Text Available When analyzed by standard statistical methods, the time series of the daily return of financial indices appear to behave as Markov random series with no apparent temporal order or memory. This empirical result seems to be counter intuitive since investor are influenced by both short and long term past market behaviors. Consequently much effort has been devoted to unveil hidden temporal order in the market dynamics. Here we show that temporal order is hidden in the series of the variance of the stocks volatility. First we show that the correlation between the variances of the daily returns and means of segments of these time series is very large and thus cannot be the output of random series, unless it has some temporal order in it. Next we show that while the temporal order does not show in the series of the daily return, rather in the variation of the corresponding volatility series. More specifically, we found that the behavior of the shuffled time series is equivalent to that of a random time series, while that of the original time series have large deviations from the expected random behavior, which is the result of temporal structure. We found the same generic behavior in 10 different stock markets from 7 different countries. We also present analysis of specially constructed sequences in order to better understand the origin of the observed temporal order in the market sequences. Each sequence was constructed from segments with equal number of elements taken from algebraic distributions of three different slopes.

  18. Self-Organizing Hidden Markov Model Map (SOHMMM).

    Science.gov (United States)

    Ferles, Christos; Stafylopatis, Andreas

    2013-12-01

    A hybrid approach combining the Self-Organizing Map (SOM) and the Hidden Markov Model (HMM) is presented. The Self-Organizing Hidden Markov Model Map (SOHMMM) establishes a cross-section between the theoretic foundations and algorithmic realizations of its constituents. The respective architectures and learning methodologies are fused in an attempt to meet the increasing requirements imposed by the properties of deoxyribonucleic acid (DNA), ribonucleic acid (RNA), and protein chain molecules. The fusion and synergy of the SOM unsupervised training and the HMM dynamic programming algorithms bring forth a novel on-line gradient descent unsupervised learning algorithm, which is fully integrated into the SOHMMM. Since the SOHMMM carries out probabilistic sequence analysis with little or no prior knowledge, it can have a variety of applications in clustering, dimensionality reduction and visualization of large-scale sequence spaces, and also, in sequence discrimination, search and classification. Two series of experiments based on artificial sequence data and splice junction gene sequences demonstrate the SOHMMM's characteristics and capabilities. PMID:24001407

  19. Uncovering randomness and success in society.

    Directory of Open Access Journals (Sweden)

    Sarika Jalan

    Full Text Available An understanding of how individuals shape and impact the evolution of society is vastly limited due to the unavailability of large-scale reliable datasets that can simultaneously capture information regarding individual movements and social interactions. We believe that the popular Indian film industry, "Bollywood", can provide a social network apt for such a study. Bollywood provides massive amounts of real, unbiased data that spans more than 100 years, and hence this network has been used as a model for the present paper. The nodes which maintain a moderate degree or widely cooperate with the other nodes of the network tend to be more fit (measured as the success of the node in the industry in comparison to the other nodes. The analysis carried forth in the current work, using a conjoined framework of complex network theory and random matrix theory, aims to quantify the elements that determine the fitness of an individual node and the factors that contribute to the robustness of a network. The authors of this paper believe that the method of study used in the current paper can be extended to study various other industries and organizations.

  20. Comparative De Novo Transcriptome Analysis of Fertilized Ovules in Xanthoceras sorbifolium Uncovered a Pool of Genes Expressed Specifically or Preferentially in the Selfed Ovule That Are Potentially Involved in Late-Acting Self-Incompatibility.

    Directory of Open Access Journals (Sweden)

    Qingyuan Zhou

    Full Text Available Xanthoceras sorbifolium, a tree species endemic to northern China, has high oil content in its seeds and is recognized as an important biodiesel crop. The plant is characterized by late-acting self-incompatibility (LSI. LSI was found to occur in many angiosperm species and plays an important role in reducing inbreeding and its harmful effects, as do gametophytic self-incompatibility (GSI and sporophytic self-incompatibility (SSI. Molecular mechanisms of conventional GSI and SSI have been well characterized in several families, but no effort has been made to identify the genes involved in the LSI process. The present studies indicated that there were no significant differences in structural and histological features between the self- and cross-pollinated ovules during the early stages of ovule development until 5 days after pollination (DAP. This suggests that 5 DAP is likely to be a turning point for the development of the selfed ovules. Comparative de novo transcriptome analysis of the selfed and crossed ovules at 5 DAP identified 274 genes expressed specifically or preferentially in the selfed ovules. These genes contained a significant proportion of genes predicted to function in the biosynthesis of secondary metabolites, consistent with our histological observations in the fertilized ovules. The genes encoding signal transduction-related components, such as protein kinases and protein phosphatases, are overrepresented in the selfed ovules. X. sorbifolium selfed ovules also specifically or preferentially express many unique transcription factor (TF genes that could potentially be involved in the novel mechanisms of LSI. We also identified 42 genes significantly up-regulated in the crossed ovules compared to the selfed ovules. The expression of all 16 genes selected from the RNA-seq data was validated using PCR in the selfed and crossed ovules. This study represents the first genome-wide identification of genes expressed in the fertilized

  1. The Great 1787 Corralero, Oaxaca, Tsunami Uncovered

    Science.gov (United States)

    Ramirez-Herrera, M.; Lagos, M.; Goguitchaichrili, A.; Aguilar, B.; Machain-Castillo, M. L.; Caballero, M.; Ruíz-Fernández, A. C.; Suarez, G.; Ortuño, M.

    2013-05-01

    In 28th March 1787, more than two centuries ago, a deadly tsunami (related to the the San Sixto earthquake) poured over the coast of Oaxaca, Guerrero, and Chiapas, along more than 500 km of the Mexican Pacific coast and up to 6 km inland, the tsunami destroyed mostly farmlands, and livestock and few villages since the density of population was sparse at the time, according to known historical accounts. We report the first geological evidence from the Corralero (Alotengo) lagoon coastal area to support these historical accounts. A transect was made with coring and test pits every 100 m from the coastline and up to 1.6 km inland. The test pits showed an anomalous sand layer that had been deposited in a single event in the swales of a series of beach ridges. The anomalous layer is continuous along the transect, about a 1000 m-long, and is formed of coarse to medium sand, at about 36 to 64 cm depth. It thickness varies, averaging 28 cm in the middle of a swale. Based on the accounts of the 1787 earthquake (M 8.6) and tsunami, we deduced that this might be the evidence of its existence. As the only major tsunami described at that time, the San Sixto earthquake-triggered tsunami. We used the stratigraphy, grain size, microfossils (foraminifera and diatoms), magnetic properties such as magnetic susceptibility, remanent magnetization analyses to reveal the nature of this anomalous sand layer. These proxies support a sudden and rapid event, consisting of sands transported by an extreme sea-wave inland. Further analysis will confirm the estimated age of this event.

  2. UNCOVERING THE NUCLEUS CANDIDATE FOR NGC 253

    Energy Technology Data Exchange (ETDEWEB)

    Günthardt, G. I.; Camperi, J. A. [Observatorio Astronómico, Universidad Nacional de Córdoba (Argentina); Agüero, M. P. [Observatorio Astronómico, Universidad Nacional de Córdoba, and CONICET (Argentina); Díaz, R. J.; Gomez, P. L.; Schirmer, M. [Gemini Observatory, AURA (United States); Bosch, G., E-mail: gunth@oac.uncor.edu, E-mail: camperi@oac.uncor.edu, E-mail: mpaguero@oac.uncor.edu, E-mail: rdiaz@gemini.edu, E-mail: pgomez@gemini.edu, E-mail: mschirmer@gemini.edu, E-mail: guille@fcaglp.unlp.edu.ar [Instituto de Astrofísica de La Plata (CONICET-UNLP) (Argentina)

    2015-11-15

    NGC 253 is the nearest spiral galaxy with a nuclear starburst that becomes the best candidate for studying the relationship between starburst and active galactic nucleus activity. However, this central region is veiled by large amounts of dust, and it has been so far unclear which is the true dynamical nucleus to the point that there is no strong evidence that the galaxy harbors a supermassive black hole co-evolving with the starburst as was supposed earlier. Near-infrared (NIR) spectroscopy, especially NIR emission line analysis, could be advantageous in shedding light on the true nucleus identity. Using Flamingos-2 at Gemini South we have taken deep K-band spectra along the major axis of the central structure and through the brightest infrared source. In this work, we present evidence showing that the brightest NIR and mid-infrared source in the central region, already known as radio source TH7 and so far considered just a large stellar supercluster, in fact presents various symptoms of a genuine galactic nucleus. Therefore, it should be considered a valid nucleus candidate. Mentioning some distinctive aspects, it is the most massive compact infrared object in the central region, located at 2.″0 of the symmetry center of the galactic bar, as measured in the K-band emission. Moreover, our data indicate that this object is surrounded by a large circumnuclear stellar disk and it is also located at the rotation center of the large molecular gas disk of NGC 253. Furthermore, a kinematic residual appears in the H{sub 2} rotation curve with a sinusoidal shape consistent with an outflow centered in the candidate nucleus position. The maximum outflow velocity is located about 14 pc from TH7, which is consistent with the radius of a shell detected around the nucleus candidate, observed at 18.3 μm (Qa) and 12.8 μm ([Ne ii]) with T-ReCS. Also, the Brγ emission line profile shows a pronounced blueshift and this emission line also has the highest equivalent width at this

  3. Mind's historicity: its hidden history.

    Science.gov (United States)

    Pizarroso, Noemí

    2013-02-01

    Whereas psychological research can hardly accept the idea of a changing psychological architecture, mind's historicity seems to be commonplace among historians of psychology, at least in recent decades. Attempts to promote a convergence between psychology and history have always existed, though mainly in the margins of both disciplines. Among these attempts, there is a tradition in French psychology that remains quite marginal even to the history of the discipline and is practically unknown out of the French context. Our goal is to introduce this approach, through the work of its main architect, Ignace Meyerson, to an English speaking reader, in the light of current pleas for historicity. Developed within the core of the discipline of psychology, though in dialogue with many others disciplines, Meyerson's historical psychology appears to be more ambitious than other attempts, as it aims at studying psychological activity itself, beyond the history of its conceptualizations. It is concerned not with the analysis of fragmented, isolated, and mechanistic behaviors or cognitive process, but with the study of mind in its functioning through the multiple and changing fields of experience where human beings are involved. PMID:23394174

  4. LHC Signatures of a Minimal Supersymmetric Hidden Valley

    CERN Document Server

    Chan, Yuk Fung; Morrissey, David E; Spray, Andrew P

    2011-01-01

    We investigate the LHC signals of a minimal supersymmetric hidden valley. Our theory consists of the supersymmetric Standard Model along with a light hidden U(1)_x gauge multiplet and a pair of hidden chiral superfields that spontaneously break the new Abelian gauge symmetry near a GeV. The visible and hidden sectors interact exclusively through supersymmetric gauge kinetic mixing. We perform a thorough examination of the hidden decay cascades initiated by the lightest Standard Model superpartner and we study the range of LHC signals they can produce. In particular, we find parameter regions that give rise to missing energy, single and multiple lepton jets, and displaced vertices. Given the simplicity of the underlying theory and the broad range of collider signals it can produce, we propose that this model is a useful benchmark for LHC studies of (supersymmetric) hidden valleys.

  5. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  6. International Journal of Hidden Data Mining and Scientific Knowledge Discovery

    OpenAIRE

    Pr. Halim Sayoud

    2015-01-01

    Welcome to the first issue of the International Journal of Hidden Data Mining and Scientific Knowledge Discovery: http://scholarpage.org/journal We decided to use the following acronym HDSKD for the journal. Hidden data represents data or information that is more or less hidden, unseen or encrypted so that it becomes difficult to extract it. Scientific knowledge represents every information that comes by a scientific way, such as theories, experimental observations or scientific evidences...

  7. #A #hidden curriculum in kindergartens and empathy of preschool teachers

    OpenAIRE

    Lepičnik-Vodopivec, Jurka

    2012-01-01

    The present article illustrates the problem of a hidden curriculum in kindergartens. It is presented as an important part of the overt curriculum. The empathy of kindergarten teachers is shown within the scope of a hidden curriculum. The second part discusses the results of the research on empathy of preschool teachers as an important element of the hidden curriculum in kindergartens. Four dimensions of empathy were identified: social self-confi dence, calmness, sensitivity and non-conformism...

  8. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  9. Uncovering MIT wind myths through micro-climatological CFD analysis

    CERN Document Server

    Kalmikov, Alexander

    2013-01-01

    Popular campus myths of unusually strong pedestrian level winds are investigated with a Computational Fluid Dynamics (CFD) approach. The numerical simulations confirm the existence of the reported phenomena and provide a qualitative explanation of their physical mechanisms.

  10. 道路桥梁设计中的隐患及解决措施分析%Analysis on Hidden Troubles and Solutions in the Design of Roads and Bridges

    Institute of Scientific and Technical Information of China (English)

    石磊

    2014-01-01

    道路桥梁是人们日常生活中必备的交通基础设施,其设计的科学与否直接影响着其使用寿命、交通质量,甚至关系到人们的生命安全。本文分析了道路桥梁设计中存在的隐患问题,并探究了具体解决的策略。%Roads and Bridges are the necessary infrastructure facilities in people's Daily life, its design is scientific or not affects the quality of its service life and affects the quality of its transportation directly, even is related to people's safety. The hidden troubles in the design of roads and bridges are analyzed in this paper, and the concrete solutions are also explored.

  11. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  12. Zipf exponent of trajectory distribution in the hidden Markov model

    Science.gov (United States)

    Bochkarev, V. V.; Lerner, E. Yu

    2014-03-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.

  13. Context Tree Estimation in Variable Length Hidden Markov Models

    CERN Document Server

    Dumont, Thierry

    2011-01-01

    We address the issue of context tree estimation in variable length hidden Markov models. We propose an estimator of the context tree of the hidden Markov process which needs no prior upper bound on the depth of the context tree. We prove that the estimator is strongly consistent. This uses information-theoretic mixture inequalities in the spirit of Finesso and Lorenzo(Consistent estimation of the order for Markov and hidden Markov chains(1990)) and E.Gassiat and S.Boucheron (Optimal error exponents in hidden Markov model order estimation(2003)). We propose an algorithm to efficiently compute the estimator and provide simulation studies to support our result.

  14. Search for Hidden Sector Photons with the ADMX Detector

    International Nuclear Information System (INIS)

    Hidden U(1) gauge symmetries are common to many extensions of the standard model proposed to explain dark matter. The hidden gauge vector bosons of such extensions may mix kinetically with standard model photons, providing a means for electromagnetic power to pass through conducting barriers. The axion dark matter experiment detector was used to search for hidden vector bosons originating in an emitter cavity driven with microwave power. We exclude hidden vector bosons with kinetic couplings χ>3.48x10-8 for masses less than 3 μeV. This limit represents an improvement of more than 2 orders of magnitude in sensitivity relative to previous cavity experiments.

  15. 基于实测的采空区隐患分析及治理研究%Hidden Troubles Analysis of Mined - out Area Based on Actual Detection and Its Treatment Scheme

    Institute of Scientific and Technical Information of China (English)

    张耀平; 刘波; 龚囱

    2012-01-01

    In order to treat the hidden trouble of mined - out areas formed by illegal mining in a gold mine, the mined - out areas were detected with 3 D Laser detection system. 3 D visual model of mined - out area was established using modeling software Surpae, Such data as the volume and exposed area of the mined - out areas and the collapse of surrounding rock, etc. were determined. Based on these ,the hidden troubles of mined -out areas were analyzed. Combined with the actual conditions of the mine, a combined treatment scheme of filling and closing mined - out area was proposed. A ground pressure monitoring system was established to verify the effect of mined - out area treatment. The data of ground pressure monitoring showed that after treating the mined - out areas the displacement of rock tended to be stable, the rock stress decreased, these indicated that the desired effect of mined - out area treatment has been achieved.%为处理某金矿民采采空区的隐患,运用3D激光探测系统对采空区进行探测,结合建模软件Surpac建立三维可视化模型,得到了空区的体积、暴露面积、围岩垮塌等信息。在此基础上,对采空区隐患进行分析,结合矿山实际情况,提出充填-封闭联合治理方案。建立地压监测系统以验证空区治理效果,地压监测数据显示,空区治理后,围岩的位移趋于平稳,应力减小,表明空区的治理取得预期的效果。

  16. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  17. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  18. Hidden hybrid Markov/semi-Markov chains.

    OpenAIRE

    GUÉDON, YANN

    2005-01-01

    http://www.sciencedirect.com/science?ₒb=IssueURL&_tockey=%23TOC%235880%232005%23999509996%23596026%23FLA%23&ₐuth=y&view=c&ₐcct=C000056834&_version=1&_urlVersion=0&_userid=2292769&md5=87e7f8be94f92a8574da566c600ce631 International audience Models that combine Markovian states with implicit geometric state occupancy distributions and semi-Markovian states with explicit state occupancy distributions, are investigated. This type of model retains the flexibility of hidden semi-Markov chains ...

  19. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  20. Hidden photon CDM search at Tokyo

    CERN Document Server

    Suzuki, Jun'ya; Horie, Tomoki; Minowa, Makoto

    2015-01-01

    We report on a search for hidden photon cold dark matter (HP CDM) using a novel technique with a dish antenna. We constructed two independent apparatus: one is aiming at the detection of the HP with a mass of $\\sim\\,\\rm{eV}$ which employs optical instruments, and the other is for a mass of $\\sim5\\times10^{-5}\\, \\rm{eV}$ utilizing a commercially available parabolic antenna facing on a plane reflector. From the result of the measurements, we found no evidence for the existence of HP CDM and set upper limits on the photon-HP mixing parameter $\\chi$.

  1. Diphoton Excess as a Hidden Monopole

    CERN Document Server

    Yamada, Masaki; Yonekura, Kazuya

    2016-01-01

    We provide a theory with a monopole of a strongly-interacting hidden U(1) gauge symmetry that can explain the 750-GeV diphoton excess reported by ATLAS and CMS. The excess results from the resonance of monopole, which is produced via gluon fusion and decays into two photons. In the low energy, there are only mesons and a monopole in our model because any baryons cannot be gauge invariant in terms of strongly interacting Abelian symmetry. This is advantageous of our model because there is no unwanted relics around the BBN epoch.

  2. OFDM System Channel Estimation with Hidden Pilot

    Institute of Scientific and Technical Information of China (English)

    YANG Feng; LIN Cheng-yu; ZHANG Wen-jun

    2007-01-01

    Channel estimation using pilot is common used in OFDM system. The pilot is usually time division multiplexed with the informative sequence. One of the main drawbacks is bandwidth losing. In this paper, a new method was proposed to perform channel estimation in OFDM system. The pilot is arithmetically added to the output of OFDM modulator. Receiver uses the hidden pilot to get an accurate estimation of the channel. Then pilot is removed after channel estimation. The Cramer-Rao lower bound for this method was deprived. The performance of the algorithm is then shown. Compared with traditional methods, the proposed algorithm increases the bandwidth efficiency dramatically.

  3. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  4. Hidden symmetries in the two-dimensional isotropic antiferromagnet

    CERN Document Server

    Leonel, S A; Oliveira, W; Silva, G L; Xavier, L M V

    2013-01-01

    We discuss the two-dimensional isotropic antiferromagnet in the framework of gauge invariance. Gauge invariance is one of the most subtle useful concepts in theoretical physics, since it allows one to describe the time evolution of complex physical systesm in arbitrary sequences of reference frames. All theories of the fundamental interactions rely on gauge invariance. In Dirac's approach, the two-dimensional isotropic antiferromagnet is subject to second class constraints, which are independent of the Hamiltonian symmetries and can be used to eliminate certain canonical variables from the theory. We have used the symplectic embedding formalism developed by a few of us to make the system under study gauge-invariant. After carrying out the embedding and Dirac analysis, we systematically show how second class constraints can generate hidden symmetries. We obtain the invariant second-order Lagrangian and the gauge-invariant model Hamiltonian. Finally, for a particular choice of factor ordering, we derive the fun...

  5. Combining Wavelet Transform and Hidden Markov Models for ECG Segmentation

    Directory of Open Access Journals (Sweden)

    Jérôme Boudy

    2007-01-01

    Full Text Available This work aims at providing new insights on the electrocardiogram (ECG segmentation problem using wavelets. The wavelet transform has been originally combined with a hidden Markov models (HMMs framework in order to carry out beat segmentation and classification. A group of five continuous wavelet functions commonly used in ECG analysis has been implemented and compared using the same framework. All experiments were realized on the QT database, which is composed of a representative number of ambulatory recordings of several individuals and is supplied with manual labels made by a physician. Our main contribution relies on the consistent set of experiments performed. Moreover, the results obtained in terms of beat segmentation and premature ventricular beat (PVC detection are comparable to others works reported in the literature, independently of the type of the wavelet. Finally, through an original concept of combining two wavelet functions in the segmentation stage, we achieve our best performances.

  6. Combining Wavelet Transform and Hidden Markov Models for ECG Segmentation

    Science.gov (United States)

    Andreão, Rodrigo Varejão; Boudy, Jérôme

    2006-12-01

    This work aims at providing new insights on the electrocardiogram (ECG) segmentation problem using wavelets. The wavelet transform has been originally combined with a hidden Markov models (HMMs) framework in order to carry out beat segmentation and classification. A group of five continuous wavelet functions commonly used in ECG analysis has been implemented and compared using the same framework. All experiments were realized on the QT database, which is composed of a representative number of ambulatory recordings of several individuals and is supplied with manual labels made by a physician. Our main contribution relies on the consistent set of experiments performed. Moreover, the results obtained in terms of beat segmentation and premature ventricular beat (PVC) detection are comparable to others works reported in the literature, independently of the type of the wavelet. Finally, through an original concept of combining two wavelet functions in the segmentation stage, we achieve our best performances.

  7. Characterization of prokaryotic and eukaryotic promoters using hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Anders Gorm; Baldi, P.; Chauvin, Y.;

    1996-01-01

    that bind to them. We find that HMMs trained on such subclasses of Escherichia coli promoters (specifically, the so-called sigma 70 and sigma 54 classes) give an excellent classification of unknown promoters with respect to sigma-class. HMMs trained on eukaryotic sequences from human genes also model nicely......In this paper we utilize hidden Markov models (HMMs) and information theory to analyze prokaryotic and eukaryotic promoters. We perform this analysis with special emphasis on the fact that promoters are divided into a number of different classes, depending on which polymerase-associated factors...... all the essential well known signals, in addition to a potentially new signal upstream of the TATA-box. We furthermore employ a novel technique for automatically discovering different classes in the input data (the promoters) using a system of self-organizing parallel HMMs. These self-organizing HMMs...

  8. Hidden Stages of Cognition Revealed in Patterns of Brain Activation.

    Science.gov (United States)

    Anderson, John R; Pyke, Aryn A; Fincham, Jon M

    2016-09-01

    To advance cognitive theory, researchers must be able to parse the performance of a task into its significant mental stages. In this article, we describe a new method that uses functional MRI brain activation to identify when participants are engaged in different cognitive stages on individual trials. The method combines multivoxel pattern analysis to identify cognitive stages and hidden semi-Markov models to identify their durations. This method, applied to a problem-solving task, identified four distinct stages: encoding, planning, solving, and responding. We examined whether these stages corresponded to their ascribed functions by testing whether they are affected by appropriate factors. Planning-stage duration increased as the method for solving the problem became less obvious, whereas solving-stage duration increased as the number of calculations to produce the answer increased. Responding-stage duration increased with the difficulty of the motor actions required to produce the answer. PMID:27440808

  9. The Query Complexity of Finding a Hidden Permutation

    DEFF Research Database (Denmark)

    Afshani, Peyman; Afrawal, Manindra; Benjamin, Doerr;

    2012-01-01

    We study the query complexity of determining a hidden permutation. More specifically, we study the problem of learning a secret (z) consisting of a binary string z of length n and a permutation of [n]. The secret must be unveiled by asking queries x01n , and for each query asked, we are returned....... The deterministic query complexity is (nlogn), which, surprisingly, improves to (nloglogn) in the randomized setting. For the randomized query complexity, both the upper and lower bound are stronger than what can be achieved by standard arguments like the analysis of random queries or information......-theoretic considerations. Our proof of the (nloglogn) lower bound is based on a potential function argument, which seems to be uncommon in the query complexity literature. We find this potential function technique a very powerful tool in proving lower bounds for randomized query schemes and we expect it to find...

  10. Uncovering the systemic issues that reside in home care

    OpenAIRE

    Giannasi, Wynona

    2012-01-01

    This video clip comprises the Keynote Address: “Uncovering the systemic issues that reside in home care” held at the 21st Annual John K. Friesen Conference, "Innovations in Home Care: A Public Policy Perspective," MAY 16-17, 2012, Vancouver, BC. Presented by Wynona Giannasi, Partner, Howegroup – Public Sector Consultants, Vancouver BC. It is well known that jurisdictions with more comprehensive and integrated home care delivery systems are able to extend independent living for older p...

  11. Uncovering Student Ideas in Astronomy 45 Formative Assessment Probes

    CERN Document Server

    Keeley, Page

    2012-01-01

    What do your students know-or think they know-about what causes night and day, why days are shorter in winter, and how to tell a planet from a star? Find out with this book on astronomy, the latest in NSTA's popular Uncovering Student Ideas in Science series. The 45 astronomy probes provide situations that will pique your students' interest while helping you understand how your students think about key ideas related to the universe and how it operates.

  12. Survey of Techniques for Deep Web Source Selection and Surfacing the Hidden Web Content

    OpenAIRE

    Khushboo Khurana; M. B. Chandak

    2016-01-01

    Large and continuously growing dynamic web content has created new opportunities for large-scale data analysis in the recent years. There is huge amount of information that the traditional web crawlers cannot access, since they use link analysis technique by which only the surface web can be accessed. Traditional search engine crawlers require the web pages to be linked to other pages via hyperlinks causing large amount of web data to be hidden from the crawlers. Enormous data is available in...

  13. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  14. Quantum Hidden Subgroup Problems A Mathematical Perspective

    CERN Document Server

    Lomonaco, S J; Lomonaco, Samuel J.; Kauffman, Louis H.

    2002-01-01

    The ultimate objective of this paper is to create a stepping stone to the development of new quantum algorithms. The strategy chosen is to begin by focusing on the class of abelian quantum hidden subgroup algorithms, i.e., the class of abelian algorithms of the Shor/Simon genre. Our strategy is to make this class of algorithms as mathematically transparent as possible. By the phrase "mathematically transparent" we mean to expose, to bring to the surface, and to make explicit the concealed mathematical structures that are inherently and fundamentally a part of such algorithms. In so doing, we create symbolic abelian quantum hidden subgroup algorithms that are analogous to the those symbolic algorithms found within such software packages as Axiom, Cayley, Maple, Mathematica, and Magma. As a spin-off of this effort, we create three different generalizations of Shor's quantum factoring algorithm to free abelian groups of finite rank. We refer to these algorithms as wandering (or vintage Z_Q) Shor algorithms. They...

  15. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  16. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  17. Atlas of solar hidden photon emission

    Science.gov (United States)

    Redondo, Javier

    2015-07-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0-1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  18. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  19. Hidden percolation transition in kinetic replication process

    Science.gov (United States)

    Timonin, P. N.; Chitov, G. Y.

    2015-04-01

    The one-dimensional kinetic contact process with parallel update is introduced and studied by the mean-field approximation and Monte Carlo (MC) simulations. Contrary to a more conventional scenario with single active phase for 1d models with Ising-like variables, we find two different adjacent active phases in the parameter space of the proposed model with a second-order transition between them and a multiphase point where the active and the absorbing phases meet. While one of the active phases is quite standard with a smooth average filling of the space-time lattice, the second active phase demonstrates a very subtle (hidden) percolating order which becomes manifest only after certain transformation from the original model. We determine the percolation order parameter for active-active phase transition and discuss such hidden orders in other low-dimensional systems. Our MC data demonstrate finite-size critical and near-critical scaling of the order parameter relaxation for the two phase transitions. We find three independent critical indices for them and conclude that they both belong to the directed percolation universality class.

  20. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  1. Review on hidden trouble detection and health diagnosis of hydraulic concrete structures

    Institute of Scientific and Technical Information of China (English)

    WU; ZhongRu; LI; Ji; GU; ChongShi; SU; HuaiZhi

    2007-01-01

    A large number of hydraulic concrete structures have hidden defects such as cracks,erosion,freeze and thaw,thermal fatigue,carbonization.These hidden defects seriously affect the strength,stability and durability of structures.These problems are studied mainly by single monitoring or diagnosis methods at present.The integration of multiple monitoring and diagnosis methods is not applied widely.Besides,the analysis theory on these problems is not developed very well.The systemic study on the aging mechanism of hydraulic concrete structures,timevariation model and health diagnosis is still not enough.The support for engineering practice is limited.Aimed at these major scientific and technological problems and combined with specific projects,study on detection of hidden defects and health diagnosis of hydraulic concrete structure has been carried out.This study includes the following content: field non-destructive examination of hidden defects of hydraulic concrete structures,seepage detection,the construction of in-situ sensing system,the combination of field detection and in-situ monitoring,the mechanism of crack,freeze and thaw,erosion and carbonization of hydraulic concrete structure,mechanism of combination aging; time-variation model of hydraulic concrete structure,theories and methods for health diagnosis of hydraulic concrete structures.

  2. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    Decker, T.; Draisma, J.; Wocjan, P.

    2009-01-01

    We consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be m-variate po

  3. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  4. Hidden Neural Networks: A Framework for HMM/NN Hybrids

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric; Krogh, Anders Stærmose

    1997-01-01

    This paper presents a general framework for hybrids of hidden Markov models (HMM) and neural networks (NN). In the new framework called hidden neural networks (HNN) the usual HMM probability parameters are replaced by neural network outputs. To ensure a probabilistic interpretation the HNN...

  5. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in Seuss's…

  6. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  7. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  8. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  9. Gauge Coupling Unification with Hidden Photon, and Minicharged Dark Matter

    CERN Document Server

    Daido, Ryuji; Yokozaki, Norimi

    2016-01-01

    We show that gauge coupling unification is realized with a greater accuracy in the presence of a massless hidden photon which has a large kinetic mixing with hypercharge. We solve the renormalization group equations at two-loop level and find that the GUT unification scale is around $10^{16.5}$ GeV which sufficiently suppresses the proton decay rate, and that the unification depends only on the kinetic mixing, but not on the hidden gauge coupling nor the presence of vector-like matter fields charged under U(1)$_H$ and/or SU(5). Matter fields charged under the unbroken hidden U(1)$_H$ are stable and they contribute to dark matter. Interestingly, they become minicharged dark matter which carries a small but non-zero electric charge, if the hidden gauge coupling is tiny. The minicharged dark matter is a natural outcome of the gauge coupling unification with a hidden photon.

  10. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  11. 'Hidden poverty' of teachers: Status, consequences and overcoming strategies

    Directory of Open Access Journals (Sweden)

    Bogunović Blanka

    2008-01-01

    Full Text Available The consequences of reduced financial and other possibilities in the period of social transition are reflected on the quality of life and work of teachers, and thereby indirectly on education of pupils as well. Aims: (1 to determine teachers' estimation of their own financial status and subjective perception of teachers' poverty; (2 to examine in which way the personal perception of poverty of teachers is linked with the quality of their engagement in curricular and extracurricular activities; (3 to examine which economic and psychological strategies teachers use in overcoming stress because of the lower financial status; (4 to examine whether there are differences between teachers with regard to socio-demographic variables and the previously established goals. Sample consists of 141 teachers of music and general education schools in Belgrade and the interior of the country. Method: research is explorative and uses qualitative and psychometric methods of analysis. Results point out to the structure of 'hidden poverty' of teachers: average and poor financial status, financial and logistic support of the extended family, additional job, unfulfilled financial expectations regarding the educational status and ungratified higher needs. Teachers estimate that real poverty of educational system and 'hidden poverty' of teachers are reflected on the quality of certain aspects of educational process as a whole and in certain elements: teacher's personal life and work motivation, authority in school, quality of teacher's engagement in tuition and the possibility of professional specialization. Teachers use financial and psychological strategies for overcoming stress that can be determined as: moralist compensatory, evasive, inappropriate, emotional, relying on family and friendly supportive systems and activist. Conclusion: primarily subjective and spiritual impoverishment of the stratum of highly educated people, who are, in addition to this, the bearers

  12. Open and hidden agendas of "asymptomatic" patients who request check-up exams

    Directory of Open Access Journals (Sweden)

    Nüesch Reto

    2011-04-01

    Full Text Available Abstract Background Current guidelines for a check-up recommend routine screening not triggered by specific symptoms for some known risk factors and diseases in the general population. Patients' perceptions and expectations regarding a check-up exam may differ from these principles. However, quantitative and qualitative data about the discrepancy between patient- and provider expectations for this type of clinic consultation is lacking. Methods For a year, we prospectively enrolled 66 patients who explicitly requested a "check-up" at our medical outpatient division. All patients actively denied upon prompting having any symptoms or specific health concerns at the time they made their appointment. All consultations were videotaped and analysed for information about spontaneously mentioned symptoms and reasons for the clinic consultation ("open agendas" and for cues to hidden patient agendas using the Roter interaction analysis system (RIAS. Results All patients initially declared to be asymptomatic but this was ultimately the case in only 7 out of 66 patients. The remaining 59 patients spontaneously mentioned a mean of 4.2 ± 3.3 symptoms during their first consultation. In 23 patients a total of 31 hidden agendas were revealed. The primary categories for hidden agendas were health concerns, psychosocial concerns and the patient's concept of disease. Conclusions The majority of patients requesting a general check-up tend to be motivated by specific symptoms and health concerns and are not "asymptomatic" patients who primarily come for preventive issues. Furthermore, physicians must be alert for possible hidden agendas, as one in three patients have one or more hidden reasons for requesting a check-up.

  13. A Fast SVD-Hidden-nodes based Extreme Learning Machine for Large-Scale Data Analytics.

    Science.gov (United States)

    Deng, Wan-Yu; Bai, Zuo; Huang, Guang-Bin; Zheng, Qing-Hua

    2016-05-01

    Big dimensional data is a growing trend that is emerging in many real world contexts, extending from web mining, gene expression analysis, protein-protein interaction to high-frequency financial data. Nowadays, there is a growing consensus that the increasing dimensionality poses impeding effects on the performances of classifiers, which is termed as the "peaking phenomenon" in the field of machine intelligence. To address the issue, dimensionality reduction is commonly employed as a preprocessing step on the Big dimensional data before building the classifiers. In this paper, we propose an Extreme Learning Machine (ELM) approach for large-scale data analytic. In contrast to existing approaches, we embed hidden nodes that are designed using singular value decomposition (SVD) into the classical ELM. These SVD nodes in the hidden layer are shown to capture the underlying characteristics of the Big dimensional data well, exhibiting excellent generalization performances. The drawback of using SVD on the entire dataset, however, is the high computational complexity involved. To address this, a fast divide and conquer approximation scheme is introduced to maintain computational tractability on high volume data. The resultant algorithm proposed is labeled here as Fast Singular Value Decomposition-Hidden-nodes based Extreme Learning Machine or FSVD-H-ELM in short. In FSVD-H-ELM, instead of identifying the SVD hidden nodes directly from the entire dataset, SVD hidden nodes are derived from multiple random subsets of data sampled from the original dataset. Comprehensive experiments and comparisons are conducted to assess the FSVD-H-ELM against other state-of-the-art algorithms. The results obtained demonstrated the superior generalization performance and efficiency of the FSVD-H-ELM.

  14. A Fast SVD-Hidden-nodes based Extreme Learning Machine for Large-Scale Data Analytics.

    Science.gov (United States)

    Deng, Wan-Yu; Bai, Zuo; Huang, Guang-Bin; Zheng, Qing-Hua

    2016-05-01

    Big dimensional data is a growing trend that is emerging in many real world contexts, extending from web mining, gene expression analysis, protein-protein interaction to high-frequency financial data. Nowadays, there is a growing consensus that the increasing dimensionality poses impeding effects on the performances of classifiers, which is termed as the "peaking phenomenon" in the field of machine intelligence. To address the issue, dimensionality reduction is commonly employed as a preprocessing step on the Big dimensional data before building the classifiers. In this paper, we propose an Extreme Learning Machine (ELM) approach for large-scale data analytic. In contrast to existing approaches, we embed hidden nodes that are designed using singular value decomposition (SVD) into the classical ELM. These SVD nodes in the hidden layer are shown to capture the underlying characteristics of the Big dimensional data well, exhibiting excellent generalization performances. The drawback of using SVD on the entire dataset, however, is the high computational complexity involved. To address this, a fast divide and conquer approximation scheme is introduced to maintain computational tractability on high volume data. The resultant algorithm proposed is labeled here as Fast Singular Value Decomposition-Hidden-nodes based Extreme Learning Machine or FSVD-H-ELM in short. In FSVD-H-ELM, instead of identifying the SVD hidden nodes directly from the entire dataset, SVD hidden nodes are derived from multiple random subsets of data sampled from the original dataset. Comprehensive experiments and comparisons are conducted to assess the FSVD-H-ELM against other state-of-the-art algorithms. The results obtained demonstrated the superior generalization performance and efficiency of the FSVD-H-ELM. PMID:26907860

  15. From detecting astrocyte connectivity to uncovering drug effects in living tissues

    CERN Document Server

    Pires, Marcelo; Vaz, Sandra; Sebastião, Ana; Lind, Pedro G

    2013-01-01

    We introduce a simple procedure of multivariate signal analysis to uncover the connectivity structure among cells composing a living tissue and describe how to apply it for extracting insight on the effect of drugs in the tissue. The procedure is based in the covariance matrix of time resolved activity signals. By determining the time-lag that maximizes covariance one derives the weight of the corresponding connection between cells. Introducing simple constraints, it is possible to conclude if pairs of cells are connected or not and in which direction. After testing the method against synthetic data we apply it to study propagation of $Ca^{2+}$ waves in astrocytes, with the aim of uncovering the cell connectivity structure. Our method shows to be particularly suited for this type of networking signal propagation where signals are pulse-like and have short time-delays, and is shown to be superior to standard methods, namely a multivariate Granger algorithm. Finally, based the statistical analysis of the connec...

  16. Grand unified hidden-sector dark matter

    Science.gov (United States)

    Lonsdale, Stephen J.; Volkas, Raymond R.

    2014-10-01

    We explore G×G unified theories with the visible and the hidden or dark sectors paired under a Z2 symmetry. Developing a system of "asymmetric symmetry breaking" we motivate such models on the basis of their ability to generate dark baryons that are confined with a mass scale just above that of the proton, as motivated by asymmetric dark matter. This difference is achieved from the distinct but related confinement scales that develop in unified theories that have the two factors of G spontaneously breaking in an asymmetric manner. We show how Higgs potentials that admit different gauge group breaking chains in each sector can be constructed, and demonstrate the capacity for generating different fermion mass scales. Lastly we discuss supersymmetric extensions of such schemes.

  17. Hidden caries’ challenge diagnosis: case report

    Directory of Open Access Journals (Sweden)

    Fernanda Mara de Paiva Bertoli

    2013-06-01

    Full Text Available Introduction: Hidden caries is a term used to describe occlusal dentine caries that is missed on a visual examination, but is large and demineralised enough to be detected by another exam for example, radiographs. Case report: This article reports a case of large dentine caries, which presented as to be a small pit-and-fissure carious lesion on the occlusal surface of the right mandibular permanent first molar in a 10-year-old girl. The treatment included root canal treatment and the sealing of the cavity with composite resin. Conclusion: Careful visual examination, with cleaning and drying of teeth, associated to bitewing radiographs may improve occlusal caries detection. Dentists should examine bitewing radiographs carefully for proximal caries and occlusal demineralization. Radiographs are an effective method of caries diagnosis that can avoid large destruction and allows less invasive treatment.

  18. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  19. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school......Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...

  20. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  1. Hidden baryons: The physics of Compton composites

    Science.gov (United States)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  2. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  3. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  4. Automatically Discovering Hidden Transformation Chaining Constraints

    CERN Document Server

    Chenouard, Raphael; 10.1007/978-3-642-04425-0_8

    2010-01-01

    Model transformations operate on models conforming to precisely defined metamodels. Consequently, it often seems relatively easy to chain them: the output of a transformation may be given as input to a second one if metamodels match. However, this simple rule has some obvious limitations. For instance, a transformation may only use a subset of a metamodel. Therefore, chaining transformations appropriately requires more information. We present here an approach that automatically discovers more detailed information about actual chaining constraints by statically analyzing transformations. The objective is to provide developers who decide to chain transformations with more data on which to base their choices. This approach has been successfully applied to the case of a library of endogenous transformations. They all have the same source and target metamodel but have some hidden chaining constraints. In such a case, the simple metamodel matching rule given above does not provide any useful information.

  5. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system....../education isn’t a negotiable path for them. The theoretical approach of this paper draws on inspiration from Paul Willis (Learning to labour, 1979) and Donald Broady (Den dolda läroplanen, 1981). The goal is to revitalize and develop the work of Willis and Broady in the context of the current retention and drop-out...

  6. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments. PMID:26451546

  7. Holographic superconductors with hidden Fermi surfaces

    CERN Document Server

    Fan, ZhongYing

    2013-01-01

    In this paper, we investigate a holographic model of superconductor with hidden Fermi surfaces, which was defined by the logarithmic violation of area law of entanglement entropy. We works in fully back-reacted background using standard Einstein-Maxwell-Dilaton action with additional complex scalar filed which was charged under the Maxwell field. Particularly, we analyze the behavior of entanglement entropy during the phase transition. At the critical point, the finite part of the entanglement entropy has a discontinuity of slope and tends to a lower value in the superconducting phase all the way down to the zero temperature limit, indicating the reorganization of degrees of freedom of the system across the phase transition.

  8. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments.

  9. $\\mathcal{PT}$-systems without parity symmetry: topological states, hidden symmetry, and the $\\mathcal{PT}$ phase diagram

    CERN Document Server

    Joglekar, Yogesh N

    2015-01-01

    $\\mathcal{PT}$-symmetric systems, until now, have been characterized by a real, parity-symmetric, kinetic Hamiltonian and a non-Hermitian, balanced gain-loss potential. We present a new class of discrete models in which the tunneling Hamiltonian is not parity-symmetric, and yet the models have a nonzero $\\mathcal{PT}$-breaking threshold in presence of a pair of gain-loss impurities $\\pm i\\gamma$ located at reflection-symmetric sites. We uncover a hidden symmetry that is instrumental to the finite threshold strength. We show that such models have topological edge-states that remain robust in the $\\mathcal{PT}$-broken phase. Our predictions substantially broaden possible realizations of a $\\mathcal{PT}$ system, particularly in optical waveguide arrays or coupled microstructures, by eliminating the parity-symmetry constraint.

  10. Hidden Diversity in Sardines: Genetic and Morphological Evidence for Cryptic Species in the Goldstripe Sardinella, Sardinella gibbosa (Bleeker, 1849)

    Science.gov (United States)

    Thomas, Rey C.; Willette, Demian A.; Carpenter, Kent E.; Santos, Mudjekeewis D.

    2014-01-01

    Cryptic species continue to be uncovered in many fish taxa, posing challenges for fisheries conservation and management. In Sardinella gibbosa, previous investigations revealed subtle intra-species variations, resulting in numerous synonyms and a controversial taxonomy for this sardine. Here, we tested for cryptic diversity within S. gibbosa using genetic data from two mitochondrial and one nuclear gene regions of 248 individuals of S. gibbosa, collected from eight locations across the Philippine archipelago. Deep genetic divergence and subsequent clustering was consistent across both mitochondrial and nuclear markers. Clade distribution is geographically limited: Clade 1 is widely distributed in the central Philippines, while Clade 2 is limited to the northernmost sampling site. In addition, morphometric analyses revealed a unique head shape that characterized each genetic clade. Hence, both genetic and morphological evidence strongly suggests a hidden diversity within this common and commercially-important sardine. PMID:24416271

  11. Hidden diversity in sardines: genetic and morphological evidence for cryptic species in the goldstripe sardinella, Sardinella gibbosa (Bleeker, 1849.

    Directory of Open Access Journals (Sweden)

    Rey C Thomas

    Full Text Available Cryptic species continue to be uncovered in many fish taxa, posing challenges for fisheries conservation and management. In Sardinella gibbosa, previous investigations revealed subtle intra-species variations, resulting in numerous synonyms and a controversial taxonomy for this sardine. Here, we tested for cryptic diversity within S. gibbosa using genetic data from two mitochondrial and one nuclear gene regions of 248 individuals of S. gibbosa, collected from eight locations across the Philippine archipelago. Deep genetic divergence and subsequent clustering was consistent across both mitochondrial and nuclear markers. Clade distribution is geographically limited: Clade 1 is widely distributed in the central Philippines, while Clade 2 is limited to the northernmost sampling site. In addition, morphometric analyses revealed a unique head shape that characterized each genetic clade. Hence, both genetic and morphological evidence strongly suggests a hidden diversity within this common and commercially-important sardine.

  12. Uncovering light scalars with exotic Higgs decays to bbmumu

    CERN Document Server

    Curtin, David; Zhong, Yi-Ming

    2014-01-01

    The search for exotic Higgs decays are an essential probe of new physics. In particular, the small width of the Higgs boson makes its decay uniquely sensitive to the existence of light hidden sectors. Here we assess the potential of an exotic Higgs decay search for h -> 2X -> bbmumu to constrain theories with light CP-even (X = s) and CP-odd (X = a) singlet scalars in the mass range of 15 to 60 GeV. This decay channel arises naturally in many scenarios, such as the Standard Model augmented with a singlet, the two-Higgs-doublet model with a singlet (2HDM+S) -- which includes the Next-to-Minimal Supersymmetric Standard Model (NMSSM) -- and in hidden valley models. The 2b2mu channel may represent the best discovery avenue for many models. It has competitive reach, and is less reliant on low-pT b- and tau-reconstruction compared to other channels like 4b, 4tau, and 2tau2mu. We analyze the sensitivity of a 2b2mu search for the 8 and 14 TeV LHC, including the HL-LHC. We consider three types of analyses, employing c...

  13. Implementation of a Connected Digit Recognizer Using Continuous Hidden Markov Modeling

    OpenAIRE

    Srichai, Panaithep Albert

    1998-01-01

    This thesis describes the implementation of a speaker dependent connected-digit recognizer using continuous Hidden Markov Modeling (HMM). The speech recognition system was implemented using MATLAB and on the ADSP-2181, a digital signal processor manufactured by Analog Devices. Linear predictive coding (LPC) analysis was first performed on a speech signal to model the characteristics of the vocal tract filter. A 7 state continuous HMM with 4 mixture density components was used to model e...

  14. 特高压换流站阀冷系统隐患分析及整改措施%Hidden Danger Analysis and Improvement Measures in the Valve Cooling System of UHVDC Converter Station

    Institute of Scientific and Technical Information of China (English)

    莫文斌; 张文; 徐攀滕; 高红亮

    2015-01-01

    In allusion to hidden dangers of the valve cooling system in UHVDC Suidong converter station, such as the water flow and pressure sensor in the DIW main stream, the water level sensor in the spray water tank, excee-ding tolerance trip logic of the redundant sensor, trip circuit, DC power monitoring circuit, AC power supply moni-toring relay, etc.Hardware configuration and control logic of the valve cooling system are analyzed.The paper pro-poses improvement measures to reduce the UHVDC forced outage rate.The results ensure the security and stability of the valve cooling system in Suidong converter station, and provide reference value for equipment manufacture and engineering design.%针对特高压穗东换流站阀冷系统内冷水流量与压力传感器、外冷水池水位传感器、冗余配置传感器超差跳闸逻辑、跳闸出口回路、直流电源监视回路及交流电源电压监视继电器等方面存在的隐患,分析了阀冷系统的硬件配置和控制逻辑,对隐患进行了整改或提出了临时应对措施,降低了直流系统发生强迫停运的概率,保证了穗东换流站阀冷系统的安全稳定运行,为其他换流站的设计运行维护提供了参考。

  15. AdS/QCD approach to the scale invariant extension of the standard model with a strongly interacting hidden sector

    CERN Document Server

    Hatanaka, Hisaki; Ko, Pyungwon

    2016-01-01

    In this paper, we revisit a scale-invariant extension of the standard model (SM) with a strongly interacting hidden sector within AdS/QCD approach. Using the AdS/QCD, we reduce the number of input parameters to three, i.e. hidden pion decay constant, hidden pion mass and $\\tan\\beta$ that is defined as the ratio of the vacuum expectation values (VEV) of the singlet scalar field and the SM Higgs boson. As a result, our model has sharp predictability. We perform the phenomenological analysis of the hidden pions which is one of the dark matter (DM) candidates in this model. With various theoretical and experimental constraints we search for the allowed parameter space and find that both resonance and non-resonance solutions are possible. Some typical correlations among various observables such as thermal relic density of hidden pions, Higgs signal strengths and DM-nucleon cross section are investigated. We provide some benchmark points for experimental tests.

  16. The hidden curriculum in radiology residency programs: A path to isolation or integration?

    Energy Technology Data Exchange (ETDEWEB)

    Van Deven, T. [Department of Medical Imaging, Schulich School of Medicine and Dentistry (Canada); Hibbert, K., E-mail: khibbert@uwo.ca [Faculty of Education, Schulich School of Medicine and Dentistry (Canada); Faden, L. [Faculty of Education, The University of Western Ontario (Canada); Chhem, R.K. [Institute of History, Philosophy and Ethics of Medicine, Ulm University, Ulm (Germany)

    2013-05-15

    Purpose: In this qualitative case study involving five academic Radiology centres across Canada, the authors seek to identify the hidden curriculum. Methods: A qualitative case study methodology was used for its potential to explore and provide rich descriptions and allow for the in-depth analysis of multiple data sources that include official institutional documents, surveys, observations and interviews (including undergraduate students, postgraduate, radiologists, imaging scientists, residents, faculty and administrators). This study relied on 48 interviews and involved primary data analysis by the core research team, and a secondary analysis by external examiners. Results: The results revealed that in four of the five major centres studied, a hidden curriculum of isolation prevailed, reinforcing an image of the radiologist as an independent operator within an organization dependent upon collaboration for optimal performance. The fifth site exhibited a hidden curriculum of collaboration and support, although the messages received were conflicting when addressing issues around teaching. Conclusions: The authors conclude by noting two possibilities for medical imaging departments to consider that of isolation or that of integration. They examine the implications of each and propose a way forward that situates Radiology as the crossroads of medicine. As such, the need for a new, generative metaphor reasserts the importance of recognizing the role and function of scholarship in teaching and learning contexts across Canada.

  17. The hidden curriculum in radiology residency programs: A path to isolation or integration?

    International Nuclear Information System (INIS)

    Purpose: In this qualitative case study involving five academic Radiology centres across Canada, the authors seek to identify the hidden curriculum. Methods: A qualitative case study methodology was used for its potential to explore and provide rich descriptions and allow for the in-depth analysis of multiple data sources that include official institutional documents, surveys, observations and interviews (including undergraduate students, postgraduate, radiologists, imaging scientists, residents, faculty and administrators). This study relied on 48 interviews and involved primary data analysis by the core research team, and a secondary analysis by external examiners. Results: The results revealed that in four of the five major centres studied, a hidden curriculum of isolation prevailed, reinforcing an image of the radiologist as an independent operator within an organization dependent upon collaboration for optimal performance. The fifth site exhibited a hidden curriculum of collaboration and support, although the messages received were conflicting when addressing issues around teaching. Conclusions: The authors conclude by noting two possibilities for medical imaging departments to consider that of isolation or that of integration. They examine the implications of each and propose a way forward that situates Radiology as the crossroads of medicine. As such, the need for a new, generative metaphor reasserts the importance of recognizing the role and function of scholarship in teaching and learning contexts across Canada

  18. Hidden Fermionic Excitation Boosting High-Temperature Superconductivity in Cuprates.

    Science.gov (United States)

    Sakai, Shiro; Civelli, Marcello; Imada, Masatoshi

    2016-02-01

    The dynamics of a microscopic cuprate model, namely, the two-dimensional Hubbard model, is studied with a cluster extension of the dynamical mean-field theory. We find a nontrivial structure of the frequency-dependent self-energies, which describes an unprecedented interplay between the pseudogap and superconductivity. We show that these properties are well described by quasiparticles hybridizing with (hidden) fermionic excitations, emergent from the strong electronic correlations. The hidden fermion enhances superconductivity via a mechanism distinct from a conventional boson-mediated pairing, and originates the normal-state pseudogap. Though the hidden fermion is elusive in experiments, it can solve many experimental puzzles. PMID:26894730

  19. Multilayer neural networks with extensively many hidden units.

    Science.gov (United States)

    Rosen-Zvi, M; Engel, A; Kanter, I

    2001-08-13

    The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions, whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an overlap in the space of Boolean functions as order parameter, the storage capacity is found to scale with the logarithm of the number of implementable Boolean functions. The generalization behavior is smooth for continuous couplings and shows a discontinuous transition to perfect generalization for discrete ones. PMID:11497920

  20. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  1. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  2. Suppressing the QCD axion abundance by hidden monopoles

    Directory of Open Access Journals (Sweden)

    Masahiro Kawasaki

    2016-02-01

    Full Text Available We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 1012GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei–Quinn symmetry is spontaneously broken after inflation.

  3. Uncovering Metaethical Assumptions in Bioethical Discourse across Cultures.

    Science.gov (United States)

    Sullivan, Laura Specker

    2016-03-01

    Much of bioethical discourse now takes place across cultures. This does not mean that cross-cultural understanding has increased. Many cross-cultural bioethical discussions are marked by entrenched disagreement about whether and why local practices are justified. In this paper, I argue that a major reason for these entrenched disagreements is that problematic metaethical commitments are hidden in these cross-cultural discourses. Using the issue of informed consent in East Asia as an example of one such discourse, I analyze two representative positions in the discussion and identify their metaethical commitments. I suggest that the metaethical assumptions of these positions result from their shared method of ethical justification: moral principlism. I then show why moral principlism is problematic in cross-cultural analyses and propose a more useful method for pursuing ethical justification across cultures.

  4. Using a Multi-Cathode Counter (MCC) in the Search for Hidden Photon CDM

    CERN Document Server

    Kopylov, A V; Petukhov, V V

    2015-01-01

    We report on a new technique of a Multi-Cathode Counter (MCC) developed to search for hidden photon (HP) cold dark matter (CDM) with a mass from 5 to 10 eV. The method suggested in the assumption that hidden photons of the mass greater than a work function of the metal, the cathode of the counter is fabricated induce emission of single electrons from a cathode. Three configurations of the same counter are used to measure the count rates R1, R2 and R3 of the single electron events sequentially each week, where the difference R1- R2 measures the effect from HP and R3 is used as a reference sequence to monitor the counting process. At present the work is aimed to refine the procedure of data treatment and to look for long term variations which should be accounted for in the final analysis of data.

  5. Multivariate weighted recurrence network inference for uncovering oil-water transitional flow behavior in a vertical pipe.

    Science.gov (United States)

    Gao, Zhong-Ke; Yang, Yu-Xuan; Cai, Qing; Zhang, Shan-Shan; Jin, Ning-De

    2016-06-01

    Exploring the dynamical behaviors of high water cut and low velocity oil-water flows remains a contemporary and challenging problem of significant importance. This challenge stimulates us to design a high-speed cycle motivation conductance sensor to capture spatial local flow information. We systematically carry out experiments and acquire the multi-channel measurements from different oil-water flow patterns. Then we develop a novel multivariate weighted recurrence network for uncovering the flow behaviors from multi-channel measurements. In particular, we exploit graph energy and weighted clustering coefficient in combination with multivariate time-frequency analysis to characterize the derived complex networks. The results indicate that the network measures are very sensitive to the flow transitions and allow uncovering local dynamical behaviors associated with water cut and flow velocity. These properties render our method particularly useful for quantitatively characterizing dynamical behaviors governing the transition and evolution of different oil-water flow patterns. PMID:27368782

  6. Multivariate weighted recurrence network inference for uncovering oil-water transitional flow behavior in a vertical pipe

    Science.gov (United States)

    Gao, Zhong-Ke; Yang, Yu-Xuan; Cai, Qing; Zhang, Shan-Shan; Jin, Ning-De

    2016-06-01

    Exploring the dynamical behaviors of high water cut and low velocity oil-water flows remains a contemporary and challenging problem of significant importance. This challenge stimulates us to design a high-speed cycle motivation conductance sensor to capture spatial local flow information. We systematically carry out experiments and acquire the multi-channel measurements from different oil-water flow patterns. Then we develop a novel multivariate weighted recurrence network for uncovering the flow behaviors from multi-channel measurements. In particular, we exploit graph energy and weighted clustering coefficient in combination with multivariate time-frequency analysis to characterize the derived complex networks. The results indicate that the network measures are very sensitive to the flow transitions and allow uncovering local dynamical behaviors associated with water cut and flow velocity. These properties render our method particularly useful for quantitatively characterizing dynamical behaviors governing the transition and evolution of different oil-water flow patterns.

  7. Isovector and hidden-beauty partners of the X(3872)

    Energy Technology Data Exchange (ETDEWEB)

    Høgaasen, Hallstein, E-mail: hallstein.hogasen@fys.uio.no [Department of Physics, University of Oslo, Box 1048, NO-0316 Oslo (Norway); Kou, Emi, E-mail: kou@lal.in2p3.fr [Laboratoire de l' Accélérateur Linéaire, Université Paris-Sud, IN2P3-CNRS, Centre Scientifique d' Orsay, 91898 Orsay Cedex (France); Richard, Jean-Marc, E-mail: j-m.richard@ipnl.in2p3.fr [Université de Lyon, Institut de Physique Nucléaire de Lyon, UCBL–IN2P3-CNRS, 4, rue Enrico Fermi, 69622 Villeurbanne Cedex (France); Sorba, Paul, E-mail: paul.sorba@lapth.cnrs.fr [LAPTh, Laboratoire d' Annecy-le-Vieux de Physique Théorique, CNRS, Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France)

    2014-05-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  8. Recent Applications of Hidden Markov Models in Computational Biology

    Institute of Scientific and Technical Information of China (English)

    Khar Heng Choo; Joo Chuan Tong; Louxin Zhang

    2004-01-01

    This paper examines recent developments and applications of Hidden Markov Models (HMMs) to various problems in computational biology, including multiple sequence alignment, homology detection, protein sequences classification, and genomic annotation.

  9. Ground Plane Estimation using a Hidden Markov Model

    OpenAIRE

    Dragon, Ralf; Gool, Luc >

    2014-01-01

    Dragon R., Van Gool L., ''Ground plane estimation using a hidden Markov model'', 27th IEEE conference on computer vision and pattern recognition - CVPR 2014, pp. 4026-4033, June 23-28, 2014, Columbus, Ohio, USA.

  10. Hidden time interpretation of quantum mechanics and "no protocol" argument

    CERN Document Server

    Kurakin, P V

    2007-01-01

    Previously suggested hidden time interpretation of quantum mechanics allows to reproduce the same predictions as standard quantum mechanics provides, since it is based on Feynman many - paths formulation of QM. While new experimental consequences of this interpretation are under investigation, some advantages can be enumerated. (1) The interpretation is much field theoretic - like in classical sense, so it is local in mathematical sense, though quantum (physical) non-locality is preserved. (2) The interpretation is based on one type of mathematical objects, rather than two different (Hilbert space vectors and operators). (3) The interpretation, as it was argued, overcomes the problem of hidden variables in a radically new way, with no conflict to Bell's theorem. Recently an important argument against hidden variables - like formulations of quantum theory was risen - "no protocol" argument. It is argued in the paper, that hidden time interpretation successfully overcomes this argument.

  11. Even 'Good' Insurance Comes with Hidden Hospital Bills

    Science.gov (United States)

    ... medlineplus.gov/news/fullstory_159575.html Even 'Good' Insurance Comes With Hidden Hospital Bills Average out-of- ... June 27, 2016 (HealthDay News) -- Quality private health insurance is no protection against large out-of-pocket ...

  12. Isovector and hidden-beauty partners of the X(3872)

    International Nuclear Information System (INIS)

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  13. A Bell-type Theorem Without Hidden Variables

    CERN Document Server

    Stapp, Henry P

    2002-01-01

    Bell's theorem rules out local hidden-variable theories. The locality condition is the demand that what an experimenter freely chooses to measure in one space-time region has no influence in a second space-time region that is spacelike separated from the first. The hidden-variable stipulation means that this demand is implemented through requirements on an assumed-to-exist substructure involving hidden variables. The question thus arises whether the locality condition itself fails, or only its implementation by means of the assumed hidden-variable structure. This paper shows that any theory that satisfies two generally accepted features of orthodox quantum theory and that yields certain predictions of quantum theory cannot satisfy the afore-mentioned locality condition. These two features are that the choices made by the experimenters can be treated as localized free variables and that such free choices do not affect outcomes that have already occurred.

  14. Diagnostic Sampling to Reveal Hidden Lead and Copper Health Risks

    Science.gov (United States)

    Lead, copper and other metallic contamination sources in premise drinking water plumbing systems, are unevenly distributed and are usually hidden from thought, view, or both. Many sampling protocols exist, each with some set of implicit assumptions governing its applicability to...

  15. Hidden Markov Model Application to Transfer The Trader Online Forex Brokers

    OpenAIRE

    Farida Suharleni; Agus Widodo; Endang Wahyu H

    2012-01-01

    Hidden Markov Model is elaboration of Markov chain, which is applicable to cases that can’t directly observe. In this research, Hidden Markov Model is used to know trader’s transition to broker forex online. In Hidden Markov Model, observed state is observable part and hidden state is hidden part. Hidden Markov Model allows modeling system that contains interrelated observed state and hidden state. As observed state in trader’s transition to broker forex online is category 1, category 2, cate...

  16. DNA Looping Kinetics Analyzed Using Diffusive Hidden Markov Model

    CERN Document Server

    Beausang, J F; Finzi, L; Manzo, C; Nelson, P C; Zurla, C; Beausang, John F.; Dunlap, David; Finzi, Laura; Manzo, Carlo; Nelson, Philip C.; Zurla, Chiara

    2007-01-01

    Tethered particle experiments use light microscopy to measure the position of a micrometer-sized bead tethered to a microscope slide via a ~micrometer length polymer, in order to infer the behavior of the invisible polymer. Currently, this method is used to measure rate constants of DNA loop formation and breakdown mediated by repressor protein that binds to the DNA. We report a new technique for measuring these rates using a modified hidden Markov analysis that directly incorporates the diffusive motion of the bead, which is an inherent complication of tethered particle motion because it occurs on a time scale between the sampling frequency and the looping time. We compare looping lifetimes found with our method, which are consistent over a range of sampling frequencies, to those obtained via the traditional threshold-crossing analysis, which vary depending on how the raw data are filtered in the time domain. Our method does not involve such filtering, and so can detect short-lived looping events and sudden ...

  17. Analyzing Hidden Semantics in Social Bookmarking of Open Educational Resources

    Science.gov (United States)

    Minguillón, Julià

    Web 2.0 services such as social bookmarking allow users to manage and share the links they find interesting, adding their own tags for describing them. This is especially interesting in the field of open educational resources, as delicious is a simple way to bridge the institutional point of view (i.e. learning object repositories) with the individual one (i.e. personal collections), thus promoting the discovering and sharing of such resources by other users. In this paper we propose a methodology for analyzing such tags in order to discover hidden semantics (i.e. taxonomies and vocabularies) that can be used to improve descriptions of learning objects and make learning object repositories more visible and discoverable. We propose the use of a simple statistical analysis tool such as principal component analysis to discover which tags create clusters that can be semantically interpreted. We will compare the obtained results with a collection of resources related to open educational resources, in order to better understand the real needs of people searching for open educational resources.

  18. Nonlinear dynamics of hidden modes in a system with internal symmetry

    Science.gov (United States)

    Perchikov, Nathan; Gendelman, O. V.

    2016-09-01

    We consider a discrete dynamical system with internal degrees of freedom (DOF). Due to the symmetry between the internal DOFs, certain internal modes cannot be excited by external forcing (in a case of linear interactions) and thus are considered "hidden". If such a system is weakly asymmetric, the internal modes remain approximately "hidden" from the external excitation, given that small damping is taken into account. However, already in the case of weak cubic nonlinearity, these hidden modes can be excited, even as the exact symmetry is preserved. This excitation occurs through parametric resonance. Floquet analysis reveals instability patterns for the explored modes. To perform this analysis with the required accuracy, we suggest a special method for obtaining the Fourier series of the unperturbed solution for the nonlinear normal mode. This method does not require explicit integration of the arising quadratures. Instead, it employs expansion of the solution at the stage of the implicit quadrature in terms of Chebyshev polynomials. The emerging implicit equations are solved by using a fixed-point iteration scheme. Poincaré sections help to clarify the correspondence between the loss of stability of the modes and the global structure of the dynamical flow. In particular, the conditions for intensive energy exchange in the system are characterized.

  19. Hidden Markov Models with Factored Gaussian Mixtures Densities

    Institute of Scientific and Technical Information of China (English)

    LI Hao-zheng; LIU Zhi-qiang; ZHU Xiang-hua

    2004-01-01

    We present a factorial representation of Gaussian mixture models for observation densities in Hidden Markov Models(HMMs), which uses the factorial learning in the HMM framework. We derive the reestimation formulas for estimating the factorized parameters by the Expectation Maximization (EM) algorithm. We conduct several experiments to compare the performance of this model structure with Factorial Hidden Markov Models(FHMMs) and HMMs, some conclusions and promising empirical results are presented.

  20. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...

  1. Reheating the Standard Model from a Hidden Sector

    OpenAIRE

    Tenkanen, Tommi; Vaskonen, Ville

    2016-01-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before Big Bang Nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful Big Bang Nucleosynthesis ...

  2. Conjugate boundary condition, hidden matters, and gauge-Higgs inflation

    CERN Document Server

    Abe, Yugo; Kawamura, Yoshiharu; Nishikawa, Yasunari

    2016-01-01

    We propose an idea that hidden matters can be separated according to gauge quantum numbers from the visible ones by the difference of boundary conditions on extra dimensions. We formulate 5-dimensional gauge theories yielding conjugate boundary conditions besides ordinary ones on $S^1/Z_2$, and examine physical implications concerning hidden matters on an extension of the standard model coexisting different types of boundary conditions. A model with conjugate boundary conditions is applied on a gauge-Higgs inflation scenario.

  3. Entrepreneurship and the Hidden Economy: An Extended Matching Model

    OpenAIRE

    Pugno, Maurizio; Lisi, Gaetano

    2010-01-01

    This paper develops a standard matching model to address the problem of the hidden sector (including non-registered firms but producing for legal markets), as it is characterised in Italy, i.e. framed in a rather advanced economic and institutional setting, but also linked to the socio-economic regional dualism. The main novel features of the model are that entrepreneurial ability is heterogeneous, and that regular firms receive negative externalities from the hidden sector, and positive exte...

  4. Analyticity of entropy rate of hidden Markov chains

    OpenAIRE

    Han, G; Marcus, B

    2006-01-01

    We prove that under mild positivity assumptions the entropy rate of a hidden Markov chain varies analytically as a function of the underlying Markov chain parameters. A general principle to determine the domain of analyticity is stated. An example is given to estimate the radius of convergence for the entropy rate. We then show that the positivity assumptions can be relaxed, and examples are given for the relaxed conditions. We study a special class of hidden Markov chains in more detail: bin...

  5. Stabilization of stochastic systems with hidden Markovian jumps

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper considers the adaptive control of discrete-time hybrid stochastic systems with unknown randomly jumping parameters described by a finite-state hidden Markov chain. An intuitive yet longstanding conjecture in this area is that such hybrid systems can be adaptively stabilized whenever the rate of transition of the hidden Markov chain is small enough. This paper provides a rigorous positive answer to this conjecture by establishing the global stability of a gradient-algorithm-based adaptive linear-quadratic control.

  6. Optimal Algorithms for Crawling a Hidden Database in the Web

    OpenAIRE

    Sheng, Cheng; Zhang, Nan; Tao, Yufei; Jin, Xin

    2012-01-01

    A hidden database refers to a dataset that an organization makes accessible on the web by allowing users to issue queries through a search interface. In other words, data acquisition from such a source is not by following static hyper-links. Instead, data are obtained by querying the interface, and reading the result page dynamically generated. This, with other facts such as the interface may answer a query only partially, has prevented hidden databases from being crawled effectively by exist...

  7. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  8. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  9. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing. PMID:25606190

  10. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linea...... and thus the proper weight is pruned at each pruning step. In all our experiments in small problems, pruning reduces the generalization error; in most cases the pruned networks facilitate interpretation as well......We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  11. Spatiotemporal pattern recognition using hidden Markov models

    Science.gov (United States)

    Fielding, Kenneth H.; Ruck, Dennis W.; Rogers, Steven K.; Welsh, Byron M.; Oxley, Mark E.

    1993-10-01

    A spatio-temporal method for identifying objects contained in an image sequence is presented. The Hidden Markov Model (HMM) technique is used as the classification algorithm, making classification decisions based on a spatio-temporal sequence of observed object features. A five class problem is considered. Classification accuracies of 100% and 99.7% are obtained for sequences of images generated over two separate regions of viewing positions. HMMs trained on image sequences of the objects moving in opposite directions showed a 98.1% successful classification rate by class and direction of movement. The HMM technique proved robust to image corruption with additive correlated noise and had a higher accuracy than a single look nearest neighbor method. A real image sequence of one of the objects used was successfully recognized with the HMMs trained on synthetic data. This study shows the temporal changes that observed feature vectors undergo due to object motion hold information that can yield superior classification accuracy when compared to single frame techniques.

  12. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  13. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  14. A hidden classical symmetry of QCD

    CERN Document Server

    Glozman, L Ya

    2016-01-01

    The classical part of the QCD partition function (the integrand) has, ignoring irrelevant exact zero modes of the Dirac operator, a local SU(2N_F) \\supset SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A symmetry which is absent at the Lagrangian level. This symmetry is broken anomalously and spontaneously. Effects of spontaneous breaking of chiral symmetry are contained in the near-zero modes of the Dirac operator. If physics of anomaly is also encoded in the same near-zero modes, then their truncation on the lattice should recover a hidden classical SU(2N_F) symmetry in correlators and spectra. This naturally explains observation on the lattice of a large degeneracy of hadrons, that is higher than the SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A chiral symmetry, upon elimination by hands of the lowest-lying modes of the Dirac operator. We also discuss an implication of this symmetry for the high temperature QCD.

  15. Laughing It Off: Uncovering the Everyday Work Experience of Nurses

    Directory of Open Access Journals (Sweden)

    Valerie M. Adams

    2007-03-01

    Full Text Available During research towards her doctoral dissertation, the author noticed that nurses understated the conditions in which they worked. Seeking to understand how nursing culture shapes how nurses describe their work, she developed a “toolbox” of reflexive methods. She used metaphors of nursing and emotion expressed as laughter to identify aspects of nursing culture in semistructured interviews with nurses working in Australian residential aged care facilities. She also incorporated autoethnography, as she had worked as a registered nurse while studying economics. The inclusion of her voice in the data illustrates the difference between nursing culture and another worldview. These pluralist methods made explicit some of the effects of gendered socialization, such as understatement and self-consciousness, and demonstrate how they are embedded in nursing culture. Awareness of such norms is important for understanding marketized caring labor. This combination of methods has significance for uncovering workplace culture in other forms of marketized caring.

  16. Uncovering Transcriptional Regulatory Networks by Sparse Bayesian Factor Model

    Science.gov (United States)

    Meng, Jia; Zhang, Jianqiu(Michelle); Qi, Yuan(Alan); Chen, Yidong; Huang, Yufei

    2010-12-01

    The problem of uncovering transcriptional regulation by transcription factors (TFs) based on microarray data is considered. A novel Bayesian sparse correlated rectified factor model (BSCRFM) is proposed that models the unknown TF protein level activity, the correlated regulations between TFs, and the sparse nature of TF-regulated genes. The model admits prior knowledge from existing database regarding TF-regulated target genes based on a sparse prior and through a developed Gibbs sampling algorithm, a context-specific transcriptional regulatory network specific to the experimental condition of the microarray data can be obtained. The proposed model and the Gibbs sampling algorithm were evaluated on the simulated systems, and results demonstrated the validity and effectiveness of the proposed approach. The proposed model was then applied to the breast cancer microarray data of patients with Estrogen Receptor positive ([InlineEquation not available: see fulltext.]) status and Estrogen Receptor negative ([InlineEquation not available: see fulltext.]) status, respectively.

  17. Uncovering Transcriptional Regulatory Networks by Sparse Bayesian Factor Model

    Directory of Open Access Journals (Sweden)

    Qi Yuan(Alan

    2010-01-01

    Full Text Available Abstract The problem of uncovering transcriptional regulation by transcription factors (TFs based on microarray data is considered. A novel Bayesian sparse correlated rectified factor model (BSCRFM is proposed that models the unknown TF protein level activity, the correlated regulations between TFs, and the sparse nature of TF-regulated genes. The model admits prior knowledge from existing database regarding TF-regulated target genes based on a sparse prior and through a developed Gibbs sampling algorithm, a context-specific transcriptional regulatory network specific to the experimental condition of the microarray data can be obtained. The proposed model and the Gibbs sampling algorithm were evaluated on the simulated systems, and results demonstrated the validity and effectiveness of the proposed approach. The proposed model was then applied to the breast cancer microarray data of patients with Estrogen Receptor positive ( status and Estrogen Receptor negative ( status, respectively.

  18. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  19. QCD sum rule study of hidden-charm pentaquarks

    CERN Document Server

    Chen, Hua-Xing; Chen, Wei; Steele, T G; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    We study the mass spectra of hidden-charm pentaquarks having spin $J = {1\\over2},{3\\over2},{5\\over2}$ and quark contents $uud c \\bar c$. We systematically construct all the relevant local hidden-charm pentaquark currents, and select some of them to perform QCD sum rule analyses. We find that the $P_c(4380)$ and $P_c(4450)$ can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. We also find the lowest-lying hidden-charm $J^P = 1/2^-$ pentaquark state of mass $4.33^{+0.17}_{-0.13}$ GeV, while the $J^P = 1/2^+$ mass prediction of 4.7--4.9 GeV is significantly higher. Similarly, the lowest-lying hidden-charm $J^P = 3/2^-$ pentaquark state mass is $4.37^{+0.18}_{-0.13}$ GeV, consistent with the $J^P = 3/2^-$ $P_c(4380)$, while the $J^P = 3/2^+$ is also significantly higher with a mass above 4.6 GeV. The hidden-charm $J^P = 5/2^-$ pentaquark state mass is 4.5--4.6 GeV, slightly larger than the $J^P = 5/2^+$ $P_c(4450)$.

  20. Rotating saddle trap as Foucault's pendulum: a hidden 'Coriolis' force in an inertial frame

    CERN Document Server

    Kirillov, Oleg N

    2016-01-01

    According to Earnshaw's theorem an electrostatic potential cannot have stable equilibria, i.e. the minima, since such potentials are harmonic functions. However, the 1989 Nobel Prize in physics was awarded to W. Paul for his invention of the trap for suspending charged particles in an oscillating electric field. Paul's idea was to stabilize the saddle by "vibrating" the electrostatic field, by analogy with the so-called Stephenson-Kapitsa pendulum in which the upside-down equilibrium is stabilized by vibration of the pivot. Instead of vibration, the saddle can also be stabilized by rotation of the potential (in two dimensions); this has been known for nearly a century, since 1918. Particles confined in rotating saddle traps exhibit precession in the laboratory frame, which up to now has been explained by analyzing explicit solutions. Here we show that this precession is actually due to a hidden Coriolis-like force, which we uncover by a normal form transformation. Unlike the conventional Coriolis force, this ...

  1. Analysis of stability of community structure across multiple hierarchical levels

    CERN Document Server

    Li, Hui-Jia

    2015-01-01

    The analysis of stability of community structure is an important problem for scientists from many fields. Here, we propose a new framework to reveal hidden properties of community structure by quantitatively analyzing the dynamics of Potts model. Specifically we model the Potts procedure of community structure detection by a Markov process, which has a clear mathematical explanation. Critical topological information regarding to multivariate spin configuration could also be inferred from the spectral significance of the Markov process. We test our framework on some example networks and find it doesn't have resolute limitation problem at all. Results have shown the model we proposed is able to uncover hierarchical structure in different scales effectively and efficiently.

  2. Hidden Household Wall of Peasant Workers:An Analysis from Behavioral Economics Perspective%行为经济学视角的农民工隐性户籍墙分析

    Institute of Scientific and Technical Information of China (English)

    董延芳; 刘传江; 胡铭

    2012-01-01

    After the stagflation in the 1970s, a large number of practical problems that can not be explained make people aware that there are shortcomings in the basic assumptions of mainstream economics about man, and it is necessary to make an economic study combined with the research of human psychology. To explore the phenomenon that peasant workers do not actively apply for non-agricultural registered permanent residence through points system, this paper uses a binary logistic model to analyze data from Wuhan, explaining the empirical result based on disappointment / regret effects, sacrifice trap, and prejudice and illusion theory of behavioral economics. It is suggested that derived from the household registration system, hidden household wall as a social mask should include discrimination caused by the dual household registration system in all aspects of social life between peasants and citizens, and its influence on peasant workers' citizenship choices not only lies in such objective discrimination, but also in peasants' subjective psychological condition when facing discrimination. Since the reform and opening-up, China's massive population migration has been continuing and will be increasingly active for a long period in the future, especially the flow of peasant workers, which shows the importance of peasant workers' citizenization. Currently, peasant workers' hesitation and unwillingness toward it reflect that the household registration reform has a long way to go and so has the establishment and promotion of its supporting system, and there is still a gap between its current condition and the requirements of the promotion of peasant workers' citizenization, urbanization, and rural-urban integration.%20世纪70年代滞涨后,大量无法解释应对的现实问题让人们意识到,主流经济学关于人的基本假设存在不足,在经济研究中结合人的心理的探讨是必要的.为解释现实中农民工不积极申请积分制入户,文章利用

  3. Analysis of hospitalized patients'nursing hidden safety problems in department of neurology and relevant preventive measures%神经内科住院患者的护理安全隐患分析及防范措施

    Institute of Scientific and Technical Information of China (English)

    孙江莉

    2015-01-01

    目的::分析探讨神经内科患者的护理方面存在的安全隐患以及防范措施。方法:选取2011年4月~2013年4月在我院接受神经性疾病治疗的88例患者,将其按照年龄、性别、病情等随机分为对照组和试验组,每组患者44例。对照组患者采用常规护理方式,试验组患者采用优质护理服务方式。对2组患者的生活质量以及患者服务满意度进行比较,并根据长期临床观察总结2组患者的安全隐患以及相关的防范措施。结果:试验组患者的日常生活能力恢复情况优质护理;护理安全隐患;较对照组患者好,且患者的生活质量明显优于对照组患者,2组患者比较差异明显,具有统计学意义(P<0.05)。结论:临床治疗神经内科患者过程中,要积极防范各种威胁患者生命健康的安全隐患,并在治疗过程中实施优质护理服务,提高患者的生活质量以及病情恢复情况。%Objective:To explore hospitalized patients' nursing hidden safety problems in Department of Neurology and its preventive measures. Methods:Selected 88 patients with neurogenic diseases in our hospital from April 2011 to April 2013 as the research object. According to their age, sex,patient's condition and so on, they were randomly divided into the control group and the experimental group. Each group was 44 patients. The former were treated with formal nursing care. The latter were treated with high quality nursing care. Then compared patients of the two groups with life quality and service satisfaction. After long-term clinical observation, summarized the pa-tients safety problems and the relevant preventive measures. Results:The restoration of activities in daily life and life quality of the experi-mental group was better than those of the control group. The difference was greatly obvious, so it had statistical significance (P < 0. 05). Conclusion:During the Clinical treatment of patients with neurology diseases

  4. Hidden Markov Models for Detecting Aseismic Events in Southern California

    Science.gov (United States)

    Granat, R.

    2004-12-01

    We employ a hidden Markov model (HMM) to segment surface displacement time series collection by the Southern California Integrated Geodetic Network (SCIGN). These segmented time series are then used to detect regional events by observing the number of simultaneous mode changes across the network; if a large number of stations change at the same time, that indicates an event. The hidden Markov model (HMM) approach assumes that the observed data has been generated by an unobservable dynamical statistical process. The process is of a particular form such that each observation is coincident with the system being in a particular discrete state, which is interpreted as a behavioral mode. The dynamics are the model are constructed so that the next state is directly dependent only on the current state -- it is a first order Markov process. The model is completely described by a set of parameters: the initial state probabilities, the first order Markov chain state-to-state transition probabilities, and the probability distribution of observable outputs associated with each state. The result of this approach is that our segmentation decisions are based entirely on statistical changes in the behavior of the observed daily displacements. In general, finding the optimal model parameters to fit the data is a difficult problem. We present an innovative model fitting method that is unsupervised (i.e., it requires no labeled training data) and uses a regularized version of the expectation-maximization (EM) algorithm to ensure that model solutions are both robust with respect to initial conditions and of high quality. We demonstrate the reliability of the method as compared to standard model fitting methods and show that it results in lower noise in the mode change correlation signal used to detect regional events. We compare candidate events detected by this method to the seismic record and observe that most are not correlated with a significant seismic event. Our analysis

  5. EPR Hidden Medical Image Secret Sharing using DNA Cryptography

    Directory of Open Access Journals (Sweden)

    L.Jani Anbarasi

    2014-07-01

    Full Text Available Security of medical images is an important issue, since applications such as Tele diagnosis exchange information over insecure communication channels. In this paper, Shamir secret sharing algorithm combined with DNA cryptography is proposed. The method involves the dispersion of medical image and Electronic Patient Record (EPR into shadow images, aiming at better security characteristics. The EPR is hidden into the medical image using DNA hiding techniques. Huffman encoding is used to compress the DNA encoded secret image, which is then securely shared into shadow images using Shamir secret sharing. Then, the shadows are embedded into a host image using steganographic technique with modular operation. During reconstruction, at least t shadows are pooled to reconstruct the compressed secret image, which is again decoded using Huffman decoding to reveal the DNA encoded secret image. The medical image and EPR are separated using the reverse technique of DNA hiding. The simulation results and the security analysis prove that this method can hide longer EPR strings along with better confidentiality and authenticity. Better PSNR is achieved and the correlation co-efficient shows that this also has the ability of resisting various attacks.

  6. Fano resonance and the hidden order in URu2 Si 2 probed by quasiparticle scattering spectroscopy*

    Science.gov (United States)

    Park, W. K.; Greene, L. H.; Bauer, E. D.; Tobash, P. H.; Ronning, F.; Lu, X.; Sarrao, J. L.; Thompson, J. D.

    2011-03-01

    The nature of the hidden order transition occurring at 17.5 K in URu 2 Si 2 remains puzzling despite intensive investigations over the past two and half decades. Recent experimental and theoretical developments render it a timely subject to probe the hidden order state using quasiparticle tunneling and scattering techniques. We report on the Fano resonance in pure and Rh-doped URu 2 Si 2 single crystals using point-contact spectroscopy. The conductance spectra reproducibly reveal asymmetric double peak structures slightly off-centered around zero bias with the two peaks merging well above the hidden order transition temperature. An analysis using the Fano resonance model in a Kondo lattice [1] shows that the conductance peaks arise from the hybridization gap opening. Our estimated gap size agrees well with those reported from other measurements. We will present experimental results over a wide parameter space including temperature and doping dependences and discuss their underlying physics. M. Maltseva, M. Dzero, and P. Coleman, Phys. Rev. Lett. 103, 206402 (2009). * The work at UIUC is supported by the U.S. DOE under Award Nos. DE-FG02-07ER46453 and DE-AC02-98CH10886, and the work at LANL is carried out under the auspices of the U.S. DOE, Office of Science.

  7. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  8. The perception of the hidden curriculum on medical education: an exploratory study

    Directory of Open Access Journals (Sweden)

    Murakami Manabu

    2009-12-01

    Full Text Available Abstract Background Major curriculum reform of undergraduate medical education occurred during the past decades in the United Kingdom (UK; however, the effects of the hidden curriculum, which influence the choice of primary care as a career, have not been sufficiently recognized. While Japan, where traditionally few institutions systematically foster primary care physicians and very few have truly embraced family medicine as their guiding discipline, has also experienced meaningful curriculum reform, the effect of the hidden curriculum is not well known. The aim of this study is to identify themes pertaining to the students' perceptions of the hidden curriculum affecting undergraduate medical education in bedside learning in Japan. Methods Semi-structured interviews with thematic content analysis were implemented. Undergraduate year-5 students from a Japanese medical school at a Japanese teaching hospital were recruited. Interview were planned to last between 30 to 60 minutes each, over an 8-month period in 2007. The interviewees' perceptions concerning the quality of teaching in their bedside learning and related experiences were collected and analysed thematically. Results Twenty five medical students (18 males and 7 females, mean age 25 years old consented to participate in the interviews, and seven main themes emerged: "the perception of education as having a low priority," "the prevalence of positive/negative role models," "the persistence of hierarchy and exclusivity," "the existence of gender issues," "an overburdened medical knowledge," "human relationships with colleagues and medical team members," and "first experience from the practical wards and their patients." Conclusions Both similarities and differences were found when comparing the results to those of previous studies in the UK. Some effects of the hidden curriculum in medical education likely exist in common between the UK and Japan, despite the differences in their demographic

  9. 16 CFR 1611.34 - Only uncovered or exposed parts of wearing apparel to be tested.

    Science.gov (United States)

    2010-01-01

    ... apparel to be tested. 1611.34 Section 1611.34 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION... § 1611.34 Only uncovered or exposed parts of wearing apparel to be tested. In determining whether an... uncovered or exposed part of such article of wearing apparel shall be tested according to the...

  10. 77 FR 30501 - Uncovered Innerspring Units From the People's Republic of China: Initiation of Anticircumvention...

    Science.gov (United States)

    2012-05-23

    ... Innerspring Units From South Africa and Vietnam, USITC Pub. 4051, Inv. Nos. 731-TA-1141-1142 at I-11 (December... International Trade Administration Uncovered Innerspring Units From the People's Republic of China: Initiation... units from the People's Republic of China (``PRC'').\\1\\ \\1\\ See Uncovered Innerspring Units From...

  11. Reputation and competition in a hidden action model.

    Directory of Open Access Journals (Sweden)

    Alessandro Fedele

    Full Text Available The economics models of reputation and quality in markets can be classified in three categories. (i Pure hidden action, where only one type of seller is present who can provide goods of different quality. (ii Pure hidden information, where sellers of different types have no control over product quality. (iii Mixed frameworks, which include both hidden action and hidden information. In this paper we develop a pure hidden action model of reputation and Bertrand competition, where consumers and firms interact repeatedly in a market with free entry. The price of the good produced by the firms is contractible, whilst the quality is noncontractible, hence it is promised by the firms when a contract is signed. Consumers infer future quality from all available information, i.e., both from what they know about past quality and from current prices. According to early contributions, competition should make reputation unable to induce the production of high-quality goods. We provide a simple solution to this problem by showing that high quality levels are sustained as an outcome of a stationary symmetric equilibrium.

  12. Reputation and competition in a hidden action model.

    Science.gov (United States)

    Fedele, Alessandro; Tedeschi, Piero

    2014-01-01

    The economics models of reputation and quality in markets can be classified in three categories. (i) Pure hidden action, where only one type of seller is present who can provide goods of different quality. (ii) Pure hidden information, where sellers of different types have no control over product quality. (iii) Mixed frameworks, which include both hidden action and hidden information. In this paper we develop a pure hidden action model of reputation and Bertrand competition, where consumers and firms interact repeatedly in a market with free entry. The price of the good produced by the firms is contractible, whilst the quality is noncontractible, hence it is promised by the firms when a contract is signed. Consumers infer future quality from all available information, i.e., both from what they know about past quality and from current prices. According to early contributions, competition should make reputation unable to induce the production of high-quality goods. We provide a simple solution to this problem by showing that high quality levels are sustained as an outcome of a stationary symmetric equilibrium. PMID:25329387

  13. Hidden Gauge Structure of Supersymmetric Free Differential Algebras

    CERN Document Server

    Andrianopoli, L; Ravera, L

    2016-01-01

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q' introduced in Ref. [3] and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B^(2) and B^(3) in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of t...

  14. Efficient Quantum Algorithm for the Hidden Parabola Problem

    CERN Document Server

    Decker, T; Decker, Thomas; Wocjan, Pawel

    2007-01-01

    We introduce the Hidden Polynomial Function Graph Problem as a natural generalization of the abelian Hidden Subgroup Problem (HSP) over groups of the form Z_p x Z_p, where the hidden subgroups are generated by (1,a) for different a in Z_p. These subgroups and their cosets correspond to graphs of linear functions on Z_p. For the Hidden Polynomial Function Graph Problem the functions are not restricted to be linear but can also be polynomial functions of degree n >= 2. Analogously to the HSP, for a fixed degree n the Hidden Polynomial Function Graph Problem is hard on a classical computer as its query complexity is polynomial in p. To solve this problem on a quantum computer in time polylogarithmic in p, we first reduce it to a quantum state identification problem and then we use the pretty good measurement (PGM) approach to construct measurements for distinguishing the states. We relate the success probability and implementation of the PGM to a certain classical problem involving polynomial equations. We prese...

  15. Is Financial Development a Factor to the Leading Growth Profile of the South African Economy? Measuring and Uncovering the Hidden Secret

    OpenAIRE

    Abdulkadir Abdulrashid Rafindadi; Zarinah Yusof

    2013-01-01

    This paper investigates the factors contributing to the formidable growth rate of the South African economy. Specifically, we determine whether the leading role of the South African economy in the Sub- Saharan African region is a result of its sophisticated and resilient financial sector development. If not, the paper tries to identify the possible explanations for the country’s economic growth profile in recent times. From a series of empirical findings, the paper assesses the factor(s) th...

  16. A hidden efficacy of seemingly unproductive production

    Science.gov (United States)

    Kapur, Manu

    Contrary to the fairly established notion in the learning sciences that un-scaffolded, ill-structured problem-solving processes rarely lead to meaningful learning, this study reports a hidden efficacy of such processes in a synchronous, computer-supported, collaborative learning (CSCL) environment. A contrasting-case, double-transfer design investigated the effect of problem type (well- vs. ill-structured problems in Newtonian Kinematics) on collaborative processes and outcomes as well as the transfer of problem-solving skills to the individual. N = 104 triads of 11th-grade science students were randomly assigned to solve either well- or ill-structured problems. Thereafter, all participants individually solved well-structured problems followed by ill-structured problems. Findings suggested that compared to well-structured problem-solving groups, ill-structured problem-solving groups struggled with defining the problem and spent much of their sustained interactional effort around problem critiquing and solution evaluation within a discussion that was highly complex, chaotic, and divergent. As such, they found it difficult to converge on the causes of the problem, set appropriate criteria for a solution, and develop a solution, which, in turn, decreased their group performance. Thus, on many counts, production in ill-structured problem-solving groups seemed unproductive when compared to production in well-structured problem-solving groups. Notwithstanding, the contrasting-case, double-transfer design of this study provided participants in the ill-structured condition with an opportunity to spontaneously contrast the ill-structured problems that they had solved in groups with the well-structured problems they solved on an individual basis afterwards. This contrast helped them separate the relevant from the irrelevant components of ill-structured problems, thereby facilitating a spontaneous transfer of problem-solving skills, which, in the absence of the contrast

  17. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  18. Charting the Vasculome: Uncovering the Principles of Vascular Organization

    Science.gov (United States)

    Oppenheim, Jacob; Magnasco, Marcelo

    2014-03-01

    The efficient distribution of resources in any system requires a carefully designed architecture that is both space filling and efficient. While the principles of such networks are beginning to be uncovered in plants, they remain poorly elucidated in the case of higher animals. We have developed a high-throughput, easily implemented method of mapping vascular networks in mammalian tissue. By combining high resolution, rapid fluorescence blockface imaging with serial sectioning, we are able to map the vasculature of the rat liver at a resolution of 10 microns, revealing the structure above the level of the capillaries, constituting the largest vascular dataset yet assembled. We have developed algorithms for the efficient three-dimensional reconstruction from two-dimensional images, allowing skeletonization and investigation of its geometry and topology. We are able to calculate the scaling properties of these networks as well as the frequency of loops at each level. Using sophisticated topological tools, we are beginning to elucidate the principles of their organization. Ultimately, a greater understanding of vasculature is necessary for the success of efforts in synthetic and regenerative biology along with the better understanding of the growth and development of cancers.

  19. Uncovering patterns of technology use in consumer health informatics.

    Science.gov (United States)

    Hung, Man; Conrad, Jillian; Hon, Shirley D; Cheng, Christine; Franklin, Jeremy D; Tang, Philip

    2013-11-01

    Internet usage and accessibility has grown at a staggering rate, influencing technology use for healthcare purposes. The amount of health information technology (Health IT) available through the Internet is immeasurable and growing daily. Health IT is now seen as a fundamental aspect of patient care as it stimulates patient engagement and encourages personal health management. It is increasingly important to understand consumer health IT patterns including who is using specific technologies, how technologies are accessed, factors associated with use, and perceived benefits. To fully uncover consumer patterns it is imperative to recognize common barriers and which groups they disproportionately affect. Finally, exploring future demand and predictions will expose significant opportunities for health IT. The most frequently used health information technologies by consumers are gathering information online, mobile health (mHealth) technologies, and personal health records (PHRs). Gathering health information online is the favored pathway for healthcare consumers as it is used by more consumers and more frequently than any other technology. In regard to mHealth technologies, minority Americans, compared with White Americans utilize social media, mobile Internet, and mobile applications more frequently. Consumers believe PHRs are the most beneficial health IT. PHR usage is increasing rapidly due to PHR integration with provider health systems and health insurance plans. Key issues that have to be explicitly addressed in health IT are privacy and security concerns, health literacy, unawareness, and usability. Privacy and security concerns are rated the number one reason for the slow rate of health IT adoption.

  20. Uncovering Cryptic Parasitoid Diversity in Horismenus (Chalcidoidea, Eulophidae.

    Directory of Open Access Journals (Sweden)

    Sarah G Kenyon

    Full Text Available Horismenus parasitoids are an abundant and understudied group of eulophid wasps found mainly in the New World. Recent surveys based on morphological analyses in Costa Rica have quadrupled the number of named taxa, with more than 400 species described so far. This recent revision suggests that there is still a vast number of unknown species to be identified. As Horismenus wasps have been widely described as parasitoids of insect pests associated with crop plants, it is of high importance to properly establish the extant diversity of the genus, in order to provide biological control practitioners with an exhaustive catalog of putative control agents. In this study, we first collected Horismenus wasps from wild Phaseolus bean seeds in Central Mexico and Arizona to assess the genetic relatedness of three morphologically distinct species with overlapping host and geographical ranges. Sequence data from two nuclear and two mitochondrial gene regions uncovered three cryptic species within each of the three focal species (i.e., H. missouriensis, H. depressus and H. butcheri. The monophyly of each cryptic group is statistically supported (except in two of them represented by one single tip in which monophyly cannot be tested. The phylogenetic reconstruction is discussed with respect to differences between gene regions as well as likely reasons for the differences in variability between species.

  1. Uncovering the mechanism(s) of deep brain stimulation

    Energy Technology Data Exchange (ETDEWEB)

    Li Gang; Yu Chao; Lin Ling; Lu, Stephen C-Y [Inspiring Technical Laboratory, College of Precision Instruments and Opto-Electronics Engineering, Tianjin University, Tianjin 300072 (China)

    2005-01-01

    Deep brain stimulators, often called 'pacemakers for the brain', are implantable devices which continuously deliver impulse stimulation to specific targeted nuclei of deep brain structure, namely deep brain stimulation (DBS). To date, deep brain stimulation (DBS) is the most effective clinical technique for the treatment of several medically refractory movement disorders (e.g., Parkinson's disease, essential tremor, and dystonia). In addition, new clinical applications of DBS for other neurologic and psychiatric disorders (e.g., epilepsy and obsessive-compulsive disorder) have been put forward. Although DBS has been effective in the treatment of movement disorders and is rapidly being explored for the treatment of other neurologic disorders, the scientific understanding of its mechanisms of action remains unclear and continues to be debated in the scientific community. Optimization of DBS technology for present and future therapeutic applications will depend on identification of the therapeutic mechanism(s) of action. The goal of this review is to address our present knowledge of the effects of high-frequency stimulation within the central nervous system and comment on the functional implications of this knowledge for uncovering the mechanism(s) of DBS.

  2. Uncovering the mechanism(s) of deep brain stimulation

    Science.gov (United States)

    Gang, Li; Chao, Yu; Ling, Lin; C-Y Lu, Stephen

    2005-01-01

    Deep brain stimulators, often called `pacemakers for the brain', are implantable devices which continuously deliver impulse stimulation to specific targeted nuclei of deep brain structure, namely deep brain stimulation (DBS). To date, deep brain stimulation (DBS) is the most effective clinical technique for the treatment of several medically refractory movement disorders (e.g., Parkinson's disease, essential tremor, and dystonia). In addition, new clinical applications of DBS for other neurologic and psychiatric disorders (e.g., epilepsy and obsessive-compulsive disorder) have been put forward. Although DBS has been effective in the treatment of movement disorders and is rapidly being explored for the treatment of other neurologic disorders, the scientific understanding of its mechanisms of action remains unclear and continues to be debated in the scientific community. Optimization of DBS technology for present and future therapeutic applications will depend on identification of the therapeutic mechanism(s) of action. The goal of this review is to address our present knowledge of the effects of high-frequency stimulation within the central nervous system and comment on the functional implications of this knowledge for uncovering the mechanism(s) of DBS.

  3. Uncovering Aberrant Mutant PKA Function with Flow Cytometric FRET

    Directory of Open Access Journals (Sweden)

    Shin-Rong Lee

    2016-03-01

    Full Text Available Biology has been revolutionized by tools that allow the detection and characterization of protein-protein interactions (PPIs. Förster resonance energy transfer (FRET-based methods have become particularly attractive as they allow quantitative studies of PPIs within the convenient and relevant context of living cells. We describe here an approach that allows the rapid construction of live-cell FRET-based binding curves using a commercially available flow cytometer. We illustrate a simple method for absolutely calibrating the cytometer, validating our binding assay against the gold standard isothermal calorimetry (ITC, and using flow cytometric FRET to uncover the structural and functional effects of the Cushing-syndrome-causing mutation (L206R on PKA’s catalytic subunit. We discover that this mutation not only differentially affects PKAcat’s binding to its multiple partners but also impacts its rate of catalysis. These findings improve our mechanistic understanding of this disease-causing mutation, while illustrating the simplicity, general applicability, and power of flow cytometric FRET.

  4. Evidence Feed Forward Hidden Markov Model: A New Type of Hidden Markov Model

    CERN Document Server

    DelRose, Michael; Frederick, Philip; 10.5121/ijaia.2011.2101

    2011-01-01

    The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM), and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important...

  5. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  6. Evidence Feed Forward Hidden Markov Model: A New Type Of Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Michael Del Rose

    2011-01-01

    Full Text Available The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM, and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important in creating intelligent algorithms for determining human actions based on visual observations. The Evidence Feed Forward Hidden Markov Model is a newly developed algorithm which provides observation to observation linkages. The following research addresses the theory behind Evidence Feed Forward HMMs, provides mathematical proofs of their learning of these parameters to optimize the likelihood of observations with a Evidence Feed Forwards HMM, which is important in all computational intelligence algorithm, and gives comparative examples with standard HMMs in classification of both visual action data and measurement data; thus providing a strong base for Evidence Feed Forward HMMs in classification of many types of problems.

  7. Identifying Seismicity Levels via Poisson Hidden Markov Models

    Science.gov (United States)

    Orfanogiannaki, K.; Karlis, D.; Papadopoulos, G. A.

    2010-08-01

    Poisson Hidden Markov models (PHMMs) are introduced to model temporal seismicity changes. In a PHMM the unobserved sequence of states is a finite-state Markov chain and the distribution of the observation at any time is Poisson with rate depending only on the current state of the chain. Thus, PHMMs allow a region to have varying seismicity rate. We applied the PHMM to model earthquake frequencies in the seismogenic area of Killini, Ionian Sea, Greece, between period 1990 and 2006. Simulations of data from the assumed model showed that it describes quite well the true data. The earthquake catalogue is dominated by main shocks occurring in 1993, 1997 and 2002. The time plot of PHMM seismicity states not only reproduces the three seismicity clusters but also quantifies the seismicity level and underlies the degree of strength of the serial dependence of the events at any point of time. Foreshock activity becomes quite evident before the three sequences with the gradual transition to states of cascade seismicity. Traditional analysis, based on the determination of highly significant changes of seismicity rates, failed to recognize foreshocks before the 1997 main shock due to the low number of events preceding that main shock. Then, PHMM has better performance than traditional analysis since the transition from one state to another does not only depend on the total number of events involved but also on the current state of the system. Therefore, PHMM recognizes significant changes of seismicity soon after they start, which is of particular importance for real-time recognition of foreshock activities and other seismicity changes.

  8. Ontology-based Knowledge Extraction from Hidden Web

    Institute of Scientific and Technical Information of China (English)

    SONG Hui; MA Fan-yuan; LIU Xiao-qiang

    2004-01-01

    Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not refer how to make extracted information available for knowledge system. This paper describes a novel approach to build a domain-specific knowledge service with the data retrieved from Hidden Web. Ontology serves to model the domain knowledge. Queries forms of different Web sites are translated into machine-understandable format, defined knowledge concepts, so that they can be accessed automatically. Also knowledge data are extracted from Web pages and organized in ontology format knowledge. The experiment proves the algorithm achieves high accuracy and the system facilitates constructing knowledge services greatly.

  9. The hidden-charm pentaquark and tetraquark states

    Science.gov (United States)

    Chen, Hua-Xing; Chen, Wei; Liu, Xiang; Zhu, Shi-Lin

    2016-06-01

    In the past decade many charmonium-like states were observed experimentally. Especially those charged charmonium-like Zc states and bottomonium-like Zb states cannot be accommodated within the naive quark model. These charged Zc states are good candidates of either the hidden-charm tetraquark states or molecules composed of a pair of charmed mesons. Recently, the LHCb Collaboration discovered two hidden-charm pentaquark states, which are also beyond the quark model. In this work, we review the current experimental progress and investigate various theoretical interpretations of these candidates of the multiquark states. We list the puzzles and theoretical challenges of these models when confronted with the experimental data. We also discuss possible future measurements which may distinguish the theoretical schemes on the underlying structures of the hidden-charm multiquark states.

  10. Detection and tracking of moving objects hidden from view

    Science.gov (United States)

    Gariepy, Genevieve; Tonolini, Francesco; Henderson, Robert; Leach, Jonathan; Faccio, Daniele

    2016-01-01

    The ability to detect motion and track a moving object hidden around a corner or behind a wall provides a crucial advantage when physically going around the obstacle is impossible or dangerous. Previous methods have demonstrated that it is possible to reconstruct the shape of an object hidden from view. However, these methods do not enable the tracking of movement in real time. We demonstrate a compact non-line-of-sight laser ranging technology that relies on the ability to send light around an obstacle using a scattering floor and then detect the return signal from a hidden object within only a few seconds of acquisition time. By detecting this signal with a single-photon avalanche diode (SPAD) camera, we follow the movement of an object located a metre away from the camera with centimetre precision. We discuss the possibility of applying this technology to a variety of real-life situations in the near future.

  11. Recent Progress in Search for Hidden/Dark Photon

    CERN Document Server

    Deliyergiyev, M A

    2015-01-01

    We will try to communicate the many difficulties that we encounter when attempting to pinpoint a common origin for the several observed anomalies, or assessing their tension with existing exclusion limits. These include systematics affecting the operation of the detectors, our knowledge of their response, astrophysical uncertainties, and the broad range of particle couplings that can mediate the interaction with a detector target. The interesting astrophysical evidence that motivates a search for dark-photon and focuses our attention on a Hidden Valleys model with a GeV-scale dark sector that produces the exciting signatures, which may include the possible constituent of dark matter, the possible existence of extra gauge groups. Results from the recent underground experiments are also considered. Many models of new physics beyond the Standard Model contain a 'light' hidden sector (dark sector) with a colorful spectrum of new particles. Recently, it has been shown that the hidden sector can give rise to unique...

  12. Unveiling hidden black holes in the cosmic web: Dark matter halos of WISE quasars from Planck CMB lensing

    Science.gov (United States)

    Hickox, Ryan

    The WISE and Planck surveys have now produced groundbreaking data sets which, in concert, can be exploited to obtain revolutionary constraints on the evolution of structure in the Universe. One particularly powerful application of WISE has been to uncover millions of the previously "hidden" obscured quasars, rapidly growing supermassive black holes that are shrouded in gas and dust and so are not detectable using traditional ground-based optical and near-IR techniques. Recently, Planck has produced the most precise all-sky map to date of dark matter structures via the lensing of the cosmic microwave background (CMB). We propose to combine these data sets to obtain a uniquely powerful measurement of the link between rapidly growing black holes and their host dark matter structures, by cross-correlating the density field of WISE-selected quasars with the CMB lensing convergence maps obtained from Planck. This proposal will build on our current ADAP program (NNX12AE38G), which studies the host dark matter halos of WISE-selected quasars via spatial clustering. NNX12AE38G involves a detailed characterization of the redshifts, luminosities, and spectral energy distributions of WISE-selected quasars and uses new techniques to measure how quasars cluster around themselves. NNX12AE38G has contributed to more than 10 journal articles and 5 conference proceedings. Building on our current work, an even more complete understanding of the link between black holes and their host dark matter structures is possible if we employ an independent method for measuring the clustering bias (and thus characteristic halo mass) of the quasar population. This has recently become possible using CMB lensing maps. In the past two years, our team has conducted an initial analysis covering 2500 square degrees using WISE-selected quasars and lensing maps from the South Pole Telescope (Geach, Hickox, Myers et al., 2013), and have implemented this technique with Planck over part of the SDSS region

  13. Reheating the Standard Model from a Hidden Sector

    CERN Document Server

    Tenkanen, Tommi

    2016-01-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before Big Bang Nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful Big Bang Nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  14. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    CERN Document Server

    Feintzeig, Benjamin H

    2016-01-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  15. Backward causation, hidden variables and the meaning of completeness

    Indian Academy of Sciences (India)

    Huw Price

    2001-02-01

    Bell’s theorem requires the assumption that hidden variables are independent of future measurement settings. This independence assumption rests on surprisingly shaky ground. In particular, it is puzzlingly time-asymmetric. The paper begins with a summary of the case for considering hidden variable models which, in abandoning this independence assumption, allow a degree of ‘backward causation’. The remainder of the paper clarifies the physical significance of such models, in relation to the issue as to whether quantum mechanics provides a complete description of physical reality.

  16. Dynamically Generated Open and Hidden Charm Meson Systems

    CERN Document Server

    Gamermann, D; Strottman, D D; Vacas, M J V

    2006-01-01

    The lowest order chiral Lagrangian successfully applied to study the interaction of the SU(3) octet of pseudo-scalar mesons is generalized to include all mesons from the SU(4) 15-plet of pseudo-scalar mesons. Exchanges of heavy vector mesons, which are indirectly taken into account via this approach, are suppressed. Unitarization in coupled channels leads to dynamical generation of resonances in the open and hidden charm sectors. In particular, for reasonable values of the input, a new narrow scalar resonance in the hidden charm sector appears with a mass of 3.7 GeV.

  17. Limit Theorems for the Sample Entropy of Hidden Markov Chains

    CERN Document Server

    Han, Guangyue

    2011-01-01

    The Shannon-McMillan-Breiman theorem asserts that the sample entropy of a stationary and ergodic stochastic process converges to the entropy rate of the same process almost surely. In this paper, we focus our attention on the convergence behavior of the sample entropy of a hidden Markov chain. Under certain positivity assumption, we prove that a central limit theorem (CLT) with some Berry-Esseen bound for the sample entropy of a hidden Markov chain, and we use this CLT to establish a law of iterated logarithm (LIL) for the sample entropy.

  18. Entropy rate of continuous-state hidden Markov chains

    OpenAIRE

    Han, G; Marcus, B

    2010-01-01

    We prove that under mild positivity assumptions, the entropy rate of a continuous-state hidden Markov chain, observed when passing a finite-state Markov chain through a discrete-time continuous-output channel, is analytic as a function of the transition probabilities of the underlying Markov chain. We further prove that the entropy rate of a continuous-state hidden Markov chain, observed when passing a mixing finite-type constrained Markov chain through a discrete-time Gaussian channel, is sm...

  19. A classical theory of continuous spin and hidden gauge invariance

    International Nuclear Information System (INIS)

    We present a classical higher derivative point particle theory whose quantization gives Wigner's continuous spin representation of the Poincare group. Although the theory is not reparameterization invariant in the usual sense, it does possess a hidden gauge invariance that provides a non-local representation of the reparameterization group. The Hamiltonian of the theory does not vanish and its value is the continuous spin parameter. The theory presented here represents the simplest example of a wide class of higher derivative theories possessing a hidden gauge invariance

  20. A classical theory of continuous spin and hidden gauge invariance

    Energy Technology Data Exchange (ETDEWEB)

    Zoller, D.

    1991-01-01

    We present a classical higher derivative point particle theory whose quantization gives Wigner's continuous spin representation of the Poincare group. Although the theory is not reparameterization invariant in the usual sense, it does possess a hidden gauge invariance that provides a non-local representation of the reparameterization group. The Hamiltonian of the theory does not vanish and its value is the continuous spin parameter. The theory presented here represents the simplest example of a wide class of higher derivative theories possessing a hidden gauge invariance.

  1. A classical theory of continuous spin and hidden gauge invariance

    Energy Technology Data Exchange (ETDEWEB)

    Zoller, D.

    1991-12-31

    We present a classical higher derivative point particle theory whose quantization gives Wigner`s continuous spin representation of the Poincare group. Although the theory is not reparameterization invariant in the usual sense, it does possess a hidden gauge invariance that provides a non-local representation of the reparameterization group. The Hamiltonian of the theory does not vanish and its value is the continuous spin parameter. The theory presented here represents the simplest example of a wide class of higher derivative theories possessing a hidden gauge invariance.

  2. The hidden opportunity cost of time effect on intertemporal choice

    Directory of Open Access Journals (Sweden)

    Cui-Xia eZhao

    2015-03-01

    Full Text Available An interesting phenomenon called hidden opportunity cost of time effect was detected in intertemporal choices. The majority of our participants preferred the smaller but sooner (SS option to the larger but later (LL option if opportunity cost was explicit. However, a higher proportion of participants preferred the LL to SS option if opportunity cost was hidden. This shift violates the invariance principle and opens a new way to encourage future-oriented behavior. By simply mentioning the ‘obvious’ opportunity cost of alternatives, decision makers can be more informed in prioritizing their long-term goals rather than short-term goals.

  3. The hidden opportunity cost of time effect on intertemporal choice.

    Science.gov (United States)

    Zhao, Cui-Xia; Jiang, Cheng-Ming; Zhou, Lei; Li, Shu; Rao, Li-Lin; Zheng, Rui

    2015-01-01

    An interesting phenomenon called "hidden opportunity cost of time effect" was detected in intertemporal choices. The majority of our participants preferred the smaller but sooner (SS) option to the larger but later (LL) option if opportunity cost was explicit. However, a higher proportion of participants preferred the LL to SS option if opportunity cost was hidden. This shift violates the invariance principle and opens a new way to encourage future-oriented behavior. By simply mentioning the "obvious" opportunity cost of alternatives, decision makers can be more informed in prioritizing their long-term goals rather than short-term goals. PMID:25870570

  4. The Function and the Utilization of Hidden Curriculum in College English Teaching

    Institute of Scientific and Technical Information of China (English)

    张英

    2013-01-01

    Explore the nature of the hidden curriculum, and utilize the positive functions of hidden curriculum with theory on English teaching and psychological linguistics to obtain desirable effects in College English teaching.

  5. 78 FR 17744 - Culturally Significant Objects Imported for Exhibition Determinations: “Maya: Hidden Worlds...

    Science.gov (United States)

    2013-03-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Culturally Significant Objects Imported for Exhibition Determinations: ``Maya: Hidden Worlds Revealed... determine that the objects to be included in the exhibition ``Maya: Hidden Worlds Revealed,'' imported...

  6. Next generation sequencing reveals the hidden diversity of zooplankton assemblages.

    Directory of Open Access Journals (Sweden)

    Penelope K Lindeque

    Full Text Available BACKGROUND: Zooplankton play an important role in our oceans, in biogeochemical cycling and providing a food source for commercially important fish larvae. However, difficulties in correctly identifying zooplankton hinder our understanding of their roles in marine ecosystem functioning, and can prevent detection of long term changes in their community structure. The advent of massively parallel next generation sequencing technology allows DNA sequence data to be recovered directly from whole community samples. Here we assess the ability of such sequencing to quantify richness and diversity of a mixed zooplankton assemblage from a productive time series site in the Western English Channel. METHODOLOGY/PRINCIPLE FINDINGS: Plankton net hauls (200 µm were taken at the Western Channel Observatory station L4 in September 2010 and January 2011. These samples were analysed by microscopy and metagenetic analysis of the 18S nuclear small subunit ribosomal RNA gene using the 454 pyrosequencing platform. Following quality control a total of 419,041 sequences were obtained for all samples. The sequences clustered into 205 operational taxonomic units using a 97% similarity cut-off. Allocation of taxonomy by comparison with the National Centre for Biotechnology Information database identified 135 OTUs to species level, 11 to genus level and 1 to order, <2.5% of sequences were classified as unknowns. By comparison a skilled microscopic analyst was able to routinely enumerate only 58 taxonomic groups. CONCLUSIONS: Metagenetics reveals a previously hidden taxonomic richness, especially for Copepoda and hard-to-identify meroplankton such as Bivalvia, Gastropoda and Polychaeta. It also reveals rare species and parasites. We conclude that Next Generation Sequencing of 18S amplicons is a powerful tool for elucidating the true diversity and species richness of zooplankton communities. While this approach allows for broad diversity assessments of plankton it may

  7. The one-way communication complexity of the Boolean Hidden Matching Problem

    CERN Document Server

    Kerenidis, I; Kerenidis, Iordanis; Raz, Ran

    2006-01-01

    We give a tight lower bound of Omega(\\sqrt{n}) for the randomized one-way communication complexity of the Boolean Hidden Matching Problem [BJK04]. Since there is a quantum one-way communication complexity protocol of O(\\log n) qubits for this problem, we obtain an exponential separation of quantum and classical one-way communication complexity for partial functions. A similar result was independently obtained by Gavinsky, Kempe, de Wolf [GKdW06]. Our lower bound is obtained by Fourier analysis, using the Fourier coefficients inequality of Kahn Kalai and Linial [KKL88].

  8. A Novel Framework for the Identification and Analysis of Duplicons between Human and Chimpanzee

    Science.gov (United States)

    Chuang, Trees-Juen; Wu, Shian-Zu

    2013-01-01

    Human and other primate genomes consist of many segmental duplications (SDs) due to fixation of copy number variations (CNVs). Structure of these duplications within the human genome has been shown to be a complex mosaic composed of juxtaposed subunits (called duplicons). These duplicons are difficult to be uncovered from the mosaic repeat structure. In addition, the distribution and evolution of duplicons among primates are still poorly investigated. In this paper, we develop a statistical framework for discovering duplicons via integration of a Hidden Markov Model (HMM) and a permutation test. Our comparative analysis indicates that the mosaic structure of duplicons is common in CNV/SD regions of both human and chimpanzee genomes, and a subset of core duplicons is shared by the majority of CNVs/SDs. Phylogenetic analyses using duplicons suggested that most CNVs/SDs share common duplication ancestry. Many human/chimpanzee duplicons flank both ends of CNVs, which may be hotspots of nonallelic homologous recombination. PMID:23984331

  9. A Novel Framework for the Identification and Analysis of Duplicons between Human and Chimpanzee

    Directory of Open Access Journals (Sweden)

    Trees-Juen Chuang

    2013-01-01

    duplications (SDs due to fixation of copy number variations (CNVs. Structure of these duplications within the human genome has been shown to be a complex mosaic composed of juxtaposed subunits (called duplicons. These duplicons are difficult to be uncovered from the mosaic repeat structure. In addition, the distribution and evolution of duplicons among primates are still poorly investigated. In this paper, we develop a statistical framework for discovering duplicons via integration of a Hidden Markov Model (HMM and a permutation test. Our comparative analysis indicates that the mosaic structure of duplicons is common in CNV/SD regions of both human and chimpanzee genomes, and a subset of core duplicons is shared by the majority of CNVs/SDs. Phylogenetic analyses using duplicons suggested that most CNVs/SDs share common duplication ancestry. Many human/chimpanzee duplicons flank both ends of CNVs, which may be hotspots of nonallelic homologous recombination.

  10. Convergence in distribution for filtering processes associated to Hidden Markov Models with densities

    OpenAIRE

    Kaijser, Thomas

    2013-01-01

    A Hidden Markov Model generates two basic stochastic processes, a Markov chain, which is hidden, and an observation sequence. The filtering process of a Hidden Markov Model is, roughly speaking, the sequence of conditional distributions of the hidden Markov chain that is obtained as new observations are received. It is well-known, that the filtering process itself, is also a Markov chain. A classical, theoretical problem is to find conditions which implies that the distributions of the filter...

  11. A general hidden variable model for the two-qubits system

    OpenAIRE

    Ghirardi, GianCarlo; Romano, Raffaele

    2012-01-01

    We generalize Bell's hidden variable model describing the singlet state of a two-qubits system by extending it to arbitrary states and observables. As in the original work, we assume a uniform, state-independent probability distribution for the hidden variables which are identified with the unit vectors of a 3-dimensional real space. By slightly modifying our model, we provide also a minimal hidden variable description of the two-qubits system, relying on a single hidden variable. We discuss ...

  12. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    Indian Academy of Sciences (India)

    H Itoh; N Okada; T Yamashita

    2007-11-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden.

  13. The Hidden Curriculum of Youth Policy: A Dutch Example

    NARCIS (Netherlands)

    Hopman, M.; De Winter, M.; Koops, W.

    2014-01-01

    Youth policy is more than a mere response to the actual behavior of children, but it is equally influenced by values and beliefs of policy makers. These values are however rarely made explicit and, therefore, the authors refer to them as “the hidden curriculum” of youth policy. The study investigati

  14. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  15. Search for dark photons from supersymmetric hidden valleys

    NARCIS (Netherlands)

    V.M. Abazov; . et al; L.S. Ancu; S.J. de Jong; F. Filthaut; C.F. Galea; J.G. Hegeman; P. Houben; M.M. Meijer; P. Svoisky; P.J. van den Berg; W.M. van Leeuwen

    2009-01-01

    We search for a new light gauge boson, a dark photon, with the D0 experiment. In the model we consider, supersymmetric partners are pair produced and cascade to the lightest neutralinos that can decay into the hidden sector state plus either a photon or a dark photon. The dark photon decays through

  16. Optical Test of Local Hidden-Variable Model

    Institute of Scientific and Technical Information of China (English)

    WU XiaoHua; ZONG HongShi; PANG HouRong

    2001-01-01

    An inequality is deduced from local realism and a supplementary assumption. This inequality defines an experiment that can be actually performed with the present technology to test local hidden-variable models, and it is violated by quantum mechanics with a factor 1.92, while it can be simplified into a form where just two measurements are required.``

  17. Thermoelectric generator hidden in a shirt with a fabric radiator

    Science.gov (United States)

    Leonov, Vladimir; Vullers, Ruud J. M.; Hoof, Chris Van

    2012-06-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers of a shirt and its characteristics are reported.

  18. Predicting DataSpace Retrieval Using Probabilistic Hidden Information

    Science.gov (United States)

    Fanzou Tchuissang, Gile Narcisse; Wang, Ning; Kuicheu, Nathalie Cindy; Siewe, Francois; Xu, De; Liu, Shuoyan

    This paper discusses the issues involved in the design of a complete information retrieval system for DataSpace based on user relevance probabilistic schemes. First, Information Hidden Model (IHM) is constructed taking into account the users' perception of similarity between documents. The system accumulates feedback from the users and employs it to construct user oriented clusters. IHM allows integrating uncertainty over multiple, interdependent classifications and collectively determines the most likely global assignment. Second, Three different learning strategies are proposed, namely query-related UHH, UHB and UHS (User Hidden Habit, User Hidden Background, and User Hidden keyword Semantics) to closely represent the user mind. Finally, the probability ranking principle shows that optimum retrieval quality can be achieved under certain assumptions. An optimization algorithm to improve the effectiveness of the probabilistic process is developed. We first predict the data sources where the query results could be found. Therefor, compared with existing approaches, our precision of retrieval is better and do not depend on the size and the DataSpace heterogeneity.

  19. Approximation of stationary processes by hidden Markov models

    NARCIS (Netherlands)

    L. Finesso; A. Grassi; P. Spreij

    2010-01-01

    Stochastic realization is still an open problem for the class of hidden Markov models (HMM): given the law Q of an HMM find a finite parametric description of it. Fifty years after the introduction of HMMs, no computationally effective realization algorithm has been proposed. In this paper we direct

  20. Multistability and hidden attractors in a relay system with hysteresis

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.;

    2015-01-01

    For nonlinear dynamic systems with switching control, the concept of a "hidden attractor" naturally applies to a stable dynamic state that either (1) coexists with the stable switching cycle or (2), if the switching cycle is unstable, has a basin of attraction that does not intersect with the nei...

  1. Incompleteness of Representation Theory: Hidden Symmetries and Quantum Nonintegrability

    International Nuclear Information System (INIS)

    Representation theory is shown to be incomplete in terms of enumerating all integrable limits of quantum systems. As a consequence, one can find exactly solvable Hamiltonians which have apparently strongly broken symmetry. The number of these hidden symmetries depends upon the realization of the Hamiltonian. copyright 1997 The American Physical Society

  2. Local hidden-variable models and negative-probability measures

    OpenAIRE

    Cereceda, Jose L.

    2000-01-01

    Elaborating on a previous work by Han et al., we give a general, basis-independent proof of the necessity of negative probability measures in order for a class of local hidden-variable (LHV) models to violate the Bell-CHSH inequality. Moreover, we obtain general solutions for LHV-induced probability measures that reproduce any consistent set of probabilities.

  3. Hidden, Unacknowledged, Acquaintance, and Date Rape: Looking Back, Looking Forward

    Science.gov (United States)

    Koss, Mary P.

    2011-01-01

    In this commentary, the author reflects on two articles that have been among the most highly cited publications in "Psychology of Women Quarterly" ("PWQ") over its first 35 years, "The Hidden Rape Victim: Personality, Attitudinal, and Situational Characteristics" (Koss, 1985) and "Stranger and Acquaintance Rape: Are There Differences in the…

  4. Is the Hidden Curriculum a Relevant Issue in Educational Processes

    Directory of Open Access Journals (Sweden)

    Patarroyo Esther

    2004-08-01

    Full Text Available This paper explores some ideas about the hidden curriculum as an amount of ideas and beliefs which are implicit in an indirect way into the scholar life. Those ideas are regarding to gender equality, social status and racial difference, among others. We consider teachers are able to integrate the hidden curriculum as a pedagogical strategy in the classroom. Examples of integration include activities such as observation techniques, role-plays, peer modeling and particularly, the portfolio as a useful tool for reflection which reveals the hidden curriculum. Key words: Hidden Curriculum, Pedagogical Strategy, Portfolio, ELT Processes, Stereotypes Este documento explora algunas ideas acerca del currículo oculto como una suma de ideas y creencias que están implícitos de una forma indirecta dentro de la vida escolar. Estas ideas están relacionadas con la equidad de género, diferencias sociales y raciales, entre otros. Consideramos que es posible para los docentes integrar el currículo como estrategia pedagógica en el aula. Ejemplos de esta integración incluyen técnicas de observación, juegos de roles, modelamiento en parejas y particularmente, el portafolio como herramienta de reflexión que permita hacer evidente el currículo oculto. Palabras claves: Currículo Oculto, Estrategia Pedagógica, Estereotipos, Enseñanza de Inglés, Portafolio

  5. Family number, Wilson line phases and hidden supersymmetry

    CERN Document Server

    Goto, Yuhei; Miura, Takashi

    2014-01-01

    We study the relationship between the family number of chiral fermions and the Wilson line phases, based on the orbifold family unification. We find that flavor numbers are independent of the Wilson line phases relating extra-dimensional components of gauge bosons, as far as the standard model gauge symmetry is respected. This feature originates from a hidden quantum-mechanical supersymmetry.

  6. Discriminative training of self-structuring hidden control neural models

    DEFF Research Database (Denmark)

    Sørensen, Helge Bjarup Dissing; Hartmann, Uwe; Hunnerup, Preben

    1995-01-01

    This paper presents a new training algorithm for self-structuring hidden control neural (SHC) models. The SHC models were trained non-discriminatively for speech recognition applications. Better recognition performance can generally be achieved, if discriminative training is applied instead. Thus...

  7. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a techniqu

  8. Hunting for exotic doubly hidden-charm/bottom tetraquark states

    CERN Document Server

    Chen, Wei; Liu, Xiang; Steele, T G; Zhu, Shi-Lin

    2016-01-01

    We extend a moment QCD sum rule method to study the existence of exotic doubly hidden-charm/bottom tetraquark states made of four heavy quarks. Using the compact diquark-antidiquark configuration, we calculate the mass spectra of these tetraquark states. There are 18 hidden-charm $cc\\bar c\\bar c$ tetraquark currents with $J^{PC} = 0^{++}$, $0^{-+}$, $0^{--}$, $1^{++}$, $1^{+-}$, $1^{-+}$, $1^{--}$, and $2^{++}$. We use them to perform QCD sum rule analyses, and the obtained masses are all higher than the spontaneous dissociation thresholds of two charmonium mesons, which are thus their dominant decay modes. The masses of the corresponding hidden-bottom $bb\\bar b\\bar b$ tetraquarks are all below or very close to the thresholds of the $\\Upsilon(1S)\\Upsilon(1S)$ and $\\eta_b(1S)\\eta_b(1S)$, except one current of $J^{PC}=0^{++}$. Hence, we suggest to search for the doubly hidden-charm states in the $J/\\psi J/\\psi$ and $\\eta_c(1S)\\eta_c(1S)$ channels.

  9. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...

  10. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  11. TeraHertz imaging of hidden paint layers on canvas

    NARCIS (Netherlands)

    Adam, A.J.L.; Planken, P.C.M.; Meloni, S.; Dik, J.

    2009-01-01

    We show terahertz reflection images of hidden paint layers in a painting on canvas and compare the results with X-ray Radiography and Infrared Reflectography. Our terahertz measurements show strong reflections from both the canvas/paint interface and from the raw umber/lead white interface, indicati

  12. Is There Hidden Potential for Rural Population Growth in Sweden?

    Science.gov (United States)

    Niedomysl, Thomas; Amcoff, Jan

    2011-01-01

    Rural depopulation is a concern in many countries, and various policy initiatives have been taken to combat such trends. This article examines whether hidden potential for rural population growth can be found in Sweden. If such potential exists, it implies that the development prospects for many rural areas are not as unpromising as they may seem…

  13. Recognizing Strokes in Tennis Videos Using Hidden Markov Models

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, W.; Zivkovic, Z.

    2001-01-01

    This paper addresses content-based video retrieval with an emphasis on recognizing events in tennis game videos. In particular, we aim at recognizing different classes of tennis strokes using automatic learning capability of Hidden Markov Models. Driven by our domain knowledge, a robust player segme

  14. Bayesian Inference in Hidden Markov Random Fields for Binary Data Defined on Large Lattices

    NARCIS (Netherlands)

    Friel, N.; Pettitt, A.N.; Reeves, R.; Wit, E.

    2009-01-01

    Hidden Markov random fields represent a complex hierarchical model, where the hidden latent process is an undirected graphical structure. Performing inference for such models is difficult primarily because the likelihood of the hidden states is often unavailable. The main contribution of this articl

  15. 78 FR 65711 - Uncovered Innerspring Units From China, South Africa, and Vietnam Institution of Five-Year Reviews

    Science.gov (United States)

    2013-11-01

    ... orders on imports of uncovered innerspring units from South Africa and Vietnam (73 FR 75390 and 75391... uncovered innerspring units from China (74 FR 7661). The Commission is conducting reviews to determine... COMMISSION Uncovered Innerspring Units From China, South Africa, and Vietnam Institution of Five-Year...

  16. LDA Based Face Recognition by Using Hidden Markov Model in Current Trends

    Directory of Open Access Journals (Sweden)

    S.Sharavanan

    2009-10-01

    Full Text Available Hidden Markov model (HMM is a promising method that works well for images with variations in lighting, facial expression, and orientation. Face recognition draws attention as a complex task due to noticeable changes produced on appearance by illumination, facial expression, size, orientation and other external factors. To process images using HMM, the temporal or space sequences are to be considered. In simple terms HMM can be defined as set of finite states with associated probability distributions. Only the outcome is visible to the external user not the states and hence the name Hidden Markov Model. The paper deals with various techniques and methodologies used for resolving the problem .We discuss about appearance based, feature based, model based and hybrid methods for face identification. Conventional techniques such as Principal Component Analysis (PCA, Linear Discriminant Analysis (LDA, Independent Component Analysis (ICA, and feature based Elastic Bunch Graph Matching (EBGM and 2D and 3D face models are well-known for face detection and recognition.

  17. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  18. Parsing social network survey data from hidden populations using stochastic context-free grammars.

    Directory of Open Access Journals (Sweden)

    Art F Y Poon

    Full Text Available BACKGROUND: Human populations are structured by social networks, in which individuals tend to form relationships based on shared attributes. Certain attributes that are ambiguous, stigmatized or illegal can create a OhiddenO population, so-called because its members are difficult to identify. Many hidden populations are also at an elevated risk of exposure to infectious diseases. Consequently, public health agencies are presently adopting modern survey techniques that traverse social networks in hidden populations by soliciting individuals to recruit their peers, e.g., respondent-driven sampling (RDS. The concomitant accumulation of network-based epidemiological data, however, is rapidly outpacing the development of computational methods for analysis. Moreover, current analytical models rely on unrealistic assumptions, e.g., that the traversal of social networks can be modeled by a Markov chain rather than a branching process. METHODOLOGY/PRINCIPAL FINDINGS: Here, we develop a new methodology based on stochastic context-free grammars (SCFGs, which are well-suited to modeling tree-like structure of the RDS recruitment process. We apply this methodology to an RDS case study of injection drug users (IDUs in Tijuana, México, a hidden population at high risk of blood-borne and sexually-transmitted infections (i.e., HIV, hepatitis C virus, syphilis. Survey data were encoded as text strings that were parsed using our custom implementation of the inside-outside algorithm in a publicly-available software package (HyPhy, which uses either expectation maximization or direct optimization methods and permits constraints on model parameters for hypothesis testing. We identified significant latent variability in the recruitment process that violates assumptions of Markov chain-based methods for RDS analysis: firstly, IDUs tended to emulate the recruitment behavior of their own recruiter; and secondly, the recruitment of like peers (homophily was dependent on

  19. AdS/QCD approach to the scale-invariant extension of the standard model with a strongly interacting hidden sector

    Science.gov (United States)

    Hatanaka, Hisaki; Jung, Dong-Won; Ko, Pyungwon

    2016-08-01

    In this paper, we revisit a scale-invariant extension of the standard model (SM) with a strongly interacting hidden sector within AdS/QCD approach. Using the AdS/QCD, we reduce the number of input parameters to three, i.e. hidden pion decay constant, hidden pion mass and tan β that is defined as the ratio of the vacuum expectation values (VEV) of the singlet scalar field and the SM Higgs boson. As a result, our model has sharp predictability. We perform the phenomenological analysis of the hidden pions which is one of the dark matter (DM) candidates in this model. With various theoretical and experimental constraints we search for the allowed parameter space and find that both resonance and non-resonance solutions are possible. Some typical correlations among various observables such as thermal relic density of hidden pions, Higgs boson signal strengths and DM-nucleon cross section are investigated. We provide some benchmark points for experimental tests.

  20. 英语专业隐性课程中学生自主学习能力的培养策略研究%Strategies for Cultivating Students’Self-Access to English Learning through Hidden Curriculums

    Institute of Scientific and Technical Information of China (English)

    刘雨

    2015-01-01

    Hidden curriculum contains four parts:materially hidden curriculum, spiritually hidden curriculum, ethologically hid⁃den curriculum and institutionally hidden curriculum. As an independent form of curriculum, hidden curriculum plays a significant part in curriculum reform. The article first illustrates the origin of hidden curriculum, its definition, its classification and character⁃istics. It then makes an analysis of the implications of hidden curriculum in English teaching reform. The incorporation of hidden curriculum to the education system is an indispensable trend of English teaching reform. Based on the characteristics of hidden cur⁃riculum, the article puts forward some exercisable strategies on how to design them to enhance students’self-access to English learning.%隐性课程分为物质性、精神性、制度性和行为性隐性课程。隐性课程作为一种独立的课程形态,在课程体系中处于极其重要的地位。论文简要论述了隐性课程概念的提出、范畴的界定、分类及特点,阐明了隐性课程对英语教学改革的意义,认为将隐性课程纳入课程体系是英语教学改革的一种趋势和必然。根据隐性课程的特点提出了利用英语专业隐性课程培养学生自主学习能力的策略。

  1. A segmental hidden semi-Markov model (HSMM)-based diagnostics and prognostics framework and methodology

    Science.gov (United States)

    Dong, Ming; He, David

    2007-07-01

    Diagnostics and prognostics are two important aspects in a condition-based maintenance (CBM) program. However, these two tasks are often separately performed. For example, data might be collected and analysed separately for diagnosis and prognosis. This practice increases the cost and reduces the efficiency of CBM and may affect the accuracy of the diagnostic and prognostic results. In this paper, a statistical modelling methodology for performing both diagnosis and prognosis in a unified framework is presented. The methodology is developed based on segmental hidden semi-Markov models (HSMMs). An HSMM is a hidden Markov model (HMM) with temporal structures. Unlike HMM, an HSMM does not follow the unrealistic Markov chain assumption and therefore provides more powerful modelling and analysis capability for real problems. In addition, an HSMM allows modelling the time duration of the hidden states and therefore is capable of prognosis. To facilitate the computation in the proposed HSMM-based diagnostics and prognostics, new forward-backward variables are defined and a modified forward-backward algorithm is developed. The existing state duration estimation methods are inefficient because they require a huge storage and computational load. Therefore, a new approach is proposed for training HSMMs in which state duration probabilities are estimated on the lattice (or trellis) of observations and states. The model parameters are estimated through the modified forward-backward training algorithm. The estimated state duration probability distributions combined with state-changing point detection can be used to predict the useful remaining life of a system. The evaluation of the proposed methodology was carried out through a real world application: health monitoring of hydraulic pumps. In the tests, the recognition rates for all states are greater than 96%. For each individual pump, the recognition rate is increased by 29.3% in comparison with HMMs. Because of the temporal

  2. Hidden Photon Compton and Bremsstrahlung in White Dwarf Anomalous Cooling and Luminosity Functions

    CERN Document Server

    Chang, Chia-Feng

    2016-01-01

    We computed the contribution of the Compton and Bremsstrahlung processes with a hidden light $U(1)_D$ neutral boson $\\gamma_D$ to the white dwarf G117-B15A anomalous cooling rate, as well as the white dwarf luminosity functions (WDLF). We demonstrated that for a light mass of hidden photon ($m_{\\gamma_D} \\ll$ a few keV), compatible results are obtained for the recent Sloan Digital Sky Survey and the SuperCOSMOS Sky Survey observation, but the stringent limits would be imposed on the kinetic mixing $\\epsilon$. We performed $\\chi^2$-tests to acquire a quantitative assessment on the WDLF data in the context of our model, computed under the assumption of different kinetic mixing $\\epsilon$, the age of the oldest computed stars $T_D$, and a constant star formation rate $\\psi$. Then taken together, the WDLF analysis of 2$\\sigma$ confidence interval $\\epsilon = \\left( 0.37^{+0.35}_{-0.37}\\right) \\times 10^{-14}$ is barely consistent with the cooling rate analysis at 2$\\sigma$ regime $\\epsilon = \\left( 0.97^{+0.35}_{...

  3. New axion and hidden photon constraints from a solar data global fit

    CERN Document Server

    Vinyoles, Núria; Villante, Francesco L; Basu, Sarbani; Redondo, Javier; Isern, Jordi

    2015-01-01

    We present a new statistical analysis that combines helioseismology (sound speed, surface helium and convective radius) and solar neutrino observations (boron and beryllium fluxes) to place upper limits to the properties of non standard weakly interacting particles. Our analysis includes theoretical and observational errors, accounts for tensions between input parameters of solar models and can be easily extended to include other observational constraints. We present two applications to test the method: the well studied case of axions and axion-like particles and the more novel case of low mass hidden photons. For axions we obtain an upper limit at 3 sigma for the axion-photon coupling constant of g_a-gamma < 4 x 10^-10 GeV^-1. For hidden photons we obtain the most restrictive upper limit for the product of the kinetic mixing and mass of chi < 1.82 x 10^-12 eV/m at 3 sigma. Both cases improve the previous solar constraints based on the Standard Solar Models showing the power of our global statistical ap...

  4. Classification of EEG Single Trial Microstates Using Local Global Graphs and Discrete Hidden Markov Models.

    Science.gov (United States)

    Michalopoulos, Kostas; Zervakis, Michalis; Deiber, Marie-Pierre; Bourbakis, Nikolaos

    2016-09-01

    We present a novel synergistic methodology for the spatio-temporal analysis of single Electroencephalogram (EEG) trials. This new methodology is based on the novel synergy of Local Global Graph (LG graph) to characterize define the structural features of the EEG topography as a global descriptor for robust comparison of dominant topographies (microstates) and Hidden Markov Models (HMM) to model the topographic sequence in a unique way. In particular, the LG graph descriptor defines similarity and distance measures that can be successfully used for the difficult comparison of the extracted LG graphs in the presence of noise. In addition, hidden states represent periods of stationary distribution of topographies that constitute the equivalent of the microstates in the model. The transitions between the different microstates and the formed syntactic patterns can reveal differences in the processing of the input stimulus between different pathologies. We train the HMM model to learn the transitions between the different microstates and express the syntactic patterns that appear in the single trials in a compact and efficient way. We applied this methodology in single trials consisting of normal subjects and patients with Progressive Mild Cognitive Impairment (PMCI) to discriminate these two groups. The classification results show that this approach is capable to efficiently discriminate between control and Progressive MCI single trials. Results indicate that HMMs provide physiologically meaningful results that can be used in the syntactic analysis of Event Related Potentials. PMID:27255799

  5. An impossibility theorem for parameter independent hidden variable theories

    Science.gov (United States)

    Leegwater, Gijs

    2016-05-01

    Recently, Roger Colbeck and Renato Renner (C&R) have claimed that '[n]o extension of quantum theory can have improved predictive power' (Colbeck & Renner, 2011, 2012b). If correct, this is a spectacular impossibility theorem for hidden variable theories, which is more general than the theorems of Bell (1964) and Leggett (2003). Also, C&R have used their claim in attempt to prove that a system's quantum-mechanical wave function is in a one-to-one correspondence with its 'ontic' state (Colbeck & Renner, 2012a). C&R's claim essentially means that in any hidden variable theory that is compatible with quantum-mechanical predictions, probabilities of measurement outcomes are independent of these hidden variables. This makes such variables otiose. On closer inspection, however, the generality and validity of the claim can be contested. First, it is based on an assumption called 'Freedom of Choice'. As the name suggests, this assumption involves the independence of an experimenter's choice of measurement settings. But in the way C&R define this assumption, a no-signalling condition is surreptitiously presupposed, making the assumption less innocent than it sounds. When using this definition, any hidden variable theory violating parameter independence, such as Bohmian Mechanics, is immediately shown to be incompatible with quantum-mechanical predictions. Also, the argument of C&R is hard to follow and their mathematical derivation contains several gaps, some of which cannot be closed in the way they suggest. We shall show that these gaps can be filled. The issue with the 'Freedom of Choice' assumption can be circumvented by explicitly assuming parameter independence. This makes the result less general, but better founded. We then obtain an impossibility theorem for hidden variable theories satisfying parameter independence only. As stated above, such hidden variable theories are impossible in the sense that any supplemental variables have no bearing on outcome probabilities

  6. The suppression of hidden order and the onset of ferromagnetism in URu{sub 2}Si{sub 2} via Re substitution

    Energy Technology Data Exchange (ETDEWEB)

    Butch, N P; Maple, M B [Department of Physics and Institute for Pure and Applied Physical Sciences, University of California, San Diego, La Jolla, CA 92093 (United States)

    2010-04-28

    Substitution of Re for Ru in the heavy fermion compound URu{sub 2}Si{sub 2} suppresses the hidden order transition and gives rise to ferromagnetism at higher concentrations. The hidden order transition of URu{sub 2-x}Re{sub x}Si{sub 2}, tracked via specific heat and electrical resistivity measurements, decreases in temperature and broadens, and is no longer observed for x > 0.1. A critical scaling analysis of the bulk magnetization indicates that the ferromagnetic ordering temperature and ordered moment are suppressed continuously towards zero at a critical concentration of xapprox0.15, and this is accompanied by the additional suppression of the critical exponents gamma and delta - 1 towards zero. This unusual trend appears to reflect the underlying interplay between Kondo and ferromagnetic interactions, and perhaps the proximity of the hidden order phase.

  7. Unexpected novel relational links uncovered by extensive developmental profiling of nuclear receptor expression.

    Directory of Open Access Journals (Sweden)

    Stéphanie Bertrand

    2007-11-01

    Full Text Available Nuclear receptors (NRs are transcription factors that are implicated in several biological processes such as embryonic development, homeostasis, and metabolic diseases. To study the role of NRs in development, it is critically important to know when and where individual genes are expressed. Although systematic expression studies using reverse transcriptase PCR and/or DNA microarrays have been performed in classical model systems such as Drosophila and mouse, no systematic atlas describing NR involvement during embryonic development on a global scale has been assembled. Adopting a systems biology approach, we conducted a systematic analysis of the dynamic spatiotemporal expression of all NR genes as well as their main transcriptional coregulators during zebrafish development (101 genes using whole-mount in situ hybridization. This extensive dataset establishes overlapping expression patterns among NRs and coregulators, indicating hierarchical transcriptional networks. This complete developmental profiling provides an unprecedented examination of expression of NRs during embryogenesis, uncovering their potential function during central nervous system and retina formation. Moreover, our study reveals that tissue specificity of hormone action is conferred more by the receptors than by their coregulators. Finally, further evolutionary analyses of this global resource led us to propose that neofunctionalization of duplicated genes occurs at the levels of both protein sequence and RNA expression patterns. Altogether, this expression database of NRs provides novel routes for leading investigation into the biological function of each individual NR as well as for the study of their combinatorial regulatory circuitry within the superfamily.

  8. Multiple omics uncovers host-gut microbial mutualism during prebiotic fructooligosaccharide supplementation.

    Science.gov (United States)

    Kato, Tamotsu; Fukuda, Shinji; Fujiwara, Akemi; Suda, Wataru; Hattori, Masahira; Kikuchi, Jun; Ohno, Hiroshi

    2014-10-01

    Fructooligosaccharide (FOS), a prebiotic well known for its health-promoting properties, can improve the human gut ecosystem most likely through changes in its microbial composition. However, the detailed mechanism(s) of action of FOS in the modulation of the gut ecosystem remain(s) obscure. Traditional methods of profiling microbes and metabolites could barely show any significant features due to the existence of large interindividual differences, but our novel microbe-metabolite correlation approach, combined with faecal immunoglobulin A (IgA) measurements, has revealed that the induction of mucosal IgA by FOS supplementation correlated with the presence of specific bacteria. Furthermore, the metabolic dynamics of butyrate, L-phenylalanine, L-lysine and tyramine were positively correlated with that of these bacteria and IgA production, whereas p-cresol was negatively correlated. Taken together, our focused intraindividual analysis with omics approaches is a powerful strategy for uncovering the gut molecular network and could provide a new vista for understanding the human gut ecosystem. PMID:24848698

  9. Simplivariate Models: Uncovering the Underlying Biology in Functional Genomics Data

    OpenAIRE

    Edoardo Saccenti; Westerhuis, Johan A.; Smilde, Age K.; van der Werf, Mariët J; Jos A Hageman; Hendriks, Margriet M. W. B.

    2011-01-01

    One of the first steps in analyzing high-dimensional functional genomics data is an exploratory analysis of such data. Cluster Analysis and Principal Component Analysis are then usually the method of choice. Despite their versatility they also have a severe drawback: they do not always generate simple and interpretable solutions. On the basis of the observation that functional genomics data often contain both informative and non-informative variation, we propose a method that finds sets of va...

  10. Backpropagation-Based Cooperative Localization of Primary User for Avoiding Hidden-Node Problem in Cognitive Networks

    Directory of Open Access Journals (Sweden)

    Lin Liu

    2010-01-01

    Full Text Available Cognitive radio (CR is a technology to implement opportunistic spectrum sharing to improve the spectrum utilization. However, there exists a hidden-node problem, which can be a big challenge to solve especially when the primary receiver is passive listening. We aim to provide a solution to the hidden-node problem for passive-listening receiver based on cooperation of multiple CRs. Specifically, we consider a cooperative GPS-enabled cognitive network. Once the existence of PU is detected, a localization algorithm will be employed to first estimate the path loss model for the environment based on backpropagation method and then to locate the position of PU. Finally, a disable region is identified taking into account the communication range of both the PU and the CR. The CRs within the disabled region are prohibited to transmit in order to avoid interfering with the primary receiver. Both analysis and simulation results are provided.

  11. Cosmic Strings in Hidden Sectors: 2. Cosmological and Astrophysical Signatures

    CERN Document Server

    Long, Andrew J

    2014-01-01

    Cosmic strings can arise in hidden sector models with a spontaneously broken Abelian symmetry group. We have studied the couplings of the Standard Model fields to these so-called dark strings in the companion paper. Here we survey the cosmological and astrophysical observables that could be associated with the presence of dark strings in our universe with an emphasis on low-scale models, perhaps TeV. Specifically, we consider constraints from nucleosynthesis and CMB spectral distortions, and we calculate the predicted fluxes of diffuse gamma ray cascade photons and cosmic rays. For strings as light as TeV, we find that the predicted level of these signatures is well below the sensitivity of the current experiments, and therefore low scale cosmic strings in hidden sectors remain unconstrained. Heavier strings with a mass scale in the range 10^(13) GeV to 10^(15) GeV are at tension with nucleosynthesis constraints.

  12. Penta-quark States with Strangeness, Hidden Charm and Beauty

    CERN Document Server

    Wu, Jia-Jun

    2015-01-01

    The classical quenched quark models with three constituent quarks provide a good description for the baryon spatial ground states, but fail to reproduce the spectrum of baryon excited states. More and more evidences suggest that unquenched effects with multi-quark dynamics are necessary ingredients to solve the problem. Several new hyperon resonances reported recently could fit in the picture of penta-quark states. Based on this picture, some new hyperon excited states were predicted to exist; meanwhile with extension from strangeness to charm and beauty, super-heavy narrow $N^*$ and $\\Lambda^*$ resonances with hidden charm or beauty were predicted to be around 4.3 and 11 GeV, respectively. Recently, two of such $N^*$ with hidden charm might have been observed by the LHCb experiment. More of those states are expected to be observed in near future. This opens a new window in order to study hadronic dynamics for the multi-quark states.

  13. Wikipedia mining of hidden links between political leaders

    CERN Document Server

    Frahm, Klaus M; Shepelyansky, Dima L

    2016-01-01

    We describe a new method of reduced Google matrix which allows to establish direct and hidden links between a subset of nodes of a large directed network. This approach uses parallels with quantum scattering theory, developed for processes in nuclear and mesoscopic physics and quantum chaos. The method is applied to the Wikipedia networks in different language editions analyzing several groups of political leaders of USA, UK, Germany, France, Russia and G20. We demonstrate that this approach allows to recover reliably direct and hidden links among political leaders. We argue that the reduced Google matrix method can form the mathematical basis for studies in social and political sciences analyzing Leader-Members eXchange (LMX).

  14. Time series segmentation with shifting means hidden markov models

    Directory of Open Access Journals (Sweden)

    Ath. Kehagias

    2006-01-01

    Full Text Available We present a new family of hidden Markov models and apply these to the segmentation of hydrological and environmental time series. The proposed hidden Markov models have a discrete state space and their structure is inspired from the shifting means models introduced by Chernoff and Zacks and by Salas and Boes. An estimation method inspired from the EM algorithm is proposed, and we show that it can accurately identify multiple change-points in a time series. We also show that the solution obtained using this algorithm can serve as a starting point for a Monte-Carlo Markov chain Bayesian estimation method, thus reducing the computing time needed for the Markov chain to converge to a stationary distribution.

  15. MODELING PAVEMENT DETERIORATION PROCESSES BY POISSON HIDDEN MARKOV MODELS

    Science.gov (United States)

    Nam, Le Thanh; Kaito, Kiyoyuki; Kobayashi, Kiyoshi; Okizuka, Ryosuke

    In pavement management, it is important to estimate lifecycle cost, which is composed of the expenses for repairing local damages, including potholes, and repairing and rehabilitating the surface and base layers of pavements, including overlays. In this study, a model is produced under the assumption that the deterioration process of pavement is a complex one that includes local damages, which occur frequently, and the deterioration of the surface and base layers of pavement, which progresses slowly. The variation in pavement soundness is expressed by the Markov deterioration model and the Poisson hidden Markov deterioration model, in which the frequency of local damage depends on the distribution of pavement soundness, is formulated. In addition, the authors suggest a model estimation method using the Markov Chain Monte Carlo (MCMC) method, and attempt to demonstrate the applicability of the proposed Poisson hidden Markov deterioration model by studying concrete application cases.

  16. Multiple testing for neuroimaging via hidden Markov random field.

    Science.gov (United States)

    Shu, Hai; Nan, Bin; Koeppe, Robert

    2015-09-01

    Traditional voxel-level multiple testing procedures in neuroimaging, mostly p-value based, often ignore the spatial correlations among neighboring voxels and thus suffer from substantial loss of power. We extend the local-significance-index based procedure originally developed for the hidden Markov chain models, which aims to minimize the false nondiscovery rate subject to a constraint on the false discovery rate, to three-dimensional neuroimaging data using a hidden Markov random field model. A generalized expectation-maximization algorithm for maximizing the penalized likelihood is proposed for estimating the model parameters. Extensive simulations show that the proposed approach is more powerful than conventional false discovery rate procedures. We apply the method to the comparison between mild cognitive impairment, a disease status with increased risk of developing Alzheimer's or another dementia, and normal controls in the FDG-PET imaging study of the Alzheimer's Disease Neuroimaging Initiative. PMID:26012881

  17. MCMC joint separation and segmentation of hidden Markov fields

    CERN Document Server

    Snoussi, H; Snoussi, Hichem; Mohammad-Djafari, Ali

    2002-01-01

    In this contribution, we consider the problem of the blind separation of noisy instantaneously mixed images. The images are modelized by hidden Markov fields with unknown parameters. Given the observed images, we give a Bayesian formulation and we propose to solve the resulting data augmentation problem by implementing a Monte Carlo Markov Chain (MCMC) procedure. We separate the unknown variables into two categories: 1. The parameters of interest which are the mixing matrix, the noise covariance and the parameters of the sources distributions. 2. The hidden variables which are the unobserved sources and the unobserved pixels classification labels. The proposed algorithm provides in the stationary regime samples drawn from the posterior distributions of all the variables involved in the problem leading to a flexibility in the cost function choice. We discuss and characterize some problems of non identifiability and degeneracies of the parameters likelihood and the behavior of the MCMC algorithm in this case. F...

  18. Time series segmentation with shifting means hidden markov models

    Science.gov (United States)

    Kehagias, Ath.; Fortin, V.

    2006-08-01

    We present a new family of hidden Markov models and apply these to the segmentation of hydrological and environmental time series. The proposed hidden Markov models have a discrete state space and their structure is inspired from the shifting means models introduced by Chernoff and Zacks and by Salas and Boes. An estimation method inspired from the EM algorithm is proposed, and we show that it can accurately identify multiple change-points in a time series. We also show that the solution obtained using this algorithm can serve as a starting point for a Monte-Carlo Markov chain Bayesian estimation method, thus reducing the computing time needed for the Markov chain to converge to a stationary distribution.

  19. Inhomogeneous spatial point processes with hidden second-order stationarity

    DEFF Research Database (Denmark)

    Hahn, Ute; Jensen, Eva B. Vedel

    correlation function g(u, v) is a function of u −˘ v, where −˘ is a generalized subtraction operator. For the reweighted second-order stationary processes, the subtraction operator is simply u −˘ v = u − v. The processes in the extended class are called hidden second-order stationary because, in many cases......Modelling of inhomogeneous spatial point patterns is a challenging research area with numerous applications in diverse areas of science. In recent years, the focus has mainly been on the class of reweighted second-order stationary point processes that is characterized by the mathematically...... attractive property of a translation invariant pair correlation function. Motivated by examples where this model class is not adequate, we extend the class of reweighted second-order stationary processes. The extended class consists of hidden second-order stationary point processes for which the pair...

  20. Dealing with the Hidden Effects of Global Business Systems

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Gubi, Ebbe

    2011-01-01

    of the company’s global business system. It is demonstrated how the operations configurations have been changing over time and affecting the overall business system. The paper identifies the key determinants and outcomes of this change and hidden effects of this change. Moreover, it proposes how the design...... companies may reduce this distance through reorganization and development of adequate global business systems solutions. The paper draws on a case study of a Danish industrial equipment firm. The paper describes and analyzes the company’s operations network configurations, which lay at the foundations...... of operations configurations can be improved through the development of a distinct systemic approach to control and coordination, which emphasizes not only short-term operational efficiency, but also increasingly longer-term strategic effectiveness. The findings provide a basis for dealing with hidden effects...