WorldWideScience

Sample records for analysis uncovers hidden

  1. Uncovering your customer's hidden needs

    OpenAIRE

    Goffin, Keith; Lemke, Fred

    2004-01-01

    Capturing the ‘voice of the customer’ is an essential stage of any new product development. However, the way companies ‘listen’ to their customers is changing as managers realise end users are often unable to articulate their needs and focus groups seldom lead to breakthrough product ideas. The SONY Walkman is a clear example of a new product that resulted from insights into customers’ hidden needs rather than from market research. It is not that market research is bad per s...

  2. Uncovering your hidden occupancy costs.

    Science.gov (United States)

    Apgar, M

    1993-01-01

    Senior managers at large companies may not believe that they can have much impact on the "bricks and mortar" of their cost structure. They may even think that occupancy costs are too insignificant to worry about, too technical to analyze, and too fixed to control. But as real estate consultant Mahlon Apgar argues, occupancy costs can hurt a company's earnings, share value, and overall performance. On the other hand, every dollar saved drops straight to the bottom line. Shearson Lehman Brothers, for example, has found that it can save as much as $20 million annually by reducing occupancy costs in its branch offices and headquarters. Managing occupancy costs isn't easy. But it is timely. As companies strive to improve productivity by consolidating functions and downsizing staff, they are saddled with excess office space. Expansions abroad present completely different market conditions that put a premium on reducing occupancy costs. At the same time, the changing nature of work is challenging deeply held beliefs about the workplace, and, consequently, traditional expectations of office space are giving way to innovations that are less costly and more productive. To manage occupancy costs, managers must be able to identify their components, measure their impact, understand what drives them, and develop options to change them. Four basic tools help diagnose problems: a cost history, a loss analysis, a component analysis, and a lease aging profile. Understanding cost drivers like leasing, location, and layout can give executives the insights they need to reduce occupancy costs while improving the effectiveness of facilities to support day-to-day operations. PMID:10126151

  3. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost-estimation...... errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  4. Clinical role modelling: uncovering hidden knowledge.

    Science.gov (United States)

    Davies, E

    1993-04-01

    Those responsible for the education of nurses are well aware of the need to reconcile the art and science of nursing so that future practitioners can be prepared to offer a humanistic and professional service to society. One way to assist students in this integration is to provide them with opportunities for role modelling as a means of discovering the knowledge embedded in clinical practice. A study of first-year undergraduate students undertaking a course which provides such opportunities in a number of practice settings was carried out to determine whether the observation of clinical role models does lead to knowledge discovery. The study, which used a grounded theory approach, indicated that the major aspect of nursing uncovered by the students through observation of clinical role models was that of provision of direct care. They articulated their values in relation to 'good' and 'bad' care and identified those attributes of nurses which they considered contributed to these care positions. In addition, they were able to recognize creativity and flexibility in practitioners and to relate these attributes to the ability to provide individualized, context-specific care. There was some uncovering of aspects of the nurse's role in maintaining their own professional competence, socializing neophytes into the profession and collaborating with the members of the multi-disciplinary health care team. PMID:8496511

  5. Uncovering the Hidden Decisions that Shape Curricula

    Science.gov (United States)

    Harlow, Danielle Boyd

    2010-10-01

    Developing explanatory models is a central practice to scientific inquiry. When students create and test explanatory models for scientific phenomenon, they develop content knowledge, knowledge of the nature of science, and creative thinking skills. Unfortunately, such instruction rarely occurs in K-12 science. This is, in part, because teachers do not have the opportunity to develop sophisticated understandings of the process of modeling, but also because teaching in this way requires teachers to make real-time instructional decisions that are responsive to students' ideas. This is challenging for teachers, especially because this decision process is often invisible. In this talk, I will highlight the importance of providing opportunities for sophisticated science thinking for our youngest learners and consider how uncovering the decisions that shape physics courses for teachers may benefit their future students.

  6. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  7. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  8. In the minds of OSCE examiners: uncovering hidden assumptions.

    Science.gov (United States)

    Chahine, Saad; Holmes, Bruce; Kowalewski, Zbigniew

    2016-08-01

    The Objective Structured Clinical Exam (OSCE) is a widely used method of assessment in medical education. Rater cognition has become an important area of inquiry in the medical education assessment literature generally, and in the OSCE literature specifically, because of concerns about potential compromises of validity. In this study, a novel approach to mixed methods that combined Ordinal Logistic Hierarchical Linear Modeling and cognitive interviews was used to gain insights about what examiners were thinking during an OSCE. This study is based on data from the 2010 to 2014 administrations of the Clinician Assessment for Practice Program OSCE for International Medical Graduates (IMGs) in Nova Scotia. An IMG is a physician trained outside of Canada who was a licensed practitioner in a different country. The quantitative data were examined alongside four follow-up cognitive interviews of examiners conducted after the 2014 administration. The quantitative results show that competencies of (1) Investigation and Management and (2) Counseling were highly predictive of the Overall Global score. These competencies were also described in the cognitive interviews as the most salient parts of OSCE. Examiners also found Communication Skills and Professional Behavior to be relevant but the quantitative results revealed these to be less predictive of the Overall Global score. The interviews also reveal that there is a tacit sequence by which IMGs are expected to proceed in an OSCE, starting with more basic competencies such as History Taking and building up to Investigation Management and Counseling. The combined results confirm that a hidden pattern exists with respect to how examiners rate candidates. This study has potential implications for research into rater cognition, and the design and scoring of practice-ready OSCEs. PMID:26661783

  9. Uncovering the Hidden Dimensions of Meaning in Descriptions of Educational Practice.

    Science.gov (United States)

    Harris, Ilene B.

    Descriptions of educational practice offer an array of important, but typically hidden dimensions of meaning which provide potentially rich resources for understanding the practices. This paper illustrates: (1) how analysis, interpretations, and assessments interpenetrate what appear to be descriptions and suggest how readers can tease out these…

  10. Uncover the Ideology Behind News Reports Through Transitivity Analysis

    Institute of Scientific and Technical Information of China (English)

    董亚男

    2015-01-01

    When people read the reports relating to Occupy Central from different news papers, they get completely different feelings towards the event. To find out how this phenomenon happened, this paper is going to apply transitivity analysis to the news reports. The reports are selected from China Daily, CNN and BBC respectively. To have a deep application of this method, only verbal process wil be taken into consideration. This paper wil discuss the proportion of verbal process from the two sides (Occupy Central people as one side and people against them as the other), the message delivered by the verbal process, the sequence and the transformation of verbal process. The purpose is to uncover the ideology hidden behind the seemingly objective news reports through transitivity analysis.

  11. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  12. Uncovering the Hidden Web, Part I: Finding What the Search Engines Don't. ERIC Digest.

    Science.gov (United States)

    Mardis, Marcia

    Currently, the World Wide Web contains an estimated 7.4 million sites (OCLC, 2001). Yet even the most experienced searcher, using the most robust search engines, can access only about 16% of these pages (Dahn, 2001). The other 84% of the publicly available information on the Web is referred to as the "hidden,""invisible," or "deep" Web. This…

  13. Networks uncover hidden lexical borrowing in Indo-European language evolution.

    Science.gov (United States)

    Nelson-Sathi, Shijulal; List, Johann-Mattis; Geisler, Hans; Fangerau, Heiner; Gray, Russell D; Martin, William; Dagan, Tal

    2011-06-22

    Language evolution is traditionally described in terms of family trees with ancestral languages splitting into descendent languages. However, it has long been recognized that language evolution also entails horizontal components, most commonly through lexical borrowing. For example, the English language was heavily influenced by Old Norse and Old French; eight per cent of its basic vocabulary is borrowed. Borrowing is a distinctly non-tree-like process--akin to horizontal gene transfer in genome evolution--that cannot be recovered by phylogenetic trees. Here, we infer the frequency of hidden borrowing among 2346 cognates (etymologically related words) of basic vocabulary distributed across 84 Indo-European languages. The dataset includes 124 (5%) known borrowings. Applying the uniformitarian principle to inventory dynamics in past and present basic vocabularies, we find that 1373 (61%) of the cognates have been affected by borrowing during their history. Our approach correctly identified 117 (94%) known borrowings. Reconstructed phylogenetic networks that capture both vertical and horizontal components of evolutionary history reveal that, on average, eight per cent of the words of basic vocabulary in each Indo-European language were involved in borrowing during evolution. Basic vocabulary is often assumed to be relatively resistant to borrowing. Our results indicate that the impact of borrowing is far more widespread than previously thought. PMID:21106583

  14. SNP and Mutation Data on the Web – Hidden Treasures for Uncovering

    OpenAIRE

    Barnes, Michael R.

    2002-01-01

    SNP data has grown exponentially over the last two years, SNP database evolution has matched this growth, as initial development of several independent SNP databases has given way to one central SNP database, dbSNP. Other SNP databases have instead evolved to complement this central database by providing gene specific focus and an increased level of curation and analysis on subsets of data, derived from the central data set. By contrast, human mutation data, which has been collected over many...

  15. An "inverse square law" for the currency market: Uncovering hidden universality in heterogeneous complex systems

    CERN Document Server

    Chakraborty, Abhijit; Sinha, Sitabhra

    2016-01-01

    Identifying universal behavior is a challenging task for far-from-equilibrium complex systems. Here we investigate the collective dynamics of the international currency exchange market and show the existence of a semi-invariant signature masked by the high degree of heterogeneity in this complex system. The cumulative fluctuation distribution in the exchange rates of different currencies possess heavy tails characterized by exponents varying around a median value of 2. The systematic deviation of individual currencies from this putative universal form (the "inverse square law") can be partly ascribed to the differences in their economic prosperity and diversity of export products. The distinct nature of the fluctuation dynamics for currencies of developed, emerging and frontier economies are characterized in detail by detrended fluctuation analysis and variance-ratio tests, which shows that less developed economies are associated with sub-diffusive random walk processes. We hierarchically cluster the currenci...

  16. Primary Dentition Analysis: Exploring a Hidden Approach

    Science.gov (United States)

    Vanjari, Kalasandhya; Kamatham, Rekhalakshmi; Gaddam, Kumar Raja

    2016-01-01

    ABSTRACT Background: Accurate prediction of the mesiodistal widths (MDWs) of canines and premolars in children with primary dentition facilitates interception of malocclusion at an early age. Boston University (BU) approach is one, i.e., based on primary teeth for predicting canine and premolar dimensions. Aim: To predict the canine and premolar dimensions, in the contemporary population, using BU approach and compare with the values obtained using Tanaka-Johnston (T/J) approach. Design: Children in the age range of 7-11 years with presence of all permanent mandibular incisors and primary maxillary and mandibular canines and first molars were included in the study. Those with interproximal caries or restorations, abnormalities in shape or size and history of orthodontic treatment were excluded. Impressions of both arches were made using irreversible hydrocolloid and poured with dental stone. The MDWs of the required teeth were measured on the models using electronic digital vernier caliper from which widths of permanent canines and premolars were predicted using both T/J and BU approaches. Results: Statistically significant (p = 0.00) positive correlation (r = 0.52-0.55) was observed between T/J and BU approaches. A statistically significant (p = 0.00) strong positive correlation (r = 0.72-0.77) was observed among girls, whereas boys showed a statistically nonsignificant weak positive correlation (r=0.17-0.42) based on gender. Conclusion: Boston University approach can be further studied prospectively to make it possible as a prediction method of permanent tooth dimensions for children in primary dentition stage. How to cite this article: Nuvvula S, Vanjari K, Kamatham R, Gaddam KR. Primary Dentition Analysis: Exploring a Hidden Approach. Int J Clin Pediatr Dent 2016;9(1):1-4. PMID:27274146

  17. Spitzer Space Telescope Leads NASA's Great Observatories to Uncover Black Holes and Other Hidden Objects in the Distant Universe

    Science.gov (United States)

    2004-06-01

    galaxies. The X-rays are produced by interstellar gas that is attracted by the gravity of the black holes and is heated to very high temperatures just before it falls in. Hubble's Advanced Camera for surveys revealed optical galaxies around almost all the X-ray black holes. However, there remained seven mysterious X-ray sources for which there was no optical galaxy in the Hubble images. Astronomer Anton Koekemoer of the Space Telescope Science Institute in Baltimore, Md., who discovered these sources, presented three intriguing possibilities for their origin. "The galaxies around these black holes may be completely hidden by thick clouds of dust absorbing all their light, or may contain very old, red stars," suggests Koekemoer, "or some of them could be the most distant black holes ever observed -- perhaps as far as 13 billion light-years." In this case all their optical light would be shifted to very long infrared wavelengths by the expansion of the universe. The Spitzer images were anxiously awaited to resolve the puzzle of these optically invisible X-ray black holes. Because Spitzer observes in infrared light, at wavelengths up to 100 times longer than those probed by Hubble, Spitzer might be able to see the otherwise invisible objects. Indeed, the very first Spitzer images of these objects, obtained in early 2004, immediately revealed the telltale infrared glow from the host galaxies around all the missing X-ray black holes. "The Spitzer images are fantastic," says Koekemoer, who led the effort to compare and identify the missing X-ray black holes in the Spitzer images. "For the first time ever, we have identified 100 percent of the galaxies around X-ray black holes." Three of Koekemoer's galaxies are extremely red, even redder than the other galaxies found so far in this field. The Spitzer data, together with new images at shorter (but still infrared) wavelengths from the Very Large Telescope at the European Southern Observatory, indicate that the galaxies around

  18. Uncovering steroidopathy in women with autism: a latent class analysis

    Science.gov (United States)

    2014-01-01

    Background Prenatal exposure to increased androgens has been implicated in both polycystic ovary syndrome (PCOS) and autism spectrum conditions (ASC), suggesting that PCOS may be increased among women with ASC. One study suggested elevated steroidopathic symptoms (‘steroidopathy’) in women with ASC. As the symptoms are not independent, we conducted a latent class analysis (LCA). The objectives of the current study are: (1) to test if these findings replicate in a larger sample; and (2) to use LCA to uncover affected clusters of women with ASC. Methods We tested two groups of women, screened using the Autism Spectrum Quotient - Group 1: n = 415 women with ASC (mean age 36.39 ± 11.98 years); and Group 2: n = 415 controls (mean age 39.96 ± 11.92 years). All participants completed the Testosterone-related Medical Questionnaire online. A multiple-group LCA was used to identify differences in latent class structure between women with ASC and controls. Results There were significant differences in frequency of steroid-related conditions and symptoms between women with ASC and controls. A two-class semi-constrained model best fit the data. Based on response patterns, we identified the classes as ‘Typical’ and ‘Steroidopathic’. The prevalence of the ‘Steroidopathic’ class was significantly increased within the ASC group (ΔG2 = 15, df =1, P = 0.0001). In particular, we confirmed higher frequencies of epilepsy, amenorrhea, dysmenorrhea, severe acne, gender dysphoria, and transsexualism, and differences in sexual preference in women with ASC. Conclusions Women with ASC are at increased risk for symptoms and conditions linked to steroids. LCA revealed this steroidopathy despite the apparent underdiagnosis of PCOS. PMID:24717046

  19. Hidden Markov Models and their Applications in Biological Sequence Analysis

    OpenAIRE

    Yoon, Byung-Jun

    2009-01-01

    Hidden Markov models (HMMs) have been extensively used in biological sequence analysis. In this paper, we give a tutorial review of HMMs and their applications in a variety of problems in molecular biology. We especially focus on three types of HMMs: the profile-HMMs, pair-HMMs, and context-sensitive HMMs. We show how these HMMs can be used to solve various sequence analysis problems, such as pairwise and multiple sequence alignments, gene annotation, classification, similarity search, and ma...

  20. Hidden-Markov-Model Analysis Of Telemanipulator Data

    Science.gov (United States)

    Hannaford, Blake; Lee, Paul

    1991-01-01

    Mathematical model and procedure based on hidden-Markov-model concept undergoing development for use in analysis and prediction of outputs of force and torque sensors of telerobotic manipulators. In model, overall task broken down into subgoals, and transition probabilities encode ease with which operator completes each subgoal. Process portion of model encodes task-sequence/subgoal structure, and probability-density functions for forces and torques associated with each state of manipulation encode sensor signals that one expects to observe at subgoal. Parameters of model constructed from engineering knowledge of task.

  1. Analysis of changing hidden energy flow in Vietnam

    International Nuclear Information System (INIS)

    The energy consumption in production process is changing especially in developing countries by substituting technology. Input-output analysis for energy flows has been developing and is one of the best solutions for investigating macroscopic exchanges of both economy and energy. Since each element in the Leontief inverse contains both direct and indirect effects of any change in final demand, to separate those direct and indirect effects, the power series expansion is available. In this work, the changes of embodied energy intensity in Vietnam from 1996 to 2000 were analyzed using the structural decomposition and its power series expansion. By illustrating the change of causal relationship between direct energy consumption and embodied energy consumption, the change of hidden energy flow, which indicates how the changing embodied energy builds up the change of direct energy consumption in every sector, can be seen. In the case study, the rice processing sector, which is one of the important food processing sectors in Vietnam, is focused. By drawing a diagrammatic map for the change of hidden energy flow, it is clarified that in the case of raising embodied energy intensity, cultivation sector and trade and repaired service sector are the main contributors, and, on the contrary, in the case of reducing embodied energy intensity, paper pulp sector is the main contributor

  2. Uncovering Influence through Social Network Analysis: The Role of Schools in Education for Sustainable Development

    Science.gov (United States)

    Kolleck, Nina

    2016-01-01

    This paper examines the implementation of Education for Sustainable Development (ESD) in Germany and explores the possibilities of Social Network Analysis (SNA) for uncovering influential actors in educational policy innovation processes. From the theoretical perspective, an actor's influence is inferred from its relative position within…

  3. Uncovering steroidopathy in women with autism: a latent class analysis

    OpenAIRE

    Pohl, Alexa; Cassidy, Sarah; Auyeung, Bonnie; Baron-Cohen, Simon

    2014-01-01

    Background Prenatal exposure to increased androgens has been implicated in both polycystic ovary syndrome (PCOS) and autism spectrum conditions (ASC), suggesting that PCOS may be increased among women with ASC. One study suggested elevated steroidopathic symptoms (‘steroidopathy’) in women with ASC. As the symptoms are not independent, we conducted a latent class analysis (LCA). The objectives of the current study are: (1) to test if these findings replicate in a larger sample; and (2) to use...

  4. Chemical Analysis: An Indispensable Means for Uncovering Severe Cases of Fraud with Cosmetics and Tattoo Inks.

    Science.gov (United States)

    Hohl, Christopher; Hauri, Urs

    2016-01-01

    Three cases of fraud with commodities containing illegal stealth compounds are presented, which were uncovered by the State Laboratory Basel-City, Switzerland. All three commodities, grapefruit seed extracts, a phytocosmetical skin cream, and tattoo inks, were produced abroad, had forged declarations of ingredients and, in the case of the extracts and the cream, were marketed with far-reaching health claims. While inspections will identify suspicious products and would be able to eliminate health claims to some extent, only chemical analysis can uncover the illegal agents used and give law enforcement bodies the necessary evidence to immediately clamp down on those brands, where the stealth agent presents a serious health hazard to consumers. PMID:27198815

  5. Analysis of nanopore data using hidden Markov models

    Science.gov (United States)

    Schreiber, Jacob; Karplus, Kevin

    2015-01-01

    Motivation: Nanopore-based sequencing techniques can reconstruct properties of biosequences by analyzing the sequence-dependent ionic current steps produced as biomolecules pass through a pore. Typically this involves alignment of new data to a reference, where both reference construction and alignment have been performed by hand. Results: We propose an automated method for aligning nanopore data to a reference through the use of hidden Markov models. Several features that arise from prior processing steps and from the class of enzyme used can be simply incorporated into the model. Previously, the M2MspA nanopore was shown to be sensitive enough to distinguish between cytosine, methylcytosine and hydroxymethylcytosine. We validated our automated methodology on a subset of that data by automatically calculating an error rate for the distinction between the three cytosine variants and show that the automated methodology produces a 2–3% error rate, lower than the 10% error rate from previous manual segmentation and alignment. Availability and implementation: The data, output, scripts and tutorials replicating the analysis are available at https://github.com/UCSCNanopore/Data/tree/master/Automation. Contact: karplus@soe.ucsc.edu or jmschreiber91@gmail.com Supplementary information: Supplementary data are available from Bioinformatics online. PMID:25649617

  6. Infinite hidden conditional random fields for human behavior analysis.

    Science.gov (United States)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja

    2013-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF), which is a nonparametric model based on hierarchical Dirichlet processes and is capable of automatically learning the optimal number of hidden states for a classification task. We show how we learn the model hyperparameters with an effective Markov-chain Monte Carlo sampling technique, and we explain the process that underlines our iHCRF model with the Restaurant Franchise Rating Agencies analogy. We show that the iHCRF is able to converge to a correct number of represented hidden states, and outperforms the best finite HCRFs--chosen via cross-validation--for the difficult tasks of recognizing instances of agreement, disagreement, and pain. Moreover, the iHCRF manages to achieve this performance in significantly less total training, validation, and testing time. PMID:24808217

  7. Multivariate longitudinal data analysis with mixed effects hidden Markov models.

    Science.gov (United States)

    Raffa, Jesse D; Dubin, Joel A

    2015-09-01

    Multiple longitudinal responses are often collected as a means to capture relevant features of the true outcome of interest, which is often hidden and not directly measurable. We outline an approach which models these multivariate longitudinal responses as generated from a hidden disease process. We propose a class of models which uses a hidden Markov model with separate but correlated random effects between multiple longitudinal responses. This approach was motivated by a smoking cessation clinical trial, where a bivariate longitudinal response involving both a continuous and a binomial response was collected for each participant to monitor smoking behavior. A Bayesian method using Markov chain Monte Carlo is used. Comparison of separate univariate response models to the bivariate response models was undertaken. Our methods are demonstrated on the smoking cessation clinical trial dataset, and properties of our approach are examined through extensive simulation studies. PMID:25761965

  8. Unveiling Hidden Dynamics of Hippo Signalling: A Systems Analysis.

    Science.gov (United States)

    Shin, Sung-Young; Nguyen, Lan K

    2016-01-01

    The Hippo signalling pathway has recently emerged as an important regulator of cell apoptosis and proliferation with significant implications in human diseases. In mammals, the pathway contains the core kinases MST1/2, which phosphorylate and activate LATS1/2 kinases. The pro-apoptotic function of the MST/LATS signalling axis was previously linked to the Akt and ERK MAPK pathways, demonstrating that the Hippo pathway does not act alone but crosstalks with other signalling pathways to coordinate network dynamics and cellular outcomes. These crosstalks were characterised by a multitude of complex regulatory mechanisms involving competitive protein-protein interactions and phosphorylation mediated feedback loops. However, how these different mechanisms interplay in different cellular contexts to drive the context-specific network dynamics of Hippo-ERK signalling remains elusive. Using mathematical modelling and computational analysis, we uncovered that the Hippo-ERK network can generate highly diverse dynamical profiles that can be clustered into distinct dose-response patterns. For each pattern, we offered mechanistic explanation that defines when and how the observed phenomenon can arise. We demonstrated that Akt displays opposing, dose-dependent functions towards ERK, which are mediated by the balance between the Raf-1/MST2 protein interaction module and the LATS1 mediated feedback regulation. Moreover, Ras displays a multi-functional role and drives biphasic responses of both MST2 and ERK activities; which are critically governed by the competitive protein interaction between MST2 and Raf-1. Our study represents the first in-depth and systematic analysis of the Hippo-ERK network dynamics and provides a concrete foundation for future studies. PMID:27527217

  9. ACTIVITY ANALYSIS WITH HIDDEN MARKOV MODEL FOR AMBIENT ASSISTED LIVING

    Directory of Open Access Journals (Sweden)

    Dietmar Bruckner

    2012-06-01

    Full Text Available In an Ambient Assisted Living (AAL project the activities of the user will be analyzed. The raw data is from a motion detector. Through data processing the huge amount of dynamic raw data was translated to state data. With hidden Markov model, forward algorithm to analyze these state data the daily activity model of the user was built. Thirdly by comparing the model with observed activity sequences, and finding out the similarities between them, defined the best adapt routine in the model. Furthermore an activity routine net was built and used to compare with the hidden Markov model.

  10. Clutter Reduction Based on Principal Component Analysis Technique for Hidden Objects Detection

    OpenAIRE

    V. Kabourek; P. Cerny; Mazanek, M.

    2012-01-01

    This paper brings a brief overview of the statistical method called Principal Component Analysis (PCA). It is used for clutter reduction in detection of hidden objects, targets hidden behind walls, buried landmines, etc. Since the measured data, imaged in time domain, suffer from the hyperbolic character of objects’ reflections, utilization of the Synthetic Aperture Radar (SAR) method is briefly described. Besides, the mathematical basics of PCA as well as its comparison with Singular Value D...

  11. Analysis of animal accelerometer data using hidden Markov models

    OpenAIRE

    Leos-Barajas, Vianey; Photopoulou, Theoni; Langrock, Roland; Patterson, Toby A; Watanabe, Yuuki; Murgatroyd, Megan; Papastamatiou, Yannis P.

    2016-01-01

    Use of accelerometers is now widespread within animal biotelemetry as they provide a means of measuring an animal's activity in a meaningful and quantitative way where direct observation is not possible. In sequential acceleration data there is a natural dependence between observations of movement or behaviour, a fact that has been largely ignored in most analyses. Analyses of acceleration data where serial dependence has been explicitly modelled have largely relied on hidden Markov models (H...

  12. Information- Theoretic Analysis for the Difficulty of Extracting Hidden Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wei-ming; LI Shi-qu; CAO Jia; LIU Jiu-fen

    2005-01-01

    The difficulty of extracting hidden information,which is essentially a kind of secrecy, is analyzed by information-theoretic method. The relations between key rate, message rate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance of stego-key, and the theoretic conclusion is used to analyze the actual extracting attack on Least Significant Bit(LSB) steganographic algorithms.

  13. Clutter Reduction Based on Principal Component Analysis Technique for Hidden Objects Detection

    Directory of Open Access Journals (Sweden)

    V. Kabourek

    2012-04-01

    Full Text Available This paper brings a brief overview of the statistical method called Principal Component Analysis (PCA. It is used for clutter reduction in detection of hidden objects, targets hidden behind walls, buried landmines, etc. Since the measured data, imaged in time domain, suffer from the hyperbolic character of objects’ reflections, utilization of the Synthetic Aperture Radar (SAR method is briefly described. Besides, the mathematical basics of PCA as well as its comparison with Singular Value Decomposition are presented. The principles of ground and clutter subtraction from image are then demonstrated using training data set and SAR processed measured data.

  14. Flux Analysis Uncovers Key Role of Functional Redundancy in Formaldehyde Metabolism

    Directory of Open Access Journals (Sweden)

    Marx Christopher J

    2005-01-01

    Full Text Available Genome-scale analysis of predicted metabolic pathways has revealed the common occurrence of apparent redundancy for specific functional units, or metabolic modules. In many cases, mutation analysis does not resolve function, and instead, direct experimental analysis of metabolic flux under changing conditions is necessary. In order to use genome sequences to build models of cellular function, it is important to define function for such apparently redundant systems. Here we describe direct flux measurements to determine the role of redundancy in three modules involved in formaldehyde assimilation and dissimilation in a bacterium growing on methanol. A combination of deuterium and 14C labeling was used to measure the flux through each of the branches of metabolism for growth on methanol during transitions into and out of methylotrophy. The cells were found to differentially partition formaldehyde among the three modules depending on the flux of methanol into the cell. A dynamic mathematical model demonstrated that the kinetic constants of the enzymes involved are sufficient to account for this phenomenon. We demonstrate the role of redundancy in formaldehyde metabolism and have uncovered a new paradigm for coping with toxic, high-flux metabolic intermediates: a dynamic, interconnected metabolic loop.

  15. Tracking Problem Solving by Multivariate Pattern Analysis and Hidden Markov Model Algorithms

    Science.gov (United States)

    Anderson, John R.

    2012-01-01

    Multivariate pattern analysis can be combined with Hidden Markov Model algorithms to track the second-by-second thinking as people solve complex problems. Two applications of this methodology are illustrated with a data set taken from children as they interacted with an intelligent tutoring system for algebra. The first "mind reading" application…

  16. Systematic Triple-Mutant Analysis Uncovers Functional Connectivity between Pathways Involved in Chromosome Regulation

    Directory of Open Access Journals (Sweden)

    James E. Haber

    2013-06-01

    Full Text Available Genetic interactions reveal the functional relationships between pairs of genes. In this study, we describe a method for the systematic generation and quantitation of triple mutants, termed triple-mutant analysis (TMA. We have used this approach to interrogate partially redundant pairs of genes in S. cerevisiae, including ASF1 and CAC1, two histone chaperones. After subjecting asf1Δ cac1Δ to TMA, we found that the Swi/Snf Rdh54 protein compensates for the absence of Asf1 and Cac1. Rdh54 more strongly associates with the chromatin apparatus and the pericentromeric region in the double mutant. Moreover, Asf1 is responsible for the synthetic lethality observed in cac1Δ strains lacking the HIRA-like proteins. A similar TMA was carried out after deleting both CLB5 and CLB6, cyclins that regulate DNA replication, revealing a strong functional connection to chromosome segregation. This approach can reveal functional redundancies that cannot be uncovered through traditional double-mutant analyses.

  17. Uncovering Information Hidden in Web Archives: Glimpse at Web Analysis Building on Data Warehouses; Towards Continuous Web Archiving: First Results and an Agenda for the Future; The Open Video Digital Library; After Migration to an Electronic Journal Collection: Impact on Faculty and Doctoral Students; Who Is Reading On-Line Education Journals? Why? And What Are They Reading?; Report on eLibrary@UBC4: Research, Collaboration and the Digital Library - Visions for 2010.

    Science.gov (United States)

    Rauber, Andreas; Bruckner, Robert M.; Aschenbrenner, Andreas; Witvoet, Oliver; Kaiser, Max; Masanes, Julien; Marchionini, Gary; Geisler, Gary; King, Donald W.; Montgomery, Carol Hansen; Rudner, Lawrence M.; Gellmann, Jennifer S.; Miller-Whitehead, Marie; Iverson, Lee

    2002-01-01

    These six articles discuss Web archives and Web analysis building on data warehouses; international efforts at continuous Web archiving; the Open Video Digital Library; electronic journal collections in academic libraries; online education journals; and an electronic library symposium at the University of British Columbia. (LRW)

  18. Identification of hidden failures in process control systems through function-oriented system analysis

    Energy Technology Data Exchange (ETDEWEB)

    Jalashgar, A.

    1997-05-01

    The main subject of this thesis is to identify hidden failures in process control systems by developing and using a function-oriented system analysis method. Qualitative failure analysis and the characteristics of the classical failure analysis methods and function-oriented modelling methods are covered. The general limitations of the methods in connection with the identification and representation of hidden failures are discussed. The discussion has led to the justification of developing and using a function-oriented system analysis method to identify and represent the capabilities of the system components, which realize different sets of functions in connection with different sets of goals that the system must achieve. A terminology is introduced to define the basic aspects of technical systems including goals, functions, capabilities and physical structure. A function-oriented system analysis method using this terminology and a tailored combination of the two function-oriented modelling approaches, is also introduced. It is then explained how the method can be applied in the identification and representation of hidden failures. The building blocks of a knowledge-oriented system to perform the diagnosis on the basis of the developed method are equally described. A prototype of the knowledge-based system is developed to demonstrate the applicability of the function-oriented system analysis method and the knowledge-based system. The prototype is implemented within the object-oriented software environment G2. (au) 65 ills., 32 refs.

  19. Whose Immigration Story?: Attending to Hidden Messages of Material in Social Studies

    Science.gov (United States)

    Oikonomidoy, Eleni; Williams, Gwendolyn

    2010-01-01

    Sometimes materials used in schools with good intentions can have effects opposite from those stated. Through the microscopic analysis of a parent-student immigration interview assignment on a social studies unit on immigration, this article aims to uncover the hidden story that underlies the questions asked. In so doing, it intends not only to…

  20. Explodet Project:. Methods of Automatic Data Processing and Analysis for the Detection of Hidden Explosive

    Science.gov (United States)

    Lecca, Paola

    2003-12-01

    The research of the INFN Gruppo Collegato di Trento in the ambit of EXPLODET project for the humanitarian demining, is devoted to the development of a software procedure for the automatization of data analysis and decision taking about the presence of hidden explosive. Innovative algorithms of likely background calculation, a system based on neural networks for energy calibration and simple statistical methods for the qualitative consistency check of the signals are the main parts of the software performing the automatic data elaboration.

  1. Hidden Trends in 90 Years of Harvard Business Review

    OpenAIRE

    Tsai, Chia-Chi; Liu, Chao-Lin; Huang, Wei-Jie; Shan, Man-Kwan

    2012-01-01

    In this paper, we demonstrate and discuss results of our mining the abstracts of the publications in Harvard Business Review between 1922 and 2012. Techniques for computing n-grams, collocations, basic sentiment analysis, and named-entity recognition were employed to uncover trends hidden in the abstracts. We present findings about international relationships, sentiment in HBR's abstracts, important international companies, influential technological inventions, renown researchers in managemen...

  2. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels

    OpenAIRE

    Kilpeläinen, Tuomas O; Carli, Jayne F Martin; Skowronski, Alicja A.; Sun, Qi; Kriebel, Jennifer; Feitosa, Mary F.; Hedman, Åsa K.; Drong, Alexander W.; Hayes, James E.; Zhao, Jinghua; Pers, Tune H; Schick, Ursula; Grarup, Niels; Kutalik, Zoltán; Trompet, Stella

    2016-01-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered. Therefore, we performed a genome-wide association study (GWAS) of circulating leptin levels from 32,161 individuals and followed up loci reaching P

  3. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels

    OpenAIRE

    Kilpeläinen, Tuomas O; Carli, Jayne F Martin; Skowronski, Alicja A.; Sun, Qi; Kriebel, Jennifer; Feitosa, Mary F.; Hedman, Åsa K.; Drong, Alexander W.; Hayes, James E.; Zhao, Jinghua; Pers, Tune H; Schick, Ursula; Grarup, Niels; Kutalik, Zoltán; Trompet, Stella

    2016-01-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered. Therefore, we performed a genome-wide association study (GWAS) of circulating leptin levels from 32,161 individuals and followed up loci reaching P < 10(-6) in 19,979 additional individuals. We i...

  4. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels

    OpenAIRE

    Kilpeläinen, Tuomas O; Carli, Jayne F Martin; Skowronski, Alicja A.; Sun, Qi; Kriebel, Jennifer; Feitosa, Mary F.; Hedman, Åsa K.; Drong, Alexander W.; Hayes, James E.; Zhao, Jinghua; Pers, Tune H; Schick, Ursula; Grarup, Niels; Kutalik, Zoltán; Trompet, Stella

    2016-01-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered. Therefore, we performed a genome-wide association study (GWAS) of circulating leptin levels from 32,161 individuals and followed up loci reaching P<10−6 in 19,979 additional individuals. We ident...

  5. IEEE 802.11e (EDCA analysis in the presence of hidden stations

    Directory of Open Access Journals (Sweden)

    Xijie Liu

    2011-07-01

    Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.

  6. Hidden symmetries in five-dimensional supergravity

    International Nuclear Information System (INIS)

    This thesis is concerned with the study of hidden symmetries in supergravity, which play an important role in the present picture of supergravity and string theory. Concretely, the appearance of a hidden G2(+2)/SO(4) symmetry is studied in the dimensional reduction of d=5, N=2 supergravity to three dimensions - a parallel model to the more famous E8(+8)/SO(16) case in eleven-dimensional supergravity. Extending previous partial results for the bosonic part, I give a derivation that includes fermionic terms. This sheds new light on the appearance of the local hidden symmetry SO(4) in the reduction, and shows up an unusual feature which follows from an analysis of the R-symmetry associated with N=4 supergravity and of the supersymmetry variations, and which has no parallel in the eleven-dimensional case: The emergence of an additional SO(3) as part of the enhanced local symmetry, invisible in the dimensional reduction of the gravitino, and corresponding to the fact that, of the SO(4) used in the coset model, only the diagonal SO(3) is visible immediately upon dimensional reduction. The uncovering of the hidden symmetries proceeds via the construction of the proper coset gravity in three dimensions, and matching it with the Lagrangian obtained from the reduction. (orig.)

  7. Hidden Color

    International Nuclear Information System (INIS)

    With the acceptance of QCD as the fundamental theory of strong interactions, one of the basic problems in the analysis of nuclear phenomena became how to consistently account for the effects of the underlying quark/gluon structure of nucleons and nuclei. Besides providing more detailed understanding of conventional nuclear physics, QCD may also point to novel phenomena accessible by new or upgraded nuclear experimental facilities. We discuss a few interesting applications of QCD to nuclear physics with an emphasis on the hidden color degrees of freedom

  8. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels

    DEFF Research Database (Denmark)

    Kilpeläinen, Tuomas O; Carli, Jayne F Martin; Skowronski, Alicja A;

    2016-01-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered....... Therefore, we performed a genome-wide association study (GWAS) of circulating leptin levels from 32,161 individuals and followed up loci reaching P<10(-6) in 19,979 additional individuals. We identify five loci robustly associated (P<5 × 10(-8)) with leptin levels in/near LEP, SLC32A1, GCKR, CCNL1 and FTO....... Although the association of the FTO obesity locus with leptin levels is abolished by adjustment for BMI, associations of the four other loci are independent of adiposity. The GCKR locus was found associated with multiple metabolic traits in previous GWAS and the CCNL1 locus with birth weight. Knockdown...

  9. A hidden Ising model for ChIP-chip data analysis

    KAUST Repository

    Mo, Q.

    2010-01-28

    Motivation: Chromatin immunoprecipitation (ChIP) coupled with tiling microarray (chip) experiments have been used in a wide range of biological studies such as identification of transcription factor binding sites and investigation of DNA methylation and histone modification. Hidden Markov models are widely used to model the spatial dependency of ChIP-chip data. However, parameter estimation for these models is typically either heuristic or suboptimal, leading to inconsistencies in their applications. To overcome this limitation and to develop an efficient software, we propose a hidden ferromagnetic Ising model for ChIP-chip data analysis. Results: We have developed a simple, but powerful Bayesian hierarchical model for ChIP-chip data via a hidden Ising model. Metropolis within Gibbs sampling algorithm is used to simulate from the posterior distribution of the model parameters. The proposed model naturally incorporates the spatial dependency of the data, and can be used to analyze data with various genomic resolutions and sample sizes. We illustrate the method using three publicly available datasets and various simulated datasets, and compare it with three closely related methods, namely TileMap HMM, tileHMM and BAC. We find that our method performs as well as TileMap HMM and BAC for the high-resolution data from Affymetrix platform, but significantly outperforms the other three methods for the low-resolution data from Agilent platform. Compared with the BAC method which also involves MCMC simulations, our method is computationally much more efficient. Availability: A software called iChip is freely available at http://www.bioconductor.org/. Contact: moq@mskcc.org. © The Author 2010. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oxfordjournals.org.

  10. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels.

    Science.gov (United States)

    Kilpeläinen, Tuomas O; Carli, Jayne F Martin; Skowronski, Alicja A; Sun, Qi; Kriebel, Jennifer; Feitosa, Mary F; Hedman, Åsa K; Drong, Alexander W; Hayes, James E; Zhao, Jinghua; Pers, Tune H; Schick, Ursula; Grarup, Niels; Kutalik, Zoltán; Trompet, Stella; Mangino, Massimo; Kristiansson, Kati; Beekman, Marian; Lyytikäinen, Leo-Pekka; Eriksson, Joel; Henneman, Peter; Lahti, Jari; Tanaka, Toshiko; Luan, Jian'an; Del Greco M, Fabiola; Pasko, Dorota; Renström, Frida; Willems, Sara M; Mahajan, Anubha; Rose, Lynda M; Guo, Xiuqing; Liu, Yongmei; Kleber, Marcus E; Pérusse, Louis; Gaunt, Tom; Ahluwalia, Tarunveer S; Ju Sung, Yun; Ramos, Yolande F; Amin, Najaf; Amuzu, Antoinette; Barroso, Inês; Bellis, Claire; Blangero, John; Buckley, Brendan M; Böhringer, Stefan; I Chen, Yii-Der; de Craen, Anton J N; Crosslin, David R; Dale, Caroline E; Dastani, Zari; Day, Felix R; Deelen, Joris; Delgado, Graciela E; Demirkan, Ayse; Finucane, Francis M; Ford, Ian; Garcia, Melissa E; Gieger, Christian; Gustafsson, Stefan; Hallmans, Göran; Hankinson, Susan E; Havulinna, Aki S; Herder, Christian; Hernandez, Dena; Hicks, Andrew A; Hunter, David J; Illig, Thomas; Ingelsson, Erik; Ioan-Facsinay, Andreea; Jansson, John-Olov; Jenny, Nancy S; Jørgensen, Marit E; Jørgensen, Torben; Karlsson, Magnus; Koenig, Wolfgang; Kraft, Peter; Kwekkeboom, Joanneke; Laatikainen, Tiina; Ladwig, Karl-Heinz; LeDuc, Charles A; Lowe, Gordon; Lu, Yingchang; Marques-Vidal, Pedro; Meisinger, Christa; Menni, Cristina; Morris, Andrew P; Myers, Richard H; Männistö, Satu; Nalls, Mike A; Paternoster, Lavinia; Peters, Annette; Pradhan, Aruna D; Rankinen, Tuomo; Rasmussen-Torvik, Laura J; Rathmann, Wolfgang; Rice, Treva K; Brent Richards, J; Ridker, Paul M; Sattar, Naveed; Savage, David B; Söderberg, Stefan; Timpson, Nicholas J; Vandenput, Liesbeth; van Heemst, Diana; Uh, Hae-Won; Vohl, Marie-Claude; Walker, Mark; Wichmann, Heinz-Erich; Widén, Elisabeth; Wood, Andrew R; Yao, Jie; Zeller, Tanja; Zhang, Yiying; Meulenbelt, Ingrid; Kloppenburg, Margreet; Astrup, Arne; Sørensen, Thorkild I A; Sarzynski, Mark A; Rao, D C; Jousilahti, Pekka; Vartiainen, Erkki; Hofman, Albert; Rivadeneira, Fernando; Uitterlinden, André G; Kajantie, Eero; Osmond, Clive; Palotie, Aarno; Eriksson, Johan G; Heliövaara, Markku; Knekt, Paul B; Koskinen, Seppo; Jula, Antti; Perola, Markus; Huupponen, Risto K; Viikari, Jorma S; Kähönen, Mika; Lehtimäki, Terho; Raitakari, Olli T; Mellström, Dan; Lorentzon, Mattias; Casas, Juan P; Bandinelli, Stefanie; März, Winfried; Isaacs, Aaron; van Dijk, Ko W; van Duijn, Cornelia M; Harris, Tamara B; Bouchard, Claude; Allison, Matthew A; Chasman, Daniel I; Ohlsson, Claes; Lind, Lars; Scott, Robert A; Langenberg, Claudia; Wareham, Nicholas J; Ferrucci, Luigi; Frayling, Timothy M; Pramstaller, Peter P; Borecki, Ingrid B; Waterworth, Dawn M; Bergmann, Sven; Waeber, Gérard; Vollenweider, Peter; Vestergaard, Henrik; Hansen, Torben; Pedersen, Oluf; Hu, Frank B; Eline Slagboom, P; Grallert, Harald; Spector, Tim D; Jukema, J W; Klein, Robert J; Schadt, Erik E; Franks, Paul W; Lindgren, Cecilia M; Leibel, Rudolph L; Loos, Ruth J F

    2016-01-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered. Therefore, we performed a genome-wide association study (GWAS) of circulating leptin levels from 32,161 individuals and followed up loci reaching P<10(-6) in 19,979 additional individuals. We identify five loci robustly associated (P<5 × 10(-8)) with leptin levels in/near LEP, SLC32A1, GCKR, CCNL1 and FTO. Although the association of the FTO obesity locus with leptin levels is abolished by adjustment for BMI, associations of the four other loci are independent of adiposity. The GCKR locus was found associated with multiple metabolic traits in previous GWAS and the CCNL1 locus with birth weight. Knockdown experiments in mouse adipose tissue explants show convincing evidence for adipogenin, a regulator of adipocyte differentiation, as the novel causal gene in the SLC32A1 locus influencing leptin levels. Our findings provide novel insights into the regulation of leptin production by adipose tissue and open new avenues for examining the influence of variation in leptin levels on adiposity and metabolic health. PMID:26833098

  11. Proteomic Analysis of Cytokeratin Isoforms Uncovers Association with Survival in Lung Adenocarcinoma

    Directory of Open Access Journals (Sweden)

    Tarek G. Gharib

    2002-01-01

    Full Text Available Cytokeratins. (CK are intermediate filaments whose expression is often altered in epithelial cancer. Systematic identification of lung adenocarcinoma proteins using two-dimensional polyacrylamide gel electrophoresis and mass spectrometry has uncovered numerous CK isoforms. In this study, 93 lung adenocarcinomas. (64 stage I and 29 stage III and 10 uninvolved lung samples were quantitatively examined for protein expression. Fourteen of 21 isoforms of CK 7, 8, 18, 19 occurred at significantly higher levels. (P<.05 in tumors compared to uninvolved adjacent tissue. Specific isoforms of the four types of CK identified correlated with either clinical outcome or individual clinical-pathological parameters. All five of the CK7 isoforms associated with patient survival represented cleavage products. Two of five CK7 isoforms. (nos. 2165 and 2091, one of eight CK8 isoforms. (no. 439, one of three CK19 isoforms. (no. 1955 were associated with survival and significantly correlated to their mRNA levels, suggesting that transcription underlies overexpression of these CK isoforms. Our data indicate substantial heterogeneity among CK in lung adenocarcinomas resulting from posttranslational modifications, some of which correlated with patient survival and other clinical parameters. Therefore, specific isoforms of individual CK may have utility as diagnostic or predictive markers in lung adenocarcinomas.

  12. Genome-wide meta-analysis uncovers novel loci influencing circulating leptin levels

    Science.gov (United States)

    Kilpeläinen, Tuomas O.; Carli, Jayne F. Martin; Skowronski, Alicja A.; Sun, Qi; Kriebel, Jennifer; Feitosa, Mary F; Hedman, Åsa K.; Drong, Alexander W.; Hayes, James E.; Zhao, Jinghua; Pers, Tune H.; Schick, Ursula; Grarup, Niels; Kutalik, Zoltán; Trompet, Stella; Mangino, Massimo; Kristiansson, Kati; Beekman, Marian; Lyytikäinen, Leo-Pekka; Eriksson, Joel; Henneman, Peter; Lahti, Jari; Tanaka, Toshiko; Luan, Jian'an; Greco M, Fabiola Del; Pasko, Dorota; Renström, Frida; Willems, Sara M.; Mahajan, Anubha; Rose, Lynda M.; Guo, Xiuqing; Liu, Yongmei; Kleber, Marcus E.; Pérusse, Louis; Gaunt, Tom; Ahluwalia, Tarunveer S.; Ju Sung, Yun; Ramos, Yolande F.; Amin, Najaf; Amuzu, Antoinette; Barroso, Inês; Bellis, Claire; Blangero, John; Buckley, Brendan M.; Böhringer, Stefan; I Chen, Yii-Der; de Craen, Anton J. N.; Crosslin, David R.; Dale, Caroline E.; Dastani, Zari; Day, Felix R.; Deelen, Joris; Delgado, Graciela E.; Demirkan, Ayse; Finucane, Francis M.; Ford, Ian; Garcia, Melissa E.; Gieger, Christian; Gustafsson, Stefan; Hallmans, Göran; Hankinson, Susan E.; Havulinna, Aki S; Herder, Christian; Hernandez, Dena; Hicks, Andrew A.; Hunter, David J.; Illig, Thomas; Ingelsson, Erik; Ioan-Facsinay, Andreea; Jansson, John-Olov; Jenny, Nancy S.; Jørgensen, Marit E.; Jørgensen, Torben; Karlsson, Magnus; Koenig, Wolfgang; Kraft, Peter; Kwekkeboom, Joanneke; Laatikainen, Tiina; Ladwig, Karl-Heinz; LeDuc, Charles A.; Lowe, Gordon; Lu, Yingchang; Marques-Vidal, Pedro; Meisinger, Christa; Menni, Cristina; Morris, Andrew P.; Myers, Richard H.; Männistö, Satu; Nalls, Mike A.; Paternoster, Lavinia; Peters, Annette; Pradhan, Aruna D.; Rankinen, Tuomo; Rasmussen-Torvik, Laura J.; Rathmann, Wolfgang; Rice, Treva K.; Brent Richards, J; Ridker, Paul M.; Sattar, Naveed; Savage, David B.; Söderberg, Stefan; Timpson, Nicholas J.; Vandenput, Liesbeth; van Heemst, Diana; Uh, Hae-Won; Vohl, Marie-Claude; Walker, Mark; Wichmann, Heinz-Erich; Widén, Elisabeth; Wood, Andrew R.; Yao, Jie; Zeller, Tanja; Zhang, Yiying; Meulenbelt, Ingrid; Kloppenburg, Margreet; Astrup, Arne; Sørensen, Thorkild I. A.; Sarzynski, Mark A.; Rao, D. C.; Jousilahti, Pekka; Vartiainen, Erkki; Hofman, Albert; Rivadeneira, Fernando; Uitterlinden, André G.; Kajantie, Eero; Osmond, Clive; Palotie, Aarno; Eriksson, Johan G.; Heliövaara, Markku; Knekt, Paul B.; Koskinen, Seppo; Jula, Antti; Perola, Markus; Huupponen, Risto K.; Viikari, Jorma S.; Kähönen, Mika; Lehtimäki, Terho; Raitakari, Olli T.; Mellström, Dan; Lorentzon, Mattias; Casas, Juan P.; Bandinelli, Stefanie; März, Winfried; Isaacs, Aaron; van Dijk, Ko W.; van Duijn, Cornelia M.; Harris, Tamara B.; Bouchard, Claude; Allison, Matthew A.; Chasman, Daniel I.; Ohlsson, Claes; Lind, Lars; Scott, Robert A.; Langenberg, Claudia; Wareham, Nicholas J.; Ferrucci, Luigi; Frayling, Timothy M.; Pramstaller, Peter P.; Borecki, Ingrid B.; Waterworth, Dawn M.; Bergmann, Sven; Waeber, Gérard; Vollenweider, Peter; Vestergaard, Henrik; Hansen, Torben; Pedersen, Oluf; Hu, Frank B.; Eline Slagboom, P; Grallert, Harald; Spector, Tim D.; Jukema, J.W.; Klein, Robert J.; Schadt, Erik E; Franks, Paul W.; Lindgren, Cecilia M.; Leibel, Rudolph L.; Loos, Ruth J. F.

    2016-01-01

    Leptin is an adipocyte-secreted hormone, the circulating levels of which correlate closely with overall adiposity. Although rare mutations in the leptin (LEP) gene are well known to cause leptin deficiency and severe obesity, no common loci regulating circulating leptin levels have been uncovered. Therefore, we performed a genome-wide association study (GWAS) of circulating leptin levels from 32,161 individuals and followed up loci reaching P<10−6 in 19,979 additional individuals. We identify five loci robustly associated (P<5 × 10−8) with leptin levels in/near LEP, SLC32A1, GCKR, CCNL1 and FTO. Although the association of the FTO obesity locus with leptin levels is abolished by adjustment for BMI, associations of the four other loci are independent of adiposity. The GCKR locus was found associated with multiple metabolic traits in previous GWAS and the CCNL1 locus with birth weight. Knockdown experiments in mouse adipose tissue explants show convincing evidence for adipogenin, a regulator of adipocyte differentiation, as the novel causal gene in the SLC32A1 locus influencing leptin levels. Our findings provide novel insights into the regulation of leptin production by adipose tissue and open new avenues for examining the influence of variation in leptin levels on adiposity and metabolic health. PMID:26833098

  13. Analysis on hidden blood loss of total knee arthroplasty in treating knee osteoarthritis

    Institute of Scientific and Technical Information of China (English)

    SHEN Hui-liang; LI Zheng; FENG Ming-li; CAO Guang-le

    2011-01-01

    Background Total knee arthroplasty (TKA) is an important therapy for the treatment of various late-stage knee diseases. However, it has been observed that patients have lower hemoglobin (HB) counts postoperatively, which are significantly inconsistent with the measured blood loss. Although the concept of hidden blood loss has been presented in 2000, very little clinical attention has been paid since then. In this study, we investigated the characteristics and influential factor of hidden blood loss after TKA in treating knee osteoarthritis.Methods One hundred and eight patients, with 42 males and 66 females, were retrospectively analyzed. The perioperative blood loss and the hidden blood loss following TKA were calculated by Gross formula. Potential factors affecting perioperative and hidden blood loss included gender, surgical time, tourniquet time, hemostasis (during operation with deflating tourniquet), and reinfusion of salvaged blood.Results The average perioperative blood loss was found to be (1553±356) ml and the average hidden blood loss was (793±223) ml. The hidden blood loss of the male was significantly higher than that of the female, and was reduced by hemostasis during the operation with a deflating tourniquet. Hidden blood loss was not affected by postoperative blood salvage and reinfusion, surgical time, or tourniquet time.Conclusions When calculating the value of hidden blood loss by Gross formula, the lowest value of hematocrit should be chosen as the parameter so that hidden blood loss would not be underestimated. No significant differences could be found in hidden blood loss for males compared to females. Hidden blood loss can be reduced by hemostasis during operation with a deflating tourniquet. Although reinfusion of salvaged blood could not reduce the perioperative blood loss or hidden blood loss, it was still an effective method to reduce transfusion rate.

  14. Hidden Markov model analysis of maternal behavior patterns in inbred and reciprocal hybrid mice.

    Directory of Open Access Journals (Sweden)

    Valeria Carola

    Full Text Available Individual variation in maternal care in mammals shows a significant heritable component, with the maternal behavior of daughters resembling that of their mothers. In laboratory mice, genetically distinct inbred strains show stable differences in maternal care during the first postnatal week. Moreover, cross fostering and reciprocal breeding studies demonstrate that differences in maternal care between inbred strains persist in the absence of genetic differences, demonstrating a non-genetic or epigenetic contribution to maternal behavior. In this study we applied a mathematical tool, called hidden Markov model (HMM, to analyze the behavior of female mice in the presence of their young. The frequency of several maternal behaviors in mice has been previously described, including nursing/grooming pups and tending to the nest. However, the ordering, clustering, and transitions between these behaviors have not been systematically described and thus a global description of maternal behavior is lacking. Here we used HMM to describe maternal behavior patterns in two genetically distinct mouse strains, C57BL/6 and BALB/c, and their genetically identical reciprocal hybrid female offspring. HMM analysis is a powerful tool to identify patterns of events that cluster in time and to determine transitions between these clusters, or hidden states. For the HMM analysis we defined seven states: arched-backed nursing, blanket nursing, licking/grooming pups, grooming, activity, eating, and sleeping. By quantifying the frequency, duration, composition, and transition probabilities of these states we were able to describe the pattern of maternal behavior in mouse and identify aspects of these patterns that are under genetic and nongenetic inheritance. Differences in these patterns observed in the experimental groups (inbred and hybrid females were detected only after the application of HMM analysis whereas classical statistical methods and analyses were not able to

  15. Hidden corrosion detection in aircraft aluminum structures using laser ultrasonics and wavelet transform signal analysis.

    Science.gov (United States)

    Silva, M Z; Gouyon, R; Lepoutre, F

    2003-06-01

    Preliminary results of hidden corrosion detection in aircraft aluminum structures using a noncontact laser based ultrasonic technique are presented. A short laser pulse focused to a line spot is used as a broadband source of ultrasonic guided waves in an aluminum 2024 sample cut from an aircraft structure and prepared with artificially corroded circular areas on its back surface. The out of plane surface displacements produced by the propagating ultrasonic waves were detected with a heterodyne Mach-Zehnder interferometer. Time-frequency analysis of the signals using a continuous wavelet transform allowed the identification of the generated Lamb modes by comparison with the calculated dispersion curves. The presence of back surface corrosion was detected by noting the loss of the S(1) mode near its cutoff frequency. This method is applicable to fast scanning inspection techniques and it is particularly suited for early corrosion detection. PMID:12782263

  16. Analysis of complex neural circuits with nonlinear multidimensional hidden state models.

    Science.gov (United States)

    Friedman, Alexander; Slocum, Joshua F; Tyulmankov, Danil; Gibb, Leif G; Altshuler, Alex; Ruangwises, Suthee; Shi, Qinru; Toro Arana, Sebastian E; Beck, Dirk W; Sholes, Jacquelyn E C; Graybiel, Ann M

    2016-06-01

    A universal need in understanding complex networks is the identification of individual information channels and their mutual interactions under different conditions. In neuroscience, our premier example, networks made up of billions of nodes dynamically interact to bring about thought and action. Granger causality is a powerful tool for identifying linear interactions, but handling nonlinear interactions remains an unmet challenge. We present a nonlinear multidimensional hidden state (NMHS) approach that achieves interaction strength analysis and decoding of networks with nonlinear interactions by including latent state variables for each node in the network. We compare NMHS to Granger causality in analyzing neural circuit recordings and simulations, improvised music, and sociodemographic data. We conclude that NMHS significantly extends the scope of analyses of multidimensional, nonlinear networks, notably in coping with the complexity of the brain. PMID:27222584

  17. Hidden Markov model analysis of force/torque information in telemanipulation

    Science.gov (United States)

    Hannaford, Blake; Lee, Paul

    1991-01-01

    A model for the prediction and analysis of sensor information recorded during robotic performance of telemanipulation tasks is presented. The model uses the hidden Markov model to describe the task structure, the operator's or intelligent controller's goal structure, and the sensor signals. A methodology for constructing the model parameters based on engineering knowledge of the task is described. It is concluded that the model and its optimal state estimation algorithm, the Viterbi algorithm, are very succesful at the task of segmenting the data record into phases corresponding to subgoals of the task. The model provides a rich modeling structure within a statistical framework, which enables it to represent complex systems and be robust to real-world sensory signals.

  18. Regularized Deterministic Annealing Hidden Markov Models for Identificationand Analysis of Seismic and Aseismic events.

    Science.gov (United States)

    Granat, R. A.; Clayton, R.; Kedar, S.; Kaneko, Y.

    2003-12-01

    We employ a robust hidden Markov model (HMM) based technique to perform statistical pattern analysis of suspected seismic and aseismic events in the poorly explored period band of minutes to hours. The technique allows us to classify known events and provides a statistical basis for finding and cataloging similar events represented elsewhere in the observations. In this work, we focus on data collected by the Southern California TriNet system. The hidden Markov model (HMM) approach assumes that the observed data has been generated by an unobservable dynamical statistical process. The process is of a particular form such that each observation is coincident with the system being in a particular discrete state. The dynamics are the model are constructed so that the next state is directly dependent only on the current state -- it is a first order Markov process. The model is completely described by a set of parameters: the initial state probabilities, the first order Markov chain state-to-state transition probabilities, and the probability distribution of observable outputs associated with each state. Application of the model to data involves optimizing these model parameters with respect to some function of the observations, typically the likelihood of the observations given the model. Our work focused on the fact that this objective function has a number of local maxima that is exponential in the model size (the number of states). This means that not only is it very difficult to discover the global maximum, but also that results can vary widely between applications of the model. For some domains which employ HMMs for such purposes, such as speech processing, sufficient a priori information about the system is available to avoid this problem. However, for seismic data in general such a priori information is not available. Our approach involves analytical location of sub-optimal local maxima; once the locations of these maxima have been found, then we can employ a

  19. Meta-analysis of cancer transcriptomes: A new approach to uncover molecular pathological events in different cancer tissues

    Directory of Open Access Journals (Sweden)

    Sundus Iqbal

    2014-03-01

    Full Text Available To explore secrets of metastatic cancers, individual expression of true sets of respective genes must spread across the tissue. In this study, meta-analysis for transcriptional profiles of oncogenes was carried out to hunt critical genes or networks helping in metastasizing cancers. For this, transcriptomic analysis of different cancerous tissues causing leukemia, lung, liver, spleen, colorectal, colon, breast, bladder, and kidney cancers was performed by extracting microarray expression data from online resource; Gene Expression Omnibus. A newly developed bioinformatics technique; Dynamic Impact Approach (DIA was applied for enrichment analysis of transcriptional profiles using Database for Annotation Visualization and Integrated Discovery (DAVID. Furthermore, oPOSSUM (v. 2.0 and Cytoscape (v. 2.8.2 were used for in-depth analysis of transcription factors and regulatory gene networks respectively. DAVID analysis uncovered the most significantly enriched pathways in molecular functions that were 'Ubiquitin thiolesterase activity' up regulated in blood, breast, bladder, colorectal, lung, spleen, prostrate cancer. 'Transforming growth factor beta receptor activity' was inhibited in all cancers except leukemia, colon and liver cancer. oPOSSUM further revealed highly over-represented Transcription Factors (TFs; Broad-complex_3, Broad-complex_4, and Foxd3 except for leukemia and bladder cancer. From these findings, it is possible to target genes and networks, play a crucial role in the development of cancer. In the future, these transcription factors can serve as potential candidates for the therapeutic drug targets which can impede the deadly spread.

  20. Near-Surface CO2 Monitoring And Analysis To Detect Hidden Geothermal Systems

    Energy Technology Data Exchange (ETDEWEB)

    Lewicki, Jennifer L.; Oldenburg, Curtis M.

    2005-01-19

    ''Hidden'' geothermal systems are systems devoid of obvious surface hydrothermal manifestations. Emissions of moderate-to-low solubility gases may be one of the primary near-surface signals from these systems. We investigate the potential for CO2 detection and monitoring below and above ground in the near-surface environment as an approach to exploration targeting hidden geothermal systems. We focus on CO2 because it is the dominant noncondensible gas species in most geothermal systems and has moderate solubility in water. We carried out numerical simulations of a CO2 migration scenario to calculate the magnitude of expected fluxes and concentrations. Our results show that CO2 concentrations can reach high levels in the shallow subsurface even for relatively low geothermal source CO2 fluxes. However, once CO2 seeps out of the ground into the atmospheric surface layer, winds are effective at dispersing CO2 seepage. In natural ecological systems in the absence of geothermal gas emissions, near-surface CO2 fluxes and concentrations are predominantly controlled by CO2 uptake by photosynthesis, production by root respiration, microbial decomposition of soil/subsoil organic matter, groundwater degassing, and exchange with the atmosphere. Available technologies for monitoring CO2 in the near-surface environment include the infrared gas analyzer, the accumulation chamber method, the eddy covariance method, hyperspectral imaging, and light detection and ranging. To meet the challenge of detecting potentially small-magnitude geothermal CO2 emissions within the natural background variability of CO2, we propose an approach that integrates available detection and monitoring techniques with statistical analysis and modeling strategies. The proposed monitoring plan initially focuses on rapid, economical, reliable measurements of CO2 subsurface concentrations and surface fluxes and statistical analysis of the collected data. Based on this analysis, are as with

  1. Computational analysis of the mechanism of chemical reactions in terms of reaction phases: hidden intermediates and hidden transition States.

    Science.gov (United States)

    Kraka, Elfi; Cremer, Dieter

    2010-05-18

    Computational approaches to understanding chemical reaction mechanisms generally begin by establishing the relative energies of the starting materials, transition state, and products, that is, the stationary points on the potential energy surface of the reaction complex. Examining the intervening species via the intrinsic reaction coordinate (IRC) offers further insight into the fate of the reactants by delineating, step-by-step, the energetics involved along the reaction path between the stationary states. For a detailed analysis of the mechanism and dynamics of a chemical reaction, the reaction path Hamiltonian (RPH) and the united reaction valley approach (URVA) are an efficient combination. The chemical conversion of the reaction complex is reflected by the changes in the reaction path direction t(s) and reaction path curvature k(s), both expressed as a function of the path length s. This information can be used to partition the reaction path, and by this the reaction mechanism, of a chemical reaction into reaction phases describing chemically relevant changes of the reaction complex: (i) a contact phase characterized by van der Waals interactions, (ii) a preparation phase, in which the reactants prepare for the chemical processes, (iii) one or more transition state phases, in which the chemical processes of bond cleavage and bond formation take place, (iv) a product adjustment phase, and (v) a separation phase. In this Account, we examine mechanistic analysis with URVA in detail, focusing on recent theoretical insights (with a variety of reaction types) from our laboratories. Through the utilization of the concept of localized adiabatic vibrational modes that are associated with the internal coordinates, q(n)(s), of the reaction complex, the chemical character of each reaction phase can be identified via the adiabatic curvature coupling coefficients, A(n,s)(s). These quantities reveal whether a local adiabatic vibrational mode supports (A(n,s) > 0) or resists

  2. An Optimization-Driven Analysis Pipeline to Uncover Biomarkers and Signaling Paths: Cervix Cancer

    Directory of Open Access Journals (Sweden)

    Enery Lorenzo

    2015-05-01

    Full Text Available Establishing how a series of potentially important genes might relate to each other is relevant to understand the origin and evolution of illnesses, such as cancer. High‑throughput biological experiments have played a critical role in providing information in this regard. A special challenge, however, is that of trying to conciliate information from separate microarray experiments to build a potential genetic signaling path. This work proposes a two-step analysis pipeline, based on optimization, to approach meta-analysis aiming to build a proxy for a genetic signaling path.

  3. A Procedure for Uncovering Acceptable and Nonacceptable Mortgage Applications through Discriminant Analysis Using Ranked Data

    OpenAIRE

    Larry G. Perry; Timothy P. Cronan; Donald A. Epley

    1987-01-01

    The procedure developed in this paper uses a less biased statistical technique than conventional discriminant analysis and parallels the ranking procedure used by loan officers. A variety of univariate and multivariate statistical procedures as well as comprehensive validation methods are used to develop a "best" model. The resulting model provides more accurate classification than other studies have shown, without violating federal law regarding discrimination.

  4. Analysis of the Legionella longbeachae genome and transcriptome uncovers unique strategies to cause Legionnaires' disease.

    Directory of Open Access Journals (Sweden)

    Christel Cazalet

    2010-02-01

    Full Text Available Legionella pneumophila and L. longbeachae are two species of a large genus of bacteria that are ubiquitous in nature. L. pneumophila is mainly found in natural and artificial water circuits while L. longbeachae is mainly present in soil. Under the appropriate conditions both species are human pathogens, capable of causing a severe form of pneumonia termed Legionnaires' disease. Here we report the sequencing and analysis of four L. longbeachae genomes, one complete genome sequence of L. longbeachae strain NSW150 serogroup (Sg 1, and three draft genome sequences another belonging to Sg1 and two to Sg2. The genome organization and gene content of the four L. longbeachae genomes are highly conserved, indicating strong pressure for niche adaptation. Analysis and comparison of L. longbeachae strain NSW150 with L. pneumophila revealed common but also unexpected features specific to this pathogen. The interaction with host cells shows distinct features from L. pneumophila, as L. longbeachae possesses a unique repertoire of putative Dot/Icm type IV secretion system substrates, eukaryotic-like and eukaryotic domain proteins, and encodes additional secretion systems. However, analysis of the ability of a dotA mutant of L. longbeachae NSW150 to replicate in the Acanthamoeba castellanii and in a mouse lung infection model showed that the Dot/Icm type IV secretion system is also essential for the virulence of L. longbeachae. In contrast to L. pneumophila, L. longbeachae does not encode flagella, thereby providing a possible explanation for differences in mouse susceptibility to infection between the two pathogens. Furthermore, transcriptome analysis revealed that L. longbeachae has a less pronounced biphasic life cycle as compared to L. pneumophila, and genome analysis and electron microscopy suggested that L. longbeachae is encapsulated. These species-specific differences may account for the different environmental niches and disease epidemiology of these

  5. Temporal structure analysis of broadcast tennis video using hidden Markov models

    Science.gov (United States)

    Kijak, Ewa; Oisel, Lionel; Gros, Patrick

    2003-01-01

    This work aims at recovering the temporal structure of a broadcast tennis video from an analysis of the raw footage. Our method relies on a statistical model of the interleaving of shots, in order to group shots into predefined classes representing structural elements of a tennis video. This stochastic modeling is performed in the global framework of Hidden Markov Models (HMMs). The fundamental units are shots and transitions. In a first step, colors and motion attributes of segmented shots are used to map shots into 2 classes: game (view of the full tennis court) and not game (medium, close up views, and commercials). In a second step, a trained HMM is used to analyze the temporal interleaving of shots. This analysis results in the identification of more complex structures, such as first missed services, short rallies that could be aces or services, long rallies, breaks that are significant of the end of a game and replays that highlight interesting points. These higher-level unit structures can be used either to create summaries, or to allow non-linear browsing of the video.

  6. The Correspondence Analysis Platform for Uncovering Deep Structure in Data and Information

    CERN Document Server

    Murtagh, Fionn

    2008-01-01

    We study two aspects of information semantics: (i) the collection of all relationships, (ii) tracking and spotting anomaly and change. The first is implemented by endowing all relevant information spaces with a Euclidean metric in a common projected space. The second is modelled by an induced ultrametric. A very general way to achieve a Euclidean embedding of different information spaces based on cross-tabulation counts (and from other input data formats) is provided by Correspondence Analysis. From there, the induced ultrametric that we are particularly interested in takes a sequential - e.g. temporal - ordering of the data into account. We employ such a perspective to look at narrative, "the flow of thought and the flow of language" (Chafe). In application to policy decision making, we show how we can focus analysis in a small number of dimensions.

  7. Wave energy budget analysis in the Earth's radiation belts uncovers a missing energy

    OpenAIRE

    Artemyev, A.V.; Agapitov, O. V.; D. Mourenas; Krasnoselskikh, V. V.; Mozer, F. S.

    2015-01-01

    Whistler-mode emissions are important electromagnetic waves pervasive in the Earth's magnetosphere, where they continuously remove or energize electrons trapped by the geomagnetic field, controlling radiation hazards to satellites and astronauts and the upper-atmosphere ionization or chemical composition. Here, we report an analysis of 10-year Cluster data, statistically evaluating the full wave energy budget in the Earth's magneto-sphere, revealing that a significant fraction of the energy c...

  8. Proteomic Analysis Uncovers Novel Actions of the Neurosecretory Protein VGF in Nociceptive Processing

    OpenAIRE

    Riedl, Maureen S; Braun, Patrick D.; Kitto, Kelley F.; Roiko, Samuel A.; Anderson, Lorraine B.; Honda, Christopher N.; Fairbanks, Carolyn A.; Vulchanova, Lucy

    2009-01-01

    Peripheral tissue injury is associated with changes in protein expression in sensory neurons that may contribute to abnormal nociceptive processing. We used cultured dorsal root ganglion (DRG) neurons as a model of axotomized neurons to investigate early changes in protein expression following nerve injury. Comparing protein levels immediately after DRG dissociation and 24 h later by proteomic differential expression analysis, we found a substantial increase in the levels of the neurotrophin-...

  9. Single cell analysis of Vibrio harveyi uncovers functional heterogeneity in response to quorum sensing signals

    Directory of Open Access Journals (Sweden)

    Anetzberger Claudia

    2012-09-01

    Full Text Available Abstract Background Vibrio harveyi and closely related species are important pathogens in aquaculture. A complex quorum sensing cascade involving three autoinducers controls bioluminescence and several genes encoding virulence factors. Single cell analysis of a V. harveyi population has already indicated intercellular heterogeneity in the production of bioluminescence. This study was undertaken to analyze the expression of various autoinducer-dependent genes in individual cells. Results Here we used reporter strains bearing promoter::gfp fusions to monitor the induction/repression of three autoinducer-regulated genes in wild type conjugates at the single cell level. Two genes involved in pathogenesis - vhp and vscP, which code for an exoprotease and a component of the type III secretion system, respectively, and luxC (the first gene in the lux operon were chosen for analysis. The lux operon and the exoprotease gene are induced, while vscP is repressed at high cell density. As controls luxS and recA, whose expression is not dependent on autoinducers, were examined. The responses of the promoter::gfp fusions in individual cells from the same culture ranged from no to high induction. Importantly, simultaneous analysis of two autoinducer induced phenotypes, bioluminescence (light detection and exoproteolytic activity (fluorescence of a promoter::gfp fusion, in single cells provided evidence for functional heterogeneity within a V. harveyi population. Conclusions Autoinducers are not only an indicator for cell density, but play a pivotal role in the coordination of physiological activities within the population.

  10. Near-Surface CO2 Monitoring And Analysis To Detect Hidden Geothermal Systems

    OpenAIRE

    Lewicki, Jennifer L.; Oldenburg, Curtis M.

    2005-01-01

    "Hidden" geothermal systems are systems devoid of obvious surface hydrothermal manifestations. Emissions of moderate-to-low solubility gases may be one of the primary near-surface signals from these systems. We investigate the potential for CO2 detection and monitoring below and above ground in the near-surface environment as an approach to exploration targeting hidden geothermal systems. We focus on CO2 because it is the dominant noncondensible gas species in most geothermal systems and...

  11. Gene expression analysis uncovers similarity and differences among Burkitt lymphoma subtypes

    DEFF Research Database (Denmark)

    Piccaluga, Pier Paolo; De Falco, Giulia; Kustagi, Manjunath;

    2011-01-01

    Burkitt lymphoma (BL) is classified into 3 clinical subsets: endemic, sporadic, and immunodeficiency-associated BL. So far, possible differences in their gene expression profiles (GEPs) have not been investigated. We studied GEPs of BL subtypes, other B-cell lymphomas, and B lymphocytes; first, we...... found that BL is a unique molecular entity, distinct from other B-cell malignancies. Indeed, by unsupervised analysis all BLs clearly clustered apart of other lymphomas. Second, we found that BL subtypes presented slight differences in GEPs. Particularly, they differed for genes involved in cell cycle...

  12. Uncovering a Latent Multinomial: Analysis of Mark-Recapture Data with Misidentification

    Science.gov (United States)

    Link, W.A.; Yoshizaki, J.; Bailey, L.L.; Pollock, K.H.

    2009-01-01

    Natural tags based on DNA fingerprints or natural features of animals are now becoming very widely used in wildlife population biology. However, classic capture-recapture models do not allow for misidentification of animals which is a potentially very serious problem with natural tags. Statistical analysis of misidentification processes is extremely difficult using traditional likelihood methods but is easily handled using Bayesian methods. We present a general framework for Bayesian analysis of categorical data arising from a latent multinomial distribution. Although our work is motivated by a specific model for misidentification in closed population capture-recapture analyses, with crucial assumptions which may not always be appropriate, the methods we develop extend naturally to a variety of other models with similar structure. Suppose that observed frequencies f are a known linear transformation f=A'x of a latent multinomial variable x with cell probability vector pi= pi(theta). Given that full conditional distributions [theta | x] can be sampled, implementation of Gibbs sampling requires only that we can sample from the full conditional distribution [x | f, theta], which is made possible by knowledge of the null space of A'. We illustrate the approach using two data sets with individual misidentification, one simulated, the other summarizing recapture data for salamanders based on natural marks.

  13. Network-Based Analysis on Orthogonal Separation of Human Plasma Uncovers Distinct High Density Lipoprotein Complexes.

    Science.gov (United States)

    Li, Hailong; Gordon, Scott M; Zhu, Xiaoting; Deng, Jingyuan; Swertfeger, Debi K; Davidson, W Sean; Lu, L Jason

    2015-08-01

    High density lipoprotein (HDL) particles are blood-borne complexes whose plasma levels have been associated with protection from cardiovascular disease (CVD). Recent studies have demonstrated the existence of distinct HDL subspecies; however, these have been difficult to isolate and characterize biochemically. Here, we present the first report that employs a network-based approach to systematically infer HDL subspecies. Healthy human plasma was separated into 58 fractions using our previously published three orthogonal chromatography techniques. Similar local migration patterns among HDL proteins were captured with a novel similarity score, and individual comigration networks were constructed for each fraction. By employing a graph mining algorithm, we identified 183 overlapped cliques, among which 38 were further selected as candidate HDL subparticles. Each of these 38 subparticles had at least two literature supports. In addition, GO function enrichment analysis showed that they were enriched with fundamental biological and CVD protective functions. Furthermore, gene knockout experiments in mouse model supported the validity of these subparticles related to three apolipoproteins. Finally, analysis of an apoA-I deficient human patient's plasma provided additional support for apoA-I related complexes. Further biochemical characterization of these putative subspecies may facilitate the mechanistic research of CVD and guide targeted therapeutics aimed at its mitigation. PMID:26057100

  14. Breakpoint analysis of transcriptional and genomic profiles uncovers novel gene fusions spanning multiple human cancer types.

    Directory of Open Access Journals (Sweden)

    Craig P Giacomini

    2013-04-01

    Full Text Available Gene fusions, like BCR/ABL1 in chronic myelogenous leukemia, have long been recognized in hematologic and mesenchymal malignancies. The recent finding of gene fusions in prostate and lung cancers has motivated the search for pathogenic gene fusions in other malignancies. Here, we developed a "breakpoint analysis" pipeline to discover candidate gene fusions by tell-tale transcript level or genomic DNA copy number transitions occurring within genes. Mining data from 974 diverse cancer samples, we identified 198 candidate fusions involving annotated cancer genes. From these, we validated and further characterized novel gene fusions involving ROS1 tyrosine kinase in angiosarcoma (CEP85L/ROS1, SLC1A2 glutamate transporter in colon cancer (APIP/SLC1A2, RAF1 kinase in pancreatic cancer (ATG7/RAF1 and anaplastic astrocytoma (BCL6/RAF1, EWSR1 in melanoma (EWSR1/CREM, CDK6 kinase in T-cell acute lymphoblastic leukemia (FAM133B/CDK6, and CLTC in breast cancer (CLTC/VMP1. Notably, while these fusions involved known cancer genes, all occurred with novel fusion partners and in previously unreported cancer types. Moreover, several constituted druggable targets (including kinases, with therapeutic implications for their respective malignancies. Lastly, breakpoint analysis identified new cell line models for known rearrangements, including EGFRvIII and FIP1L1/PDGFRA. Taken together, we provide a robust approach for gene fusion discovery, and our results highlight a more widespread role of fusion genes in cancer pathogenesis.

  15. Wave energy budget analysis in the Earth's radiation belts uncovers a missing energy

    Science.gov (United States)

    Artemyev, A. V.; Agapitov, O. V.; Mourenas, D.; Krasnoselskikh, V. V.; Mozer, F. S.

    2015-05-01

    Whistler-mode emissions are important electromagnetic waves pervasive in the Earth's magnetosphere, where they continuously remove or energize electrons trapped by the geomagnetic field, controlling radiation hazards to satellites and astronauts and the upper-atmosphere ionization or chemical composition. Here, we report an analysis of 10-year Cluster data, statistically evaluating the full wave energy budget in the Earth's magnetosphere, revealing that a significant fraction of the energy corresponds to hitherto generally neglected very oblique waves. Such waves, with 10 times smaller magnetic power than parallel waves, typically have similar total energy. Moreover, they carry up to 80% of the wave energy involved in wave-particle resonant interactions. It implies that electron heating and precipitation into the atmosphere may have been significantly under/over-valued in past studies considering only conventional quasi-parallel waves. Very oblique waves may turn out to be a crucial agent of energy redistribution in the Earth's radiation belts, controlled by solar activity.

  16. Proteomic analysis uncovers novel actions of the neurosecretory protein VGF in nociceptive processing.

    Science.gov (United States)

    Riedl, Maureen S; Braun, Patrick D; Kitto, Kelley F; Roiko, Samuel A; Anderson, Lorraine B; Honda, Christopher N; Fairbanks, Carolyn A; Vulchanova, Lucy

    2009-10-21

    Peripheral tissue injury is associated with changes in protein expression in sensory neurons that may contribute to abnormal nociceptive processing. We used cultured dorsal root ganglion (DRG) neurons as a model of axotomized neurons to investigate early changes in protein expression after nerve injury. Comparing protein levels immediately after DRG dissociation and 24 h later by proteomic differential expression analysis, we found a substantial increase in the levels of the neurotrophin-inducible protein VGF (nonacronymic), a putative neuropeptide precursor. In a rodent model of nerve injury, VGF levels were increased within 24 h in both injured and uninjured DRG neurons, and the increase persisted for at least 7 d. VGF was also upregulated 24 h after hindpaw inflammation. To determine whether peptides derived from proteolytic processing of VGF participate in nociceptive signaling, we examined the spinal effects of AQEE-30 and LQEQ-19, potential proteolytic products shown previously to be bioactive. Each peptide evoked dose-dependent thermal hyperalgesia that required activation of the mitogen-activated protein kinase p38. In addition, LQEQ-19 induced p38 phosphorylation in spinal microglia when injected intrathecally and in the BV-2 microglial cell line when applied in vitro. In summary, our results demonstrate rapid upregulation of VGF in sensory neurons after nerve injury and inflammation and activation of microglial p38 by VGF peptides. Therefore, VGF peptides released from sensory neurons may participate in activation of spinal microglia after peripheral tissue injury. PMID:19846725

  17. Face Aging Effect Simulation Using Hidden Factor Analysis Joint Sparse Representation

    Science.gov (United States)

    Yang, Hongyu; Huang, Di; Wang, Yunhong; Wang, Heng; Tang, Yuanyan

    2016-06-01

    Face aging simulation has received rising investigations nowadays, whereas it still remains a challenge to generate convincing and natural age-progressed face images. In this paper, we present a novel approach to such an issue by using hidden factor analysis joint sparse representation. In contrast to the majority of tasks in the literature that handle the facial texture integrally, the proposed aging approach separately models the person-specific facial properties that tend to be stable in a relatively long period and the age-specific clues that change gradually over time. It then merely transforms the age component to a target age group via sparse reconstruction, yielding aging effects, which is finally combined with the identity component to achieve the aged face. Experiments are carried out on three aging databases, and the results achieved clearly demonstrate the effectiveness and robustness of the proposed method in rendering a face with aging effects. Additionally, a series of evaluations prove its validity with respect to identity preservation and aging effect generation.

  18. Face Aging Effect Simulation Using Hidden Factor Analysis Joint Sparse Representation.

    Science.gov (United States)

    Yang, Hongyu; Huang, Di; Wang, Yunhong; Wang, Heng; Tang, Yuanyan

    2016-06-01

    Face aging simulation has received rising investigations nowadays, whereas it still remains a challenge to generate convincing and natural age-progressed face images. In this paper, we present a novel approach to such an issue using hidden factor analysis joint sparse representation. In contrast to the majority of tasks in the literature that integrally handle the facial texture, the proposed aging approach separately models the person-specific facial properties that tend to be stable in a relatively long period and the age-specific clues that gradually change over time. It then transforms the age component to a target age group via sparse reconstruction, yielding aging effects, which is finally combined with the identity component to achieve the aged face. Experiments are carried out on three face aging databases, and the results achieved clearly demonstrate the effectiveness and robustness of the proposed method in rendering a face with aging effects. In addition, a series of evaluations prove its validity with respect to identity preservation and aging effect generation. PMID:27093721

  19. UNCOVERING THE FORMATION OF ULTRACOMPACT DWARF GALAXIES BY MULTIVARIATE STATISTICAL ANALYSIS

    International Nuclear Information System (INIS)

    We present a statistical analysis of the properties of a large sample of dynamically hot old stellar systems, from globular clusters (GCs) to giant ellipticals, which was performed in order to investigate the origin of ultracompact dwarf galaxies (UCDs). The data were mostly drawn from Forbes et al. We recalculated some of the effective radii, computed mean surface brightnesses and mass-to-light ratios, and estimated ages and metallicities. We completed the sample with GCs of M31. We used a multivariate statistical technique (K-Means clustering), together with a new algorithm (Gap Statistics) for finding the optimum number of homogeneous sub-groups in the sample, using a total of six parameters (absolute magnitude, effective radius, virial mass-to-light ratio, stellar mass-to-light ratio, and metallicity). We found six groups. FK1 and FK5 are composed of high- and low-mass elliptical galaxies, respectively. FK3 and FK6 are composed of high-metallicity and low-metallicity objects, respectively, and both include GCs and UCDs. Two very small groups, FK2 and FK4, are composed of Local Group dwarf spheroidals. Our groups differ in their mean masses and virial mass-to-light ratios. The relations between these two parameters are also different for the various groups. The probability density distributions of metallicity for the four groups of galaxies are similar to those of the GCs and UCDs. The brightest low-metallicity GCs and UCDs tend to follow the mass-metallicity relation like elliptical galaxies. The objects of FK3 are more metal-rich per unit effective luminosity density than high-mass ellipticals.

  20. Uncovering the Links between Prospective Teachers' Personal Responsibility, Academic Optimism, Hope, and Emotions about Teaching: A Mediation Analysis

    Science.gov (United States)

    Eren, Altay

    2014-01-01

    Prospective teachers' sense of personal responsibility has not been examined together with their academic optimism, hope, and emotions about teaching in a single study to date. However, to consider hope, academic optimism, and emotions about teaching together with personal responsibility is important to uncover the factors affecting…

  1. Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

    Science.gov (United States)

    Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin

    2016-07-01

    Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.

  2. Functional Evaluation of Hidden Figures Object Analysis in Children with Autistic Disorder

    Science.gov (United States)

    Malisza, Krisztina L.; Clancy, Christine; Shiloff, Deborah; Foreman, Derek; Holden, Jeanette; Jones, Cheryl; Paulson, K.; Summers, Randy; Yu, C. T.; Chudley, Albert E.

    2011-01-01

    Functional magnetic resonance imaging (fMRI) during performance of a hidden figures task (HFT) was used to compare differences in brain function in children diagnosed with autism disorder (AD) compared to children with attention-deficit/hyperactivity disorder (ADHD) and typical controls (TC). Overall greater functional MRI activity was observed in…

  3. A Bourdieusian Analysis of Cultural Reproduction: Socialisation and the "Hidden Curriculum" in Professional Football

    Science.gov (United States)

    Cushion, Christopher J.; Jones, Robyn L.

    2014-01-01

    This article draws on the theoretical concepts of Pierre Bourdieu to provide an explanatory account of how socialisation and the hidden curriculum within coaching practice contribute toward the formation of social identities and powerful schemes of internalised dispositions. Drawing on a 10 month ethnography within professional football, the…

  4. Analysis of an optimal hidden Markov model for secondary structure prediction

    Directory of Open Access Journals (Sweden)

    Gibrat Jean-François

    2006-12-01

    Full Text Available Abstract Background Secondary structure prediction is a useful first step toward 3D structure prediction. A number of successful secondary structure prediction methods use neural networks, but unfortunately, neural networks are not intuitively interpretable. On the contrary, hidden Markov models are graphical interpretable models. Moreover, they have been successfully used in many bioinformatic applications. Because they offer a strong statistical background and allow model interpretation, we propose a method based on hidden Markov models. Results Our HMM is designed without prior knowledge. It is chosen within a collection of models of increasing size, using statistical and accuracy criteria. The resulting model has 36 hidden states: 15 that model α-helices, 12 that model coil and 9 that model β-strands. Connections between hidden states and state emission probabilities reflect the organization of protein structures into secondary structure segments. We start by analyzing the model features and see how it offers a new vision of local structures. We then use it for secondary structure prediction. Our model appears to be very efficient on single sequences, with a Q3 score of 68.8%, more than one point above PSIPRED prediction on single sequences. A straightforward extension of the method allows the use of multiple sequence alignments, rising the Q3 score to 75.5%. Conclusion The hidden Markov model presented here achieves valuable prediction results using only a limited number of parameters. It provides an interpretable framework for protein secondary structure architecture. Furthermore, it can be used as a tool for generating protein sequences with a given secondary structure content.

  5. Covered versus Uncovered Self-Expandable Metal Stents for Managing Malignant Distal Biliary Obstruction: A Meta-Analysis.

    Directory of Open Access Journals (Sweden)

    Jinjin Li

    Full Text Available To compare the efficacy of using covered self-expandable metal stents (CSEMSs and uncovered self-expandable metal stents (UCSEMSs to treat objective jaundice caused by an unresectable malignant tumor.We performed a comprehensive electronic search from 1980 to May 2015. All randomized controlled trials comparing the use of CSEMSs and UCSEMSs to treat malignant distal biliary obstruction were included.The analysis included 1417 patients enrolled in 14 trials. We did not detect significant differences between the UCSEMS group and the CSEMS group in terms of cumulative stent patency (hazard ratio (HR 0.93, 95% confidence interval (CI 0.19-4.53; p = 0.93, I2 = 0%, patient survival (HR 0.77, 95% CI 0.05-10.87; p = 0.85, I2 = 0%, overall stent dysfunction (relative ratio (RR 0.85, M-H, random, 95% CI 0.57-1.25; p = 0.83, I2 = 63%, the overall complication rate (RR 1.26, M-H, fixed, 95% CI 0.94-1.68; p = 0.12, I2 = 0% or the change in serum bilirubin (weighted mean difference (WMD -0.13, IV fixed, 95% CI 0.56-0.3; p = 0.55, I2 = 0%. However, we did detect a significant difference in the main causes of stent dysfunction between the two groups. In particular, the CSEMS group exhibited a lower rate of tumor ingrowth (RR 0.25, M-H, random, 95% CI 0.12-0.52; p = 0.002, I2 = 40% but a higher rate of tumor overgrowth (RR 1.76, M-H, fixed, 95% CI 1.03-3.02; p = 0.04, I2 = 0%. Patients with CSEMSs also exhibited a higher migration rate (RR 9.33, M-H, fixed, 95% CI 2.54-34.24; p = 0.008, I2 = 0% and a higher rate of sludge formation (RR 2.47, M-H, fixed, 95% CI 1.36-4.50; p = 0.003, I2 = 0%.Our meta-analysis indicates that there is no significant difference in primary stent patency and stent dysfunction between CSEMSs and UCSEMSs during the period from primary stent insertion to primary stent dysfunction or patient death. However, when taking further management for occluded stents into consideration, CSEMSs is a better choice for patients with malignant biliary

  6. Comparative analysis of the Photorhabdus luminescens and the Yersinia enterocolitica genomes: uncovering candidate genes involved in insect pathogenicity

    Directory of Open Access Journals (Sweden)

    Fuchs Thilo M

    2008-01-01

    Full Text Available Abstract Background Photorhabdus luminescens and Yersinia enterocolitica are both enteric bacteria which are associated with insects. P. luminescens lives in symbiosis with soil nematodes and is highly pathogenic towards insects but not to humans. In contrast, Y. enterocolitica is widely found in the environment and mainly known to cause gastroenteritis in men, but has only recently been shown to be also toxic for insects. It is expected that both pathogens share an overlap of genetic determinants that play a role within the insect host. Results A selective genome comparison was applied. Proteins belonging to the class of two-component regulatory systems, quorum sensing, universal stress proteins, and c-di-GMP signalling have been analysed. The interorganismic synopsis of selected regulatory systems uncovered common and distinct signalling mechanisms of both pathogens used for perception of signals within the insect host. Particularly, a new class of LuxR-like regulators was identified, which might be involved in detecting insect-specific molecules. In addition, the genetic overlap unravelled a two-component system that is unique for the genera Photorhabdus and Yersinia and is therefore suggested to play a major role in the pathogen-insect relationship. Our analysis also highlights factors of both pathogens that are expressed at low temperatures as encountered in insects in contrast to higher (body temperature, providing evidence that temperature is a yet under-investigated environmental signal for bacterial adaptation to various hosts. Common degradative metabolic pathways are described that might be used to explore nutrients within the insect gut or hemolymph, thus enabling the proliferation of P. luminescens and Y. enterocolitica in their invertebrate hosts. A strikingly higher number of genes encoding insecticidal toxins and other virulence factors in P. luminescens compared to Y. enterocolitica correlates with the higher virulence of P

  7. Similarity matrix analysis and divergence measures for statistical detection of unknown deterministic signals hidden in additive noise

    International Nuclear Information System (INIS)

    This Letter proposes an algorithm to detect an unknown deterministic signal hidden in additive white Gaussian noise. The detector is based on recurrence analysis. It compares the distribution of the similarity matrix coefficients of the measured signal with an analytic expression of the distribution expected in the noise-only case. This comparison is achieved using divergence measures. Performance analysis based on the receiver operating characteristics shows that the proposed detector outperforms the energy detector, giving a probability of detection 10% to 50% higher, and has a similar performance to that of a sub-optimal filter detector. - Highlights: • We model the distribution of the similarity matrix coefficients of a Gaussian noise. • We use divergence measures for goodness-of-fit test between a model and measured data. • We distinguish deterministic signal and Gaussian noise with similarity matrix analysis. • Similarity matrix analysis outperforms energy detector

  8. Similarity matrix analysis and divergence measures for statistical detection of unknown deterministic signals hidden in additive noise

    Energy Technology Data Exchange (ETDEWEB)

    Le Bot, O., E-mail: lebotol@gmail.com [Univ. Grenoble Alpes, GIPSA-Lab, F-38000 Grenoble (France); CNRS, GIPSA-Lab, F-38000 Grenoble (France); Mars, J.I. [Univ. Grenoble Alpes, GIPSA-Lab, F-38000 Grenoble (France); CNRS, GIPSA-Lab, F-38000 Grenoble (France); Gervaise, C. [Univ. Grenoble Alpes, GIPSA-Lab, F-38000 Grenoble (France); CNRS, GIPSA-Lab, F-38000 Grenoble (France); Chaire CHORUS, Foundation of Grenoble Institute of Technology, 46 Avenue Félix Viallet, 38031 Grenoble Cedex 1 (France)

    2015-10-23

    This Letter proposes an algorithm to detect an unknown deterministic signal hidden in additive white Gaussian noise. The detector is based on recurrence analysis. It compares the distribution of the similarity matrix coefficients of the measured signal with an analytic expression of the distribution expected in the noise-only case. This comparison is achieved using divergence measures. Performance analysis based on the receiver operating characteristics shows that the proposed detector outperforms the energy detector, giving a probability of detection 10% to 50% higher, and has a similar performance to that of a sub-optimal filter detector. - Highlights: • We model the distribution of the similarity matrix coefficients of a Gaussian noise. • We use divergence measures for goodness-of-fit test between a model and measured data. • We distinguish deterministic signal and Gaussian noise with similarity matrix analysis. • Similarity matrix analysis outperforms energy detector.

  9. Hidden Stories: Uncovering the Visual Metaphor for Education and Communication

    Science.gov (United States)

    Hube, Amy M.; Tremblay, Kenneth R., Jr.; Leigh, Katharine E.

    2015-01-01

    Design solutions have become increasingly complex and based on a rapidly growing body of knowledge. In order to articulate a design solution to a client, the graphic use of the design narrative can effectively communicate complex ideas. Two case study interventions were conducted in an interior design program in which students were introduced to…

  10. Hidden pattern discovery on epileptic EEG with 1-D local binary patterns and epileptic seizures detection by grey relational analysis.

    Science.gov (United States)

    Kaya, Yılmaz

    2015-09-01

    This paper proposes a novel approach to detect epilepsy seizures by using Electroencephalography (EEG), which is one of the most common methods for the diagnosis of epilepsy, based on 1-Dimension Local Binary Pattern (1D-LBP) and grey relational analysis (GRA) methods. The main aim of this paper is to evaluate and validate a novel approach, which is a computer-based quantitative EEG analyzing method and based on grey systems, aimed to help decision-maker. In this study, 1D-LBP, which utilizes all data points, was employed for extracting features in raw EEG signals, Fisher score (FS) was employed to select the representative features, which can also be determined as hidden patterns. Additionally, GRA is performed to classify EEG signals through these Fisher scored features. The experimental results of the proposed approach, which was employed in a public dataset for validation, showed that it has a high accuracy in identifying epileptic EEG signals. For various combinations of epileptic EEG, such as A-E, B-E, C-E, D-E, and A-D clusters, 100, 96, 100, 99.00 and 100% were achieved, respectively. Also, this work presents an attempt to develop a new general-purpose hidden pattern determination scheme, which can be utilized for different categories of time-varying signals. PMID:26206400

  11. Risk of Post-ERCP Pancreatitis after placement of Covered versus Uncovered Self-Expandable Biliary Metal Stents: A Systematic Review and Meta-Analysis

    Directory of Open Access Journals (Sweden)

    Yaseen Alastal

    2008-09-01

    Full Text Available Background Self-expandable metal stents are commonly used in the management of malignant biliary obstruction due to higher patency rates compared to plastic stents. Development of covered self-expandable metal stents has led to extended stent patency compared to uncovered self-expandable metal stents. However, there are concerns that deployment of covered self-expandable metal stents may be associated with higher risk of post-endoscopic retrograde cholangio-pancreatography pancreatitis, acute cholecystitis and stent migration. Objective We performed this meta-analysis to assess the risk of post-endoscopic retrograde cholangio-pancreatography pancreatitis and other adverse events (acute cholecystitis and stent migration with biliary covered self-expandable metal stents compared to uncovered self-expandable metal stents. We also assessed the proportion of stent patency at 6 and 12 months between the two groups. Methods We searched MedLine, EMBASE, Cochrane database, ISI Web of Science and Scopus from January 1989 through June, 2014, to identify randomized controlled trials and observational studies that provided data on the risk of post-endoscopic retrograde cholangio-pancreatography pancreatitis and other adverse events following the placement of covered self-expandable metal stents versus uncovered self-expandable metal stents in patients with biliary obstruction. The Mantel–Haenszel method was used to pool data of post-endoscopic retrograde cholangio- pancreatography pancreatitis, acute cholecystitis, stent migration and proportion of stent patency over 6 and 12 months into fixed or random effect model of meta-analyses. Odds ratio was used to generate an overall effect estimate of the outcome. Results Eight studies (6 randomized controlled trials and 2 observational studies with a total of 1078 patients were included in the meta-analysis. The pooled odds ratio with 95% confidence intervals for risk of post-endoscopic retrograde cholangio

  12. Evaluation of chronic lymphocytic leukemia by oligonucleotide-based microarray analysis uncovers novel aberrations not detected by FISH or cytogenetic analysis

    Directory of Open Access Journals (Sweden)

    Kolquist Kathryn A

    2011-11-01

    Full Text Available Abstract Background Cytogenetic evaluation is a key component of the diagnosis and prognosis of chronic lymphocytic leukemia (CLL. We performed oligonucleotide-based comparative genomic hybridization microarray analysis on 34 samples with CLL and known abnormal karyotypes previously determined by cytogenetics and/or fluorescence in situ hybridization (FISH. Results Using a custom designed microarray that targets >1800 genes involved in hematologic disease and other malignancies, we identified additional cryptic aberrations and novel findings in 59% of cases. These included gains and losses of genes associated with cell cycle regulation, apoptosis and susceptibility loci on 3p21.31, 5q35.2q35.3, 10q23.31q23.33, 11q22.3, and 22q11.23. Conclusions Our results show that microarray analysis will detect known aberrations, including microscopic and cryptic alterations. In addition, novel genomic changes will be uncovered that may become important prognostic predictors or treatment targets for CLL in the future.

  13. Department-level change: Using social network analysis to map the hidden structure of academic departments

    Science.gov (United States)

    Henderson, Charles; Quardokus, Kathleen

    2013-01-01

    Efforts to improve teaching in higher education have often focused on individual faculty. However, there is a growing consensus that the academic department is a more productive focus of change initiatives. Yet, academic departments are not all the same. Understanding the structure of relationships within a department is important for identifying who should be involved in the change effort and in what roles. It is also likely that a successful change effort will modify the structure of relationships within a department. This paper presents the preliminary results from a study of two academic departments at a research university. A social network for each department was constructed based on a web survey that asked faculty to identify colleagues with whom they had teaching-related conversations. We identify characteristics of the individuals and departments and describe how learning about this hidden structure can be beneficial to change agents.

  14. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs. In...... learning-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group....... this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a...

  15. Global gene expression analysis using RNA-seq uncovered a new role for SR1/CAMTA3 transcription factor in salt stress.

    Science.gov (United States)

    Prasad, Kasavajhala V S K; Abdel-Hameed, Amira A E; Xing, Denghui; Reddy, Anireddy S N

    2016-01-01

    Abiotic and biotic stresses cause significant yield losses in all crops. Acquisition of stress tolerance in plants requires rapid reprogramming of gene expression. SR1/CAMTA3, a member of signal responsive transcription factors (TFs), functions both as a positive and a negative regulator of biotic stress responses and as a positive regulator of cold stress-induced gene expression. Using high throughput RNA-seq, we identified ~3000 SR1-regulated genes. Promoters of about 60% of the differentially expressed genes have a known DNA binding site for SR1, suggesting that they are likely direct targets. Gene ontology analysis of SR1-regulated genes confirmed previously known functions of SR1 and uncovered a potential role for this TF in salt stress. Our results showed that SR1 mutant is more tolerant to salt stress than the wild type and complemented line. Improved tolerance of sr1 seedlings to salt is accompanied with the induction of salt-responsive genes. Furthermore, ChIP-PCR results showed that SR1 binds to promoters of several salt-responsive genes. These results suggest that SR1 acts as a negative regulator of salt tolerance by directly repressing the expression of salt-responsive genes. Overall, this study identified SR1-regulated genes globally and uncovered a previously uncharacterized role for SR1 in salt stress response. PMID:27251464

  16. HIDDEN MARKOV MODELS WITH COVARIATES FOR ANALYSIS OF DEFECTIVE INDUSTRIAL MACHINE PARTS

    Directory of Open Access Journals (Sweden)

    Pornpit Sirima

    2014-01-01

    Full Text Available Monthly counts of industrial machine part errors are modeled using a two-state Hidden Markov Model (HMM in order to describe the effect of machine part error correction and the amount of time spent on the error correction on the likelihood of the machine part to be in a “defective” or “non-defective” state. The number of machine parts errors were collected from a thermo plastic injection molding machine in a car bumper auto parts manufacturer in Liberec city, Czech Republic from January 2012 to November 2012. A Bayesian method is used for parameter estimation. The results of this study indicate that the machine part error correction and the amount of time spent on the error correction do not improve the machine part status of the individual part, but there is a very strong month-to-month dependence of the machine part states. Using the Mean Absolute Error (MAE criterion, the performance of the proposed model (MAE = 1.62 and the HMM including machine part error correction only (MAE = 1.68, from our previous study, is not significantly different. However, the proposed model has more advantage in the fact that the machine part state can be explained by both the machine part error correction and the amount of time spent on the error correction.

  17. A Framework to Uncover Multiple Alternative Clusterings

    DEFF Research Database (Denmark)

    Dang, Xuan-Hong; Bailey, James

    Clustering is often referred to as unsupervised learning which aims at uncovering hidden structures from data. Unfortunately, though widely being used as one of the principal tools to understand the data, most conventional clustering techniques are limited in achieving this goal since they only...... attempt to find a single clustering solution from the data. For many real-world applications, especially those being described in high dimensional data, it is common to see that the data can be grouped into different yet meaningful ways. This gives rise to the recently emerging research area of mining...... alternative clusterings. In this paper, we propose a framework named MACL that is capable of discovering multiple alternative clusterings from a given dataset.MACL seeks alternative clusterings in sequence and a novel solution is found by conditioning on all previously known clusterings. The framework takes a...

  18. Hidden Harvest : The Global Contribution of Capture Fisheries

    OpenAIRE

    World Bank

    2012-01-01

    This report provides a disaggregated profile of the world's small and large-scale fisheries and an estimate of its direct and indirect contributions to gross domestic product, food security, and rural livelihoods to uncover the hidden importance of the fisheries sector with a view to increasing its economic and environmental contributions in a sustainable manner. The study reveals serious...

  19. Model-Independent Analysis of Tri-bimaximal Mixing: A Softly-Broken Hidden or an Accidental Symmetry?

    Energy Technology Data Exchange (ETDEWEB)

    Albright, Carl H.; /Northern Illinois U. /Fermilab; Rodejohann, Werner; /Heidelberg, Max Planck Inst.

    2008-04-01

    To address the issue of whether tri-bimaximal mixing (TBM) is a softly-broken hidden or an accidental symmetry, we adopt a model-independent analysis in which we perturb a neutrino mass matrix leading to TBM in the most general way but leave the three texture zeros of the diagonal charged lepton mass matrix unperturbed. We compare predictions for the perturbed neutrino TBM parameters with those obtained from typical SO(10) grand unified theories with a variety of flavor symmetries. Whereas SO(10) GUTs almost always predict a normal mass hierarchy for the light neutrinos, TBM has a priori no preference for neutrino masses. We find, in particular for the latter, that the value of |U{sub e3}| is very sensitive to the neutrino mass scale and ordering. Observation of |U{sub e3}|{sup 2} > 0.001 to 0.01 within the next few years would be incompatible with softly-broken TBM and a normal mass hierarchy and would suggest that the apparent TBM symmetry is an accidental symmetry instead. No such conclusions can be drawn for the inverted and quasi-degenerate hierarchy spectra.

  20. Functional analysis of NtMPK2 uncovers its positive role in response to Pseudomonas syringae pv. tomato DC3000 in tobacco.

    Science.gov (United States)

    Zhang, Xingtan; Wang, Genhong; Gao, Junping; Nie, Mengyun; Liu, Wenshan; Xia, Qingyou

    2016-01-01

    Mitogen-activated protein kinase cascades are highly conserved signaling modules downstream of receptors/sensors and play pivotal roles in signaling plant defense against pathogen attack. Extensive studies on Arabidopsis MPK4 have implicated that the MAP kinase is involved in multilayered plant defense pathways. In this study, we identified tobacco NtMPK2 as an ortholog of AtMPK4. Transgenic tobacco overexpressing NtMPK2 markedly enhances resistance to Pseudomonas syringae pv. tomato DC3000 (Pst DC3000) virulent and avirulent strains. Transcriptome analysis of NtMPK2-dependent genes shows that possibly the basal resistance system is activated by NtMPK2 overexpression. In addition to NtMPK2-mediated resistance, multiple pathways are involved in response to the avirulent bacteria based on analysis of Pst-responding genes, including SA and ET pathways. Notably, it is possible that biosynthesis of antibacterial compounds is responsible for inhibition of Pst DC3000 avirulent strain when programmed cell death processes in the host. Our results uncover that NtMPK2 positively regulate tobacco defense response to Pst DC3000 and improve our understanding of plant molecular defense mechanism. PMID:26482478

  1. Climate change adaptation: Uncovering constraints to the use of adaptation strategies among food crop farmers in South-west, Nigeria using principal component analysis (PCA

    Directory of Open Access Journals (Sweden)

    Moradeyo Adebanjo Otitoju

    2016-12-01

    Full Text Available This study focused on the constraints to the use of climate variability/change adaptation strategies in South-west Nigeria. Multistage random technique was employed to select the location and the respondents. Descriptive statistics and principal component analysis (PCA were the analytical tools engaged in this study. The constraints to climate variability and change examined before did not use PCA but generalized factor analysis. Hence, there is need to examine these constraints extensively using PCA. Uncovering the constraints to the use of climate variability/change adaptation strategies among crop framers is important to give a realistic direction in the development of farmer-inclusive climate policies in Nigeria. The PCA result showed that the principal constraints that the farmers faced in climate change adaptation were public, institutional and labour constraint; land, neighbourhood norms and religious beliefs constraint; high cost of inputs, technological and information constraint; farm distance, access to climate information, off-farm job and credit constraint; and poor agricultural programmes and service delivery constraint. These findings pointed out the need for both the government and non-government organizations to intensify efforts on institutional, technological and farmers’ friendly land tenure and information systems as effective measures to guide inclusive climate change adaptation policies and development in South-west Nigeria.

  2. Independent Component Analysis Uncovers the Landscape of the Bladder Tumor Transcriptome and Reveals Insights into Luminal and Basal Subtypes

    Directory of Open Access Journals (Sweden)

    Anne Biton

    2014-11-01

    Full Text Available Extracting relevant information from large-scale data offers unprecedented opportunities in cancerology. We applied independent component analysis (ICA to bladder cancer transcriptome data sets and interpreted the components using gene enrichment analysis and tumor-associated molecular, clinicopathological, and processing information. We identified components associated with biological processes of tumor cells or the tumor microenvironment, and other components revealed technical biases. Applying ICA to nine cancer types identified cancer-shared and bladder-cancer-specific components. We characterized the luminal and basal-like subtypes of muscle-invasive bladder cancers according to the components identified. The study of the urothelial differentiation component, specific to the luminal subtypes, showed that a molecular urothelial differentiation program was maintained even in those luminal tumors that had lost morphological differentiation. Study of the genomic alterations associated with this component coupled with functional studies revealed a protumorigenic role for PPARG in luminal tumors. Our results support the inclusion of ICA in the exploitation of multiscale data sets.

  3. Integration of Next Generation Sequencing and EPR Analysis to Uncover Molecular Mechanism Underlying Shell Color Variation in Scallops.

    Science.gov (United States)

    Sun, Xiujun; Liu, Zhihong; Zhou, Liqing; Wu, Biao; Dong, Yinghui; Yang, Aiguo

    2016-01-01

    The Yesso scallop Patinopecten yessoensis displays polymorphism in shell colors, which is of great interest for the scallop industry. To identify genes involved in the shell coloration, in the present study, we investigate the transcriptome differences by Illumina digital gene expression (DGE) analysis in two extreme color phenotypes, Red and White. Illumina sequencing yields a total of 62,715,364 clean sequence reads, and more than 85% reads are mapped into our previously sequenced transcriptome. There are 25 significantly differentially expressed genes between Red and White scallops. EPR (Electron paramagnetic resonance) analysis has identified EPR spectra of pheomelanin and eumelanin in the red shells, but not in the white shells. Compared to the Red scallops, the White scallops have relatively higher mRNA expression in tyrosinase genes, but lower expression in other melanogensis-associated genes. Meantime, the relatively lower tyrosinase protein and decreased tyrosinase activity in White scallops are suggested to be associated with the lack of melanin in the white shells. Our findings highlight the functional roles of melanogensis-associated genes in the melanization process of scallop shells, and shed new lights on the transcriptional and post-transcriptional mechanisms in the regulation of tyrosinase activity during the process of melanin synthesis. The present results will assist our molecular understanding of melanin synthesis underlying shell color polymorphism in scallops, as well as other bivalves, and also help the color-based breeding in shellfish aquaculture. PMID:27563719

  4. Structural and Phylogenetic Analysis of Rhodobacter capsulatus NifF: Uncovering General Features of Nitrogen-fixation (nif-Flavodoxins

    Directory of Open Access Journals (Sweden)

    Inmaculada Pérez-Dorado

    2013-01-01

    Full Text Available Analysis of the crystal structure of NifF from Rhodobacter capsulatus and its homologues reported so far reflects the existence of unique structural features in nif flavodoxins: a leucine at the re face of the isoalloxazine, an eight-residue insertion at the C-terminus of the 50’s loop and a remarkable difference in the electrostatic potential surface with respect to non-nif flavodoxins. A phylogenetic study on 64 sequences from 52 bacterial species revealed four clusters, including different functional prototypes, correlating the previously defined as “short-chain” with the firmicutes flavodoxins and the “long-chain” with gram-negative species. The comparison of Rhodobacter NifF structure with other bacterial flavodoxin prototypes discloses the concurrence of specific features of these functional electron donors to nitrogenase.

  5. A Comprehensive Analysis of the Dynamic Response to Aphidicolin-Mediated Replication Stress Uncovers Targets for ATM and ATMIN

    Directory of Open Access Journals (Sweden)

    Abdelghani Mazouzi

    2016-04-01

    Full Text Available The cellular response to replication stress requires the DNA-damage-responsive kinase ATM and its cofactor ATMIN; however, the roles of this signaling pathway following replication stress are unclear. To identify the functions of ATM and ATMIN in response to replication stress, we utilized both transcriptomics and quantitative mass-spectrometry-based phosphoproteomics. We found that replication stress induced by aphidicolin triggered widespread changes in both gene expression and protein phosphorylation patterns. These changes gave rise to distinct early and late replication stress responses. Furthermore, our analysis revealed previously unknown targets of ATM and ATMIN downstream of replication stress. We demonstrate ATMIN-dependent phosphorylation of H2AX and of CRMP2, a protein previously implicated in Alzheimer’s disease but not in the DNA damage response. Overall, our dataset provides a comprehensive resource for discovering the cellular responses to replication stress and, potentially, associated pathologies.

  6. Using Co-Expression Analysis and Stress-Based Screens to Uncover Arabidopsis Peroxisomal Proteins Involved in Drought Response.

    Directory of Open Access Journals (Sweden)

    Jiying Li

    Full Text Available Peroxisomes are essential organelles that house a wide array of metabolic reactions important for plant growth and development. However, our knowledge regarding the role of peroxisomal proteins in various biological processes, including plant stress response, is still incomplete. Recent proteomic studies of plant peroxisomes significantly increased the number of known peroxisomal proteins and greatly facilitated the study of peroxisomes at the systems level. The objectives of this study were to determine whether genes that encode peroxisomal proteins with related functions are co-expressed in Arabidopsis and identify peroxisomal proteins involved in stress response using in silico analysis and mutant screens. Using microarray data from online databases, we performed hierarchical clustering analysis to generate a comprehensive view of transcript level changes for Arabidopsis peroxisomal genes during development and under abiotic and biotic stress conditions. Many genes involved in the same metabolic pathways exhibited co-expression, some genes known to be involved in stress response are regulated by the corresponding stress conditions, and function of some peroxisomal proteins could be predicted based on their co-expression pattern. Since drought caused expression changes to the highest number of genes that encode peroxisomal proteins, we subjected a subset of Arabidopsis peroxisomal mutants to a drought stress assay. Mutants of the LON2 protease and the photorespiratory enzyme hydroxypyruvate reductase 1 (HPR1 showed enhanced susceptibility to drought, suggesting the involvement of peroxisomal quality control and photorespiration in drought resistance. Our study provided a global view of how genes that encode peroxisomal proteins respond to developmental and environmental cues and began to reveal additional peroxisomal proteins involved in stress response, thus opening up new avenues to investigate the role of peroxisomes in plant adaptation to

  7. Genome-wide transcriptomic analysis uncovers the molecular basis underlying early flowering and apetalous characteristic in Brassica napus L.

    Science.gov (United States)

    Yu, Kunjiang; Wang, Xiaodong; Chen, Feng; Chen, Song; Peng, Qi; Li, Hongge; Zhang, Wei; Hu, Maolong; Chu, Pu; Zhang, Jiefu; Guan, Rongzhan

    2016-01-01

    Floral transition and petal onset, as two main aspects of flower development, are crucial to rapeseed evolutionary success and yield formation. Currently, very little is known regarding the genetic architecture that regulates flowering time and petal morphogenesis in Brassica napus. In the present study, a genome-wide transcriptomic analysis was performed with an absolutely apetalous and early flowering line, APL01, and a normally petalled line, PL01, using high-throughput RNA sequencing. In total, 13,205 differential expressed genes were detected, of which 6111 genes were significantly down-regulated, while 7094 genes were significantly up-regulated in the young inflorescences of APL01 compared with PL01. The expression levels of a vast number of genes involved in protein biosynthesis were altered in response to the early flowering and apetalous character. Based on the putative rapeseed flowering genes, an early flowering network, mainly comprised of vernalization and photoperiod pathways, was built. Additionally, 36 putative upstream genes possibly governing the apetalous character of line APL01 were identified, and six genes potentially regulating petal origination were obtained by combining with three petal-related quantitative trait loci. These findings will facilitate understanding of the molecular mechanisms underlying floral transition and petal initiation in B. napus. PMID:27460760

  8. Comparative genomic analysis uncovers 3 novel loci encoding type six secretion systems differentially distributed in Salmonella serotypes

    Directory of Open Access Journals (Sweden)

    Santiviago Carlos A

    2009-08-01

    Full Text Available Abstract Background The recently described Type VI Secretion System (T6SS represents a new paradigm of protein secretion in bacteria. A number of bioinformatic studies have been conducted to identify T6SS gene clusters in the available bacterial genome sequences. According to these studies, Salmonella harbors a unique T6SS encoded in the Salmonella Pathogenicity Island 6 (SPI-6. Since these studies only considered few Salmonella genomes, the present work aimed to identify novel T6SS loci by in silico analysis of every genome sequence of Salmonella available. Results The analysis of sequencing data from 44 completed or in progress Salmonella genome projects allowed the identification of 3 novel T6SS loci. These clusters are located in differentially-distributed genomic islands we designated SPI-19, SPI-20 and SPI-21, respectively. SPI-19 was identified in a subset of S. enterica serotypes including Dublin, Weltevreden, Agona, Gallinarum and Enteritidis. In the later, an internal deletion eliminated most of the island. On the other hand, SPI-20 and SPI-21 were restricted to S. enterica subspecies arizonae (IIIa serotype 62:z4,z23:-. Remarkably, SPI-21 encodes a VgrG protein containing a C-terminal extension similar to S-type pyocins of Pseudomonas aeruginosa. This is not only the first evolved VgrG described in Salmonella, but also the first evolved VgrG including a pyocin domain described so far in the literature. In addition, the data indicate that SPI-6 T6SS is widely distributed in S. enterica and absent in serotypes Enteritidis, Gallinarum, Agona, Javiana, Paratyphi B, Virchow, IIIa 62:z4,z23:- and IIIb 61:1,v:1,5,(7. Interestingly, while some serotypes harbor multiple T6SS (Dublin, Weltvreden and IIIa 62:z4,z23:- others do not encode for any (Enteritidis, Paratyphi B, Javiana, Virchow and IIIb 61:1,v:1,5,(7. Comparative and phylogenetic analyses indicate that the 4 T6SS loci in Salmonella have a distinct evolutionary history. Finally, we

  9. Functional analysis of Arabidopsis immune-related MAPKs uncovers a role for MPK3 as negative regulator of inducible defences

    KAUST Repository

    Frei dit Frey, Nicolas

    2014-06-30

    Background Mitogen-activated protein kinases (MAPKs) are key regulators of immune responses in animals and plants. In Arabidopsis, perception of microbe-associated molecular patterns (MAMPs) activates the MAPKs MPK3, MPK4 and MPK6. Increasing information depicts the molecular events activated by MAMPs in plants, but the specific and cooperative contributions of the MAPKs in these signalling events are largely unclear. Results In this work, we analyse the behaviour of MPK3, MPK4 and MPK6 mutants in early and late immune responses triggered by the MAMP flg22 from bacterial flagellin. A genome-wide transcriptome analysis reveals that 36% of the flg22-upregulated genes and 68% of the flg22-downregulated genes are affected in at least one MAPK mutant. So far MPK4 was considered as a negative regulator of immunity, whereas MPK3 and MPK6 were believed to play partially redundant positive functions in defence. Our work reveals that MPK4 is required for the regulation of approximately 50% of flg22-induced genes and we identify a negative role for MPK3 in regulating defence gene expression, flg22-induced salicylic acid accumulation and disease resistance to Pseudomonas syringae. Among the MAPK-dependent genes, 27% of flg22-upregulated genes and 76% of flg22-downregulated genes require two or three MAPKs for their regulation. The flg22-induced MAPK activities are differentially regulated in MPK3 and MPK6 mutants, both in amplitude and duration, revealing a highly interdependent network. Conclusions These data reveal a new set of distinct functions for MPK3, MPK4 and MPK6 and indicate that the plant immune signalling network is choreographed through the interplay of these three interwoven MAPK pathways.

  10. Phylogenetic tree-informed microRNAome analysis uncovers conserved and lineage-specific miRNAs in Camellia during floral organ development.

    Science.gov (United States)

    Yin, Hengfu; Fan, Zhengqi; Li, Xinlei; Wang, Jiangying; Liu, Weixin; Wu, Bin; Ying, Zhen; Liu, Liping; Liu, Zhongchi; Li, Jiyuan

    2016-04-01

    In plants, miRNAs are endogenous small RNAs derived from single-stranded precursors with hairpin structures. The evolution of miRNAs and their targets represents one of the most dynamic circuits directing gene expression, which may play fundamental roles in shaping the development of distinct plant organs. Here we performed high-throughput small RNA sequencing in five organ types of Camellia azalea to capture the spatial profile of small non-coding RNA. In total we obtained >227 million high-quality reads and identified 175 miRNAs with mature and precursor sequences. We aligned the miRNAs to known miRNA databases and revealed some conserved as well as 'newly evolved' miRNA genes. Twelve miRNAs were identified to be specific in the genus Camellia, supporting the lineage-specific manner of expansion of 'young' miRNAs. Through differential expression analysis, we showed that many miRNAs were preferentially abundant in certain organ types. Moreover, hierarchical clustering analysis revealed distinctive expression patterns of tissue-specific miRNAs. Gene Ontology enrichment analysis of targets of stamen- and carpel-specific miRNA subclusters showed that miRNA-target regulatory circuits were involved in many important biological processes, enabling their proper specification and organogenesis, such as 'DNA integration' and 'fruit development'. Further, quantitative PCR of key miRNAs and their target genes revealed anti-correlated patterns, and uncovered the functions of key miRNA-target pairs in different floral organs. Taken together, this work yielded valuable information on miRNA-target regulation in the control of floral organ development and sheds light on the evolution of lineage-specific miRNAs in Camellia. PMID:26951373

  11. Analysis of the transcriptome of Panax notoginseng root uncovers putative triterpene saponin-biosynthetic genes and genetic markers

    Directory of Open Access Journals (Sweden)

    Luo Hongmei

    2011-12-01

    Full Text Available Abstract Background Panax notoginseng (Burk F.H. Chen is important medicinal plant of the Araliacease family. Triterpene saponins are the bioactive constituents in P. notoginseng. However, available genomic information regarding this plant is limited. Moreover, details of triterpene saponin biosynthesis in the Panax species are largely unknown. Results Using the 454 pyrosequencing technology, a one-quarter GS FLX titanium run resulted in 188,185 reads with an average length of 410 bases for P. notoginseng root. These reads were processed and assembled by 454 GS De Novo Assembler software into 30,852 unique sequences. A total of 70.2% of unique sequences were annotated by Basic Local Alignment Search Tool (BLAST similarity searches against public sequence databases. The Kyoto Encyclopedia of Genes and Genomes (KEGG assignment discovered 41 unique sequences representing 11 genes involved in triterpene saponin backbone biosynthesis in the 454-EST dataset. In particular, the transcript encoding dammarenediol synthase (DS, which is the first committed enzyme in the biosynthetic pathway of major triterpene saponins, is highly expressed in the root of four-year-old P. notoginseng. It is worth emphasizing that the candidate cytochrome P450 (Pn02132 and Pn00158 and UDP-glycosyltransferase (Pn00082 gene most likely to be involved in hydroxylation or glycosylation of aglycones for triterpene saponin biosynthesis were discovered from 174 cytochrome P450s and 242 glycosyltransferases by phylogenetic analysis, respectively. Putative transcription factors were detected in 906 unique sequences, including Myb, homeobox, WRKY, basic helix-loop-helix (bHLH, and other family proteins. Additionally, a total of 2,772 simple sequence repeat (SSR were identified from 2,361 unique sequences, of which, di-nucleotide motifs were the most abundant motif. Conclusion This study is the first to present a large-scale EST dataset for P. notoginseng root acquired by next

  12. Dynamics of the risk of smoking-induced lung cancer : A compartmental hidden markov model for longitudinal analysis

    NARCIS (Netherlands)

    Chadeau-Hyam, Marc; Tubert-Bitter, Pascale; Guihenneuc-Jouyaux, Chantal; Campanella, Gianluca; Richardson, Sylvia; Vermeulen, Roel; De Iorio, Maria; Galea, Sandro; Vineis, Paolo

    2014-01-01

    BACKGROUND:: To account for the dynamic aspects of carcinogenesis, we propose a compartmental hidden Markov model in which each person is healthy, asymptomatically affected, diagnosed, or deceased. Our model is illustrated using the example of smoking-induced lung cancer. METHODS:: The model was fit

  13. Semi-Markov Chains and Hidden Semi-Markov Models toward Applications Their Use in Reliability and DNA Analysis

    CERN Document Server

    Barbu, Vlad

    2008-01-01

    Semi-Markov processes are much more general and better adapted to applications than the Markov ones because sojourn times in any state can be arbitrarily distributed, as opposed to the geometrically distributed sojourn time in the Markov case. This book concerns with the estimation of discrete-time semi-Markov and hidden semi-Markov processes

  14. A hidden deformation zone withing the Cilician Taurus Mountains: Analysis of the GPS data using a novel approcah

    Science.gov (United States)

    Sinan Özeren, Mehmet; Dimitrova, Lada; Haines, Alan John

    2014-05-01

    . We used GPS campaign data across central Anatolian block, gathered between 1998 and 2006. Our analysis shows significant contractional force area strain within Cilician Taurus. This is unlikely to be a post-seismic signature, as there were no large earthquakes documented in the region in the instrumental period. Our results show also large extensional force area strains to the south of the Orta fault, coinciding with the northern part of the Tuzgolu fault. Orta fault has recently produced a M6.0 earthquake with E-W extensional focal mechanism. The signature across the Cilician Taurus is very significant and might potentially indicate a hidden ongoing deformation field that possibly produces large earthquakes with long recurrence period (e.g. 2011 Christchurch earthquake). This possibly has far-reaching implications on the hazard mapping of the region and the nuclear safety for the entire eastern Mediterranean.

  15. Hidden costs of a typical embodied energy analysis: Brazilian sugarcane ethanol as a case study

    International Nuclear Information System (INIS)

    Worldwide human production systems are tightly coupled to fossil-based energy, the source of which will not be available at low cost in the foreseeable future. Alternative energy sources are being sought for, among which those derived from biomass are considered to have great potential. Brazilian ethanol sugarcane produced at a large scale is being classified in scientific papers and politics as a renewable energy source. However, only the energy return on investment (EROI) and/or the amount of CO2 released to atmosphere have been considered as indicators of renewability. This work aims to discuss some theoretical points, within an embodied energy analysis, that make its use inappropriate for answering all issues related to the concept of renewability. Emergy accounting (with an “m”) is used as a comparative tool and the Brazilian sugarcane ethanol is evaluated as case study. An EROI of 6.7 for ethanol was obtained, showing that for each unit of “commercial energy” invested within the process, 6.7 units of another kind of energy is obtained – this index shows an excellent value for energy efficiency, but it does not reflect the renewability of ethanol. On the other hand, emergy accounting shows a renewability index of 19%, indicating a low rating for sugarcane ethanol. All scientific methodologies available to assess potential energy sources have their pros and cons, but the analyst must be aware that each methodology supplies different indicators with different meanings. Energy analysts should use methodologies appropriately, avoiding wider conclusions not actually represented by indices calculated. - Highlights: • The renewability discourse of biofuels is discussed focusing on the Brazilian sugarcane ethanol. • Both energy efficiency and CO2 emitted hardly indicate the renewability of biofuels. • Emergy evaluation is introduced as a potential tool when assessing renewability. • Analysts must use methodologies accordingly and avoid general

  16. Autoregressive higher-order hidden Markov models: exploiting local chromosomal dependencies in the analysis of tumor expression profiles.

    Directory of Open Access Journals (Sweden)

    Michael Seifert

    Full Text Available Changes in gene expression programs play a central role in cancer. Chromosomal aberrations such as deletions, duplications and translocations of DNA segments can lead to highly significant positive correlations of gene expression levels of neighboring genes. This should be utilized to improve the analysis of tumor expression profiles. Here, we develop a novel model class of autoregressive higher-order Hidden Markov Models (HMMs that carefully exploit local data-dependent chromosomal dependencies to improve the identification of differentially expressed genes in tumor. Autoregressive higher-order HMMs overcome generally existing limitations of standard first-order HMMs in the modeling of dependencies between genes in close chromosomal proximity by the simultaneous usage of higher-order state-transitions and autoregressive emissions as novel model features. We apply autoregressive higher-order HMMs to the analysis of breast cancer and glioma gene expression data and perform in-depth model evaluation studies. We find that autoregressive higher-order HMMs clearly improve the identification of overexpressed genes with underlying gene copy number duplications in breast cancer in comparison to mixture models, standard first- and higher-order HMMs, and other related methods. The performance benefit is attributed to the simultaneous usage of higher-order state-transitions in combination with autoregressive emissions. This benefit could not be reached by using each of these two features independently. We also find that autoregressive higher-order HMMs are better able to identify differentially expressed genes in tumors independent of the underlying gene copy number status in comparison to the majority of related methods. This is further supported by the identification of well-known and of previously unreported hotspots of differential expression in glioblastomas demonstrating the efficacy of autoregressive higher-order HMMs for the analysis of individual

  17. Problem of hidden variables

    Science.gov (United States)

    Santos, Emilio

    1992-10-01

    The problem of hidden variables in quantum mechanics is formalized as follows. A general or contextual (noncontextual) hidden-variables theory is defined as a mapping f: Q×M → C (f: Q→C) where Q is the set of projection operators in the appropriate (quantum) Hilbert space, M is the set of maximal Boolean subalgebras of Q and C is a (classical) Boolean algebra. It is shown that contextual (noncontextual) hidden-variables always exist (do not exist).

  18. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  19. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression where...

  20. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression wher...

  1. Hidden Symmetry Subgroup Problems

    CERN Document Server

    Decker, Thomas; Santha, Miklos; Wocjan, Pawel

    2011-01-01

    We advocate a new approach of addressing hidden structure problems and finding efficient quantum algorithms. We introduce and investigate the Hidden Symmetry Subgroup Problem (HSSP), which is a generalization of the well-studied Hidden Subgroup Problem (HSP). Given a group acting on a set and an oracle whose level sets define a partition of the set, the task is to recover the subgroup of symmetries of this partition inside the group. The HSSP provides a unifying framework that, besides the HSP, encompasses a wide range of algebraic oracle problems, including quadratic hidden polynomial problems. While the HSSP can have provably exponential quantum query complexity, we obtain efficient quantum algorithms for various interesting cases. To achieve this, we present a general method for reducing the HSSP to the HSP, which works efficiently in several cases related to symmetries of polynomials. The HSSP therefore connects in a rather surprising way certain hidden polynomial problems with the HSP. Using this connect...

  2. Hidden Charged Dark Matter

    CERN Document Server

    Feng, Jonathan L; Tu, Huitzu; Yu, Hai-Bo

    2009-01-01

    We examine the possibility that dark matter is hidden, that is, neutral under all standard model gauge interactions, but charged under an exact U(1) gauge symmetry of the hidden sector. Such candidates are predicted in simple WIMPless models, supersymmetric models in which hidden dark matter has the desired thermal relic density for a wide range of masses. Hidden charged dark matter has many potentially disastrous implications for astrophysics: (1) bound state formation and Sommerfeld-enhanced annihilation after chemical freeze out may destroy its relic density, (2) similar effects greatly enhance dark matter annihilation in protohalos at redshifts of z ~ 30, (3) Compton scattering off hidden photons delays kinetic decoupling, suppressing small scale structure, and (4) Rutherford scattering makes such dark matter self-interacting and collisional, potentially violating constraints from the Bullet Cluster and the observed morphology of galactic halos. We show that all of these constraints are satisfied and are ...

  3. Carotta: Revealing Hidden Confounder Markers in Metabolic Breath Profiles.

    Science.gov (United States)

    Hauschild, Anne-Christin; Frisch, Tobias; Baumbach, Jörg Ingo; Baumbach, Jan

    2015-01-01

    Computational breath analysis is a growing research area aiming at identifying volatile organic compounds (VOCs) in human breath to assist medical diagnostics of the next generation. While inexpensive and non-invasive bioanalytical technologies for metabolite detection in exhaled air and bacterial/fungal vapor exist and the first studies on the power of supervised machine learning methods for profiling of the resulting data were conducted, we lack methods to extract hidden data features emerging from confounding factors. Here, we present Carotta, a new cluster analysis framework dedicated to uncovering such hidden substructures by sophisticated unsupervised statistical learning methods. We study the power of transitivity clustering and hierarchical clustering to identify groups of VOCs with similar expression behavior over most patient breath samples and/or groups of patients with a similar VOC intensity pattern. This enables the discovery of dependencies between metabolites. On the one hand, this allows us to eliminate the effect of potential confounding factors hindering disease classification, such as smoking. On the other hand, we may also identify VOCs associated with disease subtypes or concomitant diseases. Carotta is an open source software with an intuitive graphical user interface promoting data handling, analysis and visualization. The back-end is designed to be modular, allowing for easy extensions with plugins in the future, such as new clustering methods and statistics. It does not require much prior knowledge or technical skills to operate. We demonstrate its power and applicability by means of one artificial dataset. We also apply Carotta exemplarily to a real-world example dataset on chronic obstructive pulmonary disease (COPD). While the artificial data are utilized as a proof of concept, we will demonstrate how Carotta finds candidate markers in our real dataset associated with confounders rather than the primary disease (COPD) and bronchial

  4. Carotta: Revealing Hidden Confounder Markers in Metabolic Breath Profiles

    Directory of Open Access Journals (Sweden)

    Anne-Christin Hauschild

    2015-06-01

    Full Text Available Computational breath analysis is a growing research area aiming at identifying volatile organic compounds (VOCs in human breath to assist medical diagnostics of the next generation. While inexpensive and non-invasive bioanalytical technologies for metabolite detection in exhaled air and bacterial/fungal vapor exist and the first studies on the power of supervised machine learning methods for profiling of the resulting data were conducted, we lack methods to extract hidden data features emerging from confounding factors. Here, we present Carotta, a new cluster analysis framework dedicated to uncovering such hidden substructures by sophisticated unsupervised statistical learning methods. We study the power of transitivity clustering and hierarchical clustering to identify groups of VOCs with similar expression behavior over most patient breath samples and/or groups of patients with a similar VOC intensity pattern. This enables the discovery of dependencies between metabolites. On the one hand, this allows us to eliminate the effect of potential confounding factors hindering disease classification, such as smoking. On the other hand, we may also identify VOCs associated with disease subtypes or concomitant diseases. Carotta is an open source software with an intuitive graphical user interface promoting data handling, analysis and visualization. The back-end is designed to be modular, allowing for easy extensions with plugins in the future, such as new clustering methods and statistics. It does not require much prior knowledge or technical skills to operate. We demonstrate its power and applicability by means of one artificial dataset. We also apply Carotta exemplarily to a real-world example dataset on chronic obstructive pulmonary disease (COPD. While the artificial data are utilized as a proof of concept, we will demonstrate how Carotta finds candidate markers in our real dataset associated with confounders rather than the primary disease (COPD

  5. Risk of Post-ERCP Pancreatitis after placement of Covered versus Uncovered Self-Expandable Biliary Metal Stents: A Systematic Review and Meta-Analysis

    OpenAIRE

    Yaseen Alastal; Tariq Hammad; Muhammad Ali Khan; Khalil, Basmah W.; Sobia Khan; Mohammad Kashif Ismail; Ali Nawras; Aijaz Sofi

    2008-01-01

    Background Self-expandable metal stents are commonly used in the management of malignant biliary obstruction due to higher patency rates compared to plastic stents. Development of covered self-expandable metal stents has led to extended stent patency compared to uncovered self-expandable metal stents. However, there are concerns that deployment of covered self-expandable metal stents may be associated with higher risk of post-endoscopic retrograde cholangio-pancreatography pancreatitis, acute...

  6. Deschooling Society, Uncovering Illich

    Science.gov (United States)

    Bauer, Norman J.

    1972-01-01

    Critical analysis of the work of Ivan D. Illich, crediting him with providing a significant contribution to current efforts by a number of thinkers to reenergize our cultural consciousness relative to the insidious effects which institutional dependency fosters. (Author/GB)

  7. The hidden universe

    International Nuclear Information System (INIS)

    Astronomer Disney has followed a somewhat different tack than that of most popular books on cosmology by concentrating on the notion of hidden (as in not directly observable by its own radiation) matter in the universe

  8. Observing The Hidden Sector

    CERN Document Server

    Campbell, Bruce A; Maybury, David W

    2008-01-01

    We study the effects of renormalization due to hidden-sector dynamics on observable soft supersymmetry-breaking parameters in the minimal supersymmetric extension of the Standard Model (MSSM), under various hypotheses about their universality at a high input scale. We show that hidden-sector renormalization effects may induce the spurious appearance of unification of the scalar masses at some lower scale, as in mirage unification scenarios. We demonstrate in simple two-parameter models of the hidden-sector dynamics that the parameters may in principle be extracted from experimental measurements, rendering the hidden sector observable. We also discuss the ingredients that would be necessary to carry this programme out in practice.

  9. Uncovering Plagiarism Networks

    OpenAIRE

    Freire, Manuel; Cebrian, Manuel; del Rosal, Emilio

    2007-01-01

    Plagiarism detection in educational programming assignments is still a problematic issue in terms of resource waste, ethical controversy, legal risks, and technical complexity. This paper presents AC, a modular plagiarism detection system. The design is portable across platforms and assignment formats and provides easy extraction into the internal assignment representation. Multiple similarity measures have been incorporated, both existing and newly-developed. Statistical analysis and several...

  10. Hidden Dipole Dark Matter

    CERN Document Server

    Pierce, Aaron

    2014-01-01

    We consider models where a hidden U(1)' interacts with the Standard Model via kinetic mixing. We assume the dark matter is neutral under this U(1)', but interacts with it via higher dimension operators. In particular, we consider a hidden dipole operator for fermionic dark matter, and charge radius and Rayleigh operators for scalar dark matter. These models naturally explain the absence of direct detection signals, but allow for a thermal cosmology. LHC searches for the Z' represent a powerful probe.

  11. Classifying the speech response of the brain using Gaussian hidden markov model (HMM) with independent component analysis (ICA).

    Science.gov (United States)

    Kim, Jongin; Lee, Suh-Kyung; Lee, Boreom

    2013-01-01

    The purpose of this paper is to determine whether electroencephalograpy (EEG) can be used as a tool for hearing impairment tests such as hearing screening. For this study, we recorded EEG responses to two syllables, /a/ and /u/, in Korean from three subjects at Gwangju Institute of Science and Technology. The ultimate goal of this study is to classify speech sound data regardless of their size using EEG; however, as an initial stage of the study, we classified only two different speech syllables using Gaussian hidden markov model. The result of this study shows a possibility that EEG could be used for hearing screening and other diagnostic tools related to speech perception. PMID:24110681

  12. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  13. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  14. Solar Hidden Photon Search

    OpenAIRE

    Schwarz, Matthias; Wiedemann, Guenter; Lindner, Axel; Redondo, Javier; Ringwald, Andreas; Wiedemann, Gunter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS heli...

  15. Solar Hidden Photon Search

    CERN Document Server

    Schwarz, Matthias; Redondo, Javier; Ringwald, Andreas; Wiedemann, Guenter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope.

  16. What the Shadow Knows: Exploring the Hidden Dimensions of the Consumer Metaphor in Management Education

    Science.gov (United States)

    Gross, Michael A.; Hogler, Raymond

    2005-01-01

    This article aims to uncover hidden dimensions of the metaphor of consumerism in management education. By exploring the metaphor, the authors elucidate the implicit claims in the assertion that teachers produce business education and students consume that product. The image of commodification structures a discourse that involves conceptions of…

  17. An automated inverse analysis system using neural networks and computational mechanics with its application to identification of 3-D crack shape hidden in solid

    International Nuclear Information System (INIS)

    This paper describes a new inverse analysis system using the hierarchical (multilayer) neural networks and the computational mechanics. The present inverse analysis basically consists of the following three subprocesses: by parametrically varying system parameters, their corresponding responses of the system are calculated through computational mechanics simulations, each of which is an ordinary direct analysis. Each data pair of system parameters system responses is called training pattern; the back-propagation neural network is iteratively trained using a number of training patterns. The system responses are given to the input units of the network, while the system parameters to be identified are given to its output units as teacher signal; some system responses measured are given to the well trained network, which immediately outputs appropriate system parameters even for untrained patterns. This is an inverse analysis. To demonstrate its practical performances, the present system is applied to identify locations and shapes of two adjacent dissimilar surface cracks hidden in a pipe with the electric potential drop method. The results clearly show that the present system is very efficient and accurate. (author). 7 refs., 10 figs

  18. Detailed analysis of successive pTRMs carried by pyrrhotite in Himalayan metacarbonates: an example from Hidden Valley, Central Nepal

    Science.gov (United States)

    Crouzet, C.; Stang, H.; Appel, E.; Schill, E.; Gautam, P.

    2001-09-01

    Low-grade metacarbonates from the Tethyan Himalaya were sampled for palaeomagnetic studies in Hidden Valley (Central Nepal). The remanence is carried by pyrrhotite, evidenced by thermomagnetic runs of susceptibility (Hopkinson peak at ~300°C), alternating field demagnetization, isothermal remanent magnetization acquisition and subsequent thermal demagnetization. The palaeomagnetic directions reflect a Tertiary overprint after the main folding event, probably synchronous with the metamorphism. Normal and reverse remanence directions were separated and vary with altitude. It is also possible to retrieve several antiparallel components versus temperature during thermal demagnetization of a single sample. At higher altitudes (4920-5500m), the first component recorded is reverse (R1). At a lower temperature a normal component can be extracted (N1). For sites sampled at lower altitudes (4700-4900m), the high-temperature reverse component disappears but a medium-temperature reverse component (R2) demagnetized in a narrow temperature range can be identified in between two normal components (N1 at high temperature and N2 at low temperature). At the lowest altitudes (4450-4700m), only a normal component (N2) appears. The occurrence of successive normal and reverse polarities in one sample is interpreted as the record of successive reversals of the geomagnetic field during the post-metamorphic Tertiary cooling of the studied area. The polarity versus altitude function is a powerful argument for a thermomagnetic origin of the magnetization. No obvious rotations around a vertical axis with respect to the stable Indian plate are evidenced for the Tertiary. However, the inclination is not consistent with the expected inclination. Main Central Thrust ramping can be invoked to explain our observations. R1, N1 and N2 inclinations are slightly different and their tendency is consistent with tilting towards the north during magnetization acquisition. The minimum total amount of such

  19. Uncovering key data points to improve OR profitability.

    Science.gov (United States)

    Stiefel, Robert A; Greenfield, Howard

    2014-03-01

    Using data analysis to target areas for performance improvement in the operating room (OR) involves: regularly monitoring key OR statistics, such as through use of a dashboard, determining the root causes of problems uncovered by the data analysis, making appropriate corrections and continuing to monitor performance. PMID:24701846

  20. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  1. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  2. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  3. Is There Hidden Value in Real Estate Investments? - Real Options Analysis Provides Rationale to Contingent Investment Decisions

    OpenAIRE

    Vimpari, Jussi

    2014-01-01

    The understanding of real options analysis (ROA) has been claimed by academics to be extremely valuable for the real estate industry; yet adoption of the method in practice has been very slow. The aim of this dissertation is to examine opportunities that ROA opens in real estate investment analysis and decision-making as well as to demonstrate the actual real option value in some topical areas of real estate investment. The study utilizes a mixed method research strategy with both quantita...

  4. CoCoRaHS (The Community Collaborative Rain, Hail and Snow Network): Analysis of Participant Survey Data to Uncover Learning through Participation

    Science.gov (United States)

    Holzer, M. A.; Zimmerman, T.; Doesken, N. J.; Reges, H. W.; Newman, N.; Turner, J.; Schwalbe, Z.

    2010-12-01

    CoCoRaHS (The Community Collaborative Rain, Hail and Snow network) is based out of Fort Collins Colorado and is an extremely successful citizen science project with over 15,000 volunteers collecting valuable precipitation data. Forecasters and scientists use data from this dense network to illuminate and illustrate the high small-scale variability of precipitation across the nation. This presentation will discuss the results of a survey of CoCoRaHS participants as related to 1) citizen scientists’ motivation and learning; 2) the challenges of identifying how people learn science in citizen science projects; and 3) a potential research-based framework for how people learn through engaging in the data collection within in a citizen science project. A comprehensive survey of 14,500 CoCoRaHS observers was recently conducted to uncover participant perceptions of numerous aspects of the CoCoRaHS program, including its goal of increasing climate literacy. The survey yielded a response rate of over 50%, and included measures of motivation, engagement and learning. In relationship to motivation and learning, the survey revealed that most (57.1%) observers would make precipitation observations regardless of being a CoCoRaHS volunteer, therefore their motivation is related to their inherent level of interest in weather. Others are motivated by their desire to learn more about weather and climate, they want to contribute to a scientific project, they think its fun, and/or it provides a sense of community. Because so many respondents already had knowledge and interest in weather and climate, identifying how and what people learn through participating was a challenge. However, the narrow project focus of collecting and reporting of local precipitation assisted in identifying aspects of learning. For instance, most (46.4%) observers said they increased their knowledge about the local variability in precipitation even though they had been collecting precipitation data for many

  5. Using HPGe detector for a solar hidden-photons search

    CERN Document Server

    Horvat, R; Krcmar, M; Krecak, Z; Ljubicic, A

    2012-01-01

    In this paper we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory, by observing the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, leads to both photon into hidden states oscillations and to a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in the Sun's interior. We exclude hidden photons with kinetic couplings chi > (1.5x10^{-6}-2.6x10^{-11}) for the mass region 1.7x10^{-4} eV < m_\\gamma' < 3.4 eV. Our constraints on the mixing parameter chi at sub-eV hidden-photon masses p...

  6. The hidden values

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Jensen, Karsten Klint

    Transparency is a highly desirable feature of the recommendations and decisions made by public authorities on the use of chemicals, GMOs and other potentially hazardous products. Without it, the relevant political decisions may not be perceived as legitimate. But it is no simple task to make the...... “The Hidden Values - Transparency in Decision-Making Processes Dealing with Hazardous Activities”. The report seeks to shed light on what is needed to create a transparent framework for political and administrative decisions on the use of GMOs and chemical products. It is our hope that the report......’s recommendations will serve as a source of guidance to public authorities, politicians and others interested in increasing the transparency of decisions on GMOs, chemicals and other hazardous activities....

  7. Phonocardiogram segmentation by using Hidden Markov Models

    OpenAIRE

    Lima, C. S.; Cardoso, Manuel J.

    2007-01-01

    This paper is concerned to the segmentation of heart sounds by using state of art Hidden Markov Models technology. Concerning to several heart pathologies the analysis of the intervals between the first and second heart sounds is of utmost importance. Such intervals are silent for a normal subject and the presence of murmurs indicate certain cardiovascular defects and diseases. While the first heart sound can easily be detected if the ECG is available, the second heart sound is much more diff...

  8. Constraints and hidden symmetry in two-dimensional gravity

    International Nuclear Information System (INIS)

    We study the hidden symmetry of Polyakov two-dimensional gravity by means of first-class constraints. These are obtained from the combination of Fourier mode expansions of the usual (second-class) constraints of the theory. We show that, more than the usual SL(2,R), there is a hidden Virasoro symmetry in the theory. The results of the above analysis are also confirmed from the point of view of a geometrical symplectic treatment

  9. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  10. The invisible Web uncovering information sources search engines can't see

    CERN Document Server

    Sherman, Chris

    2001-01-01

    Enormous expanses of the Internet are unreachable with standard web search engines. This book provides the key to finding these hidden resources by identifying how to uncover and use invisible web resources. Mapping the invisible Web, when and how to use it, assessing the validity of the information, and the future of Web searching are topics covered in detail. Only 16 percent of Net-based information can be located using a general search engine. The other 84 percent is what is referred to as the invisible Web-made up of information stored in databases. Unlike pages on the visible Web, informa

  11. Genome analysis of a clinical isolate of Shewanella sp. uncovered an active hybrid integrative and conjugative element carrying an integron platform inserted in a novel genomic locus.

    Science.gov (United States)

    Parmeciano Di Noto, Gisela; Jara, Eugenio; Iriarte, Andrés; Centrón, Daniela; Quiroga, Cecilia

    2016-08-01

    Shewanella spp. are currently considered to be emerging pathogens that can code for a blaOXA carbapenemase in their chromosome. Complete genome analysis of the clinical isolate Shewanella sp. Sh95 revealed that this strain is a novel species, which shares a lineage with marine isolates. Characterization of its resistome showed that it codes for genes drfA15, qacH and blaOXA-48. We propose that Shewanella sp. Sh95 acts as reservoir of blaOXA-48. Moreover, analysis of mobilome showed that it contains a novel integrative and conjugative element (ICE), named ICESh95. Comparative analysis between the close relatives ICESpuPO1 from Shewanella sp. W3-18-1 and ICE SXTMO10 from Vibrio cholerae showed that ICESh95 encompassed two new regions, a type III restriction modification system and a multidrug resistance integron. The integron platform contained a novel arrangement formed by gene cassettes drfA15 and qacH, and a class C-attC group II intron. Furthermore, insertion of ICESh95 occurred at a unique target site, which correlated with the presence of a different xis/int module. Mobility of ICESh95 was assessed and demonstrated its ability to self-transfer with high efficiency to different species of bacteria. Our results show that ICESh95 is a self-transmissible, mobile element, which can contribute to the dissemination of antimicrobial resistance; this is clearly a threat when natural bacteria from water ecosystems, such as Shewanella, act as vectors in its propagation. PMID:27215217

  12. Giving Voice to Emotion: Voice Analysis Technology Uncovering Mental States is Playing a Growing Role in Medicine, Business, and Law Enforcement.

    Science.gov (United States)

    Allen, Summer

    2016-01-01

    It's tough to imagine anything more frustrating than interacting with a call center. Generally, people don't reach out to call centers when they?re happy-they're usually trying to get help with a problem or gearing up to do battle over a billing error. Add in an automatic phone tree, and you have a recipe for annoyance. But what if that robotic voice offering you a smorgasbord of numbered choices could tell that you were frustrated and then funnel you to an actual human being? This type of voice analysis technology exists, and it's just one example of the many ways that computers can use your voice to extract information about your mental and emotional state-including information you may not think of as being accessible through your voice alone. PMID:27187541

  13. Uncovering patterns of interest in useful plants. Frequency analysis of individual students’ interest types as a tool for planning botany teaching units

    Directory of Open Access Journals (Sweden)

    Peter Pany

    2014-12-01

    Full Text Available The paper presented examines how useful plants can help counteracting “plant blindness” – a phenomenon leading people to overlook plants in everyday-life. Recent research indicates that people are most likely interested in useful plants, hence this group of plants could be used to trigger interest in botanical content in general. This study has investigated the structure of interest in five subgroups of useful plants (medicinal plants, stimulant herbal drugs, spice plants, edible plants, and ornamental plants. For this purpose, the FEIN-questionnaire (Fragebogen zur Erhebung des Interesses an Nutzpflanzen = Questionnaire acquiring interest in useful plants was filled in by N = 1299 pupils from grade 5 to 12. Data analysis shows (for all age groups and both genders that medicinal plants and stimulant herbal drugs trigger high interest while spice plants, edible plants and ornamental plants raise only lower interest. However, mean values do not allow conclusions on individual level (e.g. in a school class. In order to gain information about the interest structure in a specific target group teachers deal with in practice, we have analysed the interests on individual level using frequency analysis of different interest types. Results show that stimulant herbal drugs seem to strongly polarize students, whereas medicinal plants are interesting for almost the whole sample. Eventually, medicinal plants turned out to be well suited to introduce botanical content by means of plants catching the interest of as many students as possible. Therefore, medicinal plants should be established as flagships counteracting plant blindness.

  14. Uncovering Plagiarism - Author Profiling at PAN

    OpenAIRE

    Rosso, Paolo; RANGEL PARDO, FRANCISCO MANUEL

    2014-01-01

    PAN is a yearly workshop and evaluation lab on uncovering plagiarism, authorship, and social software misuse. Since 2009, PAN has been organizing benchmark activities on uncovering plagiarism, authorship, and social software misuse . An additional task - author profiling - has also recently been proposed. Author profiling, instead of focusing on individual authors, studies how language is shared by a class of people. Author profiling is a problem of growing importance in applications in foren...

  15. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  16. Uncovering Hidden Dimensions of Australian Early Childhood Policy History: Insights from Interviews with Policy "Elites"

    Science.gov (United States)

    Logan, Helen; Sumsion, Jennifer; Press, Frances

    2014-01-01

    This article considers the value of elite interviews as a frequently overlooked methodology in investigations of policymaking in early childhood education and care (ECEC). We contextualise the discussion within a study that examines constructions of quality in Australian ECEC policymaking between 1972 and 2009. We conclude that, despite their…

  17. Uncovering the Hidden Meaning of Cross-Curriculum Comparison Results on the Force Concept Inventory

    Science.gov (United States)

    Ding, Lin; Caballero, Marcos D.

    2014-01-01

    In a recent study, Caballero and colleagues conducted a large-scale evaluation using the Force Concept Inventory (FCI) to compare student learning outcomes between two introductory physics curricula: the Matter and Interactions (M&I) mechanics course and a pedagogically-reformed-traditional-content (PRTC) mechanics course. Using a conventional…

  18. Self-Efficacy Beliefs and Mental Time Travel Ability: Uncovering a Hidden Relationship in Educational Settings

    Science.gov (United States)

    Eren, Altay

    2009-01-01

    The aim of this study was threefold: first, it was to explore the profiles of student teachers' mental time travel ability; second, it was to examine the relationship between student teachers' mental time travel ability and self-efficacy beliefs; and third, it was to investigate the role of self-efficacy beliefs in relationship between the past…

  19. A dynamical network approach to uncovering hidden causality relationships in collective neuron firings

    CERN Document Server

    Ruszczycki, Bła\\ zej; Johnson, Neil F

    2009-01-01

    We analyze the synchronous firings of the salamander ganglion cells from the perspective of the complex network viewpoint where the network's links reflect the correlated behavior of firings. We study the time-aggregated properties of the resulting network focusing on its topological features. The behavior of pairwise correlations has been inspected in order to construct an appropriate measure that will serve as a weight of network connection.

  20. Uncovering the "Hidden Dimension": Proxemic Research Techniques Applied to Teacher Preparation.

    Science.gov (United States)

    Levis-Pilz, Gladys

    1982-01-01

    Classroom observation assignments for preservice teachers allow them to observe detailed relationships among classroom space and teacher student interaction. Through structured observation, preservice teachers become aware of classroom interactions in a vivid and instructive manner. (CJ)

  1. Population genomic analysis uncovers African and European admixture in Drosophila melanogaster populations from the south-eastern United States and Caribbean Islands.

    Science.gov (United States)

    Kao, Joyce Y; Zubair, Asif; Salomon, Matthew P; Nuzhdin, Sergey V; Campo, Daniel

    2015-04-01

    Drosophila melanogaster is postulated to have colonized North America in the past several 100 years in two waves. Flies from Europe colonized the east coast United States while flies from Africa inhabited the Caribbean, which if true, make the south-east US and Caribbean Islands a secondary contact zone for African and European D. melanogaster. This scenario has been proposed based on phenotypes and limited genetic data. In our study, we have sequenced individual whole genomes of flies from populations in the south-east US and Caribbean Islands and examined these populations in conjunction with population sequences from the west coast US, Africa, and Europe. We find that west coast US populations are closely related to the European population, likely reflecting a rapid westward expansion upon first settlements into North America. We also find genomic evidence of African and European admixture in south-east US and Caribbean populations, with a clinal pattern of decreasing proportions of African ancestry with higher latitude. Our genomic analysis of D. melanogaster populations from the south-east US and Caribbean Islands provides more evidence for the Caribbean Islands as the source of previously reported novel African alleles found in other east coast US populations. We also find the border between the south-east US and the Caribbean island to be the admixture hot zone where distinctly African-like Caribbean flies become genomically more similar to European-like south-east US flies. Our findings have important implications for previous studies examining the generation of east coast US clines via selection. PMID:25735402

  2. Revelando sentidos na prática docente: a abordagem de corpus na análise do discurso Uncovering meanings in pedagogical practice: the corpus approach in discourse analysis

    Directory of Open Access Journals (Sweden)

    Vander Viana

    2011-01-01

    Full Text Available Este artigo discute a viabilidade da utilização de ferramentas da Linguística de Corpus na análise do discurso pedagógico. Para tanto, são apresentados dois estudos de caso. O primeiro focaliza o discurso de professores de língua inglesa de um renomado curso de idiomas do Rio de Janeiro acerca da implementação de recursos tecnológicos na sala de aula. O segundo estudo, por sua vez, busca perceber qual é o posicionamento de professores universitários de literaturas em língua inglesa sobre literatura e seu ensino. Os resultados apontam para a riqueza dos dados contextuais que podem ser depreendidos a partir de uma análise linguística de base empírica. Em última análise, o artigo revela a importância e a flexibilidade da abordagem de corpus na análise do discurso, que pode ser aplicada a inúmeros contextos.This paper discusses the feasibility of using Corpus Linguistics tools in the analysis of pedagogic discourse. For doing this, two case studies are presented. The first one focuses on the discourse of English language teachers of a well-known languages course in Rio de Janeiro about the implementation of technological resources in the classroom. The second study, in its turn, seeks to realize the position held by university professors of literatures in English language with regard to literature and its teaching. The results point out to the richness of contextual data which can be inferred from a linguistic analysis with an empirical basis. All in all, the paper uncovers the importance and flexibility of the corpus approach in discourse analysis, which may be applied to several contexts.

  3. Child Abuse: The Hidden Bruises

    Science.gov (United States)

    ... AACAP Facts for Families Guide Skip breadcrumb navigation Child Abuse - The Hidden Bruises Quick Links Facts For Families ... 5; Updated November 2014 The statistics on physical child abuse are alarming. It is estimated hundreds of thousands ...

  4. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs of...... offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...... experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...

  5. Hidden structures in quantum mechanics

    OpenAIRE

    Dzhunushaliev, Vladimir

    2008-01-01

    It is shown that some operators in quantum mechanics have hidden structures that are unobservable in principle. These structures are based on a supersymmetric decomposition of the momentum operator, and a nonassociative decomposition of the spin operator.

  6. HITS-CLIP analysis uncovers a link between the Kaposi's sarcoma-associated herpesvirus ORF57 protein and host pre-mRNA metabolism.

    Directory of Open Access Journals (Sweden)

    Emi Sei

    2015-02-01

    Full Text Available The Kaposi's sarcoma associated herpesvirus (KSHV is an oncogenic virus that causes Kaposi's sarcoma, primary effusion lymphoma (PEL, and some forms of multicentric Castleman's disease. The KSHV ORF57 protein is a conserved posttranscriptional regulator of gene expression that is essential for virus replication. ORF57 is multifunctional, but most of its activities are directly linked to its ability to bind RNA. We globally identified virus and host RNAs bound by ORF57 during lytic reactivation in PEL cells using high-throughput sequencing of RNA isolated by cross-linking immunoprecipitation (HITS-CLIP. As expected, ORF57-bound RNA fragments mapped throughout the KSHV genome, including the known ORF57 ligand PAN RNA. In agreement with previously published ChIP results, we observed that ORF57 bound RNAs near the oriLyt regions of the genome. Examination of the host RNA fragments revealed that a subset of the ORF57-bound RNAs was derived from transcript 5' ends. The position of these 5'-bound fragments correlated closely with the 5'-most exon-intron junction of the pre-mRNA. We selected four candidates (BTG1, EGR1, ZFP36, and TNFSF9 and analyzed their pre-mRNA and mRNA levels during lytic phase. Analysis of both steady-state and newly made RNAs revealed that these candidate ORF57-bound pre-mRNAs persisted for longer periods of time throughout infection than control RNAs, consistent with a role for ORF57 in pre-mRNA metabolism. In addition, exogenous expression of ORF57 was sufficient to increase the pre-mRNA levels and, in one case, the mRNA levels of the putative ORF57 targets. These results demonstrate that ORF57 interacts with specific host pre-mRNAs during lytic reactivation and alters their processing, likely by stabilizing pre-mRNAs. These data suggest that ORF57 is involved in modulating host gene expression in addition to KSHV gene expression during lytic reactivation.

  7. Sensitivity of hidden Markov models

    OpenAIRE

    Mitrophanov, Alexander Yu.; Lomsadze, Alexandre; Borodovsky, Mark

    2005-01-01

    We derive a tight perturbation bound for hidden Markov models. Using this bound, we show that, in many cases, the distribution of a hidden Markov model is considerably more sensitive to perturbations in the emission probabilities than to perturbations in the transition probability matrix and the initial distribution of the underlying Markov chain. Our approach can also be used to assess the sensitivity of other stochastic models, such as mixture processes and semi-Markov ...

  8. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  9. Tracing hidden herbivores: Time-resolved non-invasive analysis of belowground volatiles by proton-transfer-reaction mass spectrometry (PTR-MS)

    OpenAIRE

    Danner, H.; Samudrala, D.; Cristescu, S M; Van Dam, N.M.

    2012-01-01

    Root herbivores are notoriously difficult to study, as they feed hidden in the soil. However, root herbivores may be traced by analyzing specific volatile organic compounds (VOCs) that are produced by damaged roots. These VOCs not only support parasitoids in the localization of their host, but also may help scientists study belowground plant-herbivore interactions. Herbivore-induced VOCs are usually analyzed by gas-chromatography mass spectrometry (GC-MS), but with this off-line method, the g...

  10. Hidden variables and nonlocality in quantum mechanics

    Science.gov (United States)

    Hemmick, Douglas Lloyd

    1997-05-01

    Most physicists hold a skeptical attitude toward a 'hidden variables' interpretation of quantum theory, despite David Bohm's successful construction of such a theory and John S. Bell's strong arguments in favor of the idea. The first reason for doubt concerns certain mathematical theorems (von Neumann's, Gleason's, Kochen and Specker's, and Bell's) which can be applied to the hidden variables issue. These theorems are often credited with proving that hidden variables are indeed 'impossible', in the sense that they cannot replicate the predictions of quantum mechanics. Many who do not draw such a strong conclusion nevertheless accept that hidden variables have been shown to exhibit prohibitively complicated features. The second concern is that the most sophisticated example of a hidden variables theory-that of David Bohm-exhibits non-locality, i.e., consequences of events at one place can propagate to other places instantaneously. However, neither the mathematical theorems in question nor the attribute of nonlocality detract from the importance of a hidden variables interpretation of quantum theory. Nonlocality is present in quantum mechanics itself, and is a required characteristic of any theory that agrees with the quantum mechanical predictions. We first discuss the earliest analysis of hidden variables-that of von Neumann's theorem-and review John S. Bell's refutation of von Neumann's 'impossibility proof'. We recall and elaborate on Bell's arguments regarding the theorems of Gleason, and Kochen and Specker. According to Bell, these latter theorems do not imply that hidden variables interpretations are untenable, but instead that such theories must exhibit contextuality, i.e., they must allow for the dependence of measurement results on the characteristics of both measured system and measuring apparatus. We demonstrate a new way to understand the implications of both Gleason's theorem and Kochen and Specker's theorem by noting that they prove a result we call

  11. Ranked prediction of p53 targets using hidden variable dynamic modeling

    OpenAIRE

    Barenco, M.; Tomescu, D; Brewer, D; Callard, R.; Stark, J.(Laboratoire de Physique Subatomique et de Cosmologie, Université Grenoble-Alpes, CNRS/IN2P3, Grenoble, France); Hubank, M.

    2006-01-01

    Full exploitation of microarray data requires hidden information that cannot be extracted using current analysis methodologies. We present a new approach, hidden variable dynamic modeling (HVDM), which derives the hidden profile of a transcription factor from time series microarray data, and generates a ranked list of predicted targets. We applied HVDM to the p53 network, validating predictions experimentally using small interfering RNA. HVDM can be applied in many systems biology contexts to...

  12. A hidden history

    Directory of Open Access Journals (Sweden)

    Emily Peppers

    2008-01-01

    Full Text Available The Cultural Collections Audit project began at the University of Edinburgh in 2004, searching for hidden treasures in its 'distributed heritage collections' across the university. The objects and collections recorded in the Audit ranged widely from fine art and furniture to historical scientific and teaching equipment and personalia relating to key figures in the university's long tradition of academic excellence. This information was gathered in order to create a central database of information, to identify objects in vulnerable or dangerous situations, to identify items that require conservation, and for insurance purposes. The response of colleagues in all areas of the university has been overwhelmingly positive. The Audit has proved successful in raising awareness of collections and collections issues both within the university and with the national media, instilling a sense of pride among non-museums university staff who have tirelessly safeguarded these heritage collections despite ongoing pressure to downsize. The Audit highlighted a number of issues in the university's non-formal collections including environmental conditions, departmental relocations, object conditions, security, insurance, storage and long-term preservation. With the positive support and specialist knowledge of established contacts in every department of the university, the Audit worked to bring these collections and issues to light by acting as a resource for information, identifying vulnerable items and challenge areas, and by celebrating the university's rich object history through an online website dedicated to the Audit. This paper details the challenges identified by the Cultural Audit, and gives examples of positive solutions that enable preservation while promoting pride in academic excellence and innovation.

  13. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  14. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  15. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  16. Decaying into the Hidden Sector

    CERN Document Server

    Ruderman, Joshua T

    2009-01-01

    The existence of light hidden sectors is an exciting possibility that may be tested in the near future. If DM is allowed to decay into such a hidden sector through GUT suppressed operators, it can accommodate the recent cosmic ray observations without over-producing antiprotons or interfering with the attractive features of the thermal WIMP. Models of this kind are simple to construct, generic and evade all astrophysical bounds. We provide tools for constructing such models and present several distinct examples. The light hidden spectrum and DM couplings can be probed in the near future, by measuring astrophysical photon and neutrino fluxes. These indirect signatures are complimentary to the direct production signals, such as lepton jets, predicted by these models.

  17. Adaptive Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rasmussen, Tage

    1996-01-01

    Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding.......Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding....

  18. Social network analysis as hidden advertising value of the carrier and application of countermeasures%社交网络作为隐性广告载体的价值分析及应用对策

    Institute of Scientific and Technical Information of China (English)

    周志平

    2012-01-01

    随着社交网络的产生和发展,直至流行和普及,社交网络给现代生活带来了巨大的改变和冲击,社交网络的商业价值也日益凸显。本文传播方式和受众两个层面全面系统地分析了社交网络作为隐性广告载体的价值优势,并提出了社交网络植入隐性广告的一些可行性建议。%With the emergence and development of the social network,until the prevalence and popularity of social networks to modern life has brought a huge change and the impact of the commercial value of the social network has become increasingly prominent.The two levels of this article mode of transmission and audience a comprehensive and systematic analysis of the social network as hidden advertising value of the carrier edge,and put forward some feasible suggestions of hidden advertising in social networks implanted.

  19. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  20. Rewards and Copyrights with Hidden Information

    OpenAIRE

    Sandén, Klas

    2008-01-01

    This paper makes a theoretical contribution by investigating how the optimal copyright legislation depend on hidden information. A mixed hidden action – hidden information model is used. The regulator neither observes the type of firm nor the quality choice of firms. The paper provides no evidence that hidden information can motivate a copyright legislation. In fact it shows that the optimal policy, with asymmetric information, is a reward system that is second best.

  1. Infinite Structured Hidden Semi-Markov Models

    OpenAIRE

    Huggins, Jonathan H.; Wood, Frank

    2014-01-01

    This paper reviews recent advances in Bayesian nonparametric techniques for constructing and performing inference in infinite hidden Markov models. We focus on variants of Bayesian nonparametric hidden Markov models that enhance a posteriori state-persistence in particular. This paper also introduces a new Bayesian nonparametric framework for generating left-to-right and other structured, explicit-duration infinite hidden Markov models that we call the infinite structured hidden semi-Markov m...

  2. Sexual Harrassment: A Hidden Problem.

    Science.gov (United States)

    Sandler, Bernice R.; And Others

    1981-01-01

    The hidden but serious problem of sexual harassment of students and employees by college faculty is discussed, some statistics are given, and legal and court opinions outlined. Harassment as a violation of Title IX is analyzed, and implications for institutional action to curb it are outlined. (MSE)

  3. The Hidden Dimensions of Databases.

    Science.gov (United States)

    Jacso, Peter

    1994-01-01

    Discusses methods of evaluating commercial online databases and provides examples that illustrate their hidden dimensions. Topics addressed include size, including the number of records or the number of titles; the number of years covered; and the frequency of updates. Comparisons of Readers' Guide Abstracts and Magazine Article Summaries are…

  4. Stochastic Analysis of Exit-Fluid Temperature Time-Series Data from the TAG Hydrothermal Mound: Events, States, and Hidden Markov Models

    Science.gov (United States)

    Reves-Sohn, R.; Humphris, S.; Canales, J.

    2005-12-01

    The TAG hydrothermal mound is a dynamic structure that is continuously growing via mineral deposition, collapsing from gravitational instabilities and anhydrite dissolution, and shaking from frequent seismic activity on the adjacent normal faults. As a result, the sub-surface fluid circulation patterns beneath the mound are continually re-organizing in response to events that close and open flow paths. These characteristics are clearly evident in time series exit-fluid temperature data acquired from June 2003 through July 2004 as part of the Seismicity and Fluid Flow of TAG (STAG) experiment. Twenty one temperature probes were deployed in actively venting cracks across the TAG mound, and temperature measurements were acquired at each site every ~10 minutes. A key insight for understanding the exit-fluid temperature data is that the measurements can be modeled as Markov chains, where each measurement is a random variable drawn from a finite set of probability distributions associated with the hidden states of the system (i.e., Hidden Markov Models). The Markov chain changes states in response to events that can affect multiple probes, but not necessarily in the same way. For example, an event may cause temperatures at one probe to rapidly increase while temperatures at another probe rapidly decrease. The data from many probes can be explained with a two-state Markov chain, with one state corresponding to "crack open" and the second state corresponding to "crack closed", but still other probes require three or more states, possibly in a nested structure. These stochastic models are deepening our understanding of shallow circulation patterns beneath the TAG mound, and we hope to use them to condition subsurface flow models incorporating the relevant physics of permeable flow in fractures and heat flow.

  5. 急诊科药嘱相关隐患原因分析及对策%Analysis and countermeasures of emergency medicine related hidden dangers

    Institute of Scientific and Technical Information of China (English)

    姜艳; 李素玲

    2014-01-01

    Objective To investigate the related problems and countermeasures of emergency medicine pre-scription. Methods The related problems of drug related orders in the second half of 2013 were analyzed,and the cau-ses of the trouble,measures to eliminate the drug hidden dangers were found. Results The hidden danger of drug order was related to doctors unfamiliar with interaction,usage and dosage of drugs,drug administration personnel lack of re-sponsibility. Conclusion Strengthening the verification link in nursing work,the training of medical staff rotation,drug administration responsibility,the training of clinical staff,can reduce the drug related risks,so as to reduce medication errors.%目的:探讨急诊科药嘱相关问题及对策。方法对2013年下半年用药医嘱中的隐患进行分析,发现造成药嘱隐患的原因,寻找消除药嘱隐患的对策。结果隐患药嘱与医生对药物作用、用法、剂量不熟悉,药局人员缺乏责任心有着直接的关系。结论加强护理工作中的核对环节,对轮转医生加强培训,加强药局工作人员的责任心,对临床医护人员加强相关培训,可以减少药嘱相关隐患,从而减少用药错误。

  6. Skyrmions with holography and hidden local symmetry

    International Nuclear Information System (INIS)

    We study baryons as Skyrmions in holographic QCD with D4/D8/D8 multi-D brane system in type IIA superstring theory, and also in the nonlinear sigma model with hidden local symmetry. Comparing these two models, we find that the extra dimension and its nontrivial curvature can largely change the role of (axial) vector mesons for baryons in four-dimensional space-time. In the hidden local symmetry approach, the ρ-meson field as a massive Yang-Mills field has a singular configuration in Skyrmion, which gives a strong repulsion for the baryon as a stabilizer. When the a1 meson is added in this approach, the stability of Skyrmion is lost by the cancellation of ρ and a1 contributions. On the contrary, in holographic QCD, the ρ-meson field does not appear as a massive Yang-Mills field due to the extra dimension and its nontrivial curvature. We show that the ρ-meson field has a regular configuration in Skyrmion, which gives a weak attraction for the baryon in holographic QCD. We argue that Skyrmion with π, ρ, and a1 mesons become stable due to the curved extra dimension and also the presence of the Skyrme term in holographic QCD. From this result, we also discuss the features of our truncated-resonance analysis on baryon properties with π and ρ mesons below the cutoff scale MKK∼1 GeV in holographic QCD, which is compared with other 5D instanton analysis.

  7. Some Specification Tests of Uncovered Interest Parity

    OpenAIRE

    Ian D. McAVINCHEY; Ronald MacDONALD

    1990-01-01

    Exchange rate theory has recently been concerned with versions of the uncovered interest rate parity (UIP) condition, as an alternative to purchasing power parity. The UIP condition is examined, for the U.S. Dollar, the Deutschemark, the Yen, and the Swiss Franc all against the Pound Sterling, using dynamic specification tests based on residual from the LUS and OLS classes, and selected error orthogonality tests. Market errors for one currency may have an information role for other currencies...

  8. Lead exposure at uncovered outdoor firing ranges

    Energy Technology Data Exchange (ETDEWEB)

    Goldberg, R.L.; Hicks, A.M.; O' Leary, L.M.; London, S. (University of Southern California School of Medicine, Los Angeles (USA))

    1991-06-01

    Excessive lead exposure in shooting instructors at indoor firing ranges and covered outdoor firing ranges has been documented. The City of Los Angeles assessed exposure of its full-time shooting instructors at uncovered outdoor ranges via air monitoring and blood lead-level measurements. Results of these tests revealed that significant lead exposure and absorption can occur at outdoor firing ranges. The use of copper-jacketed ammunition may decrease air lead levels and decrease lead absorption by range instructors.

  9. 'Mystery shoppers' can uncover ED weaknesses.

    Science.gov (United States)

    2006-12-01

    One veteran "mystery shopper" has uncovered several common ED practices that can hurt patient satisfaction. You can learn from her observations to improve your ED's customer service: Be sure to let all of your patients know how long they might expect to wait before seeing a doctor. Wash your hands where the patient can see you, so they can be confident you are practicing good hygiene. Clearly explain all forms and discharge instructions to help ensure patient compliance. PMID:17209484

  10. Uncovering student ideas in physical science

    CERN Document Server

    Keeley, Page

    2014-01-01

    If you and your students can't get enough of a good thing, Volume 2 of Uncovering Student Ideas in Physical Science is just what you need. The book offers 39 new formative assessment probes, this time with a focus on electric charge, electric current, and magnets and electromagnetism. It can help you do everything from demystify electromagnetic fields to explain the real reason balloons stick to the wall after you rub them on your hair.

  11. How Hidden are Hidden Processes? A Primer on Crypticity and Entropy Convergence

    CERN Document Server

    Mahoney, John R; James, Ryan G; Crutchfield, James P

    2011-01-01

    We investigate a stationary process's crypticity---a measure of the difference between its hidden state information and its observed information---using the causal states of computational mechanics. Here, we motivate crypticity and cryptic order as physically meaningful quantities that monitor how hidden a hidden process is. This is done by recasting previous results on the convergence of block entropy and block-state entropy in a geometric setting, one that is more intuitive and that leads to a number of new results. For example, we connect crypticity to how an observer synchronizes to a process. We show that the block-causal-state entropy is a convex function of block length. We give a complete analysis of spin chains. We present a classification scheme that surveys stationary processes in terms of their possible cryptic and Markov orders. We illustrate related entropy convergence behaviors using a new form of foliated information diagram. Finally, along the way, we provide a variety of interpretations of c...

  12. How hidden are hidden processes? A primer on crypticity and entropy convergence

    Science.gov (United States)

    Mahoney, John R.; Ellison, Christopher J.; James, Ryan G.; Crutchfield, James P.

    2011-09-01

    We investigate a stationary process's crypticity—a measure of the difference between its hidden state information and its observed information—using the causal states of computational mechanics. Here, we motivate crypticity and cryptic order as physically meaningful quantities that monitor how hidden a hidden process is. This is done by recasting previous results on the convergence of block entropy and block-state entropy in a geometric setting, one that is more intuitive and that leads to a number of new results. For example, we connect crypticity to how an observer synchronizes to a process. We show that the block-causal-state entropy is a convex function of block length. We give a complete analysis of spin chains. We present a classification scheme that surveys stationary processes in terms of their possible cryptic and Markov orders. We illustrate related entropy convergence behaviors using a new form of foliated information diagram. Finally, along the way, we provide a variety of interpretations of crypticity and cryptic order to establish their naturalness and pervasiveness. This is also a first step in developing applications in spatially extended and network dynamical systems.

  13. Nonintentional behavioural responses to psi : hidden targets and hidden observers

    OpenAIRE

    Anderson, Mary-Jane Charlotte

    2012-01-01

    Psi is the phenomenon of apparently responding to or receiving information by means other than the recognised senses. Psi information may influence human behaviour, without the individual intending this or even being aware of it. This thesis seeks to investigate nonintentional behavioural responses to psi. We present five empirical studies that investigated nonintentional behavioural responses to psi information. In each study, the psi information was hidden from participants, ...

  14. Parameter estimation of hidden periodic model in random fields

    Institute of Scientific and Technical Information of China (English)

    何书元

    1999-01-01

    Two-dimensional hidden periodic model is an important model in random fields. The model is used in the field of two-dimensional signal processing, prediction and spectral analysis. A method of estimating the parameters for the model is designed. The strong consistency of the estimators is proved.

  15. Characterization of prokaryotic and eukaryotic promoters using hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Anders Gorm; Baldi, P.; Chauvin, Y.;

    1996-01-01

    In this paper we utilize hidden Markov models (HMMs) and information theory to analyze prokaryotic and eukaryotic promoters. We perform this analysis with special emphasis on the fact that promoters are divided into a number of different classes, depending on which polymerase-associated factors...

  16. A Newtonian Hidden Variable Theory

    CERN Document Server

    Galvan, B

    2004-01-01

    A new hidden variable theory is proposed, according to which particles follows definite trajectories, as in Bohmian Mechanics or Nelson's stochastic mechanics; in the new theory, however, the trajectories are classical, i.e. Newtonian. This result is obtained by developing the following concepts: (i) the essential elements of a hidden variable theory are a set of trajectories and a measure defined on it; the Newtonian HCT will be defined by giving these two elements. (ii) The universal wave function has a tree structure, whose branches are generated by the measurement processes and are spatially disjoined. (iii) The branches have a classical structure, i.e. classical paths go along them; this property derives from the fact that the paths close to the classical ones give the main contribution to the Feynman propagator. (iv) Classical trajectories can give rise to quantum phenomena, like for instance the interference phenomena of the two-slit experiment, by violating the so called Independence Assumption, which...

  17. Hidden Symmetries in Simple Graphs

    Directory of Open Access Journals (Sweden)

    Allen D. Parks

    2012-03-01

    Full Text Available It is shown that each element s in the normalizer of the automorphism group Aut(G of a simple graph G with labeled vertex set V is an Aut(G invariant isomorphism between G and the graph obtained from G by the s permutation of V—i.e., s is a hidden permutation symmetry of G. A simple example illustrates the theory and the applied notion of system robustness for reconfiguration under symmetry constraint (RUSC is introduced.

  18. Analysis of Hidden Danger in Farmer’s Rights and Interests during Farmland Transfer——An Evaluation of Rights Safeguarding Effect of Farmland Transfer Contract

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Taking Shuangliu County,Chengdu City,China as an example,evaluation index system for the rights protection effects of farmland transfer is established contract from three aspects of basic information,transfer agreement and legal safeguards in the contracts.According to the investigation data,weight of evaluation index is determined by both entropy weight and Analytic Hierarchy Process.Comprehensive index method is used to evaluate the rights protection effects of farmland transfer contract in the flat dam,high hill and low hill in Shuangliu County,Chengdu,China.Result shows that the transfer agreement of farmland and the basic information of contract greatly affect the rights protection effects of farmland transfer contract.There are differences in the five indices of the information of the signature of contract,pricing for payment,time limit for farmland transfer,transfer mode of farmland,and use range of farmland transfer.During the farmland transfer in reality,there are three hidden dangers in farmer’s land rights and interests,which are the ill-formed transfer behavior,the relatively low income of farmers from farmland transfer,and the quality decline of farmland and difficult full reclamation in transfer period.Based on the evaluation result and investigation data,countermeasures are put forward to improve the rights protection effects of farmland transfer contract.

  19. The Consensus String Problem and the Complexity of Comparing Hidden Markov Models

    DEFF Research Database (Denmark)

    Lyngsø, Rune Bang; Pedersen, Christian Nørgaard Storm

    2002-01-01

    The basic theory of hidden Markov models was developed and applied to problems in speech recognition in the late 1960s, and has since then been applied to numerous problems, e.g. biological sequence analysis. Most applications of hidden Markov models are based on efficient algorithms for computing...... the probability of generating a given string, or computing the most likely path generating a given string. In this paper we consider the problem of computing the most likely string, or consensus string, generated by a given model, and its implications on the complexity of comparing hidden Markov...... models. We show that computing the consensus string, and approximating its probability within any constant factor, is NP-hard, and that the same holds for the closely related labeling problem for class hidden Markov models. Furthermore, we establish the NP-hardness of comparing two hidden Markov models...

  20. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  1. Review of hidden carbon emissions, trade, and labor income share in China, 2001–2011

    International Nuclear Information System (INIS)

    Coordinated development between the economy and the environment is currently one of the most important issues in China. By establishing models concerning labor income share and hidden carbon emissions, and taking trade as the link in their relationship, this study puts forward the scale effects, technological effects, and structural effects that relate to labor income share under the function of trade. We then establish multi-index and multi-indicator constitutive (MIMIC) equation to measure the ratio of hidden carbon emissions to total emissions, which is further considered the basis of the measurement model. Results of regression analysis carried out on labor income share show that hidden carbon emissions do have a positive effect on labor income share. In the meantime, we also prove that under scale effects, technological effects, and the structural effects of trade, hidden carbon emissions affect labor income shares in different directions. Our conclusions and policy implications are obtained from the calculated results. - Highlights: • This study establishes models concerning labor income share and hidden carbon emissions. • MIMIC is established to measure the ratio of hidden carbon emissions to total discharge. • Hidden carbon emissions have a positive effect on labor income share. • Hidden carbon emissions have various effects on the labor income share

  2. Data-driven security analysis, visualization and dashboards

    CERN Document Server

    Jacobs, Jay

    2014-01-01

    Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and ma

  3. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  4. Von Neumann's `No Hidden Variables' Proof: A Re-Appraisal

    Science.gov (United States)

    Bub, Jeffrey

    2010-10-01

    Since the analysis by John Bell in 1965, the consensus in the literature is that von Neumann’s ‘no hidden variables’ proof fails to exclude any significant class of hidden variables. Bell raised the question whether it could be shown that any hidden variable theory would have to be nonlocal, and in this sense ‘like Bohm’s theory.’ His seminal result provides a positive answer to the question. I argue that Bell’s analysis misconstrues von Neumann’s argument. What von Neumann proved was the impossibility of recovering the quantum probabilities from a hidden variable theory of dispersion free (deterministic) states in which the quantum observables are represented as the ‘beables’ of the theory, to use Bell’s term. That is, the quantum probabilities could not reflect the distribution of pre-measurement values of beables, but would have to be derived in some other way, e.g., as in Bohm’s theory, where the probabilities are an artefact of a dynamical process that is not in fact a measurement of any beable of the system.

  5. Resources of learning through hidden curriculum: Iranian nursing students’ perspective

    Science.gov (United States)

    Karimi, Zohreh; Ashktorab, Tahereh; Mohammadi, Eesa; Abedi, Heidarali; Zarea, Kourosh

    2015-01-01

    Background: Students tend to internalize and perpetuate the patterns of behavior and the values surrounding them. Review of literature showed that there are several student learning sources through the hidden curriculum, but they have not been identified in nursing yet. Hence, the purpose of this study is explanation of learning resources in the hidden curriculum in the view of baccalaureate nursing students. Materials and Methods: This qualitative study was carried out in 2012 with the participation of 32 baccalaureate nursing students in Nursing and Midwifery College of Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran by purposeful sampling strategies. Data were collected by semi-structured interviews and continued to the level of data saturation and themes’ emergence. Data analysis was performed through inductive content analysis method. Result: “Instructor as the unique learning element,” “various learning resources in the clinical setting,” and “instructive nature of the education environment” were extracted as the main themes, each of which incorporated some categories. Conclusion: Baccalaureate undergraduate nursing students learnt the hidden curriculum by the resources such as instructors, resources existing in the clinical setting, and the university campus. Therefore, more research is recommended for the identification of other resources. In order to promote positive messages and reduce the negative messages of the hidden curricula running at academic and clinical settings, nursing educators and nurses need to learn more about this issue in the nursing profession. PMID:26430684

  6. Superluminal influences, hidden variables, and signaling

    OpenAIRE

    Scarani, Valerio; Gisin, Nicolas

    2001-01-01

    We consider alternative models to quantum mechanics, that have been proposed in the recent years in order to explain the EPR correlations between two particles. These models allow in principle local hidden variables produced at the source, and some superluminal "hidden communication" (or "influences") to reproduce the non-local correlations. Moving to the case of three particles, we show that these alternative models lead to signaling when "hidden communication" alone is considered as the ori...

  7. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  8. Environmental Shotgun Sequencing: Its Potential and Challenges for Studying the Hidden World of Microbes

    OpenAIRE

    Eisen, Jonathan A.

    2007-01-01

    Environmental shotgun sequencing promises to reveal novel and fundamental insights into the hidden world of microbes, but the complexity of analysis required to realize this potential poses unique interdisciplinary challenges.

  9. Hidden variables: the resonance factor

    Science.gov (United States)

    Brooks, Juliana H. J.

    2009-08-01

    In 1900 Max Karl Planck performed his famous black-body radiation work which sparked the quantum revolution. Re-examination of that work has revealed hidden variables, consistent with Einstein's famous sentiment that quantum mechanics is incomplete due to the existence of "hidden variables". The recent discovery of these previously hidden variables, which have been missing from foundational equations for more than one hundred years, has important implications for theoretical, experimental and applied sciences and technologies. Planck attempted to integrate the new "resonant Hertzian (electromagnetic) waves", with existing Helmholtz theories on energy and thermodynamics. In his famous January 1901, paper on black-body radiation, Planck described two significant hypotheses - his well known Quantum Hypothesis, and his more obscure Resonance Hypothesis. Few scientists today are aware that Planck hypothesized resonant electromagnetic energy as a form of non-thermal energy available to perform work on a molecular basis, and that Planck's Resonance Hypothesis bridged the gap between classical Helmholtz energy state dynamics of the bulk macrostate, and energy state dynamics of the molecular microstate. Since the black-body experimental data involved only a thermal effect and not a resonant effect, Planck excluded the resonant state in his black-body derivation. He calculated Boltzmann's constant "kB" using completely thermal/entropic data, arriving at a value of 1.38 ×10-23 J K-1 per molecule, representing the internal energy of a molecule under completely thermal conditions. He further hypothesized, however, that if resonant energy was present in a system, the resonant energy would be "free to be converted into work". Planck seems to have been caught up in the events of the quantum revolution and never returned to his Resonance Hypothesis. As a result, a mathematical foundation for resonance dynamics was never completed. Boltzmann's constant was adopted into

  10. Quantum computation and hidden variables

    Science.gov (United States)

    Aristov, V. V.; Nikulov, A. V.

    2008-03-01

    Many physicists limit oneself to an instrumentalist description of quantum phenomena and ignore the problems of foundation and interpretation of quantum mechanics. This instrumentalist approach results to "specialization barbarism" and mass delusion concerning the problem, how a quantum computer can be made. The idea of quantum computation can be described within the limits of quantum formalism. But in order to understand how this idea can be put into practice one should realize the question: "What could the quantum formalism describe?", in spite of the absence of an universally recognized answer. Only a realization of this question and the undecided problem of quantum foundations allows to see in which quantum systems the superposition and EPR correlation could be expected. Because of the "specialization barbarism" many authors are sure that Bell proved full impossibility of any hidden-variables interpretation. Therefore it is important to emphasize that in reality Bell has restricted to validity limits of the no-hidden-variables proof and has shown that two-state quantum system can be described by hidden variables. The later means that no experimental result obtained on two-state quantum system can prove the existence of superposition and violation of the realism. One should not assume before unambiguous experimental evidence that any two-state quantum system is quantum bit. No experimental evidence of superposition of macroscopically distinct quantum states and of a quantum bit on base of superconductor structure was obtained for the present. Moreover same experimental results can not be described in the limits of the quantum formalism.

  11. Hidden symmetry in quantum nanostructures

    International Nuclear Information System (INIS)

    Full text: (author)The theoretical investigation of the hidden symmetries influence on the optical properties of the quantum nanostructures is presented. The problems connected with the parabolic approximation of the confinement potential of the system, as well as two-dimensional Coulomb problem on the character of optical transitions in semiconductor nanostructures are discussed. In particular excitonic absorption in quantum filma and character of arrangement of absorption peak depending on the principal quantum number of the two-dimensional Coulombic problem is also discussed

  12. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  13. Supersymmetric leptogenesis with a light hidden sector

    International Nuclear Information System (INIS)

    Supersymmetric scenarios incorporating thermal leptogenesis as the origin of the observed matter-antimatter asymmetry generically predict abundances of the primordial elements which are in conflict with observations. In this paper we propose a simple way to circumvent this tension and accommodate naturally thermal leptogenesis and primordial nucleosynthesis. We postulate the existence of a light hidden sector, coupled very weakly to the Minimal Supersymmetric Standard Model, which opens up new decay channels for the next-to-lightest supersymmetric particle, thus diluting its abundance during nucleosynthesis. We present a general model-independent analysis of this mechanism as well as two concrete realizations, and describe the relevant cosmological and astrophysical bounds and implications for this dark matter scenario. Possible experimental signatures at colliders and in cosmic-ray observations are also discussed

  14. Specialized Hidden Markov Model Databases for Microbial Genomics

    OpenAIRE

    Martin Gollery

    2003-01-01

    As hidden Markov models (HMMs) become increasingly more important in the analysis of biological sequences, so too have databases of HMMs expanded in size, number and importance. While the standard paradigm a short while ago was the analysis of one or a few sequences at a time, it has now become standard procedure to submit an entire microbial genome. In the future, it will be common to submit large groups of completed genomes to run simultaneously against a dozen public databas...

  15. Hidden scale invariance of metals

    Science.gov (United States)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.; Pedersen, Ulf R.

    2015-11-01

    Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general "hidden" scale invariance of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant inverse power-law (IPL) pair interactions. However, crystal packings of several transition metals (V, Cr, Mn, Fe, Nb, Mo, Ta, W, and Hg), most post-transition metals (Ga, In, Sn, and Tl), and the metalloids Si and Ge cannot be explained by the IPL assumption. The virial-energy correlation coefficients of iron and phosphorous are shown to increase at elevated pressures. Finally, we discuss how scale invariance explains the Grüneisen equation of state and a number of well-known empirical melting and freezing rules.

  16. Hepatitis C virus host cell interactions uncovered

    DEFF Research Database (Denmark)

    Gottwein, Judith; Bukh, Jens

    2007-01-01

      Insights into virus-host cell interactions as uncovered by Randall et al. (1) in a recent issue of PNAS further our understanding of the hepatitis C virus (HCV) life cycle, persistence, and pathogenesis and might lead to the identification of new therapeutic targets. HCV persistently infects 180...... million individuals worldwide, causing chronic hepatitis, liver cirrhosis, and hepatocellular carcinoma. The only approved treatment, combination therapy with IFN- and ribavirin, targets cellular pathways (2); however, a sustained virologic response is achieved only in approximately half of the patients...... treated. Therefore, there is a pressing need for the identification of novel drugs against hepatitis C. Although most research focuses on the development of HCV-specific antivirals, such as protease and polymerase inhibitors (3), cellular targets could be pursued and might allow the development of broad...

  17. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  18. Aharonov-Bohm Effect and Hidden Photons

    CERN Document Server

    Arias, Paola

    2013-01-01

    Signs of hypothetical light gauge bosons from a hidden sector may appear in Aharonov-Bohm-like experiments. The absence of signal in carried on experiments allow us to set a modest constraint to the mass and coupling constant of these particles. Our findings open the possibility to exploit the leaking of hidden magnetic field in a different setup of experiments.

  19. Building Simple Hidden Markov Models. Classroom Notes

    Science.gov (United States)

    Ching, Wai-Ki; Ng, Michael K.

    2004-01-01

    Hidden Markov models (HMMs) are widely used in bioinformatics, speech recognition and many other areas. This note presents HMMs via the framework of classical Markov chain models. A simple example is given to illustrate the model. An estimation method for the transition probabilities of the hidden states is also discussed.

  20. Fold-change threshold screening: a robust algorithm to unmask hidden gene expression patterns in noisy aggregated transcriptome data.

    Science.gov (United States)

    Hausen, Jonas; Otte, Jens C; Strähle, Uwe; Hammers-Wirtz, Monika; Hollert, Henner; Keiter, Steffen H; Ottermanns, Richard

    2015-11-01

    Transcriptomics is often used to investigate changes in an organism's genetic response to environmental contamination. Data noise can mask the effects of contaminants making it difficult to detect responding genes. Because the number of genes which are found differentially expressed in transcriptome data is often very large, algorithms are needed to reduce the number down to a few robust discriminative genes. We present an algorithm for aggregated analysis of transcriptome data which uses multiple fold-change thresholds (threshold screening) and p values from Bayesian generalized linear model in order to assess the robustness of a gene as a potential indicator for the treatments tested. The algorithm provides a robustness indicator (ROBI) as well as a significance profile, which can be used to assess the statistical significance of a given gene for different fold-change thresholds. Using ROBI, eight discriminative genes were identified from an exemplary dataset (Danio rerio FET treated with chlorpyrifos, methylmercury, and PCB) which could be potential indicators for a given substance. Significance profiles uncovered genetic effects and revealed appropriate fold-change thresholds for single genes or gene clusters. Fold-change threshold screening is a powerful tool for dimensionality reduction and feature selection in transcriptome data, as it effectively reduces the number of detected genes suitable for environmental monitoring. In addition, it is able to unmask patterns in altered genetic expression hidden by data noise and reduces the chance of type II errors, e.g., in environmental screening. PMID:26178833

  1. Heating up the Galaxy with Hidden Photons

    CERN Document Server

    Dubovsky, Sergei

    2015-01-01

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order $10^{-20}$ eV.

  2. A Comparative Study of Hidden Web Crawlers

    Directory of Open Access Journals (Sweden)

    Sonali Gupta

    2014-06-01

    Full Text Available A large amount of data on the WWW remains inaccessible to crawlers of Web search engines because it can only be exposed on demand as users fill out and submit forms. The Hidden web refers to the collection of Web data which can be accessed by the crawler only through an interaction with the Web-based search form and not simply by traversing hyperlinks. Research on Hidden Web has emerged almost a decade ago with the main line being exploring ways to access the content in online databases that are usually hidden behind search forms. The efforts in the area mainly focus on designing hidden Web crawlers that focus on learning forms and filling them with meaningful values. The paper gives an insight into the various Hidden Web crawlers developed for the purpose giving a mention to the advantages and shortcoming of the techniques employed in each.

  3. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  4. Uncovering transcriptional regulation of metabolism by using metabolic network topology

    DEFF Research Database (Denmark)

    Patil, Kiran Raosaheb; Nielsen, Jens

    2005-01-01

    Cellular response to genetic and environmental perturbations is often reflected and/or mediated through changes in the metabolism, because the latter plays a key role in providing Gibbs free energy and precursors for biosynthesis. Such metabolic changes are often exerted through transcriptional...... changes induced by complex regulatory mechanisms coordinating the activity of different metabolic pathways. It is difficult to map such global transcriptional responses by using traditional methods, because many genes in the metabolic network have relatively small changes at their transcription level. We...... therefore developed an algorithm that is based on hypothesis-driven data analysis to uncover the transcriptional regulatory architecture of metabolic networks. By using information on the metabolic network topology from genome-scale metabolic reconstruction, we show that it is possible to reveal patterns in...

  5. DOES UNCOVERED INTEREST RATE PARITY HOLD IN TURKEY?

    Directory of Open Access Journals (Sweden)

    Ozcan Karahan

    2012-01-01

    Full Text Available Most of the earlier empirical studies focusing on developed countries failed to give evidence in favor of the Uncovered Interest Rate Parity (UIP. After intensive financial liberalization processes and mostly preferred free exchange rate regimes, a new area of research starts to involve the investigation whether UIP holds for developing economies differently. Accordingly, we tested the UIP for Turkey’s monthly interest rate and exchange rate data between 2002 and 2011. We run conventional regressions in the form of Ordinary Least Squares (OLS and used a simple Generalized Autoregressive Conditional Heteroskedasticity (GARCH analysis. The empirical results of both methods do not support the validity of UIP for Turkey. Thus, together with most of the earlier empirical studies focusing on developed countries and detecting the invalidity of UIP, we can argue that the experience of Turkey and developed economies are not different.

  6. Uncovering Quantum Correlations with Time-Multiplexed Click Detection

    Science.gov (United States)

    Sperling, J.; Bohmann, M.; Vogel, W.; Harder, G.; Brecht, B.; Ansari, V.; Silberhorn, C.

    2015-07-01

    We report on the implementation of a time-multiplexed click detection scheme to probe quantum correlations between different spatial optical modes. We demonstrate that such measurement setups can uncover nonclassical correlations in multimode light fields even if the single mode reductions are purely classical. The nonclassical character of correlated photon pairs, generated by a parametric down-conversion, is immediately measurable employing the theory of click counting instead of low-intensity approximations with photoelectric detection models. The analysis is based on second- and higher-order moments, which are directly retrieved from the measured click statistics, for relatively high mean photon numbers. No data postprocessing is required to demonstrate the effects of interest with high significance, despite low efficiencies and experimental imperfections. Our approach shows that such novel detection schemes are a reliable and robust way to characterize quantum-correlated light fields for practical applications in quantum communications.

  7. Uncovering Pre-Service Music Teachers' Assumptions of Teaching, Learning, and Music

    Science.gov (United States)

    Bernard, Rhoda

    2009-01-01

    In this study, the author collected narratives from her students in a music teacher education programme. Using narrative analysis, students' assumptions and thoughts about music teaching, music learning and music making were uncovered. Through the presentation of a case study of one student, the author demonstrates some of the ways that the…

  8. Feminist Approaches to Triangulation: Uncovering Subjugated Knowledge and Fostering Social Change in Mixed Methods Research

    Science.gov (United States)

    Hesse-Biber, Sharlene

    2012-01-01

    This article explores the deployment of triangulation in the service of uncovering subjugated knowledge and promoting social change for women and other oppressed groups. Feminist approaches to mixed methods praxis create a tight link between the research problem and the research design. An analysis of selected case studies of feminist praxis…

  9. Called to respond: The potential of unveiling hiddens

    Directory of Open Access Journals (Sweden)

    Alison L Black

    2014-12-01

    Full Text Available Interested in exploring how personal stories and aesthetic modes of representing experiences can nudge open academic and educational spaces, this article/collection of particles seeks to document our encounters of being affected and called to respond to things the other has written and represented. As a way of engaging with questions about what research and research data might be and become, our attention has been drawn to stories and images from our lives that we have not shaken off – and to how, as we have opened these to the other, making once private moments public, our hiddens have morphed tenderly into a shared knowing and being. As we have acted on the call we have felt to respond we have found ourselves entering spaces of collaboration, communion, contemplation, and conversation – spaces illuminated by what we have not been able to – and cannot – set aside. Using visual and poetic materials we explore heartfelt and heartbroken aspects of our educational worlds and lives, to be present with each other and our (reemerging personal and professional meanings. We see the shared body (of work, of writing, of image that develops from the taking of brave steps and the risky slipping off of academic masks and language, as a manifestation of the trusted and nurturing spaces that can be generated through collaborative opportunities to gather together. These steps towards unveiling hiddens are producing in us and of us a friendship, fluency, and fluidity as we write new ways of becoming. In turn, we hope the uncovering and revealing of our dialogue in the public gathering of this journal might supports readers’ telling of their own life stories through what calls them to respond.

  10. Stochastic thermodynamics of hidden pumps

    Science.gov (United States)

    Esposito, Massimiliano; Parrondo, Juan M. R.

    2015-05-01

    We show that a reversible pumping mechanism operating between two states of a kinetic network can give rise to Poisson transitions between these two states. An external observer, for whom the pumping mechanism is not accessible, will observe a Markov chain satisfying local detailed balance with an emerging effective force induced by the hidden pump. Due to the reversibility of the pump, the actual entropy production turns out to be lower than the coarse-grained entropy production estimated from the flows and affinities of the resulting Markov chain. Moreover, in presence of a large time scale separation between the fast-pumping dynamics and the slow-network dynamics, a finite current with zero dissipation may be produced. We make use of these general results to build a synthetase-like kinetic scheme able to reversibly produce high free-energy molecules at a finite rate and a rotatory motor achieving 100% efficiency at finite speed.

  11. Quantum computation and hidden variables

    CERN Document Server

    Aristov, V V

    2010-01-01

    Many physicists limit oneself to an instrumentalist description of quantum phenomena and ignore the problems of foundation and interpretation of quantum mechanics. This instrumentalist approach results to "specialization barbarism" and mass delusion concerning the problem, how a quantum computer can be made. The idea of quantum computation can be described within the limits of quantum formalism. But in order to understand how this idea can be put into practice one should realize the question: "What could the quantum formalism describe?", in spite of the absence of an universally recognized answer. Only a realization of this question and the undecided problem of quantum foundations allows to see in which quantum systems the superposition and EPR correlation could be expected. Because of the "specialization barbarism" many authors are sure that Bell proved full impossibility of any hidden-variables interpretation. Therefore it is important to emphasize that in reality Bell has restricted to validity limits of t...

  12. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.;

    2015-01-01

    of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...... available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...

  13. 大型露天停车场雷电灾害分析与防护措施的研究%Lightning Hazard Analysis and Protective Measures of Large Uncovered Parking

    Institute of Scientific and Technical Information of China (English)

    赵涛; 李斐

    2014-01-01

    近年来,由于气候变化使强对流性天气不断增多,雷击事件频发。特别是空旷地区防雷设施不完善,防雷设施的缺乏,致使雷击造成人员伤亡和经济损失的事故时有发生。通过武汉经济技术开发区神龙汽车公司的露天停车场两次成品车遭受雷击事故的实地调查,就该村地理位置、气象资料、雷灾产生的原因进行了分析,提出了相应的雷电防护对策及建议。%In recent years, the climate change makes strong convective weather increasing and frequent lightning events. Especially in open areas, the lightning protection facilities in open areas are imperfect, even lack of lightning protection facilities, so the lightning casualties and economic losses occurred often. Through the fieldwork of the two lightning accident of finished car in uncovered parking of Shenlong Car company in Wuhan Economic and Technological Development Zone, the paper analyzes the location, meteorological data and the reasons of lightning disaster, and puts forward the corresponding countermeasures and suggestions for lightning protection.

  14. Hidden Markov Modeling for humpback whale (Megaptera novaeangliae) call classification

    OpenAIRE

    PACE, Federica; White, Paul; Adam, Olivier

    2012-01-01

    International audience This study proposes a new approach for the classification of the calls detected in the songs with the use of Hidden Markov Models (HMMs) based on the concept of subunits as building blocks. HMMs have been used once before for such task but in an unsupervised algorithm with promising results, and they are used extensively in speech recognition and in few bioacoustics studies. Their flexibility suggests that they may be suitable for the analysis of the varied repertoir...

  15. Variational Infinite Hidden Conditional Random Fields.

    Science.gov (United States)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-09-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of hidden states, which rids us not only of the necessity to specify a priori a fixed number of hidden states available but also of the problem of overfitting. Markov chain Monte Carlo (MCMC) sampling algorithms are often employed for inference in such models. However, convergence of such algorithms is rather difficult to verify, and as the complexity of the task at hand increases the computational cost of such algorithms often becomes prohibitive. These limitations can be overcome by variational techniques. In this paper, we present a generalized framework for infinite HCRF models, and a novel variational inference approach on a model based on coupled Dirichlet Process Mixtures, the HCRF-DPM. We show that the variational HCRF-DPM is able to converge to a correct number of represented hidden states, and performs as well as the best parametric HCRFs-chosen via cross-validation-for the difficult tasks of recognizing instances of agreement, disagreement, and pain in audiovisual sequences. PMID:26353136

  16. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  17. New hidden symmetries in 2-dimensional models

    International Nuclear Information System (INIS)

    In an attempt to derive the hidden symmetries for some integrable 2-dimensional models by considering the invariances of the corresponding linearization systems and the Riemann-Hilbert transformations, we arrive at a new ''sub''-algebra of the ordinary Kac-Moody algebra which represents the hidden symmetry for for example the sine-Gordon theory. A similar ''sub''-algebra is found for the Liouville model. These new algebras differ from the ordinary ones in having a different structure according to whether the grading is even or odd. We describe a new systematic way of finding such hidden symmetries from general linearization systems. (orig.)

  18. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  19. Hidden photons with Kaluza-Klein towers

    CERN Document Server

    Jaeckel, Joerg; Wallace, Chris J

    2014-01-01

    One of the simplest extensions of the Standard Model (SM) is an extra U(1) gauge group under which SM matter does not carry any charge. The associated boson -- the hidden photon -- then interacts via kinetic mixing with the ordinary photon. Such hidden photons arise naturally in UV extensions such as string theory, often accompanied by the presence of extra spatial dimensions. In this note we investigate a toy scenario where the hidden photon extends into these extra dimensions. Interaction via kinetic mixing is observable only if the hidden photon is massive. In four dimensions this mass needs to be generated via a Higgs or Stueckelberg mechanism. However, in a situation with compactified extra dimensions there automatically exist massive Kaluza-Klein modes which make the interaction observable. We present phenomenological constraints for our toy model. This example demonstrates that the additional particles arising in a more complete theory can have significant effects on the phenomenology.

  20. Fermion zero modes and 'hidden' symmetry

    International Nuclear Information System (INIS)

    The origin of the fermion zero modes in the soliton fields is investigated in 2- and 4-dimensional models and a connection is found with the existence of 'hidden' supersymmetry properties of the Lagrangians. (Auth.)

  1. Alleviating hidden hunger. Approaches that work

    International Nuclear Information System (INIS)

    The world has come a long way in understanding the nature, magnitude and range of solutions to micronutrient malnutrition - often called 'hidden hunger'. The most sustainable solutions - that is those that are likely to be maintained in the long term - almost surely will include food-based approaches including diet diversity, food fortification and biofortification. Food fortification and biofortification could be some of the most cost-effective of all public health interventions and thus within the economic reach of even the world's poorest. In order to implement them in a sustainable manner, a combination of technical, operational, economic, behavioural and political factors need to be addressed. In some ways the technological issues are the easiest. Because of attention to research, we now have a variety of ways for both single and multiple micronutrients to reach the target population. We also know what is needed in order to ensure delivery systems. The key factor for continued success in reducing micronutrient malnutrition through fortification is a political commitment at the national and international level and creating effective public-private partnerships at the national level. The payoff for eliminating hidden hunger through nutrient fortification is enormous and few other public health interventions offer such a promising health, nutrition and economic success story. Nuclear and isotopic techniques are valuable tools in helping to meet the multifaceted challenges posed by nutritional disorders affecting the entire human life span (embryonic to elderly). Among the numerous applications available, isotopic techniques are uniquely well suited for targeting and tracking progress in food and nutrition development programmes (See box: How Nutrients are Tracked). These include: use of the stable isotopes of iron (Fe) and zinc (Zn) as a kind of gold standard in studies of their bioavailability from foods; trace element bioavailability and pool sizes for

  2. Estimating hidden semi-Markov chains from discrete sequences.

    OpenAIRE

    Guédon, Yann

    2003-01-01

    International audience This article addresses the estimation of hidden semi-Markov chains from nonstationary discrete sequences. Hidden semi-Markov chains are particularly useful to model the succession of homogeneous zones or segments along sequences. A discrete hidden semi-Markov chain is composed of a nonobservable state process, which is a semi-Markov chain, and a discrete output process. Hidden semi-Markov chains generalize hidden Markov chains and enable the modeling of various durat...

  3. Quantum Money from Hidden Subspaces

    CERN Document Server

    Aaronson, Scott

    2012-01-01

    Forty years ago, Wiesner pointed out that quantum mechanics raises the striking possibility of money that cannot be counterfeited according to the laws of physics. We propose the first quantum money scheme that is (1) public-key, meaning that anyone can verify a banknote as genuine, not only the bank that printed it, and (2) cryptographically secure, under a "classical" hardness assumption that has nothing to do with quantum money. Our scheme is based on hidden subspaces, encoded as the zero-sets of random multivariate polynomials. A main technical advance is to show that the "black-box" version of our scheme, where the polynomials are replaced by classical oracles, is unconditionally secure. Previously, such a result had only been known relative to a quantum oracle (and even there, the proof was never published). Even in Wiesner's original setting -- quantum money that can only be verified by the bank -- we are able to use our techniques to patch a major security hole in Wiesner's scheme. We give the first p...

  4. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  5. A Hidden Pitfall for REDD: Analysis of Power Relation in Participatory Forest Management on Whether It Is an Obstacle or a Reliever on REDD Pathway

    Directory of Open Access Journals (Sweden)

    Angelingis Akwilini Makatta

    2015-01-01

    Full Text Available Power relation among stakeholders is a key concept in collaborative approaches. This study aims to examine the reality of the acclaimed power sharing in Participatory Forest Management (PFM and implication of existing power relation to the national REDD+ programme in Tanzania. The study involved a review of PFM policy and legal supporting documents; meta-analysis of previous studies done at two sites known to have succeeded in PFM; and empirical study at Kolo-Hills forests. Methods used include the meta-analysis of existing literature; Household Questionnaire Survey; Focused Group Discussion; and key person unstructured interviews. Results revealed that a large part of the PFM processes involved power struggle instead of power sharing. REDD+ pilot was perceived to have succeeded in improving PFM only in villages where the majority of the community about 70% experienced higher levels of inclusiveness and power balance with other PFM stakeholders in PFM processes. Power imbalance and power struggle were also noted in the REDD+ project adoption processes. Thus power relations exercised under PFM fall under potential obstacle rather than a reliever to the REDD+ programme. The study recommends reviewing of PFM legal frameworks to strengthen community empowerment for effectiveness of REDD+ on PFM platform.

  6. Stability analysis of networked control systems based on hidden Markov models%基于隐马尔可夫的网络控制系统稳定性分析

    Institute of Scientific and Technical Information of China (English)

    葛愿; 陈其工; 江明; 刘振安

    2008-01-01

    讨论了一类具有随机通信时延的网络控制系统的建模及稳定性分析,其中网络诱导时延受控于一概率分布未知的马尔可夫链,其概率分布可通过Baum-Welch算法计算.基于隐马尔町夫模型理论,将采用状态反馈的闭环网络控制系统建模成跳变线性系统,给出了这类网络控制系统随机稳定的允分条件,并将状态反馈控制器的求解问题转化为线性矩阵不等式的解的问题.最后,通过一个仿真算例说明了上述判定系统稳定性条件的有效性.%The modeling and stability analysis for a kind of networked control systems (NCSs) with random commu-nication delays are discussed. The network-induced delays are considered to be governed by an underlying Markov chain with unknown probability distribution, which can be calculated by using Baum-Welch algorithm. Based on hidden Markov model (HMM) theory, the resulting closed-loop systems are jump linear systems, and the sufficient conditions on the existence of the stabilizing controller are established by solving a set of linear matrix inequalities (LMIs). Finally, a numerical example is given to show the efficiency and feasibility of our proposed approach.

  7. Uncovering the hidden signature of a magmatic recharge at Piton de la Fournaise volcano using small earthquakes

    Science.gov (United States)

    Lengliné, O.; Duputel, Z.; Ferrazzini, V.

    2016-05-01

    We apply a template matching method to detect and locate preeruptive earthquakes at Piton de la Fournaise volcano in 2014 and 2015. This approach enabled the detection of many events and unveiled persistent seismicity features through multiple eruptions. Shallow earthquakes define a ring-shaped structure beneath the main crater. The repetitive occurrence of events along this structure suggests that it corresponds to a preexisting zone of weakness within the edifice. We also show evidence of deep magma transfer in 2015. More than 5000 deep earthquakes define an upward migration immediately followed by the occurrence of shallow events leading to an eruption 20 days later. This suggests the creation of a hydraulic connection between the lower part of the volcanic system and a magma reservoir located near sea level. We can envisage than such replenishments of the shallow reservoir occurred in the past but were undetected because of limited deep earthquake detections.

  8. ENSO informed Drought Forecasting Using Nonhomogeneous Hidden Markov Chain Model

    Science.gov (United States)

    Kwon, H.; Yoo, J.; Kim, T.

    2013-12-01

    The study aims at developing a new scheme to investigate the potential use of ENSO (El Niño/Southern Oscillation) for drought forecasting. In this regard, objective of this study is to extend a previously developed nonhomogeneous hidden Markov chain model (NHMM) to identify climate states associated with drought that can be potentially used to forecast drought conditions using climate information. As a target variable for forecasting, SPI(standardized precipitation index) is mainly utilized. This study collected monthly precipitation data over 56 stations that cover more than 30 years and K-means cluster analysis using drought properties was applied to partition regions into mutually exclusive clusters. In this study, six main clusters were distinguished through the regionalization procedure. For each cluster, the NHMM was applied to estimate the transition probability of hidden states as well as drought conditions informed by large scale climate indices (e.g. SOI, Nino1.2, Nino3, Nino3.4, MJO and PDO). The NHMM coupled with large scale climate information shows promise as a technique for forecasting drought scenarios. A more detailed explanation of large scale climate patterns associated with the identified hidden states will be provided with anomaly composites of SSTs and SLPs. Acknowledgement This research was supported by a grant(11CTIPC02) from Construction Technology Innovation Program (CTIP) funded by Ministry of Land, Transport and Maritime Affairs of Korean government.

  9. Grammatical-Restrained Hidden Conditional Random Fields for Bioinformatics applications

    Directory of Open Access Journals (Sweden)

    Martelli Pier

    2009-10-01

    Full Text Available Abstract Background Discriminative models are designed to naturally address classification tasks. However, some applications require the inclusion of grammar rules, and in these cases generative models, such as Hidden Markov Models (HMMs and Stochastic Grammars, are routinely applied. Results We introduce Grammatical-Restrained Hidden Conditional Random Fields (GRHCRFs as an extension of Hidden Conditional Random Fields (HCRFs. GRHCRFs while preserving the discriminative character of HCRFs, can assign labels in agreement with the production rules of a defined grammar. The main GRHCRF novelty is the possibility of including in HCRFs prior knowledge of the problem by means of a defined grammar. Our current implementation allows regular grammar rules. We test our GRHCRF on a typical biosequence labeling problem: the prediction of the topology of Prokaryotic outer-membrane proteins. Conclusion We show that in a typical biosequence labeling problem the GRHCRF performs better than CRF models of the same complexity, indicating that GRHCRFs can be useful tools for biosequence analysis applications. Availability GRHCRF software is available under GPLv3 licence at the website http://www.biocomp.unibo.it/~savojard/biocrf-0.9.tar.gz.

  10. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  11. Hidden aspects of the Structural Theory of chemistry: The MC-QTAIM analysis reveals "alchemical" transformation from a triatomic to a diatomic structure

    CERN Document Server

    Goli, Mohammad

    2014-01-01

    The structural theory of chemistry introduces chemical (molecular) structure as a combination of relative arrangement and bonding patterns of atoms in molecule; nowadays the structure of atoms in molecules is derived from the topological analysis of the quantum theory of atoms in molecules (QTAIM). In this context a molecular structure is varied just by large geometrical variations and concomitant reorganization of electronic structure that are usually taken place in chemical reactions or under extreme hydrostatic pressures. In this report a new mode of structural variation is introduced within the context of the newly proposed multi-component QTAIM (MC-QTAIM) that originates from mass variation of nuclei. Accordingly, XCN and CNX series of species are introduced where X stands for a quantum particle with a unit of positive charge and a variable mass that is varied in discrete steps between the masses of proton and positron. Ab initio non-Born-Oppenheimer (non-BO) calculations are done on both series of speci...

  12. An analysis of England's nursing policy on compassion and the 6Cs: the hidden presence of M. Simone Roach's model of caring.

    Science.gov (United States)

    Bradshaw, Ann

    2016-03-01

    In 2012, chief nursing officers (CNO) in England published a policy on compassion in response to serious criticisms of patients' care. Because their objective is fundamentally to shape nursing, this study argues, following Popper, that the policy should be analysed. An appraisal tool, developed from Popper, Gadamer, Jauss and Thiselton, is the framework for this analysis. The CNO policy document identified six values and behaviours, termed '6Cs', required by all nurses, midwives and care staff. The document contains no data, references or acknowledgements, but is similar to the 6Cs defined by the Canadian nursing nun, Sister M. Simone Roach, in her theory of caring published 30 years earlier. Roach considered caring and the components of it, including compassion, to be moral virtues, an inner motivation to care. This study suggests that without explicit reference to Roach's ideas, and her underlying theoretical base, the CNO requirement has the effect of turning virtues into commodities and a form of external control, described by Ritzer as a McDonaldized dehumanization. This study, which has international relevance beyond England and the UK, suggests that the CNO revise their policy by acknowledging Roach's 6Cs and openly discuss the implications of her work for their policy. PMID:26059388

  13. Uncovering transcriptional interactions via an adaptive fuzzy logic approach

    Directory of Open Access Journals (Sweden)

    Chen Chung-Ming

    2009-12-01

    Full Text Available Abstract Background To date, only a limited number of transcriptional regulatory interactions have been uncovered. In a pilot study integrating sequence data with microarray data, a position weight matrix (PWM performed poorly in inferring transcriptional interactions (TIs, which represent physical interactions between transcription factors (TF and upstream sequences of target genes. Inferring a TI means that the promoter sequence of a target is inferred to match the consensus sequence motifs of a potential TF, and their interaction type such as AT or RT is also predicted. Thus, a robust PWM (rPWM was developed to search for consensus sequence motifs. In addition to rPWM, one feature extracted from ChIP-chip data was incorporated to identify potential TIs under specific conditions. An interaction type classifier was assembled to predict activation/repression of potential TIs using microarray data. This approach, combining an adaptive (learning fuzzy inference system and an interaction type classifier to predict transcriptional regulatory networks, was named AdaFuzzy. Results AdaFuzzy was applied to predict TIs using real genomics data from Saccharomyces cerevisiae. Following one of the latest advances in predicting TIs, constrained probabilistic sparse matrix factorization (cPSMF, and using 19 transcription factors (TFs, we compared AdaFuzzy to four well-known approaches using over-representation analysis and gene set enrichment analysis. AdaFuzzy outperformed these four algorithms. Furthermore, AdaFuzzy was shown to perform comparably to 'ChIP-experimental method' in inferring TIs identified by two sets of large scale ChIP-chip data, respectively. AdaFuzzy was also able to classify all predicted TIs into one or more of the four promoter architectures. The results coincided with known promoter architectures in yeast and provided insights into transcriptional regulatory mechanisms. Conclusion AdaFuzzy successfully integrates multiple types of

  14. New hidden beauty molecules predicted by the local hidden gauge approach and heavy quark spin symmetry

    Science.gov (United States)

    Xiao, C. W.; Ozpineci, A.; Oset, E.

    2015-10-01

    Using a coupled channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-meson interaction with hidden beauty. We obtain several new states of isospin I = 0: six bound states, and weakly bound six more possible states which depend on the influence of the coupled channel effects.

  15. Uncovering Research Topics of Academic Communities of Scientific Collaboration Network

    OpenAIRE

    Hongqi Han; Shuo Xu; Jie Gui; Xiaodong Qiao; Lijun Zhu; Han Zhang

    2014-01-01

    In order to improve the quality of applications, such as recommendation or retrieval in knowledge-based service system, it is very helpful to uncover research topics of academic communities in scientific collaboration network (SCN). Previous research mainly focuses on network characteristics measurement and community evolution, but it remains largely understudied on how to uncover research topics of each community. This paper proposes a nonjoint approach, consisting of three simple steps: (1)...

  16. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  17. Macroscopic model for biological fixation and its uncover-ing idea in Chinese Mongolian traditional osteopathy

    Institute of Scientific and Technical Information of China (English)

    ZHAO Namula; LI Xue-en; WANG Mei; HU Da-lai

    2009-01-01

    Splintage external fixation in Chinese Mongolian oste-opathy is a biological macroscopic model. In this model, the ideas of self-life "unity of mind and body" and vital natural "correspondence of nature and human" combine the physi-ological and psychological self-fixation with supplementary external fixation of fracture using small splints. This model implies macroscopic ideas of uncovering fixation and healing: structural stability integrating geometrical "dy-namic" stability with mechanical "dynamic" equilibrium and the stability of state integrating statics with dynamics, and osteoblasts with osteoclasts, and psychological stability in-tegrating closed and open systems of human and nature. These ideas indicate a trend of development in modem osteopathy.

  18. Detecting targets hidden in random forests

    Science.gov (United States)

    Kouritzin, Michael A.; Luo, Dandan; Newton, Fraser; Wu, Biao

    2009-05-01

    Military tanks, cargo or troop carriers, missile carriers or rocket launchers often hide themselves from detection in the forests. This plagues the detection problem of locating these hidden targets. An electro-optic camera mounted on a surveillance aircraft or unmanned aerial vehicle is used to capture the images of the forests with possible hidden targets, e.g., rocket launchers. We consider random forests of longitudinal and latitudinal correlations. Specifically, foliage coverage is encoded with a binary representation (i.e., foliage or no foliage), and is correlated in adjacent regions. We address the detection problem of camouflaged targets hidden in random forests by building memory into the observations. In particular, we propose an efficient algorithm to generate random forests, ground, and camouflage of hidden targets with two dimensional correlations. The observations are a sequence of snapshots consisting of foliage-obscured ground or target. Theoretically, detection is possible because there are subtle differences in the correlations of the ground and camouflage of the rocket launcher. However, these differences are well beyond human perception. To detect the presence of hidden targets automatically, we develop a Markov representation for these sequences and modify the classical filtering equations to allow the Markov chain observation. Particle filters are used to estimate the position of the targets in combination with a novel random weighting technique. Furthermore, we give positive proof-of-concept simulations.

  19. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  20. Influence of Introducing an Additional Hidden Layer on the Character Recognition Capability of a BP Neural Network having One Hidden Layer

    Directory of Open Access Journals (Sweden)

    Vijaypal Singh Dhaka,

    2010-02-01

    Full Text Available Objective of this paper is to study the character recognition capability of feed-forward back-propagation algorithm using more than one hidden layer. This analysis was conducted on 182 different letters from English alphabet. After binarization, these characters were clubbed together to form training patterns for the neural network. Network was trained to learn its behavior by adjusting the connection strengths on every iteration. The conjugate gradient descent of each presented training pattern was calculated to identify the minima on the error surface for each training pattern. xperiments were performed by using one and two hidden layers and the results revealed that as the number of hidden layers is increased, a lower final mean square error is achieved in large number of epochsand the performance of the neural network was observed to be more accurate.

  1. Losartan ameliorates dystrophic epidermolysis bullosa and uncovers new disease mechanisms.

    Science.gov (United States)

    Nyström, Alexander; Thriene, Kerstin; Mittapalli, Venugopal; Kern, Johannes S; Kiritsi, Dimitra; Dengjel, Jörn; Bruckner-Tuderman, Leena

    2015-09-01

    Genetic loss of collagen VII causes recessive dystrophic epidermolysis bullosa (RDEB)-a severe skin fragility disorder associated with lifelong blistering and disabling progressive soft tissue fibrosis. Causative therapies for this complex disorder face major hurdles, and clinical implementation remains elusive. Here, we report an alternative evidence-based approach to ameliorate fibrosis and relieve symptoms in RDEB. Based on the findings that TGF-β activity is elevated in injured RDEB skin, we targeted TGF-β activity with losartan in a preclinical setting. Long-term treatment of RDEB mice efficiently reduced TGF-β signaling in chronically injured forepaws and halted fibrosis and subsequent fusion of the digits. In addition, proteomics analysis of losartan- vs. vehicle-treated RDEB skin uncovered changes in multiple proteins related to tissue inflammation. In line with this, losartan reduced inflammation and diminished TNF-α and IL-6 expression in injured forepaws. Collectively, the data argue that RDEB fibrosis is a consequence of a cascade encompassing tissue damage, TGF-β-mediated inflammation, and matrix remodeling. Inhibition of TGF-β activity limits these unwanted outcomes and thereby substantially ameliorates long-term symptoms. PMID:26194911

  2. Uncovering the Factors behind Comparative Regional Economic Performance: A Dynamic CGE Approach

    OpenAIRE

    James A. Giesecke; John R Madden

    2006-01-01

    Recently a new method has emerged for uncovering the factors driving regional disparities in growth performance. The method involves historical analysis with a multiregional computable general equilibrium model. This paper has three main aims. The first is to demonstrate the capacity of the CGE historical technique to decompose the causes of regional divergence into clearly-specified economic factors. The second is to provide a generic miniature model that can be used as a template for adapti...

  3. Massive hidden photons as lukewarm dark matter

    CERN Document Server

    Postma, Marieke

    2008-01-01

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative.

  4. Massive hidden photons as lukewarm dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Postma, Marieke [Nationaal Inst. voor Kernfysica en Hoge-Energiefysica (NIKHEF), Amsterdam (Netherlands)

    2008-11-15

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  5. Hidden treasures - 50 km points of interests

    Science.gov (United States)

    Lommi, Matias; Kortelainen, Jaana

    2015-04-01

    Tampere is third largest city in Finland and a regional centre. During 70's there occurred several communal mergers. Nowadays this local area has both strong and diversed identity - from wilderness and agricultural fields to high density city living. Outside the city center there are interesting geological points unknown for modern city settlers. There is even a local proverb, "Go abroad to Teisko!". That is the area the Hidden Treasures -student project is focused on. Our school Tammerkoski Upper Secondary School (or Gymnasium) has emphasis on visual arts. We are going to offer our art students scientific and artistic experiences and knowledge about the hidden treasures of Teisko area and involve the Teisko inhabitants into this project. Hidden treasures - Precambrian subduction zone and a volcanism belt with dense bed of gold (Au) and arsenic (As), operating goldmines and quarries of minerals and metamorphic slates. - North of subduction zone a homogenic precambrian magmastone area with quarries, products known as Kuru Grey. - Former ashores of post-glasial Lake Näsijärvi and it's sediments enabled the developing agriculture and sustained settlement. Nowadays these ashores have both scenery and biodiversity values. - Old cattle sheds and dairy buildings made of local granite stones related to cultural stonebuilding inheritance. - Local active community of Kapee, about 100 inhabitants. Students will discover information of these "hidden" phenomena, and rendering this information trough Enviromental Art Method. Final form of this project will be published in several artistic and informative geocaches. These caches are achieved by a GPS-based special Hidden Treasures Cycling Route and by a website guiding people to find these hidden points of interests.

  6. Analysis of the Effect of the Hidden Curriculum in Moral Education on College Students'Core Values%探析高校隐性德育课程对大学生核心价值观的影响

    Institute of Scientific and Technical Information of China (English)

    何斌

    2014-01-01

    高校隐性德育课程中的隐性物质文化、精神文化、制度文化、网络文化,对于当代中国大学生核心价值观的形成发展有着潜移默化的影响作用,需要我们重视隐性德育课程的建设,深化高校思想政治理论课程改革。%Moral education hidden curriculum in colleges and universities recessive material culture ,spiritual culture ,system cul-ture ,network culture ,have great effect on the formation and development of college students'core values in China ,we need to pay attention to the construction of hidden curriculum in moral education ,deepening the reform of ideological and political theo-ry course in colleges and universities.

  7. The characteristic blue spectra of accretion disks in quasars as uncovered in the infrared.

    Science.gov (United States)

    Kishimoto, Makoto; Antonucci, Robert; Blaes, Omer; Lawrence, Andy; Boisson, Catherine; Albrecht, Marcus; Leipski, Christian

    2008-07-24

    Quasars are thought to be powered by supermassive black holes accreting surrounding gas. Central to this picture is a putative accretion disk which is believed to be the source of the majority of the radiative output. It is well known, however, that the most extensively studied disk model-an optically thick disk which is heated locally by the dissipation of gravitational binding energy-is apparently contradicted by observations in a few major respects. In particular, the model predicts a specific blue spectral shape asymptotically from the visible to the near-infrared, but this is not generally seen in the visible wavelength region where the disk spectrum is observable. A crucial difficulty has been that, towards the infrared, the disk spectrum starts to be hidden under strong, hot dust emission from much larger but hitherto unresolved scales, and thus has essentially been impossible to observe. Here we report observations of polarized light interior to the dust-emitting region that enable us to uncover this near-infrared disk spectrum in several quasars. The revealed spectra show that the near-infrared disk spectrum is indeed as blue as predicted. This indicates that, at least for the outer near-infrared-emitting radii, the standard picture of the locally heated disk is approximately correct. PMID:18650919

  8. Towards gauge unified, supersymmetric hidden strong dynamics

    OpenAIRE

    Chiang, Cheng-Wei; Sun, Sichun; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also f...

  9. Atlas of solar hidden photon emission

    OpenAIRE

    Redondo, Javier(Arnold Sommerfeld Center, Ludwig-Maximilians-University, Theresienstr. 37, 80333 München, Germany)

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provi...

  10. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  11. Hidden SU(N) Glueball Dark Matter

    OpenAIRE

    Soni, Amarjit; Zhang, Yue(Walter Burke Institute for Theoretical Physics, California Institute of Technology, Pasadena, CA, 91125, U.S.A.)

    2016-01-01

    We investigate the possibility that the dark matter candidate is from a pure non-Abelian gauge theory of the hidden sector, motivated in large part by its elegance and simplicity. The dark matter is the lightest bound state made of the confined gauge fields, the hidden glueball. We point out that this simple setup is capable of providing rich and novel phenomena in the dark sector, especially in the parameter space of large N. They include self-interacting and warm dark matter scenarios, Bose...

  12. A Framework for Incremental Hidden Web Crawler

    Directory of Open Access Journals (Sweden)

    Rosy Madaan

    2010-05-01

    Full Text Available Hidden Web’s broad and relevant coverage of dynamic and high quality contents coupled with the high change frequency of web pages poses a challenge for maintaining and fetching up-to-date information. For thepurpose, it is required to verify whether a web page has been changed or not, which is another challenge. Therefore, a mechanism needs to be introduced for adjusting the time period between two successive revisits based on probability of updation of the web page. In thispaper, architecture is being proposed that introduces a technique to continuously update/refresh the Hidden Web repository.

  13. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  14. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...... networks...

  15. AdS/QCD approach to the scale invariant extension of the standard model with a strongly interacting hidden sector

    OpenAIRE

    Hatanaka, Hisaki(School of Physics, Korea Institute for Advanced Study, Seoul 130-722, Republic of Korea); Jung, Dong-Won; Ko, Pyungwon

    2016-01-01

    In this paper, we revisit a scale-invariant extension of the standard model (SM) with a strongly interacting hidden sector within AdS/QCD approach. Using the AdS/QCD, we reduce the number of input parameters to three, i.e. hidden pion decay constant, hidden pion mass and $\\tan\\beta$ that is defined as the ratio of the vacuum expectation values (VEV) of the singlet scalar field and the SM Higgs boson. As a result, our model has sharp predictability. We perform the phenomenological analysis of ...

  16. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    Peres, Yuval; Quas, Anthony

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  17. 'Hidden' Brain Injury a Challenge for Military Doctors

    Science.gov (United States)

    ... nih.gov/medlineplus/news/fullstory_159316.html 'Hidden' Brain Injury a Challenge for Military Doctors Potentially fatal ... may suffer from a distinctive pattern of "hidden" brain injury, a small study finds. "Blast-related brain ...

  18. Hidden Markov modelling of movement data from fish

    DEFF Research Database (Denmark)

    Pedersen, Martin Wæver

    and application of hidden Markov models (HMMs) for analysis of movement data from sh. The main contributions are represented by six scientific publications. Estimation of animal location from uncertain and possibly indirect observations is the starting point of most movement data analyses. In this work a discrete...... approximated. This furthermore enables accurate probability densities of location to be computed. Finally, the performance of the HMM approach in analysing nonlinear state space models is compared with two alternatives: the AD Model Builder framework and BUGS, which relies on Markov chain Monte Carlo...

  19. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp; Petit, Matthieu

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving...... methods. HMMs with constraints have advantages over traditional ones in terms of more compact expressions as well as opportunities for pruning during Viterbi computations. We exemplify this by an enhancement of a simple prokaryote gene finder given by an HMM....

  20. Nontargeted Analysis Using Ultraperformance Liquid Chromatography-Quadrupole Time-of-Flight Mass Spectrometry Uncovers the Effects of Harvest Season on the Metabolites and Taste Quality of Tea (Camellia sinensis L.).

    Science.gov (United States)

    Dai, Weidong; Qi, Dandan; Yang, Ting; Lv, Haipeng; Guo, Li; Zhang, Yue; Zhu, Yin; Peng, Qunhua; Xie, Dongchao; Tan, Junfeng; Lin, Zhi

    2015-11-11

    The chemical composition and taste quality of tea fluctuate seasonally. However, the compounds responsible for the seasonal variation of metabolic pattern and taste quality are far from clear. This study compared the metabolite profiles of green teas of nine varieties that were plucked in spring, summer, and autumn by using ultraperformance liquid chromatography-quadrupole time-of-flight mass spectrometry (UPLC-Q-TOF/MS) on a reversed phase column. A multivariate analysis indicated distinct differences among the metabolite phenotypes of teas harvested in different seasons. Heat-map analysis and metabolic pathway analysis demonstrated that flavan-3-ols, theasinensins, procyanidins, quercetin-O-glycosides, apigenin-C-glycosides, and amino acids exhibited sharp seasonal fluctuations. An equivalent quantification of tea tastes showed that in summer and autumn teas, the bitterness and astringency were significantly elevated, whereas umami declined. Metabolite content comparisons and partial least-squares analysis suggested that several flavonoids and amino acids are mainly responsible for the seasonal variations in taste quality. PMID:26494158

  1. Identifying hidden voice and video streams

    Science.gov (United States)

    Fan, Jieyan; Wu, Dapeng; Nucci, Antonio; Keralapura, Ram; Gao, Lixin

    2009-04-01

    Given the rising popularity of voice and video services over the Internet, accurately identifying voice and video traffic that traverse their networks has become a critical task for Internet service providers (ISPs). As the number of proprietary applications that deliver voice and video services to end users increases over time, the search for the one methodology that can accurately detect such services while being application independent still remains open. This problem becomes even more complicated when voice and video service providers like Skype, Microsoft, and Google bundle their voice and video services with other services like file transfer and chat. For example, a bundled Skype session can contain both voice stream and file transfer stream in the same layer-3/layer-4 flow. In this context, traditional techniques to identify voice and video streams do not work. In this paper, we propose a novel self-learning classifier, called VVS-I , that detects the presence of voice and video streams in flows with minimum manual intervention. Our classifier works in two phases: training phase and detection phase. In the training phase, VVS-I first extracts the relevant features, and subsequently constructs a fingerprint of a flow using the power spectral density (PSD) analysis. In the detection phase, it compares the fingerprint of a flow to the existing fingerprints learned during the training phase, and subsequently classifies the flow. Our classifier is not only capable of detecting voice and video streams that are hidden in different flows, but is also capable of detecting different applications (like Skype, MSN, etc.) that generate these voice/video streams. We show that our classifier can achieve close to 100% detection rate while keeping the false positive rate to less that 1%.

  2. Design and Implementation of Domain based Semantic Hidden Web Crawler

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Web is a wide term which mainly consists of surface web and hidden web. One can easily access the surface web using traditional web crawlers, but they are not able to crawl the hidden portion of the web. These traditional crawlers retrieve contents from web pages, which are linked by hyperlinks ignoring the information hidden behind form pages, which cannot be extracted using simple hyperlink structure. Thus, they ignore large amount of data hidden behind search forms. This paper emphasizes o...

  3. Uncovering Multiple Populations in Globular Clusters with Washington Photometry

    Science.gov (United States)

    Geisler, Douglas; Cummings, Jeff; Villanova, Sandro; Carraro, Giovanni

    2015-01-01

    Globular Clusters (GCs), long considered as ideal Simple Stellar Populations, are now known to harbor a wide variety of chemical inhomogeneities. Multiple populations (MP) are being found in a growing number of Galactic globular clusters (GCs) via both photometric and spectroscopic techniques. Indeed, it has been suggested that a GC is an object that possesses MP. A definitive investigation of MP in GCs will undoubtedly provide a profound improvement in our understanding of their formation and evolution.However, most studies employ either high resolution VLT spectroscopy, HST photometry or inefficient filters from the ground. A ground-based photometric system which is both efficient and effective would be especially excellent for uncovering MP. We demonstrate that the Washington system meets these goals. The Washington C filter, in addition to being specifically designed for the purpose of detecting MPs, is both much broader and redder than competing UV filters, making it far more efficient at detecting MPs and much less sensitive to reddening and extinction.Our analysis of the well-studied GC NGC 1851 shows indeed that the C filter is both very efficient and effective at detecting its previously discovered MPs in the RGB and SGB, using relatively little telescope time on only a 1-meter telescope. Remarkably, we have also detected an intrinsically broad MS best characterized by two distinct but heavily overlapping populations that cannot be explained by binaries, field stars, or photometric errors. Detailed analysis shows that the MS distribution is in very good agreement with that seen on the RGB. This is the first time MPs in a MS have been discovered from the ground, and just as strikingly, using only a 1-meter telescope. The Washington system thus proves to be a very powerful tool for investigating MPs, and holds particular promise for extragalactic objects where photons are limited.

  4. Endoscopic management of occluded biliary uncovered metal stents:A multicenter experience

    Institute of Scientific and Technical Information of China (English)

    Panagiotis Katsinelos; Kostas Fasoulas; Stefanos Atmatzidis; Christos Zavos; Jannis Kountouras; Athanasios Beltsis; Grigoris Chatzimavroudis; Dimitris Paikos; George Paroutoglou; Dimitris Kapetanos; Sotiris Terzoudis; Georgia Lazaraki; Ioannis Pilpilidis

    2011-01-01

    AIM:To compare diverse endoscopic interventions in the management of occluded uncovered self-expanding metal stents(SEMSs)that had been placed for palliative treatment of unresectable malignant biliary obstruction.METHODS:A retrospective review was undertaken in 4 tertiary endoscopic centers to determine optimal management of different types of occluded SEMSs.The technical success of performed treatment in occluded SEMSs,the patency of the stent,the need for re-intervention and the financial costs of each treatment were analyzed.RESULTS:Fifty four patients were included in the analysis;21 received Hanaro,19 Wallstent and 14 Flexus.For the relief of obstruction,a plastic stent was inserted in 24 patients,a second SEMS in 25 and mechanical cleaning was performed in 5 patients.The overall median second patency rates between second SEMSs and plastic stents did not differ(133 d for SEMSs vs 106 d for plastic stents;P = 0.856).Similarly,no difference was found between the overall survival of SEMS and plastic stent groups,and no procedure-related complications occurred.Incremental cost analysis showed that successive plastic stenting was a cost-saving strategy at least in Greece.CONCLUSION:Insertion of uncovered SEMSs or plastic stents is a safe and effective treatment for occluded uncovered SEMSs;insertion of plastic stents appears to be the most cost-effective strategy.

  5. Variational Hidden Conditional Random Fields with Coupled Dirichlet Process Mixtures

    NARCIS (Netherlands)

    Bousmalis, K.; Zafeiriou, S.; Morency, L.P.; Pantic, M.; Ghahramani, Z.

    2013-01-01

    Hidden Conditional Random Fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An infinite HCRF is an HCRF with a countably infinite number of hidden states, which rids us not only of the necessit

  6. Hidden Conformal Symmetry of the Warped AdS_3 Black Holes

    CERN Document Server

    Fareghbal, Reza

    2010-01-01

    We show that for a certain low frequency limit the wave equation of a generic massive scalar field in the background of the spacelike warped AdS_3 black hole can be written as the Casimir of an SL(2,R) symmetry. Two sets of SL(2,R) generators are found which uncover the hidden SL(2,R)\\times SL(2,R) symmetry of the solution. This symmetry is only locally defined and is spontaneously broken to U(1)\\times U(1) by a periodic identification of the \\phi coordinate. By using the generator of the identification we read the left and right temperatures (T_L,T_R) of the proposed dual conformal field theory which are in complete agreement with the WAdS/CFT conjecture. Moreover, under the above condition of the scalar wave frequency, absorption cross section of the scalar field is consistent with the two-point function of the dual CFT.

  7. Subtleties of Hidden Quantifiers in Implication

    Science.gov (United States)

    Shipman, Barbara A.

    2016-01-01

    Mathematical conjectures and theorems are most often of the form P(x) ? Q(x), meaning ?x,P(x) ? Q(x). The hidden quantifier ?x is crucial in understanding the implication as a statement with a truth value. Here P(x) and Q(x) alone are only predicates, without truth values, since they contain unquantified variables. But standard textbook…

  8. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  9. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another...

  10. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  11. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves; Krogh, Anders Stærmose

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover...

  12. Hidden Markov models for labeled sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    A hidden Markov model for labeled observations, called a class HMM, is introduced and a maximum likelihood method is developed for estimating the parameters of the model. Instead of training it to model the statistics of the training sequences it is trained to optimize recognition. It resembles MMI...

  13. Geometric aspects of some hidden symmetries

    International Nuclear Information System (INIS)

    Hidden symmetries of two dimensional chiral models are analysed from the geometric point of view. The dual symmetry gives rise to generalized isometries of the metric on the space of dependent variables. The Jacobi equation of geodesic deviation is dual invariant and the generalized isometries lead to generalized symmetries of the field equations. Being variational divergence symmetries they generate families of conservation laws. (orig.)

  14. Colonoscopy video quality assessment using hidden Markov random fields

    Science.gov (United States)

    Park, Sun Young; Sargent, Dusty; Spofford, Inbar; Vosburgh, Kirby

    2011-03-01

    With colonoscopy becoming a common procedure for individuals aged 50 or more who are at risk of developing colorectal cancer (CRC), colon video data is being accumulated at an ever increasing rate. However, the clinically valuable information contained in these videos is not being maximally exploited to improve patient care and accelerate the development of new screening methods. One of the well-known difficulties in colonoscopy video analysis is the abundance of frames with no diagnostic information. Approximately 40% - 50% of the frames in a colonoscopy video are contaminated by noise, acquisition errors, glare, blur, and uneven illumination. Therefore, filtering out low quality frames containing no diagnostic information can significantly improve the efficiency of colonoscopy video analysis. To address this challenge, we present a quality assessment algorithm to detect and remove low quality, uninformative frames. The goal of our algorithm is to discard low quality frames while retaining all diagnostically relevant information. Our algorithm is based on a hidden Markov model (HMM) in combination with two measures of data quality to filter out uninformative frames. Furthermore, we present a two-level framework based on an embedded hidden Markov model (EHHM) to incorporate the proposed quality assessment algorithm into a complete, automated diagnostic image analysis system for colonoscopy video.

  15. Analysing drivers of and barriers to the sustainable development: hidden economy and hidden migration

    OpenAIRE

    Albu, Lucian-Liviu; Ion GHIZDEANU; Iorgulescu, Raluca

    2011-01-01

    The actual global crisis seems to influence negatively the sustainable development in EU countries. At least partially the informal economy escapes from the official registered GDP and hidden migration from the official demographic statistics. This can affect in a significant way the measurement of sustainable development and consequently policies in this field. Coming from general accepted findings of the theory, we concentrate on evaluating the reasons of agents to be involved in hidden eco...

  16. Application of Hidden Markov Models and Hidden Semi-Markov Models to Financial Time Series

    OpenAIRE

    Bulla, Jan

    2006-01-01

    Hidden Markov Models (HMMs) and Hidden Semi-Markov Models (HSMMs) provide flexible, general-purpose models for univariate and multivariate time series. Although interest in HMMs and HSMMs has continuously increased during the past years, and numerous articles on theoretical and practical aspects have been published, several gaps remain. This thesis addresses some of them, divided into three main topics. 1. Computational issues in parameter estimation of stationary HMMs. The parameters of ...

  17. Hidden with Sufficient Reason: A Cumulative Case against J. L. Schellenberg s Hiddenness of God Argument

    OpenAIRE

    Ottosen, Espen

    2015-01-01

    J. L. Schellenberg argues in the book Divine Hiddenness and Human Reason that the apparent hiddenness of God is—in itself—an atheistic argument. His argument takes as the starting premise: If a perfectly loving God exists, reasonable nonbelief does not occur. Then he tries to show that reasonable nonbelief does occur. Thus, the conclusion is that he has an argument of considerable force from the reasonableness of nonbelief to the nonexistence of God. I find that the argument of Schellenbe...

  18. Uncovering ecosystem service bundles through social preferences.

    Directory of Open Access Journals (Sweden)

    Berta Martín-López

    Full Text Available Ecosystem service assessments have increasingly been used to support environmental management policies, mainly based on biophysical and economic indicators. However, few studies have coped with the social-cultural dimension of ecosystem services, despite being considered a research priority. We examined how ecosystem service bundles and trade-offs emerge from diverging social preferences toward ecosystem services delivered by various types of ecosystems in Spain. We conducted 3,379 direct face-to-face questionnaires in eight different case study sites from 2007 to 2011. Overall, 90.5% of the sampled population recognized the ecosystem's capacity to deliver services. Formal studies, environmental behavior, and gender variables influenced the probability of people recognizing the ecosystem's capacity to provide services. The ecosystem services most frequently perceived by people were regulating services; of those, air purification held the greatest importance. However, statistical analysis showed that socio-cultural factors and the conservation management strategy of ecosystems (i.e., National Park, Natural Park, or a non-protected area have an effect on social preferences toward ecosystem services. Ecosystem service trade-offs and bundles were identified by analyzing social preferences through multivariate analysis (redundancy analysis and hierarchical cluster analysis. We found a clear trade-off among provisioning services (and recreational hunting versus regulating services and almost all cultural services. We identified three ecosystem service bundles associated with the conservation management strategy and the rural-urban gradient. We conclude that socio-cultural preferences toward ecosystem services can serve as a tool to identify relevant services for people, the factors underlying these social preferences, and emerging ecosystem service bundles and trade-offs.

  19. Testing string vacua in the lab. From a hidden CMB to dark forces in flux compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Cicoli, Michele; Goodsell, Mark; Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Hamburg (Germany). Theory Group; Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenolgy

    2011-03-15

    We perform a detailed analysis of the phenomenological properties of hidden Abelian gauge bosons with a kinetic mixing with the ordinary photon within type IIB flux compactifications. We study the interplay between moduli stabilisation and the Green-Schwarz mechanism that gives mass to the hidden photon paying particular attention to the role of D-terms. We present two generic classes of explicit Calabi-Yau examples with an isotropic and an anisotropic shape of the extra dimensions showing how the last case turns out to be very promising to make contact with current experiments. In fact, anisotropic compactifications lead naturally to a GeV-scale hidden photon (''dark forces'' that can be searched for in beam dump experiments) for an intermediate string scale; or even to an meV-scale hidden photon (which could lead to a ''hidden CMB'' and can be tested by light-shining-through-a-wall experiments) in the case of TeV-scale strings. (orig.)

  20. Testing String Vacua in the Lab: From a Hidden CMB to Dark Forces in Flux Compactifications

    CERN Document Server

    Cicoli, Michele; Jaeckel, Joerg; Ringwald, Andreas

    2011-01-01

    We perform a detailed analysis of the phenomenological properties of hidden Abelian gauge bosons with a kinetic mixing with the ordinary photon within type IIB flux compactifications. We study the interplay between moduli stabilisation and the Green-Schwarz mechanism that gives mass to the hidden photon paying particular attention to the role of D-terms. We present two generic classes of explicit Calabi-Yau examples with an isotropic and an anisotropic shape of the extra dimensions showing how the last case turns out to be very promising to make contact with current experiments. In fact, anisotropic compactifications lead naturally to a GeV-scale hidden photon ("dark forces" that can be searched for in beam dump experiments) for an intermediate string scale; or even to an meV-scale hidden photon (which could lead to a "hidden CMB" and can be tested by light-shining-through-a-wall experiments) in the case of TeV-scale strings.

  1. Uncovering the Costs of the Iraq War

    OpenAIRE

    Fred E. Foldvary

    2008-01-01

    Fred Foldvary reviews the recent book by Joseph Stiglitz and Linda Bilmes, The Three Trillion Dollar War: The True Cost of the Iraq Conflict. Foldvary commends the book for its assembly of both the budgeted and implicit costs of the war, and its analysis of the economic impact of the war. The review posits that the better knowledge and accounting of the war costs as provided by this work will aid in establishing a more coherent dialog on policy for dealing with this and future conflicts abroad.

  2. Risk Assessment of Power System Catastrophic Failures and Hidden Failure Monitoring & Control System

    OpenAIRE

    Qiu, Qun

    2003-01-01

    One of the objectives of this study is to develop a methodology, together with a set of software programs that evaluate, in a power system, the risks of catastrophic failures caused by hidden failures in the hardware or software components of the protection system. The disturbance propagation mechanism is revealed by the analysis of the 1977 New York Blackout. The step-by-step process of estimating the relay hidden failure probability is presented. A Dynamic Event Tree for the risk-based ana...

  3. Extraction of Hidden Social Networks from Wiki-Environment Involved in Information Conflict

    Directory of Open Access Journals (Sweden)

    Rasim M. Alguliyev

    2016-03-01

    Full Text Available Social network analysis is a widely used technique to analyze relationships among wiki-users in Wikipedia. In this paper the method to identify hidden social networks participating in information conflicts in wiki-environment is proposed. In particular, we describe how text clustering techniques can be used for extraction of hidden social networks of wiki-users caused information conflict. By clustering unstructured text articles caused information conflict we create social network of wiki-users. For clustering of the conflict articles a hybrid weighted fuzzy-c-means method is proposed.

  4. … To be hidden does not mean to be merely revealed – Part 2

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-12-01

    Full Text Available This text revisits the long-term project Hidden Curriculum (HC, initiated by Annette Krauss, that addresses unquestioned routines, hierarchies of knowledge and the role of the body in learning processes from the perspective of secondary/high school education (in the research on a hidden curriculum. The first part of this text (www.medienimpulse.at/articles/view/848 entailed a deeper analysis of educational studies on the phenomenon of hidden curriculum in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire and Jacques Rancière. The aim of the second part is to address academic canons and corporeality within educational settings and to investigate the physicality of everyday norms through revisiting the framework, results and processes of the collaborative research of the HC project with secondary/high school students.

  5. Uncovering the Matter-Neutrino Resonance

    CERN Document Server

    Vaananen, D

    2015-01-01

    Matter Neutrino Resonances (MNRs) can drastically modify neutrino flavor evolution in astrophysical environments and may significantly impact nucleosynthesis. Here we further investigate the underlying physics of MNR type flavor transitions. We provide generalized resonance conditions and make analytical predictions for the behavior of the system. We discuss the adiabatic evolution of these transitions, considering both Symmetric and Standard scenarios. Symmetric MNR transitions differ from Standard MNR transitions in that both neutrinos and antineutrinos can completely transform to other flavors simultaneously. We provide an example of the simplest system in which such transitions can occur with a neutrino and an antineutrino having a single energy and emission angle. We further apply linearized stability analysis to predict the location of self-induced nutation type (or bipolar) oscillations due to neutrino-neutrino interactions in the regions where MNR is ineffective. In all cases, we compare our analytica...

  6. Comparative De Novo Transcriptome Analysis of Fertilized Ovules in Xanthoceras sorbifolium Uncovered a Pool of Genes Expressed Specifically or Preferentially in the Selfed Ovule That Are Potentially Involved in Late-Acting Self-Incompatibility.

    Directory of Open Access Journals (Sweden)

    Qingyuan Zhou

    Full Text Available Xanthoceras sorbifolium, a tree species endemic to northern China, has high oil content in its seeds and is recognized as an important biodiesel crop. The plant is characterized by late-acting self-incompatibility (LSI. LSI was found to occur in many angiosperm species and plays an important role in reducing inbreeding and its harmful effects, as do gametophytic self-incompatibility (GSI and sporophytic self-incompatibility (SSI. Molecular mechanisms of conventional GSI and SSI have been well characterized in several families, but no effort has been made to identify the genes involved in the LSI process. The present studies indicated that there were no significant differences in structural and histological features between the self- and cross-pollinated ovules during the early stages of ovule development until 5 days after pollination (DAP. This suggests that 5 DAP is likely to be a turning point for the development of the selfed ovules. Comparative de novo transcriptome analysis of the selfed and crossed ovules at 5 DAP identified 274 genes expressed specifically or preferentially in the selfed ovules. These genes contained a significant proportion of genes predicted to function in the biosynthesis of secondary metabolites, consistent with our histological observations in the fertilized ovules. The genes encoding signal transduction-related components, such as protein kinases and protein phosphatases, are overrepresented in the selfed ovules. X. sorbifolium selfed ovules also specifically or preferentially express many unique transcription factor (TF genes that could potentially be involved in the novel mechanisms of LSI. We also identified 42 genes significantly up-regulated in the crossed ovules compared to the selfed ovules. The expression of all 16 genes selected from the RNA-seq data was validated using PCR in the selfed and crossed ovules. This study represents the first genome-wide identification of genes expressed in the fertilized

  7. Weaving Social Foundations through Dance Pedagogy: A Pedagogy of Uncovering

    Science.gov (United States)

    Barr, Sherrie; Risner, Doug

    2014-01-01

    Today's dance educators enter classrooms populated by increasingly diverse students in which teachers' pedagogical knowledge necessitates heightened understandings of race, ethnicity, social class, gender, and sexuality. Uncovering taken-for-granted assumptions, dominant stereotypes, and educational structures that reproduce social…

  8. The uncovered parity properties of the Czech Koruna

    Czech Academy of Sciences Publication Activity Database

    Derviz, Alexis

    2002-01-01

    Roč. 11, č. 1 (2002), s. 17-37. ISSN 1210-0455 R&D Projects: GA AV ČR KSK1019101 Institutional research plan: CEZ:AV0Z1075907 Keywords : uncovered parity * asset prices * international consumption-based capital asset pricing model Subject RIV: AH - Economics

  9. 隐Markov链驱动关联性和波动性的传染分析%Contagion Analysis Based on Correlations and Volatilities Driven by Hidden Markov Chain

    Institute of Scientific and Technical Information of China (English)

    欧阳红兵; 苏海军

    2012-01-01

    本文将隐Markov链对波动性和相关性的驱动分析引入DCC多元GARCH,对波动和相关分析建立起了直接的联系,进而考察次贷危机、欧洲债务危机在主要证券市场间的传染性。研究发现,高波动高相关机制为联动性提供了一种直接的表述方式,且这一机制在危机期间处于支配地位;次贷危机、欧洲债务危机具有传染性,传染期以区间的形式出现,且危机初期的市场在各机制间有较为频繁的转换,不可根据危机事件对样本进行武断地分割;同时,危机的传染在所考察的市场之间具有系统性,应对危机需要各国政策间的协调配合;另外,有证据显示美国次贷市场在2006年年中已显现出问题,有关国家贻误了深入分析和应对危机的时机。%A hidden Markov chain is introduced to drive both volatilities and correlations into dynamic conditional correlation multivariate GARCH model,which can put direct analysis to volatilities and correlations under one framework.Then the contagion resulted from American subprime mortgage crisis and European sovereign debt crisis among the major stock markets is in restigated.The findings are firstly,the regime of high volatility with high correlation,which dominates the market during crises,provides a direct way of expression to the concept of comovement.Second,the American subprime mortgage crisis and European sovereign debt crisis are contagious and emerge in the form of intervals,and show the market transfer between different regimes more frequent in the early stage of these crises.So it is arbitrary to investigate crisis contagion based on dividing sample into subsamples according to prior breakpoints.Third,it is necessary for countries to cooperate with each other because the contagion resulted from American subprime mortgage crisis and European sovereign debt crisis both are a systemic risk among the investigated markets.Finally,there is evidence that American subprime

  10. Political Life in the Hidden Curriculum: Does It Make a Difference?

    Science.gov (United States)

    Ehman, Lee H.; Gillespie, Judith A.

    The research reported here is an attempt to explore the attitudes of students in high schools and to take a look at the hidden curriculum and its political dimensions. The analysis is divided into an exploration and categorization of different types of schools, a definition of different kinds of attitudes and behavior on the part of students, and…

  11. The Great 1787 Corralero, Oaxaca, Tsunami Uncovered

    Science.gov (United States)

    Ramirez-Herrera, M.; Lagos, M.; Goguitchaichrili, A.; Aguilar, B.; Machain-Castillo, M. L.; Caballero, M.; Ruíz-Fernández, A. C.; Suarez, G.; Ortuño, M.

    2013-05-01

    In 28th March 1787, more than two centuries ago, a deadly tsunami (related to the the San Sixto earthquake) poured over the coast of Oaxaca, Guerrero, and Chiapas, along more than 500 km of the Mexican Pacific coast and up to 6 km inland, the tsunami destroyed mostly farmlands, and livestock and few villages since the density of population was sparse at the time, according to known historical accounts. We report the first geological evidence from the Corralero (Alotengo) lagoon coastal area to support these historical accounts. A transect was made with coring and test pits every 100 m from the coastline and up to 1.6 km inland. The test pits showed an anomalous sand layer that had been deposited in a single event in the swales of a series of beach ridges. The anomalous layer is continuous along the transect, about a 1000 m-long, and is formed of coarse to medium sand, at about 36 to 64 cm depth. It thickness varies, averaging 28 cm in the middle of a swale. Based on the accounts of the 1787 earthquake (M 8.6) and tsunami, we deduced that this might be the evidence of its existence. As the only major tsunami described at that time, the San Sixto earthquake-triggered tsunami. We used the stratigraphy, grain size, microfossils (foraminifera and diatoms), magnetic properties such as magnetic susceptibility, remanent magnetization analyses to reveal the nature of this anomalous sand layer. These proxies support a sudden and rapid event, consisting of sands transported by an extreme sea-wave inland. Further analysis will confirm the estimated age of this event.

  12. Hidden Momentum in a moving Capacitor

    CERN Document Server

    Asti, Giovanni

    2015-01-01

    A very simple system like a parallel-plate capacitor reveals striking features when we examine the peculiar phenomena appearing when it is moving at low speed in different directions. Both hidden momentum and hidden energy appear and their addition, with their sign, to the corresponding electromagnetic component results in the expected ordinary kinetic momentum or energy of the electrostatic mass equivalent. What's happening is that passing from one inertial reference frame to another, part of the energy or momentum is transferred from the electromagnetic component to the material part of the system or the other way around. A paradoxical self-accelerating behavior is evidenced if one admits that the capacitor is discharging through an electrical resistance during its motion. It is shown that one must take into account the mass of the produced heat.

  13. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  14. Hidden SU(N) Glueball Dark Matter

    CERN Document Server

    Soni, Amarjit

    2016-01-01

    We investigate the possibility that the dark matter candidate is from a pure non-abelian gauge theory of the hidden sector, motivated in large part by its simplicity. The dark matter is the lightest bound state made of the confined gauge fields, the hidden glueball. We point out this simple setup is capable of providing rich and novel phenomena in the dark sector, especially in the parameter space of large N. They include self-interacting and warm dark matter scenarios, Bose-Einstein condensation leading to massive dark stars possibly much heavier than our sun leading to gravitational lensing effects, and indirect detections through higher dimensional operators as well as interesting collider signatures.

  15. Laser experiments explore the hidden sector

    International Nuclear Information System (INIS)

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses -7 times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background. (orig.)

  16. Hidden Superconformal Symmetry of the Cosmological Evolution

    CERN Document Server

    Kallosh, Renata

    2013-01-01

    In the superconformal formulation of supergravity, the standard supergravity action appears as a result of spontaneous symmetry breaking when the conformal compensator scalar field, the conformon, acquires a nonzero value, giving rise to the Planck mass. After that, many symmetries of the original theory become well hidden, and therefore they are often ignored. However, recent developments demonstrated that superconformal invariance is more than just a tool: it plays an important role in generalizing previously existing formulations of supergravity and developing new classes of inflationary models. In this paper we describe hidden superconformal symmetry of the cosmological evolution. In this formulation, inflation can be equivalently described as the conformon instability, and creation of the universe `from nothing' can be interpreted as spontaneous symmetry breaking due to emergence of a classical conformon field. We develop a general formalism that allows to describe the cosmological evolution simultaneous...

  17. On the Hidden Shifted Power Problem

    OpenAIRE

    Bourgain, Jean; Garaev, Moubariz Z.; Konyagin, Sergei V.; Shparlinski, Igor E.

    2011-01-01

    We consider the problem of recovering a hidden element $s$ of a finite field $\\F_q$ of $q$ elements from queries to an oracle that for a given $x\\in \\F_q$ returns $(x+s)^e$ for a given divisor $e\\mid q-1$. We use some techniques from additive combinatorics and analytic number theory that lead to more efficient algorithms than the naive interpolation algorithm, for example, they use substantially fewer queries to the oracle.

  18. Asymmetric dark matter from hidden sector baryogenesis

    Energy Technology Data Exchange (ETDEWEB)

    Dutta, Bhaskar [Department of Physics and Astronomy, Mitchell Institute for Fundamental Physics, Texas A and M University, College Station, TX 77843 (United States); Kumar, Jason, E-mail: jkumar@hawaii.edu [Department of Physics and Astronomy, University of Hawai' i, Honolulu, HI 96822 (United States)

    2011-05-23

    We consider the production of asymmetric dark matter during hidden sector baryogenesis. We consider a particular supersymmetric model where the dark matter candidate has a number density approximately equal to the baryon number density, with a mass of the same scale as the b, c and {tau}. Both baryon asymmetry and dark matter are created at the same time in this model. We describe collider and direct detection signatures of this model.

  19. Cold dark matter from the hidden sector

    International Nuclear Information System (INIS)

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  20. Caldera rim collapse : A hidden volcanic hazard

    OpenAIRE

    Merle, Olivier; Michon, L.; Bachelery, P.

    2008-01-01

    Following the emblematic flank collapse of Mount St Helens in 1981, numerous models of flank sliding have been proposed. These models have allowed to largely improve the understanding of mechanisms involved in such landslides, which represent a tremendous risk for populations living around volcanoes. In this article, a new mode of landslide formation, related to buried calderas, is described. The model emphasizes the paramount importance of the hidden ring fault that, even when the caldera is...

  1. Hidden temporal order unveiled in stock market volatility variance

    Science.gov (United States)

    Shapira, Y.; Kenett, D. Y.; Raviv, Ohad; Ben-Jacob, E.

    2011-06-01

    When analyzed by standard statistical methods, the time series of the daily return of financial indices appear to behave as Markov random series with no apparent temporal order or memory. This empirical result seems to be counter intuitive since investor are influenced by both short and long term past market behaviors. Consequently much effort has been devoted to unveil hidden temporal order in the market dynamics. Here we show that temporal order is hidden in the series of the variance of the stocks volatility. First we show that the correlation between the variances of the daily returns and means of segments of these time series is very large and thus cannot be the output of random series, unless it has some temporal order in it. Next we show that while the temporal order does not show in the series of the daily return, rather in the variation of the corresponding volatility series. More specifically, we found that the behavior of the shuffled time series is equivalent to that of a random time series, while that of the original time series have large deviations from the expected random behavior, which is the result of temporal structure. We found the same generic behavior in 10 different stock markets from 7 different countries. We also present analysis of specially constructed sequences in order to better understand the origin of the observed temporal order in the market sequences. Each sequence was constructed from segments with equal number of elements taken from algebraic distributions of three different slopes.

  2. Results from the solar hidden photon search (SHIPS)

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Knabbe, Ernst-Axel; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Zaragoza Univ. (Spain). Dept. de Fisica Teorica; Max-Planck-Institut fuer Physik, Muenchen (Germany)

    2015-02-15

    We present the results of a search for transversely polarised hidden photons (HPs) with ∝3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon<->HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m{sup 2} at the 95%C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  3. Results from the Solar Hidden Photon Search (SHIPS)

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany); Knabbe, Ernst-Axel; Lindner, Axel [Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, D-22607 Hamburg (Germany); Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik (Werner-Heisenberg-Institut), Föhringer Ring 6, D-80805 München (Germany); Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, D-22607 Hamburg (Germany); Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Günter [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany)

    2015-08-07

    We present the results of a search for transversely polarised hidden photons (HPs) with ∼3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon ↔ HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m{sup 2} at the 95% C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  4. Self-Organizing Hidden Markov Model Map (SOHMMM).

    Science.gov (United States)

    Ferles, Christos; Stafylopatis, Andreas

    2013-12-01

    A hybrid approach combining the Self-Organizing Map (SOM) and the Hidden Markov Model (HMM) is presented. The Self-Organizing Hidden Markov Model Map (SOHMMM) establishes a cross-section between the theoretic foundations and algorithmic realizations of its constituents. The respective architectures and learning methodologies are fused in an attempt to meet the increasing requirements imposed by the properties of deoxyribonucleic acid (DNA), ribonucleic acid (RNA), and protein chain molecules. The fusion and synergy of the SOM unsupervised training and the HMM dynamic programming algorithms bring forth a novel on-line gradient descent unsupervised learning algorithm, which is fully integrated into the SOHMMM. Since the SOHMMM carries out probabilistic sequence analysis with little or no prior knowledge, it can have a variety of applications in clustering, dimensionality reduction and visualization of large-scale sequence spaces, and also, in sequence discrimination, search and classification. Two series of experiments based on artificial sequence data and splice junction gene sequences demonstrate the SOHMMM's characteristics and capabilities. PMID:24001407

  5. Detection of "hidden Regimes" In Stochastic Cyclostationary Time Series

    Science.gov (United States)

    Wirth, V.

    Idealized descriptions of geophysical systems sometimes lead to stochastic differential equations characterized by a deterministic part and a stochastic part. In the case of nonlinearity the deterministic part may support multiple equilibria. For nonstationary processes such multiple equilibria are not necessarily reflected as relative maxima of the probability density function (PDF). This occurs when the duration of a regime is too short for the PDF to adjust, and such regimes are dubbed "hidden". This work focuses on cyclostationary Markovian processes. An example is given derived from a simplified model for the seasonal evolution of soil moisture. Although in summer the system is attracted to either a dry or a moist state, the evolution is slow enough for the PDF to remain unimodal throughout the year. An algorithm is presented which allows one to detect such hidden regimes given the data of the time series only. The method involves the analysis of an appropriately windowed time series, from which the drift and diffusion coefficients of the associated Fokker-Planck equation are estimated. The success of the algorithm is illustrated using synthetic time series.

  6. Results from the solar hidden photon search (SHIPS)

    International Nuclear Information System (INIS)

    We present the results of a search for transversely polarised hidden photons (HPs) with ∝3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon<->HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m2 at the 95%C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  7. Hidden temporal order unveiled in stock market volatility variance

    Directory of Open Access Journals (Sweden)

    Y. Shapira

    2011-06-01

    Full Text Available When analyzed by standard statistical methods, the time series of the daily return of financial indices appear to behave as Markov random series with no apparent temporal order or memory. This empirical result seems to be counter intuitive since investor are influenced by both short and long term past market behaviors. Consequently much effort has been devoted to unveil hidden temporal order in the market dynamics. Here we show that temporal order is hidden in the series of the variance of the stocks volatility. First we show that the correlation between the variances of the daily returns and means of segments of these time series is very large and thus cannot be the output of random series, unless it has some temporal order in it. Next we show that while the temporal order does not show in the series of the daily return, rather in the variation of the corresponding volatility series. More specifically, we found that the behavior of the shuffled time series is equivalent to that of a random time series, while that of the original time series have large deviations from the expected random behavior, which is the result of temporal structure. We found the same generic behavior in 10 different stock markets from 7 different countries. We also present analysis of specially constructed sequences in order to better understand the origin of the observed temporal order in the market sequences. Each sequence was constructed from segments with equal number of elements taken from algebraic distributions of three different slopes.

  8. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  9. Uncovering MIT wind myths through micro-climatological CFD analysis

    CERN Document Server

    Kalmikov, Alexander

    2013-01-01

    Popular campus myths of unusually strong pedestrian level winds are investigated with a Computational Fluid Dynamics (CFD) approach. The numerical simulations confirm the existence of the reported phenomena and provide a qualitative explanation of their physical mechanisms.

  10. DEVELOPMENT OF A PROGRAM TO DETERMINE HIDDEN PERFORMANCE PARAMETERS OF A GASTURBINE

    OpenAIRE

    Ranasinghe, Chamila

    2013-01-01

    Gas turbines overall theoretical performance analysis can be performed by using several thermodynamic theories and equations with the help of design parameters. However, limited availability of the design parameters will complicate the analysis. The turbines manufactures published a limited amount of data, while important parameters remain hidden and this available information is not enough for overall gas turbine cycle analysis. A theoretical model based on Mathcad software is already availa...

  11. Hidden Symmetries, Instabilities, and Current Suppression in Brownian Ratchets

    Science.gov (United States)

    Cubero, David; Renzoni, Ferruccio

    2016-01-01

    The operation of Brownian motors is usually described in terms of out-of-equilibrium and symmetry-breaking settings, with the relevant spatiotemporal symmetries identified from the analysis of the equations of motion for the system at hand. When the appropriate conditions are satisfied, symmetry-related trajectories with opposite current are thought to balance each other, yielding suppression of transport. The direction of the current can be precisely controlled around these symmetry points by finely tuning the driving parameters. Here we demonstrate, by studying a prototypical Brownian ratchet system, the existence of hidden symmetries, which escape identification by the standard symmetry analysis, and which require different theoretical tools for their revelation. Furthermore, we show that system instabilities may lead to spontaneous symmetry breaking with unexpected generation of directed transport.

  12. Mind's historicity: its hidden history.

    Science.gov (United States)

    Pizarroso, Noemí

    2013-02-01

    Whereas psychological research can hardly accept the idea of a changing psychological architecture, mind's historicity seems to be commonplace among historians of psychology, at least in recent decades. Attempts to promote a convergence between psychology and history have always existed, though mainly in the margins of both disciplines. Among these attempts, there is a tradition in French psychology that remains quite marginal even to the history of the discipline and is practically unknown out of the French context. Our goal is to introduce this approach, through the work of its main architect, Ignace Meyerson, to an English speaking reader, in the light of current pleas for historicity. Developed within the core of the discipline of psychology, though in dialogue with many others disciplines, Meyerson's historical psychology appears to be more ambitious than other attempts, as it aims at studying psychological activity itself, beyond the history of its conceptualizations. It is concerned not with the analysis of fragmented, isolated, and mechanistic behaviors or cognitive process, but with the study of mind in its functioning through the multiple and changing fields of experience where human beings are involved. PMID:23394174

  13. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    OpenAIRE

    Xiao, C. W.; Oset, Eulogi

    2013-01-01

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states eta (b) N, I'N, BI > (b) , BI pound (b) , B (*) I > (b) , B (*) I pound (b) , B (*) I pound (b) (*) and find four basic bound states which correspond to BI pound (b) , BI pound (b) (*) , B (*) I pound (b) and B (*) I pound (b)...

  14. Hidden laser communications through matter. An application of meV-scale hidden photons

    International Nuclear Information System (INIS)

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  15. Hidden laser communications through matter. An application of meV-scale hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-04-15

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  16. Genuinely Multipartite Entangled Quantum States with Fully Local Hidden Variable Models and Hidden Multipartite Nonlocality

    Science.gov (United States)

    Bowles, Joseph; Francfort, Jérémie; Fillettaz, Mathieu; Hirsch, Flavien; Brunner, Nicolas

    2016-04-01

    The relation between entanglement and nonlocality is discussed in the case of multipartite quantum systems. We show that, for any number of parties, there exist genuinely multipartite entangled states that admit a fully local hidden variable model, i.e., where all parties are separated. Hence, although these states exhibit the strongest form of multipartite entanglement, they cannot lead to Bell inequality violation considering general nonsequential local measurements. Then, we show that the nonlocality of these states can nevertheless be activated using sequences of local measurements, thus revealing genuine multipartite hidden nonlocality.

  17. The Uncovered Interest Parity in the Foreign Exchange (FX Markets

    Directory of Open Access Journals (Sweden)

    Silvio Ricardo Micheloto

    2004-12-01

    Full Text Available This work verifies the uncovered interest rates parity (UIP in the FX (foreign exchange emerging markets by using the panel cointegration technique. The data involves several developing countries that compose the EMBI+ Global Index. We compare the results of several panel estimators: OLS (ordinary list square, DOLS (dynamic OLS and FMOLS (fully modified OLS. This new panel technique can handle problems of either non-stationary series (spurious regression or small problem. This latter problem has being considered one of the main causes for distorting the UIP empirical results. By using this approach, we check the UIP in the FX (foreign exchange emerging markets. These markets are more critical because they have been subjected to changing FX regimes and speculative attacks. Our results do not corroborate the uncovered interest parity for the developing countries in the recent years. Thus, the forward premium puzzle may hold in the FX emergent markets.

  18. Microwave background constraints on mixing of photons with hidden photons

    International Nuclear Information System (INIS)

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle χ0 -7 - 10-5 for hidden photon masses between 10-14 eV and 10-7 eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  19. Uncovering Student Ideas in Astronomy 45 Formative Assessment Probes

    CERN Document Server

    Keeley, Page

    2012-01-01

    What do your students know-or think they know-about what causes night and day, why days are shorter in winter, and how to tell a planet from a star? Find out with this book on astronomy, the latest in NSTA's popular Uncovering Student Ideas in Science series. The 45 astronomy probes provide situations that will pique your students' interest while helping you understand how your students think about key ideas related to the universe and how it operates.

  20. Conditional genome engineering in Toxoplasma gondii uncovers alternative invasion mechanisms

    OpenAIRE

    Andenmatten, Nicole; Egarter, Saskia; Jackson, Allison J.; JULLIEN, Nicolas; Herman, Jean-Paul; Meissner, Markus

    2012-01-01

    We established a conditional site–specific recombination system based on dimerizable Cre–mediated recombination in the apicomplexan parasite Toxoplasma gondii. Using a novel single vector strategy that allows ligand-dependent, efficient removal of a gene of interest, we generated three knockouts of apicomplexan genes considered essential for host-cell invasion. Our findings uncover the existence of an alternative invasion pathway in apicomplexan parasites.

  1. Uncovering the systemic issues that reside in home care

    OpenAIRE

    Giannasi, Wynona

    2012-01-01

    This video clip comprises the Keynote Address: “Uncovering the systemic issues that reside in home care” held at the 21st Annual John K. Friesen Conference, "Innovations in Home Care: A Public Policy Perspective," MAY 16-17, 2012, Vancouver, BC. Presented by Wynona Giannasi, Partner, Howegroup – Public Sector Consultants, Vancouver BC. It is well known that jurisdictions with more comprehensive and integrated home care delivery systems are able to extend independent living for older p...

  2. 基于实测的采空区隐患分析及治理研究%Hidden Troubles Analysis of Mined - out Area Based on Actual Detection and Its Treatment Scheme

    Institute of Scientific and Technical Information of China (English)

    张耀平; 刘波; 龚囱

    2012-01-01

    In order to treat the hidden trouble of mined - out areas formed by illegal mining in a gold mine, the mined - out areas were detected with 3 D Laser detection system. 3 D visual model of mined - out area was established using modeling software Surpae, Such data as the volume and exposed area of the mined - out areas and the collapse of surrounding rock, etc. were determined. Based on these ,the hidden troubles of mined -out areas were analyzed. Combined with the actual conditions of the mine, a combined treatment scheme of filling and closing mined - out area was proposed. A ground pressure monitoring system was established to verify the effect of mined - out area treatment. The data of ground pressure monitoring showed that after treating the mined - out areas the displacement of rock tended to be stable, the rock stress decreased, these indicated that the desired effect of mined - out area treatment has been achieved.%为处理某金矿民采采空区的隐患,运用3D激光探测系统对采空区进行探测,结合建模软件Surpac建立三维可视化模型,得到了空区的体积、暴露面积、围岩垮塌等信息。在此基础上,对采空区隐患进行分析,结合矿山实际情况,提出充填-封闭联合治理方案。建立地压监测系统以验证空区治理效果,地压监测数据显示,空区治理后,围岩的位移趋于平稳,应力减小,表明空区的治理取得预期的效果。

  3. Malignant Gastroduodenal Obstruction: Treatment with Self-Expanding Uncovered Wallstent

    International Nuclear Information System (INIS)

    Purpose: To retrospectively evaluate the clinical effectiveness of a self-expanding uncovered Wallstent in patients with malignant gastroduodenal obstruction. Materials and Methods: Under combined endoscopic and fluoroscopic guidance, 29 patients with a malignant gastroduodenal stenosis were treated with a self-expanding uncovered metallic Wallstent. A dysphagia score was assessed before and after the intervention to measure the success of this palliative therapy. The dysphagia score ranged between grade 0 to grade 4: grade 0 = able to tolerate solid food, grade 1 = able to tolerate soft food, grade 2 = able to tolerate thick liquids, grade 3 = able to tolerate water or clear fluids, and grade 4 = unable to tolerate anything perorally. Stent patency and patients survival rates were calculated. Results: The insertion of the gastroduodenal stent was technically successful in 28 patients (96.5%). After stenting, 25 patients (86.2%) showed clinical improvement by at least one score point. During follow-up, 22 (78.5%) of 28 patients showed no stent occlusion until death and did not have to undergo any further intervention. In six patients (20.6%), all of whom were treated with secondary stent insertions, occlusion with tumor ingrowth and/or overgrowth was observed after the intervention. The median period of primary stent patency in our study was 240 days. Conclusion: Placement of an uncovered Wallstent is clinically effective in patients with malignant gastroduodenal obstruction. Stent placement is associated with high technical success, good palliation effect, and high durability of stent function.

  4. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  5. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  6. #A #hidden curriculum in kindergartens and empathy of preschool teachers

    OpenAIRE

    Lepičnik-Vodopivec, Jurka

    2012-01-01

    The present article illustrates the problem of a hidden curriculum in kindergartens. It is presented as an important part of the overt curriculum. The empathy of kindergarten teachers is shown within the scope of a hidden curriculum. The second part discusses the results of the research on empathy of preschool teachers as an important element of the hidden curriculum in kindergartens. Four dimensions of empathy were identified: social self-confi dence, calmness, sensitivity and non-conformism...

  7. A Non-Parametric Bayesian Method for Inferring Hidden Causes

    OpenAIRE

    Wood, Frank; Griffiths, Thomas; Ghahramani, Zoubin

    2012-01-01

    We present a non-parametric Bayesian approach to structure learning with hidden causes. Previous Bayesian treatments of this problem define a prior over the number of hidden causes and use algorithms such as reversible jump Markov chain Monte Carlo to move between solutions. In contrast, we assume that the number of hidden causes is unbounded, but only a finite number influence observable variables. This makes it possible to use a Gibbs sampler to approximate the distribution over causal stru...

  8. International Journal of Hidden Data Mining and Scientific Knowledge Discovery

    OpenAIRE

    Pr. Halim Sayoud

    2015-01-01

    Welcome to the first issue of the International Journal of Hidden Data Mining and Scientific Knowledge Discovery: http://scholarpage.org/journal We decided to use the following acronym HDSKD for the journal. Hidden data represents data or information that is more or less hidden, unseen or encrypted so that it becomes difficult to extract it. Scientific knowledge represents every information that comes by a scientific way, such as theories, experimental observations or scientific evidences...

  9. Hidden Hot Dark Matter as Cold Dark Matter

    OpenAIRE

    Sigurdson, Kris

    2009-01-01

    We show that hidden hot dark matter, hidden-sector dark matter with interactions that decouple when it is relativistic, is a viable dark matter candidate provided it has never been in thermal equilibrium with the particles of the standard model. This hidden hot dark matter may reheat to a lower temperature and number density than the visible Universe and thus account, simply with its thermal abundance, for all the dark matter in the Universe while evading the typical constra...

  10. Hidden Photons in Aharonov-Bohm-Type Experiments

    CERN Document Server

    Arias, Paola; Diaz, Marco Aurelio; Jaeckel, Joerg; Koch, Benjamin; Redondo, Javier

    2016-01-01

    We discuss the Aharonov-Bohm effect in the presence of hidden photons kinetically mixed with the ordinary electromagnetic photons. The hidden photon field causes a slight phase shift in the observable interference pattern. It is then shown how the limited sensitivity of this experiment can be largely improved. The key observation is that the hidden photon field causes a leakage of the ordinary magnetic field into the supposedly field-free region. The direct measurement of this magnetic field can provide a sensitive experiment with a good discovery potential, particularly below the $\\sim$ meV mass range for hidden photons.

  11. Zipf exponent of trajectory distribution in the hidden Markov model

    Science.gov (United States)

    Bochkarev, V. V.; Lerner, E. Yu

    2014-03-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.

  12. Context Tree Estimation in Variable Length Hidden Markov Models

    CERN Document Server

    Dumont, Thierry

    2011-01-01

    We address the issue of context tree estimation in variable length hidden Markov models. We propose an estimator of the context tree of the hidden Markov process which needs no prior upper bound on the depth of the context tree. We prove that the estimator is strongly consistent. This uses information-theoretic mixture inequalities in the spirit of Finesso and Lorenzo(Consistent estimation of the order for Markov and hidden Markov chains(1990)) and E.Gassiat and S.Boucheron (Optimal error exponents in hidden Markov model order estimation(2003)). We propose an algorithm to efficiently compute the estimator and provide simulation studies to support our result.

  13. Search for Hidden Sector Photons with the ADMX Detector

    International Nuclear Information System (INIS)

    Hidden U(1) gauge symmetries are common to many extensions of the standard model proposed to explain dark matter. The hidden gauge vector bosons of such extensions may mix kinetically with standard model photons, providing a means for electromagnetic power to pass through conducting barriers. The axion dark matter experiment detector was used to search for hidden vector bosons originating in an emitter cavity driven with microwave power. We exclude hidden vector bosons with kinetic couplings χ>3.48x10-8 for masses less than 3 μeV. This limit represents an improvement of more than 2 orders of magnitude in sensitivity relative to previous cavity experiments.

  14. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  15. Compressing the hidden variable space of a qubit

    International Nuclear Information System (INIS)

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of single realizations is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with quantum states satisfy reasonable criteria of regularity. Possible generalizations of this shrinking to an N-dimensional Hilbert space are discussed.

  16. Zipf exponent of trajectory distribution in the hidden Markov model

    International Nuclear Information System (INIS)

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different

  17. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  18. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  19. Hidden Markov models applications in computer vision

    CERN Document Server

    Bunke, H

    2001-01-01

    Hidden Markov models (HMMs) originally emerged in the domain of speech recognition. In recent years, they have attracted growing interest in the area of computer vision as well. This book is a collection of articles on new developments in the theory of HMMs and their application in computer vision. It addresses topics such as handwriting recognition, shape recognition, face and gesture recognition, tracking, and image database retrieval.This book is also published as a special issue of the International Journal of Pattern Recognition and Artificial Intelligence (February 2001).

  20. Can Two Hidden Layers Make a Difference?

    Czech Academy of Sciences Publication Activity Database

    Kůrková, Věra; Sanguineti, M.

    Berlin: Springer, 2013 - (Tomassini, M.; Antonioni, A.; Daolio, F.; Buesser, P.), s. 30-39. (Lecture Notes in Computer Science . 7824). ISBN 978-3-642-37212-4. ISSN 0302-9743. [ICANNGA'2013 /11./. Lausanne (CH), 04.04.2013-06.04.2013] R&D Projects: GA ČR GAP202/11/1368 Institutional support: RVO:67985807 Keywords : one and two hidden-layer perceptron networks * model complexity * representations of multivariable Boolean functions * communication matrices Subject RIV: IN - Informatics, Computer Science

  1. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  2. Hidden hybrid Markov/semi-Markov chains.

    OpenAIRE

    GUÉDON, YANN

    2005-01-01

    http://www.sciencedirect.com/science?ₒb=IssueURL&_tockey=%23TOC%235880%232005%23999509996%23596026%23FLA%23&ₐuth=y&view=c&ₐcct=C000056834&_version=1&_urlVersion=0&_userid=2292769&md5=87e7f8be94f92a8574da566c600ce631 International audience Models that combine Markovian states with implicit geometric state occupancy distributions and semi-Markovian states with explicit state occupancy distributions, are investigated. This type of model retains the flexibility of hidden semi-Markov chains ...

  3. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  4. Diphoton Excess as a Hidden Monopole

    CERN Document Server

    Yamada, Masaki; Yonekura, Kazuya

    2016-01-01

    We provide a theory with a monopole of a strongly-interacting hidden U(1) gauge symmetry that can explain the 750-GeV diphoton excess reported by ATLAS and CMS. The excess results from the resonance of monopole, which is produced via gluon fusion and decays into two photons. In the low energy, there are only mesons and a monopole in our model because any baryons cannot be gauge invariant in terms of strongly interacting Abelian symmetry. This is advantageous of our model because there is no unwanted relics around the BBN epoch.

  5. Hidden Tales of the Bujang Valley

    OpenAIRE

    Maznah Wan Omar; Syakirah Mohammed; Razanawati Nordin; Alauyah Johari; Syazliyati Ibrahim

    2010-01-01

    Legends thrive, but there is little tangible evidence about dozens of Malay kingdoms, which are said to have flourished long before the emergence of Melaka in the late 14th century. The Bujang Valley in South Kedah, for one, is Malaysia’s richest archaeological site. The valley is the guardian of countless hidden tales which are waiting to be unveiled. Here, the beliefs of the Malay ancestors were centred upon nature and the spirits which permeate every aspect of their lives. These beliefs ha...

  6. Combining Wavelet Transform and Hidden Markov Models for ECG Segmentation

    Directory of Open Access Journals (Sweden)

    Jérôme Boudy

    2007-01-01

    Full Text Available This work aims at providing new insights on the electrocardiogram (ECG segmentation problem using wavelets. The wavelet transform has been originally combined with a hidden Markov models (HMMs framework in order to carry out beat segmentation and classification. A group of five continuous wavelet functions commonly used in ECG analysis has been implemented and compared using the same framework. All experiments were realized on the QT database, which is composed of a representative number of ambulatory recordings of several individuals and is supplied with manual labels made by a physician. Our main contribution relies on the consistent set of experiments performed. Moreover, the results obtained in terms of beat segmentation and premature ventricular beat (PVC detection are comparable to others works reported in the literature, independently of the type of the wavelet. Finally, through an original concept of combining two wavelet functions in the segmentation stage, we achieve our best performances.

  7. Combining Wavelet Transform and Hidden Markov Models for ECG Segmentation

    Science.gov (United States)

    Andreão, Rodrigo Varejão; Boudy, Jérôme

    2006-12-01

    This work aims at providing new insights on the electrocardiogram (ECG) segmentation problem using wavelets. The wavelet transform has been originally combined with a hidden Markov models (HMMs) framework in order to carry out beat segmentation and classification. A group of five continuous wavelet functions commonly used in ECG analysis has been implemented and compared using the same framework. All experiments were realized on the QT database, which is composed of a representative number of ambulatory recordings of several individuals and is supplied with manual labels made by a physician. Our main contribution relies on the consistent set of experiments performed. Moreover, the results obtained in terms of beat segmentation and premature ventricular beat (PVC) detection are comparable to others works reported in the literature, independently of the type of the wavelet. Finally, through an original concept of combining two wavelet functions in the segmentation stage, we achieve our best performances.

  8. Hidden symmetries in the two-dimensional isotropic antiferromagnet

    CERN Document Server

    Leonel, S A; Oliveira, W; Silva, G L; Xavier, L M V

    2013-01-01

    We discuss the two-dimensional isotropic antiferromagnet in the framework of gauge invariance. Gauge invariance is one of the most subtle useful concepts in theoretical physics, since it allows one to describe the time evolution of complex physical systesm in arbitrary sequences of reference frames. All theories of the fundamental interactions rely on gauge invariance. In Dirac's approach, the two-dimensional isotropic antiferromagnet is subject to second class constraints, which are independent of the Hamiltonian symmetries and can be used to eliminate certain canonical variables from the theory. We have used the symplectic embedding formalism developed by a few of us to make the system under study gauge-invariant. After carrying out the embedding and Dirac analysis, we systematically show how second class constraints can generate hidden symmetries. We obtain the invariant second-order Lagrangian and the gauge-invariant model Hamiltonian. Finally, for a particular choice of factor ordering, we derive the fun...

  9. Survey of Techniques for Deep Web Source Selection and Surfacing the Hidden Web Content

    OpenAIRE

    Khushboo Khurana; M. B. Chandak

    2016-01-01

    Large and continuously growing dynamic web content has created new opportunities for large-scale data analysis in the recent years. There is huge amount of information that the traditional web crawlers cannot access, since they use link analysis technique by which only the surface web can be accessed. Traditional search engine crawlers require the web pages to be linked to other pages via hyperlinks causing large amount of web data to be hidden from the crawlers. Enormous data is available in...

  10. Review on hidden trouble detection and health diagnosis of hydraulic concrete structures

    Institute of Scientific and Technical Information of China (English)

    WU; ZhongRu; LI; Ji; GU; ChongShi; SU; HuaiZhi

    2007-01-01

    A large number of hydraulic concrete structures have hidden defects such as cracks,erosion,freeze and thaw,thermal fatigue,carbonization.These hidden defects seriously affect the strength,stability and durability of structures.These problems are studied mainly by single monitoring or diagnosis methods at present.The integration of multiple monitoring and diagnosis methods is not applied widely.Besides,the analysis theory on these problems is not developed very well.The systemic study on the aging mechanism of hydraulic concrete structures,timevariation model and health diagnosis is still not enough.The support for engineering practice is limited.Aimed at these major scientific and technological problems and combined with specific projects,study on detection of hidden defects and health diagnosis of hydraulic concrete structure has been carried out.This study includes the following content: field non-destructive examination of hidden defects of hydraulic concrete structures,seepage detection,the construction of in-situ sensing system,the combination of field detection and in-situ monitoring,the mechanism of crack,freeze and thaw,erosion and carbonization of hydraulic concrete structure,mechanism of combination aging; time-variation model of hydraulic concrete structure,theories and methods for health diagnosis of hydraulic concrete structures.

  11. Uncovering diversity in the development of central noradrenergic neurons and their efferents.

    Science.gov (United States)

    Robertson, Sabrina D; Plummer, Nicholas W; Jensen, Patricia

    2016-06-15

    Uncovering the mechanisms that underlie central noradrenergic neuron heterogeneity is essential to understanding selective subtype vulnerability to disease and environmental insult. Using recombinase-based intersectional genetic fate mapping we have previously demonstrated that molecularly distinct progenitor populations give rise to mature noradrenergic neurons differing in their anatomical location, axon morphology and efferent projection pattern. Here we review the findings from our previous study and extend our analysis of the noradrenergic subpopulation defined by transient developmental expression of Hoxb1. Using a combination of intersectional genetic fate mapping and analysis of a targeted loss of function mutation in Hoxb1, we have now uncovered additional heterogeneity based on the requirement of some noradrenergic neurons for Hoxb1 expression. By comparing the distribution of noradrenergic neurons derived from the Hoxb1 expression domain in wild-type and mutant mice, we demonstrate that Hoxb1 expression is required by a subset of neurons in the pons. Additional fate mapping, using a Hoxb1 enhancer element that drives Cre recombinase expression exclusively in rhombomere 4 of the hindbrain, reveals the existence of a subpopulation of noradrenergic neurons in the pons with more restricted axonal targets than the full Hoxb1-derived subpopulation. The unique projection profile of this newly defined subpopulation suggests that it may be functionally distinct. These analyses shed new light on the molecular determinants of noradrenergic identity in the pons and the overall complexity of the central noradrenergic system. This article is part of a Special Issue entitled SI: Noradrenergic System. PMID:26612521

  12. From detecting astrocyte connectivity to uncovering drug effects in living tissues

    CERN Document Server

    Pires, Marcelo; Vaz, Sandra; Sebastião, Ana; Lind, Pedro G

    2013-01-01

    We introduce a simple procedure of multivariate signal analysis to uncover the connectivity structure among cells composing a living tissue and describe how to apply it for extracting insight on the effect of drugs in the tissue. The procedure is based in the covariance matrix of time resolved activity signals. By determining the time-lag that maximizes covariance one derives the weight of the corresponding connection between cells. Introducing simple constraints, it is possible to conclude if pairs of cells are connected or not and in which direction. After testing the method against synthetic data we apply it to study propagation of $Ca^{2+}$ waves in astrocytes, with the aim of uncovering the cell connectivity structure. Our method shows to be particularly suited for this type of networking signal propagation where signals are pulse-like and have short time-delays, and is shown to be superior to standard methods, namely a multivariate Granger algorithm. Finally, based the statistical analysis of the connec...

  13. Atlas of solar hidden photon emission

    Science.gov (United States)

    Redondo, Javier

    2015-07-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0-1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  14. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  15. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  16. Modeling electricity markets with hidden Markov model

    International Nuclear Information System (INIS)

    This paper proposes to model the movements of electricity markets as partially observable Markov processes driven by underlying economic forces. An electricity market is modeled as a dynamic system evolving over time according to Markov processes. At any time interval, the electricity market can be in one state and transition to another state in the next time interval. This paper models the states of an electricity market as partially observable, while each state has incomplete observations such as market-clearing price and quantity. The true market states are hidden from a market participant behind the incomplete observation. The hidden Markov model (HMM) is of a more fundamental approach and focuses on capturing the interaction of supply and demand forces on electricity markets. Such an approach is appropriate because the simultaneous production and consumption of electricity eliminates the storage sector, while limited transmission networks segment electricity markets. This model is shown to be able to link the fundamental drivers to the price behaviors; therefore, it provides forecast power for mid-term and long-term price movements. This work applies HMM to historical data from New York independent system operator (NYISO), and examples are given to illustrate the forecast power of HMM. (author)

  17. Hidden percolation transition in kinetic replication process

    International Nuclear Information System (INIS)

    The one-dimensional kinetic contact process with parallel update is introduced and studied by the mean-field approximation and Monte Carlo (MC) simulations. Contrary to a more conventional scenario with single active phase for 1d models with Ising-like variables, we find two different adjacent active phases in the parameter space of the proposed model with a second-order transition between them and a multiphase point where the active and the absorbing phases meet. While one of the active phases is quite standard with a smooth average filling of the space–time lattice, the second active phase demonstrates a very subtle (hidden) percolating order which becomes manifest only after certain transformation from the original model. We determine the percolation order parameter for active–active phase transition and discuss such hidden orders in other low-dimensional systems. Our MC data demonstrate finite-size critical and near-critical scaling of the order parameter relaxation for the two phase transitions. We find three independent critical indices for them and conclude that they both belong to the directed percolation universality class. (paper)

  18. Narrow baryonia with open hidden strangeness

    International Nuclear Information System (INIS)

    A search for baryonia with open and hidden strangeness decaying into strange particles has been carried out in a neutron beam with a mean momentum of 40 GeV/c with the BIS-2 spectrometer at the Serpukhov accelerator. There is a strong indication of the existence of baryonia with negative (Ms) and positive (M-bars) strangeness, decaying respectively into Λp-bar + pions and Λ-barp + pions. The isotopic spin of the strange baryonia is ≥ 3/2. Their mean mass is (3060 ±5 (st.) ± 20 (syst.)) MeV/c2. There is an indication of the existence of narrow baryonium with hidden strangeness (Mφ), decaying into Λp-barK+(+π±), Λ-barpK-(+π±) and K0spp-barK±. The mean value of its mass is (3260 ±5 (st.) ±20 (syst.)) MeV/c2. The widths of the searched baryonia are (35 ± 5) MeV/c. The production cross-sections the baryonia in the kinematic region XF ≥0.2 and Pt ≤ 1 GeV/c, are (0.3 - 1.0) μb/per nucleon (90% C.L.). 33 refs.; 9 figs.; 4 tabs

  19. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  20. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  1. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  2. Low energy theorems of hidden local symmetries

    International Nuclear Information System (INIS)

    We prove to all orders of the loop expansion the low energy theorems of hidden local symmetries in four-dimensional nonlinear sigma models based on the coset space G/H, with G and H being arbitrary compact groups. Although the models are non-renormalizable, the proof is done in an analogous manner to the renormalization proof of gauge theories and two-dimensional nonlinear sigma models by restricting ourselves to the operators with two derivatives (counting a hidden gauge boson field as one derivative), i.e., with dimension 2, which are the only operators relevant to the low energy limit. Through loop-wise mathematical induction based on the Ward-Takahashi identity for the BRS symmetry, we solve renormalization equation for the effective action up to dimension-2 terms plus terms with the relevant BRS sources. We then show that all the quantum corrections to the dimension-2 operators, including the finite parts as well as the divergent ones, can be entirely absorbed into a re-definition (renormalization) of the parameters and the fields in the dimension-2 part of the tree-level Lagrangian. (author)

  3. Hidden percolation transition in kinetic replication process

    Science.gov (United States)

    Timonin, P. N.; Chitov, G. Y.

    2015-04-01

    The one-dimensional kinetic contact process with parallel update is introduced and studied by the mean-field approximation and Monte Carlo (MC) simulations. Contrary to a more conventional scenario with single active phase for 1d models with Ising-like variables, we find two different adjacent active phases in the parameter space of the proposed model with a second-order transition between them and a multiphase point where the active and the absorbing phases meet. While one of the active phases is quite standard with a smooth average filling of the space-time lattice, the second active phase demonstrates a very subtle (hidden) percolating order which becomes manifest only after certain transformation from the original model. We determine the percolation order parameter for active-active phase transition and discuss such hidden orders in other low-dimensional systems. Our MC data demonstrate finite-size critical and near-critical scaling of the order parameter relaxation for the two phase transitions. We find three independent critical indices for them and conclude that they both belong to the directed percolation universality class.

  4. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  5. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  6. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  7. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  8. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  9. Hidden Agendas in Marriage: Affective and Longitudinal Dimensions.

    Science.gov (United States)

    Krokoff, Lowell J.

    1990-01-01

    Examines how couples' discussions of troublesome problems reveal hidden agendas (issues not directly discussed or explored). Finds disgust and contempt are at the core of both love and respect agendas for husbands and wives. Finds that wives' more than husbands' hidden agendas are directly predictive of how negatively they argue at home. (SR)

  10. Hidden symmetries in minimal five-dimensional supergravity

    International Nuclear Information System (INIS)

    We study the hidden symmetries arising in the dimensional reduction of d=5, N=2 supergravity to three dimensions. Extending previous partial results for the bosonic part, we give a derivation that includes fermionic terms, shedding light on the appearance of the local hidden symmetry SO(4) in the reduction

  11. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  12. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  13. 'Hidden poverty' of teachers: Status, consequences and overcoming strategies

    Directory of Open Access Journals (Sweden)

    Bogunović Blanka

    2008-01-01

    Full Text Available The consequences of reduced financial and other possibilities in the period of social transition are reflected on the quality of life and work of teachers, and thereby indirectly on education of pupils as well. Aims: (1 to determine teachers' estimation of their own financial status and subjective perception of teachers' poverty; (2 to examine in which way the personal perception of poverty of teachers is linked with the quality of their engagement in curricular and extracurricular activities; (3 to examine which economic and psychological strategies teachers use in overcoming stress because of the lower financial status; (4 to examine whether there are differences between teachers with regard to socio-demographic variables and the previously established goals. Sample consists of 141 teachers of music and general education schools in Belgrade and the interior of the country. Method: research is explorative and uses qualitative and psychometric methods of analysis. Results point out to the structure of 'hidden poverty' of teachers: average and poor financial status, financial and logistic support of the extended family, additional job, unfulfilled financial expectations regarding the educational status and ungratified higher needs. Teachers estimate that real poverty of educational system and 'hidden poverty' of teachers are reflected on the quality of certain aspects of educational process as a whole and in certain elements: teacher's personal life and work motivation, authority in school, quality of teacher's engagement in tuition and the possibility of professional specialization. Teachers use financial and psychological strategies for overcoming stress that can be determined as: moralist compensatory, evasive, inappropriate, emotional, relying on family and friendly supportive systems and activist. Conclusion: primarily subjective and spiritual impoverishment of the stratum of highly educated people, who are, in addition to this, the bearers

  14. A Fast SVD-Hidden-nodes based Extreme Learning Machine for Large-Scale Data Analytics.

    Science.gov (United States)

    Deng, Wan-Yu; Bai, Zuo; Huang, Guang-Bin; Zheng, Qing-Hua

    2016-05-01

    Big dimensional data is a growing trend that is emerging in many real world contexts, extending from web mining, gene expression analysis, protein-protein interaction to high-frequency financial data. Nowadays, there is a growing consensus that the increasing dimensionality poses impeding effects on the performances of classifiers, which is termed as the "peaking phenomenon" in the field of machine intelligence. To address the issue, dimensionality reduction is commonly employed as a preprocessing step on the Big dimensional data before building the classifiers. In this paper, we propose an Extreme Learning Machine (ELM) approach for large-scale data analytic. In contrast to existing approaches, we embed hidden nodes that are designed using singular value decomposition (SVD) into the classical ELM. These SVD nodes in the hidden layer are shown to capture the underlying characteristics of the Big dimensional data well, exhibiting excellent generalization performances. The drawback of using SVD on the entire dataset, however, is the high computational complexity involved. To address this, a fast divide and conquer approximation scheme is introduced to maintain computational tractability on high volume data. The resultant algorithm proposed is labeled here as Fast Singular Value Decomposition-Hidden-nodes based Extreme Learning Machine or FSVD-H-ELM in short. In FSVD-H-ELM, instead of identifying the SVD hidden nodes directly from the entire dataset, SVD hidden nodes are derived from multiple random subsets of data sampled from the original dataset. Comprehensive experiments and comparisons are conducted to assess the FSVD-H-ELM against other state-of-the-art algorithms. The results obtained demonstrated the superior generalization performance and efficiency of the FSVD-H-ELM. PMID:26907860

  15. Hidden Diversity in Sardines: Genetic and Morphological Evidence for Cryptic Species in the Goldstripe Sardinella, Sardinella gibbosa (Bleeker, 1849)

    Science.gov (United States)

    Thomas, Rey C.; Willette, Demian A.; Carpenter, Kent E.; Santos, Mudjekeewis D.

    2014-01-01

    Cryptic species continue to be uncovered in many fish taxa, posing challenges for fisheries conservation and management. In Sardinella gibbosa, previous investigations revealed subtle intra-species variations, resulting in numerous synonyms and a controversial taxonomy for this sardine. Here, we tested for cryptic diversity within S. gibbosa using genetic data from two mitochondrial and one nuclear gene regions of 248 individuals of S. gibbosa, collected from eight locations across the Philippine archipelago. Deep genetic divergence and subsequent clustering was consistent across both mitochondrial and nuclear markers. Clade distribution is geographically limited: Clade 1 is widely distributed in the central Philippines, while Clade 2 is limited to the northernmost sampling site. In addition, morphometric analyses revealed a unique head shape that characterized each genetic clade. Hence, both genetic and morphological evidence strongly suggests a hidden diversity within this common and commercially-important sardine. PMID:24416271

  16. Hidden diversity in sardines: genetic and morphological evidence for cryptic species in the goldstripe sardinella, Sardinella gibbosa (Bleeker, 1849.

    Directory of Open Access Journals (Sweden)

    Rey C Thomas

    Full Text Available Cryptic species continue to be uncovered in many fish taxa, posing challenges for fisheries conservation and management. In Sardinella gibbosa, previous investigations revealed subtle intra-species variations, resulting in numerous synonyms and a controversial taxonomy for this sardine. Here, we tested for cryptic diversity within S. gibbosa using genetic data from two mitochondrial and one nuclear gene regions of 248 individuals of S. gibbosa, collected from eight locations across the Philippine archipelago. Deep genetic divergence and subsequent clustering was consistent across both mitochondrial and nuclear markers. Clade distribution is geographically limited: Clade 1 is widely distributed in the central Philippines, while Clade 2 is limited to the northernmost sampling site. In addition, morphometric analyses revealed a unique head shape that characterized each genetic clade. Hence, both genetic and morphological evidence strongly suggests a hidden diversity within this common and commercially-important sardine.

  17. $\\mathcal{PT}$-systems without parity symmetry: topological states, hidden symmetry, and the $\\mathcal{PT}$ phase diagram

    CERN Document Server

    Joglekar, Yogesh N

    2015-01-01

    $\\mathcal{PT}$-symmetric systems, until now, have been characterized by a real, parity-symmetric, kinetic Hamiltonian and a non-Hermitian, balanced gain-loss potential. We present a new class of discrete models in which the tunneling Hamiltonian is not parity-symmetric, and yet the models have a nonzero $\\mathcal{PT}$-breaking threshold in presence of a pair of gain-loss impurities $\\pm i\\gamma$ located at reflection-symmetric sites. We uncover a hidden symmetry that is instrumental to the finite threshold strength. We show that such models have topological edge-states that remain robust in the $\\mathcal{PT}$-broken phase. Our predictions substantially broaden possible realizations of a $\\mathcal{PT}$ system, particularly in optical waveguide arrays or coupled microstructures, by eliminating the parity-symmetry constraint.

  18. An uncovered XIII century icon: Particular use of organic pigments and gilding techniques highlighted by analytical methods

    Science.gov (United States)

    Daveri, Alessia; Doherty, Brenda; Moretti, Patrizia; Grazia, Chiara; Romani, Aldo; Fiorin, Enrico; Brunetti, Brunetto Giovanni; Vagnini, Manuela

    2015-01-01

    The restoration of a panel painting depicting a Madonna and Child listed as an unknown Tuscan artist of the nineteenth century, permitted the hidden original version, a XIII century Medieval icon to be uncovered. It is discovery provided the opportunity for an extensive in situ campaign of non-invasive analytical investigations by portable imaging and spectroscopic techniques (infrared, X-ray fluorescence and diffraction, UV-Vis absorption and emission), followed by aimed micro-destructive investigations (Raman and SEM-EDS). This approach permitted characterization of the original ground and paint layers by complementary techniques. Furthermore, this protocol allowed supplementary particularities of great interest to be highlighted. Namely, numerous original gilding techniques have been accentuated in diverse areas and include the use of surrogate gold (disulphur tin), orpiment as a further false gold and an area with an original silver rich layer. Moreover, pigments including azurite mixed with indigo have been non-invasively identified. Micro-invasive analyses also allowed the diagnosis of organic colorants, namely, an animal anthraquinone lake, kermes and an unusual vegetal chalcone pigment, possibly safflower. The identification of the latter is extremely rare as a painting pigment and has been identified using an innovative adaption to surface enhanced Raman techniques on a cross-section. The resulting data contributes new hypotheses to the historic and artistic knowledge of materials and techniques utilized in XIII century icon paintings and ultimately provides scientific technical support of the recent restoration.

  19. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    Recent developments show that many liquids and solids have an approximate “hidden” scale invariance that implies the existence of lines in the thermodynamic phase diagram, so-called isomorphs, along which structure and dynamics in properly reduced units are invariant to a good approximation. This...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...... means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...

  20. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  1. The elliptic genus and Hidden symmetry

    International Nuclear Information System (INIS)

    We study the elliptic genus (a partition function) in certain interacting, twist quantum field theories. Without twists, these theories have N=2 supersymmetry. The twists provide a regularization, and also partially break the supersymmetry. In spite of the regularization, one can establish a homotopy of the elliptic genus in a coupling parameter. Our construction relies on a priori estimates and other methods from constructive quantum field theory; this mathematical underpinning allows us to justify evaluating the elliptic genus at one endpoint of the homotopy. We obtain a version of Witten's proposed formula for the elliptic genus in terms of classical theta functions. As a consequence, the elliptic genus has a hidden SL(2,Z) symmetry characteristic of conformal theory, even though the underlying theory is not conformal. (orig.)

  2. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  3. Neuroevolution Mechanism for Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-12-01

    Full Text Available Hidden Markov Model (HMM is a statistical model based on probabilities. HMM is becoming one of the major models involved in many applications such as natural language
    processing, handwritten recognition, image processing, prediction systems and many more. In this research we are concerned with finding out the best HMM for a certain application domain. We propose a neuroevolution process that is based first on converting the HMM to a neural network, then generating many neural networks at random where each represents a HMM. We proceed by
    applying genetic operators to obtain new set of neural networks where each represents HMMs, and updating the population. Finally select the best neural network based on a fitness function.

  4. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  5. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  6. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  7. Plume mapping via hidden Markov methods.

    Science.gov (United States)

    Farrell, J A; Pang, Shuo; Li, Wei

    2003-01-01

    This paper addresses the problem of mapping likely locations of a chemical source using an autonomous vehicle operating in a fluid flow. The paper reviews biological plume-tracing concepts, reviews previous strategies for vehicle-based plume tracing, and presents a new plume mapping approach based on hidden Markov methods (HMM). HMM provide efficient algorithms for predicting the likelihood of odor detection versus position, the likelihood of source location versus position, the most likely path taken by the odor to a given location, and the path between two points most likely to result in odor detection. All four are useful for solving the odor source localization problem using an autonomous vehicle. The vehicle is assumed to be capable of detecting above threshold chemical concentration and sensing the fluid flow velocity at the vehicle location. The fluid flow is assumed to vary with space and time, and to have a high Reynolds number (Re>10). PMID:18238238

  8. Holographic superconductors with hidden Fermi surfaces

    CERN Document Server

    Fan, ZhongYing

    2013-01-01

    In this paper, we investigate a holographic model of superconductor with hidden Fermi surfaces, which was defined by the logarithmic violation of area law of entanglement entropy. We works in fully back-reacted background using standard Einstein-Maxwell-Dilaton action with additional complex scalar filed which was charged under the Maxwell field. Particularly, we analyze the behavior of entanglement entropy during the phase transition. At the critical point, the finite part of the entanglement entropy has a discontinuity of slope and tends to a lower value in the superconducting phase all the way down to the zero temperature limit, indicating the reorganization of degrees of freedom of the system across the phase transition.

  9. Natural inflation with hidden scale invariance

    Science.gov (United States)

    Barrie, Neil D.; Kobakhidze, Archil; Liang, Shelley

    2016-05-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns - 1 ≈ - 0.025(N⋆/60)-1 and r ≈ 0.0667(N⋆/60)-1, where N⋆ ≈ 30- 65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  10. Hidden symmetries in two dimensional field theory

    International Nuclear Information System (INIS)

    The bosonization process elegantly shows the equivalence of massless scalar and fermion fields in two space-time dimensions. However, with multiple fermions the technique often obscures global symmetries. Witten's non-Abelian bosonization makes these symmetries explicit, but at the expense of a somewhat complicated bosonic action. Frenkel and Kac have presented an intricate mathematical formalism relating the various approaches. Here, I reduce these arguments to the simplest case of a single massless scalar field. In particular, using only elementary quantum field theory concepts, I expose a hidden SU (2) x SU (2) chiral symmetry in this trivial theory. I then discuss in what sense this field should be interpreted as a Goldstone boson

  11. Hidden gauge symmetry in holomorphic models

    Energy Technology Data Exchange (ETDEWEB)

    Margalli, Carlos A.; Vergara, J. David, E-mail: vergara@nucleares.unam.mx

    2015-10-16

    Highlights: • We have found a new gauge symmetry in holomorphic models. • This complex gauge symmetry connects different real systems. • The gauge condition determines the type of hermiticity of the variables. • The procedure is generalizable to any dimension. - Abstract: We study the effect of a hidden gauge symmetry on complex holomorphic systems. For this purpose, we show that intrinsically any holomorphic system has this gauge symmetry. We establish that this symmetry is related to the Cauchy–Riemann equations, in the sense that the associated constraint is a first class constraint only in the case that the potential be holomorphic. As a consequence of this gauge symmetry on the complex space, we can fix the gauge condition in several ways and project from the complex phase-space to real phase space. Different projections are gauge related on the complex phase-space but are not directly related on the real physical phase-space.

  12. A New Hidden Markov Model for Protein Quality Assessment Using Compatibility Between Protein Sequence and Structure

    OpenAIRE

    He, Zhiquan; Ma, Wenji; Zhang, Jingfen; Xu, Dong

    2014-01-01

    Protein structure Quality Assessment (QA) is an essential component in protein structure prediction and analysis. The relationship between protein sequence and structure often serves as a basis for protein structure QA. In this work, we developed a new Hidden Markov Model (HMM) to assess the compatibility of protein sequence and structure for capturing their complex relationship. More specifically, the emission of the HMM consists of protein local structures in angular space, secondary struct...

  13. Implementation of a Connected Digit Recognizer Using Continuous Hidden Markov Modeling

    OpenAIRE

    Srichai, Panaithep Albert

    1998-01-01

    This thesis describes the implementation of a speaker dependent connected-digit recognizer using continuous Hidden Markov Modeling (HMM). The speech recognition system was implemented using MATLAB and on the ADSP-2181, a digital signal processor manufactured by Analog Devices. Linear predictive coding (LPC) analysis was first performed on a speech signal to model the characteristics of the vocal tract filter. A 7 state continuous HMM with 4 mixture density components was used to model e...

  14. AdS/QCD approach to the scale invariant extension of the standard model with a strongly interacting hidden sector

    CERN Document Server

    Hatanaka, Hisaki; Ko, Pyungwon

    2016-01-01

    In this paper, we revisit a scale-invariant extension of the standard model (SM) with a strongly interacting hidden sector within AdS/QCD approach. Using the AdS/QCD, we reduce the number of input parameters to three, i.e. hidden pion decay constant, hidden pion mass and $\\tan\\beta$ that is defined as the ratio of the vacuum expectation values (VEV) of the singlet scalar field and the SM Higgs boson. As a result, our model has sharp predictability. We perform the phenomenological analysis of the hidden pions which is one of the dark matter (DM) candidates in this model. With various theoretical and experimental constraints we search for the allowed parameter space and find that both resonance and non-resonance solutions are possible. Some typical correlations among various observables such as thermal relic density of hidden pions, Higgs signal strengths and DM-nucleon cross section are investigated. We provide some benchmark points for experimental tests.

  15. Multivariate weighted recurrence network inference for uncovering oil-water transitional flow behavior in a vertical pipe.

    Science.gov (United States)

    Gao, Zhong-Ke; Yang, Yu-Xuan; Cai, Qing; Zhang, Shan-Shan; Jin, Ning-De

    2016-06-01

    Exploring the dynamical behaviors of high water cut and low velocity oil-water flows remains a contemporary and challenging problem of significant importance. This challenge stimulates us to design a high-speed cycle motivation conductance sensor to capture spatial local flow information. We systematically carry out experiments and acquire the multi-channel measurements from different oil-water flow patterns. Then we develop a novel multivariate weighted recurrence network for uncovering the flow behaviors from multi-channel measurements. In particular, we exploit graph energy and weighted clustering coefficient in combination with multivariate time-frequency analysis to characterize the derived complex networks. The results indicate that the network measures are very sensitive to the flow transitions and allow uncovering local dynamical behaviors associated with water cut and flow velocity. These properties render our method particularly useful for quantitatively characterizing dynamical behaviors governing the transition and evolution of different oil-water flow patterns. PMID:27368782

  16. The hidden curriculum in radiology residency programs: A path to isolation or integration?

    Energy Technology Data Exchange (ETDEWEB)

    Van Deven, T. [Department of Medical Imaging, Schulich School of Medicine and Dentistry (Canada); Hibbert, K., E-mail: khibbert@uwo.ca [Faculty of Education, Schulich School of Medicine and Dentistry (Canada); Faden, L. [Faculty of Education, The University of Western Ontario (Canada); Chhem, R.K. [Institute of History, Philosophy and Ethics of Medicine, Ulm University, Ulm (Germany)

    2013-05-15

    Purpose: In this qualitative case study involving five academic Radiology centres across Canada, the authors seek to identify the hidden curriculum. Methods: A qualitative case study methodology was used for its potential to explore and provide rich descriptions and allow for the in-depth analysis of multiple data sources that include official institutional documents, surveys, observations and interviews (including undergraduate students, postgraduate, radiologists, imaging scientists, residents, faculty and administrators). This study relied on 48 interviews and involved primary data analysis by the core research team, and a secondary analysis by external examiners. Results: The results revealed that in four of the five major centres studied, a hidden curriculum of isolation prevailed, reinforcing an image of the radiologist as an independent operator within an organization dependent upon collaboration for optimal performance. The fifth site exhibited a hidden curriculum of collaboration and support, although the messages received were conflicting when addressing issues around teaching. Conclusions: The authors conclude by noting two possibilities for medical imaging departments to consider that of isolation or that of integration. They examine the implications of each and propose a way forward that situates Radiology as the crossroads of medicine. As such, the need for a new, generative metaphor reasserts the importance of recognizing the role and function of scholarship in teaching and learning contexts across Canada.

  17. The hidden curriculum in radiology residency programs: A path to isolation or integration?

    International Nuclear Information System (INIS)

    Purpose: In this qualitative case study involving five academic Radiology centres across Canada, the authors seek to identify the hidden curriculum. Methods: A qualitative case study methodology was used for its potential to explore and provide rich descriptions and allow for the in-depth analysis of multiple data sources that include official institutional documents, surveys, observations and interviews (including undergraduate students, postgraduate, radiologists, imaging scientists, residents, faculty and administrators). This study relied on 48 interviews and involved primary data analysis by the core research team, and a secondary analysis by external examiners. Results: The results revealed that in four of the five major centres studied, a hidden curriculum of isolation prevailed, reinforcing an image of the radiologist as an independent operator within an organization dependent upon collaboration for optimal performance. The fifth site exhibited a hidden curriculum of collaboration and support, although the messages received were conflicting when addressing issues around teaching. Conclusions: The authors conclude by noting two possibilities for medical imaging departments to consider that of isolation or that of integration. They examine the implications of each and propose a way forward that situates Radiology as the crossroads of medicine. As such, the need for a new, generative metaphor reasserts the importance of recognizing the role and function of scholarship in teaching and learning contexts across Canada

  18. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  19. Multilayer neural networks with extensively many hidden units.

    Science.gov (United States)

    Rosen-Zvi, M; Engel, A; Kanter, I

    2001-08-13

    The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions, whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an overlap in the space of Boolean functions as order parameter, the storage capacity is found to scale with the logarithm of the number of implementable Boolean functions. The generalization behavior is smooth for continuous couplings and shows a discontinuous transition to perfect generalization for discrete ones. PMID:11497920

  20. Naturally light hidden photons in LARGE volume string compactifications

    International Nuclear Information System (INIS)

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  1. Multilayer Neural Networks with Extensively Many Hidden Units

    International Nuclear Information System (INIS)

    The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions, whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an overlap in the space of Boolean functions as order parameter, the storage capacity is found to scale with the logarithm of the number of implementable Boolean functions. The generalization behavior is smooth for continuous couplings and shows a discontinuous transition to perfect generalization for discrete ones

  2. Hidden Hot Dark Matter as Cold Dark Matter

    OpenAIRE

    Sigurdson, Kris

    2009-01-01

    We show that hidden hot dark matter, hidden-sector dark matter with interactions that decouple when it is relativistic, is a viable dark matter candidate provided it has never been in thermal equilibrium with the particles of the standard model. This hidden hot dark matter may reheat to a lower temperature and number density than the visible Universe and thus account, simply with its thermal abundance, for all the dark matter in the Universe while evading the typical constraints on hot dark m...

  3. Quantum Network Coding on Networks with Arbitrarily Distributed Hidden Channels

    International Nuclear Information System (INIS)

    Although perfect quantum network coding has been proved to be achievable, it is still puzzling whether it is feasible whenever one or more of the channels are replaced by the hidden ones emerging from quantum entanglement. The question is answered in this paper. First, we propose a quantum network coding protocol over a butterfly network with two hidden channels. Second, we investigate a more general situation, where d-level quantum letters are transmitted through the network containing arbitrarily distributed hidden channels, and prove that quantum network coding on such networks is still achievable. (general)

  4. Analysis of stability of community structure across multiple hierarchical levels

    CERN Document Server

    Li, Hui-Jia

    2015-01-01

    The analysis of stability of community structure is an important problem for scientists from many fields. Here, we propose a new framework to reveal hidden properties of community structure by quantitatively analyzing the dynamics of Potts model. Specifically we model the Potts procedure of community structure detection by a Markov process, which has a clear mathematical explanation. Critical topological information regarding to multivariate spin configuration could also be inferred from the spectral significance of the Markov process. We test our framework on some example networks and find it doesn't have resolute limitation problem at all. Results have shown the model we proposed is able to uncover hierarchical structure in different scales effectively and efficiently.

  5. Uncovering growth-suppressive MicroRNAs in lung cancer

    DEFF Research Database (Denmark)

    Liu, Xi; Sempere, Lorenzo F; Galimberti, Fabrizio;

    2009-01-01

    PURPOSE: MicroRNA (miRNA) expression profiles improve classification, diagnosis, and prognostic information of malignancies, including lung cancer. This study uncovered unique growth-suppressive miRNAs in lung cancer. EXPERIMENTAL DESIGN: miRNA arrays were done on normal lung tissues and...... adenocarcinomas from wild-type and proteasome degradation-resistant cyclin E transgenic mice to reveal repressed miRNAs in lung cancer. Real-time and semiquantitative reverse transcription-PCR as well as in situ hybridization assays validated these findings. Lung cancer cell lines were derived from each......-malignant human lung tissue bank. RESULTS: miR-34c, miR-145, and miR-142-5p were repressed in transgenic lung cancers. Findings were confirmed by real-time and semiquantitative reverse transcription-PCR as well as in situ hybridization assays. Similar miRNA profiles occurred in human normal versus malignant lung...

  6. Uncovering Transcriptional Regulatory Networks by Sparse Bayesian Factor Model

    Directory of Open Access Journals (Sweden)

    Qi Yuan(Alan

    2010-01-01

    Full Text Available Abstract The problem of uncovering transcriptional regulation by transcription factors (TFs based on microarray data is considered. A novel Bayesian sparse correlated rectified factor model (BSCRFM is proposed that models the unknown TF protein level activity, the correlated regulations between TFs, and the sparse nature of TF-regulated genes. The model admits prior knowledge from existing database regarding TF-regulated target genes based on a sparse prior and through a developed Gibbs sampling algorithm, a context-specific transcriptional regulatory network specific to the experimental condition of the microarray data can be obtained. The proposed model and the Gibbs sampling algorithm were evaluated on the simulated systems, and results demonstrated the validity and effectiveness of the proposed approach. The proposed model was then applied to the breast cancer microarray data of patients with Estrogen Receptor positive ( status and Estrogen Receptor negative ( status, respectively.

  7. Using a Multi-Cathode Counter (MCC) in the Search for Hidden Photon CDM

    CERN Document Server

    Kopylov, A V; Petukhov, V V

    2015-01-01

    We report on a new technique of a Multi-Cathode Counter (MCC) developed to search for hidden photon (HP) cold dark matter (CDM) with a mass from 5 to 10 eV. The method suggested in the assumption that hidden photons of the mass greater than a work function of the metal, the cathode of the counter is fabricated induce emission of single electrons from a cathode. Three configurations of the same counter are used to measure the count rates R1, R2 and R3 of the single electron events sequentially each week, where the difference R1- R2 measures the effect from HP and R3 is used as a reference sequence to monitor the counting process. At present the work is aimed to refine the procedure of data treatment and to look for long term variations which should be accounted for in the final analysis of data.

  8. Hidden semi-Markov Model based earthquake classification system using Weighted Finite-State Transducers

    Directory of Open Access Journals (Sweden)

    M. Beyreuther

    2011-02-01

    Full Text Available Automatic earthquake detection and classification is required for efficient analysis of large seismic datasets. Such techniques are particularly important now because access to measures of ground motion is nearly unlimited and the target waveforms (earthquakes are often hard to detect and classify. Here, we propose to use models from speech synthesis which extend the double stochastic models from speech recognition by integrating a more realistic duration of the target waveforms. The method, which has general applicability, is applied to earthquake detection and classification. First, we generate characteristic functions from the time-series. The Hidden semi-Markov Models are estimated from the characteristic functions and Weighted Finite-State Transducers are constructed for the classification. We test our scheme on one month of continuous seismic data, which corresponds to 370 151 classifications, showing that incorporating the time dependency explicitly in the models significantly improves the results compared to Hidden Markov Models.

  9. Hidden Markov Model Application to Transfer The Trader Online Forex Brokers

    OpenAIRE

    Farida Suharleni; Agus Widodo; Endang Wahyu H

    2012-01-01

    Hidden Markov Model is elaboration of Markov chain, which is applicable to cases that can’t directly observe. In this research, Hidden Markov Model is used to know trader’s transition to broker forex online. In Hidden Markov Model, observed state is observable part and hidden state is hidden part. Hidden Markov Model allows modeling system that contains interrelated observed state and hidden state. As observed state in trader’s transition to broker forex online is category 1, category 2, cate...

  10. Nonlinear dynamics of hidden modes in a system with internal symmetry

    Science.gov (United States)

    Perchikov, Nathan; Gendelman, O. V.

    2016-09-01

    We consider a discrete dynamical system with internal degrees of freedom (DOF). Due to the symmetry between the internal DOFs, certain internal modes cannot be excited by external forcing (in a case of linear interactions) and thus are considered "hidden". If such a system is weakly asymmetric, the internal modes remain approximately "hidden" from the external excitation, given that small damping is taken into account. However, already in the case of weak cubic nonlinearity, these hidden modes can be excited, even as the exact symmetry is preserved. This excitation occurs through parametric resonance. Floquet analysis reveals instability patterns for the explored modes. To perform this analysis with the required accuracy, we suggest a special method for obtaining the Fourier series of the unperturbed solution for the nonlinear normal mode. This method does not require explicit integration of the arising quadratures. Instead, it employs expansion of the solution at the stage of the implicit quadrature in terms of Chebyshev polynomials. The emerging implicit equations are solved by using a fixed-point iteration scheme. Poincaré sections help to clarify the correspondence between the loss of stability of the modes and the global structure of the dynamical flow. In particular, the conditions for intensive energy exchange in the system are characterized.

  11. DNA Looping Kinetics Analyzed Using Diffusive Hidden Markov Model

    CERN Document Server

    Beausang, J F; Finzi, L; Manzo, C; Nelson, P C; Zurla, C; Beausang, John F.; Dunlap, David; Finzi, Laura; Manzo, Carlo; Nelson, Philip C.; Zurla, Chiara

    2007-01-01

    Tethered particle experiments use light microscopy to measure the position of a micrometer-sized bead tethered to a microscope slide via a ~micrometer length polymer, in order to infer the behavior of the invisible polymer. Currently, this method is used to measure rate constants of DNA loop formation and breakdown mediated by repressor protein that binds to the DNA. We report a new technique for measuring these rates using a modified hidden Markov analysis that directly incorporates the diffusive motion of the bead, which is an inherent complication of tethered particle motion because it occurs on a time scale between the sampling frequency and the looping time. We compare looping lifetimes found with our method, which are consistent over a range of sampling frequencies, to those obtained via the traditional threshold-crossing analysis, which vary depending on how the raw data are filtered in the time domain. Our method does not involve such filtering, and so can detect short-lived looping events and sudden ...

  12. Drum Sound Detection in Polyphonic Music with Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Jouni Paulus

    2009-01-01

    Full Text Available This paper proposes a method for transcribing drums from polyphonic music using a network of connected hidden Markov models (HMMs. The task is to detect the temporal locations of unpitched percussive sounds (such as bass drum or hi-hat and recognise the instruments played. Contrary to many earlier methods, a separate sound event segmentation is not done, but connected HMMs are used to perform the segmentation and recognition jointly. Two ways of using HMMs are studied: modelling combinations of the target drums and a detector-like modelling of each target drum. Acoustic feature parametrisation is done with mel-frequency cepstral coefficients and their first-order temporal derivatives. The effect of lowering the feature dimensionality with principal component analysis and linear discriminant analysis is evaluated. Unsupervised acoustic model parameter adaptation with maximum likelihood linear regression is evaluated for compensating the differences between the training and target signals. The performance of the proposed method is evaluated on a publicly available data set containing signals with and without accompaniment, and compared with two reference methods. The results suggest that the transcription is possible using connected HMMs, and that using detector-like models for each target drum provides a better performance than modelling drum combinations.

  13. Discovering Hidden Networks in On-line Social Networks

    Directory of Open Access Journals (Sweden)

    Pooja Wadhwa

    2014-04-01

    Full Text Available Rapid developments in information technology and Web 2.0 have provided a platform for the evolution of terrorist organizations, extremists from a traditional pyramidal structure to a technology enabled networked structure. Growing presence of these subversive groups on social networking sites has emerged as one of the prominent threats to the society, governments and law enforcement agencies across the world. Identifying messages relevant to the domain of security can serve as a stepping stone in criminal network analysis. In this paper, we deploy a rule based approach for classifying messages in Twitter which can also successfully reveal overlapping clusters. The approach incorporates dictionaries of enriched themes where each theme is categorized by semantically related words. The message is vectorized according to the security dictionaries and is termed as ‘Security Vector’. The documents are classified in categories on the basis of security associations. Further, the approach can also be used along the temporal dimension for classifying messages into topics and rank the most prominent topics of conversation at a particular instance of time. We further employ social network analysis techniques to visualize the hidden network at a particular time. Some of the results of our approach obtained through experiment with information network of Twitter are also discussed.

  14. Isovector and hidden-beauty partners of the X(3872)

    International Nuclear Information System (INIS)

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  15. Isovector and hidden-beauty partners of the X(3872)

    Energy Technology Data Exchange (ETDEWEB)

    Høgaasen, Hallstein, E-mail: hallstein.hogasen@fys.uio.no [Department of Physics, University of Oslo, Box 1048, NO-0316 Oslo (Norway); Kou, Emi, E-mail: kou@lal.in2p3.fr [Laboratoire de l' Accélérateur Linéaire, Université Paris-Sud, IN2P3-CNRS, Centre Scientifique d' Orsay, 91898 Orsay Cedex (France); Richard, Jean-Marc, E-mail: j-m.richard@ipnl.in2p3.fr [Université de Lyon, Institut de Physique Nucléaire de Lyon, UCBL–IN2P3-CNRS, 4, rue Enrico Fermi, 69622 Villeurbanne Cedex (France); Sorba, Paul, E-mail: paul.sorba@lapth.cnrs.fr [LAPTh, Laboratoire d' Annecy-le-Vieux de Physique Théorique, CNRS, Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France)

    2014-05-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  16. Even 'Good' Insurance Comes with Hidden Hospital Bills

    Science.gov (United States)

    ... medlineplus.gov/news/fullstory_159575.html Even 'Good' Insurance Comes With Hidden Hospital Bills Average out-of- ... June 27, 2016 (HealthDay News) -- Quality private health insurance is no protection against large out-of-pocket ...

  17. Hidden Risks of Erectile Dysfunction "Treatments" Sold Online

    Science.gov (United States)

    ... mail Consumer Updates RSS Feed Hidden Risks of Erectile Dysfunction "Treatments" Sold Online Printer-friendly PDF (297 KB) ... Men looking online for "dietary supplements" to treat erectile dysfunction (ED) or enhance their sexual performance should beware: ...

  18. Hidden Pion Varieties in Composite Models for Diphoton Resonances

    CERN Document Server

    Harigaya, Keisuke

    2016-01-01

    The diphoton excesses at 750 GeV seen in the LHC data may be the first hint for new physics at the TeV scale. We discuss variations of the model considered earlier, in which one or more diphoton excesses arise from composite pseudo Nambu-Goldstone bosons (hidden pions) associated with new strong dynamics at the TeV scale. We study the case in which the 750 GeV excess arises from a unique hidden pion leading to a diphoton final state as well as the case in which it arises from one of the hidden pions decaying into diphotons. We consider SU(N), SO(N), and Sp(N) gauge groups for the strong dynamics and find that SO(N) and Sp(N) models give extra hidden pions beyond those in the SU(N) models, which can be used to discriminate among models.

  19. Ground Plane Estimation using a Hidden Markov Model

    OpenAIRE

    Dragon, Ralf; Gool, Luc >

    2014-01-01

    Dragon R., Van Gool L., ''Ground plane estimation using a hidden Markov model'', 27th IEEE conference on computer vision and pattern recognition - CVPR 2014, pp. 4026-4033, June 23-28, 2014, Columbus, Ohio, USA.

  20. Rotating saddle trap as Foucault's pendulum: a hidden 'Coriolis' force in an inertial frame

    CERN Document Server

    Kirillov, Oleg N

    2016-01-01

    According to Earnshaw's theorem an electrostatic potential cannot have stable equilibria, i.e. the minima, since such potentials are harmonic functions. However, the 1989 Nobel Prize in physics was awarded to W. Paul for his invention of the trap for suspending charged particles in an oscillating electric field. Paul's idea was to stabilize the saddle by "vibrating" the electrostatic field, by analogy with the so-called Stephenson-Kapitsa pendulum in which the upside-down equilibrium is stabilized by vibration of the pivot. Instead of vibration, the saddle can also be stabilized by rotation of the potential (in two dimensions); this has been known for nearly a century, since 1918. Particles confined in rotating saddle traps exhibit precession in the laboratory frame, which up to now has been explained by analyzing explicit solutions. Here we show that this precession is actually due to a hidden Coriolis-like force, which we uncover by a normal form transformation. Unlike the conventional Coriolis force, this ...

  1. Reheating the Standard Model from a Hidden Sector

    OpenAIRE

    Tenkanen, Tommi; Vaskonen, Ville

    2016-01-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before Big Bang Nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful Big Bang Nucleosynthesis ...

  2. Hidden Markov Models with Factored Gaussian Mixtures Densities

    Institute of Scientific and Technical Information of China (English)

    LI Hao-zheng; LIU Zhi-qiang; ZHU Xiang-hua

    2004-01-01

    We present a factorial representation of Gaussian mixture models for observation densities in Hidden Markov Models(HMMs), which uses the factorial learning in the HMM framework. We derive the reestimation formulas for estimating the factorized parameters by the Expectation Maximization (EM) algorithm. We conduct several experiments to compare the performance of this model structure with Factorial Hidden Markov Models(FHMMs) and HMMs, some conclusions and promising empirical results are presented.

  3. Analyticity of entropy rate of hidden Markov chains

    OpenAIRE

    Han, G; Marcus, B

    2006-01-01

    We prove that under mild positivity assumptions the entropy rate of a hidden Markov chain varies analytically as a function of the underlying Markov chain parameters. A general principle to determine the domain of analyticity is stated. An example is given to estimate the radius of convergence for the entropy rate. We then show that the positivity assumptions can be relaxed, and examples are given for the relaxed conditions. We study a special class of hidden Markov chains in more detail: bin...

  4. Stabilization of stochastic systems with hidden Markovian jumps

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper considers the adaptive control of discrete-time hybrid stochastic systems with unknown randomly jumping parameters described by a finite-state hidden Markov chain. An intuitive yet longstanding conjecture in this area is that such hybrid systems can be adaptively stabilized whenever the rate of transition of the hidden Markov chain is small enough. This paper provides a rigorous positive answer to this conjecture by establishing the global stability of a gradient-algorithm-based adaptive linear-quadratic control.

  5. Conjugate boundary condition, hidden matters, and gauge-Higgs inflation

    CERN Document Server

    Abe, Yugo; Kawamura, Yoshiharu; Nishikawa, Yasunari

    2016-01-01

    We propose an idea that hidden matters can be separated according to gauge quantum numbers from the visible ones by the difference of boundary conditions on extra dimensions. We formulate 5-dimensional gauge theories yielding conjugate boundary conditions besides ordinary ones on $S^1/Z_2$, and examine physical implications concerning hidden matters on an extension of the standard model coexisting different types of boundary conditions. A model with conjugate boundary conditions is applied on a gauge-Higgs inflation scenario.

  6. Evaluation of relevance of stochastic parameters on Hidden Markov Models

    OpenAIRE

    Roblès, Bernard; Avila, Manuel; Duculty, Florent; Vrignat, Pascal; Kratz, Frédéric

    2011-01-01

    Prediction of physical particular phenomenon is based on knowledge of the phenomenon. This knowledge helps us to conceptualize this phenomenon around different models. Hidden Markov Models (HMM) can be used for modeling complex processes. This kind of models is used as tool for fault diagnosis systems. Nowadays, industrial robots living in stochastic environment need faults detection to prevent any breakdown. In this paper, we wish to evaluate relevance of Hidden Markov Models parameters, wit...

  7. Entrepreneurship and the Hidden Economy: An Extended Matching Model

    OpenAIRE

    Pugno, Maurizio; Lisi, Gaetano

    2010-01-01

    This paper develops a standard matching model to address the problem of the hidden sector (including non-registered firms but producing for legal markets), as it is characterised in Italy, i.e. framed in a rather advanced economic and institutional setting, but also linked to the socio-economic regional dualism. The main novel features of the model are that entrepreneurial ability is heterogeneous, and that regular firms receive negative externalities from the hidden sector, and positive exte...

  8. Efficient Hidden-Variable Simulation of Measurements in Quantum Experiments

    OpenAIRE

    Dakic, Borivoje; Suvakov, Milovan; Paterek, Tomasz; Brukner, Caslav

    2008-01-01

    We prove that the results of a finite set of general quantum measurements on an arbitrary dimensional quantum system can be simulated using a polynomial (in measurements) number of hidden-variable states. In the limit of infinitely many measurements, our method gives models with the minimal number of hidden-variable states, which scales linearly with the number of measurements. These results can find applications in foundations of quantum theory, complexity studies and classical simulations o...

  9. Optimal Algorithms for Crawling a Hidden Database in the Web

    OpenAIRE

    Sheng, Cheng; Zhang, Nan; Tao, Yufei; Jin, Xin

    2012-01-01

    A hidden database refers to a dataset that an organization makes accessible on the web by allowing users to issue queries through a search interface. In other words, data acquisition from such a source is not by following static hyper-links. Instead, data are obtained by querying the interface, and reading the result page dynamically generated. This, with other facts such as the interface may answer a query only partially, has prevented hidden databases from being crawled effectively by exist...

  10. A Sequence of Relaxations Constraining Hidden Variable Models

    OpenAIRE

    Steeg, Greg Ver; Galstyan, Aram

    2011-01-01

    Many widely studied graphical models with latent variables lead to nontrivial constraints on the distribution of the observed variables. Inspired by the Bell inequalities in quantum mechanics, we refer to any linear inequality whose violation rules out some latent variable model as a "hidden variable test" for that model. Our main contribution is to introduce a sequence of relaxations which provides progressively tighter hidden variable tests. We demonstrate applicability to mixtures of seque...

  11. Battling the Internet Water Army: Detection of Hidden Paid Posters

    OpenAIRE

    Chen, Cheng; Wu, Kui; Srinivasan, Venkatesh; Zhang, Xudong

    2011-01-01

    We initiate a systematic study to help distinguish a special group of online users, called hidden paid posters, or termed "Internet water army" in China, from the legitimate ones. On the Internet, the paid posters represent a new type of online job opportunity. They get paid for posting comments and new threads or articles on different online communities and websites for some hidden purposes, e.g., to influence the opinion of other people towards certain social events or business markets. Tho...

  12. Hidden twelve-dimensional super Poincare symmetry in eleven dimensions

    International Nuclear Information System (INIS)

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional super Poincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven-dimensional superparticle, taken off-shell, we discover a hidden twelve-dimensional super Poincare symmetry that governs the theory

  13. The Multi-Role Hidden Tree Model for Scale-free Networks

    International Nuclear Information System (INIS)

    Based on the spatial factor other than the temporal accumulation, the hidden tree model was built up to model scale-free networks. This paper further assumed that a node has multiple roles in different hidden trees, and explored the multi-role hidden tree model. The experimental results showed that multi-role hidden tree model can also produce scale-free networks. This conclusion indicates that the hidden tree model is robust with multiple roles

  14. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  15. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing. PMID:25606190

  16. Hidden topological angles and Lefschetz thimbles

    CERN Document Server

    Behtash, Alireza; Schaefer, Thomas; Unsal, Mithat

    2015-01-01

    We demonstrate the existence of hidden topological angles (HTAs) in a large class of quantum field theories and quantum mechanical systems. HTAs are distinct from theta-parameters in the lagrangian. They arise as invariant angle associated with saddle points of the complexified path integral and their descent manifolds (Lefschetz thimbles). Physical effects of HTAs become most transparent upon analytic continuation in $n_f$ to non-integer number of flavors, reducing in the integer $n_f$ limit to a $\\mathbb Z_2$ valued phase difference between dominant saddles. In ${\\cal N}=1$ super Yang-Mills theory we demonstrate the microscopic mechanism for the vanishing of the gluon condensate. The same effect leads to an anomalously small condensate in a QCD-like $SU(N)$ gauge theory with fermions in the two-index representation. The basic phenomenon is that, contrary to folklore, the gluon condensate can receive both positive and negative contributions in a semi-classical expansion. In quantum mechanics, a HTA leads to ...

  17. A hidden classical symmetry of QCD

    CERN Document Server

    Glozman, L Ya

    2016-01-01

    The classical part of the QCD partition function (the integrand) has, ignoring irrelevant exact zero modes of the Dirac operator, a local SU(2N_F) \\supset SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A symmetry which is absent at the Lagrangian level. This symmetry is broken anomalously and spontaneously. Effects of spontaneous breaking of chiral symmetry are contained in the near-zero modes of the Dirac operator. If physics of anomaly is also encoded in the same near-zero modes, then their truncation on the lattice should recover a hidden classical SU(2N_F) symmetry in correlators and spectra. This naturally explains observation on the lattice of a large degeneracy of hadrons, that is higher than the SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A chiral symmetry, upon elimination by hands of the lowest-lying modes of the Dirac operator. We also discuss an implication of this symmetry for the high temperature QCD.

  18. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  19. Gauging hidden symmetries in two dimensions

    International Nuclear Information System (INIS)

    We initiate the systematic construction of gauged matter-coupled supergravity theories in two dimensions. Subgroups of the affine global symmetry group of toroidally compactified supergravity can be gauged by coupling vector fields with minimal couplings and a particular topological term. The gauge groups typically include hidden symmetries that are not among the target-space isometries of the ungauged theory. The gaugings constructed in this paper are described group-theoretically in terms of a constant embedding tensor subject to a number of constraints which parametrizes the different theories and entirely encodes the gauged Lagrangian. The prime example is the bosonic sector of the maximally supersymmetric theory whose ungauged version admits an affine e9 global symmetry algebra. The various parameters (related to higher-dimensional p-form fluxes, geometric and non-geometric fluxes, etc.) which characterize the possible gaugings, combine into an embedding tensor transforming in the basic representation of e9. This yields an infinite-dimensional class of maximally supersymmetric theories in two dimensions. We work out and discuss several examples of higher-dimensional origin which can be systematically analyzed using the different gradings of e9

  20. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  1. QCD sum rule study of hidden-charm pentaquarks

    CERN Document Server

    Chen, Hua-Xing; Chen, Wei; Steele, T G; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    We study the mass spectra of hidden-charm pentaquarks having spin $J = {1\\over2},{3\\over2},{5\\over2}$ and quark contents $uud c \\bar c$. We systematically construct all the relevant local hidden-charm pentaquark currents, and select some of them to perform QCD sum rule analyses. We find that the $P_c(4380)$ and $P_c(4450)$ can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. We also find the lowest-lying hidden-charm $J^P = 1/2^-$ pentaquark state of mass $4.33^{+0.17}_{-0.13}$ GeV, while the $J^P = 1/2^+$ mass prediction of 4.7--4.9 GeV is significantly higher. Similarly, the lowest-lying hidden-charm $J^P = 3/2^-$ pentaquark state mass is $4.37^{+0.18}_{-0.13}$ GeV, consistent with the $J^P = 3/2^-$ $P_c(4380)$, while the $J^P = 3/2^+$ is also significantly higher with a mass above 4.6 GeV. The hidden-charm $J^P = 5/2^-$ pentaquark state mass is 4.5--4.6 GeV, slightly larger than the $J^P = 5/2^+$ $P_c(4450)$.

  2. Hidden Web Data Extraction Using Dynamic Rule Generation

    Directory of Open Access Journals (Sweden)

    Anuradha

    2011-08-01

    Full Text Available World Wide Web is a global information medium of interlinked hypertext documents accessed via computers connected to the internet. Most of the users rely on traditional search engines to search theinformation on the web. These search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called Hidden Web which is hidden to present-day search engines. It lies behind search forms and this part of the web containing an almost endless amount of sources providing high quality information stored in specialized databases can be found in the depths of the WWW. A large amount of this Hidden web is structured i.e Hidden websites contain the information in the form of lists and tables. However visiting dozens of these sites and analyzing the results is very much time consuming task for user. Hence, it is desirable to build a prototype which will minimize user’s effort and give him high quality information in integrated form. This paper proposes a novel method that extracts the data records from the lists and tables of various hidden web sites of same domain using dynamic rule generation and forms a repository which is used for later searching. By searching the data from this repository, user will find the desired data at one place. It reduces the user’s effort to look at various result pages of different hidden websites.

  3. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  4. Analysis of hospitalized patients'nursing hidden safety problems in department of neurology and relevant preventive measures%神经内科住院患者的护理安全隐患分析及防范措施

    Institute of Scientific and Technical Information of China (English)

    孙江莉

    2015-01-01

    目的::分析探讨神经内科患者的护理方面存在的安全隐患以及防范措施。方法:选取2011年4月~2013年4月在我院接受神经性疾病治疗的88例患者,将其按照年龄、性别、病情等随机分为对照组和试验组,每组患者44例。对照组患者采用常规护理方式,试验组患者采用优质护理服务方式。对2组患者的生活质量以及患者服务满意度进行比较,并根据长期临床观察总结2组患者的安全隐患以及相关的防范措施。结果:试验组患者的日常生活能力恢复情况优质护理;护理安全隐患;较对照组患者好,且患者的生活质量明显优于对照组患者,2组患者比较差异明显,具有统计学意义(P<0.05)。结论:临床治疗神经内科患者过程中,要积极防范各种威胁患者生命健康的安全隐患,并在治疗过程中实施优质护理服务,提高患者的生活质量以及病情恢复情况。%Objective:To explore hospitalized patients' nursing hidden safety problems in Department of Neurology and its preventive measures. Methods:Selected 88 patients with neurogenic diseases in our hospital from April 2011 to April 2013 as the research object. According to their age, sex,patient's condition and so on, they were randomly divided into the control group and the experimental group. Each group was 44 patients. The former were treated with formal nursing care. The latter were treated with high quality nursing care. Then compared patients of the two groups with life quality and service satisfaction. After long-term clinical observation, summarized the pa-tients safety problems and the relevant preventive measures. Results:The restoration of activities in daily life and life quality of the experi-mental group was better than those of the control group. The difference was greatly obvious, so it had statistical significance (P < 0. 05). Conclusion:During the Clinical treatment of patients with neurology diseases

  5. Hidden Markov Models for Detecting Aseismic Events in Southern California

    Science.gov (United States)

    Granat, R.

    2004-12-01

    We employ a hidden Markov model (HMM) to segment surface displacement time series collection by the Southern California Integrated Geodetic Network (SCIGN). These segmented time series are then used to detect regional events by observing the number of simultaneous mode changes across the network; if a large number of stations change at the same time, that indicates an event. The hidden Markov model (HMM) approach assumes that the observed data has been generated by an unobservable dynamical statistical process. The process is of a particular form such that each observation is coincident with the system being in a particular discrete state, which is interpreted as a behavioral mode. The dynamics are the model are constructed so that the next state is directly dependent only on the current state -- it is a first order Markov process. The model is completely described by a set of parameters: the initial state probabilities, the first order Markov chain state-to-state transition probabilities, and the probability distribution of observable outputs associated with each state. The result of this approach is that our segmentation decisions are based entirely on statistical changes in the behavior of the observed daily displacements. In general, finding the optimal model parameters to fit the data is a difficult problem. We present an innovative model fitting method that is unsupervised (i.e., it requires no labeled training data) and uses a regularized version of the expectation-maximization (EM) algorithm to ensure that model solutions are both robust with respect to initial conditions and of high quality. We demonstrate the reliability of the method as compared to standard model fitting methods and show that it results in lower noise in the mode change correlation signal used to detect regional events. We compare candidate events detected by this method to the seismic record and observe that most are not correlated with a significant seismic event. Our analysis

  6. 16 CFR 1610.34 - Only uncovered or exposed parts of wearing apparel to be tested.

    Science.gov (United States)

    2010-01-01

    ... apparel to be tested. 1610.34 Section 1610.34 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION... § 1610.34 Only uncovered or exposed parts of wearing apparel to be tested. (a) In determining whether an... uncovered or exposed part of such article of wearing apparel shall be tested according to the...

  7. 16 CFR 1611.34 - Only uncovered or exposed parts of wearing apparel to be tested.

    Science.gov (United States)

    2010-01-01

    ... apparel to be tested. 1611.34 Section 1611.34 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION... § 1611.34 Only uncovered or exposed parts of wearing apparel to be tested. In determining whether an... uncovered or exposed part of such article of wearing apparel shall be tested according to the...

  8. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Science.gov (United States)

    Xiao, C. W.; Oset, E.

    2013-11-01

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states η b N, ϒN, BΛ b , BΣ b , B * Λ b , B * Σ b , B * Σ {/b *} and find four basic bound states which correspond to BΣ b , BΣ {/b *}, B * Σ b and B * Σ {/b *}, decaying mostly into η b N and ϒN and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2 , and we find no bound states or resonances in I = 3/2 . The BΣ b state appears in J = 1/2 , the BΣ {/b *} in J = 3/2 , the B * Σ b appears nearly degenerate in J = 1/2 , 3/2 and the B * Σ {/b *} appears nearly degenerate in J = 1/2 , 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound.

  9. The perception of the hidden curriculum on medical education: an exploratory study

    Directory of Open Access Journals (Sweden)

    Murakami Manabu

    2009-12-01

    Full Text Available Abstract Background Major curriculum reform of undergraduate medical education occurred during the past decades in the United Kingdom (UK; however, the effects of the hidden curriculum, which influence the choice of primary care as a career, have not been sufficiently recognized. While Japan, where traditionally few institutions systematically foster primary care physicians and very few have truly embraced family medicine as their guiding discipline, has also experienced meaningful curriculum reform, the effect of the hidden curriculum is not well known. The aim of this study is to identify themes pertaining to the students' perceptions of the hidden curriculum affecting undergraduate medical education in bedside learning in Japan. Methods Semi-structured interviews with thematic content analysis were implemented. Undergraduate year-5 students from a Japanese medical school at a Japanese teaching hospital were recruited. Interview were planned to last between 30 to 60 minutes each, over an 8-month period in 2007. The interviewees' perceptions concerning the quality of teaching in their bedside learning and related experiences were collected and analysed thematically. Results Twenty five medical students (18 males and 7 females, mean age 25 years old consented to participate in the interviews, and seven main themes emerged: "the perception of education as having a low priority," "the prevalence of positive/negative role models," "the persistence of hierarchy and exclusivity," "the existence of gender issues," "an overburdened medical knowledge," "human relationships with colleagues and medical team members," and "first experience from the practical wards and their patients." Conclusions Both similarities and differences were found when comparing the results to those of previous studies in the UK. Some effects of the hidden curriculum in medical education likely exist in common between the UK and Japan, despite the differences in their demographic

  10. Hidden Markov Models approach used for life parameters estimations

    International Nuclear Information System (INIS)

    In modern electronics and in electrical applications design is very important to be able to predict the actual product life or, at least, to be able to provide the end user with a reasonable estimate of such parameter. It is important to be able to define the availability as a key parameter because, although other performance indicators (as the mean time before failures MTBF or mean time to failure MTTF) exist, they are often misused. To study the availability of an electrical, electronic or an electromechanical system, different methods can be used. The most common one relies on memory-less Markovian state space analysis due to the fact that a little information is needed, and under simple hypothesis, it is possible to gather some outcomes on the availability of steady state value. In this paper the authors, starting from classical approach of Markov models, introduce an extension known as Hidden Markov Models approach to overcome the limits of the previous one in estimating the system availability performance over time. Such a technique can be used to improve the logistic aspects connected with optimal maintenance planning. The provided dissertation in general can be used in different contexts without losing in generality

  11. A hidden markov model derived structural alphabet for proteins.

    Science.gov (United States)

    Camproux, A C; Gautier, R; Tufféry, P

    2004-06-01

    Understanding and predicting protein structures depends on the complexity and the accuracy of the models used to represent them. We have set up a hidden Markov model that discretizes protein backbone conformation as series of overlapping fragments (states) of four residues length. This approach learns simultaneously the geometry of the states and their connections. We obtain, using a statistical criterion, an optimal systematic decomposition of the conformational variability of the protein peptidic chain in 27 states with strong connection logic. This result is stable over different protein sets. Our model fits well the previous knowledge related to protein architecture organisation and seems able to grab some subtle details of protein organisation, such as helix sub-level organisation schemes. Taking into account the dependence between the states results in a description of local protein structure of low complexity. On an average, the model makes use of only 8.3 states among 27 to describe each position of a protein structure. Although we use short fragments, the learning process on entire protein conformations captures the logic of the assembly on a larger scale. Using such a model, the structure of proteins can be reconstructed with an average accuracy close to 1.1A root-mean-square deviation and for a complexity of only 3. Finally, we also observe that sequence specificity increases with the number of states of the structural alphabet. Such models can constitute a very relevant approach to the analysis of protein architecture in particular for protein structure prediction. PMID:15147844

  12. Classification of Arnold-Beltrami Flows and their Hidden Symmetries

    CERN Document Server

    Fre, Pietro

    2015-01-01

    In the context of mathematical hydrodynamics, we consider the group theory structure which underlies the ABC-flow introduced by Beltrami, Arnold and Childress. Beltrami equation is the eigenstate equation for the first order Laplace-Beltrami operator *d, which we solve by using harmonic analysis. Taking torus T^3 constructed as R^3/L, where L is a crystallographic lattice, we present a general algorithm to construct solutions of Beltrami equation which utilizes as main ingredient the orbits under the action of the point group P_L of three-vectors in the momentum lattice L*. We introduce the new notion of a Universal Classifying Group GU_L which contains all crystallographic space groups as proper subgroups. We show that the *d-eigenfunctions are naturally arranged into irreducible representations of GU_L and by means of a systematic use of the branching rules with respect to various possible subgroups H of GU_L we search and find Beltrami fields with non trivial hidden symmetries. In the case of the cubic lat...

  13. Uncovering beat deafness: detecting rhythm disorders with synchronized finger tapping and perceptual timing tasks.

    Science.gov (United States)

    Dalla Bella, Simone; Sowiński, Jakub

    2015-01-01

    A set of behavioral tasks for assessing perceptual and sensorimotor timing abilities in the general population (i.e., non-musicians) is presented here with the goal of uncovering rhythm disorders, such as beat deafness. Beat deafness is characterized by poor performance in perceiving durations in auditory rhythmic patterns or poor synchronization of movement with auditory rhythms (e.g., with musical beats). These tasks include the synchronization of finger tapping to the beat of simple and complex auditory stimuli and the detection of rhythmic irregularities (anisochrony detection task) embedded in the same stimuli. These tests, which are easy to administer, include an assessment of both perceptual and sensorimotor timing abilities under different conditions (e.g., beat rates and types of auditory material) and are based on the same auditory stimuli, ranging from a simple metronome to a complex musical excerpt. The analysis of synchronized tapping data is performed with circular statistics, which provide reliable measures of synchronization accuracy (e.g., the difference between the timing of the taps and the timing of the pacing stimuli) and consistency. Circular statistics on tapping data are particularly well-suited for detecting individual differences in the general population. Synchronized tapping and anisochrony detection are sensitive measures for identifying profiles of rhythm disorders and have been used with success to uncover cases of poor synchronization with spared perceptual timing. This systematic assessment of perceptual and sensorimotor timing can be extended to populations of patients with brain damage, neurodegenerative diseases (e.g., Parkinson's disease), and developmental disorders (e.g., Attention Deficit Hyperactivity Disorder). PMID:25867797

  14. Uncovering the mechanism(s) of deep brain stimulation

    Energy Technology Data Exchange (ETDEWEB)

    Li Gang; Yu Chao; Lin Ling; Lu, Stephen C-Y [Inspiring Technical Laboratory, College of Precision Instruments and Opto-Electronics Engineering, Tianjin University, Tianjin 300072 (China)

    2005-01-01

    Deep brain stimulators, often called 'pacemakers for the brain', are implantable devices which continuously deliver impulse stimulation to specific targeted nuclei of deep brain structure, namely deep brain stimulation (DBS). To date, deep brain stimulation (DBS) is the most effective clinical technique for the treatment of several medically refractory movement disorders (e.g., Parkinson's disease, essential tremor, and dystonia). In addition, new clinical applications of DBS for other neurologic and psychiatric disorders (e.g., epilepsy and obsessive-compulsive disorder) have been put forward. Although DBS has been effective in the treatment of movement disorders and is rapidly being explored for the treatment of other neurologic disorders, the scientific understanding of its mechanisms of action remains unclear and continues to be debated in the scientific community. Optimization of DBS technology for present and future therapeutic applications will depend on identification of the therapeutic mechanism(s) of action. The goal of this review is to address our present knowledge of the effects of high-frequency stimulation within the central nervous system and comment on the functional implications of this knowledge for uncovering the mechanism(s) of DBS.

  15. Uncovering the mechanism(s) of deep brain stimulation

    Science.gov (United States)

    Gang, Li; Chao, Yu; Ling, Lin; C-Y Lu, Stephen

    2005-01-01

    Deep brain stimulators, often called `pacemakers for the brain', are implantable devices which continuously deliver impulse stimulation to specific targeted nuclei of deep brain structure, namely deep brain stimulation (DBS). To date, deep brain stimulation (DBS) is the most effective clinical technique for the treatment of several medically refractory movement disorders (e.g., Parkinson's disease, essential tremor, and dystonia). In addition, new clinical applications of DBS for other neurologic and psychiatric disorders (e.g., epilepsy and obsessive-compulsive disorder) have been put forward. Although DBS has been effective in the treatment of movement disorders and is rapidly being explored for the treatment of other neurologic disorders, the scientific understanding of its mechanisms of action remains unclear and continues to be debated in the scientific community. Optimization of DBS technology for present and future therapeutic applications will depend on identification of the therapeutic mechanism(s) of action. The goal of this review is to address our present knowledge of the effects of high-frequency stimulation within the central nervous system and comment on the functional implications of this knowledge for uncovering the mechanism(s) of DBS.

  16. Uncovering Aberrant Mutant PKA Function with Flow Cytometric FRET.

    Science.gov (United States)

    Lee, Shin-Rong; Sang, Lingjie; Yue, David T

    2016-03-29

    Biology has been revolutionized by tools that allow the detection and characterization of protein-protein interactions (PPIs). Förster resonance energy transfer (FRET)-based methods have become particularly attractive as they allow quantitative studies of PPIs within the convenient and relevant context of living cells. We describe here an approach that allows the rapid construction of live-cell FRET-based binding curves using a commercially available flow cytometer. We illustrate a simple method for absolutely calibrating the cytometer, validating our binding assay against the gold standard isothermal calorimetry (ITC), and using flow cytometric FRET to uncover the structural and functional effects of the Cushing-syndrome-causing mutation (L206R) on PKA's catalytic subunit. We discover that this mutation not only differentially affects PKAcat's binding to its multiple partners but also impacts its rate of catalysis. These findings improve our mechanistic understanding of this disease-causing mutation, while illustrating the simplicity, general applicability, and power of flow cytometric FRET. PMID:26997269

  17. Uncovering the Geometry of Barrierless Reactions Using Lagrangian Descriptors.

    Science.gov (United States)

    Junginger, Andrej; Hernandez, Rigoberto

    2016-03-01

    Transition-state theories describing barrierless chemical reactions, or more general activated problems, are often hampered by the lack of a saddle around which the dividing surface can be constructed. For example, the time-dependent transition-state trajectory uncovering the nonrecrossing dividing surface in thermal reactions in the framework of the Langevin equation has relied on perturbative approaches in the vicinity of the saddle. We recently obtained an alternative approach using Lagrangian descriptors to construct time-dependent and recrossing-free dividing surfaces. This is a nonperturbative approach making no reference to a putative saddle. Here we show how the Lagrangian descriptor can be used to obtain the transition-state geometry of a dissipated and thermalized reaction across barrierless potentials. We illustrate the method in the case of a 1D Brownian motion for both barrierless and step potentials; however, the method is not restricted and can be directly applied to different kinds of potentials and higher dimensional systems. PMID:26524392

  18. Uncovering Aberrant Mutant PKA Function with Flow Cytometric FRET

    Directory of Open Access Journals (Sweden)

    Shin-Rong Lee

    2016-03-01

    Full Text Available Biology has been revolutionized by tools that allow the detection and characterization of protein-protein interactions (PPIs. Förster resonance energy transfer (FRET-based methods have become particularly attractive as they allow quantitative studies of PPIs within the convenient and relevant context of living cells. We describe here an approach that allows the rapid construction of live-cell FRET-based binding curves using a commercially available flow cytometer. We illustrate a simple method for absolutely calibrating the cytometer, validating our binding assay against the gold standard isothermal calorimetry (ITC, and using flow cytometric FRET to uncover the structural and functional effects of the Cushing-syndrome-causing mutation (L206R on PKA’s catalytic subunit. We discover that this mutation not only differentially affects PKAcat’s binding to its multiple partners but also impacts its rate of catalysis. These findings improve our mechanistic understanding of this disease-causing mutation, while illustrating the simplicity, general applicability, and power of flow cytometric FRET.

  19. Uncovering the mechanism(s) of deep brain stimulation

    International Nuclear Information System (INIS)

    Deep brain stimulators, often called 'pacemakers for the brain', are implantable devices which continuously deliver impulse stimulation to specific targeted nuclei of deep brain structure, namely deep brain stimulation (DBS). To date, deep brain stimulation (DBS) is the most effective clinical technique for the treatment of several medically refractory movement disorders (e.g., Parkinson's disease, essential tremor, and dystonia). In addition, new clinical applications of DBS for other neurologic and psychiatric disorders (e.g., epilepsy and obsessive-compulsive disorder) have been put forward. Although DBS has been effective in the treatment of movement disorders and is rapidly being explored for the treatment of other neurologic disorders, the scientific understanding of its mechanisms of action remains unclear and continues to be debated in the scientific community. Optimization of DBS technology for present and future therapeutic applications will depend on identification of the therapeutic mechanism(s) of action. The goal of this review is to address our present knowledge of the effects of high-frequency stimulation within the central nervous system and comment on the functional implications of this knowledge for uncovering the mechanism(s) of DBS

  20. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  1. Hidden burden of malaria in Indian women

    Directory of Open Access Journals (Sweden)

    Sharma Vinod P

    2009-12-01

    Full Text Available Abstract Malaria is endemic in India with an estimated 70-100 million cases each year (1.6-1.8 million reported by NVBDCP; of this 50-55% are Plasmodium vivax and 45-50% Plasmodium falciparum. A recent study on malaria in pregnancy reported from undivided Madhya Pradesh state (includes Chhattisgarh state, that an estimated over 220,000 pregnant women contract malaria infection each year. Malaria in pregnancy caused- abortions 34.5%; stillbirths 9%; and maternal deaths 0.45%. Bulk of this tragic outcome can be averted by following the Roll Back Malaria/WHO recommendations of the use of malaria prevention i.e. indoor residual spraying (IRS/insecticide-treated bed nets (ITN preferably long-lasting treated bed nets (LLIN; intermittent preventive therapy (IPT; early diagnosis, prompt and complete treatment using microscopic/malaria rapid diagnostics test (RDT and case management. High incidence in pregnancy has arisen because of malaria surveillance lacking coverage, lack of age and sex wise data, staff shortages, and intermittent preventive treatment (IPT applicable in high transmission states/pockets is not included in the national drug policy- an essential component of fighting malaria in pregnancy in African settings. Inadequate surveillance and gross under-reporting has been highlighted time and again for over three decades. As a result the huge problem of malaria in pregnancy reported occasionally by researchers has remained hidden. Malaria in pregnancy may quicken severity in patients with drug resistant parasites, anaemia, endemic poverty, and malnutrition. There is, therefore, urgent need to streamline malaria control strategies to make a difference in tackling this grim scenario in human health.

  2. VISTA Captures Celestial Cat's Hidden Secrets

    Science.gov (United States)

    2010-04-01

    The Cat's Paw Nebula, NGC 6334, is a huge stellar nursery, the birthplace of hundreds of massive stars. In a magnificent new ESO image taken with the Visible and Infrared Survey Telescope for Astronomy (VISTA) at the Paranal Observatory in Chile, the glowing gas and dust clouds obscuring the view are penetrated by infrared light and some of the Cat's hidden young stars are revealed. Towards the heart of the Milky Way, 5500 light-years from Earth in the constellation of Scorpius (the Scorpion), the Cat's Paw Nebula stretches across 50 light-years. In visible light, gas and dust are illuminated by hot young stars, creating strange reddish shapes that give the object its nickname. A recent image by ESO's Wide Field Imager (WFI) at the La Silla Observatory (eso1003) captured this visible light view in great detail. NGC 6334 is one of the most active nurseries of massive stars in our galaxy. VISTA, the latest addition to ESO's Paranal Observatory in the Chilean Atacama Desert, is the world's largest survey telescope (eso0949). It works at infrared wavelengths, seeing right through much of the dust that is such a beautiful but distracting aspect of the nebula, and revealing objects hidden from the sight of visible light telescopes. Visible light tends to be scattered and absorbed by interstellar dust, but the dust is nearly transparent to infrared light. VISTA has a main mirror that is 4.1 metres across and it is equipped with the largest infrared camera on any telescope. It shares the spectacular viewing conditions with ESO's Very Large Telescope (VLT), which is located on the nearby summit. With this powerful instrument at their command, astronomers were keen to see the birth pains of the big young stars in the Cat's Paw Nebula, some nearly ten times the mass of the Sun. The view in the infrared is strikingly different from that in visible light. With the dust obscuring the view far less, they can learn much more about how these stars form and develop in their first

  3. Is Financial Development a Factor to the Leading Growth Profile of the South African Economy? Measuring and Uncovering the Hidden Secret

    OpenAIRE

    Abdulkadir Abdulrashid Rafindadi; Zarinah Yusof

    2013-01-01

    This paper investigates the factors contributing to the formidable growth rate of the South African economy. Specifically, we determine whether the leading role of the South African economy in the Sub- Saharan African region is a result of its sophisticated and resilient financial sector development. If not, the paper tries to identify the possible explanations for the country’s economic growth profile in recent times. From a series of empirical findings, the paper assesses the factor(s) th...

  4. Hidden Gauge Structure of Supersymmetric Free Differential Algebras

    CERN Document Server

    Andrianopoli, L; Ravera, L

    2016-01-01

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q' introduced in Ref. [3] and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B^(2) and B^(3) in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of t...

  5. Reputation and competition in a hidden action model.

    Directory of Open Access Journals (Sweden)

    Alessandro Fedele

    Full Text Available The economics models of reputation and quality in markets can be classified in three categories. (i Pure hidden action, where only one type of seller is present who can provide goods of different quality. (ii Pure hidden information, where sellers of different types have no control over product quality. (iii Mixed frameworks, which include both hidden action and hidden information. In this paper we develop a pure hidden action model of reputation and Bertrand competition, where consumers and firms interact repeatedly in a market with free entry. The price of the good produced by the firms is contractible, whilst the quality is noncontractible, hence it is promised by the firms when a contract is signed. Consumers infer future quality from all available information, i.e., both from what they know about past quality and from current prices. According to early contributions, competition should make reputation unable to induce the production of high-quality goods. We provide a simple solution to this problem by showing that high quality levels are sustained as an outcome of a stationary symmetric equilibrium.

  6. Reputation and competition in a hidden action model.

    Science.gov (United States)

    Fedele, Alessandro; Tedeschi, Piero

    2014-01-01

    The economics models of reputation and quality in markets can be classified in three categories. (i) Pure hidden action, where only one type of seller is present who can provide goods of different quality. (ii) Pure hidden information, where sellers of different types have no control over product quality. (iii) Mixed frameworks, which include both hidden action and hidden information. In this paper we develop a pure hidden action model of reputation and Bertrand competition, where consumers and firms interact repeatedly in a market with free entry. The price of the good produced by the firms is contractible, whilst the quality is noncontractible, hence it is promised by the firms when a contract is signed. Consumers infer future quality from all available information, i.e., both from what they know about past quality and from current prices. According to early contributions, competition should make reputation unable to induce the production of high-quality goods. We provide a simple solution to this problem by showing that high quality levels are sustained as an outcome of a stationary symmetric equilibrium. PMID:25329387

  7. Efficient Quantum Algorithm for the Hidden Parabola Problem

    CERN Document Server

    Decker, T; Decker, Thomas; Wocjan, Pawel

    2007-01-01

    We introduce the Hidden Polynomial Function Graph Problem as a natural generalization of the abelian Hidden Subgroup Problem (HSP) over groups of the form Z_p x Z_p, where the hidden subgroups are generated by (1,a) for different a in Z_p. These subgroups and their cosets correspond to graphs of linear functions on Z_p. For the Hidden Polynomial Function Graph Problem the functions are not restricted to be linear but can also be polynomial functions of degree n >= 2. Analogously to the HSP, for a fixed degree n the Hidden Polynomial Function Graph Problem is hard on a classical computer as its query complexity is polynomial in p. To solve this problem on a quantum computer in time polylogarithmic in p, we first reduce it to a quantum state identification problem and then we use the pretty good measurement (PGM) approach to construct measurements for distinguishing the states. We relate the success probability and implementation of the PGM to a certain classical problem involving polynomial equations. We prese...

  8. A Novel Method for Decoding Any High-Order Hidden Markov Model

    OpenAIRE

    Fei Ye; Yifei Wang

    2014-01-01

    This paper proposes a novel method for decoding any high-order hidden Markov model. First, the high-order hidden Markov model is transformed into an equivalent first-order hidden Markov model by Hadar’s transformation. Next, the optimal state sequence of the equivalent first-order hidden Markov model is recognized by the existing Viterbi algorithm of the first-order hidden Markov model. Finally, the optimal state sequence of the high-order hidden Markov model is inferred from the optimal stat...

  9. Evidence Feed Forward Hidden Markov Model: A New Type of Hidden Markov Model

    CERN Document Server

    DelRose, Michael; Frederick, Philip; 10.5121/ijaia.2011.2101

    2011-01-01

    The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM), and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important...

  10. Riboswitch Detection Using Profile Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Krishnamachari A

    2009-10-01

    Full Text Available Abstract Background Riboswitches are a type of noncoding RNA that regulate gene expression by switching from one structural conformation to another on ligand binding. The various classes of riboswitches discovered so far are differentiated by the ligand, which on binding induces a conformational switch. Every class of riboswitch is characterized by an aptamer domain, which provides the site for ligand binding, and an expression platform that undergoes conformational change on ligand binding. The sequence and structure of the aptamer domain is highly conserved in riboswitches belonging to the same class. We propose a method for fast and accurate identification of riboswitches using profile Hidden Markov Models (pHMM. Our method exploits the high degree of sequence conservation that characterizes the aptamer domain. Results Our method can detect riboswitches in genomic databases rapidly and accurately. Its sensitivity is comparable to the method based on the Covariance Model (CM. For six out of ten riboswitch classes, our method detects more than 99.5% of the candidates identified by the much slower CM method while being several hundred times faster. For three riboswitch classes, our method detects 97-99% of the candidates relative to the CM method. Our method works very well for those classes of riboswitches that are characterized by distinct and conserved sequence motifs. Conclusion Riboswitches play a crucial role in controlling the expression of several prokaryotic genes involved in metabolism and transport processes. As more and more new classes of riboswitches are being discovered, it is important to understand the patterns of their intra and inter genomic distribution. Understanding such patterns will enable us to better understand the evolutionary history of these genetic regulatory elements. However, a complete picture of the distribution pattern of riboswitches will emerge only after accurate identification of riboswitches across genomes

  11. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  12. Identifying Seismicity Levels via Poisson Hidden Markov Models

    Science.gov (United States)

    Orfanogiannaki, K.; Karlis, D.; Papadopoulos, G. A.

    2010-08-01

    Poisson Hidden Markov models (PHMMs) are introduced to model temporal seismicity changes. In a PHMM the unobserved sequence of states is a finite-state Markov chain and the distribution of the observation at any time is Poisson with rate depending only on the current state of the chain. Thus, PHMMs allow a region to have varying seismicity rate. We applied the PHMM to model earthquake frequencies in the seismogenic area of Killini, Ionian Sea, Greece, between period 1990 and 2006. Simulations of data from the assumed model showed that it describes quite well the true data. The earthquake catalogue is dominated by main shocks occurring in 1993, 1997 and 2002. The time plot of PHMM seismicity states not only reproduces the three seismicity clusters but also quantifies the seismicity level and underlies the degree of strength of the serial dependence of the events at any point of time. Foreshock activity becomes quite evident before the three sequences with the gradual transition to states of cascade seismicity. Traditional analysis, based on the determination of highly significant changes of seismicity rates, failed to recognize foreshocks before the 1997 main shock due to the low number of events preceding that main shock. Then, PHMM has better performance than traditional analysis since the transition from one state to another does not only depend on the total number of events involved but also on the current state of the system. Therefore, PHMM recognizes significant changes of seismicity soon after they start, which is of particular importance for real-time recognition of foreshock activities and other seismicity changes.

  13. Hidden caring, hidden carers? Exploring the experience of carers for people with long-term conditions.

    Science.gov (United States)

    Knowles, Sarah; Combs, Ryan; Kirk, Sue; Griffiths, May; Patel, Neesha; Sanders, Caroline

    2016-03-01

    Informal carers make a significant contribution to illness management in communities, but many struggle to access support and remain 'hidden carers'. We aimed to explore how carers of people with common long-term conditions (LTCs, such as coronary heart disease or kidney disease) conceptualised their caring, and whether they struggled to identify themselves with the term 'carer' or access for support. We conducted semi-structured interviews with 19 informal carers of people with LTCs recruited from local support groups. Topic guides were designed to encourage participants to provide their retrospective accounts of identifying as a carer or struggling to do so. Data were analysed using the constant comparative method. The study was designed collaboratively with a patient and public involvement (PPI) partner, and we consulted with a PPI steering group of people with lived experience of caring during the study. Results showed how participants drew on comparisons with those caring for more dependent relatives in explaining their reluctance to define themselves as a carer, and resisted adopting the label due to concerns that it would threaten the identity of the cared-for person. The data were interpreted in terms of types of 'work' undertaken to manage LTCs, and revealed that carers of patients with LTCs appear to primarily engage in biographical and emotional support, which may be more difficult to conceptualise as legitimate caring 'work'. Participants indicated that health professionals may be in a unique position to validate their role as carers and encourage support seeking. The study suggests how the greater focus on self-management of LTCs in the community must be complemented by recognition of this group as potentially 'hidden carers', who support the patient to minimise the impact the illness has on their lives and consequently may minimise their own caring role, with negative implications for support seeking. PMID:25706665

  14. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  15. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    International Nuclear Information System (INIS)

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states ηb N, Υ;N, B Λb, B Σb, B*Λb, B*Σb, B*Σb* and find four basic bound states which correspond to B Σb, B Σb*, B*Σb and B*Σb*, decaying mostly into ηb N and ΥN and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B Σb state appears in J = 1/2, the B Σb* in J = 3/2, the B*Σb appears nearly degenerate in J = 1/2, 3/2 and the B*Σb* appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  16. Unveiling hidden black holes in the cosmic web: Dark matter halos of WISE quasars from Planck CMB lensing

    Science.gov (United States)

    Hickox, Ryan

    The WISE and Planck surveys have now produced groundbreaking data sets which, in concert, can be exploited to obtain revolutionary constraints on the evolution of structure in the Universe. One particularly powerful application of WISE has been to uncover millions of the previously "hidden" obscured quasars, rapidly growing supermassive black holes that are shrouded in gas and dust and so are not detectable using traditional ground-based optical and near-IR techniques. Recently, Planck has produced the most precise all-sky map to date of dark matter structures via the lensing of the cosmic microwave background (CMB). We propose to combine these data sets to obtain a uniquely powerful measurement of the link between rapidly growing black holes and their host dark matter structures, by cross-correlating the density field of WISE-selected quasars with the CMB lensing convergence maps obtained from Planck. This proposal will build on our current ADAP program (NNX12AE38G), which studies the host dark matter halos of WISE-selected quasars via spatial clustering. NNX12AE38G involves a detailed characterization of the redshifts, luminosities, and spectral energy distributions of WISE-selected quasars and uses new techniques to measure how quasars cluster around themselves. NNX12AE38G has contributed to more than 10 journal articles and 5 conference proceedings. Building on our current work, an even more complete understanding of the link between black holes and their host dark matter structures is possible if we employ an independent method for measuring the clustering bias (and thus characteristic halo mass) of the quasar population. This has recently become possible using CMB lensing maps. In the past two years, our team has conducted an initial analysis covering 2500 square degrees using WISE-selected quasars and lensing maps from the South Pole Telescope (Geach, Hickox, Myers et al., 2013), and have implemented this technique with Planck over part of the SDSS region

  17. Detection and tracking of moving objects hidden from view

    Science.gov (United States)

    Gariepy, Genevieve; Tonolini, Francesco; Henderson, Robert; Leach, Jonathan; Faccio, Daniele

    2016-01-01

    The ability to detect motion and track a moving object hidden around a corner or behind a wall provides a crucial advantage when physically going around the obstacle is impossible or dangerous. Previous methods have demonstrated that it is possible to reconstruct the shape of an object hidden from view. However, these methods do not enable the tracking of movement in real time. We demonstrate a compact non-line-of-sight laser ranging technology that relies on the ability to send light around an obstacle using a scattering floor and then detect the return signal from a hidden object within only a few seconds of acquisition time. By detecting this signal with a single-photon avalanche diode (SPAD) camera, we follow the movement of an object located a metre away from the camera with centimetre precision. We discuss the possibility of applying this technology to a variety of real-life situations in the near future.

  18. The hidden-charm pentaquark and tetraquark states

    Science.gov (United States)

    Chen, Hua-Xing; Chen, Wei; Liu, Xiang; Zhu, Shi-Lin

    2016-06-01

    In the past decade many charmonium-like states were observed experimentally. Especially those charged charmonium-like Zc states and bottomonium-like Zb states cannot be accommodated within the naive quark model. These charged Zc states are good candidates of either the hidden-charm tetraquark states or molecules composed of a pair of charmed mesons. Recently, the LHCb Collaboration discovered two hidden-charm pentaquark states, which are also beyond the quark model. In this work, we review the current experimental progress and investigate various theoretical interpretations of these candidates of the multiquark states. We list the puzzles and theoretical challenges of these models when confronted with the experimental data. We also discuss possible future measurements which may distinguish the theoretical schemes on the underlying structures of the hidden-charm multiquark states.

  19. Credit Card Fraud Detection Using Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    SHAILESH S. DHOK

    2012-03-01

    Full Text Available The most accepted payment mode is credit card forboth online and offline in today’s world, it provides cashlessshopping at every shop in all countries. It will be the mostconvenient way to do online shopping, paying bills etc. Hence,risks of fraud transaction using credit card has also beenincreasing. In the existing credit card fraud detection businessprocessing system, fraudulent transaction will be detected aftertransaction is done. It is difficult to find out fraudulent andregarding loses will be barred by issuing authorities. HiddenMarkov Model is the statistical tools for engineer and scientiststo solve various problems. In this paper, it is shown that creditcard fraud can be detected using Hidden Markov Model duringtransactions. Hidden Markov Model helps to obtain a highfraud coverage combined with a low false alarm rate.

  20. Supersymmetry, p-brane duality, and hidden spacetime dimensions

    International Nuclear Information System (INIS)

    A global superalgebra with 32 supercharges and all possible central extensions is studied in order to extract some general properties of duality and hidden dimensions in a theory that treats p-branes democratically. The maximal number of dimensions is 12, with signature (10,2), containing one space and one time dimension that are hidden from the point of view of perturbative ten-dimensional string theory or its compactifications. When the theory is compactified on Rd-1,1 circle-times Tc+1,1 with d+c+2=12, there are isometry groups that relate to the hidden dimensions as well as to duality. Their combined intersecting classification schemes provide some properties of nonperturbative states and their couplings. copyright 1996 The American Physical Society