WorldWideScience

Sample records for detect persons hidden

  1. Detecting hidden particles with MATHUSLA

    Science.gov (United States)

    Evans, Jared A.

    2018-03-01

    A hidden sector containing light long-lived particles provides a well-motivated place to find new physics. The recently proposed MATHUSLA experiment has the potential to be extremely sensitive to light particles originating from rare meson decays in the very long lifetime region. In this work, we illustrate this strength with the specific example of a light scalar mixed with the standard model-like Higgs boson, a model where MATHUSLA can further probe unexplored parameter space from exotic Higgs decays. Design augmentations should be considered in order to maximize the ability of MATHUSLA to discover very light hidden sector particles.

  2. Detecting targets hidden in random forests

    Science.gov (United States)

    Kouritzin, Michael A.; Luo, Dandan; Newton, Fraser; Wu, Biao

    2009-05-01

    Military tanks, cargo or troop carriers, missile carriers or rocket launchers often hide themselves from detection in the forests. This plagues the detection problem of locating these hidden targets. An electro-optic camera mounted on a surveillance aircraft or unmanned aerial vehicle is used to capture the images of the forests with possible hidden targets, e.g., rocket launchers. We consider random forests of longitudinal and latitudinal correlations. Specifically, foliage coverage is encoded with a binary representation (i.e., foliage or no foliage), and is correlated in adjacent regions. We address the detection problem of camouflaged targets hidden in random forests by building memory into the observations. In particular, we propose an efficient algorithm to generate random forests, ground, and camouflage of hidden targets with two dimensional correlations. The observations are a sequence of snapshots consisting of foliage-obscured ground or target. Theoretically, detection is possible because there are subtle differences in the correlations of the ground and camouflage of the rocket launcher. However, these differences are well beyond human perception. To detect the presence of hidden targets automatically, we develop a Markov representation for these sequences and modify the classical filtering equations to allow the Markov chain observation. Particle filters are used to estimate the position of the targets in combination with a novel random weighting technique. Furthermore, we give positive proof-of-concept simulations.

  3. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  4. Adaptive filtering for hidden node detection and tracking in networks.

    Science.gov (United States)

    Hamilton, Franz; Setzer, Beverly; Chavez, Sergio; Tran, Hien; Lloyd, Alun L

    2017-07-01

    The identification of network connectivity from noisy time series is of great interest in the study of network dynamics. This connectivity estimation problem becomes more complicated when we consider the possibility of hidden nodes within the network. These hidden nodes act as unknown drivers on our network and their presence can lead to the identification of false connections, resulting in incorrect network inference. Detecting the parts of the network they are acting on is thus critical. Here, we propose a novel method for hidden node detection based on an adaptive filtering framework with specific application to neuronal networks. We consider the hidden node as a problem of missing variables when model fitting and show that the estimated system noise covariance provided by the adaptive filter can be used to localize the influence of the hidden nodes and distinguish the effects of different hidden nodes. Additionally, we show that the sequential nature of our algorithm allows for tracking changes in the hidden node influence over time.

  5. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The estimation of the HMM is conducted using a variant of the Iterative Conditional Expectation-Generalized Mixture (ICE-GEMI) algorithm proposed by Delignon et al. (1997), that permits analysis of the conditional distributions of economic data and allows for different functional forms across regimes...

  6. Detecting Faults By Use Of Hidden Markov Models

    Science.gov (United States)

    Smyth, Padhraic J.

    1995-01-01

    Frequency of false alarms reduced. Faults in complicated dynamic system (e.g., antenna-aiming system, telecommunication network, or human heart) detected automatically by method of automated, continuous monitoring. Obtains time-series data by sampling multiple sensor outputs at discrete intervals of t and processes data via algorithm determining whether system in normal or faulty state. Algorithm implements, among other things, hidden first-order temporal Markov model of states of system. Mathematical model of dynamics of system not needed. Present method is "prior" method mentioned in "Improved Hidden-Markov-Model Method of Detecting Faults" (NPO-18982).

  7. Detect and exploit hidden structure in fatty acid signature data

    Science.gov (United States)

    Budge, Suzanne; Bromaghin, Jeffrey; Thiemann, Gregory

    2017-01-01

    Estimates of predator diet composition are essential to our understanding of their ecology. Although several methods of estimating diet are practiced, methods based on biomarkers have become increasingly common. Quantitative fatty acid signature analysis (QFASA) is a popular method that continues to be refined and extended. Quantitative fatty acid signature analysis is based on differences in the signatures of prey types, often species, which are recognized and designated by investigators. Similarly, predator signatures may be structured by known factors such as sex or age class, and the season or region of sample collection. The recognized structure in signature data inherently influences QFASA results in important and typically beneficial ways. However, predator and prey signatures may contain additional, hidden structure that investigators either choose not to incorporate into an analysis or of which they are unaware, being caused by unknown ecological mechanisms. Hidden structure also influences QFASA results, most often negatively. We developed a new method to explore signature data for hidden structure, called divisive magnetic clustering (DIMAC). Our DIMAC approach is based on the same distance measure used in diet estimation, closely linking methods of data exploration and parameter estimation, and it does not require data transformation or distributional assumptions, as do many multivariate ordination methods in common use. We investigated the potential benefits of the DIMAC method to detect and subsequently exploit hidden structure in signature data using two prey signature libraries with quite different characteristics. We found that the existence of hidden structure in prey signatures can increase the confusion between prey types and thereby reduce the accuracy and precision of QFASA diet estimates. Conversely, the detection and exploitation of hidden structure represent a potential opportunity to improve predator diet estimates and may lead to new

  8. Trawling for tor hidden services: Detection, measurement, deanonymization

    OpenAIRE

    Biryukov, Alex; Pustogarov, Ivan; Weinmann, Ralf-Philipp

    2013-01-01

    Tor is the most popular volunteer-based anonymity network consisting of over 3000 volunteer-operated relays. Apart from making connections to servers hard to trace to their origin it can also provide receiver privacy for Internet services through a feature called "hidden services". In this paper we expose flaws both in the design and implementation of Tor's hidden services that allow an attacker to measure the popularity of arbitrary hidden services, take down hidden services and deanonymize ...

  9. Detection of hidden structures in nonstationary spike trains.

    Science.gov (United States)

    Takiyama, Ken; Okada, Masato

    2011-05-01

    We propose an algorithm for simultaneously estimating state transitions among neural states and nonstationary firing rates using a switching state-space model (SSSM). This algorithm enables us to detect state transitions on the basis of not only discontinuous changes in mean firing rates but also discontinuous changes in the temporal profiles of firing rates (e.g., temporal correlation). We construct estimation and learning algorithms for a nongaussian SSSM, whose nongaussian property is caused by binary spike events. Local variational methods can transform the binary observation process into a quadratic form. The transformed observation process enables us to construct a variational Bayes algorithm that can determine the number of neural states based on automatic relevance determination. Additionally, our algorithm can estimate model parameters from single-trial data using a priori knowledge about state transitions and firing rates. Synthetic data analysis reveals that our algorithm has higher performance for estimating nonstationary firing rates than previous methods. The analysis also confirms that our algorithm can detect state transitions on the basis of discontinuous changes in temporal correlation, which are transitions that previous hidden Markov models could not detect. We also analyze neural data recorded from the medial temporal area. The statistically detected neural states probably coincide with transient and sustained states that have been detected heuristically. Estimated parameters suggest that our algorithm detects the state transitions on the basis of discontinuous changes in the temporal correlation of firing rates. These results suggest that our algorithm is advantageous in real-data analysis.

  10. Detecting Seismic Events Using a Supervised Hidden Markov Model

    Science.gov (United States)

    Burks, L.; Forrest, R.; Ray, J.; Young, C.

    2017-12-01

    We explore the use of supervised hidden Markov models (HMMs) to detect seismic events in streaming seismogram data. Current methods for seismic event detection include simple triggering algorithms, such as STA/LTA and the Z-statistic, which can lead to large numbers of false positives that must be investigated by an analyst. The hypothesis of this study is that more advanced detection methods, such as HMMs, may decreases false positives while maintaining accuracy similar to current methods. We train a binary HMM classifier using 2 weeks of 3-component waveform data from the International Monitoring System (IMS) that was carefully reviewed by an expert analyst to pick all seismic events. Using an ensemble of simple and discrete features, such as the triggering of STA/LTA, the HMM predicts the time at which transition occurs from noise to signal. Compared to the STA/LTA detection algorithm, the HMM detects more true events, but the false positive rate remains unacceptably high. Future work to potentially decrease the false positive rate may include using continuous features, a Gaussian HMM, and multi-class HMMs to distinguish between types of seismic waves (e.g., P-waves and S-waves). Acknowledgement: Sandia National Laboratories is a multi-mission laboratory managed and operated by National Technology and Engineering Solutions of Sandia, LLC., a wholly owned subsidiary of Honeywell International, Inc., for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA-0003525.SAND No: SAND2017-8154 A

  11. The Hidden Rape Victim: Personality, Attitudinal, and Situational Characteristics.

    Science.gov (United States)

    Koss, Mary P.

    1985-01-01

    Describes victimization experienced by rape victims and determines whether any psychological variables were related to victimization status. Psychological variables examined included personality, attitudinal, and situational characteristics relevant to the three major models of rape victimization: social control, victim precipitation, and…

  12. The 'hidden image' effect in security holograms and its personalization by laser demetallization

    Science.gov (United States)

    Bulanovs, Andrejs; Tamanis, Edmunds; Kolbjonoks, Vadims

    2013-05-01

    The given work investigates principles of recording, calculation, and security aspects of `hidden image' effect in digital holograms that are intended for security applications. Dot-matrix and image-matrix technologies of optical recording can be widely used for recording protective holograms with such type of security features. When a collimated laser beam falls on and then is reflected from the section of holograms, containing a protective `hidden image' element, a graphic image can be seen in the projection of diffracted light on the frosted screen. The present work also discusses a method of personalizing the `hidden image' effect with the help of laser demetallization. In this way the hidden image can be individualized for each hologram sticker and contain additional information such as a number, text or logotype. The attractiveness of this method is in the possibility of achieving a considerable increase of the protective characteristic of holograms and incorporating additional variable information in them, as well as in providing both visual and automatic ways of checking authenticity of a hologram.

  13. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy......The law enforcement agencies need up-to-the minute intelligence about terrorist threats, which makes the development of expanded and improved intelligence a pre-requisite for their success As such, the intelligence community is actively developing new technologies to facilitate the identification...... and targeting of new and emerging threats. These threats can be manifested in network-centric form of organizations, doctrines, and technologies attuned to the information age. It is a widely held belief that terrorist activities are done by dispersed organizations (like non-hierarchical organizations), small...

  14. Swallowing sound detection using hidden markov modeling of recurrence plot features

    International Nuclear Information System (INIS)

    Aboofazeli, Mohammad; Moussavi, Zahra

    2009-01-01

    Automated detection of swallowing sounds in swallowing and breath sound recordings is of importance for monitoring purposes in which the recording durations are long. This paper presents a novel method for swallowing sound detection using hidden Markov modeling of recurrence plot features. Tracheal sound recordings of 15 healthy and nine dysphagic subjects were studied. The multidimensional state space trajectory of each signal was reconstructed using the Taken method of delays. The sequences of three recurrence plot features of the reconstructed trajectories (which have shown discriminating capability between swallowing and breath sounds) were modeled by three hidden Markov models. The Viterbi algorithm was used for swallowing sound detection. The results were validated manually by inspection of the simultaneously recorded airflow signal and spectrogram of the sounds, and also by auditory means. The experimental results suggested that the performance of the proposed method using hidden Markov modeling of recurrence plot features was superior to the previous swallowing sound detection methods.

  15. Electrochemical impedance pattern recognition for detection of hidden chemical corrosion on aircraft components, phase 1

    Science.gov (United States)

    Sammells, A. F.; Bowers, J. S.

    1995-02-01

    This investigation addressed the need for diagnostic instrumentation compatible with performing the Nondestructive Evaluation (NDE) of hidden chemical corrosion with a high degree of accuracy, sensitivity and versatility on both titanium and aluminum alloys currently used in Air Force and commercial aircraft. The overall approach was directed towards development of pattern recognition schemes based upon the on-line data acquisition of Fast Fourier Transform Electrochemical Impedance Spectroscopy (FFTEIS) instrumentation from the suspect hidden chemical corrosion site. Resulting impedance patterns were then analyzed by application of a Neural Network pattern recognition scheme. The Neural Network Analysis (NNA) was then trained to both detect and grade the severity of hidden corrosion present on the aircraft metal substrate interface of interest. Nueral Net Analysis of FFTEIS data was verified as a powerful diagnostic strategy for in situ hidden corrosion process identification, quantitative analysis and severity grading. Correlations between impedance measurements and corrosion depth were verified by subsequent SEM and EDX examination of the metal interfacial regions. The approach will also be powerful for gaining fundamental information into the nature of corrosion processes and conditions leading to their inception at hidden sites.

  16. Statistical detection of the hidden distortions in diffusive spectra

    CERN Document Server

    Nigmatullin, R R; Smith, G; Butler, P

    2003-01-01

    The detection of an unknown substance in small concentration represents an important problem in spectroscopy. Usually this detection is based on the recognition of specific 'labels' i.e. the visual appearance of new resonance lines that appear in the spectrograms analysed. But if the concentration of the unknown substance is small and visual indications (e.g. resonance peaks in diffusive spectra) are absent then the detection of the unknown substance constitutes a problem. We suggest a new methodology for the statistical detection of an unknown substance, based on the transformation of fluctuations obtained from initial spectrograms into ordered quantized histograms (QHs). The QHs obtained help to detect, statistically, the presence of unknown substances using the characteristics of conventional quantum spectra adopted from quantum mechanics. The averaging of the QHs helps to calculate the ordered 'fluctuation fork' (FF), which provides a specific 'noise ruler' for the detection and quantification of the trac...

  17. Detection of gratings hidden by diffusers using photon-correlation techniques

    Science.gov (United States)

    Dainty, J. C.; Newman, D.

    1983-12-01

    Photon-correlation experiments have verified the theoretical prediction of Baltes et al. (1981) that a phase grating hidden by a diffuser can be detected by correlation measurements. It has additionally been demonstrated that a simpler method of detecting the presence of the grating, valid for arbitrarily fine diffusers, is to measure the temporal autocorrelation of the intensity of the scattered field at a single point.

  18. An Approach for Detecting Malicious Emails Using Runtime Monitoring with Hidden Data

    Science.gov (United States)

    2016-09-01

    DETECTING MALICIOUS EMAILS USING RUNTIME MONITORING WITH HIDDEN DATA by Kristin R. Sellers September 2016 Thesis Advisor: Doron Drusinsky...3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE AN APPROACH FOR DETECTING MALICIOUS EMAILS USING RUNTIME MONITORING WITH...hybrid of Runtime Monitoring and Machine Learning for monitoring patterns of malicious emails. The system is designed in a way that it gathers

  19. Home-Explorer: Ontology-Based Physical Artifact Search and Hidden Object Detection System

    Directory of Open Access Journals (Sweden)

    Bin Guo

    2008-01-01

    Full Text Available A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses sensors attached to the everyday artifacts (called smart objects in the real world. This paper makes two main contributions: First, it addresses, the robustness of the embedded sensors, which is seldom discussed in previous smart artifact research. Because sensors may sometimes be broken or fail to work under certain conditions, smart objects become hidden ones. However, current systems provide no mechanism to detect and manage objects when this problem occurs. Second, there is no common context infrastructure for building smart artifact systems, which makes it difficult for separately developed applications to interact with each other and uneasy for them to share and reuse knowledge. Unlike previous systems, Home-Explorer builds on an ontology-based knowledge infrastructure named Sixth-Sense, which makes it easy for the system to interact with other applications or agents also based on this ontology. The hidden object problem is also reflected in our ontology, which enables Home-Explorer to deal with both smart objects and hidden objects. A set of rules for deducing an object's status or location information and for locating hidden objects are described and evaluated.

  20. Learning to Automatically Detect Features for Mobile Robots Using Second-Order Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Richard Washington

    2008-11-01

    Full Text Available In this paper, we propose a new method based on Hidden Markov Models to interpret temporal sequences of sensor data from mobile robots to automatically detect features. Hidden Markov Models have been used for a long time in pattern recognition, especially in speech recognition. Their main advantages over other methods (such as neural networks are their ability to model noisy temporal signals of variable length. We show in this paper that this approach is well suited for interpretation of temporal sequences of mobile-robot sensor data. We present two distinct experiments and results: the first one in an indoor environment where a mobile robot learns to detect features like open doors or T- intersections, the second one in an outdoor environment where a different mobile robot has to identify situations like climbing a hill or crossing a rock.

  1. Two-dimensional hidden semantic information model for target saliency detection and eyetracking identification

    Science.gov (United States)

    Wan, Weibing; Yuan, Lingfeng; Zhao, Qunfei; Fang, Tao

    2018-01-01

    Saliency detection has been applied to the target acquisition case. This paper proposes a two-dimensional hidden Markov model (2D-HMM) that exploits the hidden semantic information of an image to detect its salient regions. A spatial pyramid histogram of oriented gradient descriptors is used to extract features. After encoding the image by a learned dictionary, the 2D-Viterbi algorithm is applied to infer the saliency map. This model can predict fixation of the targets and further creates robust and effective depictions of the targets' change in posture and viewpoint. To validate the model with a human visual search mechanism, two eyetrack experiments are employed to train our model directly from eye movement data. The results show that our model achieves better performance than visual attention. Moreover, it indicates the plausibility of utilizing visual track data to identify targets.

  2. Learning to Automatically Detect Features for Mobile Robots Using Second-Order Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Olivier Aycard

    2004-12-01

    Full Text Available In this paper, we propose a new method based on Hidden Markov Models to interpret temporal sequences of sensor data from mobile robots to automatically detect features. Hidden Markov Models have been used for a long time in pattern recognition, especially in speech recognition. Their main advantages over other methods (such as neural networks are their ability to model noisy temporal signals of variable length. We show in this paper that this approach is well suited for interpretation of temporal sequences of mobile-robot sensor data. We present two distinct experiments and results: the first one in an indoor environment where a mobile robot learns to detect features like open doors or T-intersections, the second one in an outdoor environment where a different mobile robot has to identify situations like climbing a hill or crossing a rock.

  3. Insertion, Detection, and Extraction of Messages Hidden by Optimal Multi-Signature Spread Spectrum Means

    Science.gov (United States)

    2015-07-09

    AFRL-OSR-VA-TR-2015-0164 Insertion, Detection , and Extraction of Messages Dimitrios Pados RESEARCH FOUNDATION OF STATE UNIVERSITY OF NEW YORK THE...Performance 3.  DATES COVERED (From - To)      01-04-2012 to 31-03-2015 4.  TITLE AND SUBTITLE Insertion, Detection , and Extraction of Messages Hidden... Multiuser data embedding is performed in the generated host vectors. Under this data embedding model, we calculate an orthogonal set of embedding spread

  4. Detection of bursts in extracellular spike trains using hidden semi-Markov point process models.

    Science.gov (United States)

    Tokdar, Surya; Xi, Peiyi; Kelly, Ryan C; Kass, Robert E

    2010-08-01

    Neurons in vitro and in vivo have epochs of bursting or "up state" activity during which firing rates are dramatically elevated. Various methods of detecting bursts in extracellular spike trains have appeared in the literature, the most widely used apparently being Poisson Surprise (PS). A natural description of the phenomenon assumes (1) there are two hidden states, which we label "burst" and "non-burst," (2) the neuron evolves stochastically, switching at random between these two states, and (3) within each state the spike train follows a time-homogeneous point process. If in (2) the transitions from non-burst to burst and burst to non-burst states are memoryless, this becomes a hidden Markov model (HMM). For HMMs, the state transitions follow exponential distributions, and are highly irregular. Because observed bursting may in some cases be fairly regular-exhibiting inter-burst intervals with small variation-we relaxed this assumption. When more general probability distributions are used to describe the state transitions the two-state point process model becomes a hidden semi-Markov model (HSMM). We developed an efficient Bayesian computational scheme to fit HSMMs to spike train data. Numerical simulations indicate the method can perform well, sometimes yielding very different results than those based on PS.

  5. Epigenetic change detection and pattern recognition via Bayesian hierarchical hidden Markov models.

    Science.gov (United States)

    Wang, Xinlei; Zang, Miao; Xiao, Guanghua

    2013-06-15

    Epigenetics is the study of changes to the genome that can switch genes on or off and determine which proteins are transcribed without altering the DNA sequence. Recently, epigenetic changes have been linked to the development and progression of disease such as psychiatric disorders. High-throughput epigenetic experiments have enabled researchers to measure genome-wide epigenetic profiles and yield data consisting of intensity ratios of immunoprecipitation versus reference samples. The intensity ratios can provide a view of genomic regions where protein binding occur under one experimental condition and further allow us to detect epigenetic alterations through comparison between two different conditions. However, such experiments can be expensive, with only a few replicates available. Moreover, epigenetic data are often spatially correlated with high noise levels. In this paper, we develop a Bayesian hierarchical model, combined with hidden Markov processes with four states for modeling spatial dependence, to detect genomic sites with epigenetic changes from two-sample experiments with paired internal control. One attractive feature of the proposed method is that the four states of the hidden Markov process have well-defined biological meanings and allow us to directly call the change patterns based on the corresponding posterior probabilities. In contrast, none of existing methods can offer this advantage. In addition, the proposed method offers great power in statistical inference by spatial smoothing (via hidden Markov modeling) and information pooling (via hierarchical modeling). Both simulation studies and real data analysis in a cocaine addiction study illustrate the reliability and success of this method. Copyright © 2012 John Wiley & Sons, Ltd.

  6. Automated detection of microcalcification clusters in digital mammograms based on wavelet domain hidden Markov tree modeling

    International Nuclear Information System (INIS)

    Regentova, E.; Zhang, L.; Veni, G.; Zheng, J.

    2007-01-01

    A system is designed for detecting microcalcification clusters (MCC) in digital mammograms. The system is intended for computer-aided diagnostic prompting. Further discrimination of MCC as benign or malignant is assumed to be performed by radiologists. Processing of mammograms is based on the statistical modeling by means of wavelet domain hidden markov trees (WHMT). Segmentation is performed by the weighted likelihood evaluation followed by the classification based on spatial filters for a single microcalcification (MC) and a cluster of MC detection. The analysis is carried out on FROC curves for 40 mammograms from the mini-MIAS database and for 100 mammograms with 50 cancerous and 50 benign cases from DDSM database. The designed system is capable to detect 100% of true positive cases in these sets. The rate of false positives is 2.9 per case for mini-MIAS dataset; and 0.01 for the DDSM images. (orig.)

  7. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

    of Investigative Data Mining (IDM). In addition, we present iMiner Information Harvesting System and describe how intelligence agencies could be benefited from detecting hierarchy in non-hierarchical terrorist networks.  In this paper we present results of detection of hidden hierarchy of Riyadh Bombing Terrorist...

  8. Non-intrusive gesture recognition system combining with face detection based on Hidden Markov Model

    Science.gov (United States)

    Jin, Jing; Wang, Yuanqing; Xu, Liujing; Cao, Liqun; Han, Lei; Zhou, Biye; Li, Minggao

    2014-11-01

    A non-intrusive gesture recognition human-machine interaction system is proposed in this paper. In order to solve the hand positioning problem which is a difficulty in current algorithms, face detection is used for the pre-processing to narrow the search area and find user's hand quickly and accurately. Hidden Markov Model (HMM) is used for gesture recognition. A certain number of basic gesture units are trained as HMM models. At the same time, an improved 8-direction feature vector is proposed and used to quantify characteristics in order to improve the detection accuracy. The proposed system can be applied in interaction equipments without special training for users, such as household interactive television

  9. An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack

    Directory of Open Access Journals (Sweden)

    ZUBAIR AHMED KHAN

    2016-07-01

    Full Text Available MANETs (Mobile Ad Hoc Networks are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time and RSSI (Received Signal Strength Indicator for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead.

  10. First Direct-Detection Constraints on eV-Scale Hidden-Photon Dark Matter with DAMIC at SNOLAB

    Energy Technology Data Exchange (ETDEWEB)

    Aguilar-Arevalo, A.; Amidei, D.; Bertou, X.; Butner, M.; Cancelo, G.; Castañeda Vázquez, A.; Cervantes Vergara, B. A.; Chavarria, A. E.; Chavez, C. R.; de Mello Neto, J. R. T.; D’Olivo, J. C.; Estrada, J.; Fernandez Moroni, G.; Gaïor, R.; Guardincerri, Y.; Hernández Torres, K. P.; Izraelevitch, F.; Kavner, A.; Kilminster, B.; Lawson, I.; Letessier-Selvon, A.; Liao, J.; Matalon, A.; Mello, V. B. B.; Molina, J.; Privitera, P.; Ramanathan, K.; Sarkis, Y.; Schwarz, T.; Settimo, M.; Sofo Haro, M.; Thomas, R.; Tiffenberg, J.; Tiouchichine, E.; Torres Machado, D.; Trillaud, F.; You, X.; Zhou, J.

    2017-04-05

    We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30 eV$c^{-2}$ with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter $\\kappa$ is competitive with constraints from solar emission, reaching a minimum value of 2.2$\\times$$10^{-14}$ at 17 eV$c^{-2}$. These results are the most stringent direct detection constraints on hidden-photon dark matter with masses 3-12 eV$c^{-2}$ and the first demonstration of direct experimental sensitivity to ionization signals $<$12 eV from dark matter interactions.

  11. First Direct-Detection Constraints on eV-Scale Hidden-Photon Dark Matter with DAMIC at SNOLAB.

    Science.gov (United States)

    Aguilar-Arevalo, A; Amidei, D; Bertou, X; Butner, M; Cancelo, G; Castañeda Vázquez, A; Cervantes Vergara, B A; Chavarria, A E; Chavez, C R; de Mello Neto, J R T; D'Olivo, J C; Estrada, J; Fernandez Moroni, G; Gaïor, R; Guardincerri, Y; Hernández Torres, K P; Izraelevitch, F; Kavner, A; Kilminster, B; Lawson, I; Letessier-Selvon, A; Liao, J; Matalon, A; Mello, V B B; Molina, J; Privitera, P; Ramanathan, K; Sarkis, Y; Schwarz, T; Settimo, M; Sofo Haro, M; Thomas, R; Tiffenberg, J; Tiouchichine, E; Torres Machado, D; Trillaud, F; You, X; Zhou, J

    2017-04-07

    We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30  eV c^{-2} with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter κ is competitive with constraints from solar emission, reaching a minimum value of 2.2×10^{-14} at 17  eV c^{-2}. These results are the most stringent direct detection constraints on hidden-photon dark matter in the galactic halo with masses 3-12  eV c^{-2} and the first demonstration of direct experimental sensitivity to ionization signals dark matter interactions.

  12. QRS complex detection based on continuous density hidden Markov models using univariate observations

    Science.gov (United States)

    Sotelo, S.; Arenas, W.; Altuve, M.

    2018-04-01

    In the electrocardiogram (ECG), the detection of QRS complexes is a fundamental step in the ECG signal processing chain since it allows the determination of other characteristics waves of the ECG and provides information about heart rate variability. In this work, an automatic QRS complex detector based on continuous density hidden Markov models (HMM) is proposed. HMM were trained using univariate observation sequences taken either from QRS complexes or their derivatives. The detection approach is based on the log-likelihood comparison of the observation sequence with a fixed threshold. A sliding window was used to obtain the observation sequence to be evaluated by the model. The threshold was optimized by receiver operating characteristic curves. Sensitivity (Sen), specificity (Spc) and F1 score were used to evaluate the detection performance. The approach was validated using ECG recordings from the MIT-BIH Arrhythmia database. A 6-fold cross-validation shows that the best detection performance was achieved with 2 states HMM trained with QRS complexes sequences (Sen = 0.668, Spc = 0.360 and F1 = 0.309). We concluded that these univariate sequences provide enough information to characterize the QRS complex dynamics from HMM. Future works are directed to the use of multivariate observations to increase the detection performance.

  13. Passive Acoustic Leak Detection for Sodium Cooled Fast Reactors Using Hidden Markov Models

    Science.gov (United States)

    Marklund, A. Riber; Kishore, S.; Prakash, V.; Rajan, K. K.; Michel, F.

    2016-06-01

    Acoustic leak detection for steam generators of sodium fast reactors have been an active research topic since the early 1970s and several methods have been tested over the years. Inspired by its success in the field of automatic speech recognition, we here apply hidden Markov models (HMM) in combination with Gaussian mixture models (GMM) to the problem. To achieve this, we propose a new feature calculation scheme, based on the temporal evolution of the power spectral density (PSD) of the signal. Using acoustic signals recorded during steam/water injection experiments done at the Indira Gandhi Centre for Atomic Research (IGCAR), the proposed method is tested. We perform parametric studies on the HMM+GMM model size and demonstrate that the proposed method a) performs well without a priori knowledge of injection noise, b) can incorporate several noise models and c) has an output distribution that simplifies false alarm rate control.

  14. Passive acoustic leak detection for sodium cooled fast reactors using hidden Markov models

    Energy Technology Data Exchange (ETDEWEB)

    Riber Marklund, A. [CEA, Cadarache, DEN/DTN/STCP/LIET, Batiment 202, 13108 St Paul-lez-Durance, (France); Kishore, S. [Fast Reactor Technology Group of IGCAR, (India); Prakash, V. [Vibrations Diagnostics Division, Fast Reactor Technology Group of IGCAR, (India); Rajan, K.K. [Fast Reactor Technology Group and Engineering Services Group of IGCAR, (India)

    2015-07-01

    Acoustic leak detection for steam generators of sodium fast reactors have been an active research topic since the early 1970's and several methods have been tested over the years. Inspired by its success in the field of automatic speech recognition, we here apply hidden Markov models (HMM) in combination with Gaussian mixture models (GMM) to the problem. To achieve this, we propose a new feature calculation scheme, based on the temporal evolution of the power spectral density (PSD) of the signal. Using acoustic signals recorded during steam/water injection experiments done at the Indira Gandhi Centre for Atomic Research (IGCAR), the proposed method is tested. We perform parametric studies on the HMM+GMM model size and demonstrate that the proposed method a) performs well without a priori knowledge of injection noise, b) can incorporate several noise models and c) has an output distribution that simplifies false alarm rate control. (authors)

  15. Hypovigilance Detection for UCAV Operators Based on a Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Yerim Choi

    2014-01-01

    Full Text Available With the advance of military technology, the number of unmanned combat aerial vehicles (UCAVs has rapidly increased. However, it has been reported that the accident rate of UCAVs is much higher than that of manned combat aerial vehicles. One of the main reasons for the high accident rate of UCAVs is the hypovigilance problem which refers to the decrease in vigilance levels of UCAV operators while maneuvering. In this paper, we propose hypovigilance detection models for UCAV operators based on EEG signal to minimize the number of occurrences of hypovigilance. To enable detection, we have applied hidden Markov models (HMMs, two of which are used to indicate the operators’ dual states, normal vigilance and hypovigilance, and, for each operator, the HMMs are trained as a detection model. To evaluate the efficacy and effectiveness of the proposed models, we conducted two experiments on the real-world data obtained by using EEG-signal acquisition devices, and they yielded satisfactory results. By utilizing the proposed detection models, the problem of hypovigilance of UCAV operators and the problem of high accident rate of UCAVs can be addressed.

  16. Hypovigilance detection for UCAV operators based on a hidden Markov model.

    Science.gov (United States)

    Choi, Yerim; Kwon, Namyeon; Lee, Sungjun; Shin, Yongwook; Ryo, Chuh Yeop; Park, Jonghun; Shin, Dongmin

    2014-01-01

    With the advance of military technology, the number of unmanned combat aerial vehicles (UCAVs) has rapidly increased. However, it has been reported that the accident rate of UCAVs is much higher than that of manned combat aerial vehicles. One of the main reasons for the high accident rate of UCAVs is the hypovigilance problem which refers to the decrease in vigilance levels of UCAV operators while maneuvering. In this paper, we propose hypovigilance detection models for UCAV operators based on EEG signal to minimize the number of occurrences of hypovigilance. To enable detection, we have applied hidden Markov models (HMMs), two of which are used to indicate the operators' dual states, normal vigilance and hypovigilance, and, for each operator, the HMMs are trained as a detection model. To evaluate the efficacy and effectiveness of the proposed models, we conducted two experiments on the real-world data obtained by using EEG-signal acquisition devices, and they yielded satisfactory results. By utilizing the proposed detection models, the problem of hypovigilance of UCAV operators and the problem of high accident rate of UCAVs can be addressed.

  17. Detection of hidden hazelnut protein in food by IgY-based indirect competitive enzyme-immunoassay

    NARCIS (Netherlands)

    Baumgartner, S.; Bremer, M.G.E.G.; Kemmers - Voncken, A.E.M.; Smits, N.G.E.; Haasnoot, W.; Banks, J.; Reece, P.; Danks, C.; Tomkies, V.; Immer, U.; Schmitt, K.; Krska, R.

    2004-01-01

    The development of an indirect competitive enzyme-immunoassay for the detection of hidden hazelnut protein in complex food matrices is described. A sensitive and selective polyclonal antibody was raised by immunisation of laying hens with protein extracts from roasted hazelnuts. In contrast to

  18. The hidden web and the fentanyl problem: Detection of ocfentanil as an adulterant in heroin.

    Science.gov (United States)

    Quintana, Pol; Ventura, Mireia; Grifell, Marc; Palma, Alvaro; Galindo, Liliana; Fornís, Iván; Gil, Cristina; Carbón, Xoán; Caudevilla, Fernando; Farré, Magí; Torrens, Marta

    2017-02-01

    The popularization of anonymous markets such as Silk Road is challenging current drug policy and may provide a new context for old issues, such as adulteration of heroin with fentanyl derivatives. The aims of this paper are to report the presence of ocfentanil, a novel, potent, non-controlled fentanyl analog, in samples sold as heroin in the hidden web, and to summarize the effects reported by users. In 2015, four samples allegedly bought as heroin in cryptomarkets of the hidden web were sent to Energy Control for analysis. Energy Control is a Spanish harm reduction NGO that offers anonymous drug checking with the purpose of adapting counselling to the specific substances present in the drug and monitor the drug market. Identification was performed by GC/MS and LC/MS/MS. We contacted the submitters of the samples and performed an Internet search to retrieve additional information. One sample contained ocfentanil, caffeine and heroin. Three samples contained the aforementioned substances plus paracetamol. Two out of the four contacted users reported distinct short acting, opioid-like effects. No fora discussion could be found about the effects of ocfentanil, neither web pages nor individuals advertising the substance. We report the presence of a new substance detected in the hidden web as an adulterant of heroin, ocfentanil. It has short acting opioid-like effects, roughly the same potency as fentanyl, and can be injected, snorted or smoked. Severe side effects have been associated with its use, including one death. No discussion about this substance could be found in the Internet, which suggests this substance has not been sold as such. Available data about purities of drugs purchased in cryptomarkets suggest that adulteration is not a severe problem and this agrees with users' perceptions. However, this study suggests that adulteration is a real threat not only at the street level, but also for users that buy substances in cryptomarkets, and suggest the need for

  19. The Use of Hidden Markov Models for Anomaly Detection in Nuclear Core Condition Monitoring

    Science.gov (United States)

    Stephen, Bruce; West, Graeme M.; Galloway, Stuart; McArthur, Stephen D. J.; McDonald, James R.; Towle, Dave

    2009-04-01

    Unplanned outages can be especially costly for generation companies operating nuclear facilities. Early detection of deviations from expected performance through condition monitoring can allow a more proactive and managed approach to dealing with ageing plant. This paper proposes an anomaly detection framework incorporating the use of the Hidden Markov Model (HMM) to support the analysis of nuclear reactor core condition monitoring data. Fuel Grab Load Trace (FGLT) data gathered within the UK during routine refueling operations has been seen to provide information relating to the condition of the graphite bricks that comprise the core. Although manual analysis of this data is time consuming and requires considerable expertise, this paper demonstrates how techniques such as the HMM can provide analysis support by providing a benchmark model of expected behavior against which future refueling events may be compared. The presence of anomalous behavior in candidate traces is inferred through the underlying statistical foundation of the HMM which gives an observation likelihood averaged along the length of the input sequence. Using this likelihood measure, the engineer can be alerted to anomalous behaviour, indicating data which might require further detailed examination. It is proposed that this data analysis technique is used in conjunction with other intelligent analysis techniques currently employed to analyse FGLT to provide a greater confidence measure in detecting anomalous behaviour from FGLT data.

  20. Rapid and enhanced remote homology detection by cascading hidden Markov model searches in sequence space.

    Science.gov (United States)

    Kaushik, Swati; Nair, Anu G; Mutt, Eshita; Subramanian, Hari Prasanna; Sowdhamini, Ramanathan

    2016-02-01

    In the post-genomic era, automatic annotation of protein sequences using computational homology-based methods is highly desirable. However, often protein sequences diverge to an extent where detection of homology and automatic annotation transfer is not straightforward. Sophisticated approaches to detect such distant relationships are needed. We propose a new approach to identify deep evolutionary relationships of proteins to overcome shortcomings of the available methods. We have developed a method to identify remote homologues more effectively from any protein sequence database by using several cascading events with Hidden Markov Models (C-HMM). We have implemented clustering of hits and profile generation of hit clusters to effectively reduce the computational timings of the cascaded sequence searches. Our C-HMM approach could cover 94, 83 and 40% coverage at family, superfamily and fold levels, respectively, when applied on diverse protein folds. We have compared C-HMM with various remote homology detection methods and discuss the trade-offs between coverage and false positives. A standalone package implemented in Java along with a detailed documentation can be downloaded from https://github.com/RSLabNCBS/C-HMM SUPPLEMENTARY INFORMATION: Supplementary data are available at Bioinformatics online. mini@ncbs.res.in. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  1. Automatic detection of alpine rockslides in continuous seismic data using hidden Markov models

    Science.gov (United States)

    Dammeier, Franziska; Moore, Jeffrey R.; Hammer, Conny; Haslinger, Florian; Loew, Simon

    2016-02-01

    Data from continuously recording permanent seismic networks can contain information about rockslide occurrence and timing complementary to eyewitness observations and thus aid in construction of robust event catalogs. However, detecting infrequent rockslide signals within large volumes of continuous seismic waveform data remains challenging and often requires demanding manual intervention. We adapted an automatic classification method using hidden Markov models to detect rockslide signals in seismic data from two stations in central Switzerland. We first processed 21 known rockslides, with event volumes spanning 3 orders of magnitude and station event distances varying by 1 order of magnitude, which resulted in 13 and 19 successfully classified events at the two stations. Retraining the models to incorporate seismic noise from the day of the event improved the respective results to 16 and 19 successful classifications. The missed events generally had low signal-to-noise ratio and small to medium volumes. We then processed nearly 14 years of continuous seismic data from the same two stations to detect previously unknown events. After postprocessing, we classified 30 new events as rockslides, of which we could verify three through independent observation. In particular, the largest new event, with estimated volume of 500,000 m3, was not generally known within the Swiss landslide community, highlighting the importance of regional seismic data analysis even in densely populated mountainous regions. Our method can be easily implemented as part of existing earthquake monitoring systems, and with an average event detection rate of about two per month, manual verification would not significantly increase operational workload.

  2. Strategies for Detecting Hidden Geothermal Systems by Near-Surface Gas Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Lewicki, Jennifer L.; Oldenburg, Curtis M.

    2004-12-15

    ''Hidden'' geothermal systems are those systems above which hydrothermal surface features (e.g., hot springs, fumaroles, elevated ground temperatures, hydrothermal alteration) are lacking. Emissions of moderate to low solubility gases (e.g., CO2, CH4, He) may be one of the primary near-surface signals from these systems. Detection of anomalous gas emissions related to hidden geothermal systems may therefore be an important tool to discover new geothermal resources. This study investigates the potential for CO2 detection and monitoring in the subsurface and above ground in the near-surface environment to serve as a tool to discover hidden geothermal systems. We focus the investigation on CO2 due to (1) its abundance in geothermal systems, (2) its moderate solubility in water, and (3) the wide range of technologies available to monitor CO2 in the near-surface environment. However, monitoring in the near-surface environment for CO2 derived from hidden geothermal reservoirs is complicated by the large variation in CO2 fluxes and concentrations arising from natural biological and hydrologic processes. In the near-surface environment, the flow and transport of CO2 at high concentrations will be controlled by its high density, low viscosity, and high solubility in water relative to air. Numerical simulations of CO2 migration show that CO2 concentrations can reach very high levels in the shallow subsurface even for relatively low geothermal source CO2 fluxes. However, once CO2 seeps out of the ground into the atmospheric surface layer, surface winds are effective at dispersing CO2 seepage. In natural ecological systems in the absence of geothermal gas emissions, near-surface CO2 fluxes and concentrations are primarily controlled by CO2 uptake by photosynthesis, production by root respiration, and microbial decomposition of soil/subsoil organic matter, groundwater degassing, and exchange with the atmosphere. Available technologies for monitoring CO2 in

  3. Hidden diversity in diatoms of Kenyan Lake Naivasha: a genetic approach detects temporal variation.

    Science.gov (United States)

    Stoof-Leichsenring, Kathleen R; Epp, Laura S; Trauth, Martin H; Tiedemann, Ralph

    2012-04-01

    This study provides insights into the morphological and genetic diversity in diatoms occurring in core sediments from tropical lakes in Kenya. We developed a genetic survey technique specific for diatoms utilizing a short region (76-67 bp) of the ribulose-1,5-bisphosphate carboxylase/oxygenase large subunit (rbcL) gene as genetic barcode. Our analyses (i) validated the use of rbcL as a barcoding marker for diatoms, applied to sediment samples, (ii) showed a significant correlation between the results obtained by morphological and molecular data and (iii) indicated temporal variation in diatom assemblages on the inter- and intra-specific level. Diatom assemblages from a short core from Lake Naivasha show a drastic shift over the last 200 years, as littoral species (e.g. Navicula) are replaced by more planktonic ones (e.g. Aulacoseira). Within that same period, we detected periodic changes in the respective frequencies of distinct haplotype groups of Navicula, which coincide with wet and dry periods of Lake Naivasha between 1820 and 1938 AD. Our genetic analyses on historical lake sediments revealed inter- and intra-specific variation in diatoms, which is partially hidden behind single morphotypes. The occurrence of particular genetic lineages is probably correlated with environmental factors. © 2012 Blackwell Publishing Ltd.

  4. Prioritized Detection of Personally Familiar Faces

    Science.gov (United States)

    Gobbini, Maria Ida; Gors, Jason D.; Halchenko, Yaroslav O.; Rogers, Courtney; Guntupalli, J. Swaroop; Hughes, Howard; Cipolli, Carlo

    2013-01-01

    We investigated whether personally familiar faces are preferentially processed in conditions of reduced attentional resources and in the absence of conscious awareness. In the first experiment, we used Rapid Serial Visual Presentation (RSVP) to test the susceptibility of familiar faces and faces of strangers to the attentional blink. In the second experiment, we used continuous flash interocular suppression to render stimuli invisible and measured face detection time for personally familiar faces as compared to faces of strangers. In both experiments we found an advantage for detection of personally familiar faces as compared to faces of strangers. Our data suggest that the identity of faces is processed with reduced attentional resources and even in the absence of awareness. Our results show that this facilitated processing of familiar faces cannot be attributed to detection of low-level visual features and that a learned unique configuration of facial features can influence preconscious perceptual processing. PMID:23805248

  5. Detecting critical state before phase transition of complex biological systems by hidden Markov model.

    Science.gov (United States)

    Chen, Pei; Liu, Rui; Li, Yongjun; Chen, Luonan

    2016-07-15

    Identifying the critical state or pre-transition state just before the occurrence of a phase transition is a challenging task, because the state of the system may show little apparent change before this critical transition during the gradual parameter variations. Such dynamics of phase transition is generally composed of three stages, i.e. before-transition state, pre-transition state and after-transition state, which can be considered as three different Markov processes. By exploring the rich dynamical information provided by high-throughput data, we present a novel computational method, i.e. hidden Markov model (HMM) based approach, to detect the switching point of the two Markov processes from the before-transition state (a stationary Markov process) to the pre-transition state (a time-varying Markov process), thereby identifying the pre-transition state or early-warning signals of the phase transition. To validate the effectiveness, we apply this method to detect the signals of the imminent phase transitions of complex systems based on the simulated datasets, and further identify the pre-transition states as well as their critical modules for three real datasets, i.e. the acute lung injury triggered by phosgene inhalation, MCF-7 human breast cancer caused by heregulin and HCV-induced dysplasia and hepatocellular carcinoma. Both functional and pathway enrichment analyses validate the computational results. The source code and some supporting files are available at https://github.com/rabbitpei/HMM_based-method lnchen@sibs.ac.cn or liyj@scut.edu.cn Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  6. A first approach to Arrhythmogenic Cardiomyopathy detection through ECG and Hidden Markov Models

    Energy Technology Data Exchange (ETDEWEB)

    Jimenez-Serrano, S.; Sanz Sanchez, J.; Martínez Hinarejos, C.D.; Igual Muñoz, B.; Millet Roig, J.; Zorio Grima, Z.; Castells, F.

    2016-07-01

    Arrhythmogenic Cardiomyopathy (ACM) is a heritable cardiac disease causing sudden cardiac death in young people. Its clinical diagnosis includes major and minor criteria based on alterations of the electrocardiogram (ECG). The aim of this study is to evaluate Hidden Markov Models (HMM) in order to assess its possible potential of classification among subjects affected by ACM and those relatives who do not suffer the disease through 12-lead ECG recordings. Database consists of 12-lead ECG recordings from 32 patients diagnosed with ACM, and 37 relatives of those affected, but without gene mutation. Using the HTK toolkit and a hold-out strategy in order to train and evaluate a set of HMM models, we performed a grid search through the number of states and Gaussians across these HMM models. Results show that two different HMM models achieved the best balance between sensibility and specificity. The first one needed 35 states and 2 Gaussians and its performance was 0.7 and 0.8 in sensibility and specificity respectively. The second one achieved a sensibility and specificity values of 0.8 and 0.7 respectively with 50 states and 4 Gaussians. The results of this study show that HMM models can achieve an acceptable level of sensibility and specificity in the classification among ECG registers between those affected by ACM and the control group. All the above suggest that this approach could help to detect the disease in a non-invasive way, especially within the context of family screening, improving sensitivity in detection by ECG. (Author)

  7. DoS detection in IEEE 802.11 with the presence of hidden nodes.

    Science.gov (United States)

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2014-07-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.

  8. Profile hidden Markov models for the detection of viruses within metagenomic sequence data.

    Directory of Open Access Journals (Sweden)

    Peter Skewes-Cox

    Full Text Available Rapid, sensitive, and specific virus detection is an important component of clinical diagnostics. Massively parallel sequencing enables new diagnostic opportunities that complement traditional serological and PCR based techniques. While massively parallel sequencing promises the benefits of being more comprehensive and less biased than traditional approaches, it presents new analytical challenges, especially with respect to detection of pathogen sequences in metagenomic contexts. To a first approximation, the initial detection of viruses can be achieved simply through alignment of sequence reads or assembled contigs to a reference database of pathogen genomes with tools such as BLAST. However, recognition of highly divergent viral sequences is problematic, and may be further complicated by the inherently high mutation rates of some viral types, especially RNA viruses. In these cases, increased sensitivity may be achieved by leveraging position-specific information during the alignment process. Here, we constructed HMMER3-compatible profile hidden Markov models (profile HMMs from all the virally annotated proteins in RefSeq in an automated fashion using a custom-built bioinformatic pipeline. We then tested the ability of these viral profile HMMs ("vFams" to accurately classify sequences as viral or non-viral. Cross-validation experiments with full-length gene sequences showed that the vFams were able to recall 91% of left-out viral test sequences without erroneously classifying any non-viral sequences into viral protein clusters. Thorough reanalysis of previously published metagenomic datasets with a set of the best-performing vFams showed that they were more sensitive than BLAST for detecting sequences originating from more distant relatives of known viruses. To facilitate the use of the vFams for rapid detection of remote viral homologs in metagenomic data, we provide two sets of vFams, comprising more than 4,000 vFams each, in the HMMER3

  9. Detection of hidden stationary deformations of vibrating surfaces by use of time-averaged digital holographic interferometry.

    Science.gov (United States)

    Demoli, Nazif; Vukicevic, Dalibor

    2004-10-15

    A method of detecting displacements of a surface from its steady-state position to its equilibrium position while it is vibrating has been developed by use of time-average digital holographic interferometry. This method permits extraction of such a hidden deformation by creating two separated systems of interferogram fringes: one corresponding to a time-varying resonantly oscillating optical phase, the other to the stationary phase modification. A mathematical description of the method and illustrative results of experimental verification are presented.

  10. Detection of Persons in Mls Point Clouds

    Science.gov (United States)

    Borgmann, B.; Hebel, M.; Arens, M.; Stilla, U.

    2017-09-01

    In this paper we present an approach for the detection of persons in point clouds gathered by mobile laser scanning (MLS) systems. The approach consists of a preprocessing and the actual detection. The main task of the preprocessing is to reduce the amount of data which has to be processed by the detection. To fulfill this task, the preprocessing consists of ground removal, segmentation and several filters. The detection is based on an implicit shape models (ISM) approach which is an extension to bag-of-words approaches. For this detection method, it is sufficient to work with a small amount of training data. Although in this paper we focus on the detection of persons, our approach is able to detect multiple classes of objects in point clouds. Using a parameterization of the approach which offers a good compromise between detection and runtime performance, we are able to achieve a precision of 0.68 and a recall of 0.76 while having a average runtime of 370 ms per single scan rotation of the rotating head of a typical MLS sensor.

  11. Model-independent indirect detection constraints on hidden sector dark matter

    Science.gov (United States)

    Elor, Gilly; Rodd, Nicholas L.; Slatyer, Tracy R.; Xue, Wei

    2016-06-01

    If dark matter inhabits an expanded ``hidden sector'', annihilations may proceed through sequential decays or multi-body final states. We map out the potential signals and current constraints on such a framework in indirect searches, using a model-independent setup based on multi-step hierarchical cascade decays. While remaining agnostic to the details of the hidden sector model, our framework captures the generic broadening of the spectrum of secondary particles (photons, neutrinos, e+e- and bar p p) relative to the case of direct annihilation to Standard Model particles. We explore how indirect constraints on dark matter annihilation limit the parameter space for such cascade/multi-particle decays. We investigate limits from the cosmic microwave background by Planck, the Fermi measurement of photons from the dwarf galaxies, and positron data from AMS-02. The presence of a hidden sector can change the constraints on the dark matter by up to an order of magnitude in either direction (although the effect can be much smaller). We find that generally the bound from the Fermi dwarfs is most constraining for annihilations to photon-rich final states, while AMS-02 is most constraining for electron and muon final states; however in certain instances the CMB bounds overtake both, due to their approximate independence on the details of the hidden sector cascade. We provide the full set of cascade spectra considered here as publicly available code with examples at http://web.mit.edu/lns/research/CascadeSpectra.html.

  12. Detecting Malicious Tweets in Twitter Using Runtime Monitoring With Hidden Information

    Science.gov (United States)

    2016-06-01

    by using natural language (NL) and associated formal specifications. We then specified visible and hidden parameters, which are used for subsequent...and verify the system. In the deterministic part, we determined assertions by using natural language (NL) and associated formal specifications. We...They are: 1. For about one out of five ISIS-supporter accounts, the primary language is English (73% Arabic, 18% English , and 6% French). It is common

  13. Model-independent indirect detection constraints on hidden sector dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Elor, Gilly; Rodd, Nicholas L.; Slatyer, Tracy R.; Xue, Wei [Center for Theoretical Physics, Massachusetts Institute of Technology,77 Massachusetts Ave, Cambridge, MA 02139 (United States)

    2016-06-10

    If dark matter inhabits an expanded “hidden sector”, annihilations may proceed through sequential decays or multi-body final states. We map out the potential signals and current constraints on such a framework in indirect searches, using a model-independent setup based on multi-step hierarchical cascade decays. While remaining agnostic to the details of the hidden sector model, our framework captures the generic broadening of the spectrum of secondary particles (photons, neutrinos, e{sup +}e{sup −} and p-barp) relative to the case of direct annihilation to Standard Model particles. We explore how indirect constraints on dark matter annihilation limit the parameter space for such cascade/multi-particle decays. We investigate limits from the cosmic microwave background by Planck, the Fermi measurement of photons from the dwarf galaxies, and positron data from AMS-02. The presence of a hidden sector can change the constraints on the dark matter by up to an order of magnitude in either direction (although the effect can be much smaller). We find that generally the bound from the Fermi dwarfs is most constraining for annihilations to photon-rich final states, while AMS-02 is most constraining for electron and muon final states; however in certain instances the CMB bounds overtake both, due to their approximate independence on the details of the hidden sector cascade. We provide the full set of cascade spectra considered here as publicly available code with examples at http://web.mit.edu/lns/research/CascadeSpectra.html.

  14. Mechanism of Pseudogap Detected by Electronic Raman Scattering: Phase Fluctuation or Hidden Order?

    International Nuclear Information System (INIS)

    Hong-Yan, Lu; Yuan, Wan; Xiang-Mei, He; Qiang-Hua, Wang

    2009-01-01

    We study the electronic Raman scattering in the cuprates to distinguish the two possible scenarios of the pseudo-gap normal state. In one scenario, the pseudogap is assumed to be caused by phase fluctuations of the preformed Cooper pairs. We find that pair-breaking peaks appear in both the B 1g and B 2g Raman channels, and they are smeared and tend to shift to the same energy with the increasing strength of phase fluctuations. Thus both channels reflect the same pairing energy scale, irrespectively of the doping level. In another scenario, the pseudogap is assumed to be caused by a hidden order that competes with the superconducting order. As an example, we assume that the hidden order is the d-density-wave (DDW) order. We find analytically and numerically that in the DDW normal state there is no Raman peak in the B 2g channel in a tight-binding model up to the second nearest-neighbor hopping, while the Raman peak in the B 1g channel reflects the energy gap caused by the DDW order. This behavior is in agreement with experiments in the pseudogap normal state. To gain further insights, we also calculate the Raman spectra in the DDW+SC state. We study the doping and temperature dependence of the peak energy in both channels and find a two-gap behavior, which is in agreement with recent Raman experiments. Therefore, our results shed light on the hidden order scenario for the pseudogap

  15. Detecting broad domains and narrow peaks in ChIP-seq data with hiddenDomains.

    Science.gov (United States)

    Starmer, Joshua; Magnuson, Terry

    2016-03-24

    Correctly identifying genomic regions enriched with histone modifications and transcription factors is key to understanding their regulatory and developmental roles. Conceptually, these regions are divided into two categories, narrow peaks and broad domains, and different algorithms are used to identify each one. Datasets that span these two categories are often analyzed with a single program for peak calling combined with an ad hoc method for domains. We developed hiddenDomains, which identifies both peaks and domains, and compare it to the leading algorithms using H3K27me3, H3K36me3, GABP, ESR1 and FOXA ChIP-seq datasets. The output from the programs was compared to qPCR-validated enriched and depleted sites, predicted transcription factor binding sites, and highly-transcribed gene bodies. With every method, hiddenDomains, performed as well as, if not better than algorithms dedicated to a specific type of analysis. hiddenDomains performs as well as the best domain and peak calling algorithms, making it ideal for analyzing ChIP-seq datasets, especially those that contain a mixture of peaks and domains.

  16. Detection of hidden sources. Prompt reports by airborne teams in Resume95

    International Nuclear Information System (INIS)

    Toivonen, H.

    1997-01-01

    An exercise to locate and identify lost radioactive sources was arranged near Padasjoki Auttoinen village. Ten sources, consisting of caesium, cobolt, iridium and technetium, were hidden. The teams (10) were asked to report their findings immediately after the landing and 24 h later. The teams that had a large NaI detector at their disposal could locate more sources than the teams with HPGe detectors. However, for source identification and activity calculation and HPGe detector is superior. Thus, it is highly recommended for operational purposes that both measuring systems are used simultaneously. The best location results were provided by the Danish Emergency Management Agency; the team reported four sources at landing and two other sources were found in prompt data processing after the landing. (au)

  17. Detection of hidden sources. Prompt reports by airborne teams in Resume95

    Energy Technology Data Exchange (ETDEWEB)

    Toivonen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    An exercise to locate and identify lost radioactive sources was arranged near Padasjoki Auttoinen village. Ten sources, consisting of caesium, cobolt, iridium and technetium, were hidden. The teams (10) were asked to report their findings immediately after the landing and 24 h later. The teams that had a large NaI detector at their disposal could locate more sources than the teams with HPGe detectors. However, for source identification and activity calculation and HPGe detector is superior. Thus, it is highly recommended for operational purposes that both measuring systems are used simultaneously. The best location results were provided by the Danish Emergency Management Agency; the team reported four sources at landing and two other sources were found in prompt data processing after the landing. (au).

  18. A Mixture Model and a Hidden Markov Model to Simultaneously Detect Recombination Breakpoints and Reconstruct Phylogenies

    Directory of Open Access Journals (Sweden)

    Bastien Boussau

    2009-01-01

    Full Text Available Homologous recombination is a pervasive biological process that affects sequences in all living organisms and viruses. In the presence of recombination, the evolutionary history of an alignment of homologous sequences cannot be properly depicted by a single bifurcating tree: some sites have evolved along a specific phylogenetic tree, others have followed another path. Methods available to analyse recombination in sequences usually involve an analysis of the alignment through sliding-windows, or are particularly demanding in computational resources, and are often limited to nucleotide sequences. In this article, we propose and implement a Mixture Model on trees and a phylogenetic Hidden Markov Model to reveal recombination breakpoints while searching for the various evolutionary histories that are present in an alignment known to have undergone homologous recombination. These models are sufficiently efficient to be applied to dozens of sequences on a single desktop computer, and can handle equivalently nucleotide or protein sequences. We estimate their accuracy on simulated sequences and test them on real data.

  19. A Mixture Model and a Hidden Markov Model to Simultaneously Detect Recombination Breakpoints and Reconstruct Phylogenies

    Directory of Open Access Journals (Sweden)

    Bastien Boussau

    2009-06-01

    Full Text Available Homologous recombination is a pervasive biological process that affects sequences in all living organisms and viruses. In the presence of recombination, the evolutionary history of an alignment of homologous sequences cannot be properly depicted by a single bifurcating tree: some sites have evolved along a specific phylogenetic tree, others have followed another path. Methods available to analyse recombination in sequences usually involve an analysis of the alignment through sliding-windows, or are particularly demanding in computational resources, and are often limited to nucleotide sequences. In this article, we propose and implement a Mixture Model on trees and a phylogenetic Hidden Markov Model to reveal recombination breakpoints while searching for the various evolutionary histories that are present in an alignment known to have undergone homologous recombination. These models are sufficiently efficient to be applied to dozens of sequences on a single desktop computer, and can handle equivalently nucleotide or protein sequences. We estimate their accuracy on simulated sequences and test them on real data.

  20. A System for Personality and Happiness Detection

    Directory of Open Access Journals (Sweden)

    Yago Saez

    2014-03-01

    Full Text Available This work proposes a platform for estimating personality and happiness. Starting from Eysenck's theory about human's personality, authors seek to provide a platform for collecting text messages from social media (Whatsapp, and classifying them into different personality categories. Although there is not a clear link between personality features and happiness, some correlations between them could be found in the future. In this work, we describe the platform developed, and as a proof of concept, we have used different sources of messages to see if common machine learning algorithms can be used for classifying different personality features and happiness.

  1. Continuous Change Detection and Classification Using Hidden Markov Model: A Case Study for Monitoring Urban Encroachment onto Farmland in Beijing

    Directory of Open Access Journals (Sweden)

    Yuan Yuan

    2015-11-01

    Full Text Available In this paper, we propose a novel method to continuously monitor land cover change using satellite image time series, which can extract comprehensive change information including change time, location, and “from-to” information. This method is based on a hidden Markov model (HMM trained for each land cover class. Assuming a pixel’s initial class has been obtained, likelihoods of the corresponding model are calculated on incoming time series extracted with a temporal sliding window. By observing the likelihood change over the windows, land cover change can be precisely detected from the dramatic drop of likelihood. The established HMMs are then used for identifying the land cover class after the change. As a case study, the proposed method is applied to monitoring urban encroachment onto farmland in Beijing using 10-year MODIS time series from 2001 to 2010. The performance is evaluated on a validation set for different model structures and thresholds. Compared with other change detection methods, the proposed method shows superior change detection accuracy. In addition, it is also more computationally efficient.

  2. Optimal Number of States in Hidden Markov Models and its ...

    African Journals Online (AJOL)

    In this paper, Hidden Markov Model is applied to model human movements as to facilitate an automatic detection of the same. A number of activities were simulated with the help of two persons. The four movements considered are walking, sitting down-getting up, fall while walking and fall while standing. The data is ...

  3. Q fever outbreaks: a syndromic approach for detection of hidden clusters.

    NARCIS (Netherlands)

    Wijngaard, C.C. van den; Schimmer, B.; Nagelkerke, N.J.D.; Vellema, P.; Donker, G.A.; Koopmans, M.P.G.

    2009-01-01

    OBJECTIVE: To explore - using syndromic data - whether there is evidence for local Q fever outbreaks before detection of the known 2007 outbreak in the Netherlands and whether syndromic surveillance could have accelerated their detection. BACKGROUND: For many years, Q-fever has been very rare in the

  4. The Hidden Snake in the Grass: Superior Detection of Snakes in Challenging Attentional Conditions.

    Science.gov (United States)

    Soares, Sandra C; Lindström, Björn; Esteves, Francisco; Ohman, Arne

    2014-01-01

    Snakes have provided a serious threat to primates throughout evolution. Furthermore, bites by venomous snakes still cause significant morbidity and mortality in tropical regions of the world. According to the Snake Detection Theory (SDT Isbell, 2006; 2009), the vital need to detect camouflaged snakes provided strong evolutionary pressure to develop astute perceptual capacity in animals that were potential targets for snake attacks. We performed a series of behavioral tests that assessed snake detection under conditions that may have been critical for survival. We used spiders as the control stimulus because they are also a common object of phobias and rated negatively by the general population, thus commonly lumped together with snakes as "evolutionary fear-relevant". Across four experiments (N = 205) we demonstrate an advantage in snake detection, which was particularly obvious under visual conditions known to impede detection of a wide array of common stimuli, for example brief stimulus exposures, stimuli presentation in the visual periphery, and stimuli camouflaged in a cluttered environment. Our results demonstrate a striking independence of snake detection from ecological factors that impede the detection of other stimuli, which suggests that, consistent with the SDT, they reflect a specific biological adaptation. Nonetheless, the empirical tests we report are limited to only one aspect of this rich theory, which integrates findings across a wide array of scientific disciplines.

  5. The Hidden Snake in the Grass: Superior Detection of Snakes in Challenging Attentional Conditions

    Science.gov (United States)

    Soares, Sandra C.; Lindström, Björn; Esteves, Francisco; Öhman, Arne

    2014-01-01

    Snakes have provided a serious threat to primates throughout evolution. Furthermore, bites by venomous snakes still cause significant morbidity and mortality in tropical regions of the world. According to the Snake Detection Theory (SDT Isbell, 2006; 2009), the vital need to detect camouflaged snakes provided strong evolutionary pressure to develop astute perceptual capacity in animals that were potential targets for snake attacks. We performed a series of behavioral tests that assessed snake detection under conditions that may have been critical for survival. We used spiders as the control stimulus because they are also a common object of phobias and rated negatively by the general population, thus commonly lumped together with snakes as “evolutionary fear-relevant”. Across four experiments (N = 205) we demonstrate an advantage in snake detection, which was particularly obvious under visual conditions known to impede detection of a wide array of common stimuli, for example brief stimulus exposures, stimuli presentation in the visual periphery, and stimuli camouflaged in a cluttered environment. Our results demonstrate a striking independence of snake detection from ecological factors that impede the detection of other stimuli, which suggests that, consistent with the SDT, they reflect a specific biological adaptation. Nonetheless, the empirical tests we report are limited to only one aspect of this rich theory, which integrates findings across a wide array of scientific disciplines. PMID:25493937

  6. The Hidden Snake in the Grass: Superior Detection of Snakes in Challenging Attentional Conditions.

    Directory of Open Access Journals (Sweden)

    Sandra C Soares

    Full Text Available Snakes have provided a serious threat to primates throughout evolution. Furthermore, bites by venomous snakes still cause significant morbidity and mortality in tropical regions of the world. According to the Snake Detection Theory (SDT Isbell, 2006; 2009, the vital need to detect camouflaged snakes provided strong evolutionary pressure to develop astute perceptual capacity in animals that were potential targets for snake attacks. We performed a series of behavioral tests that assessed snake detection under conditions that may have been critical for survival. We used spiders as the control stimulus because they are also a common object of phobias and rated negatively by the general population, thus commonly lumped together with snakes as "evolutionary fear-relevant". Across four experiments (N = 205 we demonstrate an advantage in snake detection, which was particularly obvious under visual conditions known to impede detection of a wide array of common stimuli, for example brief stimulus exposures, stimuli presentation in the visual periphery, and stimuli camouflaged in a cluttered environment. Our results demonstrate a striking independence of snake detection from ecological factors that impede the detection of other stimuli, which suggests that, consistent with the SDT, they reflect a specific biological adaptation. Nonetheless, the empirical tests we report are limited to only one aspect of this rich theory, which integrates findings across a wide array of scientific disciplines.

  7. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

    Directory of Open Access Journals (Sweden)

    Tuncay Ercan

    2008-07-01

    Full Text Available Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  8. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors.

    Science.gov (United States)

    Sahin, Yasar Guneri; Ercan, Tuncay

    2008-07-25

    Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  9. Some new methods to detect person fit in CAT

    NARCIS (Netherlands)

    Meijer, R.R.; van Krimpen-Stoop, Edith

    Person fit is concerned with detecting nonfitting item-score patterns. Most person-fit statistics have been proposed in the context of conventionally administered tests or paper-and-pencil (P&P) tests. In this study, we will first review some existing person-fit studies in a computerized adaptive

  10. The Dense Plasma Focus Opportunities in Detection of Hidden Objects by Using Nanosecond Impulse Neutron Inspection System (NINIS)

    International Nuclear Information System (INIS)

    Gribkov, V.; Karpinski, L.; Miklaszewski, R.; Paduch, M.; Scholz, M.; Strzyzewski, P.; Tomaszewski, K.; Dubrovsky, A.

    2006-01-01

    Dense Plasma Focus device is proposed for use as a neutron source to generate very powerful pulses of neutrons in the nanosecond (ns) range of its duration. Our devices PF-6, recently put into operation at the Institute of Plasma Physics and Laser Microfusion, Warsaw, Poland, and PF-10 belonging to the Institute for Theoretical and Experimental Physics, Moscow, Russia, have energy storages in its capacitor banks 7.4 kJ and 13 kJ as a maximum. Operated with the DPF chambers of a special design they have a current maximum up to ∼760 kA with a quarter period of the discharge equal to 1 microsecond. They generate circa 109 of 2.5-MeV neutrons in one pulse of congruent with 10-ns duration when working with deuterium, what permit to expect 1011 14-MeV neutrons at their operation with DT-mixture. This feature gives a principal possibility to create a ''single-shot detection system'' for interrogation of hidden objects. It means that all necessary information will be received during a single bright pulse of neutrons having duration in a nanosecond range by means of the time-of-flight technique with a short flight base. It might be a base for the creation of the Nanosecond Impulse Neutron Inspection System (NINIS). These characteristics of the neutron source open a number of opportunities while interrogation time in this case would now depend only on the data-processing system

  11. The Dense Plasma Focus Opportunities in Detection of Hidden Objects by Using Nanosecond Impulse Neutron Inspection System (NINIS)

    Science.gov (United States)

    Gribkov, V.; Dubrovsky, A.; Karpiński, L.; Miklaszewski, R.; Paduch, M.; Scholz, M.; StrzyŻewski, P.; Tomaszewski, K.

    2006-12-01

    Dense Plasma Focus device is proposed for use as a neutron source to generate very powerful pulses of neutrons in the nanosecond (ns) range of its duration. Our devices PF-6, recently put into operation at the Institute of Plasma Physics and Laser Microfusion, Warsaw, Poland, and PF-10 belonging to the Institute for Theoretical and Experimental Physics, Moscow, Russia, have energy storages in its capacitor banks 7.4 kJ and 13 kJ as a maximum. Operated with the DPF chambers of a special design they have a current maximum up to ˜760 kA with a quarter period of the discharge equal to 1 microsecond. They generate circa 109 of 2.5-MeV neutrons in one pulse of ≅ 10-ns duration when working with deuterium, what permit to expect 1011 14-MeV neutrons at their operation with DT-mixture. This feature gives a principal possibility to create a "single-shot detection system" for interrogation of hidden objects. It means that all necessary information will be received during a single bright pulse of neutrons having duration in a nanosecond range by means of the time-of-flight technique with a short flight base. It might be a base for the creation of the Nanosecond Impulse Neutron Inspection System (NINIS). These characteristics of the neutron source open a number of opportunities while interrogation time in this case would now depend only on the data-processing system.

  12. Real-Time Landmine Detection with Ground-Penetrating Radar Using Discriminative and Adaptive Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Ho KC

    2005-01-01

    Full Text Available We propose a real-time software system for landmine detection using ground-penetrating radar (GPR. The system includes an efficient and adaptive preprocessing component; a hidden Markov model- (HMM- based detector; a corrective training component; and an incremental update of the background model. The preprocessing is based on frequency-domain processing and performs ground-level alignment and background removal. The HMM detector is an improvement of a previously proposed system (baseline. It includes additional pre- and postprocessing steps to improve the time efficiency and enable real-time application. The corrective training component is used to adjust the initial model parameters to minimize the number of misclassification sequences. This component could be used offline, or online through feedback to adapt an initial model to specific sites and environments. The background update component adjusts the parameters of the background model to adapt it to each lane during testing. The proposed software system is applied to data acquired from three outdoor test sites at different geographic locations, using a state-of-the-art array GPR prototype. The first collection was used as training, and the other two (contain data from more than 1200 m of simulated dirt and gravel roads for testing. Our results indicate that, on average, the corrective training can improve the performance by about 10% for each site. For individual lanes, the performance gain can reach 50%.

  13. Hypovigilance Detection for UCAV Operators Based on a Hidden Markov Model

    OpenAIRE

    Choi, Yerim; Kwon, Namyeon; Lee, Sungjun; Shin, Yongwook; Ryo, Chuh Yeop; Park, Jonghun; Shin, Dongmin

    2014-01-01

    With the advance of military technology, the number of unmanned combat aerial vehicles (UCAVs) has rapidly increased. However, it has been reported that the accident rate of UCAVs is much higher than that of manned combat aerial vehicles. One of the main reasons for the high accident rate of UCAVs is the hypovigilance problem which refers to the decrease in vigilance levels of UCAV operators while maneuvering. In this paper, we propose hypovigilance detection models for UCAV operators based o...

  14. Active and passive infrared thermography applied to the detection and characterization of hidden defects in structure

    Science.gov (United States)

    Dumoulin, Jean

    2013-04-01

    Infrared thermography for Non Destructive Testing (NDT) has encountered a wide spreading this last 2 decades, in particular thanks to emergence on the market of low cost uncooled infrared camera. So, infrared thermography is not anymore a measurement technique limited to laboratory application. It has been more and more involved in civil engineering and cultural heritage applications, but also in many other domains, as indicated by numerous papers in the literature. Nevertheless, laboratory, measurements are done as much as possible in quite ideal conditions (good atmosphere conditions, known properties of materials, etc.), while measurement on real site requires to consider the influence of not controlled environmental parameters and additional unknown thermal properties. So, dedicated protocol and additional sensors are required for measurement data correction. Furthermore, thermal excitation is required to enhance the signature of defects in materials. Post-processing of data requires to take into account the protocol used for the thermal excitation and sometimes its nature to avoid false detection. This analysis step is based on signal and image processing tool and allows to carry out the detection. Characterization of anomalies detected at the previous step can be done by additional signal processing in particular for manufactured objects. The use of thermal modelling and inverse method allows to determine properties of the defective area. The present paper will first address a review of some protocols currently in use for field measurement with passive and/or active infrared measurements. Illustrations in various experiments carried out on civil engineering structure will be shown and discussed. In a second part, different post-processing approaches will be presented and discussed. In particular, a review of the most standard processing methods like Fast Fourier Analysis, Principal Components Analysis, Polynomial Decomposition, defect characterization using

  15. Ionizing radiation source detection by personal TLD

    International Nuclear Information System (INIS)

    Marinkovic, O.; Mirkov, Z.

    2002-01-01

    The Laboratory for personal dosimetry has about 3000 workers under control. The most of them work in medicine. Some institutions, as big health centers, have different ionizing radiation sources. It is usefull to analyze what has been the source of irradiation, special when appears a dosimeter with high dose. Personal dosimetry equipment is Harshaw TLD Reader Model 6600 and dosimeters consist of two chips LiF TLD-100 assembled in bar-coded cards which are wearing in holders with one tissue-equivalent filter (to determine H(10)) and skin-equivalent the other (to determine H(0.07)). The calibration dosimeters have been irradiated in holders by different sources: x-ray (for 80keV and 100keV), 6 0C o, 9 0S r (for different distances from beta source) and foton beem (at radiotherapy accelerator by 6MeV, 10MeV and 18MeV). The dose ratio for two LiF cristals was calculated and represented with graphs. So, it is possible to calculate the ratio H(10)/H(0.07) for a personal TLD and analyze what has been the source of irradiation. Also, there is the calibration for determination the time of irradiation, according to glow curve deconvolution

  16. Detection of person presence and its activity in the bathtub

    International Nuclear Information System (INIS)

    Bujnowski, Adam; Palinski, Arkadiusz; Koscinski, Piotr; Skalski, Lukasz; Skurczynska, Anna; Wtorek, Jerzy

    2013-01-01

    A practical application of a bioimpedance technique for a detection of a bathing person is presented in the paper. It addresses the possibility of supervising people in the bathtub without voiding of their intimacy. The measurement system installed in a fiber-glass or a plastic bathtub is able to detect a presence of the bathing person, to estimate its activity and thus to detect potentially dangerous events. In the paper a principle of measurement, working prototype and measurements are presented. The proposed method can be useful for supporting and supervising bathing of elders, partially disabled or people with some health state risk during the bath and living alone.

  17. Using Person Fit Statistics to Detect Outliers in Survey Research

    OpenAIRE

    Felt, John M.; Castaneda, Ruben; Tiemensma, Jitske; Depaoli, Sarah

    2017-01-01

    Context: When working with health-related questionnaires, outlier detection is important. However, traditional methods of outlier detection (e.g., boxplots) can miss participants with “atypical” responses to the questions that otherwise have similar total (subscale) scores. In addition to detecting outliers, it can be of clinical importance to determine the reason for the outlier status or “atypical” response. Objective: The aim of the current study was to illustrate how to derive person f...

  18. Borderline Personality and the Detection of Angry Faces.

    Science.gov (United States)

    Hepp, Johanna; Hilbig, Benjamin E; Kieslich, Pascal J; Herzog, Julia; Lis, Stefanie; Schmahl, Christian; Niedtfeld, Inga

    2016-01-01

    Many studies have assessed emotion recognition in patients with Borderline Personality Disorder and considerable evidence has been accumulated on patients' ability to categorize emotions. In contrast, their ability to detect emotions has been investigated sparsely. The only two studies that assessed emotion detection abilities found contradictory evidence on patients' ability to detect angry faces. To clarify whether patients with Borderline Personality Disorder show enhanced detection of angry faces, we conducted three experiments: a laboratory study (n = 53) with a clinical sample and two highly powered web studies that measured Borderline features (n1 = 342, n2 = 220). Participants in all studies completed a visual search paradigm, and the reaction times for the detection of angry vs. happy faces were measured. Consistently, data spoke against enhanced detection of angry faces in the Borderline groups, indicated by non-significant group (Borderline vs. healthy control) × target (angry vs. happy) interactions, despite highly satisfactory statistical power to detect even small effects. In contrast to emotion categorization, emotion detection appears to be intact in patients with Borderline Personality Disorder and individuals high in Borderline features. The importance of distinguishing between these two processes in future studies is discussed.

  19. Borderline Personality and the Detection of Angry Faces.

    Directory of Open Access Journals (Sweden)

    Johanna Hepp

    Full Text Available Many studies have assessed emotion recognition in patients with Borderline Personality Disorder and considerable evidence has been accumulated on patients' ability to categorize emotions. In contrast, their ability to detect emotions has been investigated sparsely. The only two studies that assessed emotion detection abilities found contradictory evidence on patients' ability to detect angry faces.To clarify whether patients with Borderline Personality Disorder show enhanced detection of angry faces, we conducted three experiments: a laboratory study (n = 53 with a clinical sample and two highly powered web studies that measured Borderline features (n1 = 342, n2 = 220. Participants in all studies completed a visual search paradigm, and the reaction times for the detection of angry vs. happy faces were measured.Consistently, data spoke against enhanced detection of angry faces in the Borderline groups, indicated by non-significant group (Borderline vs. healthy control × target (angry vs. happy interactions, despite highly satisfactory statistical power to detect even small effects.In contrast to emotion categorization, emotion detection appears to be intact in patients with Borderline Personality Disorder and individuals high in Borderline features. The importance of distinguishing between these two processes in future studies is discussed.

  20. Using Person Fit Statistics to Detect Outliers in Survey Research

    Directory of Open Access Journals (Sweden)

    John M. Felt

    2017-05-01

    Full Text Available Context: When working with health-related questionnaires, outlier detection is important. However, traditional methods of outlier detection (e.g., boxplots can miss participants with “atypical” responses to the questions that otherwise have similar total (subscale scores. In addition to detecting outliers, it can be of clinical importance to determine the reason for the outlier status or “atypical” response.Objective: The aim of the current study was to illustrate how to derive person fit statistics for outlier detection through a statistical method examining person fit with a health-based questionnaire.Design and Participants: Patients treated for Cushing's syndrome (n = 394 were recruited from the Cushing's Support and Research Foundation's (CSRF listserv and Facebook page.Main Outcome Measure: Patients were directed to an online survey containing the CushingQoL (English version. A two-dimensional graded response model was estimated, and person fit statistics were generated using the Zh statistic.Results: Conventional outlier detections methods revealed no outliers reflecting extreme scores on the subscales of the CushingQoL. However, person fit statistics identified 18 patients with “atypical” response patterns, which would have been otherwise missed (Zh > |±2.00|.Conclusion: While the conventional methods of outlier detection indicated no outliers, person fit statistics identified several patients with “atypical” response patterns who otherwise appeared average. Person fit statistics allow researchers to delve further into the underlying problems experienced by these “atypical” patients treated for Cushing's syndrome. Annotated code is provided to aid other researchers in using this method.

  1. Gait phase detection and discrimination between walking-jogging activities using hidden Markov models applied to foot motion data from a gyroscope.

    Science.gov (United States)

    Mannini, Andrea; Sabatini, Angelo Maria

    2012-09-01

    In this paper we present a classifier based on a hidden Markov model (HMM) that was applied to a gait treadmill dataset for gait phase detection and walking/jogging discrimination. The gait events foot strike, foot flat, heel off, toe off were detected using a uni-axial gyroscope that measured the foot instep angular velocity in the sagittal plane. Walking/jogging activities were discriminated by processing gyroscope data from each detected stride. Supervised learning of the classifier was undertaken using reference data from an optical motion analysis system. Remarkably good generalization properties were achieved across tested subjects and gait speeds. Sensitivity and specificity of gait phase detection exceeded 94% and 98%, respectively, with timing errors that were less than 20 ms, on average; the accuracy of walking/jogging discrimination was approximately 99%. Copyright © 2012 Elsevier B.V. All rights reserved.

  2. Person detection and tracking with a 360° lidar system

    Science.gov (United States)

    Hammer, Marcus; Hebel, Marcus; Arens, Michael

    2017-10-01

    Today it is easily possible to generate dense point clouds of the sensor environment using 360° LiDAR (Light Detection and Ranging) sensors which are available since a number of years. The interpretation of these data is much more challenging. For the automated data evaluation the detection and classification of objects is a fundamental task. Especially in urban scenarios moving objects like persons or vehicles are of particular interest, for instance in automatic collision avoidance, for mobile sensor platforms or surveillance tasks. In literature there are several approaches for automated person detection in point clouds. While most techniques show acceptable results in object detection, the computation time is often crucial. The runtime can be problematic, especially due to the amount of data in the panoramic 360° point clouds. On the other hand, for most applications an object detection and classification in real time is needed. The paper presents a proposal for a fast, real-time capable algorithm for person detection, classification and tracking in panoramic point clouds.

  3. Exploring new methods to detect person misfit in CAT

    NARCIS (Netherlands)

    Meijer, R.R.; van Krimpen-Stoop, Edith

    Item scores that do not fit an assumed item response theory model may cause the latent trait value to be inaccurately estimated. Several person-fit statistics for detecting nonfitting response behavior for paper-and-pencil tests have been proposed. In the context of computerized adaptive testing,

  4. 438 Optimal Number of States in Hidden Markov Models and its ...

    African Journals Online (AJOL)

    In this paper, Hidden Markov Model is applied to model human movements as to facilitate an automatic detection of the same. A number of activities were simulated with the help of two persons. The four movements considered are walking, sitting down-getting up, fall while walking and fall while standing. The.

  5. Hidden psychiatric morbidity. Part II: Training health care workers in detection: a pre- and post-study at Karanda Mission Hospital.

    Science.gov (United States)

    Hall, A; Williams, H

    1987-11-01

    A simple 5-session training program covering basic mental health problems, and instruction in the use of the Harding Self Report Questionaire, was instituted at Karanda Mission Hospital to help medical students recognise hidden psychiatric morbidity in somatically presenting patients. The Harding Self Report Questionaire was used as both a detection and training instrument, together with a Health Staff Rating Scale. Medical Assistants were assessed pre- and post-training on 2 measures--specificity and sensitivity. The training program demonstrated that health care workers can be trained to more accurately detect and diagnose hidden psychiatric disorder in this group of patients. An additional benefit was that workers developed an increased interest in this difficult area of patient care. In a previous study, the prevalence of hidden psychiatric morbidity in a general medical outpatient population in Bindura Provincial was found to be in line with other developing countries (i.e., in excess of 10%) and detection rate by health care workers (4.25%) was low, although comparable to that found in other studies. One of the conclusions reached after the Bindura study was that a simple program was needed to alert workers to recognise underlying psychiatric disorder in somatically presenting patients. With this in mind, the training program was devised and given at Karanda Mission Hospital which is situated about 220 km from Harare, Zimbabwe. It has 120 beds and is staffed by 2 doctors, 3 locally trained SRNs, several American trained SRNs, and 3 locally trained medical assistants. It also runs a nursing school for medical assistants. The hospital serves a population drawn from both subsistence and purchase area farmers, but is less diverse that that of Bindura. The training program was shown to be effective, as demonstrated in the improved accuracy in detection and diagnosis by medical assistants. The improvement post-training is perhaps all the more remarkable when the

  6. A Scalable Framework to Detect Personal Health Mentions on Twitter.

    Science.gov (United States)

    Yin, Zhijun; Fabbri, Daniel; Rosenbloom, S Trent; Malin, Bradley

    2015-06-05

    Biomedical research has traditionally been conducted via surveys and the analysis of medical records. However, these resources are limited in their content, such that non-traditional domains (eg, online forums and social media) have an opportunity to supplement the view of an individual's health. The objective of this study was to develop a scalable framework to detect personal health status mentions on Twitter and assess the extent to which such information is disclosed. We collected more than 250 million tweets via the Twitter streaming API over a 2-month period in 2014. The corpus was filtered down to approximately 250,000 tweets, stratified across 34 high-impact health issues, based on guidance from the Medical Expenditure Panel Survey. We created a labeled corpus of several thousand tweets via a survey, administered over Amazon Mechanical Turk, that documents when terms correspond to mentions of personal health issues or an alternative (eg, a metaphor). We engineered a scalable classifier for personal health mentions via feature selection and assessed its potential over the health issues. We further investigated the utility of the tweets by determining the extent to which Twitter users disclose personal health status. Our investigation yielded several notable findings. First, we find that tweets from a small subset of the health issues can train a scalable classifier to detect health mentions. Specifically, training on 2000 tweets from four health issues (cancer, depression, hypertension, and leukemia) yielded a classifier with precision of 0.77 on all 34 health issues. Second, Twitter users disclosed personal health status for all health issues. Notably, personal health status was disclosed over 50% of the time for 11 out of 34 (33%) investigated health issues. Third, the disclosure rate was dependent on the health issue in a statistically significant manner (Pdependent on health issue in a statistically significant manner as well (Pinformation may be useful

  7. Hidden Heroes

    Science.gov (United States)

    Ramchand, Rajeev; Tanielian, Terri; Fisher, Michael P.; Vaughan, Christine Anne; Trail, Thomas E.; Epley, Caroline; Voorhies, Phoenix; Robbins, Michael; Robinson, Eric; Ghosh-Dastidar, Bonnie

    2014-01-01

    Abstract While much has been written about the role of caregiving for the elderly and chronically ill and for children with special needs, little is known about “military caregivers”—the population of those who care for wounded, ill, and injured military personnel and veterans. These caregivers play an essential role in caring for injured or wounded service members and veterans. This enables those for whom they are caring to live better quality lives, and can result in faster and improved rehabilitation and recovery. Yet playing this role can impose a substantial physical, emotional, and financial toll on caregivers. This article distills a longer report, Hidden Heroes: America's Military Caregivers, which describes the results of a study designed to describe the magnitude of military caregiving in the United States today, as well as to identify gaps in the array of programs, policies, and initiatives designed to support military caregivers. Improving military caregivers' well-being and ensuring their continued ability to provide care will require multifaceted approaches to reducing the current burdens caregiving may impose, and bolstering their ability to serve as caregivers more effectively. Given the systematic differences among military caregiver groups, it is also important that tailored approaches meet the unique needs and characteristics of post-9/11 caregivers. PMID:28083343

  8. The Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Onatra Amparo

    2004-08-01

    Full Text Available This article shows the way hidden curriculum goes farther than just being the conscious and unconscious setting within the formal instruction context. It also shapes students personality and assigns to each individual the role they are supposed to play in society. In this process, interaction with the teacher is crucial since he/she is the one who directly moulds and cultivates the singularity of students according to the specific demands of the social class to which they belong. This phenomenon is well described in research conducted by Jane Anyon (1980 which is referred to in this paper as an example of the influence of the hidden curriculum on school life. Key words: Hidden Curriculum, Unconscious Setting, Teacher’s Role, Singularity, Society Este artículo muestra cómo el currículo oculto va más allá de ser simplemente el escenario consciente e inconsciente en el que se desarrolla la instrucción formal. El currículo oculto define la personalidad del estudiante y asigna a cada uno el papel que se supone debe ocupar en la sociedad. En este proceso, la interacción directa con el docente es decisiva ya que es éste quien directamente moldea y cultiva la singularidad de los estudiantes según las exigencias específicas de la clase social a la que pertenecen. Dicho fenómeno se describe muy bien en la investigación adelantada por Jane Anyon (1980, a la cual se hace referencia en este escrito, como ejemplo de la influencia del currículo oculto en la vida escolar. Palabras claves: Currículo Oculto, Escenario Inconsciente, Rol del Docente, Singularidad, Sociedad

  9. Validation of Inter-Subject Training for Hidden Markov Models Applied to Gait Phase Detection in Children with Cerebral Palsy

    Directory of Open Access Journals (Sweden)

    Juri Taborri

    2015-09-01

    Full Text Available Gait-phase recognition is a necessary functionality to drive robotic rehabilitation devices for lower limbs. Hidden Markov Models (HMMs represent a viable solution, but they need subject-specific training, making data processing very time-consuming. Here, we validated an inter-subject procedure to avoid the intra-subject one in two, four and six gait-phase models in pediatric subjects. The inter-subject procedure consists in the identification of a standardized parameter set to adapt the model to measurements. We tested the inter-subject procedure both on scalar and distributed classifiers. Ten healthy children and ten hemiplegic children, each equipped with two Inertial Measurement Units placed on shank and foot, were recruited. The sagittal component of angular velocity was recorded by gyroscopes while subjects performed four walking trials on a treadmill. The goodness of classifiers was evaluated with the Receiver Operating Characteristic. The results provided a goodness from good to optimum for all examined classifiers (0 < G < 0.6, with the best performance for the distributed classifier in two-phase recognition (G = 0.02. Differences were found among gait partitioning models, while no differences were found between training procedures with the exception of the shank classifier. Our results raise the possibility of avoiding subject-specific training in HMM for gait-phase recognition and its implementation to control exoskeletons for the pediatric population.

  10. Backward transfer entropy: Informational measure for detecting hidden Markov models and its interpretations in thermodynamics, gambling and causality

    Science.gov (United States)

    Ito, Sosuke

    2016-01-01

    The transfer entropy is a well-established measure of information flow, which quantifies directed influence between two stochastic time series and has been shown to be useful in a variety fields of science. Here we introduce the transfer entropy of the backward time series called the backward transfer entropy, and show that the backward transfer entropy quantifies how far it is from dynamics to a hidden Markov model. Furthermore, we discuss physical interpretations of the backward transfer entropy in completely different settings of thermodynamics for information processing and the gambling with side information. In both settings of thermodynamics and the gambling, the backward transfer entropy characterizes a possible loss of some benefit, where the conventional transfer entropy characterizes a possible benefit. Our result implies the deep connection between thermodynamics and the gambling in the presence of information flow, and that the backward transfer entropy would be useful as a novel measure of information flow in nonequilibrium thermodynamics, biochemical sciences, economics and statistics. PMID:27833120

  11. Real-time path and obstacle detection for blind persons

    OpenAIRE

    José, João

    2010-01-01

    Dissertação de mest., Engenharia Informática, Faculdade de Ciências e Tecnologia, Univ. do Algarve, 2010 In this thesis we present algorithms that can be used to improve the mobility of visually impaired persons. First we propose an algorithm to detect the path where the user can walk. This algorithm is based on an adapted version of the Hough transform, in which we apply a method for gathering the most continuous path borders after an edge detector is applied. After an initial...

  12. Wavelet-based Gaussian-mixture hidden Markov model for the detection of multistage seizure dynamics: A proof-of-concept study

    Directory of Open Access Journals (Sweden)

    Carlen Peter L

    2011-04-01

    Full Text Available Abstract Background Epilepsy is a common neurological disorder characterized by recurrent electrophysiological activities, known as seizures. Without the appropriate detection strategies, these seizure episodes can dramatically affect the quality of life for those afflicted. The rationale of this study is to develop an unsupervised algorithm for the detection of seizure states so that it may be implemented along with potential intervention strategies. Methods Hidden Markov model (HMM was developed to interpret the state transitions of the in vitro rat hippocampal slice local field potentials (LFPs during seizure episodes. It can be used to estimate the probability of state transitions and the corresponding characteristics of each state. Wavelet features were clustered and used to differentiate the electrophysiological characteristics at each corresponding HMM states. Using unsupervised training method, the HMM and the clustering parameters were obtained simultaneously. The HMM states were then assigned to the electrophysiological data using expert guided technique. Minimum redundancy maximum relevance (mRMR analysis and Akaike Information Criterion (AICc were applied to reduce the effect of over-fitting. The sensitivity, specificity and optimality index of chronic seizure detection were compared for various HMM topologies. The ability of distinguishing early and late tonic firing patterns prior to chronic seizures were also evaluated. Results Significant improvement in state detection performance was achieved when additional wavelet coefficient rates of change information were used as features. The final HMM topology obtained using mRMR and AICc was able to detect non-ictal (interictal, early and late tonic firing, chronic seizures and postictal activities. A mean sensitivity of 95.7%, mean specificity of 98.9% and optimality index of 0.995 in the detection of chronic seizures was achieved. The detection of early and late tonic firing was

  13. Wavelet-based Gaussian-mixture hidden Markov model for the detection of multistage seizure dynamics: a proof-of-concept study.

    Science.gov (United States)

    Chiu, Alan Wl; Derchansky, Miron; Cotic, Marija; Carlen, Peter L; Turner, Steuart O; Bardakjian, Berj L

    2011-04-19

    Epilepsy is a common neurological disorder characterized by recurrent electrophysiological activities, known as seizures. Without the appropriate detection strategies, these seizure episodes can dramatically affect the quality of life for those afflicted. The rationale of this study is to develop an unsupervised algorithm for the detection of seizure states so that it may be implemented along with potential intervention strategies. Hidden Markov model (HMM) was developed to interpret the state transitions of the in vitro rat hippocampal slice local field potentials (LFPs) during seizure episodes. It can be used to estimate the probability of state transitions and the corresponding characteristics of each state. Wavelet features were clustered and used to differentiate the electrophysiological characteristics at each corresponding HMM states. Using unsupervised training method, the HMM and the clustering parameters were obtained simultaneously. The HMM states were then assigned to the electrophysiological data using expert guided technique. Minimum redundancy maximum relevance (mRMR) analysis and Akaike Information Criterion (AICc) were applied to reduce the effect of over-fitting. The sensitivity, specificity and optimality index of chronic seizure detection were compared for various HMM topologies. The ability of distinguishing early and late tonic firing patterns prior to chronic seizures were also evaluated. Significant improvement in state detection performance was achieved when additional wavelet coefficient rates of change information were used as features. The final HMM topology obtained using mRMR and AICc was able to detect non-ictal (interictal), early and late tonic firing, chronic seizures and postictal activities. A mean sensitivity of 95.7%, mean specificity of 98.9% and optimality index of 0.995 in the detection of chronic seizures was achieved. The detection of early and late tonic firing was validated with experimental intracellular electrical

  14. Position detection and observation of a conducting filament hidden under a top electrode in a Ta₂O₅-based atomic switch.

    Science.gov (United States)

    Nayak, Alpana; Wang, Qi; Itoh, Yaomi; Tsuruoka, Tohru; Hasegawa, Tsuyoshi; Boodhoo, Liam; Mizuta, Hiroshi; Aono, Masakazu

    2015-04-10

    Resistive random access memories (ReRAMs) are promising next-generation memory devices. Observation of the conductive filaments formed in ReRAMs is essential in understanding their operating mechanisms and their expected ultimate performance. Finding the position of the conductive filament is the key process in the preparation of samples for cross-sectional transmission electron microscopy (TEM) imaging. Here, we propose a method for locating the position of conductive filaments hidden under top electrodes. Atomic force microscopy imaging with a conductive tip detects the current flowing through a conductive filament from the bottom electrode, which reaches its maximum at a position that is above the conductive filament. This is achieved by properly biasing a top electrode, a bottom electrode and the conductive tip. This technique was applied to Cu/Ta2O5/Pt atomic switches, revealing the formation of a single Cu filament in a device, although the device had a large area of 5 × 5 μm(2). Change in filament size was clearly observed depending on the compliance current used in the set process. It was also found from the TEM observation that the cross-sectional shape of the formed filament varies considerably, which is attributable to different Cu nuclei growth mechanisms.

  15. Detection of Diffusion Heterogeneity in Single Particle Tracking Trajectories Using a Hidden Markov Model with Measurement Noise Propagation

    Science.gov (United States)

    Slator, Paddy J.; Cairo, Christopher W.; Burroughs, Nigel J.

    2015-01-01

    We develop a Bayesian analysis framework to detect heterogeneity in the diffusive behaviour of single particle trajectories on cells, implementing model selection to classify trajectories as either consistent with Brownian motion or with a two-state (diffusion coefficient) switching model. The incorporation of localisation accuracy is essential, as otherwise false detection of switching within a trajectory was observed and diffusion coefficient estimates were inflated. Since our analysis is on a single trajectory basis, we are able to examine heterogeneity between trajectories in a quantitative manner. Applying our method to the lymphocyte function-associated antigen 1 (LFA-1) receptor tagged with latex beads (4 s trajectories at 1000 frames s−1), both intra- and inter-trajectory heterogeneity were detected; 12–26% of trajectories display clear switching between diffusive states dependent on condition, whilst the inter-trajectory variability is highly structured with the diffusion coefficients being related by D 1 = 0.68D 0 − 1.5 × 104 nm2 s−1, suggestive that on these time scales we are detecting switching due to a single process. Further, the inter-trajectory variability of the diffusion coefficient estimates (1.6 × 102 − 2.6 × 105 nm2 s−1) is very much larger than the measurement uncertainty within trajectories, suggesting that LFA-1 aggregation and cytoskeletal interactions are significantly affecting mobility, whilst the timescales of these processes are distinctly different giving rise to inter- and intra-trajectory variability. There is also an ‘immobile’ state (defined as D models within membranes incorporating aggregation, binding to the cytoskeleton, or traversing membrane microdomains. PMID:26473352

  16. Accelerator-Detector Complex for Photonuclear Detection of Hidden Explosives Final Report CRADA No. TC2065.0

    Energy Technology Data Exchange (ETDEWEB)

    Lowdermilk, W. H. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Brothers, L. J. [Valley Forge Composite Technologies, Inc., Covington, KY (United States)

    2017-09-06

    This was a collaborative effort by Lawrence Livermore National Security (formerly the University of California)/Lawrence Livermore National Laboratory (LLNL), Valley Forge Composite Technologies, Inc., and the following Russian Institutes: P. N. Lebedev Physical Institute (LPI), Innovative Technologies Center.(AUO CIT), Central Design Bureau-Almas (CDB Almaz), Moscow Instrument Automation Research Institute, and Institute for High Energy Physics (IBEP) to develop equipment and procedures for detecting explosive materials concealed in airline checked baggage and cargo.

  17. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression where...

  18. Face, Body, and Center of Gravity Mediate Person Detection in Natural Scenes

    Science.gov (United States)

    Bindemann, Markus; Scheepers, Christoph; Ferguson, Heather J.; Burton, A. Mike

    2010-01-01

    Person detection is an important prerequisite of social interaction, but is not well understood. Following suggestions that people in the visual field can capture a viewer's attention, this study examines the role of the face and the body for person detection in natural scenes. We observed that viewers tend first to look at the center of a scene,…

  19. Locating Hidden Servers

    National Research Council Canada - National Science Library

    Oeverlier, Lasse; Syverson, Paul F

    2006-01-01

    .... Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Without Borders have issued guides that describe using hidden services via Tor to protect the safety of dissidents as well as to resist censorship...

  20. The hidden universe

    International Nuclear Information System (INIS)

    Disney, M.

    1985-01-01

    Astronomer Disney has followed a somewhat different tack than that of most popular books on cosmology by concentrating on the notion of hidden (as in not directly observable by its own radiation) matter in the universe

  1. Hidden charged dark matter

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Kaplinghat, Manoj; Tu, Huitzu; Yu, Hai-Bo

    2009-01-01

    Can dark matter be stabilized by charge conservation, just as the electron is in the standard model? We examine the possibility that dark matter is hidden, that is, neutral under all standard model gauge interactions, but charged under an exact (\\rm U)(1) gauge symmetry of the hidden sector. Such candidates are predicted in WIMPless models, supersymmetric models in which hidden dark matter has the desired thermal relic density for a wide range of masses. Hidden charged dark matter has many novel properties not shared by neutral dark matter: (1) bound state formation and Sommerfeld-enhanced annihilation after chemical freeze out may reduce its relic density, (2) similar effects greatly enhance dark matter annihilation in protohalos at redshifts of z ∼ 30, (3) Compton scattering off hidden photons delays kinetic decoupling, suppressing small scale structure, and (4) Rutherford scattering makes such dark matter self-interacting and collisional, potentially impacting properties of the Bullet Cluster and the observed morphology of galactic halos. We analyze all of these effects in a WIMPless model in which the hidden sector is a simplified version of the minimal supersymmetric standard model and the dark matter is a hidden sector stau. We find that charged hidden dark matter is viable and consistent with the correct relic density for reasonable model parameters and dark matter masses in the range 1 GeV ∼ X ∼< 10 TeV. At the same time, in the preferred range of parameters, this model predicts cores in the dark matter halos of small galaxies and other halo properties that may be within the reach of future observations. These models therefore provide a viable and well-motivated framework for collisional dark matter with Sommerfeld enhancement, with novel implications for astrophysics and dark matter searches

  2. Event detection in athletics for personalized sports content delivery

    DEFF Research Database (Denmark)

    Katsarakis, N.; Pnevmatikakis, A.

    2009-01-01

    Broadcasting of athletics is nowadays biased towards running (sprint and longer distances) sports. Personalized content delivery can change that for users that wish to focus on different content. Using a combination of video signal processing algorithms and live information that accompanies...... the video of large-scale sports like the Olympics, a system can attend to the preferences of users by selecting the most suitable camera view for them.There are two types of camera selection for personalized content delivery. According to the between sport camera selection, the view is changed between two...... sports, upon the onset of a sport higher up the user preferences than the one currently being delivered. According to the within sport camera selection, the camera is changed to offer a better view of the evolution of the sport, based on the phase it is in. This paper details the video processing...

  3. Vitality detection in personal authentication systems using fingerprints

    OpenAIRE

    Coli, Pietro

    2008-01-01

    Fingerprints are considered as the sign of each human being, and this has contributed the development of biometric applications based on such features. Since 2002, an important vulnerability has been shown: it is possible to deceive fingerprint scanners through artificial replicas of fingertips. In order to address this shortcoming it is need to recognize a spoofing attempt with artificial fingers looking for some “life signs” each time an user submit a fingerprint (vitality detection problem...

  4. Search for Hidden Particles

    CERN Multimedia

    Solovev, V

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  5. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  6. Fusion of optical flow based motion pattern analysis and silhouette classification for person tracking and detection

    NARCIS (Netherlands)

    Tangelder, J.W.H.; Lebert, E.; Burghouts, G.J.; Zon, K. van; Den Uyl, M.J.

    2014-01-01

    This paper presents a novel approach to detect persons in video by combining optical flow based motion analysis and silhouette based recognition. A new fast optical flow computation method is described, and its application in a motion based analysis framework unifying human tracking and detection is

  7. Empowering students with the hidden curriculum.

    Science.gov (United States)

    Neve, Hilary; Collett, Tracey

    2017-11-27

    The hidden curriculum (HC) refers to unscripted, ad hoc learning that occurs outside the formal, taught curriculum and can have a powerful influence on the professional development of students. While this learning may be positive, it may conflict with that taught in the formal curriculum. Medical schools take a range of steps to address these negative effects; however, the existence and nature of the concept tends to be hidden from students. Since 2007, our medical school has incorporated into its small group programme an educational activity exploring the concept of the hidden curriculum. We undertook a qualitative evaluation of our intervention, conducting a thematic analysis of students' wiki reflections about the HC. We also analysed students' responses to a short questionnaire about the educational approach used. The majority of students felt that the HC session was important and relevant. Most appeared able to identify positive and negative HC experiences and consider how these might influence their learning and development, although a few students found the concept of the HC hard to grasp. Revealing and naming the hidden curriculum can make students aware of its existence and understand its potential impact. The hidden curriculum may also be a useful tool for triggering debate about issues such as power, patient centredness, personal resilience and career stereotypes in medicine. Supporting students to think critically about HC experiences may empower them to make active choices about which messages to take on board. The hidden curriculum can have a powerful influence on the professional development of students. © 2017 John Wiley & Sons Ltd and The Association for the Study of Medical Education.

  8. The hidden values

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Jensen, Karsten Klint

    “The Hidden Values - Transparency in Decision-Making Processes Dealing with Hazardous Activities”. The report seeks to shed light on what is needed to create a transparent framework for political and administrative decisions on the use of GMOs and chemical products. It is our hope that the report...

  9. Real-time person detection in low-resolution thermal infrared imagery with MSER and CNNs

    Science.gov (United States)

    Herrmann, Christian; Müller, Thomas; Willersinn, Dieter; Beyerer, Jürgen

    2016-10-01

    In many camera-based systems, person detection and localization is an important step for safety and security applications such as search and rescue, reconnaissance, surveillance, or driver assistance. Long-wave infrared (LWIR) imagery promises to simplify this task because it is less affected by background clutter or illumination changes. In contrast to a lot of related work, we make no assumptions about any movement of persons or the camera, i.e. persons may stand still and the camera may move or any combination thereof. Furthermore, persons may appear arbitrarily in near or far distances to the camera leading to low-resolution persons in far distances. To address this task, we propose a two-stage system, including a proposal generation method and a classifier to verify, if the detected proposals really are persons. In contradiction to use all possible proposals as with sliding window approaches, we apply Maximally Stable Extremal Regions (MSER) and classify the detected proposals afterwards with a Convolutional Neural Network (CNN). The MSER algorithm acts as a hot spot detector when applied to LWIR imagery. Because the body temperature of persons is usually higher than the background, they appear as hot spots in the image. However, the MSER algorithm is unable to distinguish between different kinds of hot spots. Thus, all further LWIR sources such as windows, animals or vehicles will be detected, too. Still by applying MSER, the number of proposals is reduced significantly in comparison to a sliding window approach which allows employing the high discriminative capabilities of deep neural networks classifiers that were recently shown in several applications such as face recognition or image content classification. We suggest using a CNN as classifier for the detected hot spots and train it to discriminate between person hot spots and all further hot spots. We specifically design a CNN that is suitable for the low-resolution person hot spots that are common with

  10. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  11. Hidden photons in beam dump experiments and in connection with dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-12-15

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  12. Pro-active data breach detection: examining accuracy and applicability on personal information detected

    CSIR Research Space (South Africa)

    Botha, J

    2016-03-01

    Full Text Available or negligence will stop unless effective enforcement of relevant legislation is applied. While several information privacy regulators exist, the dominant norm is to respond reactively on reported incidents. Reactive response is useful for cleaning up detected...

  13. Toward a Personalized Real-Time Diagnosis in Neonatal Seizure Detection

    DEFF Research Database (Denmark)

    Temko, Andriy; Sarkar, Achintya Kumar; Boylan, Geraldine

    2017-01-01

    The problem of creating a personalized seizure detection algorithm for newborns is tackled in this study. A probabilistic framework for semi-supervised adaptation of a generic patient-independent neonatal seizure detector is proposed. A system which is based on a combination of patient-adaptive (...

  14. Detection of person misfit in computerized adaptive tests with polytomous items

    NARCIS (Netherlands)

    van Krimpen-Stoop, Edith; Meijer, R.R.

    2000-01-01

    Item scores that do not fit an assumed item response theory model may cause the latent trait value to be estimated inaccurately. For computerized adaptive tests (CAT) with dichotomous items, several person-fit statistics for detecting nonfitting item score patterns have been proposed. Both for

  15. A Depth Video-based Human Detection and Activity Recognition using Multi-features and Embedded Hidden Markov Models for Health Care Monitoring Systems

    Directory of Open Access Journals (Sweden)

    Ahmad Jalal

    2017-08-01

    Full Text Available Increase in number of elderly people who are living independently needs especial care in the form of healthcare monitoring systems. Recent advancements in depth video technologies have made human activity recognition (HAR realizable for elderly healthcare applications. In this paper, a depth video-based novel method for HAR is presented using robust multi-features and embedded Hidden Markov Models (HMMs to recognize daily life activities of elderly people living alone in indoor environment such as smart homes. In the proposed HAR framework, initially, depth maps are analyzed by temporal motion identification method to segment human silhouettes from noisy background and compute depth silhouette area for each activity to track human movements in a scene. Several representative features, including invariant, multi-view differentiation and spatiotemporal body joints features were fused together to explore gradient orientation change, intensity differentiation, temporal variation and local motion of specific body parts. Then, these features are processed by the dynamics of their respective class and learned, modeled, trained and recognized with specific embedded HMM having active feature values. Furthermore, we construct a new online human activity dataset by a depth sensor to evaluate the proposed features. Our experiments on three depth datasets demonstrated that the proposed multi-features are efficient and robust over the state of the art features for human action and activity recognition.

  16. A masking index for quantifying hidden glitches

    OpenAIRE

    Berti-Equille, Laure; Loh, J. M.; Dasu, T.

    2015-01-01

    Data glitches are errors in a dataset. They are complex entities that often span multiple attributes and records. When they co-occur in data, the presence of one type of glitch can hinder the detection of another type of glitch. This phenomenon is called masking. In this paper, we define two important types of masking and propose a novel, statistically rigorous indicator called masking index for quantifying the hidden glitches. We outline four cases of masking: outliers masked by missing valu...

  17. A two particle hidden sector and the oscillations with photons

    Science.gov (United States)

    Alvarez, Pedro D.; Arias, Paola; Maldonado, Carlos

    2018-01-01

    We present a detailed study of the oscillations and optical properties for vacuum, in a model for the dark sector that contains axion-like particles and hidden photons. We provide bounds for the couplings versus the mass, using current results from ALPS-I and PVLAS. We also discuss the challenges for the detection of models with more than one hidden particle in light shining trough wall-like experiments.

  18. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    Science.gov (United States)

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  19. Discovering hidden viral piracy.

    Science.gov (United States)

    Kim, Eddo; Kliger, Yossef

    2005-12-01

    Viruses and developers of anti-inflammatory therapies share a common interest in proteins that manipulate the immune response. Large double-stranded DNA viruses acquire host proteins to evade host defense mechanisms. Hence, viral pirated proteins may have a therapeutic potential. Although dozens of viral piracy events have already been identified, we hypothesized that sequence divergence impedes the discovery of many others. We developed a method to assess the number of viral/human homologs and discovered that at least 917 highly diverged homologs are hidden in low-similarity alignment hits that are usually ignored. However, these low-similarity homologs are masked by many false alignment hits. We therefore applied a filtering method to increase the proportion of viral/human homologous proteins. The homologous proteins we found may facilitate functional annotation of viral and human proteins. Furthermore, some of these proteins play a key role in immune modulation and are therefore therapeutic protein candidates.

  20. Beyond the hidden curriculum: The challenging search for authentic ...

    African Journals Online (AJOL)

    Further, the hidden curriculum is hampered by the challenging medical school workload, bad role models, and lack of appropriate evaluation and assessment methods, as well as the lack of consensus in bioethics on the key concept of human dignity. Properly conceived, the dignity of the human person is the ultimate ...

  1. Hidden, Unacknowledged, Acquaintance, and Date Rape: Looking Back, Looking Forward

    Science.gov (United States)

    Koss, Mary P.

    2011-01-01

    In this commentary, the author reflects on two articles that have been among the most highly cited publications in "Psychology of Women Quarterly" ("PWQ") over its first 35 years, "The Hidden Rape Victim: Personality, Attitudinal, and Situational Characteristics" (Koss, 1985) and "Stranger and Acquaintance Rape: Are There Differences in the…

  2. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...

  3. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  4. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs. In......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group........ In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  5. Hidden charged dark matter and chiral dark radiation

    Science.gov (United States)

    Ko, P.; Nagata, Natsumi; Tang, Yong

    2017-10-01

    In the light of recent possible tensions in the Hubble constant H0 and the structure growth rate σ8 between the Planck and other measurements, we investigate a hidden-charged dark matter (DM) model where DM interacts with hidden chiral fermions, which are charged under the hidden SU(N) and U(1) gauge interactions. The symmetries in this model assure these fermions to be massless. The DM in this model, which is a Dirac fermion and singlet under the hidden SU(N), is also assumed to be charged under the U(1) gauge symmetry, through which it can interact with the chiral fermions. Below the confinement scale of SU(N), the hidden quark condensate spontaneously breaks the U(1) gauge symmetry such that there remains a discrete symmetry, which accounts for the stability of DM. This condensate also breaks a flavor symmetry in this model and Nambu-Goldstone bosons associated with this flavor symmetry appear below the confinement scale. The hidden U(1) gauge boson and hidden quarks/Nambu-Goldstone bosons are components of dark radiation (DR) above/below the confinement scale. These light fields increase the effective number of neutrinos by δNeff ≃ 0.59 above the confinement scale for N = 2, resolving the tension in the measurements of the Hubble constant by Planck and Hubble Space Telescope if the confinement scale is ≲1 eV. DM and DR continuously scatter with each other via the hidden U(1) gauge interaction, which suppresses the matter power spectrum and results in a smaller structure growth rate. The DM sector couples to the Standard Model sector through the exchange of a real singlet scalar mixing with the Higgs boson, which makes it possible to probe our model in DM direct detection experiments. Variants of this model are also discussed, which may offer alternative ways to investigate this scenario.

  6. Ensemble of One-Class Classifiers for Personal Risk Detection Based on Wearable Sensor Data

    Directory of Open Access Journals (Sweden)

    Jorge Rodríguez

    2016-09-01

    Full Text Available This study introduces the One-Class K-means with Randomly-projected features Algorithm (OCKRA. OCKRA is an ensemble of one-class classifiers built over multiple projections of a dataset according to random feature subsets. Algorithms found in the literature spread over a wide range of applications where ensembles of one-class classifiers have been satisfactorily applied; however, none is oriented to the area under our study: personal risk detection. OCKRA has been designed with the aim of improving the detection performance in the problem posed by the Personal RIsk DEtection(PRIDE dataset. PRIDE was built based on 23 test subjects, where the data for each user were captured using a set of sensors embedded in a wearable band. The performance of OCKRA was compared against support vector machine and three versions of the Parzen window classifier. On average, experimental results show that OCKRA outperformed the other classifiers for at least 0.53% of the area under the curve (AUC. In addition, OCKRA achieved an AUC above 90% for more than 57% of the users.

  7. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  8. Discovering Hidden Controlling Parameters using Data Analytics and Dimensional Analysis

    Science.gov (United States)

    Del Rosario, Zachary; Lee, Minyong; Iaccarino, Gianluca

    2017-11-01

    Dimensional Analysis is a powerful tool, one which takes a priori information and produces important simplifications. However, if this a priori information - the list of relevant parameters - is missing a relevant quantity, then the conclusions from Dimensional Analysis will be incorrect. In this work, we present novel conclusions in Dimensional Analysis, which provide a means to detect this failure mode of missing or hidden parameters. These results are based on a restated form of the Buckingham Pi theorem that reveals a ridge function structure underlying all dimensionless physical laws. We leverage this structure by constructing a hypothesis test based on sufficient dimension reduction, allowing for an experimental data-driven detection of hidden parameters. Both theory and examples will be presented, using classical turbulent pipe flow as the working example. Keywords: experimental techniques, dimensional analysis, lurking variables, hidden parameters, buckingham pi, data analysis. First author supported by the NSF GRFP under Grant Number DGE-114747.

  9. Hidden ion population: Revisited

    International Nuclear Information System (INIS)

    Olsen, R.C.; Chappell, C.R.; Gallagher, D.L.; Green, J.L.; Gurnett, D.A.

    1985-01-01

    Satellite potentials in the outer plasmasphere range from near zero to +5 to +10 V. Under such conditions ion measurements may not include the low energy core of the plasma population. In eclipse, the photoelectron current drops to zero, and the spacecraft potential can drop to near zero volts. In regions where the ambient plasma density is below 100 cm -3 , previously unobserved portions of the ambient plasma distribution function can become visible in eclipse. A survey of the data obtained from the retarding ion mass spectrometer (RIMS) on Dynamics Explorer 1 shows that the RIMS detector generally measured the isotropic background in both sunlight and eclipse in the plasma-sphere. Absolute density measurements for the ''hidden'' ion population are obtained for the first time using the plasma wave instrument observations of the upper hybrid resonance. Agreement in total density is found in sunlight and eclipse measurements at densities above 80 cm -3 . In eclipse, agreement is found at densities as low as 20 cm -3 . The isotropic plasma composition is primarily H + , with approx.10% He + , and 0.1 to 1.0% O + . A low energy field-aligned ion population appears in eclipse measurements outside the plasmasphere, which is obscured in sunlight. These field-aligned ions can be interpreted as field-aligned flows with densities of a few particles per cubic centimeter, flowing at 5-20 km/s. The problem in measuring these field-aligned flows in sunlight is the masking of the high energy tail of the field-aligned distribution by the isotropic background. Effective measurement of the core of the magnetospheric plasma distribution awaits satellites with active means of controlling the satellite potential

  10. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  11. Needs of the hidden homeless - no longer hidden: a pilot study.

    Science.gov (United States)

    Crawley, J; Kane, D; Atkinson-Plato, L; Hamilton, M; Dobson, K; Watson, J

    2013-07-01

    The purpose of this pilot study was to describe the health, housing and social service needs of the hidden homeless. It has been estimated that 80% of all people experiencing homelessness are hidden homeless, and because they remain 'hidden', resources are not allocated to provide this vulnerable population with support. This was a descriptive, case series research design. Participants were recruited through agency referral and snowball sampling. Research ethics board (REB) approval was granted. Using descriptive statistics, information obtained from participant surveys was analysed using SPSS version 19. Thirty-four participants met the inclusion criteria and ranged from 15 to 69 years. Fifty percent of the participants reported first being homeless between 14 and 18 years of age. Participants had several comorbidities, including mental health challenges, dental and respiratory problems, and sleep disorders. Participants described several challenges with accessing adequate nutrition, and finding adequate transportation and finances, and did not list housing as a priority need. The most frequent barriers to accessing health and social services identified by participants included their personal challenges with addiction, lack of transportation, and the perceived stigma they experienced when they sought help from health and social service agencies. Findings from this study can contribute to the development of best practice guidelines and policies that specifically address the needs of this unique population. Improved allocation of resources and coordination of health and community services are cost-effective, and advance the overall health of the hidden homeless. Copyright © 2013 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  12. Personal glucose meters for detection and quantification of a broad range of analytes

    Science.gov (United States)

    Lu, Yi; Xiang, Yu

    2015-02-03

    A general methodology for the development of highly sensitive and selective sensors that can achieve portable, low-cost and quantitative detection of a broad range of targets using only a personal glucose meter (PGM) is disclosed. The method uses recognition molecules that are specific for a target agent, enzymes that can convert an enzyme substrate into glucose, and PGM. Also provided are sensors, which can include a solid support to which is attached a recognition molecule that permits detection of a target agent, wherein the recognition molecule specifically binds to the target agent in the presence of the target agent but not significantly to other agents as well as an enzyme that can catalyze the conversion of a substance into glucose, wherein the enzyme is attached directly or indirectly to the recognition molecule, and wherein in the presence of the target agent the enzyme can convert the substance into glucose. The disclosed sensors can be part of a lateral flow device. Methods of using such sensors for detecting target agents are also provided.

  13. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  14. Physiological modeling for detecting degree of perception of a color-deficient person.

    Science.gov (United States)

    Rajalakshmi, T; Prince, Shanthi

    2017-04-01

    Physiological modeling of retina plays a vital role in the development of high-performance image processing methods to produce better visual perception. People with normal vision have an ability to discern different colors. The situation is different in the case of people with color blindness. The aim of this work is to develop a human visual system model for detecting the level of perception of people with red, green and blue deficiency by considering properties like luminance, spatial and temporal frequencies. Simulation results show that in the photoreceptor, outer plexiform and inner plexiform layers, the energy and intensity level of the red, green and blue component for a normal person is proved to be significantly higher than for dichromats. The proposed method explains with appropriate results that red and blue color blindness people could not perceive red and blue color completely.

  15. Hidden Crises and Communication: An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  16. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  17. Ontology-Driven Monitoring of Patient’s Vital Signs Enabling Personalized Medical Detection and Alert

    Directory of Open Access Journals (Sweden)

    Anna Hristoskova

    2014-01-01

    Full Text Available A major challenge related to caring for patients with chronic conditions is the early detection of exacerbations of the disease. Medical personnel should be contacted immediately in order to intervene in time before an acute state is reached, ensuring patient safety. This paper proposes an approach to an ambient intelligence (AmI framework supporting real-time remote monitoring of patients diagnosed with congestive heart failure (CHF. Its novelty is the integration of: (i personalized monitoring of the patients health status and risk stage; (ii intelligent alerting of the dedicated physician through the construction of medical workflows on-the-fly; and (iii dynamic adaptation of the vital signs’ monitoring environment on any available device or smart phone located in close proximity to the physician depending on new medical measurements, additional disease specifications or the failure of the infrastructure. The intelligence lies in the adoption of semantics providing for a personalized and automated emergency alerting that smoothly interacts with the physician, regardless of his location, ensuring timely intervention during an emergency. It is evaluated on a medical emergency scenario, where in the case of exceeded patient thresholds, medical personnel are localized and contacted, presenting ad hoc information on the patient’s condition on the most suited device within the physician’s reach.

  18. a Uav Based 3-D Positioning Framework for Detecting Locations of Buried Persons in Collapsed Disaster Area

    Science.gov (United States)

    Moon, H.; Kim, C.; Lee, W.

    2016-06-01

    Regarding spatial location positioning, indoor location positioning theories based on wireless communication techniques such as Wi-Fi, beacon, UWB and Bluetooth has widely been developing across the world. These techniques are mainly focusing on spatial location detection of customers using fixed wireless APs and unique Tags in the indoor environment. Besides, since existing detection equipment and techniques using ultrasound or sound etc. to detect buried persons and identify survival status for them cause 2nd damages on the collapsed debris for rescuers. In addition, it might take time to check the buried persons. However, the collapsed disaster sites should consider both outdoor and indoor environments because empty spaces under collapsed debris exists. In order to detect buried persons from the empty spaces, we should collect wireless signals with Wi-Fi from their mobile phone. Basically, the Wi-Fi signal measure 2-D location. However, since the buried persons have Z value with burial depth, we also should collect barometer sensor data from their mobile phones in order to measure Z values according to weather conditions. Specially, for quick accessibility to the disaster area, a drone (UAV; Unmanned Arial Vehicle) system, which is equipped with a wireless detection module, was introduced. Using these framework, this study aims to provide the rescuers with effective rescue information by calculating 3-D location for buried persons based on the wireless and barometer sensor fusion.

  19. A UAV BASED 3-D POSITIONING FRAMEWORK FOR DETECTING LOCATIONS OF BURIED PERSONS IN COLLAPSED DISASTER AREA

    Directory of Open Access Journals (Sweden)

    H. Moon

    2016-06-01

    Full Text Available Regarding spatial location positioning, indoor location positioning theories based on wireless communication techniques such as Wi-Fi, beacon, UWB and Bluetooth has widely been developing across the world. These techniques are mainly focusing on spatial location detection of customers using fixed wireless APs and unique Tags in the indoor environment. Besides, since existing detection equipment and techniques using ultrasound or sound etc. to detect buried persons and identify survival status for them cause 2nd damages on the collapsed debris for rescuers. In addition, it might take time to check the buried persons. However, the collapsed disaster sites should consider both outdoor and indoor environments because empty spaces under collapsed debris exists. In order to detect buried persons from the empty spaces, we should collect wireless signals with Wi-Fi from their mobile phone. Basically, the Wi-Fi signal measure 2-D location. However, since the buried persons have Z value with burial depth, we also should collect barometer sensor data from their mobile phones in order to measure Z values according to weather conditions. Specially, for quick accessibility to the disaster area, a drone (UAV; Unmanned Arial Vehicle system, which is equipped with a wireless detection module, was introduced. Using these framework, this study aims to provide the rescuers with effective rescue information by calculating 3-D location for buried persons based on the wireless and barometer sensor fusion.

  20. Imporved method for stereo vision-based human detection for a mobile robot following a target person

    Directory of Open Access Journals (Sweden)

    Ali, Badar

    2015-05-01

    Full Text Available Interaction between humans and robots is a fundamental need for assistive and service robots. Their ability to detect and track people is a basic requirement for interaction with human beings. This article presents a new approach to human detection and targeted person tracking by a mobile robot. Our work is based on earlier methods that used stereo vision-based tracking linked directly with Hu moment-based detection. The earlier technique was based on the assumption that only one person is present in the environment – the target person – and it was not able to handle more than this one person. In our novel method, we solved this problem by using the Haar-based human detection method, and included a target person selection step before initialising tracking. Furthermore, rather than linking the Kalman filter directly with human detection, we implemented the tracking method before the Kalman filter-based estimation. We used the Pioneer 3AT robot, equipped with stereo camera and sonars, as the test platform.

  1. Microwaves - the hidden danger

    International Nuclear Information System (INIS)

    Brodeur, P.

    1987-01-01

    Today, highly frequent radio waves are regarded as undangerous to man. Diseases seen at radar-technicians during the 2nd World War, however, indicated that microwaves applied in radar systems were hazardous to health. The Russian work medicine has been knowing microwave-caused hazards in industry since the beginning of the thirties. Therefore in some East-European countries there are terms of protection and severe norms of safety for the staying of persons in the radiation sphere of microwaves. (orig.) [de

  2. Cancer prevention and early detection: nursing students' knowledge, attitudes, personal practices, and teaching.

    Science.gov (United States)

    Post-White, J; Carter, M; Anglim, M A

    1993-06-01

    This study evaluated the impact of an educational workshop on nursing students' knowledge, attitudes, and personal practices regarding cancer prevention and early detection (CP&ED), as well as the effect that it had on their teaching of CP&ED recommendations. Four one-day workshops--which included lectures, small group discussions, and practice of early detection skills--were held in three cities in Minnesota. Students from baccalaureate, associate-degree, and practical nursing programs participated (N = 220). Preworkshop, postworkshop, and six-month follow-up surveys were used to evaluate the knowledge, attitudes, and self-practice of the participants, as well as their teaching of clients, family, friends, and peers. Data were analyzed with matched paired t-tests, chi-square, correlation, and analysis of variance. The postworkshop and six-month follow-up surveys showed improvement in the students' knowledge and attitudes; however, the only self-practice behaviors that changed within six months of the workshop were breast/testicular self-examinations. The results also showed that the students felt more confident and subsequently taught more clients, family, friends, and peers about the CP&ED recommendations. These findings indicate that educating students early in their careers may increase the number of people practicing CP&ED recommendations.

  3. Sexual Harrassment: A Hidden Problem.

    Science.gov (United States)

    Sandler, Bernice R.; And Others

    1981-01-01

    The hidden but serious problem of sexual harassment of students and employees by college faculty is discussed, some statistics are given, and legal and court opinions outlined. Harassment as a violation of Title IX is analyzed, and implications for institutional action to curb it are outlined. (MSE)

  4. Adaptive Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rasmussen, Tage

    1996-01-01

    Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding....

  5. Real-Time Detection and Reading of LED/LCD Displays for Visually Impaired Persons.

    Science.gov (United States)

    Tekin, Ender; Coughlan, James M; Shen, Huiying

    2011-01-05

    Modern household appliances, such as microwave ovens and DVD players, increasingly require users to read an LED or LCD display to operate them, posing a severe obstacle for persons with blindness or visual impairment. While OCR-enabled devices are emerging to address the related problem of reading text in printed documents, they are not designed to tackle the challenge of finding and reading characters in appliance displays. Any system for reading these characters must address the challenge of first locating the characters among substantial amounts of background clutter; moreover, poor contrast and the abundance of specular highlights on the display surface - which degrade the image in an unpredictable way as the camera is moved - motivate the need for a system that processes images at a few frames per second, rather than forcing the user to take several photos, each of which can take seconds to acquire and process, until one is readable.We describe a novel system that acquires video, detects and reads LED/LCD characters in real time, reading them aloud to the user with synthesized speech. The system has been implemented on both a desktop and a cell phone. Experimental results are reported on videos of display images, demonstrating the feasibility of the system.

  6. Personalized Behavior Pattern Recognition and Unusual Event Detection for Mobile Users

    Directory of Open Access Journals (Sweden)

    Junho Ahn

    2013-01-01

    Full Text Available Mobile phones have become widely used for obtaining help in emergencies, such as accidents, crimes, or health emergencies. The smartphone is an essential device that can record emergency situations, which can be used for clues or evidence, or as an alert system in such situations. In this paper, we focus on mobile-based identification of potentially unusual, or abnormal events, occurring in a mobile user's daily behavior patterns. For purposes of this research, we have classified events as “unusual” for a mobile user when an event is an infrequently occurring one from the user's normal behavior patterns–all of which are collected and recorded on a user's mobile phone. We build a general unusual event classification model to be automated on the smartphone for use by any mobile phone users. To classify both normal and unusual events, we analyzed the activity, location, and audio sensor data collected from 20 mobile phone users to identify these users' personalized normal daily behavior patterns and any unusual events occurring in their daily activity. We used binary fusion classification algorithms on the subjects' recorded experimental data and ultimately identified the most accurately performing fusion algorithm for unusual event detection.

  7. Mach's principle and hidden matter.

    Science.gov (United States)

    von Borzeszkowski, H.-H.; Treder, H.-J.

    1997-04-01

    According to the Einstein-Mayer theory of the Riemanniann space-time with Einstein-Cartan teleparallelism, the local Lorentz invariance is broken by the gravitational field defining Machian reference systems. This breaking of symmetry implies the occurrence of "hidden matter" in the Einstein equations of gravity. The hidden matter is described by the non-Lorentz-invariant energy-momentum tensor. According to this theory, in the universe and in cosmic systems one must except "invisible masses" described by the Poincaré and Einstein-Cartan terms to exist. The torsion field makes the space-time a Machian universe; it is of the same nature as the "weak interacting matter" discussed in astrophysics.

  8. Improved hidden Markov model for nosocomial infections.

    Science.gov (United States)

    Khader, Karim; Leecaster, Molly; Greene, Tom; Samore, Matthew; Thomas, Alun

    2014-12-01

    We propose a novel hidden Markov model (HMM) for parameter estimation in hospital transmission models, and show that commonly made simplifying assumptions can lead to severe model misspecification and poor parameter estimates. A standard HMM that embodies two commonly made simplifying assumptions, namely a fixed patient count and binomially distributed detections is compared with a new alternative HMM that does not require these simplifying assumptions. Using simulated data, we demonstrate how each of the simplifying assumptions used by the standard model leads to model misspecification, whereas the alternative model results in accurate parameter estimates. © The Authors 2013. Published by Oxford University Press on behalf of the Institute of Mathematics and its Applications. All rights reserved.

  9. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    -average AIDS prevalence, above-average bridging and AIDS prevalence, and above-average bridging and below-average AIDS prevalence (hidden bridgers). The majority of the 1,068 study participants were male (63%), African American (74%), and very poor, and the median age was 44 years. Most (85%) were sexually active, and 725 provided useable geographic information regarding 1,420 sexual partnerships that involved 57 Chicago community areas. Eight community areas met or came close to meeting the definition of hidden bridgers. Six areas were near the city's periphery, and all eight areas likely had high inflows or outflows of low-income persons displaced by gentrification. The results suggest that further research on this method is warranted, and we propose a means for public health officials in other cities to duplicate the analysis.

  10. Person-Specific Face Detection in a Scene with Optimum Composite Filtering and Colour-Shape Information

    Directory of Open Access Journals (Sweden)

    Seokwon Yeom

    2013-01-01

    Full Text Available Face detection and recognition have wide applications in robot vision and intelligent surveillance. However, face identification at a distance is very challenging because long-distance images are often degraded by low resolution, blurring and noise. This paper introduces a person-specific face detection method that uses a nonlinear optimum composite filter and subsequent verification stages. The filter's optimum criterion minimizes the sum of the output energy generated by the input noise and the input image. The composite filter is trained with several training images under long-distance modelling. The candidate facial regions are provided by the filter's outputs of the input scene. False alarms are eliminated by subsequent testing stages, which comprise skin colour and edge mask filtering tests. In the experiments, images captured by a webcam and a CCTV camera are processed to show the effectiveness of the person-specific face detection system at a long distance.

  11. Psychosocial aspects of PKU: hidden disabilities--a review.

    Science.gov (United States)

    Gentile, J K; Ten Hoedt, A E; Bosch, A M

    2010-01-01

    Phenylketonuria (PKU) is an inborn error of metabolism, and its detrimental effects on neurocognitive functioning have been well studied. Early detection and treatment of PKU prevent the severe consequences of this disorder. However, even early- and well-treated patients experience hidden disabilities, including subtle deficits in executive functioning, mild reductions in mental processing speed, social difficulties, and emotional problems that may remain unnoticed for years. Poor executive function (EF) may impact treatment adherence and may lead to psychosocial deficits that are not always visible. These psychosocial aspects include social difficulties and psychosocial problems, such as forming interpersonal relationships, achieving autonomy, attaining educational goals, and having healthy emotional development. Studies report EF deficits in children and adults with early-treated PKU, which contribute significantly to the hidden disabilities in this population. In adults, hidden disabilities affect job performance and social relationships as a result of residual attention deficits, poor EF (e.g., planning, organizing), and reduced processing speed. An indirect relationship also exists between quality of life and EF impairment. In the absence of overt psychiatric symptoms, low level depressive or anxious symptom may be present. The interaction between the neurocognitive deficits and psychiatric symptoms puts this population of patients at significant risk for experiencing hidden disability. PKU is a disorder in which a less than optimal psychosocial outcome arises from the cumulative impact of relatively mild symptoms. The key to reducing risks associated with PKU is metabolic control throughout life. Copyright 2009 Elsevier Inc. All rights reserved.

  12. Detection of infectivity in blood of persons with variant and sporadic Creutzfeldt-Jakob disease.

    Science.gov (United States)

    Douet, Jean Yves; Zafar, Saima; Perret-Liaudet, Armand; Lacroux, Caroline; Lugan, Séverine; Aron, Naima; Cassard, Herve; Ponto, Claudia; Corbière, Fabien; Torres, Juan Maria; Zerr, Inga; Andreoletti, Olivier

    2014-01-01

    We report the presence of infectivity in erythrocytes, leukocytes, and plasma of 1 person with variant Creutzfeldt-Jakob disease and in the plasma of 2 in 4 persons whose tests were positive for sporadic Creutzfeldt-Jakob disease. The measured infectivity levels were comparable to those reported in various animals with transmissible spongiform encephalopathies.

  13. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  14. NMR in an electric field: A bulk probe of the hidden spin and orbital polarizations

    OpenAIRE

    Ramírez-Ruiz, Jorge; Boutin, Samuel; Garate, Ion

    2017-01-01

    Recent theoretical work has established the presence of hidden spin and orbital textures in non-magnetic materials with inversion symmetry. Here, we propose that these textures can be detected by nuclear magnetic resonance (NMR) measurements carried out in the presence of an electric field. In crystals with hidden polarizations, a uniform electric field produces a staggered magnetic field that points to opposite directions at atomic sites related by spatial inversion. As a result, the NMR res...

  15. Parabens determination in cosmetic and personal care products exploiting a multi-syringe chromatographic (MSC) system and chemiluminescent detection.

    Science.gov (United States)

    Rodas, Melisa; Portugal, Lindomar A; Avivar, Jessica; Estela, José Manuel; Cerdà, Víctor

    2015-10-01

    Parabens are widely used in dairy products, such as in cosmetics and personal care products. Thus, in this work a multi-syringe chromatographic (MSC) system is proposed for the first time for the determination of four parabens: methylparaben (MP), ethylparaben (EP), propylparaben (PP) and butylparaben (BP) in cosmetics and personal care products, as a simpler, practical, and low cost alternative to HPLC methods. Separation was achieved using a 5mm-long precolumn of reversed phase C18 and multi-isocratic separation, i.e. using two consecutive mobile phases, 12:88 acetonitrile:water and 28:72 acetonitrile:water. The use of a multi-syringe buret allowed the easy implementation of chemiluminescent (CL) detection after separation. The chemiluminescent detection is based on the reduction of Ce(IV) by p-hydroxybenzoic acid, product of the acid hydrolysis of parabens, to excite rhodamine 6G (Rho 6G) and measure the resulting light emission. Multivariate designs combined with the concepts of multiple response treatments and desirability functions have been employed to simultaneously optimize and evaluate the responses. The optimized method has proved to be sensitive and precise, obtaining limits of detection between 20 and 40 µg L(-1) and RSD <4.9% in all cases. The method was satisfactorily applied to cosmetics and personal care products, obtaining no significant differences at a confidence level of 95% comparing with the HPLC reference method. Copyright © 2015 Elsevier B.V. All rights reserved.

  16. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...

  17. Does immigrant residential crowding reflect hidden homelessness?

    Directory of Open Access Journals (Sweden)

    Michael Haan

    2011-12-01

    the extent to which heightened levels of residential crowding might reflect “hidden homelessness.” I find mixed evidence to support this link, and, if anything, find some evidence to suggest that the link between residential crowding and hidden homelessness, if one exists, is strongest for the Canadian-born.

  18. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  19. Online mixted sampling: An application in hidden populations Muestreo mixto online: Una aplicación en poblaciones ocultas Online mixted sampling: An application in hidden populations

    Directory of Open Access Journals (Sweden)

    María Tatiana Gorjup

    2012-04-01

    inmigrante argentino y utilizando como fuentes de información los grupos virtuales.Purpose: The objective of the article is to explore the possibilities offered by new technologies and virtual social networks for the recruitment of sampling units in hidden populations and as a support of the use of mixed methods.Design/methodology: The objective was to identify Argentinean entrepreneurs who start their business in Spain. The observation unit has the characteristics of a hidden population: 1 high geographic dispersion which makes it difficult to localize them; 2 underestimation of the size of Argentinean residents in the official statistics; 3 Argentinean residents in illegal situation; and, 4 in some cases, the factors that led the emigration were negative, making them reluctant to answer. In this context, the researchers used (1 an online virtual sampling and, (2 the traditional snowball sampling. The online virtual sampling was carried out by using a social network (Facebook through which 52 virtual groups of ‘Argentinean living in Spain’ were identified. Subsequently, each member was contacted by an individual message which explained the aim of the research and invited them to participate in the study. Findings: Through the development of this study, it was possible to prove that the use of virtual groups in social networks led to detect observation units that are not registered officially (administrative register, census, etc.. This finding contributed to increase the scope and size of the sample, it favoured the design of the qualitative sample and the triangulation of the results. Therefore, it increased the validity of the hidden population.Originality/value: The article presents an experience of application of virtual sampling and mixed methods in the study of hidden populations. In particular, it analysed Argentinean immigrant entrepreneurs by using virtual groups as a source of information.Purpose: The objective of the article is to explore the possibilities

  20. Helioscope bounds on hidden sector photons

    International Nuclear Information System (INIS)

    Redondo, J.

    2008-01-01

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to χ -14 , depending on the hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter χ at low masses (m γ' <1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  1. The current situation of personal dose monitoring in Chinese medicine radiation and undamaged detection

    International Nuclear Information System (INIS)

    Zhang Liangan; Zhang Wenyi; Yuan Shuyu; Song Shijun; Chang Hexin; Sun Kai

    1993-01-01

    The situation of personal dose monitoring in γ(X) external exposure in China is mainly outlined. Thermoluminescent dosimetry (TLD) was adopted for personal dose measurement of the radiation workers. The computer software and data base for the work have been developed and applied. National intercomparison of TLD, monitoring control of personal dose monitoring in field, and technical training were carried out for quality control. In China, the dominant occupational exposures is X-ray diagnosis and it increases year by year, the highest values is about 22.6%. The highest values of annual collective dose and annual average of individual dose (AAID) are 272.8 man·Sv and 3.21 mSv respectively. This work shows that the fraction of the population receiving high dose is decreased with time rapidly. The situation for whole occupational exposures is also described. (3 tabs.)

  2. PERSONALIZED HYPOTHESIS TESTS FOR DETECTING MEDICATION RESPONSE IN PARKINSON DISEASE PATIENTS USING iPHONE SENSOR DATA.

    Science.gov (United States)

    Chaibub Neto, Elias; Bot, Brian M; Perumal, Thanneer; Omberg, Larsson; Guinney, Justin; Kellen, Mike; Klein, Arno; Friend, Stephen H; Trister, Andrew D

    2016-01-01

    We propose hypothesis tests for detecting dopaminergic medication response in Parkinson disease patients, using longitudinal sensor data collected by smartphones. The processed data is composed of multiple features extracted from active tapping tasks performed by the participant on a daily basis, before and after medication, over several months. Each extracted feature corresponds to a time series of measurements annotated according to whether the measurement was taken before or after the patient has taken his/her medication. Even though the data is longitudinal in nature, we show that simple hypothesis tests for detecting medication response, which ignore the serial correlation structure of the data, are still statistically valid, showing type I error rates at the nominal level. We propose two distinct personalized testing approaches. In the first, we combine multiple feature-specific tests into a single union-intersection test. In the second, we construct personalized classifiers of the before/after medication labels using all the extracted features of a given participant, and test the null hypothesis that the area under the receiver operating characteristic curve of the classifier is equal to 1/2. We compare the statistical power of the personalized classifier tests and personalized union-intersection tests in a simulation study, and illustrate the performance of the proposed tests using data from mPower Parkinsons disease study, recently launched as part of Apples ResearchKit mobile platform. Our results suggest that the personalized tests, which ignore the longitudinal aspect of the data, can perform well in real data analyses, suggesting they might be used as a sound baseline approach, to which more sophisticated methods can be compared to.

  3. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were...... available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...

  4. Efficiency of a Strategy for Detecting Back Random Responding on the Personality Assessment Inventory

    Science.gov (United States)

    Morey, Leslie C.; Hopwood, Christopher J.

    2004-01-01

    The efficiency of a new strategy to identify back random responding (BRR) on the Personality Assessment Inventory (L. C. Morey, 1991) was studied using random manipulations of item responses from community (904 adult nonpatients) and clinical (1,079 adult patients) respondents. The strategy involved a comparison of short-form and full-instrument T…

  5. Personalized epilepsy seizure detection using random forest classification over one-dimension transformed EEG data

    OpenAIRE

    Orellana, Marco; Cerqueira, Fabio

    2016-01-01

    This work presents a computational method for improving seizure detection for epilepsy diagnosis. Epilepsy is the second most common neurological disease impacting between 40 and 50 million of patients in the world and its proper diagnosis using electroencephalographic signals implies a long and expensive process which involves medical specialists. The proposed system is a patient-dependent offline system which performs an automatic detection of seizures in brainwaves applying a random forest...

  6. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  7. Short Personality and Life Event scale for detection of suicide attempters.

    Science.gov (United States)

    Artieda-Urrutia, Paula; Delgado-Gómez, David; Ruiz-Hernández, Diego; García-Vega, Juan Manuel; Berenguer, Nuria; Oquendo, Maria A; Blasco-Fontecilla, Hilario

    2015-01-01

    To develop a brief and reliable psychometric scale to identify individuals at risk for suicidal behaviour. Case-control study. 182 individuals (61 suicide attempters, 57 psychiatric controls, and 64 psychiatrically healthy controls) aged 18 or older, admitted to the Emergency Department at Puerta de Hierro University Hospital in Madrid, Spain. All participants completed a form including their socio-demographic and clinical characteristics, and the Personality and Life Events scale (27 items). To assess Axis I diagnoses, all psychiatric patients (including suicide attempters) were administered the Mini International Neuropsychiatric Interview. Descriptive statistics were computed for the socio-demographic factors. Additionally, χ(2) independence tests were applied to evaluate differences in socio-demographic and clinical variables, and the Personality and Life Events scale between groups. A stepwise linear regression with backward variable selection was conducted to build the Short Personality Life Event (S-PLE) scale. In order to evaluate the accuracy, a ROC analysis was conducted. The internal reliability was assessed using Cronbach's α, and the external reliability was evaluated using a test-retest procedure. The S-PLE scale, composed of just 6 items, showed good performance in discriminating between medical controls, psychiatric controls and suicide attempters in an independent sample. For instance, the S-PLE scale discriminated between past suicide and past non-suicide attempters with sensitivity of 80% and specificity of 75%. The area under the ROC curve was 88%. A factor analysis extracted only one factor, revealing a single dimension of the S-PLE scale. Furthermore, the S-PLE scale provides values of internal and external reliability between poor (test-retest: 0.55) and acceptable (Cronbach's α: 0.65) ranges. Administration time is about one minute. The S-PLE scale is a useful and accurate instrument for estimating the risk of suicidal behaviour in

  8. myBlackBox: Blackbox Mobile Cloud Systems for Personalized Unusual Event Detection

    Directory of Open Access Journals (Sweden)

    Junho Ahn

    2016-05-01

    Full Text Available We demonstrate the feasibility of constructing a novel and practical real-world mobile cloud system, called myBlackBox, that efficiently fuses multimodal smartphone sensor data to identify and log unusual personal events in mobile users’ daily lives. The system incorporates a hybrid architectural design that combines unsupervised classification of audio, accelerometer and location data with supervised joint fusion classification to achieve high accuracy, customization, convenience and scalability. We show the feasibility of myBlackBox by implementing and evaluating this end-to-end system that combines Android smartphones with cloud servers, deployed for 15 users over a one-month period.

  9. Nano-Bio-Technology and Sensing Chips: New Systems for Detection in Personalized Therapies and Cell Biology

    Directory of Open Access Journals (Sweden)

    Sandro Carrara

    2010-01-01

    Full Text Available Further advances in molecular medicine and cell biology also require new electrochemical systems to detect disease biomarkers and therapeutic compounds. Microelectronic technology offers powerful circuits and systems to develop innovative and miniaturized biochips for sensing at the molecular level. However, microelectronic biochips proposed in the literature often do not show the right specificity, sensitivity, and reliability required by biomedical applications. Nanotechnology offers new materials and solutions to improve the surface properties of sensing probes. The aim of the present paper is to review the most recent progress in Nano-Bio-Technology in the area of the development of new electrochemical systems for molecular detection in personalized therapy and cell culture monitoring.

  10. Hidden costs, value lost: uninsurance in America

    National Research Council Canada - National Science Library

    Committee on the Consequences of Uninsurance; Board on Health Care Services; Institute of Medicine; National Academy of Sciences

    2003-01-01

    Hidden Cost, Value Lost , the fifth of a series of six books on the consequences of uninsurance in the United States, illustrates some of the economic and social losses to the country of maintaining...

  11. The hidden epidemic: confronting sexually transmitted diseases

    National Research Council Canada - National Science Library

    Eng, Thomas R; Butler, William T

    .... In addition, STDs increase the risk of HIV transmission. The Hidden Epidemic examines the scope of sexually transmitted infections in the United States and provides a critical assessment of the nation's response to this public health crisis...

  12. Matriarki dan Hidden Women dalam Syair Damarwulan

    Directory of Open Access Journals (Sweden)

    Dwi Susanto

    2007-12-01

    Full Text Available The story of Damarwulan was a popular story. The reception toward this story was various. Syair, hikayat, legendriya, serat, and performance found at Javanist. Toe Syair of Damarwulan ML 176 appears many characteristics. The reading of this syair discovered much suspicious about the position of Queen of Majapahit, Kenconowungu. This paper explores matriarchal and hidden women into Syair Damarwulan. This paper used feminist perspective to explore matriarchal and hidden women. This paper has concluded that the process of matriarchal was always followed by hidden women. Relation of Queen Kenconowungu­ Menakjinggo and Damarwulan was one of several evidence. The presence of Damarwulan as a hero and image of idol man was the end • of process hidden women

  13. Design of pulse oximetry signal based on personal computer for detection oxygen saturation

    International Nuclear Information System (INIS)

    Umi Salamah; Margi Sasono

    2015-01-01

    The lack or excess of oxygen in the blood will cause healthy and body system disorder. At certain level, the disease can lead to death. For that reason, the information about oxygen saturation in blood becomes important to be identified. One of the devices used to monitor the blood oxygen saturation is pulse oximetry. This research attempt to designed Pulse Oximetry based on personal computer using red LED and infrared as its light source, while the light sensor using photodiode. The designed Pulse Oximetry is a non-invasive instrumentation which LED drivers is placed on the fingertips. The LED light goes through the finger will be a signal that is fed to the photodiode and will be converted into digital signals by ADC (Analog to Digital Converter) and will be processed further by a personal computer to display the pulse oximetry graphics. This study uses Delphi 7, Microsoft Excel, and Mt Lab as its software.This designed pulse oximetry has been tested in two peoples: sample A, male 38 years; and sample B, a woman 23 years old. Oxygen saturation of sample A is 80.75, while the sample B is 90.75. (author)

  14. Petro Rents, Political Institutions, and Hidden Wealth

    DEFF Research Database (Denmark)

    Andersen, Jørgen Juel; Johannesen, Niels; Lassen, David Dreyer

    2017-01-01

    Do political institutions limit rent seeking by politicians? We study the transformation of petroleum rents, almost universally under direct government control, into hidden wealth using unique data on bank deposits in offshore financial centers that specialize in secrecy and asset protection. Our...... rulers is diverted to secret accounts. We find very limited evidence that shocks to other types of income not directly controlled by governments affect hidden wealth....

  15. Workplace ageism: discovering hidden bias.

    Science.gov (United States)

    Malinen, Sanna; Johnston, Lucy

    2013-01-01

    BACKGROUND/STUDY CONTEXT: Research largely shows no performance differences between older and younger employees, or that older workers even outperform younger employees, yet negative attitudes towards older workers can underpin discrimination. Unfortunately, traditional "explicit" techniques for assessing attitudes (i.e., self-report measures) have serious drawbacks. Therefore, using an approach that is novel to organizational contexts, the authors supplemented explicit with implicit (indirect) measures of attitudes towards older workers, and examined the malleability of both. This research consists of two studies. The authors measured self-report (explicit) attitudes towards older and younger workers with a survey, and implicit attitudes with a reaction-time-based measure of implicit associations. In addition, to test whether attitudes were malleable, the authors measured attitudes before and after a mental imagery intervention, where the authors asked participants in the experimental group to imagine respected and valued older workers from their surroundings. Negative, stable implicit attitudes towards older workers emerged in two studies. Conversely, explicit attitudes showed no age bias and were more susceptible to change intervention, such that attitudes became more positive towards older workers following the experimental manipulation. This research demonstrates the unconscious nature of bias against older workers, and highlights the utility of implicit attitude measures in the context of the workplace. In the current era of aging workforce and skill shortages, implicit measures may be necessary to illuminate hidden workplace ageism.

  16. New diagnostic technology and hidden pits and fissures caries

    Directory of Open Access Journals (Sweden)

    Fabrizio Guerra

    2015-10-01

    Full Text Available The accuracy in pits and fissures caries detection is of paramount importance in dental caries primary and secondary prevention. A combination of visual examination and probing is currently the mainstay of occlusal caries diagnosis. Unfortunately, these types of inspection alone may leave a certain number of pit and fissure caries undetected. The Vista Cam iX fluorescence camera (Durr Dental, Bietigheim-Bissingen, Germany is a novel dental diagnostic tool for quantitative assessment of dental caries with high specificity for carious lesions detection. In the presented cases photographic images, representing the visual diagnostic approach, are applied as integration to VistaCam iX Proof images. A step-by-step sequence of inspection and assessment of operative treatment need is presented in a case of hidden pit and fissure caries on a permanent molar. Based on the reported case, it could be observed that VistaCam iX Proof shows promising results in hidden pits and fissures caries detection and could be considered a non-invasive examination method that facilitate the detection of early lesions and a potential diagnostic aid.

  17. Frequency and Detection of Malingering in Homicide Defendants Undergoing Criminal Responsibility Evaluations Using the Schedule for Nonadaptive and Adaptive Personality

    Directory of Open Access Journals (Sweden)

    Wade C. Myers

    2016-04-01

    Full Text Available This retrospective study reports on (a the prevalence of malingering in a sample of 20 homicide defendants seen in jail settings for criminal responsibility evaluations, and (b the feasibility of the Schedule for Nonadaptive and Adaptive Personality (SNAP for malingering detection in this sample. Based on previous non-clinical simulation research, it was hypothesized that the SNAP validity scales would predict group membership for homicide defendants malingering psychopathology. Those with intellectual disabilities or psychotic disorders were excluded. Diagnostically, nearly one half of the sample had Diagnostic and Statistical Manual of Mental Disorders (4th ed., text rev.; DSM-IV-TR personality and substance use disorders. Point prevalence of malingering was 30%. Using the criterion of any SNAP validity scale score in the clinical range (T ≥ 65, a reasonable sensitivity was demonstrated in the detection of malingering (83%, yet this outcome was hindered by a high false positive rate (64%. This study suggests further exploration of the SNAP for assessing malingering in forensic populations is warranted.

  18. Preliminary study for the personal handheld device based snoring detection in ordinary sleep situation.

    Science.gov (United States)

    Shin, Hangsik; Choi, Wangrim; Kim, Yi-gon; Cho, Jaegeol

    2014-01-01

    Snoring is one of the representative phenomena of the sleep disorder and detection of snoring is quite important for improving quality of daily human life. The purpose of this research is to define the noises of the ordinary sleep situation and to find its characteristics as a preliminary research of snoring detection. Differently from previous snoring researches, we use a built-in sound recording system of Smartphone for practical use in ordinary sleep condition, and recording was carried out in a general private bedroom. Especially, we designed the experimental protocol, including the various noises could be frequently occurred during sleep such as cough, music, talking, alarm, door open/close, fan, radio and footstep to make closer to the actual sleep circumstance. The sound data set was recorded during actual sleep from 10 normal subjects. Totally 44 snoring data set and 75-noise dataset is acquired and analyzed.

  19. Detection and impact on cancer causation of persons exhibiting abnormal susceptibility to carcinogenic agents

    International Nuclear Information System (INIS)

    Gentner, N.E.; Morrison, D.P.

    1988-01-01

    The so-called 'late biological effects', like cancer and genetic consequences and cytotoxic effects (cell killing, at higher doses), were once thought to be an inevitable consequence of a given level of exposure, whether to background radiation, to chemicals in our biosphere, or form spontaneous damage, the 'wear and tear' of living. The measurement of exposure, which results in living organisms in the formation of a related amount of DNA damage, became a surrogate for the end-effects that constitute risk. This may not be entirely appropriate. The concept of 'equal exposure -- equal risk' assumes a homogeneous response of individuals. However, there are subgroups within the human population of persons whose cultured cells exhibit abnormal sensitivity to specific carcinogenic agents and who may be at increased risk of cancer induced by these of similar agents. Modern molecular biology has shown that the majority of the damage in DNA is repaired by enzymatic DNA repair processes that restitute or ameliorate the lesions and restore normal DNA structure and function. In this view, it is not the initial damage that is of consequence but rather the residual damage left after the repair processes have acted. Since the vast majority of the initial DNA damage undergoes repair normally, variation in the efficiency of these processes in different persons may affect the actual risk of exposure. The human side of the cancer causation formula, that is, considerable importance. To understand how human DNA repair processes function, our laboratories at Chalk River have studied 'mutant' human cell strains in tissue culture. Generally, these DNA repair-defective cell strains are derived from individual donors with heritable disorders that are associated with carcinogen-hypersensitivity and cancer-proneness. Such studies, together with related epidemiological research, have highlighted the importance of this new 'human' factor in carcinogenesis

  20. Self versus other in piano performance: detectability of timing perturbations depends on personal playing style.

    Science.gov (United States)

    Repp, Bruno H; Keller, Peter E

    2010-04-01

    Differences between recorded repetitions of one's own movements are detected more readily than are differences between repetitions of others' movements, suggesting improved visual discrimination due to heightened resonance in the observer's action system and/or relatively accurate internal action simulation (Daprati et al. in Conscious Cogn 16:178-188, 2007). In Experiment 1, we attempted to replicate this finding in the auditory modality. Pianists were recorded playing musical excerpts three times and later judged whether pairs of recordings were the same take or different takes of the same excerpt. They were no better at distinguishing different takes of their own playing than those of other pianists' playing, even though discrimination and self-recognition were well above chance. In Experiment 2, the same pianists tried to detect small local timing deviations that had been introduced artificially. They were better at detecting such deviations in their own performances than in those of another pianist, but only if the deviations were placed at points of a pre-existing self-other difference in local timing. In that case, pianists' ability to predict their own characteristic action pattern did aid their perception of temporal irregularity. These results do not support the perceptual sharpening hypothesis of Daprati et al. in the musical domain, but they do suggest that pianists listening to performances generate idiosyncratic temporal expectations, probably through internal action simulation.

  1. Dark matter and dark forces from a supersymmetric hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, S.; Goodsell, M.D.; Ringwald, A.

    2011-09-15

    We show that supersymmetric ''Dark Force'' models with gravity mediation are viable. To this end, we analyse a simple supersymmetric hidden sector model that interacts with the visible sector via kinetic mixing of a light Abelian gauge boson with the hypercharge. We include all induced interactions with the visible sector such as neutralino mass mixing and the Higgs portal term. We perform a detailed parameter space scan comparing the produced dark matter relic abundance and direct detection cross-sections to current experiments. (orig.)

  2. Method for detection of an abnormal sleep pattern in a person

    DEFF Research Database (Denmark)

    2014-01-01

    The present disclosure relates to a method for detection of an abnormal sleep pattern based on a dataset of Electrooculography (EOG) signals obtained from a sleeping subject over a time interval, the method comprising the steps of dividing the time interval into a plurality of subintervals, each...... subinterval preferably corresponding to a sleep epoch, classifying each subinterval in terms of sleep stages, thereby obtaining a temporal sleep stage pattern, wherein a subject having an uncharacteristic temporal distribution of sleep stages is characterized as having an abnormal sleep pattern....

  3. Methods of Profile Cloning Detection in Online Social Networks

    Directory of Open Access Journals (Sweden)

    Zabielski Michał

    2016-01-01

    Full Text Available With the arrival of online social networks, the importance of privacy on the Internet has increased dramatically. Thus, it is important to develop mechanisms that will prevent our hidden personal data from unauthorized access and use. In this paper an attempt was made to present a concept of profile cloning detection in Online Social Networks (OSN using Graph and Networks Theory. By analysing structural similarity of network and value of attributes of user personal profile, we will be able to search for attackers which steal our identity.

  4. Extended prediction rule to optimise early detection of heart failure in older persons with non-acute shortness of breath : A cross-sectional study

    NARCIS (Netherlands)

    Van Riet, Evelien E S; Hoes, Arno W.; Limburg, Alexander; Landman, Marcel A J; Kemperman, Hans; Rutten, Frans H.

    2016-01-01

    Objectives: There is a need for a practical tool to aid general practitioners in early detection of heart failure in the elderly with shortness of breath. In this study, such a screening rule was developed based on an existing rule for detecting heart failure in older persons with a diagnosis of

  5. Direct Determination of a Small-Molecule Drug, Valproic Acid, by an Electrically-Detected Microcantilever Biosensor for Personalized Diagnostics

    Directory of Open Access Journals (Sweden)

    Long-Sun Huang

    2015-01-01

    Full Text Available Direct, small-molecule determination of the antiepileptic drug, valproic acid, was investigated by a label-free, nanomechanical biosensor. Valproic acid has long been used as an antiepileptic medication, which is administered through therapeutic drug monitoring and has a narrow therapeutic dosage range of 50–100 μg·mL−1 in blood or serum. Unlike labeled and clinically-used measurement techniques, the label-free, electrical detection microcantilever biosensor can be miniaturized and simplified for use in portable or hand-held point-of-care platforms or personal diagnostic tools. A micromachined microcantilever sensor was packaged into the micro-channel of a fluidic system. The measurement of the antiepileptic drug, valproic acid, in phosphate-buffered saline and serum used a single free-standing, piezoresistive microcantilever biosensor in a thermally-controlled system. The measured surface stresses showed a profile over a concentration range of 50–500 μg·mL−1, which covered the clinically therapeutic range of 50–100 μg·mL−1. The estimated limit of detection (LOD was calculated to be 45 μg·mL−1, and the binding affinity between the drug and the antibody was measured at around 90 ± 21 μg·mL−1. Lastly, the results of the proposed device showed a similar profile in valproic acid drug detection with those of the clinically-used fluorescence polarization immunoassay.

  6. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  7. A gold nanoparticles-based colorimetric test to detect single nucleotide polymorphisms for improvement of personalized therapy of psoriasis

    Science.gov (United States)

    Marsella, Alessandra; Valentini, Paola; Tarantino, Paolo; Congedo, Maurizio; Pompa, Pier Paolo

    2016-04-01

    We report a simple, rapid and low-cost test, based on gold nanoparticles, for the naked-eye colorimetric detection of a signature of single nucleotide polymorphisms (SNPs) relevant for the personalized medicine of psoriasis patients. We validated the colorimetric assay on real-world DNA samples from a cohort of 30 psoriasis patients and we compared the results, in double-blind, with those obtained with two state-of-the-art instrumental techniques, namely reverse dot blotting and direct sequencing, finding 100% agreement. We demonstrated high accuracy, sensitivity and specificity of the colorimetric test that can be easily adapted for the genotypization of different SNPs, important for the pharmacogenomics of various diseases, and in other fields, such as food traceability and population structure analysis.

  8. Detecting lost persons using the k-mean method applied to aerial photographs taken by unmanned aerial vehicles

    Science.gov (United States)

    Niedzielski, Tomasz; Stec, Magdalena; Wieczorek, Malgorzata; Slopek, Jacek; Jurecka, Miroslawa

    2016-04-01

    The objective of this work is to discuss the usefulness of the k-mean method in the process of detecting persons on oblique aerial photographs acquired by unmanned aerial vehicles (UAVs). The detection based on the k-mean procedure belongs to one of the modules of a larger Search and Rescue (SAR) system which is being developed at the University of Wroclaw, Poland (research project no. IP2014 032773 financed by the Ministry of Science and Higher Education of Poland). The module automatically processes individual geotagged visual-light UAV-taken photographs or their orthorectified versions. Firstly, we separate red (R), green (G) and blue (B) channels, express raster data as numeric matrices and acquire coordinates of centres of images using the exchangeable image file format (EXIF). Subsequently, we divide the matrices into matrices of smaller dimensions, the latter being associated with the size of spatial window which is suitable for discriminating between human and terrain. Each triplet of the smaller matrices (R, G and B) serves as input spatial data for the k-mean classification. We found that, in several configurations of the k-mean parameters, it is possible to distinguish a separate class which characterizes a person. We compare the skills of this approach by performing two experiments, based on UAV-taken RGB photographs and their orthorectified versions. This allows us to verify the hypothesis that the two exercises lead to similar classifications. In addition, we discuss the performance of the approach for dissimilar spatial windows, hence various dimensions of the above-mentioned matrices, and we do so in order to find the one which offers the most adequate classification. The numerical experiment is carried out using the data acquired during a dedicated observational UAV campaign carried out in the Izerskie Mountains (SW Poland).

  9. Massive hidden photons as lukewarm dark matter

    International Nuclear Information System (INIS)

    Redondo, Javier; Postma, Marieke

    2008-11-01

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  10. Black hole portal into hidden valleys

    International Nuclear Information System (INIS)

    Dubovsky, Sergei; Gorbenko, Victor

    2011-01-01

    Superradiant instability turns rotating astrophysical black holes into unique probes of light axions. We consider what happens when a light axion is coupled to a strongly coupled hidden gauge sector. In this case superradiance results in an adiabatic increase of a hidden sector CP-violating θ parameter in a near horizon region. This may trigger a first order phase transition in the gauge sector. As a result a significant fraction of a black hole mass is released as a cloud of hidden mesons and can be later converted into electromagnetic radiation. This results in a violent electromagnetic burst. The characteristic frequency of such bursts may range from ∼100 eV to ∼100 MeV.

  11. Religious Tolerance in the Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Kevin Nobel Kurniawan

    2018-03-01

    Full Text Available Religious intolerance is spreading within the Indonesian institution of education. Previous studies have shown that the growth of intolerance is due to the state’s regulation and pedagogical apparatus. In contrast to the previous studies, I argue that the intolerance is related to hidden curriculum applied by the institution of education.  Normatively, the hidden curriculum contains the value of religious tolerance. However, factually, the author found that there are practices of intolerance, through the formal and informal spheres in the school’s structure, within the hidden curriculum. This article applies a qualitative approach with a mixed method research strategy to analyze data collected from students, teachers, and alumnis through field observation, in-depth interview, and survey.

  12. A dynamic analysis of stock markets using a hidden Markov model

    NARCIS (Netherlands)

    de Angelis, L.; Paas, L.J.

    2013-01-01

    This paper proposes a framework to detect financial crises, pinpoint the end of a crisis in stock markets and support investment decision-making processes. This proposal is based on a hidden Markov model (HMM) and allows for a specific focus on conditional mean returns. By analysing weekly changes

  13. Prevalence and clinical value of IgA and hidden rheumatoid factors ...

    African Journals Online (AJOL)

    Background: Juvenile rheumatoid arthritis (JRA) is so difficult to be diagnosed early and a small subgroup of patients has positive IgM rheumatoid factor (RF) detected by the standard agglutination techniques. Objective: To investigate the prevalence of IgA and hidden RFs among patients with JRA, to evaluate their ...

  14. Hidden treasures - 50 km points of interests

    Science.gov (United States)

    Lommi, Matias; Kortelainen, Jaana

    2015-04-01

    Tampere is third largest city in Finland and a regional centre. During 70's there occurred several communal mergers. Nowadays this local area has both strong and diversed identity - from wilderness and agricultural fields to high density city living. Outside the city center there are interesting geological points unknown for modern city settlers. There is even a local proverb, "Go abroad to Teisko!". That is the area the Hidden Treasures -student project is focused on. Our school Tammerkoski Upper Secondary School (or Gymnasium) has emphasis on visual arts. We are going to offer our art students scientific and artistic experiences and knowledge about the hidden treasures of Teisko area and involve the Teisko inhabitants into this project. Hidden treasures - Precambrian subduction zone and a volcanism belt with dense bed of gold (Au) and arsenic (As), operating goldmines and quarries of minerals and metamorphic slates. - North of subduction zone a homogenic precambrian magmastone area with quarries, products known as Kuru Grey. - Former ashores of post-glasial Lake Näsijärvi and it's sediments enabled the developing agriculture and sustained settlement. Nowadays these ashores have both scenery and biodiversity values. - Old cattle sheds and dairy buildings made of local granite stones related to cultural stonebuilding inheritance. - Local active community of Kapee, about 100 inhabitants. Students will discover information of these "hidden" phenomena, and rendering this information trough Enviromental Art Method. Final form of this project will be published in several artistic and informative geocaches. These caches are achieved by a GPS-based special Hidden Treasures Cycling Route and by a website guiding people to find these hidden points of interests.

  15. Recent Developments in Supersymmetric and Hidden Sector Dark Matter

    International Nuclear Information System (INIS)

    Feldman, Daniel; Liu Zuowei; Nath, Pran

    2008-01-01

    New results which correlate SUSY dark matter with LHC signals are presented, and a brief review of recent developments in supersymmetric and hidden sector dark matter is given. It is shown that the direct detection of dark matter is very sensitive to the hierarchical SUSY sparticle spectrum and the spectrum is very useful in distinguishing models. It is shown that the prospects of the discovery of neutralino dark matter are very bright on the 'Chargino Wall' due to a copious number of model points on the Wall, where the NLSP is the Chargino, and the spin independent neutralino-proton cross section is maintained at high values in the 10 -44 cm 2 range for neutralino masses up to ∼850 GeV. It is also shown that the direct detection of dark matter along with lepton plus jet signatures and missing energy provide dual, and often complementary, probes of supersymmetry. Finally, we discuss an out of the box possibility for dark matter, which includes dark matter from the hidden sector, which could either consist of extra weakly interacting dark matter (a Stino XWIMP), or milli-charged dark matter arising from the Stueckelberg extensions of the MSSM or the SM.

  16. Ovarian Cancer: Prevention, Detection and Treatment of the Disease and Its Recurrence. Molecular Mechanisms and Personalized Medicine Meeting Report

    Science.gov (United States)

    Modugno, Francesmary; Edwards, Robert P.

    2012-01-01

    Objective To review the current understanding of the underlying molecular, biologic and genetic mechanisms involved in ovarian cancer development and how these mechanisms can be targets for prevention, detection and treatment of the disease and its recurrence. Methods In May 2012, we convened a meeting of researchers, clinicians and consumer advocates to review the state of current knowledge on molecular mechanisms and identify fruitful areas for further investigations. Results The meeting consisted of seven scientific sessions, ranging from Epidemiology, Early Detection, and Biology to Therapeutics and Quality of Life. Sessions consisted of talks and panel discussions by international leaders in ovarian cancer research. A special career-development session by the CDMRP Department of Defense Ovarian Cancer Academy as well as an oral abstract and poster session showcased promising new research by junior scientists. Conclusions Technological advances in the last decade have increased our knowledge of the molecular mechanisms involved in a host of biological activities related to ovarian cancer. Understanding the role these mechanisms play in cancer initiation and progression will help lead to the development of prevention and treatment modalities that can be personalized to each patient, thereby helping to overcome this highly-fatal malignancy. PMID:23013733

  17. What do dolphins (Tursiops truncatus) understand about hidden objects?

    Science.gov (United States)

    Jaakkola, Kelly; Guarino, Emily; Rodriguez, Mandy; Erb, Linda; Trone, Marie

    2010-01-01

    Object permanence, the ability to mentally represent and reason about objects that have disappeared from view, is a fundamental cognitive skill that has been extensively studied in human infants and terrestrial animals, but not in marine animals. A series of four experiments examined this ability in bottlenose dolphins (Tursiops truncatus). After being trained on a "find the object" game, dolphins were tested on visible and invisible displacement tasks, and transpositions. In Experiments 1 and 2, dolphins succeeded at visible displacements, but not at invisible displacements or transpositions. Experiment 3 showed that they were able to pass an invisible displacement task in which a person's hand rather than a container was used as the displacement device. However, follow-up controls suggested they did so by learning local rules rather than via a true representation of the movement of hidden objects. Experiment 4 demonstrated that the dolphins did not rely on such local rules to pass visible displacement tasks. Thus, like many terrestrial animals, dolphins are able to succeed on visible displacement tasks, but seem unable to succeed on tasks requiring the tracking of hidden objects.

  18. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2016-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  19. Searching for hidden sector in multiparticle production at LHC

    Energy Technology Data Exchange (ETDEWEB)

    Sanchis-Lozano, Miguel-Angel, E-mail: Miguel.Angel.Sanchis@ific.uv.es [Instituto de Física Corpuscular (IFIC) and Departamento de Física Teórica, University of Valencia–CSIC, 46100 Burjassot (Spain); Sarkisyan-Grinbaum, Edward K., E-mail: sedward@cern.ch [Department of Physics, CERN, 1211 Geneva 23 (Switzerland); Department of Physics, The University of Texas at Arlington, Arlington, TX 76019 (United States); Moreno-Picot, Salvador, E-mail: Salvador.Moreno@uv.es [Departamento de Informática, ETSE, University of Valencia, 46100 Burjassot (Spain)

    2016-03-10

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  20. Radioimmunoassays of hidden viral antigens

    International Nuclear Information System (INIS)

    Neurath, A.R.; Strick, N.; Baker, L.; Krugman, S.

    1982-01-01

    Antigens corresponding to infectious agents may be present in biological specimens only in a cryptic form bound to antibodies and, thus, may elude detection. We describe a solid-phase technique for separation of antigens from antibodies. Immune complexes are precipitated from serum by polyethylene glycol, dissociated with NaSCN, and adsorbed onto nitrocellulose or polystyrene supports. Antigens remain topographically separated from antibodies after removal of NaSCN and can be detected with radiolabeled antibodies. Genomes from viruses immobilized on nitrocellulose can be identified by nucleic acid hybridization. Nanogram quantities of sequestered hepatitis B surface and core antigens and picogram amounts of hepatitis B virus DNA were detected. Antibody-bound adenovirus, herpesvirus, and measles virus antigens were discerned by the procedure

  1. Hidden haemosporidian infections in Ruffs (

    NARCIS (Netherlands)

    Mendes, L.; Pardal, S.; Morais, J.; Antunes, S.; Ramos, J.A.; Perez-Tris, J.; Piersma, T.

    2013-01-01

    In their African freshwater wintering habitats, shorebirds show a high prevalence of blood parasites, whereas no parasites are detected elsewhere along the migration route. We looked at two genera of haemosporidian parasites, Haemoproteus and Plasmodium, in the long-distance migrating Ruff

  2. Hidden Costs and Challenges of Servitization

    DEFF Research Database (Denmark)

    Yang, Yifan; Slepniov, Dmitrij

    of these labels, the potential benefits of servitization are often overshadowed by costs associated with it. By using the cases of Chinese and Danish manufacturing firms, this study takes a closer look at possible hidden costs of servitization and contributes to our understanding of servitization performance...

  3. The origin of the hidden supersymmetry

    Czech Academy of Sciences Publication Activity Database

    Jakubský, Vít; Nieto, L.M.; Plyushchay, M. S.

    2010-01-01

    Roč. 692, č. 1 (2010), s. 51-56 ISSN 0370-2693 R&D Projects: GA MŠk LC06002 Institutional research plan: CEZ:AV0Z10480505 Keywords : Hidden supersymmetry * Foldy-Wouthuysen transformation * Aharonov-Bohm effect Subject RIV: BE - Theoretical Physics Impact factor: 5.255, year: 2010

  4. Hidden subsidies in uranium mining and milling

    International Nuclear Information System (INIS)

    Vickery, A.

    1980-01-01

    From the environmental point of view, the regional uranium mining and milling industry imposes a heavy burden on the public. This situation is examined with regard to five hidden subsidies to the industry: lack of stewardship in land management; definition of valuable deposit; air and water contamination; lack of an effective severance tax; the regulatory bureaucracy. Four suggestions are made to improve the situation

  5. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover com...

  6. Hidden Markov models for labeled sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1994-01-01

    A hidden Markov model for labeled observations, called a class HMM, is introduced and a maximum likelihood method is developed for estimating the parameters of the model. Instead of training it to model the statistics of the training sequences it is trained to optimize recognition. It resembles MMI...

  7. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...

  8. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  9. The Hidden Cost of Buying a Computer.

    Science.gov (United States)

    Johnson, Michael

    1983-01-01

    In order to process data in a computer, application software must be either developed or purchased. Costs for modifications of the software package and maintenance are often hidden. The decision to buy or develop software packages should be based upon factors of time and maintenance. (MLF)

  10. The strength of glass, hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2010-01-01

    The strength of float glass is a necessary engineering parameter. Determining this strength is a complex problem. Earlier results have shown that statistically bending test results are not a homogeneous group. To explain this, a theoiy of "hidden damage" is proposed. The essence of this theory is

  11. Emotion detection deficits and changes in personality traits linked to loss of white matter integrity in primary progressive aphasia

    Directory of Open Access Journals (Sweden)

    Namita Multani

    2017-01-01

    Full Text Available Non-cognitive features including personality changes are increasingly recognized in the three PPA variants (semantic-svPPA, non fluent-nfvPPA, and logopenic-lvPPA. However, differences in emotion processing among the PPA variants and its association with white matter tracts are unknown. We compared emotion detection across the three PPA variants and healthy controls (HC, and related them to white matter tract integrity and cortical degeneration. Personality traits in the PPA group were also examined in relation to white matter tracts. Thirty-three patients with svPPA, nfvPPA, lvPPA, and 32 HC underwent neuropsychological assessment, emotion evaluation task (EET, and MRI scan. Patients' study partners were interviewed on the Clinical Dementia Rating Scale (CDR and completed an interpersonal traits assessment, the Interpersonal Adjective Scale (IAS. Diffusion tensor imaging of uncinate fasciculus (UF, superior longitudinal fasciculus (SLF and inferior longitudinal fasciculus (ILF, and voxel-based morphometry to derive gray matter volumes for orbitofrontal cortex (OFC, anterior temporal lobe (ATL regions were performed. In addition, gray matter volumes of white matter tract-associated regions were also calculated: inferior frontal gyrus (IFG, posterior temporal lobe (PTL, inferior parietal lobe (IPL and occipital lobe (OL. ANCOVA was used to compare EET performance. Partial correlation and multivariate linear regression were conducted to examine association between EET and neuroanatomical regions affected in PPA. All three variants of PPA performed significantly worse than HC on EET, and the svPPA group was least accurate at recognizing emotions. Performance on EET was related to the right UF, SLF, and ILF integrity. Regression analysis revealed EET performance primarily relates to the right UF integrity. The IAS subdomain, cold-hearted, was also associated with right UF integrity. Disease-specific emotion recognition and personality changes occur

  12. Personality disorders

    Science.gov (United States)

    ... personality disorder Borderline personality disorder Dependent personality disorder Histrionic personality disorder Narcissistic personality disorder Obsessive-compulsive personality disorder Paranoid ...

  13. Pulling back error to the hidden-node parameter technology: Single-hidden-layer feedforward network without output weight

    OpenAIRE

    Yang, Yimin; Wu, Q. M. Jonathan; Huang, Guangbin; Wang, Yaonan

    2014-01-01

    According to conventional neural network theories, the feature of single-hidden-layer feedforward neural networks(SLFNs) resorts to parameters of the weighted connections and hidden nodes. SLFNs are universal approximators when at least the parameters of the networks including hidden-node parameter and output weight are exist. Unlike above neural network theories, this paper indicates that in order to let SLFNs work as universal approximators, one may simply calculate the hidden node paramete...

  14. Called to respond: The potential of unveiling hiddens

    Directory of Open Access Journals (Sweden)

    Alison L Black

    2014-12-01

    Full Text Available Interested in exploring how personal stories and aesthetic modes of representing experiences can nudge open academic and educational spaces, this article/collection of particles seeks to document our encounters of being affected and called to respond to things the other has written and represented. As a way of engaging with questions about what research and research data might be and become, our attention has been drawn to stories and images from our lives that we have not shaken off – and to how, as we have opened these to the other, making once private moments public, our hiddens have morphed tenderly into a shared knowing and being. As we have acted on the call we have felt to respond we have found ourselves entering spaces of collaboration, communion, contemplation, and conversation – spaces illuminated by what we have not been able to – and cannot – set aside. Using visual and poetic materials we explore heartfelt and heartbroken aspects of our educational worlds and lives, to be present with each other and our (reemerging personal and professional meanings. We see the shared body (of work, of writing, of image that develops from the taking of brave steps and the risky slipping off of academic masks and language, as a manifestation of the trusted and nurturing spaces that can be generated through collaborative opportunities to gather together. These steps towards unveiling hiddens are producing in us and of us a friendship, fluency, and fluidity as we write new ways of becoming. In turn, we hope the uncovering and revealing of our dialogue in the public gathering of this journal might supports readers’ telling of their own life stories through what calls them to respond.

  15. Personal Activity Detection System

    OpenAIRE

    Vale, Sérgio Daniel Rodrigues

    2013-01-01

    Dissertação apresentada à Universidade Fernando Pessoa como partes dos requisitos para a obtenção do grau de Mestre em Engenharia Informática, ramo de Computação Móvel Vivemos numa era em que a esperança média de vida tem aumentado, traduzindo-se diretamente num crescimento cada vez mais significativo da população na faixa etária da terceira idade. Este fenómeno faz com que cada vez mais pessoas idosas vivam sozinhas em casa e tenham dificuldade em encontrar pessoas que as possam acompanha...

  16. The performance of the Alcohol Use Disorder Identification Test (AUDIT) in detecting alcohol abuse and dependence in a population of depressed or anxious persons

    NARCIS (Netherlands)

    Boschloo, Lynn; Vogelzangs, Nicole; Smit, Johannes H.; van den Brink, Wim; Veltman, Dick J.; Beekman, Aartjan T. F.; Penninx, Brenda W. J. H.

    2010-01-01

    BACKGROUND: Alcohol use disorders are highly prevalent but often remain unrecognized among depressed and/or anxious persons. This study examines the performance of the Alcohol Use Disorder Identification Test (AUDIT) in detecting alcohol abuse and dependence in this high-risk group and compares it

  17. PELACAKAN DAN PENGENALAN WAJAH MENGGUNAKAN METODE EMBEDDED HIDDEN MARKOV MODELS

    Directory of Open Access Journals (Sweden)

    Arie Wirawan Margono

    2004-01-01

    Full Text Available Tracking and recognizing human face becomes one of the important research subjects nowadays, where it is applicable in security system like room access, surveillance, as well as searching for person identity in police database. Because of applying in security case, it is necessary to have robust system for certain conditions such as: background influence, non-frontal face pose of male or female in different age and race. The aim of this research is to develop software which combines human face tracking using CamShift algorithm and face recognition system using Embedded Hidden Markov Models. The software uses video camera (webcam for real-time input, video AVI for dynamic input, and image file for static input. The software uses Object Oriented Programming (OOP coding style with C++ programming language, Microsoft Visual C++ 6.0® compiler, and assisted by some libraries of Intel Image Processing Library (IPL and Intel Open Source Computer Vision (OpenCV. System testing shows that object tracking based on skin complexion using CamShift algorithm comes out well, for tracking of single or even two face objects at once. Human face recognition system using Embedded Hidden Markov Models method has reach accuracy percentage of 82.76%, using 341 human faces in database that consists of 31 individuals with 11 poses and 29 human face testers. Abstract in Bahasa Indonesia : Pelacakan dan pengenalan wajah manusia merupakan salah satu bidang yang cukup berkembang dewasa ini, dimana aplikasi dapat diterapkan dalam bidang keamanan (security system seperti ijin akses masuk ruangan, pengawasan lokasi (surveillance, maupun pencarian identitas individu pada database kepolisian. Karena diterapkan dalam kasus keamanan, dibutuhkan sistem yang handal terhadap beberapa kondisi, seperti: pengaruh latar belakang, pose wajah non-frontal terhadap pria maupun wanita dalam perbedaan usia dan ras. Tujuan penelitiam ini adalah untuk membuat perangkat lunak yang menggabungkan

  18. Minimal spontaneously broken hidden sector and its impact on Higgs boson physics at the CERN Large Hadron Collider

    International Nuclear Information System (INIS)

    Schabinger, Robert; Wells, James D.

    2005-01-01

    Little experimental data bears on the question of whether there is a spontaneously broken hidden sector that has no Standard Model quantum numbers. Here we discuss the prospects of finding evidence for such a hidden sector through renormalizable interactions of the Standard Model Higgs boson with a Higgs boson of the hidden sector. We find that the lightest Higgs boson in this scenario has smaller rates in standard detection channels, and it can have a sizeable invisible final state branching fraction. Details of the hidden sector determine whether the overall width of the lightest state is smaller or larger than the Standard Model width. We compute observable rates, total widths and invisible decay branching fractions within the general framework. We also introduce the 'A-Higgs Model', which corresponds to the limit of a hidden sector Higgs boson weakly mixing with the Standard Model Higgs boson. This model has only one free parameter in addition to the mass of the light Higgs state and it illustrates most of the generic phenomenology issues, thereby enabling it to be a good benchmark theory for collider searches. We end by presenting an analogous supersymmetry model with similar phenomenology, which involves hidden sector Higgs bosons interacting with MSSM Higgs bosons through D-terms

  19. Hidden semi-Markov Model based earthquake classification system using Weighted Finite-State Transducers

    Directory of Open Access Journals (Sweden)

    M. Beyreuther

    2011-02-01

    Full Text Available Automatic earthquake detection and classification is required for efficient analysis of large seismic datasets. Such techniques are particularly important now because access to measures of ground motion is nearly unlimited and the target waveforms (earthquakes are often hard to detect and classify. Here, we propose to use models from speech synthesis which extend the double stochastic models from speech recognition by integrating a more realistic duration of the target waveforms. The method, which has general applicability, is applied to earthquake detection and classification. First, we generate characteristic functions from the time-series. The Hidden semi-Markov Models are estimated from the characteristic functions and Weighted Finite-State Transducers are constructed for the classification. We test our scheme on one month of continuous seismic data, which corresponds to 370 151 classifications, showing that incorporating the time dependency explicitly in the models significantly improves the results compared to Hidden Markov Models.

  20. Does Immigrant Residential Crowding Reflect Hidden Homelessness?

    Directory of Open Access Journals (Sweden)

    Michael Haan

    2011-01-01

    Full Text Available Compared to the Canadian-born, immigrants are under-represented among Canada’s homeless population, when their decline in economic wellbeing is considered alongside their relative absence in homeless shelters. One way to explain this oddity, proposed in both academic and popular literature, is that immigrant communities employ unique avoidance strategies, such as within-group co-residence, to help keep co-ethnics off the streets and out of homeless shelters. In this paper I use the 2001 census of Canada to investigate the extent to which heightened levels of residential crowding might reflect “hidden homelessness”. I find mixed evidence to support this link, and, if anything, find some evidence to suggest that the link between residential crowding and hidden homelessness, if one exists, is strongest for the Canadian-born.

  1. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  2. Laser experiments explore the hidden sector

    International Nuclear Information System (INIS)

    Ahlers, M.

    2007-11-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses -7 times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background. (orig.)

  3. Hidden Costs and the Role of Modularity

    DEFF Research Database (Denmark)

    Larsen, Marcus M.

    2013-01-01

    This paper addresses estimation errors in strategic decision-making processes due to hidden costs. While previous research has investigated the antecedents of hidden costs, this paper investigates performance consequences. Using unique data on 221 offshoring implementations, it is argued...... that the inability to effectively estimate the costs of implementing an activity in a foreign location has a negative impact on the process performance of that activity. Performance is deterred as operations are likely to be disrupted by opportunity costs and managerial responses. However, this relationship...... is mitigated by the degree of modularity in the activity as it reduces the need for costly coordination in offshoring. This paper contributes to research on offshoring and strategic decision-making by emphasizing the importance of organizational design and of estimating the costs of internal organizational...

  4. Quantum mechanics and hidden superconformal symmetry

    Science.gov (United States)

    Bonezzi, R.; Corradini, O.; Latini, E.; Waldron, A.

    2017-12-01

    Solvability of the ubiquitous quantum harmonic oscillator relies on a spectrum generating osp (1 |2 ) superconformal symmetry. We study the problem of constructing all quantum mechanical models with a hidden osp (1 |2 ) symmetry on a given space of states. This problem stems from interacting higher spin models coupled to gravity. In one dimension, we show that the solution to this problem is the Vasiliev-Plyushchay family of quantum mechanical models with hidden superconformal symmetry obtained by viewing the harmonic oscillator as a one dimensional Dirac system, so that Grassmann parity equals wave function parity. These models—both oscillator and particlelike—realize all possible unitary irreducible representations of osp (1 |2 ).

  5. Hidden Costs of Control in Social Groups

    OpenAIRE

    Wiederhold, Simon; Riener, Gerhard

    2012-01-01

    This paper investigates the role of social identity in reactions to control. We propose a simple principal-agent model with control that incorporates the existence of social groups. Our laboratory experiment shows that, in contrast to no-group agents, agents in social groups (i) perform better; (ii) expect less control; (iii) do not reciprocate when facing less control than expected; (iv) decrease their performance substantially when actual control exceeds their expectation. Hidden costs of c...

  6. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  7. Completing Quantum Mechanics with Quantized Hidden Variables

    OpenAIRE

    van Enk, S. J.

    2015-01-01

    I explore the possibility that a quantum system S may be described completely by the combination of its standard quantum state $|\\psi\\rangle$ and a (hidden) quantum state $|\\phi\\rangle$ (that lives in the same Hilbert space), such that the outcome of any standard projective measurement on the system S is determined once the two quantum states are specified. I construct an algorithm that retrieves the standard quantum-mechanical probabilities, which depend only on $|\\psi\\rangle$, by assuming t...

  8. Hidden histories: challenges for pedagogy and participation

    OpenAIRE

    Morrice, Linda

    2013-01-01

    Higher Education has become and an increasingly diverse and globalised system in which the binaries between ‘traditional’ and ‘non-traditional’ students, exclusion and inclusion have less resonance and analytical purchase. Drawing on research with refugees Linda will suggest that higher education can be marked simultaneously by belonging and recognition, deficit and exclusion. Complex differences and inequalities remain hidden and unspoken, raising new questions and challenges for pedagogy an...

  9. Hidden Information In Early Visual Processing

    Science.gov (United States)

    Nishihara, H. K.

    1983-05-01

    A definition of scale-specific structure follows from the work of Marr and Poggio on zero-crossings in gaussian-bandpass-filtered images. This paper presents several examples which illustrate the potential value of scale-specific structure for recognition, inspection, and correspondence related tasks. The suitability of the approach for practical systems is discussed, and a recent result suggesting the importance of this "hidden" information to human stereo vision is presented.

  10. Cold dark matter from the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Arias, Paola [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Pontificia Univ. Catolica de Chile, Santiago (Chile). Facultad de Fisica

    2012-02-15

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  11. Classification of Radar Environment Using Ensemble Neural Network with Variation of Hidden Neuron Number

    Directory of Open Access Journals (Sweden)

    Budiman Putra Asmaur Rohman

    2017-08-01

    Full Text Available Target detection is a mandatory task of radar system so that the radar system performance is mainly determined by its detection rate. Constant False Alarm Rate (CFAR is a detection algorithm commonly used in radar systems. This method is divided into several approaches which have different performance in the different environments. Therefore, this paper proposes an ensemble neural network based classifier with a variation of hidden neuron number for classifying the radar environments. The result of this research will support the improvement of the performance of the target detection on the radar systems by developing such an adaptive CFAR. Multi-layer perceptron network (MLPN with a single hidden layer is employed as the structure of base classifiers. The first step of this research is the evaluation of the hidden neuron number giving the highest accuracy of classification and the simplicity of computation. According to the result of this step, the three best structures are selected to build an ensemble classifier. On the ensemble structure, all of those three MLPN outputs then be collected and voted for getting the majority result in order to decide the final classification. The three possible radar environments investigated are homogeneous, multiple-targets and clutter boundary. According to the simulation results, the ensemble MLPN provides a higher detection rate than the conventional single MLPNs. Moreover, in the multiple-target and clutter boundary environments, the proposed method is able to show its highest performance.

  12. Source-specific sewage pollution detection in urban river waters using pharmaceuticals and personal care products as molecular indicators.

    Science.gov (United States)

    Kiguchi, Osamu; Sato, Go; Kobayashi, Takashi

    2016-11-01

    Source-specific elucidation of domestic sewage pollution caused by various effluent sources in an urban river water, as conducted for this study, demands knowledge of the relation between concentrations of pharmaceuticals and personal care products (PPCPs) as molecular indicators (caffeine, carbamazepine, triclosan) and water quality concentrations of total nitrogen (T-N) and total phosphorous (T-P). River water and wastewater samples from the Asahikawa River Basin in northern Japan were analyzed using derivatization-gas chromatography/mass spectrometry. Caffeine, used as an indicator of domestic sewage in the Asahikawa River Basin, was more ubiquitous than either carbamazepine or triclosan (92-100 %). Its concentration was higher than any target compound used to assess the basin: caffeine, caffeine concentrations detected in wastewater effluents and the strongly positive mutual linear correlation between caffeine and T-N or T-P (R 2  > 0.759) reflect the contribution of septic tank system effluents to the lower Asahikawa River Basin. Results of relative molecular indicators in combination with different molecular indicators (caffeine/carbamazepine and triclosan/carbamazepine) and cluster analysis better reflect the contribution of sewage than results obtained using concentrations of respective molecular indicators and cluster analysis. Relative molecular indicators used with water quality parameters (e.g., caffeine/T-N ratio) in this study provide results more clearly, relatively, and quantitatively than results obtained using molecular indicators alone. Moreover, the caffeine/T-N ratio reflects variations of caffeine flux from effluent sources. These results suggest strongly relative molecular indicators are also useful indicators, reflecting differences in spatial contributions of domestic sources for PPCPs in urban areas.

  13. Johne's disease: a hidden threat.

    Science.gov (United States)

    Stabel, J R

    1998-01-01

    Paratuberculosis, which is also known as Johne's disease, is a chronic, progressive enteric disease of ruminants caused by infection with Mycobacterium paratuberculosis. Cattle become infected with M. paratuberculosis as calves but often do not develop clinical signs until 2 to 5 yr of age. The clinical disease is characterized by chronic or intermittent diarrhea, emaciation, and death. Although animals with clinical disease are often culled from the herd, animals with subclinical paratuberculosis may cause economic losses because of reduced milk production and poor reproductive performance. Although the economic impact of paratuberculosis on the national cattle industry has not been determined, it is estimated to exceed $1.5 billion/yr. The diagnosis of subclinical paratuberculosis is difficult. Bacteriologic culture is the most definitive method of diagnosis, but culture is time consuming and labor intensive. Serological assays are not very useful because animals do not develop an antibody response until the clinical stages of disease. Development of assays to measure cell-mediated immunity is critical to accurate detection of paratuberculosis in subclinically infected animals. Although not considered a zoonotic agent, M. paratuberculosis has been identified in intestinal biopsy tissue from patients with Crohn's disease, an inflammatory enteritis in humans. Currently, the potential human health risk is being addressed by research evaluating pasteurization of dairy products in the US.

  14. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  15. Using the mood disorder questionnaire and bipolar spectrum diagnostic scale to detect bipolar disorder and borderline personality disorder among eating disorder patients

    Science.gov (United States)

    2013-01-01

    Background Screening scales for bipolar disorder including the Mood Disorder Questionnaire (MDQ) and Bipolar Spectrum Diagnostic Scale (BSDS) have been plagued by high false positive rates confounded by presence of borderline personality disorder. This study examined the accuracy of these scales for detecting bipolar disorder among patients referred for eating disorders and explored the possibility of simultaneous assessment of co-morbid borderline personality disorder. Methods Participants were 78 consecutive female patients who were referred for evaluation of an eating disorder. All participants completed the mood and eating disorder sections of the SCID-I/P and the borderline personality disorder section of the SCID-II, in addition to the MDQ and BSDS. Predictive validity of the MDQ and BSDS was evaluated by Receiver Operating Characteristic analysis of the Area Under the Curve (AUC). Results Fifteen (19%) and twelve (15%) patients fulfilled criteria for bipolar II disorder and borderline personality disorder, respectively. The AUCs for bipolar II disorder were 0.78 (MDQ) and 0.78 (BDSD), and the AUCs for borderline personality disorder were 0.75 (MDQ) and 0.79 (BSDS). Conclusions Among patients being evaluated for eating disorders, the MDQ and BSDS show promise as screening questionnaires for both bipolar disorder and borderline personality disorder. PMID:23443034

  16. Genuinely Multipartite Entangled Quantum States with Fully Local Hidden Variable Models and Hidden Multipartite Nonlocality

    Science.gov (United States)

    Bowles, Joseph; Francfort, Jérémie; Fillettaz, Mathieu; Hirsch, Flavien; Brunner, Nicolas

    2016-04-01

    The relation between entanglement and nonlocality is discussed in the case of multipartite quantum systems. We show that, for any number of parties, there exist genuinely multipartite entangled states that admit a fully local hidden variable model, i.e., where all parties are separated. Hence, although these states exhibit the strongest form of multipartite entanglement, they cannot lead to Bell inequality violation considering general nonsequential local measurements. Then, we show that the nonlocality of these states can nevertheless be activated using sequences of local measurements, thus revealing genuine multipartite hidden nonlocality.

  17. Hidden Sector Dark Matter Models for the Galactic Center Gamma-Ray Excess

    Energy Technology Data Exchange (ETDEWEB)

    Berlin, Asher [Chicago U.; Gratia, Pierre [Chicago U.; Hooper, Dan [Chicago U., Astron. Astrophys. Ctr.; McDermott, Samuel D. [Michigan U., MCTP

    2014-07-24

    The gamma-ray excess observed from the Galactic Center can be interpreted as dark matter particles annihilating into Standard Model fermions with a cross section near that expected for a thermal relic. Although many particle physics models have been shown to be able to account for this signal, the fact that this particle has not yet been observed in direct detection experiments somewhat restricts the nature of its interactions. One way to suppress the dark matter's elastic scattering cross section with nuclei is to consider models in which the dark matter is part of a hidden sector. In such models, the dark matter can annihilate into other hidden sector particles, which then decay into Standard Model fermions through a small degree of mixing with the photon, Z, or Higgs bosons. After discussing the gamma-ray signal from hidden sector dark matter in general terms, we consider two concrete realizations: a hidden photon model in which the dark matter annihilates into a pair of vector gauge bosons that decay through kinetic mixing with the photon, and a scenario within the generalized NMSSM in which the dark matter is a singlino-like neutralino that annihilates into a pair of singlet Higgs bosons, which decay through their mixing with the Higgs bosons of the MSSM.

  18. Hidden Sector Dark Matter and the Galactic Center Gamma-Ray Excess: A Closer Look

    Energy Technology Data Exchange (ETDEWEB)

    Escudero, Miguel; Witte, Samuel J.; Hooper, Dan

    2017-09-20

    Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case, we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. We also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.

  19. ADAPTIVE LEARNING OF HIDDEN MARKOV MODELS FOR EMOTIONAL SPEECH

    Directory of Open Access Journals (Sweden)

    A. V. Tkachenia

    2014-01-01

    Full Text Available An on-line unsupervised algorithm for estimating the hidden Markov models (HMM parame-ters is presented. The problem of hidden Markov models adaptation to emotional speech is solved. To increase the reliability of estimated HMM parameters, a mechanism of forgetting and updating is proposed. A functional block diagram of the hidden Markov models adaptation algorithm is also provided with obtained results, which improve the efficiency of emotional speech recognition.

  20. Medical students and professionalism - Do the hidden curriculum and current role models fail our future doctors?

    Science.gov (United States)

    Joynt, Gavin Matthew; Wong, Wai-Tat; Ling, Lowell; Lee, Anna

    2017-12-21

    Formal medical curricula aim to promote professionalism through learning from lectures, interactive tutorials and simulations. We report an exploratory voting exercise, conducted within a new integrated professional teaching module, examining the likely influence on students' knowledge and perceptions of truth telling. Responses were collected from cohorts of final year students over a six-year period. Students were asked to pick between two responses to a standardized clinical vignette, firstly the response that they personally thought was the more desirable action, and subsequently the response they believed would most likely result in the context of everyday real-life clinical practice. The difference (proportional change) in voting for "avoid full disclosure" from vote 1 (more desirable action) to vote 2 (likely real-life response) was 50% (95% CI: 36-64%, p strategies to manage the hidden curriculum, prepare clinical teachers to be good role models, and prepare students to be discerning about the hidden curriculum and when choosing role models.

  1. Hidden superconformal symmetry: Where does it come from?

    Science.gov (United States)

    Inzunza, Luis; Plyushchay, Mikhail S.

    2018-02-01

    It is known that a single quantum harmonic oscillator is characterized by a hidden spectrum generating superconformal symmetry, but its origin has remained rather obscure. We show how this hidden superconformal symmetry can be derived by applying a nonlocal Foldy-Wouthuysen transformation to three extended systems with fermion degrees of freedom. The associated systems have essentially different nature from the point of view of conventional supersymmetric quantum mechanics, and generate the desired hidden symmetry in three different ways. We also trace out how the hidden superconformal symmetry of the quantum free particle system is produced in the limit of zero frequency.

  2. On the Extraction of Spread-Spectrum Hidden Data in Digital Media

    Science.gov (United States)

    2012-06-01

    hiding, information hiding, spread-spectrum embedding, steganalysis, steganography , watermarking. I. INTRODUCTION Digital data embedding in digital...tampering, hidden low-probability-to- detect identification for confidential data validation, etc.) and steganography whose purpose is to establish covert...M. J. Medley, “Optimal signature design for spread-spectrum steganography ,” IEEE Trans. Image Proc., vol. 16, pp. 391-405, Feb. 2007. [6] M. Gkizeli

  3. Hidden acoustic information revealed by intentional nonlinearity

    Science.gov (United States)

    Dowling, David R.

    2017-11-01

    Acoustic waves are omnipresent in modern life and are well described by the linearized equations of fluid dynamics. Once generated, acoustic waves carry and collect information about their source and the environment through which they propagate, respectively, and this information may be retrieved by analyzing recordings of these waves. Because of this, acoustics is the primary means for observation, surveillance, reconnaissance, and remote sensing in otherwise opaque environments, such as the Earth's oceans and crust, and the interior of the human body. For such information-retrieval tasks, acoustic fields are nearly always interrogated within their recorded frequency range or bandwidth. However, this frequency-range restriction is not general; acoustic fields may also carry (hidden) information at frequencies outside their bandwidth. Although such a claim may seem counter intuitive, hidden acoustic-field information can be revealed by re-introducing a marquee trait of fluid dynamics: nonlinearity. In particular, an intentional quadratic nonlinearity - a form of intra-signal heterodyning - can be used to obtain acoustic field information at frequencies outside a recorded acoustic field's bandwidth. This quadratic nonlinearity enables a variety of acoustic remote sensing applications that were long thought to be impossible. In particular, it allows the detrimental effects of sparse recordings and random scattering to be suppressed when the original acoustic field has sufficient bandwidth. In this presentation, the topic is developed heuristically, with a just brief exposition of the relevant mathematics. Hidden acoustic field information is then revealed from simulated and measured acoustic fields in simple and complicated acoustic environments involving frequencies from a few Hertz to more than 100 kHz, and propagation distances from tens of centimeters to hundreds of kilometers. Sponsored by ONR, NAVSEA, and NSF.

  4. Performance of the nested k-means method for detecting persons in aerial photographs taken in severe winter conditions by an unmanned aerial vehicle

    Science.gov (United States)

    Niedzielski, Tomasz; Jurecka, Miroslawa; Wieczorek, Malgorzata; Mizinski, Bartlomiej

    2017-04-01

    The nested k-means method aims to automatically identify places in a geographical space where objects that resemble human are likely to be present. The method has been tested on aerial visible-light (RGB) images acquired by an unmanned aerial vehicle (UAV) during an extensive observational campaign in the Izerskie Mountains (southwestern Poland) in dissimilar conditions: different periods of a day, different land cover and with/without snow cover. Although the initial tests revealed considerable skills of the nested k-means method in automatic identification of persons in the wilderness, further studies are needed in order to confirm its usefulness. The present paper focuses on the use of the nested k-means method to locate person-like objects in UAV-acquired aerial RGB and near-infrared (NIR) images taken during severe winter. We take use of photographs of terrain covered with snow, on which persons wearing the same clothes were present in the same locations, taken in dissimilar meteorological situations (approximately from -12˚C to -1˚C). The objective of the study is therefore to check if severe weather influences the performance of the nested k-means method. Having focused on a single person, the location of which was identical over all photographs taken in different environmental conditions in the winter 2015/2016, we re-run the automatic identification procedure based on the k-means method on images taken: with RGB camera, with NIR camera, when a person was exposed to severe cold, and when a person was exposed to mild winter conditions. We found that the approach serves well the purpose of identifying persons. In addition, we calculated a few statistics (detection rate and over-identification rate) as a function of the above-mentioned four cases.

  5. Some Cosmological Implications of Hidden Sectors

    CERN Document Server

    Espinosa, J R; No, J M; Quirós, Mariano

    2008-01-01

    We discuss some cosmological implications of extensions of the Standard Model with hidden sector scalars coupled to the Higgs boson. We put special emphasis on the conformal case, in which the electroweak symmetry is broken radiatively with a Higgs mass above the experimental limit. Our refined analysis of the electroweak phase transition in this kind of models strengthens the prediction of a strongly first-order phase transition as required by electroweak baryogenesis. We further study gravitational wave production and the possibility of low-scale inflation as well as a viable dark matter candidate.

  6. Teaching Vocabulary By Using Hidden Mysteries Game

    OpenAIRE

    Simamora, Ignasius John; Bunau, Eusabinus; Arifin, Zainal

    2014-01-01

    The researcher tried to find whether teaching vocabulary mastery through Hidden Mysteries Game can improve students' vocabulary mastery. Furthermore, this research was designed in the form of pre-experimental research. The data of this research were obtained by doing Pretest and Post-test assessment. The data analysis indicated that the mean score of the students' pre-test was 55.48 (below passing grade 65.00) while the mean score of the students' post-test was 70 (above passing grade 65.00)....

  7. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  8. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  9. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  10. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  11. The hidden face of the petroleum

    International Nuclear Information System (INIS)

    Laurent, E.

    2006-02-01

    For the first time, a book reveals what that was hidden to the public opinions: why the petroleum crisis of 1973 what only a manipulation, an arrangement between the OPEC and the petroleum companies, why the data concerning the petroleum reserves are wrong and increased by the producers countries, how Washington used the Saudi petroleum weapon to create the Soviet Union fall, and why from march 2001 maps of the Iraq (where were drawn the future petroleum explorations) were working documents for the vice President Cheney and petroleum managers for the ''secret society''. (A.L.B.)

  12. Hidden Anemias in the Critically Ill.

    Science.gov (United States)

    O'Malley, Patricia

    2017-09-01

    With increasing knowledge of the risks associated with receiving blood transfusions, a new paradigm of bloodless medicine is needed. Principles of bloodless medicine include careful monitoring for obvious and hidden anemias, rapid intervention, minimizing blood losses from laboratory testing and procedures, and careful management of bleeding diatheses. As evidence is revealed and refined, standard treatment of anemia in the intensive care unit will include erythropoietin-stimulating agents, iron, folate, and vitamin B12, which will reduce risks associated with blood transfusions. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  14. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  15. Hidden Treasure: Successful International Doctoral Students Who Found and Harnessed the Hidden Curriculum

    Science.gov (United States)

    Elliot, Dely Lazarte; Baumfield, Vivienne; Reid, Kate; Makara, Kara A.

    2016-01-01

    This paper draws from an institutionally-funded phenomenological study of international PhD students' academic acculturation, which focuses on the distinctive strengths, challenges, and hidden opportunities facing this cohort within the context of their transition from one academic culture to another. The first section introduces the theoretical…

  16. Multiple Detector Optimization for Hidden Radiation Source Detection

    Science.gov (United States)

    2015-03-26

    Scintillation Spectrometry: Gamma-Ray Spectrum Catalogue”, 2nd edition, IDO-16880-2, Phillips Petroleum Co. Atomic Energy Div., Idaho Falls, ID, 1964. [6] J...Polarimetric Hyperspectral Imaging Process”, IEEE Transactions on Geoscience and Remote Sensing, Vol 50, No. 6,pp 2238 - 2253, 2012. [12] D. Reilly

  17. Hidden losses in financial reporting and the manner of hiding case Serbia: Part two

    Directory of Open Access Journals (Sweden)

    Kaluđerović Nenad

    2016-01-01

    Full Text Available There has always been a dilemma whether financial statements are a reflection of the real situation. When financial statements are subject to various conveniences in order to be presented according to the wish of the purchaser, it leads us to the dilemma when and how this happens. This thesis deals with the attempt to start to solve the dilemmas where and when manipulative actions in financial reporting occur. We have carried out researches on selected samples of money losing companies for the period from 2010 to 2013, on the example of financial indicators of the companies which operated in Serbia. Detection of manipulations by means of which loss is hidden in financial statements is very important for the state economy. Under these conditions, development of an adequate method in this area is limited with the international standards of financial reporting. Numerous qualitative and quantitative methods have been used for evaluation of the real and objective components of losses in order to reflect the level of losses in the economy much better. However, in our conditions, there is an universally accepted method which can foresee and evaluate all events and actions that detect hidden losses in financial statements. This thesis presents methods of evaluation (quantitative and qualitative data mining and how they may be applied in detection of hidden losses in financial statements, by trying to identify a combination of methods which satisfies real needs of a certain task best.

  18. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index

    Science.gov (United States)

    Stevens, Gretchen A.; Ezzati, Majid; Black, Robert E.; Kraemer, Klaus

    2015-01-01

    Background Deficiencies in essential vitamins and minerals–also termed hidden hunger–are pervasive and hold negative consequences for the cognitive and physical development of children. Methods This analysis evaluates the change in hidden hunger over time in the form of one composite indicator–the Hidden Hunger Index (HHI)–using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency). Net changes from 1995–2011 and population weighted regional means for various time periods are measured. Findings Globally, hidden hunger improved (-6.7 net change in HHI) from 1995–2011. Africa was the only region to see a deterioration in hidden hunger (+1.9) over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0), while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased. Interpretation This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs). However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda. Funding Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish. PMID:26673631

  19. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index.

    Directory of Open Access Journals (Sweden)

    Julie C Ruel-Bergeron

    Full Text Available Deficiencies in essential vitamins and minerals-also termed hidden hunger-are pervasive and hold negative consequences for the cognitive and physical development of children.This analysis evaluates the change in hidden hunger over time in the form of one composite indicator-the Hidden Hunger Index (HHI-using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency. Net changes from 1995-2011 and population weighted regional means for various time periods are measured.Globally, hidden hunger improved (-6.7 net change in HHI from 1995-2011. Africa was the only region to see a deterioration in hidden hunger (+1.9 over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0, while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased.This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs. However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda.Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish.

  20. Personality disorders in heart failure patients requiring psychiatric management: comorbidity detections from a routine depression and anxiety screening protocol.

    Science.gov (United States)

    Tully, Phillip J; Selkow, Terina

    2014-12-30

    Several international guidelines recommend routine depression screening in cardiac disease populations. No previous study has determined the prevalence and comorbidities of personality disorders in patients presenting for psychiatric treatment after these screening initiatives. In the first stage 404 heart failure (HF) patients were routinely screened and 73 underwent structured interview when either of the following criteria were met: (a) Patient Health Questionnaire ≥10; (b) Generalized Anxiety Disorder Questionnaire ≥7); (c) Response to one item panic-screener. Or (d) Suicidality. Patients with personality disorders were compared to the positive-screen patients on psychiatric comorbidities. The most common personality disorders were avoidant (8.2%), borderline (6.8%) and obsessive compulsive (4.1%), other personality disorders were prevalent in less than disorder patients had significantly greater risk of major depression (risk ratio (RR) 1.2; 95% confidence interval (CI) 1.2-13.3), generalized anxiety disorder (RR 3.2; 95% CI 1.0-10.0), social phobia (RR 3.8; 95% CI 1.3-11.5) and alcohol abuse/dependence (RR 3.2; 95% 1.0-9.5). The findings that HF patients with personality disorders presented with complex psychiatric comorbidity suggest that pathways facilitating the integration of psychiatric services into cardiology settings are warranted when routine depression screening is in place. Crown Copyright © 2014. Published by Elsevier Ireland Ltd. All rights reserved.

  1. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  2. Black holes, hidden symmetries, and complete integrability.

    Science.gov (United States)

    Frolov, Valeri P; Krtouš, Pavel; Kubizňák, David

    2017-01-01

    The study of higher-dimensional black holes is a subject which has recently attracted vast interest. Perhaps one of the most surprising discoveries is a realization that the properties of higher-dimensional black holes with the spherical horizon topology and described by the Kerr-NUT-(A)dS metrics are very similar to the properties of the well known four-dimensional Kerr metric. This remarkable result stems from the existence of a single object called the principal tensor. In our review we discuss explicit and hidden symmetries of higher-dimensional Kerr-NUT-(A)dS black hole spacetimes. We start with discussion of the Killing and Killing-Yano objects representing explicit and hidden symmetries. We demonstrate that the principal tensor can be used as a "seed object" which generates all these symmetries. It determines the form of the geometry, as well as guarantees its remarkable properties, such as special algebraic type of the spacetime, complete integrability of geodesic motion, and separability of the Hamilton-Jacobi, Klein-Gordon, and Dirac equations. The review also contains a discussion of different applications of the developed formalism and its possible generalizations.

  3. Hidden ion population of the magnetosphere

    International Nuclear Information System (INIS)

    Olsen, R.C.

    1982-01-01

    Particle data from two geosynchronous satellites (Applied Technology Satellite 6 and SCATHA) show a normally hidden ion population appearing when the satellites are in the earth's shadow. Ion and electron data show the spacecraft potential dropping from +10 V in sunlight to +4 and +5 V in eclipse at local midnight, in low-energy (T/sub e/ -2 ), isotropic ion population appears which was invisible in sunlight because of the larger positive spacecraft potential. Higher-energy populations generally cover the tails of the hidden ion populations, so they cannot be inferred from daylight data. The isotropic populations appears only in a few percent of the spacecraft eclipse events, appearing only at times of low Kp (2 or less, preceded by a day with Σ Kp< or =20). A low-energy (T = 1--2 eV) field-aligned population often appears with and without the isotropic population, at slightly higher flux levels. These fluxes are visible in sunlight, but again the distribution functions obtained in eclipse differ from those that would be inferred from daylight data. Measurement of the thermal plasma population on a consistent basis, particularly in the plasma sheet, will require some method of controlling the detector potential with respect to the ambient plamsa

  4. Flavor-singlet hidden charm pentaquark

    Science.gov (United States)

    Irie, Yoya; Oka, Makoto; Yasui, Shigehiro

    2018-02-01

    One type of hidden charm pentaquark Pc s with quark content c c ¯u d s in light-flavor singlet state is studied in the quark model. This state is analogous to the Pc with c c ¯u u d in light-flavor octet, which was observed in LHC in 2015. Considering various combinations of color, spin, and light flavor as internal quantum numbers in Pc s, we investigate the mass ordering of the Pc s's by adopting both the one-gluon exchange interaction and the instanton-induced interaction in the quark model. The most stable configuration of Pc s is identified to be total spin 1 /2 in which the c c ¯ is combined to be color octet and spin 1, while the u d s cluster is in a color octet state. The other color octet configurations, the total spin 1 /2 state with the c c ¯ spin 0, and the state with total spin 3 /2 and c c ¯ spin 1, are found as excited states. We also discuss possible decay modes of these hidden charm pentaquarks.

  5. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  6. Monitoring volcano activity through Hidden Markov Model

    Science.gov (United States)

    Cassisi, C.; Montalto, P.; Prestifilippo, M.; Aliotta, M.; Cannata, A.; Patanè, D.

    2013-12-01

    During 2011-2013, Mt. Etna was mainly characterized by cyclic occurrences of lava fountains, totaling to 38 episodes. During this time interval Etna volcano's states (QUIET, PRE-FOUNTAIN, FOUNTAIN, POST-FOUNTAIN), whose automatic recognition is very useful for monitoring purposes, turned out to be strongly related to the trend of RMS (Root Mean Square) of the seismic signal recorded by stations close to the summit area. Since RMS time series behavior is considered to be stochastic, we can try to model the system generating its values, assuming to be a Markov process, by using Hidden Markov models (HMMs). HMMs are a powerful tool in modeling any time-varying series. HMMs analysis seeks to recover the sequence of hidden states from the observed emissions. In our framework, observed emissions are characters generated by the SAX (Symbolic Aggregate approXimation) technique, which maps RMS time series values with discrete literal emissions. The experiments show how it is possible to guess volcano states by means of HMMs and SAX.

  7. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  8. Risk from the frontlines of a hidden epidemic sexuality, masculinities ...

    African Journals Online (AJOL)

    Risk from the frontlines of a hidden epidemic sexuality, masculinities and social pressures among men who have sex with men in South Africa: an overview. ... These factors are discussed in this paper with stress put particularly on the hiddenness of the MSM HIV epidemic, and it is concluded that the complex mix of factors ...

  9. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    T. Decker; J. Draisma (Jan); P. Wocjan

    2008-01-01

    htmlabstractWe consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be

  10. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    T. Decker; J. Draisma (Jan); P. Wocjan

    2009-01-01

    htmlabstractWe consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be

  11. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  12. Asymptotics for Estimating Equations in Hidden Markov Models

    DEFF Research Database (Denmark)

    Hansen, Jørgen Vinsløv; Jensen, Jens Ledet

    Results on asymptotic normality for the maximum likelihood estimate in hidden Markov models are extended in two directions. The stationarity assumption is relaxed, which allows for a covariate process influencing the hidden Markov process. Furthermore a class of estimating equations is considered...

  13. Optimisation of Hidden Markov Model using Baum–Welch algorithm ...

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 126; Issue 1. Optimisation of Hidden Markov ... The present work is a part of development of Hidden Markov Model (HMM) based avalanche forecasting system for Pir-Panjal and Great Himalayan mountain ranges of the Himalaya. In this work, HMMs have been ...

  14. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  15. How Classical Conditioning Shapes Placebo Analgesia: Hidden versus Open Conditioning.

    Science.gov (United States)

    Babel, Przemyslaw; Adamczyk, Waclaw; Swider, Karolina; Bajcar, Elzbieta A; Kicman, Pawel; Lisinska, Natalia

    2017-07-22

    To investigate the influence of expectancy of pain intensity, fear of pain (trait), and fear (state) on the effectiveness of hidden and open conditioning to produce placebo analgesia. A total of 90 healthy female volunteers were randomly assigned to three groups (hidden conditioning, open conditioning, and control) that received electrical stimuli preceded by either orange or blue lights. One color was paired with painful stimuli (control stimuli) and the other color was paired with nonpainful stimuli (conditioned stimuli) in both the hidden and open conditioning groups. Only participants in the open conditioning group were informed about this association. In the control group, both color lights were followed by control stimuli. In the testing phase, both colored lights were followed by identical control stimuli. Participants rated pain intensity, expectancy of pain intensity, fear, and fear of pain. A significant analgesic effect was found only in the hidden conditioning group, where no explicit verbal suggestions were provided. Hidden conditioning had an effect on expectancy and fear-participants in the hidden conditioning group expected less pain and experienced less fear in relation to conditioned stimuli. Fear was the only predictor of placebo analgesia in the hidden conditioning group. Neither expectancy of pain intensity nor fear of pain predicted placebo analgesia. Fear seems to be a more important factor than expectancy in producing placebo analgesia induced by hidden conditioning. © 2017 American Academy of Pain Medicine. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  16. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in…

  17. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  18. A Multiple Hidden Layers Extreme Learning Machine Method and Its Application

    OpenAIRE

    Xiao, Dong; Li, Beijing; Mao, Yachun

    2017-01-01

    Extreme learning machine (ELM) is a rapid learning algorithm of the single-hidden-layer feedforward neural network, which randomly initializes the weights between the input layer and the hidden layer and the bias of hidden layer neurons and finally uses the least-squares method to calculate the weights between the hidden layer and the output layer. This paper proposes a multiple hidden layers ELM (MELM for short) which inherits the characteristics of parameters of the first hidden layer. The ...

  19. Abelian Hidden Sectors at a GeV

    Energy Technology Data Exchange (ETDEWEB)

    Morrissey, David E.; Poland, David; /Harvard U.; Zurek, Kathryn; /Fermilab /Michigan U.

    2009-04-16

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1){sub x} gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  20. Predicting the Perceptual Consequences of Hidden Hearing Loss

    Directory of Open Access Journals (Sweden)

    Andrew J. Oxenham

    2016-12-01

    Full Text Available Recent physiological studies in several rodent species have revealed that permanent damage can occur to the auditory system after exposure to a noise that produces only a temporary shift in absolute thresholds. The damage has been found to occur in the synapses between the cochlea’s inner hair cells and the auditory nerve, effectively severing part of the connection between the ear and the brain. This synaptopathy has been termed hidden hearing loss because its effects are not thought to be revealed in standard clinical, behavioral, or physiological measures of absolute threshold. It is currently unknown whether humans suffer from similar deficits after noise exposure. Even if synaptopathy occurs in humans, it remains unclear what the perceptual consequences might be or how they should best be measured. Here, we apply a simple theoretical model, taken from signal detection theory, to provide some predictions for what perceptual effects could be expected for a given loss of synapses. Predictions are made for a number of basic perceptual tasks, including tone detection in quiet and in noise, frequency discrimination, level discrimination, and binaural lateralization. The model’s predictions are in line with the empirical observations that a 50% loss of synapses leads to changes in threshold that are too small to be reliably measured. Overall, the model provides a simple initial quantitative framework for understanding and predicting the perceptual effects of synaptopathy in humans.

  1. Stroke: a Hidden Danger of Margin Trading in Stock Markets.

    Science.gov (United States)

    Lin, Shu-Hui; Wang, Chien-Ho; Liu, Tsai-Ching; Chen, Chin-Shyan

    2015-10-01

    Using 10-year population data from 2000 through 2009 in Taiwan, this is the first paper to analyze the relationship between margin trading in stock markets and stroke hospitalizations. The results show that 3 and 6 days after an increase of margin trading in the Taiwan stock markets are associated with greater stoke hospitalizations. In general, a 1 % increase in total margin trading positions is associated with an increment of 2.5 in the total number of stroke hospitalizations, where the mean number of hospital admissions is 233 cases a day. We further examine the effects of margin trading by gender and age groups and find that the effects of margin trading are significant for males and those who are 45-74 years old only. In summary, buying stocks with money you do not have is quite risky, especially if the prices of those stocks fall past a certain level or if there is a sudden and severe drop in the stock market. There is also a hidden danger to one's health from margin trading. A person should be cautious before conducting margin trading, because while it can be quite profitable, danger always lurks just around the corner.

  2. Analyzing Hidden Semantics in Social Bookmarking of Open Educational Resources

    Science.gov (United States)

    Minguillón, Julià

    Web 2.0 services such as social bookmarking allow users to manage and share the links they find interesting, adding their own tags for describing them. This is especially interesting in the field of open educational resources, as delicious is a simple way to bridge the institutional point of view (i.e. learning object repositories) with the individual one (i.e. personal collections), thus promoting the discovering and sharing of such resources by other users. In this paper we propose a methodology for analyzing such tags in order to discover hidden semantics (i.e. taxonomies and vocabularies) that can be used to improve descriptions of learning objects and make learning object repositories more visible and discoverable. We propose the use of a simple statistical analysis tool such as principal component analysis to discover which tags create clusters that can be semantically interpreted. We will compare the obtained results with a collection of resources related to open educational resources, in order to better understand the real needs of people searching for open educational resources.

  3. Hidden Markov Model of atomic quantum jump dynamics in an optically probed cavity

    DEFF Research Database (Denmark)

    Gammelmark, S.; Molmer, K.; Alt, W.

    2014-01-01

    We analyze the quantum jumps of an atom interacting with a cavity field. The strong atom- field interaction makes the cavity transmission depend on the time dependent atomic state, and we present a Hidden Markov Model description of the atomic state dynamics which is conditioned in a Bayesian...... manner on the detected signal. We suggest that small variations in the observed signal may be due to spatial motion of the atom within the cavity, and we represent the atomic system by a number of hidden states to account for both the small variations and the internal state jump dynamics. In our theory......, the atomic state is determined in a Bayesian manner from the measurement data, and we present an iterative protocol, which determines both the atomic state and the model parameters. As a new element in the treatment of observed quantum systems, we employ a Bayesian approach that conditions the atomic state...

  4. Dementia service centres in Austria: A comprehensive support and early detection model for persons with dementia and their caregivers - theoretical foundations and model description.

    Science.gov (United States)

    Auer, Stefanie R; Span, Edith; Reisberg, Barry

    2015-07-01

    Despite the highly developed social services in Austria, the County of Upper Austria, one of the nine counties of Austria had only very limited specialized services for persons with dementia and their caregivers in 2001. Support groups existed in which the desire for more specialized services was voiced. In response to this situation, funding was received to develop a new structure for early disease detection and long term support for both the person with dementia and their caregivers. This article describes the development of the model of the Dementia Service Centres (DSCs) and the successes and difficulties encountered in the process of implementing the model in six different rural regions of Upper Austria. The DSC was described in the First Austrian Dementia Report as one of the potential service models for the future. © The Author(s) 2013.

  5. A Comparison of the Detection Rates for Infrared and Visual Imagery of a Person Holding an RPG

    National Research Council Canada - National Science Library

    Sohn, Euijung; Meitzler, Tom; Bryk, Darryl; Jozwiak, Rachel; Bednarz, David; Lane, Kim; Bankowski, Elena; Vala, John

    2004-01-01

    Detection of potential threats that are camouflaged or concealed is important not only for military acquisition problems but, also for crowd surveillance as well as tactical use such as on border patrols...

  6. A Comparison of the Detection Rates for Infrared and Visual Imagery of a Person Holdina an RPG

    National Research Council Canada - National Science Library

    Sohn, Euijung; Meitzler, Tom; Bryk, Darryl; Jozwiak, Rachel; Bednarz, David; Lane, Kim; Bankowski, Elena; Vala, John

    2004-01-01

    Detection of potential threats that are camouflaged or concealed is important not only for military acquisition problems but, also for crowd surveillance as well as tactical use such as on border patrols...

  7. … To be hidden does not mean to be merely revealed – Part 1 Artistic research on hidden curriculum

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-09-01

    Full Text Available This text revisits the long-term project Hidden Curriculum, initiated by Annette Krauss. The project addresses unquestioned routines, hierarchies of knowledge (part 1, and the role of the body in learning processes (part 2 from the perspective of secondary/high school education (in the research on a hidden curriculum. A deeper analysis of educational studies on the phenomenon of ‘hidden curriculum’ in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire, and Jacques Rancière brings forward important insights generated through the artistic research within hidden curriculum. The aim of this text is to address academic canons, corporeality, and investigate everyday norms through revisiting the framework, results, and processes of the collaborative research into hidden curriculum with secondary high school students.

  8. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school/education...

  9. Hidden conformal symmetry of extremal black holes

    International Nuclear Information System (INIS)

    Chen Bin; Long Jiang; Zhang Jiaju

    2010-01-01

    We study the hidden conformal symmetry of extremal black holes. We introduce a new set of conformal coordinates to write the SL(2,R) generators. We find that the Laplacian of the scalar field in many extremal black holes, including Kerr(-Newman), Reissner-Nordstrom, warped AdS 3 , and null warped black holes, could be written in terms of the SL(2,R) quadratic Casimir. This suggests that there exist dual conformal field theory (CFT) descriptions of these black holes. From the conformal coordinates, the temperatures of the dual CFTs could be read directly. For the extremal black hole, the Hawking temperature is vanishing. Correspondingly, only the left (right) temperature of the dual CFT is nonvanishing, and the excitations of the other sector are suppressed. In the probe limit, we compute the scattering amplitudes of the scalar off the extremal black holes and find perfect agreement with the CFT prediction.

  10. Nuclear scissors modes and hidden angular momenta

    Energy Technology Data Exchange (ETDEWEB)

    Balbutsev, E. B., E-mail: balbuts@theor.jinr.ru; Molodtsova, I. V. [Joint Institute for Nuclear Research (Russian Federation); Schuck, P. [Université Paris-Sud, Institut de Physique Nucléaire, IN2P3–CNRS (France)

    2017-01-15

    The coupled dynamics of low-lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time-Dependent Hartree–Fock–Bogoliubov equations. The model of the harmonic oscillator including spin–orbit potential plus quadrupole–quadrupole and spin–spin interactions is considered. New low-lying spin-dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  11. Exact solution of the hidden Markov processes

    Science.gov (United States)

    Saakian, David B.

    2017-11-01

    We write a master equation for the distributions related to hidden Markov processes (HMPs) and solve it using a functional equation. Thus the solution of HMPs is mapped exactly to the solution of the functional equation. For a general case the latter can be solved only numerically. We derive an exact expression for the entropy of HMPs. Our expression for the entropy is an alternative to the ones given before by the solution of integral equations. The exact solution is possible because actually the model can be considered as a generalized random walk on a one-dimensional strip. While we give the solution for the two second-order matrices, our solution can be easily generalized for the L values of the Markov process and M values of observables: We should be able to solve a system of L functional equations in the space of dimension M -1 .

  12. Hidden fungi, emergent properties: endophytes and microbiomes.

    Science.gov (United States)

    Porras-Alfaro, Andrea; Bayman, Paul

    2011-01-01

    Endophytes are microorganisms that live within plant tissues without causing symptoms of disease. They are important components of plant microbiomes. Endophytes interact with, and overlap in function with, other core microbial groups that colonize plant tissues, e.g., mycorrhizal fungi, pathogens, epiphytes, and saprotrophs. Some fungal endophytes affect plant growth and plant responses to pathogens, herbivores, and environmental change; others produce useful or interesting secondary metabolites. Here, we focus on new techniques and approaches that can provide an integrative understanding of the role of fungal endophytes in the plant microbiome. Clavicipitaceous endophytes of grasses are not considered because they have unique properties distinct from other endophytes. Hidden from view and often overlooked, endophytes are emerging as their diversity, importance for plant growth and survival, and interactions with other organisms are revealed. Copyright © 2011 by Annual Reviews. All rights reserved.

  13. The elliptic genus and Hidden symmetry

    International Nuclear Information System (INIS)

    Jaffe, A.

    2001-01-01

    We study the elliptic genus (a partition function) in certain interacting, twist quantum field theories. Without twists, these theories have N=2 supersymmetry. The twists provide a regularization, and also partially break the supersymmetry. In spite of the regularization, one can establish a homotopy of the elliptic genus in a coupling parameter. Our construction relies on a priori estimates and other methods from constructive quantum field theory; this mathematical underpinning allows us to justify evaluating the elliptic genus at one endpoint of the homotopy. We obtain a version of Witten's proposed formula for the elliptic genus in terms of classical theta functions. As a consequence, the elliptic genus has a hidden SL(2,Z) symmetry characteristic of conformal theory, even though the underlying theory is not conformal. (orig.)

  14. The hidden biology of sponges and ctenophores.

    Science.gov (United States)

    Dunn, Casey W; Leys, Sally P; Haddock, Steven H D

    2015-05-01

    Animal evolution is often presented as a march toward complexity, with different living animal groups each representing grades of organization that arose through the progressive acquisition of complex traits. There are now many reasons to reject this classical hypothesis. Not only is it incompatible with recent phylogenetic analyses, but it is also an artifact of 'hidden biology', that is, blind spots to complex traits in non-model species. A new hypothesis of animal evolution, where many complex traits have been repeatedly gained and lost, is emerging. As we discuss here, key details of this new model hinge on a better understanding of the Porifera and Ctenophora, which have each been hypothesized to be sister to all other animals, but are poorly studied and often misrepresented. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Dynamic portfolio optimization across hidden market regimes

    DEFF Research Database (Denmark)

    Nystrup, Peter; Madsen, Henrik; Lindström, Erik

    2017-01-01

    Regime-based asset allocation has been shown to add value over rebalancing to static weights and, in particular, reduce potential drawdowns by reacting to changes in market conditions. The predominant approach in previous studies has been to specify in advance a static decision rule for changing...... the allocation based on the state of financial markets or the economy. In this article, model predictive control (MPC) is used to dynamically optimize a portfolio based on forecasts of the mean and variance of financial returns from a hidden Markov model with time-varying parameters. There are computational...... advantages to using MPC when estimates of future returns are updated every time a new observation becomes available, since the optimal control actions are reconsidered anyway. MPC outperforms a static decision rule for changing the allocation and realizes both a higher return and a significantly lower risk...

  16. Revealing the Hidden Curriculum in Higher Education

    DEFF Research Database (Denmark)

    Semper, José Víctor Orón; Blasco, Maribel

    2018-01-01

    The so-called ‘hidden curriculum’ (HC) is often presented as a counterproductive element in education, and many scholars argue that it should be eliminated, by being made explicit, in education in general and specifically in higher education (HE). The problem of the HC has not been solved...... by the transition from a teacher-centered education to a student-centered educational model that takes the student’s experience as the starting point of learning. In this article we turn to several philosophers of education (Dewey, Kohlberg, Whitehead, Peters and Knowles) to propose that HC can be made explicit...... this interpersonal relationship can be strengthened despite current challenges in HE....

  17. Religion, Spirituality, and the Hidden Curriculum: Medical Student and Faculty Reflections.

    Science.gov (United States)

    Balboni, Michael J; Bandini, Julia; Mitchell, Christine; Epstein-Peterson, Zachary D; Amobi, Ada; Cahill, Jonathan; Enzinger, Andrea C; Peteet, John; Balboni, Tracy

    2015-10-01

    Religion and spirituality play an important role in physicians' medical practice, but little research has examined their influence within the socialization of medical trainees and the hidden curriculum. The objective is to explore the role of religion and spirituality as they intersect with aspects of medicine's hidden curriculum. Semiscripted, one-on-one interviews and focus groups (n = 33 respondents) were conducted to assess Harvard Medical School student and faculty experiences of religion/spirituality and the professionalization process during medical training. Using grounded theory, theme extraction was performed with interdisciplinary input (medicine, sociology, and theology), yielding a high inter-rater reliability score (kappa = 0.75). Three domains emerged where religion and spirituality appear as a factor in medical training. First, religion/spirituality may present unique challenges and benefits in relation to the hidden curriculum. Religious/spiritual respondents more often reported to struggle with issues of personal identity, increased self-doubt, and perceived medical knowledge inadequacy. However, religious/spiritual participants less often described relationship conflicts within the medical team, work-life imbalance, and emotional stress arising from patient suffering. Second, religion/spirituality may influence coping strategies during encounters with patient suffering. Religious/spiritual trainees described using prayer, faith, and compassion as means for coping whereas nonreligious/nonspiritual trainees discussed compartmentalization and emotional repression. Third, levels of religion/spirituality appear to fluctuate in relation to medical training, with many trainees experiencing an increase in religiousness/spirituality during training. Religion/spirituality has a largely unstudied but possibly influential role in medical student socialization. Future study is needed to characterize its function within the hidden curriculum. Copyright

  18. Religion, Spirituality, and the Hidden Curriculum: Medical Student and Faculty Reflections

    Science.gov (United States)

    Balboni, Michael J.; Bandini, Julia; Mitchell, Christine; Epstein-Peterson, Zachary D.; Amobi, Ada; Cahill, Jonathan; Enzinger, Andrea C.; Peteet, John; Balboni, Tracy

    2017-01-01

    Context Religion and spirituality play an important role in physicians’ medical practice, but little research has examined their influence within the socialization of medical trainees and the hidden curriculum. Objectives The objective is to explore the role of religion and spirituality as they intersect with aspects of medicine’s hidden curriculum. Methods Semiscripted, one-on-one interviews and focus groups (n = 33 respondents) were conducted to assess Harvard Medical School student and faculty experiences of religion/spirituality and the professionalization process during medical training. Using grounded theory, theme extraction was performed with interdisciplinary input (medicine, sociology, and theology), yielding a high inter-rater reliability score (kappa = 0.75). Results Three domains emerged where religion and spirituality appear as a factor in medical training. First, religion/spirituality may present unique challenges and benefits in relation to the hidden curriculum. Religious/spiritual respondents more often reported to struggle with issues of personal identity, increased self-doubt, and perceived medical knowledge inadequacy. However, religious/spiritual participants less often described relationship conflicts within the medical team, work-life imbalance, and emotional stress arising from patient suffering. Second, religion/spirituality may influence coping strategies during encounters with patient suffering. Religious/spiritual trainees described using prayer, faith, and compassion as means for coping whereas nonreligious/nonspiritual trainees discussed compartmentalization and emotional repression. Third, levels of religion/spirituality appear to fluctuate in relation to medical training, with many trainees experiencing an increase in religiousness/spirituality during training. Conclusion Religion/spirituality has a largely unstudied but possibly influential role in medical student socialization. Future study is needed to characterize its

  19. Social exclusion, health and hidden homelessness.

    Science.gov (United States)

    Watson, J; Crawley, J; Kane, D

    2016-10-01

    Homelessness and poverty are extreme forms of social exclusion which extend beyond the lack of physical or material needs. The purpose of this study was to explore and expand the concept of social exclusion within the social determinants of health perspective - to understand how the social environment, health behaviours and health status are associated with material and social deprivation. Fundamental qualitative description with tones of focused ethnography. Participants who identified as hidden homeless described their everyday living conditions and how these everyday conditions were impacted and influenced by their social environments, coping/health behaviours and current health status. Research Ethics Board approval was granted and informed consents were obtained from 21 participants prior to the completion of individual interviews. Qualitative content analysis examined the descriptions of men and women experiencing hidden homelessness. Participants described the 'lack of quality social interactions and supports' and their 'daily struggles of street life'. They also shared the 'pain of addiction' and how coping strategies influenced health. Participants were hopeful that their insights would 'better the health of homeless people' by helping shape public policy and funding of community resources that would reduce barriers and improve overall health. Health professionals who understand health behaviours as coping mechanisms for poor quality social environments can provide more comprehensive and holistic care. The findings of this study can be used to support the importance of housing as a key factor in the health and well-being of people experiencing poverty, homelessness and social exclusion; and consequently, reinforces the need for a national housing strategy. Copyright © 2016 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  20. Electronic hidden solder joint geometry characterization

    Science.gov (United States)

    Hsieh, Sheng-Jen

    2009-05-01

    To reduce the size of electronic equipment, multi-layer printed circuit board structures have become popular in recent years. As a result, the inspection of hidden solder joints between layers of boards has become increasingly difficult. Xray machines have been used for ball grid array (BGA) and hidden solder joint inspection; however, the equipment is costly and the inspection process is time consuming. In this paper, we investigate an active thermography approach to probing solder joint geometry. A set of boards having the same number of solder joints and amount of solder paste (0.061 g) was fabricated. Each solder joint had a different geometry. A semi-automated system was built to heat and then transfer each board to a chamber where an infrared camera was used to scan the board as it was cooling down. Two-thirds of the data set was used for model development and one-third was used for model evaluation. Both artificial neural network (ANN) and binary logistic regression models were constructed. Results suggest that solder joints with more surface area cool much faster than those with less surface area. In addition, both modeling approaches are consistent in predicting solder geometry; ANN had 85% accuracy and the regression model had 80%. This approach can potentially be used to test for cold solder joints prior to BGA assembly, since cold solder joints may have air gaps between the joint and the board and air is a poor heat conductor. Therefore, a cold solder joint may have a slower cooling rate than a normal one.

  1. A pilot study on the Chinese Minnesota Multiphasic Personality Inventory-2 in detecting feigned mental disorders: Simulators classified by using the Structured Interview of Reported Symptoms.

    Science.gov (United States)

    Chang, Yi-Ting; Tam, Wai-Cheong C; Shiah, Yung-Jong; Chiang, Shih-Kuang

    2017-09-01

    The Minnesota Multiphasic Personality Inventory-2 (MMPI-2) is often used in forensic psychological/psychiatric assessment. This was a pilot study on the utility of the Chinese MMPI-2 in detecting feigned mental disorders. The sample consisted of 194 university students who were either simulators (informed or uninformed) or controls. All the participants were administered the Chinese MMPI-2 and the Structured Interview of Reported Symptoms-2 (SIRS-2). The results of the SIRS-2 were utilized to classify the participants into the feigning or control groups. The effectiveness of eight detection indices was investigated by using item analysis, multivariate analysis of covariance (MANCOVA), and receiver operating characteristic (ROC) analysis. Results indicated that informed-simulating participants with prior knowledge of mental disorders did not perform better in avoiding feigning detection than uninformed-simulating participants. In addition, the eight detection indices of the Chinese MMPI-2 were effective in discriminating participants in the feigning and control groups, and the best cut-off scores of three of the indices were higher than those obtained from the studies using the English MMPI-2. Thus, in this sample of university students, the utility of the Chinese MMPI-2 in detecting feigned mental disorders was tentatively supported, and the Chinese Infrequency Scale (ICH), a scale developed specifically for the Chinese MMPI-2, was also supported as a valid scale for validity checking. © 2017 The Institute of Psychology, Chinese Academy of Sciences and John Wiley & Sons Australia, Ltd.

  2. Practical low dose limits for passive personal dosemeters and the implications for uncertainties close to the limit of detection

    International Nuclear Information System (INIS)

    Gilvin, P. J.; Perks, C. A.

    2011-01-01

    Recent years have seen the increasing use of passive dosemeters that have high sensitivities and, in laboratory conditions, detection limits of <10 μSv. However, in real operational use the detection limits will be markedly higher, because a large fraction of the accrued dose will be due to natural background, and this must be subtracted in order to obtain the desired occupational dose. No matter how well known the natural background is, the measurement uncertainty on doses of a few tens of microsieverts will be large. Individual monitoring services need to recognise this and manage the expectations of their clients by providing sufficient information. (authors)

  3. Sociocultural Dimension of Hidden Content in a Professional Language Curriculum

    Directory of Open Access Journals (Sweden)

    Ekaterina E. Shishlova

    2017-12-01

    Full Text Available Introduction: studying curriculum as a pedagogical problem has traditionally been reduced to the analysis of its explicit content, set in official educational documents. However, a much less studied hidden content plays a significant role in education. So, what is the role of the hidden curriculum during professional language training? The purpose of the article is to determine the potential impact of hidden curriculum on students’ conceptual worldview. Comparing the worldview presented in textbooks with students’ one has allowed us to estimate the rate of influence of hidden curr iculum. Materials and Methods: the methodological basis of the work is the cultural concept of personalityoriented education. The methodology for studying the role of hidden curriculum includes four stages: at the first stage, the authors set the criteria for selecting textbooks for analysis and do the selection; at the second stage, the authors select sociocultural concepts for analysis; at the third stage, the scheme of analysis is designed and the analysis of textbooks is done; at the fourth stage, the authors identify the potential influence of hidden curriculum on students’ conceptual worldview. Results: the structure of hidden curriculum has been determined and the scheme for analysing its subject component has been developed. The authors have identified a significant influence of hidden curriculum on students’ worldview, which represents the scientific novelty of the article. Discussion and Conclusions: the article gives the definition of a hidden curriculum which is new for Russian pedagogy and presents a methodology for its analysis in EFL textbooks. That analysis is recommended to be conducted when selecting teaching materials both i n languages and other humanities.

  4. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  5. Context Tree Estimation in Variable Length Hidden Markov Models

    OpenAIRE

    Dumont, Thierry

    2011-01-01

    We address the issue of context tree estimation in variable length hidden Markov models. We propose an estimator of the context tree of the hidden Markov process which needs no prior upper bound on the depth of the context tree. We prove that the estimator is strongly consistent. This uses information-theoretic mixture inequalities in the spirit of Finesso and Lorenzo(Consistent estimation of the order for Markov and hidden Markov chains(1990)) and E.Gassiat and S.Boucheron (Optimal error exp...

  6. Hidden photon dark matter search with large metallic mirror

    International Nuclear Information System (INIS)

    Doebrich, Babette; Lindner, Axel; Daumiller, Kai; Engel, Ralph; Roth, Markus; Kowalski, Marek

    2014-10-01

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  7. Hidden Area and Mechanical Nonlinearities in Freestanding Graphene

    Science.gov (United States)

    Nicholl, Ryan J. T.; Lavrik, Nickolay V.; Vlassiouk, Ivan; Srijanto, Bernadeta R.; Bolotin, Kirill I.

    2017-06-01

    We investigated the effect of out-of-plane crumpling on the mechanical response of graphene membranes. In our experiments, stress was applied to graphene membranes using pressurized gas while the strain state was monitored through two complementary techniques: interferometric profilometry and Raman spectroscopy. By comparing the data obtained through these two techniques, we determined the geometric hidden area which quantifies the crumpling strength. While the devices with hidden area ˜0 % obeyed linear mechanics with biaxial stiffness 428 ±10 N /m , specimens with hidden area in the range 0.5%-1.0% were found to obey an anomalous nonlinear Hooke's law with an exponent ˜0.1 .

  8. Naturally light hidden photons in LARGE volume string compactifications

    International Nuclear Information System (INIS)

    Goodsell, M.; Jaeckel, J.; Redondo, J.; Ringwald, A.

    2009-09-01

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  9. Suppressing the QCD axion abundance by hidden monopoles

    International Nuclear Information System (INIS)

    Kawasaki, Masahiro

    2015-11-01

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10 12 GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  10. Multilayer Neural Networks with Extensively Many Hidden Units

    International Nuclear Information System (INIS)

    Rosen-Zvi, Michal; Engel, Andreas; Kanter, Ido

    2001-01-01

    The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions, whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an overlap in the space of Boolean functions as order parameter, the storage capacity is found to scale with the logarithm of the number of implementable Boolean functions. The generalization behavior is smooth for continuous couplings and shows a discontinuous transition to perfect generalization for discrete ones

  11. Interpretation of non-Markovian stochastic Schroedinger equations as a hidden-variable theory

    International Nuclear Information System (INIS)

    Gambetta, Jay; Wiseman, H.M.

    2003-01-01

    Do diffusive non-Markovian stochastic Schroedinger equations (SSEs) for open quantum systems have a physical interpretation? In a recent paper [Phys. Rev. A 66, 012108 (2002)] we investigated this question using the orthodox interpretation of quantum mechanics. We found that the solution of a non-Markovian SSE represents the state the system would be in at that time if a measurement was performed on the environment at that time, and yielded a particular result. However, the linking of solutions at different times to make a trajectory is, we concluded, a fiction. In this paper we investigate this question using the modal (hidden variable) interpretation of quantum mechanics. We find that the noise function z(t) appearing in the non-Markovian SSE can be interpreted as a hidden variable for the environment. That is, some chosen property (beable) of the environment has a definite value z(t) even in the absence of measurement on the environment. The non-Markovian SSE gives the evolution of the state of the system 'conditioned' on this environment hidden variable. We present the theory for diffusive non-Markovian SSEs that have as their Markovian limit SSEs corresponding to homodyne and heterodyne detection, as well as one which has no Markovian limit

  12. Hidden Markov models and other machine learning approaches in computational molecular biology

    Energy Technology Data Exchange (ETDEWEB)

    Baldi, P. [California Inst. of Tech., Pasadena, CA (United States)

    1995-12-31

    This tutorial was one of eight tutorials selected to be presented at the Third International Conference on Intelligent Systems for Molecular Biology which was held in the United Kingdom from July 16 to 19, 1995. Computational tools are increasingly needed to process the massive amounts of data, to organize and classify sequences, to detect weak similarities, to separate coding from non-coding regions, and reconstruct the underlying evolutionary history. The fundamental problem in machine learning is the same as in scientific reasoning in general, as well as statistical modeling: to come up with a good model for the data. In this tutorial four classes of models are reviewed. They are: Hidden Markov models; artificial Neural Networks; Belief Networks; and Stochastic Grammars. When dealing with DNA and protein primary sequences, Hidden Markov models are one of the most flexible and powerful alignments and data base searches. In this tutorial, attention is focused on the theory of Hidden Markov Models, and how to apply them to problems in molecular biology.

  13. Diagnosis and Management of Hidden Caries in a Primary Molar Tooth.

    Science.gov (United States)

    Gera, Arwa; Zilberman, Uri

    2017-01-01

    Hidden caries is a dentinal lesion beneath the dentinoenamel junction, visible on radiographs. A single report described this lesion in primary dentition. This case report describes a case of hidden caries in a mandibular second primary molar, misdiagnosed as malignant swelling. A 3-year-old white girl was referred to the Department of Pediatric Dentistry with a chief complaint of pain and extraoral swelling on the right side of the mandible for the last 3 months. She was earlier referred to the surgical department for biopsy of the lesion. Radiographic and computed tomography scan examination showed a periapical lesion with buccal plate resorption and radiolucency beneath the enamel on the mesial part of tooth 85. The tooth was extracted, and follow-up of 2 years showed normal development of tooth 45. The main problem is early detection and treatment, since the outer surface of enamel may appear intact on tactile examination. Gera A, Zilberman U. Diagnosis and Management of Hidden Caries in a Primary Molar Tooth. Int J Clin Pediatr Dent 2017;10(1):99-102.

  14. Diurnal modulation signal from dissipative hidden sector dark matter

    Directory of Open Access Journals (Sweden)

    R. Foot

    2015-09-01

    Full Text Available We consider a simple generic dissipative dark matter model: a hidden sector featuring two dark matter particles charged under an unbroken U(1′ interaction. Previous work has shown that such a model has the potential to explain dark matter phenomena on both large and small scales. In this framework, the dark matter halo in spiral galaxies features nontrivial dynamics, with the halo energy loss due to dissipative interactions balanced by a heat source. Ordinary supernovae can potentially supply this heat provided kinetic mixing interaction exists with strength ϵ∼10−9. This type of kinetically mixed dark matter can be probed in direct detection experiments. Importantly, this self-interacting dark matter can be captured within the Earth and shield a dark matter detector from the halo wind, giving rise to a diurnal modulation effect. We estimate the size of this effect for detectors located in the Southern hemisphere, and find that the modulation is large (≳10% for a wide range of parameters.

  15. A Framework for Bioacoustic Vocalization Analysis Using Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Ebenezer Out-Nyarko

    2009-11-01

    Full Text Available Using Hidden Markov Models (HMMs as a recognition framework for automatic classification of animal vocalizations has a number of benefits, including the ability to handle duration variability through nonlinear time alignment, the ability to incorporate complex language or recognition constraints, and easy extendibility to continuous recognition and detection domains. In this work, we apply HMMs to several different species and bioacoustic tasks using generalized spectral features that can be easily adjusted across species and HMM network topologies suited to each task. This experimental work includes a simple call type classification task using one HMM per vocalization for repertoire analysis of Asian elephants, a language-constrained song recognition task using syllable models as base units for ortolan bunting vocalizations, and a stress stimulus differentiation task in poultry vocalizations using a non-sequential model via a one-state HMM with Gaussian mixtures. Results show strong performance across all tasks and illustrate the flexibility of the HMM framework for a variety of species, vocalization types, and analysis tasks.

  16. Alleviating hidden hunger. Approaches that work

    International Nuclear Information System (INIS)

    Kennedy, E.; Mannar, V.; Iyengar, V.

    2003-01-01

    The world has come a long way in understanding the nature, magnitude and range of solutions to micronutrient malnutrition - often called 'hidden hunger'. The most sustainable solutions - that is those that are likely to be maintained in the long term - almost surely will include food-based approaches including diet diversity, food fortification and biofortification. Food fortification and biofortification could be some of the most cost-effective of all public health interventions and thus within the economic reach of even the world's poorest. In order to implement them in a sustainable manner, a combination of technical, operational, economic, behavioural and political factors need to be addressed. In some ways the technological issues are the easiest. Because of attention to research, we now have a variety of ways for both single and multiple micronutrients to reach the target population. We also know what is needed in order to ensure delivery systems. The key factor for continued success in reducing micronutrient malnutrition through fortification is a political commitment at the national and international level and creating effective public-private partnerships at the national level. The payoff for eliminating hidden hunger through nutrient fortification is enormous and few other public health interventions offer such a promising health, nutrition and economic success story. Nuclear and isotopic techniques are valuable tools in helping to meet the multifaceted challenges posed by nutritional disorders affecting the entire human life span (embryonic to elderly). Among the numerous applications available, isotopic techniques are uniquely well suited for targeting and tracking progress in food and nutrition development programmes (See box: How Nutrients are Tracked). These include: use of the stable isotopes of iron (Fe) and zinc (Zn) as a kind of gold standard in studies of their bioavailability from foods; trace element bioavailability and pool sizes for

  17. High Energy Colliders and Hidden Sectors

    Science.gov (United States)

    Dror, Asaf Jeff

    This thesis explores two dominant frontiers of theoretical physics, high energy colliders and hidden sectors. The Large Hadron Collider (LHC) is just starting to reach its maximum operational capabilities. However, already with the current data, large classes of models are being put under significant pressure. It is crucial to understand whether the (thus far) null results are a consequence of a lack of solution to the hierarchy problem around the weak scale or requires expanding the search strategy employed at the LHC. It is the duty of the current generation of physicists to design new searches to ensure that no stone is left unturned. To this end, we study the sensitivity of the LHC to the couplings in the Standard Model top sector. We find it can significantly improve the measurements on ZtRtR coupling by a novel search strategy, making use of an implied unitarity violation in such models. Analogously, we show that other couplings in the top sector can also be measured with the same technique. Furthermore, we critically analyze a set of anomalies in the LHC data and how they may appear from consistent UV completions. We also propose a technique to measure lifetimes of new colored particles with non-trivial spin. While the high energy frontier will continue to take data, it is likely the only collider of its kind for the next couple decades. On the other hand, low-energy experiments have a promising future with many new proposed experiments to probe the existence of particles well below the weak scale but with small couplings to the Standard Model. In this work we survey the different possibilities, focusingon the constraints as well as possible new hidden sector dynamics. In particular, we show that vector portals which couple to an anomalous current, e.g., baryon number, are significantly constrained from flavor changing meson decays and rare Z decays. Furthermore, we present a new mechanism for dark matter freezeout which depletes the dark sector through an

  18. A "hidden" co-crystal of caffeine and adipic acid.

    Science.gov (United States)

    Bucar, Dejan-Kresimir; Henry, Rodger F; Lou, Xiaochun; Borchardt, Thomas B; Zhang, Geoff G Z

    2007-02-07

    Co-crystal formation between caffeine and adipic acid has been explored over the years without success; utilizing the newly developed co-crystal screening method, we have finally discovered this "hidden" caffeine and adipic acid co-crystal.

  19. New limits on hidden photons from past electron beam dumps

    International Nuclear Information System (INIS)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-01

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  20. Hidden Neural Networks: A Framework for HMM/NN Hybrids

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric; Krogh, Anders Stærmose

    1997-01-01

    This paper presents a general framework for hybrids of hidden Markov models (HMM) and neural networks (NN). In the new framework called hidden neural networks (HNN) the usual HMM probability parameters are replaced by neural network outputs. To ensure a probabilistic interpretation the HNN is nor...... HMMs on TIMIT continuous speech recognition benchmarks. On the task of recognizing five broad phoneme classes an accuracy of 84% is obtained compared to 76% for a standard HMM. Additionally, we report a preliminary result of 69% accuracy on the TIMIT 39 phoneme task......This paper presents a general framework for hybrids of hidden Markov models (HMM) and neural networks (NN). In the new framework called hidden neural networks (HNN) the usual HMM probability parameters are replaced by neural network outputs. To ensure a probabilistic interpretation the HNN...

  1. New limits on hidden photons from past electron beam dumps

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-15

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  2. 2.5D Quantitative Millimeter Wave Imaging of a Hidden Object on a Simplified Human Body Model Using Value Picking Regularization

    Science.gov (United States)

    van den Bulcke, Sara; Franchois, Ann; de Zutter, Daniel

    2010-12-01

    In this contribution, the authors provide a proof of principle for quantitative imaging of concealed objects on the human body using millimeter waves. A two-and-a-half-dimensional (2.5D) quantitative millimeter wave imaging algorithm is applied to reconstruct a hidden dielectric object on a clothed simplified human body model. At millimeter wave frequencies, the incident field is typically a fully three-dimensional (3D) Gaussian beam, illuminating only a limited spot on the body. Due to the large dimensions of the human body in terms of wavelengths, a 3D discretization is hardly feasible. Therefore, it is assumed that the electromagnetic properties of the body do not significantly change within the illuminated spot, along the longitudinal direction of a person. Hence, only the cross-section of a human body model is discretized. This 2.5D assumption however is still not sufficient to reduce the forward problem to a feasible size. Therefore, a priori knowledge on the illumination and on the scattering properties of the clothed human body is used to deduce a simplified model to describe the cross-section of the clothed human abdomen. The complex permittivity profile of a small dielectric object, hidden underneath clothing and representing some type of explosive, is reconstructed. The complex permittivity profiles of all other scatterers are assumed to be known. The presented quantitative inverse scattering algorithm is based on a Newton-type optimization, combined with an approximate line search and regularized by applying Stepwise Relaxed Value Picking regularization. The input data of the quantitative inverse scattering problem are synthetic scattering data since the authors are not aware of any amplitude and phase measurement data for concealed weapon detection yet made available to the inversion community at these high frequencies.

  3. A Novel Method for Decoding Any High-Order Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Fei Ye

    2014-01-01

    Full Text Available This paper proposes a novel method for decoding any high-order hidden Markov model. First, the high-order hidden Markov model is transformed into an equivalent first-order hidden Markov model by Hadar’s transformation. Next, the optimal state sequence of the equivalent first-order hidden Markov model is recognized by the existing Viterbi algorithm of the first-order hidden Markov model. Finally, the optimal state sequence of the high-order hidden Markov model is inferred from the optimal state sequence of the equivalent first-order hidden Markov model. This method provides a unified algorithm framework for decoding hidden Markov models including the first-order hidden Markov model and any high-order hidden Markov model.

  4. Constraints and hidden symmetry in two-dimensional gravity

    Energy Technology Data Exchange (ETDEWEB)

    Barcelos-Neto, J. (Instituto de Fisica, Universidade Federal do Rio de Janeiro, Rio de Janeiro, Rio de Janeiro 21945-970 (Brazil))

    1994-01-15

    We study the hidden symmetry of Polyakov two-dimensional gravity by means of first-class constraints. These are obtained from the combination of Fourier mode expansions of the usual (second-class) constraints of the theory. We show that, more than the usual SL(2,[ital R]), there is a hidden Virasoro symmetry in the theory. The results of the above analysis are also confirmed from the point of view of a geometrical symplectic treatment.

  5. Hidden Terminal-Aware Contention Resolution with an Optimal Distribution

    OpenAIRE

    Ghadimi, Euhanna; Soldati, Pablo; Österlind, Fredrik; Zhang, Haibo; Johansson, Mikael

    2011-01-01

    Achieving low-power operation in wireless sensor networks with high data load or bursty traffic is challenging. The hidden terminal problem is aggravated with increased amounts of data in which traditional backoff-based contention resolution mechanisms fail or induce high latency and energy costs. We analyze and optimize Strawman, a receiver-initiated contention resolution mechanism that copes with hidden terminals. We propose new techniques to boost the performance of Strawman while keeping ...

  6. Rare Z boson decays to a hidden sector

    Science.gov (United States)

    Blinov, Nikita; Izaguirre, Eder; Shuve, Brian

    2018-01-01

    We demonstrate that rare decays of the Standard Model Z boson can be used to discover and characterize the nature of new hidden-sector particles. We propose new searches for these particles in soft, high-multiplicity leptonic final states at the Large Hadron Collider. The proposed searches are sensitive to low-mass particles produced in Z decays, and we argue that these striking signatures can shed light on the hidden-sector couplings and mechanism for mass generation.

  7. Aluminium Diphosphamethanides: Hidden Frustrated Lewis Pairs.

    Science.gov (United States)

    Styra, Steffen; Radius, Michael; Moos, Eric; Bihlmeier, Angela; Breher, Frank

    2016-07-04

    The synthesis and characterisation of two aluminium diphosphamethanide complexes, [Al(tBu)2 {κ(2) P,P'-Mes*PCHPMes*}] (3) and [Al(C6 F5 )2 {κ(2) P,P'-Mes*PCHPMes*}] (4), and the silylated analogue, Mes*PCHP(SiMe3 )Mes* (5), are reported. The aluminium complexes feature four-membered PCPAl core structures consisting of diphosphaallyl ligands. The silylated phosphine 5 was found to be a valuable precursor for the synthesis of 4 as it cleanly reacts with the diaryl aluminium chloride [(C6 F5 )2 AlCl]2 . The aluminium complex 3 reacts with molecular dihydrogen at room temperature under formation of the acyclic σ(2) λ(3) ,σ(3) λ(3) -diphosphine Mes*PCHP(H)Mes* and the corresponding dialkyl aluminium hydride [tBu2 AlH]3 . Thus, 3 belongs to the family of so-called hidden frustrated Lewis pairs. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  9. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  10. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  11. Hidden Markov Model for Stock Trading

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2018-03-01

    Full Text Available Hidden Markov model (HMM is a statistical signal prediction model, which has been widely used to predict economic regimes and stock prices. In this paper, we introduce the application of HMM in trading stocks (with S&P 500 index being an example based on the stock price predictions. The procedure starts by using four criteria, including the Akaike information, the Bayesian information, the Hannan Quinn information, and the Bozdogan Consistent Akaike Information, in order to determine an optimal number of states for the HMM. The selected four-state HMM is then used to predict monthly closing prices of the S&P 500 index. For this work, the out-of-sample R OS 2 , and some other error estimators are used to test the HMM predictions against the historical average model. Finally, both the HMM and the historical average model are used to trade the S&P 500. The obtained results clearly prove that the HMM outperforms this traditional method in predicting and trading stocks.

  12. Hidden Heroes: America's Military Caregivers - Executive Summary.

    Science.gov (United States)

    Ramchand, Rajeev; Tanielian, Terri; Fisher, Michael P; Vaughan, Christine Anne; Trail, Thomas E; Epley, Caroline; Voorhies, Phoenix; Robbins, Michael; Robinson, Eric; Ghosh-Dastidar, Bonnie

    2014-01-01

    While much has been written about the role of caregiving for the elderly and chronically ill and for children with special needs, little is known about "military caregivers"-the population of those who care for wounded, ill, and injured military personnel and veterans. These caregivers play an essential role in caring for injured or wounded service members and veterans. This enables those for whom they are caring to live better quality lives, and can result in faster and improved rehabilitation and recovery. Yet playing this role can impose a substantial physical, emotional, and financial toll on caregivers. This article distills a longer report, Hidden Heroes: America's Military Caregivers , which describes the results of a study designed to describe the magnitude of military caregiving in the United States today, as well as to identify gaps in the array of programs, policies, and initiatives designed to support military caregivers. Improving military caregivers' well-being and ensuring their continued ability to provide care will require multifaceted approaches to reducing the current burdens caregiving may impose, and bolstering their ability to serve as caregivers more effectively. Given the systematic differences among military caregiver groups, it is also important that tailored approaches meet the unique needs and characteristics of post-9/11 caregivers.

  13. Dietary phytate, zinc and hidden zinc deficiency.

    Science.gov (United States)

    Sandstead, Harold H; Freeland-Graves, Jeanne H

    2014-10-01

    Epidemiological data suggest at least one in five humans are at risk of zinc deficiency. This is in large part because the phytate in cereals and legumes has not been removed during food preparation. Phytate, a potent indigestible ligand for zinc prevents it's absorption. Without knowledge of the frequency of consumption of foods rich in phytate, and foods rich in bioavailable zinc, the recognition of zinc deficiency early in the illness may be difficult. Plasma zinc is insensitive to early zinc deficiency. Serum ferritin concentration≤20μg/L is a potential indirect biomarker. Early effects of zinc deficiency are chemical, functional and may be "hidden". The clinical problem is illustrated by 2 studies that involved US Mexican-American children, and US premenopausal women. The children were consuming home diets that included traditional foods high in phytate. The premenopausal women were not eating red meat on a regular basis, and their consumption of phytate was mainly from bran breakfast cereals. In both studies the presence of zinc deficiency was proven by functional responses to controlled zinc treatment. In the children lean-mass, reasoning, and immunity were significantly affected. In the women memory, reasoning, and eye-hand coordination were significantly affected. A screening self-administered food frequency questionnaire for office might help caregiver's identify patients at risk of zinc deficiency. Copyright © 2014 Elsevier GmbH. All rights reserved.

  14. The clinical global impression scale for borderline personality disorder patients (CGI-BPD): a scale sensible to detect changes.

    Science.gov (United States)

    Perez, V; Barrachina, J; Soler, J; Pascual, J C; Campins, M J; Puigdemont, D; Alvarez, E

    2007-01-01

    The CGI-BPD scale is an adaptation of the Clinical Global Impression (CGI) scale designed to assess severity and post-intervention changes in patients with Borderline Personality Disorder (BPD). It contains 10 items that score the nine relevant psychopathological domains of BPD, plus an additional global score. The CGI-BPD has two formats, the CGI-BPD-S, to evaluate the present severity, and the CGIBPD- I to evaluate improvement. To establish the psychometric properties of the CGI-BPD, the test was administered to 78 BPD patients, 11 men and 67 women, within the framework of a 4-month therapeutic intervention. The modified scale showed good validity and reliability (alpha 0.85 and 0.89; CCI: 0.86 and 0.78), adequate sensitivity to change, and a two-factor structure accounting for 67.4 % of total variance. While remaining simple to administer, the CGI-BPD may correct the excessive generalisation contained in its original version and is a useful tool to evaluate severity and change in BPD patients.

  15. Investigation of the Behavioral Characteristics of Dogs Purpose-Bred and Prepared to Perform Vapor Wake® Detection of Person-Borne Explosives

    Directory of Open Access Journals (Sweden)

    Lucia Lazarowski

    2018-03-01

    Full Text Available Specialized detector dogs are increasingly being utilized for the detection of modern threats. The Vapor Wake® (VW dog was developed to create a dog phenotype ideally suited for detecting hand-carried and body-worn explosives. VW dogs (VWDs are trained to sample and alert to target odors in the aerodynamic wakes of moving persons, which entrains vapor and small particles from the person. The behavioral characteristics necessary for dogs to be successfully trained and employed for the application of VW are a distinct subset of the desired general characteristics of dogs used for detection tasks due to the dynamic nature of moving targets. The purpose of this study was to examine the behavioral characteristics of candidate detector dogs to determine the particular qualities that set apart VW-capable dogs from others. We assessed 146 candidate detector dogs from a VW breeding and training program. Dogs received identical puppy development and foundational odor training and underwent performance evaluations at 3, 6, 10, and 12 months old, after which they were sold for service. Dogs were categorized based on their final outcome of the training program, independently determined by private vendors, corresponding to three groups: dogs successfully sold for VW, dogs sold for standard explosives detection, and dogs that failed to be placed in any type of detector dog service (Washouts. Comparisons of behavioral evaluations between the groups were made across domains pertaining to search-related behaviors (Performance, reactions to novel stimuli (Environmental, and overall ease of learning new tasks (Trainability. Comparisons were also made at each evaluation to determine any early emergence of differences. VWDs scored significantly higher on Performance characteristics compared to standard explosives detection dogs (EDDs and Washouts. However, Environmental characteristics did not differentiate VWDs from EDDs, though scores on these measures were

  16. A single hidden layer feedforward network with only one neuron in the hidden layer can approximate any univariate function

    OpenAIRE

    Guliyev, Namig; Ismailov, Vugar

    2016-01-01

    The possibility of approximating a continuous function on a compact subset of the real line by a feedforward single hidden layer neural network with a sigmoidal activation function has been studied in many papers. Such networks can approximate an arbitrary continuous function provided that an unlimited number of neurons in a hidden layer is permitted. In this paper, we consider constructive approximation on any finite interval of $\\mathbb{R}$ by neural networks with only one neuron in the hid...

  17. [Personal motif in art].

    Science.gov (United States)

    Gerevich, József

    2015-01-01

    One of the basic questions of the art psychology is whether a personal motif is to be found behind works of art and if so, how openly or indirectly it appears in the work itself. Analysis of examples and documents from the fine arts and literature allow us to conclude that the personal motif that can be identified by the viewer through symbols, at times easily at others with more difficulty, gives an emotional plus to the artistic product. The personal motif may be found in traumatic experiences, in communication to the model or with other emotionally important persons (mourning, disappointment, revenge, hatred, rivalry, revolt etc.), in self-searching, or self-analysis. The emotions are expressed in artistic activity either directly or indirectly. The intention nourished by the artist's identity (Kunstwollen) may stand in the way of spontaneous self-expression, channelling it into hidden paths. Under the influence of certain circumstances, the artist may arouse in the viewer, consciously or unconsciously, an illusionary, misleading image of himself. An examination of the personal motif is one of the important research areas of art therapy.

  18. Skin self-examination education for early detection of melanoma: a randomized controlled trial of Internet, workbook, and in-person interventions.

    Science.gov (United States)

    Robinson, June K; Gaber, Rikki; Hultgren, Brittney; Eilers, Steven; Blatt, Hanz; Stapleton, Jerod; Mallett, Kimberly; Turrisi, Rob; Duffecy, Jenna; Begale, Mark; Martini, Mary; Bilimoria, Karl; Wayne, Jeffrey

    2014-01-13

    Early detection of melanoma improves survival. Since many melanoma patients and their spouses seek the care of a physician after discovering their melanoma, an ongoing study will determine the efficacy of teaching at-risk melanoma patients and their skin check partner how to conduct skin self-examinations (SSEs). Internet-based health behavior interventions have proven efficacious in creating behavior change in patients to better prevent, detect, or cope with their health issues. The efficacy of electronic interactive SSE educational intervention provided on a tablet device has not previously been determined. The electronic interactive educational intervention was created to develop a scalable, effective intervention to enhance performance and accuracy of SSE among those at-risk to develop melanoma. The intervention in the office was conducted using one of the following three methods: (1) in-person through a facilitator, (2) with a paper workbook, or (3) with a tablet device used in the clinical office. Differences related to method of delivery were elucidated by having the melanoma patient and their skin check partner provide a self-report of their confidence in performing SSE and take a knowledge-based test immediately after receiving the intervention. The three interventions used 9 of the 26 behavioral change techniques defined by Abraham and Michie to promote planning of monthly SSE, encourage performing SSE, and reinforce self-efficacy by praising correct responses to knowledge-based decision making and offering helpful suggestions to improve performance. In creating the electronic interactive SSE educational intervention, the educational content was taken directly from both the scripted in-person presentation delivered with Microsoft PowerPoint by a trained facilitator and the paper workbook training arms of the study. Enrollment totaled 500 pairs (melanoma patient and their SSE partner) with randomization of 165 pairs to the in-person, 165 pairs to the

  19. Unsupervised Learning of Structural Representation of Percussive Audio Using a Hierarchical Dirichlet Process Hidden Markov Model

    DEFF Research Database (Denmark)

    Antich, Jose Luis Diez; Paterna, Mattia; Marxer, Richard

    2016-01-01

    single-linkage clustering, metrical regularity calculation and beat detection. 2) The approx. equal length blocks are clustered into k clusters and the resulting cluster sequence is modelled by transition probabilities between clusters. The Hierarchical Dirichlet Process Hidden Markov Model is employed......A method is proposed that extracts a structural representation of percussive audio in an unsupervised manner. It consists of two parts: 1) The input signal is segmented into blocks of approximately even duration, aligned to a metrical grid, using onset and timbre feature extraction, agglomerative...

  20. Responsiveness and minimal detectable change of the dynamic gait index and functional gait index in persons with balance and vestibular disorders.

    Science.gov (United States)

    Marchetti, Gregory F; Lin, Chia-Cheng; Alghadir, Ahmad; Whitney, Susan L

    2014-04-01

    We performed a retrospective chart review to determine the responsiveness and minimal detectable change (MDC95) in persons with balance and vestibular disorders with the dynamic gait index (DGI) and the functional gait assessment (FGA). The study cohort consisted of 326 patients with a mean age of 60 ± 18.3 years (range, 18-95 years; 69% female). The DGI, FGA, Activities-Specific Balance Confidence (ABC) scale, and the dizziness handicap inventory (DHI) were collected at intake and discharge. The standardized response mean as an index of responsiveness was greater for the FGA (1.25) than for the DGI (0.72). Both measures demonstrated good internal consistency with baseline measures. The amount of pre- to posttreatment change that exceeds chance variation was estimated at 4 points for the DGI and 6 points for the FGA. In both the DGI and the FGA, a magnitude of change equivalent to the respective MDC95 was significantly associated with improvements in self-reported disability as measured by the ABC and DHI. The DGI and the FGA are responsive to change over time in persons with balance and vestibular disorders. More complex gait measures need to be developed, as close to 50% of the subjects received optimal scores at discharge from a physical therapy exercise program, indicating that these measures have a ceiling effect.

  1. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  2. Hydrogeophysical investigations at Hidden Dam, Raymond, California

    Science.gov (United States)

    Minsley, Burke J.; Burton, Bethany L.; Ikard, Scott; Powers, Michael H.

    2011-01-01

    Self-potential and direct current resistivity surveys are carried out at the Hidden Dam site in Raymond, California to assess present-day seepage patterns and better understand the hydrogeologic mechanisms that likely influence seepage. Numerical modeling is utilized in conjunction with the geophysical measurements to predict variably-saturated flow through typical two-dimensional dam cross-sections as a function of reservoir elevation. Several different flow scenarios are investigated based on the known hydrogeology, as well as information about typical subsurface structures gained from the resistivity survey. The flow models are also used to simulate the bulk electrical resistivity in the subsurface under varying saturation conditions, as well as the self-potential response using petrophysical relationships and electrokinetic coupling equations.The self-potential survey consists of 512 measurements on the downstream area of the dam, and corroborates known seepage areas on the northwest side of the dam. Two direct-current resistivity profiles, each approximately 2,500 ft (762 m) long, indicate a broad sediment channel under the northwest side of the dam, which may be a significant seepage pathway through the foundation. A focusing of seepage in low-topography areas downstream of the dam is confirmed from the numerical flow simulations, which is also consistent with past observations. Little evidence of seepage is identified from the self-potential data on the southeast side of the dam, also consistent with historical records, though one possible area of focused seepage is identified near the outlet works. Integration of the geophysical surveys, numerical modeling, and observation well data provides a framework for better understanding seepage at the site through a combined hydrogeophysical approach.

  3. Foundational Forces & Hidden Variables in Technology Commercialization

    Science.gov (United States)

    Barnett, Brandon

    2011-03-01

    The science of physics seems vastly different from the process of technology commercialization. Physics strives to understand our world through the experimental deduction of immutable laws and dependent variables and the resulting macro-scale phenomenon. In comparison, the~goal of business is to make a profit by addressing the needs, preferences, and whims of individuals in a market. It may seem that this environment is too dynamic to identify all the hidden variables and deduct the foundational forces that impact a business's ability to commercialize innovative technologies. One example of a business ``force'' is found in the semiconductor industry. In 1965, Intel co-founder Gordon Moore predicted that the number of transistors incorporated in a chip will approximately double every 24 months. Known as Moore's Law, this prediction has become the guiding principle for the semiconductor industry for the last 40 years. Of course, Moore's Law is not really a law of nature; rather it is the result of efforts by Intel and the entire semiconductor industry. A closer examination suggests that there are foundational principles of business that underlie the macro-scale phenomenon of Moore's Law. Principles of profitability, incentive, and strategic alignment have resulted in a coordinated influx of resources that has driven technologies to market, increasing the profitability of the semiconductor industry and optimizing the fitness of its participants. New innovations in technology are subject to these same principles. So, in addition to traditional market forces, these often unrecognized forces and variables create challenges for new technology commercialization. In this talk, I will draw from ethnographic research, complex adaptive theory, and industry data to suggest a framework with which to think about new technology commercialization. Intel's bio-silicon initiative provides a case study.

  4. Whole-cell biosensor for label-free detection of GPCR-mediated drug responses in personal cell lines.

    Science.gov (United States)

    Hillger, Julia M; Schoop, Jeffison; Boomsma, Dorret I; Slagboom, P Eline; IJzerman, Adriaan P; Heitman, Laura H

    2015-12-15

    Deciphering how genetic variation in drug targets such as G protein-coupled receptors (GPCRs) affects drug response is essential for precision medicine. GPCR signaling is traditionally investigated in artificial cell lines which do not provide sufficient physiological context. Patient-derived cell lines such as lymphoblastoid cell lines (LCLs) could represent the ideal cellular model system. Here we describe a novel label-free, whole-cell biosensor method for characterizing GPCR-mediated drug responses in LCLs. Generally, such biosensor technology is deemed only compatible with adherent cell lines. We optimized and applied the methodology to study cellular adhesion properties as well as GPCR drug responses in LCLs, which are suspension cells. Coating the detector surface with the extracellular matrix protein fibronectin resulted in cell adherence and allowed detection of cellular responses. A prototypical GPCR present on these cells, i.e. the cannabinoid receptor 2 (CB2), was selected for pharmacological characterization. Receptor activation with the agonist JWH133, blockade by antagonist AM630 as well as downstream signaling inhibition by PTX could be monitored sensitively and receptor-specifically. Potencies and effects were comparable between LCLs of two genetically unrelated individuals, providing the proof-of-principle that this biosensor technology can be applied to LCLs, despite their suspension cell nature, in order to serve as an in vitro model system for the evaluation of individual genetic influences on GPCR-mediated drug responses. Copyright © 2015 Elsevier B.V. All rights reserved.

  5. Microwave system for secret remote inspection of person (MS-SRIP)

    Science.gov (United States)

    Kuznetsov, Andrey; Averianov, Valery; Gorshkov, Igor; Evsenin, Alexey

    2006-05-01

    Laboratory prototype of the device for secret remote detection of objects on human body has been created. The device is intended for detection of non-metallic and metallic objects hidden under clothes: weapons, explosives etc. The work of the device is based on active probing of the examined area with continuous electromagnetic radiation with stepped frequency change in the range up to ~30 GHz, with subsequent detection and analysis of the scattered electromagnetic waves. Such analysis allows one to obtain three-dimensional image of the body and of the objects hidden under clothes, and to categorize them by the degree of danger based on the dielectric constant of the hidden objects.

  6. A Multiple Hidden Layers Extreme Learning Machine Method and Its Application

    Directory of Open Access Journals (Sweden)

    Dong Xiao

    2017-01-01

    Full Text Available Extreme learning machine (ELM is a rapid learning algorithm of the single-hidden-layer feedforward neural network, which randomly initializes the weights between the input layer and the hidden layer and the bias of hidden layer neurons and finally uses the least-squares method to calculate the weights between the hidden layer and the output layer. This paper proposes a multiple hidden layers ELM (MELM for short which inherits the characteristics of parameters of the first hidden layer. The parameters of the remaining hidden layers are obtained by introducing a method (make the actual output zero error approach the expected hidden layer output. Based on the MELM algorithm, many experiments on regression and classification show that the MELM can achieve the satisfactory results based on average precision and good generalization performance compared to the two-hidden-layer ELM (TELM, the ELM, and some other multilayer ELM.

  7. A Polarimetric Search for Hidden Quasars in Three Radio-selected Ultraluminous Infrared Galaxies

    International Nuclear Information System (INIS)

    Tran, H.D.; Brotherton, M.S.; Stanford, S.A.; Breugel, W. van; Dey, A.; Stern, D.; Antonucci, R.

    1999-01-01

    We have carried out a spectropolarimetric search for hidden broad-line quasars in three ultraluminous infrared galaxies (ULIRGs) discovered in the positional correlations between sources detected in deep radio surveys and the IRAS Faint Source Catalog. Only the high-ionization Seyfert 2 galaxy TF J1736+1122 is highly polarized, displaying a broad-line spectrum visible in polarized light. The other two objects, TF J1020+6436 and FF J1614+3234, display spectra dominated by a population of young (A type) stars similar to those of open-quotes E+Aclose quotes galaxies. They are unpolarized, showing no sign of hidden broad-line regions. The presence of young starburst components in all three galaxies indicates that the ULIRG phenomenon encompasses both active galactic nuclei (AGNs) and starburst activity, but the most energetic ULIRGs do not necessarily harbor open-quotes buried quasars.close quotes We find that a luminous infrared galaxy is most likely to host an obscured quasar if it exhibits a high-ionization ([O iii] λ5007/Hβ approx-gt 5) spectrum typical of a 'classic' Seyfert 2 galaxy with little or no Balmer absorption lines, is 'ultraluminous' (L IR approx-gt 10 12 L circle-dot ), and has a 'warm' IR color (f 25 /f 60 approx-gt 0.25). The detection of hidden quasars in this group but not in the low-ionization, starburst-dominated ULIRGs (classified as LINERs or H ii galaxies) may indicate an evolutionary connection, with the latter being found in younger systems. copyright copyright 1999. The American Astronomical Society

  8. Hidden realities inside PBL design processes

    DEFF Research Database (Denmark)

    Pihl, Ole Verner

    2015-01-01

    depends on the interplay between the personalities of the individuals and the group. How does this interplay affect the creative process? This paper seeks answers to the initial question “Is consensus design an impossible clash of interest between the individual and the collective, and is architecture its...

  9. Uncovering the hidden ground state of green fluorescent protein

    Science.gov (United States)

    Kennis, John T. M.; Larsen, Delmar S.; van Stokkum, Ivo H. M.; Vengris, Mikas; van Thor, Jasper J.; van Grondelle, Rienk

    2004-01-01

    The fluorescence properties of GFP are strongly influenced by the protonation states of its chromophore and nearby amino acid side chains. In the ground state, the GFP chromophore is neutral and absorbs in the near UV. Upon excitation, the chromophore is deprotonated, and the resulting anionic chromophore emits its green fluorescence. So far, only excited-state intermediates have been observed in the GFP photocycle. We have used ultrafast multipulse control spectroscopy to prepare and directly observe GFP's hidden anionic ground-state intermediates as an integral part of the photocycle. Combined with dispersed multichannel detection and advanced global analysis techniques, the existence of two distinct anionic ground-state intermediates, I1 and I2, has been unveiled. I1 and I2 absorb at 500 and 497 nm, respectively, and interconvert on a picosecond timescale. The I2 intermediate has a lifetime of 400 ps, corresponding to a proton back-transfer process that regenerates the neutral ground state. Hydrogen/deuterium exchange of the protein leads to a significant increase of the I1 and I2 lifetimes, indicating that proton motion underlies their dynamics. We thus have assessed the complete chain of reaction intermediates and associated timescales that constitute the photocycle of GFP. Many elementary processes in biology rely on proton transfers that are limited by slow diffusional events, which seriously precludes their characterization. We have resolved the true reaction rate of a proton transfer in the molecular ground state of GFP, and our results may thus aid in the development of a generic understanding of proton transfer in biology. PMID:15608070

  10. Accelerating Information Retrieval from Profile Hidden Markov Model Databases.

    Science.gov (United States)

    Tamimi, Ahmad; Ashhab, Yaqoub; Tamimi, Hashem

    2016-01-01

    Profile Hidden Markov Model (Profile-HMM) is an efficient statistical approach to represent protein families. Currently, several databases maintain valuable protein sequence information as profile-HMMs. There is an increasing interest to improve the efficiency of searching Profile-HMM databases to detect sequence-profile or profile-profile homology. However, most efforts to enhance searching efficiency have been focusing on improving the alignment algorithms. Although the performance of these algorithms is fairly acceptable, the growing size of these databases, as well as the increasing demand for using batch query searching approach, are strong motivations that call for further enhancement of information retrieval from profile-HMM databases. This work presents a heuristic method to accelerate the current profile-HMM homology searching approaches. The method works by cluster-based remodeling of the database to reduce the search space, rather than focusing on the alignment algorithms. Using different clustering techniques, 4284 TIGRFAMs profiles were clustered based on their similarities. A representative for each cluster was assigned. To enhance sensitivity, we proposed an extended step that allows overlapping among clusters. A validation benchmark of 6000 randomly selected protein sequences was used to query the clustered profiles. To evaluate the efficiency of our approach, speed and recall values were measured and compared with the sequential search approach. Using hierarchical, k-means, and connected component clustering techniques followed by the extended overlapping step, we obtained an average reduction in time of 41%, and an average recall of 96%. Our results demonstrate that representation of profile-HMMs using a clustering-based approach can significantly accelerate data retrieval from profile-HMM databases.

  11. Accelerating Information Retrieval from Profile Hidden Markov Model Databases.

    Directory of Open Access Journals (Sweden)

    Ahmad Tamimi

    Full Text Available Profile Hidden Markov Model (Profile-HMM is an efficient statistical approach to represent protein families. Currently, several databases maintain valuable protein sequence information as profile-HMMs. There is an increasing interest to improve the efficiency of searching Profile-HMM databases to detect sequence-profile or profile-profile homology. However, most efforts to enhance searching efficiency have been focusing on improving the alignment algorithms. Although the performance of these algorithms is fairly acceptable, the growing size of these databases, as well as the increasing demand for using batch query searching approach, are strong motivations that call for further enhancement of information retrieval from profile-HMM databases. This work presents a heuristic method to accelerate the current profile-HMM homology searching approaches. The method works by cluster-based remodeling of the database to reduce the search space, rather than focusing on the alignment algorithms. Using different clustering techniques, 4284 TIGRFAMs profiles were clustered based on their similarities. A representative for each cluster was assigned. To enhance sensitivity, we proposed an extended step that allows overlapping among clusters. A validation benchmark of 6000 randomly selected protein sequences was used to query the clustered profiles. To evaluate the efficiency of our approach, speed and recall values were measured and compared with the sequential search approach. Using hierarchical, k-means, and connected component clustering techniques followed by the extended overlapping step, we obtained an average reduction in time of 41%, and an average recall of 96%. Our results demonstrate that representation of profile-HMMs using a clustering-based approach can significantly accelerate data retrieval from profile-HMM databases.

  12. Next generation sequencing reveals the hidden diversity of zooplankton assemblages.

    Directory of Open Access Journals (Sweden)

    Penelope K Lindeque

    Full Text Available BACKGROUND: Zooplankton play an important role in our oceans, in biogeochemical cycling and providing a food source for commercially important fish larvae. However, difficulties in correctly identifying zooplankton hinder our understanding of their roles in marine ecosystem functioning, and can prevent detection of long term changes in their community structure. The advent of massively parallel next generation sequencing technology allows DNA sequence data to be recovered directly from whole community samples. Here we assess the ability of such sequencing to quantify richness and diversity of a mixed zooplankton assemblage from a productive time series site in the Western English Channel. METHODOLOGY/PRINCIPLE FINDINGS: Plankton net hauls (200 µm were taken at the Western Channel Observatory station L4 in September 2010 and January 2011. These samples were analysed by microscopy and metagenetic analysis of the 18S nuclear small subunit ribosomal RNA gene using the 454 pyrosequencing platform. Following quality control a total of 419,041 sequences were obtained for all samples. The sequences clustered into 205 operational taxonomic units using a 97% similarity cut-off. Allocation of taxonomy by comparison with the National Centre for Biotechnology Information database identified 135 OTUs to species level, 11 to genus level and 1 to order, <2.5% of sequences were classified as unknowns. By comparison a skilled microscopic analyst was able to routinely enumerate only 58 taxonomic groups. CONCLUSIONS: Metagenetics reveals a previously hidden taxonomic richness, especially for Copepoda and hard-to-identify meroplankton such as Bivalvia, Gastropoda and Polychaeta. It also reveals rare species and parasites. We conclude that Next Generation Sequencing of 18S amplicons is a powerful tool for elucidating the true diversity and species richness of zooplankton communities. While this approach allows for broad diversity assessments of plankton it may

  13. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  14. Hidden Markov event sequence models: toward unsupervised functional MRI brain mapping.

    Science.gov (United States)

    Faisan, Sylvain; Thoraval, Laurent; Armspach, Jean-Paul; Foucher, Jack R; Metz-Lutz, Marie-Noëlle; Heitz, Fabrice

    2005-01-01

    Most methods used in functional MRI (fMRI) brain mapping require restrictive assumptions about the shape and timing of the fMRI signal in activated voxels. Consequently, fMRI data may be partially and misleadingly characterized, leading to suboptimal or invalid inference. To limit these assumptions and to capture the broad range of possible activation patterns, a novel statistical fMRI brain mapping method is proposed. It relies on hidden semi-Markov event sequence models (HSMESMs), a special class of hidden Markov models (HMMs) dedicated to the modeling and analysis of event-based random processes. Activation detection is formulated in terms of time coupling between (1) the observed sequence of hemodynamic response onset (HRO) events detected in the voxel's fMRI signal and (2) the "hidden" sequence of task-induced neural activation onset (NAO) events underlying the HROs. Both event sequences are modeled within a single HSMESM. The resulting brain activation model is trained to automatically detect neural activity embedded in the input fMRI data set under analysis. The data sets considered in this article are threefold: synthetic epoch-related, real epoch-related (auditory lexical processing task), and real event-related (oddball detection task) fMRI data sets. Synthetic data: Activation detection results demonstrate the superiority of the HSMESM mapping method with respect to a standard implementation of the statistical parametric mapping (SPM) approach. They are also very close, sometimes equivalent, to those obtained with an "ideal" implementation of SPM in which the activation patterns synthesized are reused for analysis. The HSMESM method appears clearly insensitive to timing variations of the hemodynamic response and exhibits low sensitivity to fluctuations of its shape (unsustained activation during task). Real epoch-related data: HSMESM activation detection results compete with those obtained with SPM, without requiring any prior definition of the expected

  15. Using hidden Markov models to deal with availability bias on line transect surveys.

    Science.gov (United States)

    Borchers, D L; Zucchini, W; Heide-Jørgensen, M P; Cañadas, A; Langrock, R

    2013-09-01

    We develop estimators for line transect surveys of animals that are stochastically unavailable for detection while within detection range. The detection process is formulated as a hidden Markov model with a binary state-dependent observation model that depends on both perpendicular and forward distances. This provides a parametric method of dealing with availability bias when estimates of availability process parameters are available even if series of availability events themselves are not. We apply the estimators to an aerial and a shipboard survey of whales, and investigate their properties by simulation. They are shown to be more general and more flexible than existing estimators based on parametric models of the availability process. We also find that methods using availability correction factors can be very biased when surveys are not close to being instantaneous, as can estimators that assume temporal independence in availability when there is temporal dependence. © 2013, The International Biometric Society.

  16. Multivariate longitudinal data analysis with mixed effects hidden Markov models.

    Science.gov (United States)

    Raffa, Jesse D; Dubin, Joel A

    2015-09-01

    Multiple longitudinal responses are often collected as a means to capture relevant features of the true outcome of interest, which is often hidden and not directly measurable. We outline an approach which models these multivariate longitudinal responses as generated from a hidden disease process. We propose a class of models which uses a hidden Markov model with separate but correlated random effects between multiple longitudinal responses. This approach was motivated by a smoking cessation clinical trial, where a bivariate longitudinal response involving both a continuous and a binomial response was collected for each participant to monitor smoking behavior. A Bayesian method using Markov chain Monte Carlo is used. Comparison of separate univariate response models to the bivariate response models was undertaken. Our methods are demonstrated on the smoking cessation clinical trial dataset, and properties of our approach are examined through extensive simulation studies. © 2015, The International Biometric Society.

  17. TeraHertz imaging of hidden paint layers on canvas.

    Science.gov (United States)

    Adam, Aurèle J L; Planken, Paul C M; Meloni, Sabrina; Dik, Joris

    2009-03-02

    We show terahertz reflection images of hidden paint layers in a painting on canvas and compare the results with X-ray Radiography and In-frared Reflectography. Our terahertz measurements show strong reflections from both the canvas/paint interface and from the raw umber/lead white interface, indicating sufficient refractive-index contrast. Our results show that X-rays cannot be used to image through the lead white pigment which effectively blocks the X-rays. Although Infrared Reflectography is capable of vaguely observing the hidden paint strokes from the canvas side, we show that only terahertz imaging is capable of providing information on the thickness of the hidden paint layers. Terahertz imaging is thus shown to be a powerful imaging method for art historians, conservators and conservation scientists.

  18. Gauge mediation scenario with hidden sector renormalization in MSSM

    International Nuclear Information System (INIS)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-01-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5 minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  19. Applications of hidden symmetries to black hole physics

    International Nuclear Information System (INIS)

    Frolov, Valeri

    2011-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  20. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  1. Performance based analysis of hidden beams in reinforced concrete structures

    Directory of Open Access Journals (Sweden)

    Helou Samir H.

    2014-01-01

    Full Text Available Local and perhaps regional vernacular reinforced concrete building construction leans heavily against designing slabs with imbedded hidden beams for flooring systems in most structures including major edifices. The practice is distinctive in both framed and in shear wall structures. Hidden beams are favoured structural elements due to their many inherent features that characterize them; they save on floor height clearance; they also save on formwork, labour and material cost. Moreover, hidden beams form an acceptable aesthetic appearance that does not hinder efficient interior space partitioning. Such beams have the added advantage of clearing the way for horizontal electromechanical ductwork. However, seismic considerations, in all likelihood, are seldom seriously addressed. The mentioned structural system of shallow beams is adopted in ribbed slabs, waffle slabs and at times with solid slabs. Ribbed slabs and waffle slabs are more prone to hidden beam inclusion due to the added effective height of the concrete section. Due to the presence of a relatively high reinforcement ratio at the joints the sections at such location tend to become less ductile with unreliable contribution to spandrel force resistance. In the following study the structural influence of hidden beams within slabs is investigated. With the primary focus on a performance based analysis of such elements within a structure. This is investigated with due attention to shear wall contribution to the overall behaviour of such structures. Numerical results point in the direction that the function of hidden beams is not as adequate as desired. Therefore it is strongly believed that they are generally superfluous and maybe eliminated altogether. Conversely, shallow beams seem to render the overall seismic capacity of the structure unreliable. Since such an argument is rarely manifested within the linear analysis domain; a pushover analysis exercise is thus mandatory for behaviour

  2. Engineering of Algorithms for Hidden Markov models and Tree Distances

    DEFF Research Database (Denmark)

    Sand, Andreas

    speed up all the classical algorithms for analyses and training of hidden Markov models. And I show how two particularly important algorithms, the forward algorithm and the Viterbi algorithm, can be accelerated through a reformulation of the algorithms and a somewhat more complicated parallelization....... Lastly, I show how hidden Markov models can be trained orders of magnitude faster on a given input by rethinking the forward algorithm such that it can automatically adapt itself to the input. Together, these optimization have enabled us to perform analysis of full genomes in a few minutes and thereby...

  3. Application of Hidden Markov Models in Biomolecular Simulations.

    Science.gov (United States)

    Shukla, Saurabh; Shamsi, Zahra; Moffett, Alexander S; Selvam, Balaji; Shukla, Diwakar

    2017-01-01

    Hidden Markov models (HMMs) provide a framework to analyze large trajectories of biomolecular simulation datasets. HMMs decompose the conformational space of a biological molecule into finite number of states that interconvert among each other with certain rates. HMMs simplify long timescale trajectories for human comprehension, and allow comparison of simulations with experimental data. In this chapter, we provide an overview of building HMMs for analyzing bimolecular simulation datasets. We demonstrate the procedure for building a Hidden Markov model for Met-enkephalin peptide simulation dataset and compare the timescales of the process.

  4. Image Coding using Markov Models with Hidden States

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto

    1999-01-01

    The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same.......The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same....

  5. Convergence in distribution for filtering processes associated to Hidden Markov Models with densities

    OpenAIRE

    Kaijser, Thomas

    2013-01-01

    A Hidden Markov Model generates two basic stochastic processes, a Markov chain, which is hidden, and an observation sequence. The filtering process of a Hidden Markov Model is, roughly speaking, the sequence of conditional distributions of the hidden Markov chain that is obtained as new observations are received. It is well-known, that the filtering process itself, is also a Markov chain. A classical, theoretical problem is to find conditions which implies that the distributions of the filter...

  6. A hidden Markov model approach to analyze longitudinal ternary outcomes when some observed states are possibly misclassified.

    Science.gov (United States)

    Benoit, Julia S; Chan, Wenyaw; Luo, Sheng; Yeh, Hung-Wen; Doody, Rachelle

    2016-04-30

    Understanding the dynamic disease process is vital in early detection, diagnosis, and measuring progression. Continuous-time Markov chain (CTMC) methods have been used to estimate state-change intensities but challenges arise when stages are potentially misclassified. We present an analytical likelihood approach where the hidden state is modeled as a three-state CTMC model allowing for some observed states to be possibly misclassified. Covariate effects of the hidden process and misclassification probabilities of the hidden state are estimated without information from a 'gold standard' as comparison. Parameter estimates are obtained using a modified expectation-maximization (EM) algorithm, and identifiability of CTMC estimation is addressed. Simulation studies and an application studying Alzheimer's disease caregiver stress-levels are presented. The method was highly sensitive to detecting true misclassification and did not falsely identify error in the absence of misclassification. In conclusion, we have developed a robust longitudinal method for analyzing categorical outcome data when classification of disease severity stage is uncertain and the purpose is to study the process' transition behavior without a gold standard. Copyright © 2016 John Wiley & Sons, Ltd.

  7. Bildung: A hidden reason for adult mathematics?

    DEFF Research Database (Denmark)

    Johansen, Lene Østergaard

    2005-01-01

    In May 2000 the Danish Government adopted a reform of the vocational education and continuing training system for adults. A new element is to strengthen basic skills such as reading, writing and mathematics, and the reform comprises an additional education level, "Preparatory Adult Education" (PAE......). PAE will be offered to all persons over 18 who wish to improve their general skills to become better equipped for the labour market and as citizens in a democratic society. The question "Why teach numeracy to adults with lack of basic mathematical skills?" has been the core question in my research...

  8. Backpropagation-Based Cooperative Localization of Primary User for Avoiding Hidden-Node Problem in Cognitive Networks

    Directory of Open Access Journals (Sweden)

    Lin Liu

    2010-01-01

    Full Text Available Cognitive radio (CR is a technology to implement opportunistic spectrum sharing to improve the spectrum utilization. However, there exists a hidden-node problem, which can be a big challenge to solve especially when the primary receiver is passive listening. We aim to provide a solution to the hidden-node problem for passive-listening receiver based on cooperation of multiple CRs. Specifically, we consider a cooperative GPS-enabled cognitive network. Once the existence of PU is detected, a localization algorithm will be employed to first estimate the path loss model for the environment based on backpropagation method and then to locate the position of PU. Finally, a disable region is identified taking into account the communication range of both the PU and the CR. The CRs within the disabled region are prohibited to transmit in order to avoid interfering with the primary receiver. Both analysis and simulation results are provided.

  9. Bayesian Inference in Hidden Markov Random Fields for Binary Data Defined on Large Lattices

    NARCIS (Netherlands)

    Friel, N.; Pettitt, A.N.; Reeves, R.; Wit, E.

    Hidden Markov random fields represent a complex hierarchical model, where the hidden latent process is an undirected graphical structure. Performing inference for such models is difficult primarily because the likelihood of the hidden states is often unavailable. The main contribution of this

  10. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  11. Optimisation of Hidden Markov Model using Baum–Welch algorithm ...

    Indian Academy of Sciences (India)

    s12040-016-0780-0. Optimisation of Hidden Markov Model using. Baum–Welch algorithm for prediction of maximum and minimum temperature over Indian Himalaya. J C Joshi1,∗. , Tankeshwar Kumar2, Sunita Srivastava2 and Divya Sachdeva1.

  12. Optimisation of Hidden Markov Model using Baum–Welch algorithm

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 126; Issue 1. Optimisation of Hidden Markov Model using Baum–Welch algorithm for prediction of maximum and minimum temperature over Indian Himalaya. J C Joshi Tankeshwar Kumar Sunita Srivastava Divya Sachdeva. Volume 126 Issue 1 February 2017 ...

  13. Hidden Markov Model for quantitative prediction of snowfall

    Indian Academy of Sciences (India)

    A Hidden Markov Model (HMM) has been developed for prediction of quantitative snowfall in Pir-Panjal and Great Himalayan mountain ranges of Indian Himalaya. The model predicts snowfall for two days in advance using daily recorded nine meteorological variables of past 20 winters from 1992–2012. There are six ...

  14. Prediction of Annual Rainfall Pattern Using Hidden Markov Model ...

    African Journals Online (AJOL)

    ADOWIE PERE

    the stochastic processes is an underlying Markov chain, the other stochastic process is an observable stochastic ... Keywords: Markov model, Hidden Markov model, Transition probability, Observation probability, Crop. Production, Annual Rainfall .... with highest value of the forward probability at time. T+1 is taken as ...

  15. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  16. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  17. Pair Hidden Markov Model for Named Entity Matching

    NARCIS (Netherlands)

    Nabende, P.; Tiedemann, J.; Nerbonne, J.; Sobh, T.

    2010-01-01

    This paper introduces a pair-Hidden Markov Model (pair-HMM) for the task of evaluating the similarity between bilingual named entities. The pair-HMM is adapted from Mackay and Kondrak [1] who used it on the task of cognate identification and was later adapted by Wieling et al. [5] for Dutch dialect

  18. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  19. Phase transitions, interfacial fluctuations and hidden symmetries for ...

    Indian Academy of Sciences (India)

    hidden symmetries for fluids near structured walls. A O PARRY1 and J M ... progress in this area paying particular attention to filling transitions pertinent to fluid adsorption near wedges, which have ..... Recent computer simulation studies of the Ising model are in agreement with these predictions [20,21]. From eqs (8) and ...

  20. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated

  1. Hidden Markov model-based approach for generation of Pitman ...

    Indian Academy of Sciences (India)

    Speech is one of the most basic means of human communication. ... human beings is carried out with the aid of communication and has facilitated the development ... Hidden Markov model-based approach for generation of PSL symbols. 279. Table 1. PSL basic strokes and English consonants. English consonant.

  2. On the hidden maxwell superalgebra underlying D = 4 supergravity

    Energy Technology Data Exchange (ETDEWEB)

    Penafiel, D.M. [Departamento de Fisica, Universidad de Concepcion (Chile); DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy); Ravera, L. [DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy)

    2017-09-15

    In this work, we expand the hidden AdS-Lorentz superalgebra underlying D = 4 supergravity, reaching a (hidden) Maxwell superalgebra. The latter can be viewed as an extension involving cosmological constant of the superalgebra underlying D = 4 supergravity in flat spacetime. We write the Maurer-Cartan equations in this context and we find some interesting extensions of the antisymmetric 3-form A{sup (3)} appearing in the Free Differential Algebra in Minkowski space. The structure of Free Differential Algebras is obtained by considering the zero curvature equations. We write the parametrization of A{sup (3)} in terms of 1-forms and we rend the topological features of its extensions manifest. We interestingly find out that the structure of these extensions, and consequently the structure of the corresponding boundary contribution dA{sup (3)}, strongly depends on the form of the extra fermionic generator appearing in the hidden Maxwell superalgebra. The model we develop in this work is defined in an enlarged superspace with respect to the ordinary one, and the extra bosonic and fermionic 1-forms required for the closure of the hidden Maxwell superalgebra must be considered as physical fields in this enlarged superspace. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  3. A Bayesian Infinite Hidden Markov Vector Autoregressive Model

    NARCIS (Netherlands)

    D. Nibbering (Didier); R. Paap (Richard); M. van der Wel (Michel)

    2016-01-01

    textabstractWe propose a Bayesian infinite hidden Markov model to estimate time-varying parameters in a vector autoregressive model. The Markov structure allows for heterogeneity over time while accounting for state-persistence. By modelling the transition distribution as a Dirichlet process mixture

  4. Measurement problem and local hidden variables with entangled photons

    Science.gov (United States)

    Muchowski, Eugen

    2017-12-01

    It is shown that there is no remote action with polarization measurements of photons in singlet state. A model is presented introducing a hidden parameter which determines the polarizer output. This model is able to explain the polarization measurement results with entangled photons. It is not ruled out by Bell's Theorem.

  5. From epistemology to hidden curriculum: Critical vs. 'commercial' pedagogic perspective

    Directory of Open Access Journals (Sweden)

    Marojević Jovana C.

    2016-01-01

    Full Text Available Knowledge or, more precisely, its power is one of central themes in critical pedagogy. Since they are interested in school as the site of social critique, aimed at social transformations, critically oriented pedagogues pay special attention to the relation of knowledge and power or, to simplify it, the function of knowledge in the reproduction of the existing (often oppressive social relations. Not recognizing school as a mere site of social, economic or cultural preservation, they often study epistemology on which modern school is founded (positivistic epistemology and its hidden curriculum who function so that they legitimate social reproductive function of the school in a continuous cycle of self-justification. Since a certain understanding of knowledge and its function reveals the hidden curriculum of a certain educational philosophy, and since this consequently changes school into a site of social transformation or social transmission, viewed from the critical position this is the subject of the analysis of our paper. By final sublimation and contrasting the opposite positivistic and critical positions we conclude that the hidden curriculum of the first is the curriculum of the soliloquies while the curriculum of the second, critical tendency is entirely of a dialogue nature. It is clear that uni-directedness of the hidden curriculum formed according the postulates of positivistic epistemology can contribute only to positivistic transmission and regeneration of the existing social order, while the discursivity of critically oriented school defines the relation towards society as two-way, transformational, active and emancipatory.

  6. A new 'hidden colour hypothesis' in hadron physics

    Indian Academy of Sciences (India)

    A new `hidden colour hypothesis' within the framework of QCD, as an extension of and in keeping with the spirit of the `colour singlet hypothesis' is hereby proposed. As such it should play a role in a consistent description of exotic hadrons, such as diquonia, pentaquarks, dibaryons etc. How these exotic hadrons are ...

  7. Backward causation, hidden variables and the meaning of ...

    Indian Academy of Sciences (India)

    Backward causation, hidden variables and the meaning of completeness. HUW PRICE. Department of Philosophy, Main Quad, A14, University of Sydney, New South Wales 2006, Australia. Abstract. Bell's theorem ... Certainly, this asymmetry seems to have something to do with our 'knowledge asym- metry' — the fact that ...

  8. Recognizing Strokes in Tennis Videos Using Hidden Markov Models

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, Willem; Zivkovic, Z.

    This paper addresses content-based video retrieval with an emphasis on recognizing events in tennis game videos. In particular, we aim at recognizing different classes of tennis strokes using automatic learning capability of Hidden Markov Models. Driven by our domain knowledge, a robust player

  9. A new 'hidden colour hypothesis' in hadron physics

    Indian Academy of Sciences (India)

    Abstract. A new 'hidden colour hypothesis' within the framework of QCD, as an exten- sion of and in keeping with the spirit of the 'colour singlet hypothesis' is hereby proposed. As such it should play a role in a consistent description of exotic hadrons, such as diquonia, pentaquarks, dibaryons etc. How these exotic hadrons ...

  10. Prediction of annual rainfall pattern using Hidden Markov Model ...

    African Journals Online (AJOL)

    A hidden Markov model to predict annual rainfall pattern has been presented in this paper. The model is developed to provide necessary information for the farmers, agronomists, water resource management scientists and policy makers to enable them plan for the uncertainty of annual rainfall. The model classified annual ...

  11. TeraHertz imaging of hidden paint layers on canvas

    NARCIS (Netherlands)

    Adam, A.J.L.; Planken, P.C.M.; Meloni, S.; Dik, J.

    2009-01-01

    We show terahertz reflection images of hidden paint layers in a painting on canvas and compare the results with X-ray Radiography and Infrared Reflectography. Our terahertz measurements show strong reflections from both the canvas/paint interface and from the raw umber/lead white interface,

  12. Zero Hidden Hunger: From Nariño to Colombia

    International Development Research Centre (IDRC) Digital Library (Canada)

    Zero Hidden Hunger: From Nariño to Colombia. Did you know that in Nariño...? • Children under five have twice the nutritional deficiencies in zinc and iron than the rest of the country (ENSIN 2010). • The menus in government meal programmes include yellow potatoes twice a week and white potatoes three times a week.

  13. A hidden bias in a common calorimeter calibration scheme

    International Nuclear Information System (INIS)

    Lincoln, Don; Morrow, Greg; Kasper, Peter

    1994-01-01

    In this paper, a common calorimeter calibration scheme is explored and a hidden bias found. Since this bias mimics a non-linearity in response in the calorimeter, it must be understood and removed from the calibration before true non-linearities are investigated. The effect and its removal are explored and understood through straightforward calculus and algebra. ((orig.))

  14. The incompatibility between local hidden variable theories and the ...

    Indian Academy of Sciences (India)

    validity of the conservation law alone and this coincides with the quantum mechanical correlation function. Thus, any ... local hidden variable theory, is incompatible with the fundamental conservation laws and space-time ...... of physics on the average, and this indeed is the case for conservation of energy– momentum, and ...

  15. The hidden magnitude of raised blood pressure and elevated blood ...

    African Journals Online (AJOL)

    user

    The hidden magnitude of raised blood pressure and elevated blood glucose in Ethiopia: A call for initiating community based NCDs risk factors screening program. Abebe Bekele1, Terefe Gelibo1, Kassahun Amenu1, Theodros Getachew1, Atkure Defar1, Habtamu Teklie1,. Tefera Taddele1, Girum Taye1, Misrak Getnet1, ...

  16. Evolving the Topology of Hidden Markov Models using Evolutionary Algorithms

    DEFF Research Database (Denmark)

    Thomsen, Réne

    2002-01-01

    Hidden Markov models (HMM) are widely used for speech recognition and have recently gained a lot of attention in the bioinformatics community, because of their ability to capture the information buried in biological sequences. Usually, heuristic algorithms such as Baum-Welch are used to estimate ...

  17. Crisis Entrepreneurs and Hidden Crises : Illustrative Examples of Interactional

    NARCIS (Netherlands)

    Prof. Cees van Woerkum; dr. Annette Klarenbeek

    2012-01-01

    We examine the ways in which a hidden crisis can be exposed from a communication point of view. In which way can organisations create general awareness of a crisis and try to understand the dynamic nature of interactions? With the help of discourse analysis, we have examined the interactional

  18. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...... functions are also discussed....

  19. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  20. Doing School Time: The Hidden Curriculum Goes to Prison

    Science.gov (United States)

    García, José; De Lissovoy, Noah

    2013-01-01

    The hidden curriculum is generally understood as the process by which daily exposure to school expectations and routines transmits norms and values of the dominant society to students. In the present, through the regimentation of thought, control of bodies and movement, and proliferation of punishment, contemporary accountability and testing…

  1. Hidden Markov model-based approach for generation of Pitman ...

    Indian Academy of Sciences (India)

    In this paper, an approach for feature extraction using Mel frequency cep- stral coefficients (MFCC) and classification using hidden Markov models (HMM) for generating strokes comprising consonants and vowels (CV) in the process of production of Pitman shorthand language from spoken English is proposed. The.

  2. Hidden Markov Model for quantitative prediction of snowfall and ...

    Indian Academy of Sciences (India)

    A Hidden Markov Model (HMM) has been developed for prediction of quantitative snowfall in Pir-Panjal and Great Himalayan mountain ranges of Indian Himalaya. The model predicts snowfall for two days in advance using daily recorded nine meteorological variables of past 20 winters from 1992–2012. There are six ...

  3. The incompatibility between local hidden variable theories and the ...

    Indian Academy of Sciences (India)

    I discuss in detail the result that the Bell's inequalities derived in the context of local hidden variable theories for discrete quantized observables can be satisfied only if a fundamental conservation law is violated on the average. This result shows that such theories are physically nonviable, and makes the demarcating criteria ...

  4. Is the Hidden Curriculum a Relevant Issue in Educational Processes

    Directory of Open Access Journals (Sweden)

    Patarroyo Esther

    2004-08-01

    Full Text Available This paper explores some ideas about the hidden curriculum as an amount of ideas and beliefs which are implicit in an indirect way into the scholar life. Those ideas are regarding to gender equality, social status and racial difference, among others. We consider teachers are able to integrate the hidden curriculum as a pedagogical strategy in the classroom. Examples of integration include activities such as observation techniques, role-plays, peer modeling and particularly, the portfolio as a useful tool for reflection which reveals the hidden curriculum. Key words: Hidden Curriculum, Pedagogical Strategy, Portfolio, ELT Processes, Stereotypes Este documento explora algunas ideas acerca del currículo oculto como una suma de ideas y creencias que están implícitos de una forma indirecta dentro de la vida escolar. Estas ideas están relacionadas con la equidad de género, diferencias sociales y raciales, entre otros. Consideramos que es posible para los docentes integrar el currículo como estrategia pedagógica en el aula. Ejemplos de esta integración incluyen técnicas de observación, juegos de roles, modelamiento en parejas y particularmente, el portafolio como herramienta de reflexión que permita hacer evidente el currículo oculto. Palabras claves: Currículo Oculto, Estrategia Pedagógica, Estereotipos, Enseñanza de Inglés, Portafolio

  5. Hidden attractors without equilibrium and adaptive reduced-order ...

    Indian Academy of Sciences (India)

    2017-03-10

    Mar 10, 2017 ... 1Guangxi Colleges and Universities Key Laboratory of Complex System Optimization and Big Data Processing,. Yulin Normal University, Yulin ... it has been found that chaos is useful in many application fields such as engineer- ... and all applications of chaotic systems or hyperchaotic systems with hidden ...

  6. Hidden symmetries of the Principal Chiral Model unveiled

    International Nuclear Information System (INIS)

    Devchand, C.; Schiff, J.

    1996-12-01

    By relating the two-dimensional U(N) Principal Chiral Model to a Simple linear system we obtain a free-field parametrization of solutions. Obvious symmetry transformations on the free-field data give symmetries of the model. In this way all known 'hidden symmetries' and Baecklund transformations, as well as a host of new symmetries, arise. (author). 21 refs

  7. Resources of learning through hidden curriculum: Iranian nursing students’ perspective

    Science.gov (United States)

    Karimi, Zohreh; Ashktorab, Tahereh; Mohammadi, Eesa; Abedi, Heidarali; Zarea, Kourosh

    2015-01-01

    Background: Students tend to internalize and perpetuate the patterns of behavior and the values surrounding them. Review of literature showed that there are several student learning sources through the hidden curriculum, but they have not been identified in nursing yet. Hence, the purpose of this study is explanation of learning resources in the hidden curriculum in the view of baccalaureate nursing students. Materials and Methods: This qualitative study was carried out in 2012 with the participation of 32 baccalaureate nursing students in Nursing and Midwifery College of Ahvaz Jundishapur University of Medical Sciences, Ahvaz, Iran by purposeful sampling strategies. Data were collected by semi-structured interviews and continued to the level of data saturation and themes’ emergence. Data analysis was performed through inductive content analysis method. Result: “Instructor as the unique learning element,” “various learning resources in the clinical setting,” and “instructive nature of the education environment” were extracted as the main themes, each of which incorporated some categories. Conclusion: Baccalaureate undergraduate nursing students learnt the hidden curriculum by the resources such as instructors, resources existing in the clinical setting, and the university campus. Therefore, more research is recommended for the identification of other resources. In order to promote positive messages and reduce the negative messages of the hidden curricula running at academic and clinical settings, nursing educators and nurses need to learn more about this issue in the nursing profession. PMID:26430684

  8. Multistability and hidden attractors in a relay system with hysteresis

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.

    2015-01-01

    For nonlinear dynamic systems with switching control, the concept of a "hidden attractor" naturally applies to a stable dynamic state that either (1) coexists with the stable switching cycle or (2), if the switching cycle is unstable, has a basin of attraction that does not intersect with the nei...

  9. Book review: Troubling possibility, hidden fires and secret drawers ...

    African Journals Online (AJOL)

    Book review: Troubling possibility, hidden fires and secret drawers: Tiyambe Zeleza's smouldering charcoal. H.F. Ross. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL.

  10. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  11. Hidden Markov Models in Bioinformatics: SNV Inference from Next Generation Sequence.

    Science.gov (United States)

    Bian, Jiawen; Zhou, Xiaobo

    2017-01-01

    The rapid development of next generation sequencing (NGS) technology provides a novel avenue for genomic exploration and research. Hidden Markov models (HMMs) have wide applications in pattern recognition as well as Bioinformatics such as transcription factor binding sites and cis-regulatory modules detection. An application of HMM is introduced in this chapter with the in-deep developing of NGS. Single nucleotide variants (SNVs) inferred from NGS are expected to reveal gene mutations in cancer. However, NGS has lower sequence coverage and poor SNV detection capability in the regulatory regions of the genome. A specific HMM is developed for this purpose to infer the genotype for each position on the genome by incorporating the mapping quality of each read and the corresponding base quality on the reads into the emission probability of HMM. The procedure and the implementation of the algorithm is presented in detail for understanding and programming.

  12. Medical Inpatient Journey Modeling and Clustering: A Bayesian Hidden Markov Model Based Approach.

    Science.gov (United States)

    Huang, Zhengxing; Dong, Wei; Wang, Fei; Duan, Huilong

    2015-01-01

    Modeling and clustering medical inpatient journeys is useful to healthcare organizations for a number of reasons including inpatient journey reorganization in a more convenient way for understanding and browsing, etc. In this study, we present a probabilistic model-based approach to model and cluster medical inpatient journeys. Specifically, we exploit a Bayesian Hidden Markov Model based approach to transform medical inpatient journeys into a probabilistic space, which can be seen as a richer representation of inpatient journeys to be clustered. Then, using hierarchical clustering on the matrix of similarities, inpatient journeys can be clustered into different categories w.r.t their clinical and temporal characteristics. We evaluated the proposed approach on a real clinical data set pertaining to the unstable angina treatment process. The experimental results reveal that our method can identify and model latent treatment topics underlying in personalized inpatient journeys, and yield impressive clustering quality.

  13. Name segmentation using hidden Markov models and its application in record linkage

    Directory of Open Access Journals (Sweden)

    Rita de Cassia Braga Gonçalves

    2014-10-01

    Full Text Available This study aimed to evaluate the use of hidden Markov models (HMM for the segmentation of person names and its influence on record linkage. A HMM was applied to the segmentation of patient’s and mother’s names in the databases of the Mortality Information System (SIM, Information Subsystem for High Complexity Procedures (APAC, and Hospital Information System (AIH. A sample of 200 patients from each database was segmented via HMM, and the results were compared to those from segmentation by the authors. The APAC-SIM and APAC-AIH databases were linked using three different segmentation strategies, one of which used HMM. Conformity of segmentation via HMM varied from 90.5% to 92.5%. The different segmentation strategies yielded similar results in the record linkage process. This study suggests that segmentation of Brazilian names via HMM is no more effective than traditional segmentation approaches in the linkage process.

  14. Name segmentation using hidden Markov models and its application in record linkage.

    Science.gov (United States)

    Gonçalves, Rita de Cassia Braga; Freire, Sergio Miranda

    2014-10-01

    This study aimed to evaluate the use of hidden Markov models (HMM) for the segmentation of person names and its influence on record linkage. A HMM was applied to the segmentation of patient's and mother's names in the databases of the Mortality Information System (SIM), Information Subsystem for High Complexity Procedures (APAC), and Hospital Information System (AIH). A sample of 200 patients from each database was segmented via HMM, and the results were compared to those from segmentation by the authors. The APAC-SIM and APAC-AIH databases were linked using three different segmentation strategies, one of which used HMM. Conformity of segmentation via HMM varied from 90.5% to 92.5%. The different segmentation strategies yielded similar results in the record linkage process. This study suggests that segmentation of Brazilian names via HMM is no more effective than traditional segmentation approaches in the linkage process.

  15. Baryon states with hidden charm in the extended local hidden gauge approach

    International Nuclear Information System (INIS)

    Uchino, T.; Oset, E.; Liang, Wei-Hong

    2016-01-01

    The s-wave interaction of anti DΛ c , anti DΣ c , anti D * Λ c , anti D * Σ c and anti DΣ c * , anti D * Σ c * , is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ c - anti D * Σ c with J = 1/2, and two of anti DΣ c * - anti D * Σ c * with J = 3/2. Moreover, we find a anti D * Σ c resonance which couples to the anti DΛ c channel and one spin degenerated bound state of anti D * Σ c * with J = 1/2,5/2. (orig.)

  16. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  17. Enumerating the Hidden Homeless: Strategies to Estimate the Homeless Gone Missing From a Point-in-Time Count

    Directory of Open Access Journals (Sweden)

    Agans Robert P.

    2014-06-01

    Full Text Available To receive federal homeless funds, communities are required to produce statistically reliable, unduplicated counts or estimates of homeless persons in sheltered and unsheltered locations during a one-night period (within the last ten days of January called a point-in-time (PIT count. In Los Angeles, a general population telephone survey was implemented to estimate the number of unsheltered homeless adults who are hidden from view during the PIT count. Two estimation approaches were investigated: i the number of homeless persons identified as living on private property, which employed a conventional household weight for the estimated total (Horvitz-Thompson approach; and ii the number of homeless persons identified as living on a neighbor’s property, which employed an additional adjustment derived from the size of the neighborhood network to estimate the total (multiplicity-based approach. This article compares the results of these two methods and discusses the implications therein.

  18. Linking person perception and person knowledge in the human brain

    OpenAIRE

    Greven, Inez M.; Downing, Paul E.; Ramsey, Richard

    2016-01-01

    Neuroscience research has examined separately how we detect human agents on the basis of their face and body (person perception) and how we reason about their thoughts, traits or intentions (person knowledge). Neuroanatomically distinct networks have been associated with person perception and person knowledge, but it remains unknown how multiple features of a person (e.g. thin and kind) are linked to form a holistic identity representation. In this fMRI experiment, we investigated the hypothe...

  19. A modified three-port “hidden scars” surgical approach in gynecology: A surgeon's experience of an initial 72 cases

    OpenAIRE

    Wong, Felix Wu Shun; Lee, Eric Tat Choi

    2014-01-01

    Objective: The study objectives were to determine the surgical outcomes of a personal series of gynecological patients treated with a modified three-port “hidden scars” surgical approach (HS surgical approach) for the treatment of benign gynecological diseases. Study design: This was a retrospective series performed by one of the study authors FW to analyze 72 women treated with a modified three-port HS approach for the treatment of benign gynecological diseases from January 2013 to August...

  20. Ciliate communities and hidden biodiversity in freshwater biotopes of the Pistoia province (Tuscany, Italy).

    Science.gov (United States)

    Rossi, Alessia; Boscaro, Vittorio; Carducci, Daniela; Serra, Valentina; Modeo, Letizia; Verni, Franco; Fokin, Sergei I; Petroni, Giulio

    2016-04-01

    Ciliates are essential components of aquatic environments, playing a pivotal role in microbial loops. Thus, the composition and dynamics of ciliate communities have been subjected to intense studying. Morphological methods have been traditionally employed, until the development of next-generation sequencing recently allowed to explore the topic with exclusively molecular techniques. However, the results of the two approaches are hardly comparable, and the pictures they offer can be quite different. This may be due, among other reasons, to two factors: (1) morphological descriptions may miss a large portion of "hidden biodiversity" (including rare species and resistance forms) that is detected instead by molecular methods; (2) identification errors may arise due to difficulties in recognizing microbial taxa without in-depth analyses. In this survey of freshwater systems of the Pistoia province (Tuscany, Italy) we address both issues, trying to quantify the hidden diversity through prolonged observations of differentially treated sample aliquots, combining morphological identification with Sanger sequencing. We provide the first insights into the ciliate fauna of this area presenting results that are suitable for future comparisons thanks to their multidisciplinary origin, and supply the first molecular data on well-known taxa such as Linostomella and Disematostoma. Copyright © 2015 Elsevier GmbH. All rights reserved.

  1. Exploiting the hidden symmetry of spinning black holes: conservation laws and numerical tests

    Science.gov (United States)

    Witzany, Vojtěch

    2018-01-01

    The Kerr black hole is stationary and axisymmetric, which leads to conservation of energy and azimuthal angular momentum along the orbits of free test particles in its vicinity, but also to conservation laws for the evolution of continuum matter fields. However, the Kerr space-time possesses an additional 'hidden symmetry', which exhibits itself in an unexpected conserved quantity along geodesics known as the Carter constant. We investigate the possibility of using this hidden symmetry to obtain conservation laws and other identities that could be used to test astrophysical simulations of the evolution of matter fields near spinning black holes. After deriving such identities, we set up a simple numerical toy model on which we demonstrate how they can detect the violations of evolution equations in a numerical simulation. Even though one of the expressions we derive is in the form of a conservation law, we end up recommending an equivalent but simpler expression that is not in the form of a conservation law for practical implementation.

  2. Prehypertension--a hidden risk of Indian subcontinent.

    Science.gov (United States)

    Yavagal, Suresh T; Amarkhed, Basavaprabhu; Halkati, Prabhu C; Patted, Suresh V; Porwal, Sanjay C; Ambar, Sameer; Patil, Ravikant

    2013-02-01

    Prehypertension as an entity has been given Importance after JNC VII report. The magnitude of this problem in India and the importance of recognising prehypertension is slowly growing and getting established. Under these circumstances it was decided to study the prevalence of prehypertension in the city of Belgaum in Karnataka and the literature was reviewed. The objective of this study was to find out the prevalence of prehypertension in the urban population of Belgaum above thirty years of age. The urban population of Belgaum city was screened for prehypertension and hypertension by measuring blood pressure of all individuals aged 30 years and above. Blood pressure of 52196 persons was checked and the data was analysed. JNC VII criteria was used for defining hypertension, prehypertension and normal blood pressure. Among 52196 persons prehypertension was present in 41.1%, 67.1% were in the age group of 30-50 years. The prevalence was similar in both male and female population. Thirty-three percent of diabetic population had prehypertension. About 22.8% of prehypertensives were obese. Prehypertension is highly prevalent in urban population of India, more often seen in persons below 50 years of age. This study recognises the importance of detection of prehypertension and emphasises the need for mass education on life style modification to prevent the development of hypertension and its complications.

  3. An impossibility theorem for parameter independent hidden variable theories

    Science.gov (United States)

    Leegwater, Gijs

    2016-05-01

    Recently, Roger Colbeck and Renato Renner (C&R) have claimed that '[n]o extension of quantum theory can have improved predictive power' (Colbeck & Renner, 2011, 2012b). If correct, this is a spectacular impossibility theorem for hidden variable theories, which is more general than the theorems of Bell (1964) and Leggett (2003). Also, C&R have used their claim in attempt to prove that a system's quantum-mechanical wave function is in a one-to-one correspondence with its 'ontic' state (Colbeck & Renner, 2012a). C&R's claim essentially means that in any hidden variable theory that is compatible with quantum-mechanical predictions, probabilities of measurement outcomes are independent of these hidden variables. This makes such variables otiose. On closer inspection, however, the generality and validity of the claim can be contested. First, it is based on an assumption called 'Freedom of Choice'. As the name suggests, this assumption involves the independence of an experimenter's choice of measurement settings. But in the way C&R define this assumption, a no-signalling condition is surreptitiously presupposed, making the assumption less innocent than it sounds. When using this definition, any hidden variable theory violating parameter independence, such as Bohmian Mechanics, is immediately shown to be incompatible with quantum-mechanical predictions. Also, the argument of C&R is hard to follow and their mathematical derivation contains several gaps, some of which cannot be closed in the way they suggest. We shall show that these gaps can be filled. The issue with the 'Freedom of Choice' assumption can be circumvented by explicitly assuming parameter independence. This makes the result less general, but better founded. We then obtain an impossibility theorem for hidden variable theories satisfying parameter independence only. As stated above, such hidden variable theories are impossible in the sense that any supplemental variables have no bearing on outcome probabilities

  4. Characterising the Transmission Dynamics of Acinetobacter baumannii in Intensive Care Units Using Hidden Markov Models.

    Directory of Open Access Journals (Sweden)

    Tan N Doan

    Full Text Available Little is known about the transmission dynamics of Acinetobacter baumannii in hospitals, despite such information being critical for designing effective infection control measures. In the absence of comprehensive epidemiological data, mathematical modelling is an attractive approach to understanding transmission process. The statistical challenge in estimating transmission parameters from infection data arises from the fact that most patients are colonised asymptomatically and therefore the transmission process is not fully observed. Hidden Markov models (HMMs can overcome this problem. We developed a continuous-time structured HMM to characterise the transmission dynamics, and to quantify the relative importance of different acquisition sources of A. baumannii in intensive care units (ICUs in three hospitals in Melbourne, Australia. The hidden states were the total number of patients colonised with A. baumannii (both detected and undetected. The model input was monthly incidence data of the number of detected colonised patients (observations. A Bayesian framework with Markov chain Monte Carlo algorithm was used for parameter estimations. We estimated that 96-98% of acquisition in Hospital 1 and 3 was due to cross-transmission between patients; whereas most colonisation in Hospital 2 was due to other sources (sporadic acquisition. On average, it takes 20 and 31 days for each susceptible individual in Hospital 1 and Hospital 3 to become colonised as a result of cross-transmission, respectively; whereas it takes 17 days to observe one new colonisation from sporadic acquisition in Hospital 2. The basic reproduction ratio (R0 for Hospital 1, 2 and 3 was 1.5, 0.02 and 1.6, respectively. Our study is the first to characterise the transmission dynamics of A. baumannii using mathematical modelling. We showed that HMMs can be applied to sparse hospital infection data to estimate transmission parameters despite unobserved events and imperfect detection of

  5. Combining personality traits with traditional risk factors for coronary stenosis : An artificial neural networks solution in patients with computed tomography detected coronary artery disease

    NARCIS (Netherlands)

    Compare, A.; Grossi, E.; Buscema, M.; Zarbo, C.; Mao, X.; Faletra, F.; Pasotti, E.; Moccetti, T.; Mommersteeg, P.M.C.; Auricchio, A.

    2013-01-01

    Background. Coronary artery disease (CAD) is a complex, multifactorial disease in which personality seems to play a role but with no definition in combination with other risk factors. Objective. To explore the nonlinear and simultaneous pathways between traditional and personality traits risk

  6. HMMEditor: a visual editing tool for profile hidden Markov model

    Directory of Open Access Journals (Sweden)

    Cheng Jianlin

    2008-03-01

    Full Text Available Abstract Background Profile Hidden Markov Model (HMM is a powerful statistical model to represent a family of DNA, RNA, and protein sequences. Profile HMM has been widely used in bioinformatics research such as sequence alignment, gene structure prediction, motif identification, protein structure prediction, and biological database search. However, few comprehensive, visual editing tools for profile HMM are publicly available. Results We develop a visual editor for profile Hidden Markov Models (HMMEditor. HMMEditor can visualize the profile HMM architecture, transition probabilities, and emission probabilities. Moreover, it provides functions to edit and save HMM and parameters. Furthermore, HMMEditor allows users to align a sequence against the profile HMM and to visualize the corresponding Viterbi path. Conclusion HMMEditor provides a set of unique functions to visualize and edit a profile HMM. It is a useful tool for biological sequence analysis and modeling. Both HMMEditor software and web service are freely available.

  7. Hidden magnetism in periodically modulated one dimensional dipolar fermions

    Science.gov (United States)

    Fazzini, S.; Montorsi, A.; Roncaglia, M.; Barbiero, L.

    2017-12-01

    The experimental realization of time-dependent ultracold lattice systems has paved the way towards the implementation of new Hubbard-like Hamiltonians. We show that in a one-dimensional two-components lattice dipolar Fermi gas the competition between long range repulsion and correlated hopping induced by periodically modulated on-site interaction allows for the formation of hidden magnetic phases, with degenerate protected edge modes. The magnetism, characterized solely by string-like nonlocal order parameters, manifests in the charge and/or in the spin degrees of freedom. Such behavior is enlighten by employing Luttinger liquid theory and numerical methods. The range of parameters for which hidden magnetism is present can be reached by means of the currently available experimental setups and probes.

  8. Heavy superpartners with less tuning from hidden sector renormalisation

    International Nuclear Information System (INIS)

    Hardy, Edward

    2014-01-01

    In supersymmetric extensions of the Standard Model, superpartner masses consistent with collider bounds typically introduce significant tuning of the electroweak scale. We show that hidden sector renormalisation can greatly reduce such a tuning if the supersymmetry breaking, or mediating, sector runs through a region of strong coupling not far from the weak scale. In the simplest models, only the tuning due to the gaugino masses is improved, and a weak scale gluino mass in the region of 5 TeV may be obtained with an associated tuning of only one part in ten. In models with more complex couplings between the visible and hidden sectors, the tuning with respect to sfermions can also be reduced. We give an example of a model, with low scale gauge mediation and superpartner masses allowed by current LHC bounds, that has an overall tuning of one part in twenty

  9. Wikipedia mining of hidden links between political leaders

    Science.gov (United States)

    Frahm, Klaus M.; Jaffrès-Runser, Katia; Shepelyansky, Dima L.

    2016-12-01

    We describe a new method of reduced Google matrix which allows to establish direct and hidden links between a subset of nodes of a large directed network. This approach uses parallels with quantum scattering theory, developed for processes in nuclear and mesoscopic physics and quantum chaos. The method is applied to the Wikipedia networks in different language editions analyzing several groups of political leaders of USA, UK, Germany, France, Russia and G20. We demonstrate that this approach allows to recover reliably direct and hidden links among political leaders. We argue that the reduced Google matrix method can form the mathematical basis for studies in social and political sciences analyzing Leader-Members eXchange (LMX).

  10. Markov chain Monte Carlo simulation for Bayesian Hidden Markov Models

    Science.gov (United States)

    Chan, Lay Guat; Ibrahim, Adriana Irawati Nur Binti

    2016-10-01

    A hidden Markov model (HMM) is a mixture model which has a Markov chain with finite states as its mixing distribution. HMMs have been applied to a variety of fields, such as speech and face recognitions. The main purpose of this study is to investigate the Bayesian approach to HMMs. Using this approach, we can simulate from the parameters' posterior distribution using some Markov chain Monte Carlo (MCMC) sampling methods. HMMs seem to be useful, but there are some limitations. Therefore, by using the Mixture of Dirichlet processes Hidden Markov Model (MDPHMM) based on Yau et. al (2011), we hope to overcome these limitations. We shall conduct a simulation study using MCMC methods to investigate the performance of this model.

  11. Perfect posterior simulation for mixture and hidden Marko models

    DEFF Research Database (Denmark)

    Berthelsen, Kasper Klitgaard; Breyer, Laird A.; Roberts, Gareth O.

    2010-01-01

    In this paper we present an application of the read-once coupling from the past algorithm to problems in Bayesian inference for latent statistical models. We describe a method for perfect simulation from the posterior distribution of the unknown mixture weights in a mixture model. Our method...... is extended to a more general mixture problem, where unknown parameters exist for the mixture components, and to a hidden Markov model....

  12. Uncovering Hidden Mathematics of the Multiplication Table Using Spreadsheets

    Directory of Open Access Journals (Sweden)

    Sergei Abramovich

    2007-05-01

    Full Text Available This paper reveals a number of learning activities emerging from a spreadsheetgenerated multiplication table. These activities are made possible by using such features of the software as conditional formatting, circular referencing, calculation through iteration, scroll bars, and graphing. The paper is a reflection on a mathematics content course designed for prospective elementary teachers using the hidden mathematics curriculum framework. It is written in support of standards for teaching and recommendations for teachers in North America.

  13. Pendidikan Anti Korupsi melalui Hidden Curriculum dan Pendidikan Moral

    Directory of Open Access Journals (Sweden)

    Dewi Salistina

    2015-11-01

    Full Text Available This article is intended to elaborate strategies in incorporating anti corruption awareness through hidden curriculum and morality education. It is of necessity to increase such kind of awareness among students so that they can avoid any action related to corruption. In this case, some practices such as good behavior, discipline, and good relationship among students-teachers are fostered in the daily activities at school. The effect is the increase of students’ honesty, responsibility, and solidarity across level of education.

  14. Hidden multiparticle excitation in weakly interacting Bose-Einstein Condensate

    OpenAIRE

    Watabe, Shohei

    2017-01-01

    We investigate multiparticle excitation effect on a collective density excitation as well as a single-particle excitation in a weakly interacting Bose--Einstein condensate (BEC). We find that although the weakly interacting BEC offers weak multiparticle excitation spectrum at low temperatures, this multiparticle excitation effect may not remain hidden, but emerges as bimodality in the density response function through the single-particle excitation. Identification of spectra in the BEC betwee...

  15. Hidden Markov models: the best models for forager movements?

    Science.gov (United States)

    Joo, Rocio; Bertrand, Sophie; Tam, Jorge; Fablet, Ronan

    2013-01-01

    One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs). We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs). They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour), while their behavioural modes (fishing, searching and cruising) were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines) for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%), significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  16. Hidden Markov models: the best models for forager movements?

    Directory of Open Access Journals (Sweden)

    Rocio Joo

    Full Text Available One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs. We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs. They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour, while their behavioural modes (fishing, searching and cruising were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%, significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  17. Einstein-Bohr controversy and theory of hidden variables

    Czech Academy of Sciences Publication Activity Database

    Lokajíček, Miloš V.

    2010-01-01

    Roč. 8, č. 4 (2010), s. 638-645 ISSN 1303-5150 R&D Projects: GA MŠk LA08015 Institutional research plan: CEZ:AV0Z10100502 Keywords : Schroedinger equation * EPR paradox * hidden variables Subject RIV: BF - Elementary Particles and High Energy Physics Impact factor: 0.697, year: 2010 http://arxiv.org/abs/1004.3005

  18. What are the Hidden Quantum Processes Behind Newton's Laws?

    OpenAIRE

    Ostoma, Tom; Trushyk, Mike

    1999-01-01

    We investigate the hidden quantum processes that are responsible for Newton's laws of motion and Newton's universal law of gravity. We apply Electro-Magnetic Quantum Gravity or EMQG to investigate Newtonian classical physics. EQMG is a quantum gravity theory that is manifestly compatible with Cellular Automata (CA) theory, a new paradigm for physical reality. EMQG is also based on a theory of inertia proposed by R. Haisch, A. Rueda, and H. Puthoff, which we modified and called Quantum Inertia...

  19. Sterile neutrino, hidden dark matter and their cosmological signatures

    International Nuclear Information System (INIS)

    Das, Subinoy

    2012-01-01

    Though thermal dark matter has been the central idea behind the dark matter candidates, it is highly possible that dark matter of the universe is non-thermal in origin or it might be in thermal contact with some hidden or dark sector but not with standard model. Here we explore the cosmological bounds as well as the signatures on two types of non-thermal dark matter candidates. First we discuss a hidden dark matter with almost no interaction (or very feeble) with standard model particles so that it is not in thermal contact with visible sector but we assume it is thermalized with in a hidden sector due to some interaction. While encompassing the standard cold WIMP scenario, we do not require the freeze-out process to be non-relativistic. Rather, freeze-out may also occur when dark matter particles are semi-relativistic or relativistic. Especially we focus on the warm dark matter scenario in this set up and find the constraints on the warm dark matter mass, cross-section and hidden to visible sector temperature ratio which accounts for the observed dark-matter density, satisfies the Tremaine-Gunn bound on dark-matter phase space density and has a free-streaming length consistent with cosmological constraints on the matter power spectrum. Our method can also be applied to keV sterile neutrino dark matter which is not thermalized with standard model but is thermalized with in a dark sector. The second part of this proceeding focuses on an exotic dark matter candidate which arises from the existence of eV mass sterile neutrino through a late phase transition. Due to existence of a strong scalar force the light sterile states get trapped into stable degenerate micro nuggets. We find that its signature in matter power spectra is close to a warm dark matter candidate.

  20. A preon model with hidden electric and magnetic type charges

    International Nuclear Information System (INIS)

    Pati, J.C.; Strathdee, J.

    1980-11-01

    The U(1) x U(1) binding forces in an earlier preonic composite model of quarks and leptons are interpreted as arising from hidden electric and magnetic type charges. The preons may possess intrinsic spin zero; the half-integer spins of the composites being contributed by the force field. The quark-lepton gauge symmetry is interpreted as an effective low-energy symmetry arising at the composite level. Some remarks are made regarding the possible composite nature of the graviton. (author)

  1. Grammatical-Restrained Hidden Conditional Random Fields for Bioinformatics applications

    Directory of Open Access Journals (Sweden)

    Martelli Pier

    2009-10-01

    Full Text Available Abstract Background Discriminative models are designed to naturally address classification tasks. However, some applications require the inclusion of grammar rules, and in these cases generative models, such as Hidden Markov Models (HMMs and Stochastic Grammars, are routinely applied. Results We introduce Grammatical-Restrained Hidden Conditional Random Fields (GRHCRFs as an extension of Hidden Conditional Random Fields (HCRFs. GRHCRFs while preserving the discriminative character of HCRFs, can assign labels in agreement with the production rules of a defined grammar. The main GRHCRF novelty is the possibility of including in HCRFs prior knowledge of the problem by means of a defined grammar. Our current implementation allows regular grammar rules. We test our GRHCRF on a typical biosequence labeling problem: the prediction of the topology of Prokaryotic outer-membrane proteins. Conclusion We show that in a typical biosequence labeling problem the GRHCRF performs better than CRF models of the same complexity, indicating that GRHCRFs can be useful tools for biosequence analysis applications. Availability GRHCRF software is available under GPLv3 licence at the website http://www.biocomp.unibo.it/~savojard/biocrf-0.9.tar.gz.

  2. Hidden Markov model to predict the amino acid profile

    Science.gov (United States)

    Handamari, Endang Wahyu

    2017-12-01

    Sequence alignment is the basic method in sequence analysis, which is the process of composing or aligning two or more primary sequences so that the sequence similarity is apparent. One of the uses of this method is to predict the structure or function of an unknown protein by using a known protein information structure or function if the protein has the same sequence in database. Protein are macromolecules that make up more than half of the cell. Proteins are a chain of 20 amino acid combinations. Each type of protein has a unique number and sequence of amino acids. The method that can be applied for sequence alignment is the Genetic Algorithm, the other method is related to the Hidden Markov Model (HMM). The Hidden Markov Model (HMM) is a developmental form of the Markov Chain, which can be applied in cases that can not be directly observed. As Observed State (O) for sequence alignment is the sequence of amino acids in three categories: deletion, insertion and match. As for the Hidden State is the amino acid residue, which can determine the family protein corresponds to observation O.

  3. Exploring inequality violations by classical hidden variables numerically

    International Nuclear Information System (INIS)

    Vongehr, Sascha

    2013-01-01

    There are increasingly suggestions for computer simulations of quantum statistics which try to violate Bell type inequalities via classical, common cause correlations. The Clauser–Horne–Shimony–Holt (CHSH) inequality is very robust. However, we argue that with the Einstein–Podolsky–Rosen setup, the CHSH is inferior to the Bell inequality, although and because the latter must assume anti-correlation of entangled photon singlet states. We simulate how often quantum behavior violates both inequalities, depending on the number of photons. Violating Bell 99% of the time is argued to be an ideal benchmark. We present hidden variables that violate the Bell and CHSH inequalities with 50% probability, and ones which violate Bell 85% of the time when missing 13% anti-correlation. We discuss how to present the quantum correlations to a wide audience and conclude that, when defending against claims of hidden classicality, one should demand numerical simulations and insist on anti-correlation and the full amount of Bell violation. -- Highlights: •The widely assumed superiority of the CHSH fails in the EPR problem. •We simulate Bell type inequalities behavior depending on the number of photons. •The core of Bell’s theorem in the EPR setup is introduced in a simple way understandable to a wide audience. •We present hidden variables that violate both inequalities with 50% probability. •Algorithms have been supplied in form of Mathematica programs

  4. Persistent hair cell malfunction contributes to hidden hearing loss.

    Science.gov (United States)

    Mulders, Wilhelmina H A M; Chin, Ian L; Robertson, Donald

    2018-04-01

    Noise exposures that result in fully reversible changes in cochlear neural threshold can cause a reduced neural output at supra-threshold sound intensity. This so-called "hidden hearing loss" has been shown to be associated with selective degeneration of high threshold afferent nerve fiber-inner hair cell (IHC) synapses. However, the electrophysiological function of the IHCs themselves in hidden hearing loss has not been directly investigated. We have made round window (RW) measurements of cochlear action potentials (CAP) and summating potentials (SP) after two levels of a 10 kHz acoustic trauma. The more intense acoustic trauma lead to notch-like permanent threshold changes and both CAP and SP showed reductions in supra-threshold amplitudes at frequencies with altered thresholds as well as from fully recovered regions. However, the interpretation of the results in normal threshold regions was complicated by the likelihood of reduced contributions from adjacent regions with elevated thresholds. The milder trauma showed full recovery of all neural thresholds, but there was a persistent depression of the amplitudes of both CAP and SP in response to supra-threshold sounds. The effect on SP amplitude in particular shows that occult damage to hair cell transduction mechanisms can contribute to hidden hearing loss. Such damage could potentially affect the supra-threshold output properties of surviving primary afferent neurons. Copyright © 2018 Elsevier B.V. All rights reserved.

  5. Generalized single-hidden layer feedforward networks for regression problems.

    Science.gov (United States)

    Wang, Ning; Er, Meng Joo; Han, Min

    2015-06-01

    In this paper, traditional single-hidden layer feedforward network (SLFN) is extended to novel generalized SLFN (GSLFN) by employing polynomial functions of inputs as output weights connecting randomly generated hidden units with corresponding output nodes. The significant contributions of this paper are as follows: 1) a primal GSLFN (P-GSLFN) is implemented using randomly generated hidden nodes and polynomial output weights whereby the regression matrix is augmented by full or partial input variables and only polynomial coefficients are to be estimated; 2) a simplified GSLFN (S-GSLFN) is realized by decomposing the polynomial output weights of the P-GSLFN into randomly generated polynomial nodes and tunable output weights; 3) both P- and S-GSLFN are able to achieve universal approximation if the output weights are tuned by ridge regression estimators; and 4) by virtue of the developed batch and online sequential ridge ELM (BR-ELM and OSR-ELM) learning algorithms, high performance of the proposed GSLFNs in terms of generalization and learning speed is guaranteed. Comprehensive simulation studies and comparisons with standard SLFNs are carried out on real-world regression benchmark data sets. Simulation results demonstrate that the innovative GSLFNs using BR-ELM and OSR-ELM are superior to standard SLFNs in terms of accuracy, training speed, and structure compactness.

  6. Diurnal modulation due to self-interacting mirror and hidden sector dark matter

    International Nuclear Information System (INIS)

    Foot, R.

    2012-01-01

    Mirror and more generic hidden sector dark matter models can simultaneously explain the DAMA, CoGeNT and CRESST-II dark matter signals consistently with the null results of the other experiments. This type of dark matter can be captured by the Earth and shield detectors because it is self-interacting. This effect will lead to a diurnal modulation in dark matter detectors. We estimate the size of this effect for dark matter detectors in various locations. For a detector located in the northern hemisphere, this effect is expected to peak in April and can be detected for optimistic parameter choices. The diurnal variation is expected to be much larger for detectors located in the southern hemisphere. In particular, if the CoGeNT detector were moved to e.g. Sierra Grande, Argentina then a 5σ dark matter discovery would be possible in around 30 days of operation

  7. Hidden State Conditional Random Field for Abnormal Activity Recognition in Smart Homes

    Directory of Open Access Journals (Sweden)

    Yu Tong

    2015-03-01

    Full Text Available As the number of elderly people has increased worldwide, there has been a surge of research into assistive technologies to provide them with better care by recognizing their normal and abnormal activities. However, existing abnormal activity recognition (AAR algorithms rarely consider sub-activity relations when recognizing abnormal activities. This paper presents an application of the Hidden State Conditional Random Field (HCRF method to detect and assess abnormal activities that often occur in elderly persons’ homes. Based on HCRF, this paper designs two AAR algorithms, and validates them by comparing them with a feature vector distance based algorithm in two experiments. The results demonstrate that the proposed algorithms favorably outperform the competitor, especially when abnormal activities have same sensor type and sensor number as normal activities.

  8. A gamma-ray approach for hidden faults in the disaster zone of 1995 Kobe earthquake

    International Nuclear Information System (INIS)

    Terakado, Y.

    1997-01-01

    Gamma-ray intensities were measured of the ground on an eastern part of the Kobe urban area, where a strong earthquake occurred in January 1995 killing 6000 people, in order to investigate hidden faults and its relation to the damage of constructions. Several linear alignments of relatively high γ-ray intensity points were detected and at least some of them are considered to be ascribed to small-scale faults. It can be pointed out that the localities of such high γ-ray alignments are almost in accordance with those of relatively highly damaged zones. However, a long and distinct high γ-ray alignment as expected for a large fault which runs through the heavy damage belt does not exist beneath the area, supporting non-fault origin for the overall heavy damage belt. (author)

  9. Nondestructive surface profiling of hidden MEMS using an infrared low-coherence interferometric microscope

    Science.gov (United States)

    Krauter, Johann; Osten, Wolfgang

    2018-03-01

    There are a wide range of applications for micro-electro-mechanical systems (MEMS). The automotive and consumer market is the strongest driver for the growing MEMS industry. A 100 % test of MEMS is particularly necessary since these are often used for safety-related purposes such as the ESP (Electronic Stability Program) system. The production of MEMS is a fully automated process that generates 90 % of the costs during the packaging and dicing steps. Nowadays, an electrical test is carried out on each individual MEMS component before these steps. However, after encapsulation, MEMS are opaque to visible light and other defects cannot be detected. Therefore, we apply an infrared low-coherence interferometer for the topography measurement of those hidden structures. A lock-in algorithm-based method is shown to calculate the object height and to reduce ghost steps due to the 2π -unambiguity. Finally, measurements of different MEMS-based sensors are presented.

  10. The hidden sentinel node in breast cancer

    International Nuclear Information System (INIS)

    Tanis, P.J.; Sandick, J.W. van; Nieweg, O.E.; Rutgers, E.J.T.; Kroon, B.B.R.; Valdes Olmos, R.A.; Hoefnagel, C.A.

    2002-01-01

    The purpose of this study was to analyse the occurrence of non-visualisation during preoperative lymphoscintigraphy for sentinel node identification in breast cancer. Preoperative lymphoscintigraphy was performed in 495 clinically node-negative breast cancer patients (501 sentinel node procedures) after injection of technetium-99m nanocolloid. Anterior and prone lateral (hanging breast) planar images were obtained a few minutes and 4 h after injection. The sentinel node was intraoperatively identified with the aid of patent blue dye and a gamma-ray detection probe. A sentinel node was visualised on the 4-h images in 449 of 501 procedures (90%). This visualisation rate improved from 76% to 94% during the study period. Delayed imaging (5-23 h) in 19 patients whose sentinel nodes failed to show, resulted in visualisation in four of them. A repeat injection of radiocolloid in 11 patients revealed a sentinel node in six. In the end, the visualisation rate was 92%. The sentinel node was surgically retrieved in 24 of the remaining 42 patients with non-visualisation (57%). Sentinel nodes that were visualised were tumour-positive in 38% and non-visualised sentinel nodes were involved in 50% (χ 2 , P=0.17). In a multivariate regression analysis, scintigraphic non-visualisation was independently associated with increased patient age (P<0.001), decreased tracer dose (P<0.001) and increased number of tumour-positive lymph nodes (P=0.013). The use of a sufficient amount of radioactivity (at least 100 MBq) is recommended for lymphatic mapping in breast cancer, especially in elderly women. Delayed imaging and re-injection of the radioactive tracer increase the visualisation rate. The non-visualised sentinel node can be identified intraoperatively in more than half of the patients. (orig.)

  11. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  12. [Ficus benjamina--the hidden allergen in the house].

    Science.gov (United States)

    Schenkelberger, V; Freitag, M; Altmeyer, P

    1998-01-01

    The weeping fig, Ficus benjamina (Fb), is a relatively common indoor allergen. Many cases of perennial allergic rhinoconjunctivitis and allergic asthma caused by Fb hypersensitivity are not detected. These patients typically have proven sensitization to housedust mites and do not improve after avoidance of exposure (encasing) and specific immunotherapy. The number of Fb sensitizations is increasing in Germany, which can partly be explained by the cross-reactivity between Hevea brasiliensis (Hb) latex and Fb and the rapidly increasing number of mostly occupational latex allergies. But Fb itself is a potential sensitizer which is widely spread as ornamental plant in homes and offices. As relevant indoor allergen Fb ranks third after housedust mites and pets but before molds among our allergy patients. For diagnosis, prick-tests with Fb-latex seem to be more sensitive than in vitro-methods (RAST, CAPRAST). Fb plants should not be kept in the homes of atopic individuals or persons with latex (Hb) allergy.

  13. A hidden kind of suffering: female patient's complaints to Patient's Advisory Committee.

    Science.gov (United States)

    Söderberg, Siv; Olsson, Malin; Skär, Lisa

    2012-03-01

    The aim of this study was to describe female patients' experiences of dissatisfaction with healthcare. People who have been treated with dignity during healthcare encounters are more prone to report better adherence to treatment and higher satisfaction with their care. Good quality care is commonly described as individualized and related to individual needs. This study has a qualitative approach, as the aim was to describe female patients' experiences of dissatisfaction with healthcare from a first person perspective. A purposive sample of fourteen women was interviewed about their experiences of dissatisfaction with healthcare. The interviews were subjected to a qualitative content analysis. The findings show that the women were treated with indifference when they were being withheld information, felt distrusted, and when they were treated badly they did not receive an apology. The findings also show that the women experienced that they did not feel safe when they had no one liable to turn to within the healthcare when the encounter did not correspond to the women's needs and expectations. The women's experiences of being withheld explanations can be seen as a violation of their dignity and a hidden suffering from care. In conclusion, the study shows the importance of receiving a personal explanation after filing a complaint about healthcare and recommends that clinics that receive a complaint from a patient should contact that patient and provide an individualized explanation. © 2011 The Authors. Scandinavian Journal of Caring Sciences © 2011 Nordic College of Caring Science.

  14. THE INCREASE OF PERFORMANCE OF AN ENTITY BY THE CONVERSION OF THE HIDDEN COSTS

    OpenAIRE

    Sorin Briciu; Sorinel Capusneanu

    2011-01-01

    This article offers an intrinsic image of the hidden and identified costs at thelevel of an entity, including the causes and their ways of control. The main researchinstrument used here was the questionnaire and the results determined a better knowledge ofthe theoretical and methodological aspects necessary in order to identify the hidden costs atthe level of an entity. Several aspects of the hidden costs are discussed, as well as theircharacteristics, evaluation, causes and generating source...

  15. Hidden Markov Model Application to Transfer The Trader Online Forex Brokers

    Directory of Open Access Journals (Sweden)

    Farida Suharleni

    2012-05-01

    Full Text Available Hidden Markov Model is elaboration of Markov chain, which is applicable to cases that can’t directly observe. In this research, Hidden Markov Model is used to know trader’s transition to broker forex online. In Hidden Markov Model, observed state is observable part and hidden state is hidden part. Hidden Markov Model allows modeling system that contains interrelated observed state and hidden state. As observed state in trader’s transition to broker forex online is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online, whereas as hidden state is broker forex online Marketiva, Masterforex, Instaforex, FBS and Others. First step on application of Hidden Markov Model in this research is making construction model by making a probability of transition matrix (A from every broker forex online. Next step is making a probability of observation matrix (B by making conditional probability of five categories, that is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online and also need to determine an initial state probability (π from every broker forex online. The last step is using Viterbi algorithm to find hidden state sequences that is broker forex online sequences which is the most possible based on model and observed state that is the five categories. Application of Hidden Markov Model is done by making program with Viterbi algorithm using Delphi 7.0 software with observed state based on simulation data. Example: By the number of observation T = 5 and observed state sequences O = (2,4,3,5,1 is found hidden state sequences which the most possible with observed state O as following : where X1 = FBS, X2 = Masterforex, X3 = Marketiva, X4 = Others, and X5 = Instaforex.

  16. Hidden Costs of Hospital Based Delivery from Two Tertiary Hospitals in Western Nepal

    OpenAIRE

    Acharya, Jeevan; Kaehler, Nils; Marahatta, Sujan Babu; Mishra, Shiva Raj; Subedi, Sudarshan; Adhikari, Bipin

    2016-01-01

    Introduction Hospital based delivery has been an expensive experience for poor households because of hidden costs which are usually unaccounted in hospital costs. The main aim of this study was to estimate the hidden costs of hospital based delivery and determine the factors associated with the hidden costs. Methods A hospital based cross-sectional study was conducted among 384 post-partum mothers with their husbands/house heads during the discharge time in Manipal Teaching Hospital and Weste...

  17. Incremental discovery of hidden structure: Applications in theory of elementary particles

    International Nuclear Information System (INIS)

    Zytkow, J.M.; Fischer, P.J.

    1996-01-01

    Discovering hidden structure is a challenging, universal research task in Physics, Chemistry, Biology, and other disciplines. Not only must the elements of hidden structure be postulated by the discoverer, but they can only be verified by indirect evidence, at the level of observable objects. In this paper we describe a framework for hidden structure discovery, built on a constructive definition of hidden structure. This definition leads to operators that build models of hidden structure step by step, postulating hidden objects, their combinations and properties, reactions described in terms of hidden objects, and mapping between the hidden and the observed structure. We introduce the operator dependency diagram, which shows the order of operator application and model evaluation. Different observational knowledge supports different evaluation criteria, which lead to different search systems with verifiable sequences of operator applications. Isomorph-free structure generation is another issue critical for efficiency of search. We apply our framework in the system GELL-MANN, that hypothesizes hidden structure for elementary particles and we present the results of a large scale search for quark models

  18. Personality Disorders

    Science.gov (United States)

    Personality disorders are a group of mental illnesses. They involve long-term patterns of thoughts and behaviors that ... serious problems with relationships and work. People with personality disorders have trouble dealing with everyday stresses and problems. ...

  19. Finding an apprenticeship: The hidden curriculum and its social consequences

    Directory of Open Access Journals (Sweden)

    Gaele eGoastellec

    2015-09-01

    Full Text Available In Switzerland, the majority of students are oriented towards professional training after compulsory schooling. At this stage, one of the biggest challenges for them is to find an apprenticeship position. Matching supply and demand is a complex process that not only excludes some students from having direct access to professional training but also forces them to make early choices regarding their future sector of employment. So, how does one find an apprenticeship? And what do the students’ descriptions of their search for apprenticeships reveal about the institutional determinants of social inequalities at play in the system?Based on 29 interviews conducted in 2014 with 23 apprentices and 6 recruiters in the Canton of Vaud, this article interrogates how the dimensions of educational and social trajectories combine to affect access to apprenticeships and are accentuated by recruiters using a hidden curriculum during the recruitment process. A hidden curriculum consists of knowledge and skills not taught by the educational institution but which appear decisive in obtaining an apprenticeship. By analysing the contrasting experiences of students in their search for an apprenticeship, we identify four types of trajectories that explain different types of school-to-apprenticeship transitions. We show how these determinants are reinforced by the hidden curriculum of recruitment based on the soft skills of feeling, autonomy, anticipation and reflexivity that are assessed in the context of recruitment interactions. The discussion section debates how the criteria that appear to be used to identify the right apprentice tend to (reproduce inequalities between students. This not only depends on their academic results but also on their social and cultural skills, their ability to anticipate their choices and, more widely, their ability to be a subject in their recruitment search. The Subject is neither the individual, nor the self, but the work through

  20. A Hidden Markov Model of Daily Precipitation over Western Colombia.

    Science.gov (United States)

    Rojo Hernández, Julián; Lall, Upmanu; Mesa Sanchez, Oscar

    2017-04-01

    A Hidden Markov Model of Daily Precipitation over Western Colombia. The western Pacific coast of Colombia (Chocó Region) is among the rainiest on earth, largely due to low level jet activity and orographic lifting along the western Andes. A hidden Markov model (HMM) is used to characterize daily rainfall occurrence at 250 gauge stations over the Western Pacific coast and Andean plateau in Colombia during the wet season (September - November) from 1970 to 2015. Four ''hidden'' rainfall states are identified, with the first pair representing wet and dry conditions at all stations, and the second pair North-West to South-East gradients in rainfall occurrence. Using the ERA-Interim reanalysis data (1979-2012) we show that the first pair of states are associated with low level jet convergence and divergence, while the second pair is associated with South Atlantic Convergence Zone activity and local convection. The estimated daily state-sequence is characterized by a systematic seasonal evolution, together with considerable variability on intraseasonal and interannual time scales, exhibiting a strong relationship with ENSO. Finally, a nonhomogeneous HMM (NHMM) is then used to simulate daily precipitation occurrence at the 250 stations, using the ERA-Interim vertically integrated moisture flux anomalies (two weeks lagged) and monthly means of the sea surface temperatures (one month lagged). Simulations from the NHMM are found to reproduce the relationship between the ENSO and the western Colombian precipitation. The NHMM simulations are also able to capture interannual changes in daily rainfall occurrence and dry-wet frequencies at some individual stations. It is suggested that a) HMM provides a useful tool that contributes to characterizing the Colombian's Hydro-Meteorology and it's anomalies during the ENSO, and b) the NHMM is an important tool to produce station-scale daily rainfall sequence scenarios for input into hydrological models.

  1. Abdominal candidiasis is a hidden reservoir of echinocandin resistance.

    Science.gov (United States)

    Shields, Ryan K; Nguyen, M Hong; Press, Ellen G; Clancy, Cornelius J

    2014-12-01

    FKS mutant Candida isolates were recovered from 24% (6/25) of abdominal candidiasis patients exposed to echinocandin. Candida glabrata (29%) and Candida albicans (14%) mutants were identified. Multidrug-resistant bacteria were recovered from 83% of FKS mutant infections. Mutations were associated with prolonged echinocandin exposure (P = 0.01), breakthrough infections (P = 0.03), and therapeutic failures despite source control interventions (100%). Abdominal candidiasis is a hidden reservoir for the emergence of echinocandin-resistant Candida. Copyright © 2014, American Society for Microbiology. All Rights Reserved.

  2. Hidden symmetries of the Nambu-Goto action

    International Nuclear Information System (INIS)

    Duff, M.J.

    2006-01-01

    We organize the eight variables of the four-dimensional bosonic string (X-bar μ ,X 'μ ) into a 2x2x2 hypermatrix a AA'A'' and show that in signature (2,2) the Nambu-Goto Lagrangian is given by Deta where Det is Cayley's hyperdeterminant. This is invariant not only under [SL(2,R)] 3 but also under interchange of the indices A, A' and A''. This triality reveals hitherto hidden discrete symmetries of the Nambu-Goto action

  3. Hidden vortex lattices in a thermally paired superfluid

    International Nuclear Information System (INIS)

    Dahl, E. K.; Sudboe, A.; Babaev, E.

    2008-01-01

    We study the evolution of rotational response of a statistical mechanical model of two-component superfluid with a nondissipative drag interaction as the system undergoes a transition into a paired superfluid phase at finite temperature. The transition manifests itself in a change of (i) vortex-lattice symmetry and (ii) nature of the vortex state. Instead of a vortex lattice, the system forms a highly disordered tangle which constantly undergoes merger and reconnecting processes involving different types of vortices with a 'hidden' breakdown of translation symmetry

  4. Open and hidden charm production at RHIC and LHC

    Energy Technology Data Exchange (ETDEWEB)

    Vogt, R.

    2005-10-12

    We discuss aspects of open and hidden charm production in hadron-nucleus collisions at RHIC and LHC energies. We first discuss the extraction of the total charm cross section in lower energy collisions and how it compares to next-to-leading order quantum chromodynamics calculations. We then describe calculations of the transverse momentum distributions and their agreement with the shape of the measured STAR transverse momentum distributions. We next explain how shadowing and moderate nuclear absorption can explain the PHENIX J/{psi} dAu/pp ratios.

  5. Everyday calculus discovering the hidden math all around us

    CERN Document Server

    Fernandez, Oscar E

    2014-01-01

    Calculus. For some of us, the word conjures up memories of ten-pound textbooks and visions of tedious abstract equations. And yet, in reality, calculus is fun, accessible, and surrounds us everywhere we go. In Everyday Calculus, Oscar Fernandez shows us how to see the math in our coffee, on the highway, and even in the night sky. Fernandez uses our everyday experiences to skillfully reveal the hidden calculus behind a typical day's events. He guides us through how math naturally emerges from simple observations-how hot coffee cools down, for example-and in discussions of over fifty familia

  6. Exhibiting eugenics: response and resistance to a hidden history.

    Science.gov (United States)

    Brave, Ralph; Sylva, Kathryn

    2007-01-01

    Human Plants, Human Harvest: The Hidden History of California Eugenics is the first-ever exhibition on the history of eugenics in California. The disappearance of this history for half a century, and the consequent absence of a "collective menory", were the primary factors determining the exhibit's sttrcture and content. Responses to the exhibit confirmed that most visitors "never knew" about this history. The exhibit is described in some detail, with selected imagery from the exhibit reproduced. After the initial exhibition, responses of other museums and foundation officials revealed a continuing resistance to this history being publicly displayed, though the sources of resistance varied.

  7. The "Hidden Homeless" in Japan’s Contemporary Mobile Culture

    Directory of Open Access Journals (Sweden)

    Miya Yoshida

    2014-04-01

    Full Text Available Mobile telephony and all it ensues has frequently gained incredible attention due to the massive impacts, which has had on the organization of daily life as well as on popular and youth cultures. This has been widely discussed in recent years as one significant aspect of the changes brought by the device; however that is not all. Attributed to capitalism, there are other, very contemporary socio-political issues at stake around the mobile telephone, especially among the younger people. In my article, I will focus on one specific phenomenon in Japanese society where the media have taken to speaking of so-called "hidden homeless".

  8. Uncovering the Hidden Transaction Costs of Market Power

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai J.; Klein, Peter G.

    2018-01-01

    A central construct in competitive strategy research is market power, the ability to raise price above marginal cost. Positioning research focuses on attempts to build, protect, and exercise market power. However, this approach contains hidden assumptions about transaction costs. Parties made worse...... off by the exercise of market power can negotiate, bargain, form coalitions, and otherwise contract around the focal firm's attempts to appropriate monopoly profits—depending on transaction costs. We build on property rights economics to explain how transaction costs affect positioning and offer...

  9. Hidden Markov processes theory and applications to biology

    CERN Document Server

    Vidyasagar, M

    2014-01-01

    This book explores important aspects of Markov and hidden Markov processes and the applications of these ideas to various problems in computational biology. The book starts from first principles, so that no previous knowledge of probability is necessary. However, the work is rigorous and mathematical, making it useful to engineers and mathematicians, even those not interested in biological applications. A range of exercises is provided, including drills to familiarize the reader with concepts and more advanced problems that require deep thinking about the theory. Biological applications are t

  10. Discriminative training of self-structuring hidden control neural models

    DEFF Research Database (Denmark)

    Sørensen, Helge Bjarup Dissing; Hartmann, Uwe; Hunnerup, Preben

    1995-01-01

    This paper presents a new training algorithm for self-structuring hidden control neural (SHC) models. The SHC models were trained non-discriminatively for speech recognition applications. Better recognition performance can generally be achieved, if discriminative training is applied instead. Thus...... we developed a discriminative training algorithm for SHC models, where each SHC model for a specific speech pattern is trained with utterances of the pattern to be recognized and with other utterances. The discriminative training of SHC neural models has been tested on the TIDIGITS database...

  11. Blocking Underhand Attacks by Hidden Coalitions (Extended Version)

    OpenAIRE

    Cristani, Matteo; Karafili, Erisa; Viganò, Luca

    2010-01-01

    Similar to what happens between humans in the real world, in open multi-agent systems distributed over the Internet, such as online social networks or wiki technologies, agents often form coalitions by agreeing to act as a whole in order to achieve certain common goals. However, agent coalitions are not always a desirable feature of a system, as malicious or corrupt agents may collaborate in order to subvert or attack the system. In this paper, we consider the problem of hidden coalitions, wh...

  12. Diffraction efficiency and noise analysis of hidden image holograms

    DEFF Research Database (Denmark)

    Tamulevičius, Sigitas; Andrulevičius, Mindaugas; Puodžiukynas, Linas

    2017-01-01

    The simplified approach for analysis of hidden image holograms is discussed in this paper. Diffraction efficiency and signal to noise ratio of reconstructed images were investigated using direct measurements technique and digitized image analysis employing “ImageJ” software. All holograms were...... energy densities demonstrated improved diffraction efficiency and reduced signal to noise ratio of the reconstructed image. The best diffraction efficiency at sufficient signal to noise ratio was obtained using exposure energy density in the range from 150 to 200 J/m2 during the hologram writing process....

  13. Hidden-Markov-Model Analysis Of Telemanipulator Data

    Science.gov (United States)

    Hannaford, Blake; Lee, Paul

    1991-01-01

    Mathematical model and procedure based on hidden-Markov-model concept undergoing development for use in analysis and prediction of outputs of force and torque sensors of telerobotic manipulators. In model, overall task broken down into subgoals, and transition probabilities encode ease with which operator completes each subgoal. Process portion of model encodes task-sequence/subgoal structure, and probability-density functions for forces and torques associated with each state of manipulation encode sensor signals that one expects to observe at subgoal. Parameters of model constructed from engineering knowledge of task.

  14. Hidden Symmetries for Thermodynamics and Emergence of Relativity

    International Nuclear Information System (INIS)

    Zhao Liu

    2010-01-01

    Erik Verlinde recently proposed an idea about the thermodynamic origin of gravity. Though this is a beautiful idea, which may resolve many long standing problems in the theories of gravity, it also raises many other problems. In this article I will comment on some of the problems of Verlinde's proposal with special emphasis on the thermodynamical origin of the principle of relativity. It is found that there is a large group of hidden symmetries of thermodynamics, which contains the Poincare group of the spacetime for which space is emergent. This explains the thermodynamic origin of the principle of relativity. (general)

  15. Chloroatranol, an extremely potent allergen hidden in perfumes

    DEFF Research Database (Denmark)

    Johansen, J.D.; Andersen, Klaus Ejner; Svedman, C.

    2003-01-01

    Oak moss absolute is a long-known, popular natural extract widely used in perfumes. It is reported as the cause of allergic reactions in a significant number of those with perfume allergy. Oak moss absolute has been the target of recent research to identify its allergenic components. Recently....... The dose eliciting a reaction in 50% of the test subjects at patch testing was 0.2 p.p.m. In conclusion, the hidden exposure to a potent allergen widely used in perfumes has caused a highly sensitized cohort of individuals. Judged from the elicitation profile, chloroatranol is the most potent allergen...

  16. Desiring the Hidden God:Knowledge Without Belief

    OpenAIRE

    Perlmutter, Julian Felix

    2016-01-01

    This is the final version of the article. It first appeared from Akademos Press via https://doi.orghttps://doi.org/10.24204/ejpr.v8i4.1717 For many people, the phenomenon of divine hiddenness is so total that it is far from clear to them that God (roughly speaking, the God of Jewish and Christian tradition) exists at all. Reasonably enough, they therefore do not believe that God exists. Yet it is possible, whilst lacking belief in God’s reality, nonetheless to see it as a possi...

  17. Quantum interference of probabilities and hidden variable theories

    International Nuclear Information System (INIS)

    Srinivas, M.D.

    1984-01-01

    One of the fundamental contributions of Louis de Broglie, which does not get cited often, has been his analysis of the basic difference between the calculus of the probabilities as predicted by quantum theory and the usual calculus of probabilities - the one employed by most mathematicians, in its standard axiomatised version due to Kolmogorov. This paper is basically devoted to a discussion of the 'quantum interference of probabilities', discovered by de Broglie. In particular, it is shown that it is this feature of the quantum theoretic probabilities which leads to some serious constraints on the possible 'hidden-variable formulations' of quantum mechanics, including the celebrated theorem of Bell. (Auth.)

  18. Incompatible quantum measurements admitting a local-hidden-variable model

    Science.gov (United States)

    Quintino, Marco Túlio; Bowles, Joseph; Hirsch, Flavien; Brunner, Nicolas

    2016-05-01

    The observation of quantum nonlocality, i.e., quantum correlations violating a Bell inequality, implies the use of incompatible local quantum measurements. Here we consider the converse question. That is, can any set of incompatible measurements be used in order to demonstrate Bell inequality violation? Our main result is to construct a local hidden variable model for an incompatible set of qubit measurements. Specifically, we show that if Alice uses this set of measurements, then for any possible shared entangled state and any possible dichotomic measurements performed by Bob, the resulting statistics are local. This represents significant progress towards proving that measurement incompatibility does not imply Bell nonlocality in general.

  19. New ALPS results on hidden-sector lightweights

    International Nuclear Information System (INIS)

    Ehret, Klaus; Ghazaryan, Samvel; Frede, Maik

    2010-01-01

    The ALPS collaboration runs a ''Light Shining through a Wall'' (LSW) experiment to search for photon oscillations into ''Weakly Interacting Sub-eV Particles'' (WISPs) often predicted by extensions of the Standard Model. The experiment is set up around a superconducting HERA dipole magnet at the site of DESY. Due to several upgrades of the experiment we are able to place limits on the probability of photon-WISP-photon conversions of a few x 10 -25 . These limits result in today's most stringent laboratory constraints on the existence of low mass axion-like particles, hidden photons and minicharged particles. (orig.)

  20. How to Align the Hidden Curriculum of RM Education?

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2015-01-01

    Graduates are reputedly still leaving business school with poor morals, despite considerable focus on responsible management education? The ‘hidden curriculum’ (HC) directs the attention to the idea that what is taught in educational institutions is not necessarily what is actually learned. The HC...... operates through many areas of business schools, most notably in i) formal curriculum; ii) interaction; and iii) school governance. This means recognizing that changing curricula alone is not enough to bring about transformation in students’ moral attitudes because signals about appropriate conduct...

  1. Hidden attraction the history and mystery of magnetism

    CERN Document Server

    Verschuur, Gerrit L

    1993-01-01

    Long one of nature's most fascinating phenomena, magnetism was once the subject of many superstitions. Magnets were thought useful to thieves, effective as a love potion or as a cure for gout or spasms. They could remove sorcery from women and put demons to flight and even reconcile married couples. It was said that a lodestone pickled in the salt of sucking fish had the power to attract gold. Today, these beliefs have been put aside, but magnetism is no less remarkable for our modern understanding of it. In Hidden Attraction, Gerrit L. Verschuur, a noted astronomer and National Book Award nom

  2. 3.5 keV galactic emission line as a signal from the hidden sector

    Science.gov (United States)

    Chen, Ning; Liu, Zuowei; Nath, Pran

    2014-08-01

    An emission line with energy of E ˜3.5 keV has been observed in galaxy clusters by two experiments. The emission line is consistent with the decay of a dark matter particle with a mass of ˜7 keV. In this work we discuss the possibility that the dark particle responsible for the emission is a real scalar (ρ) which arises naturally in a U(1)X Stueckelberg extension of minimal supersymmetric standard model (MSSM). In the MSSM Stueckelberg extension ρ couples only to other scalars carrying a U(1)X quantum number. Under the assumption that there exists a vectorlike leptonic generation carrying both SU(2)L×U(1)Y and U(1)X quantum numbers, we compute the decay of the ρ into two photons via a triangle loop involving scalars. The relic density of the ρ arises via the decay H0→h0+ρ at the loop level involving scalars, and via the annihilation processes of the vectorlike scalars into ρ+h0. It is shown that the galactic data can be explained within a multicomponent dark matter model where the 7 keV dark matter is a subdominant component constituting only 1%-10% of the matter relic density, with the rest being supersymmetric dark matter such as the neutralino. Thus, the direct detection experiments remain viable searches for weakly interacting massive particles. The fact that the dark scalar ρ with no interactions with the standard model particles arises from a Stueckelberg extension of a hidden U(1)X implies that the 3.5 keV galactic line emission is a signal from the hidden sector.

  3. NMR in an electric field: A bulk probe of the hidden spin and orbital polarizations

    Science.gov (United States)

    Ramírez-Ruiz, Jorge; Boutin, Samuel; Garate, Ion

    2017-12-01

    Recent theoretical work has established the presence of hidden spin and orbital textures in nonmagnetic materials with inversion symmetry. Here, we propose that these textures can be detected by nuclear magnetic resonance (NMR) measurements carried out in the presence of an electric field. In crystals with hidden polarizations, a uniform electric field produces a staggered magnetic field that points to opposite directions at atomic sites related by spatial inversion. As a result, the NMR resonance peak corresponding to inversion partner nuclei is split into two peaks. The magnitude of the splitting is proportional to the electric field and depends on the orientation of the electric field with respect to the crystallographic axes and the external magnetic field. As a case study, we present a theory of electric-field-induced splitting of NMR peaks for 77Se,125Te, and 209Bi in Bi2Se3 and Bi2Te3 . In conducting samples with current densities of ≃106A/cm 2 , the splitting for Bi can reach 100 kHz , which is comparable to or larger than the intrinsic width of the NMR lines. In order to observe the effect experimentally, the peak splitting must also exceed the linewidth produced by the Oersted field. In Bi2Se3 , this requires narrow wires of radius ≲1 μ m . We also discuss other potentially more promising candidate materials, such as SrRuO3 and BaIr2Ge2 , whose crystal symmetry enables strategies to suppress the linewidth produced by the Oersted field.

  4. A simulation study of gene-by-environment interactions in GWAS implies ample hidden effects

    Science.gov (United States)

    Marigorta, Urko M.; Gibson, Greg

    2014-01-01

    The switch to a modern lifestyle in recent decades has coincided with a rapid increase in prevalence of obesity and other diseases. These shifts in prevalence could be explained by the release of genetic susceptibility for disease in the form of gene-by-environment (GxE) interactions. Yet, the detection of interaction effects requires large sample sizes, little replication has been reported, and a few studies have demonstrated environmental effects only after summing the risk of GWAS alleles into genetic risk scores (GRSxE). We performed extensive simulations of a quantitative trait controlled by 2500 causal variants to inspect the feasibility to detect gene-by-environment interactions in the context of GWAS. The simulated individuals were assigned either to an ancestral or a modern setting that alters the phenotype by increasing the effect size by 1.05–2-fold at a varying fraction of perturbed SNPs (from 1 to 20%). We report two main results. First, for a wide range of realistic scenarios, highly significant GRSxE is detected despite the absence of individual genotype GxE evidence at the contributing loci. Second, an increase in phenotypic variance after environmental perturbation reduces the power to discover susceptibility variants by GWAS in mixed cohorts with individuals from both ancestral and modern environments. We conclude that a pervasive presence of gene-by-environment effects can remain hidden even though it contributes to the genetic architecture of complex traits. PMID:25101110

  5. Personal Branding

    OpenAIRE

    Climent i Martí, Jordi

    2017-01-01

    Proyecto Fin de Grado leído en la Universidad Rey Juan Carlos en el curso académico 2013/2014. Director: Cristina Ayala del Pino Con este Trabajo Fin de Grado he querido aproximar el concepto del Personal Branding y de marca personal como la herramienta para diferenciarse en el entorno profesional. Partiendo con la definición del concepto, su construcción, el panorama actual, compaginar empleo con marca personal y acabando con la visión personal de un gurú de la Marca Person...

  6. Personality and personal network type

    NARCIS (Netherlands)

    Doeven-Eggens, Lilian; De Fruyt, Filip; Hendriks, A. A. Jolijn; Bosker, Roel J.; Van der Werf, Margaretha P. C.

    2008-01-01

    The association between personality and personal relationships is mostly studied within dyadic relationships. We examined these variables within the context of personal network types. We used Latent Class Analysis to identify groups Of Students with similar role relationships with three focal

  7. Invisible waves and hidden realms: augmented reality and experimental art

    Science.gov (United States)

    Ruzanka, Silvia

    2012-03-01

    Augmented reality is way of both altering the visible and revealing the invisible. It offers new opportunities for artistic exploration through virtual interventions in real space. In this paper, the author describes the implementation of two art installations using different AR technologies, one using optical marker tracking on mobile devices and one integrating stereoscopic projections into the physical environment. The first artwork, De Ondas y Abejas (The Waves and the Bees), is based on the widely publicized (but unproven) hypothesis of a link between cellphone radiation and the phenomenon of bee colony collapse disorder. Using an Android tablet, viewers search out small fiducial markers in the shape of electromagnetic waves hidden throughout the gallery, which reveal swarms of bees scattered on the floor. The piece also creates a generative soundscape based on electromagnetic fields. The second artwork, Urban Fauna, is a series of animations in which features of the urban landscape become plants and animals. Surveillance cameras become flocks of birds while miniature cellphone towers, lampposts, and telephone poles grow like small seedlings in time-lapse animation. The animations are presented as small stereoscopic projections, integrated into the physical space of the gallery. These two pieces explore the relationship between nature and technology through the visualization of invisible forces and hidden alternate realities.

  8. Hidden temporal order unveiled in stock market volatility variance

    Directory of Open Access Journals (Sweden)

    Y. Shapira

    2011-06-01

    Full Text Available When analyzed by standard statistical methods, the time series of the daily return of financial indices appear to behave as Markov random series with no apparent temporal order or memory. This empirical result seems to be counter intuitive since investor are influenced by both short and long term past market behaviors. Consequently much effort has been devoted to unveil hidden temporal order in the market dynamics. Here we show that temporal order is hidden in the series of the variance of the stocks volatility. First we show that the correlation between the variances of the daily returns and means of segments of these time series is very large and thus cannot be the output of random series, unless it has some temporal order in it. Next we show that while the temporal order does not show in the series of the daily return, rather in the variation of the corresponding volatility series. More specifically, we found that the behavior of the shuffled time series is equivalent to that of a random time series, while that of the original time series have large deviations from the expected random behavior, which is the result of temporal structure. We found the same generic behavior in 10 different stock markets from 7 different countries. We also present analysis of specially constructed sequences in order to better understand the origin of the observed temporal order in the market sequences. Each sequence was constructed from segments with equal number of elements taken from algebraic distributions of three different slopes.

  9. Searching hidden-sector photons inside a superconducting box

    International Nuclear Information System (INIS)

    Jaeckel, J.; Redondo, J.

    2008-01-01

    We propose an experiment to search for extra 'hidden-sector' U(1) gauge bosons with small gauge kinetic mixing with the ordinary photon, predicted by many extensions of the Standard Model. The setup consists of a highly sensitive magnetometer inside a superconducting shielding which are in turn placed inside a strong (but sub-critical) magnetic field. Photon - hidden sector - photon oscillations would allow the magnetic field to 'leak' into the shielded volume and register on the magnetometer. In our setup the magnetometer directly measures the field strength (∝χ 2 ), improving the sensitivity over 'light-shining-through-walls experiments which measure the regeneration probability (∝χ 4 ). In the mass range 2μeV ≤ m γ' ≤ 200 meV the projected sensitivity is in the χ ∼ 5*10 -9 to χ ∼ 10 -6 range. This surpasses current astrophysical and laboratory limits by several orders of magnitude - ample room to discover new physics. (authors)

  10. The Query Complexity of Finding a Hidden Permutation

    DEFF Research Database (Denmark)

    Afshani, Peyman; Afrawal, Manindra; Benjamin, Doerr

    2012-01-01

    We study the query complexity of determining a hidden permutation. More specifically, we study the problem of learning a secret (z) consisting of a binary string z of length n and a permutation of [n]. The secret must be unveiled by asking queries x01n , and for each query asked, we are returned ...... applications in many other query complexity problems.......We study the query complexity of determining a hidden permutation. More specifically, we study the problem of learning a secret (z) consisting of a binary string z of length n and a permutation of [n]. The secret must be unveiled by asking queries x01n , and for each query asked, we are returned...... the score fz(x) defined as fz(x):=maxi[0n]ji:z(j)=x(j); i.e., the length of the longest common prefix of x and z with respect to . The goal is to minimize the number of queries asked. Our main result are matching upper and lower bounds for this problem, both for deterministic and randomized query schemes...

  11. Hidden Markov latent variable models with multivariate longitudinal data.

    Science.gov (United States)

    Song, Xinyuan; Xia, Yemao; Zhu, Hongtu

    2017-03-01

    Cocaine addiction is chronic and persistent, and has become a major social and health problem in many countries. Existing studies have shown that cocaine addicts often undergo episodic periods of addiction to, moderate dependence on, or swearing off cocaine. Given its reversible feature, cocaine use can be formulated as a stochastic process that transits from one state to another, while the impacts of various factors, such as treatment received and individuals' psychological problems on cocaine use, may vary across states. This article develops a hidden Markov latent variable model to study multivariate longitudinal data concerning cocaine use from a California Civil Addict Program. The proposed model generalizes conventional latent variable models to allow bidirectional transition between cocaine-addiction states and conventional hidden Markov models to allow latent variables and their dynamic interrelationship. We develop a maximum-likelihood approach, along with a Monte Carlo expectation conditional maximization (MCECM) algorithm, to conduct parameter estimation. The asymptotic properties of the parameter estimates and statistics for testing the heterogeneity of model parameters are investigated. The finite sample performance of the proposed methodology is demonstrated by simulation studies. The application to cocaine use study provides insights into the prevention of cocaine use. © 2016, The International Biometric Society.

  12. Results from the solar hidden photon search (SHIPS)

    International Nuclear Information System (INIS)

    Schwarz, Matthias; Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Guenter; Redondo, Javier

    2015-02-01

    We present the results of a search for transversely polarised hidden photons (HPs) with ∝3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon<->HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m 2 at the 95%C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  13. Algorithmic information theory and the hidden variable question

    Science.gov (United States)

    Fuchs, Christopher

    1992-01-01

    The admissibility of certain nonlocal hidden-variable theories are explained via information theory. Consider a pair of Stern-Gerlach devices with fixed nonparallel orientations that periodically perform spin measurements on identically prepared pairs of electrons in the singlet spin state. Suppose the outcomes are recorded as binary strings l and r (with l sub n and r sub n denoting their n-length prefixes). The hidden-variable theories considered here require that there exists a recursive function which may be used to transform l sub n into r sub n for any n. This note demonstrates that such a theory cannot reproduce all the statistical predictions of quantum mechanics. Specifically, consider an ensemble of outcome pairs (l,r). From the associated probability measure, the Shannon entropies H sub n and H bar sub n for strings l sub n and pairs (l sub n, r sub n) may be formed. It is shown that such a theory requires that the absolute value of H bar sub n - H sub n be bounded - contrasting the quantum mechanical prediction that it grow with n.

  14. Analysis of changing hidden energy flow in Vietnam

    International Nuclear Information System (INIS)

    Nguyen Thi Anh Tuyet; Ishihara, Keiichi N.

    2006-01-01

    The energy consumption in production process is changing especially in developing countries by substituting technology. Input-output analysis for energy flows has been developing and is one of the best solutions for investigating macroscopic exchanges of both economy and energy. Since each element in the Leontief inverse contains both direct and indirect effects of any change in final demand, to separate those direct and indirect effects, the power series expansion is available. In this work, the changes of embodied energy intensity in Vietnam from 1996 to 2000 were analyzed using the structural decomposition and its power series expansion. By illustrating the change of causal relationship between direct energy consumption and embodied energy consumption, the change of hidden energy flow, which indicates how the changing embodied energy builds up the change of direct energy consumption in every sector, can be seen. In the case study, the rice processing sector, which is one of the important food processing sectors in Vietnam, is focused. By drawing a diagrammatic map for the change of hidden energy flow, it is clarified that in the case of raising embodied energy intensity, cultivation sector and trade and repaired service sector are the main contributors, and, on the contrary, in the case of reducing embodied energy intensity, paper pulp sector is the main contributor

  15. Results from the Solar Hidden Photon Search (SHIPS)

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany); Knabbe, Ernst-Axel; Lindner, Axel [Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, D-22607 Hamburg (Germany); Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik (Werner-Heisenberg-Institut), Föhringer Ring 6, D-80805 München (Germany); Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, D-22607 Hamburg (Germany); Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Günter [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany)

    2015-08-07

    We present the results of a search for transversely polarised hidden photons (HPs) with ∼3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon ↔ HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m{sup 2} at the 95% C.L. Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  16. Results from the Solar Hidden Photon Search (SHIPS)

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Schneide, Magnus; Susol, Jaroslaw; Wiedemann, Günter [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany); Knabbe, Ernst-Axel; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Notkestraße 85, D-22607 Hamburg (Germany); Redondo, Javier, E-mail: mschwarz@hs.uni-hamburg.de, E-mail: ernst-axel.knabbe@desy.de, E-mail: Axel-lindner@desy.de, E-mail: jredondo@unizar.es, E-mail: Andreas.Ringwald@desy.de, E-mail: mschneide@hs.uni-hamburg.de, E-mail: jsusol@hs.uni-hamburg.de, E-mail: gwiedemann@hs.uni-hamburg.de [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza (Spain)

    2015-08-01

    We present the results of a search for transversely polarised hidden photons (HPs) with ∼ 3 eV energies emitted from the Sun. These hypothetical particles, known also as paraphotons or dark sector photons, are theoretically well motivated for example by string theory inspired extensions of the Standard Model. Solar HPs of sub-eV mass can convert into photons of the same energy (photon ↔ HP oscillations are similar to neutrino flavour oscillations). At SHIPS this would take place inside a long light-tight high-vacuum tube, which tracks the Sun. The generated photons would then be focused into a low-noise photomultiplier at the far end of the tube. Our analysis of 330 h of data (and 330 h of background characterisation) reveals no signal of photons from solar hidden photon conversion. We estimate the rate of newly generated photons due to this conversion to be smaller than 25 mHz/m{sup 2} at the 95% C.L . Using this and a recent model of solar HP emission, we set stringent constraints on χ, the coupling constant between HPs and photons, as a function of the HP mass.

  17. Chaotic secure content-based hidden transmission of biometric templates

    International Nuclear Information System (INIS)

    Khan, Muhammad Khurram; Zhang Jiashu; Tian Lei

    2007-01-01

    The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature

  18. Raising awareness of the hidden curriculum in veterinary medical education: a review and call for research.

    Science.gov (United States)

    Whitcomb, Tiffany L

    2014-01-01

    The hidden curriculum is characterized by information that is tacitly conveyed to and among students about the cultural and moral environment in which they find themselves. Although the hidden curriculum is often defined as a distinct entity, tacit information is conveyed to students throughout all aspects of formal and informal curricula. This unconsciously communicated knowledge has been identified across a wide spectrum of educational environments and is known to have lasting and powerful impacts, both positive and negative. Recently, medical education research on the hidden curriculum of becoming a doctor has come to the forefront as institutions struggle with inconsistencies between formal and hidden curricula that hinder the practice of patient-centered medicine. Similarly, the complex ethical questions that arise during the practice and teaching of veterinary medicine have the potential to cause disagreement between what the institution sets out to teach and what is actually learned. However, the hidden curriculum remains largely unexplored for this field. Because the hidden curriculum is retained effectively by students, elucidating its underlying messages can be a key component of program refinement. A review of recent literature about the hidden curriculum in a variety of fields, including medical education, will be used to explore potential hidden curricula in veterinary medicine and draw attention to the need for further investigation.

  19. Review of hidden carbon emissions, trade, and labor income share in China, 2001–2011

    International Nuclear Information System (INIS)

    Wang, Shu-Hong; Song, Ma-Lin

    2014-01-01

    Coordinated development between the economy and the environment is currently one of the most important issues in China. By establishing models concerning labor income share and hidden carbon emissions, and taking trade as the link in their relationship, this study puts forward the scale effects, technological effects, and structural effects that relate to labor income share under the function of trade. We then establish multi-index and multi-indicator constitutive (MIMIC) equation to measure the ratio of hidden carbon emissions to total emissions, which is further considered the basis of the measurement model. Results of regression analysis carried out on labor income share show that hidden carbon emissions do have a positive effect on labor income share. In the meantime, we also prove that under scale effects, technological effects, and the structural effects of trade, hidden carbon emissions affect labor income shares in different directions. Our conclusions and policy implications are obtained from the calculated results. - Highlights: • This study establishes models concerning labor income share and hidden carbon emissions. • MIMIC is established to measure the ratio of hidden carbon emissions to total discharge. • Hidden carbon emissions have a positive effect on labor income share. • Hidden carbon emissions have various effects on the labor income share

  20. Limits of performance for the model reduction problem of hidden Markov models

    KAUST Repository

    Kotsalis, Georgios

    2015-12-15

    We introduce system theoretic notions of a Hankel operator, and Hankel norm for hidden Markov models. We show how the related Hankel singular values provide lower bounds on the norm of the difference between a hidden Markov model of order n and any lower order approximant of order n̂ < n.