WorldWideScience

Sample records for exploits traditional weakness

  1. WEAKNESSES OF THE MANAGEMENT SYSTEM OF TRADITIONAL HUNGARIAN UNIVERSITIES

    Directory of Open Access Journals (Sweden)

    Gabriella KECZER

    2008-01-01

    Full Text Available Transformation of the management of traditional higher education institutionsemerged in Hungary following the change of the political system in 1990,however, an appropriate answer has not been found to date. The first step inthe management of reform is identification of the issues that need to beresolved through the implementation of changes.The present research has been aimed at identifying the present weaknessesof the inner management system of traditional Hungarian universities, thusfind a solid starting point for reforming it. I conducted in-depth interviews inthe course of research, with 10 top university managers who represent 9institutions, thus the majority of traditional Hungarian universities. Such aresearch has not been made at least for the last decade.In my paper first I present the current legal framework of the system ofuniversity management. Then I give an assessment of it on the basis of theinterviews, analysing the deficiencies, the external and internal obstacles toefficient management I conclude that the present leaders of theuniversities can exactly identify those deficiencies of the system and therelated external and internal circumstances that lead to disturbed operationand low efficiency. The results obtained through the interviews suggest that areform of the internal management should rearrange intra-university powerrelations and harmonize scopes of responsibility and competence. A shifttoward a stronger central, rectoral and a more limited faculty- and bodyrelatedmanagement appears necessary.

  2. Exploiting Attribute Correlations: A Novel Trace Lasso-Based Weakly Supervised Dictionary Learning Method.

    Science.gov (United States)

    Wu, Lin; Wang, Yang; Pan, Shirui

    2017-12-01

    It is now well established that sparse representation models are working effectively for many visual recognition tasks, and have pushed forward the success of dictionary learning therein. Recent studies over dictionary learning focus on learning discriminative atoms instead of purely reconstructive ones. However, the existence of intraclass diversities (i.e., data objects within the same category but exhibit large visual dissimilarities), and interclass similarities (i.e., data objects from distinct classes but share much visual similarities), makes it challenging to learn effective recognition models. To this end, a large number of labeled data objects are required to learn models which can effectively characterize these subtle differences. However, labeled data objects are always limited to access, committing it difficult to learn a monolithic dictionary that can be discriminative enough. To address the above limitations, in this paper, we propose a weakly-supervised dictionary learning method to automatically learn a discriminative dictionary by fully exploiting visual attribute correlations rather than label priors. In particular, the intrinsic attribute correlations are deployed as a critical cue to guide the process of object categorization, and then a set of subdictionaries are jointly learned with respect to each category. The resulting dictionary is highly discriminative and leads to intraclass diversity aware sparse representations. Extensive experiments on image classification and object recognition are conducted to show the effectiveness of our approach.

  3. Array design considerations for exploitation of stable weakly dispersive modal pulses in the deep ocean

    Science.gov (United States)

    Udovydchenkov, Ilya A.

    2017-07-01

    Modal pulses are broadband contributions to an acoustic wave field with fixed mode number. Stable weakly dispersive modal pulses (SWDMPs) are special modal pulses that are characterized by weak dispersion and weak scattering-induced broadening and are thus suitable for communications applications. This paper investigates, using numerical simulations, receiver array requirements for recovering information carried by SWDMPs under various signal-to-noise ratio conditions without performing channel equalization. Two groups of weakly dispersive modal pulses are common in typical mid-latitude deep ocean environments: the lowest order modes (typically modes 1-3 at 75 Hz), and intermediate order modes whose waveguide invariant is near-zero (often around mode 20 at 75 Hz). Information loss is quantified by the bit error rate (BER) of a recovered binary phase-coded signal. With fixed receiver depths, low BERs (less than 1%) are achieved at ranges up to 400 km with three hydrophones for mode 1 with 90% probability and with 34 hydrophones for mode 20 with 80% probability. With optimal receiver depths, depending on propagation range, only a few, sometimes only two, hydrophones are often sufficient for low BERs, even with intermediate mode numbers. Full modal resolution is unnecessary to achieve low BERs. Thus, a flexible receiver array of autonomous vehicles can outperform a cabled array.

  4. The Impact of Tayub Exploitation on The Tradition and Life of Javanese Society

    Directory of Open Access Journals (Sweden)

    Noordiana Noordiana

    2017-01-01

    Full Text Available This study is aiming at finding out the impact of Tayub exploitation on the tradition and life of Javanese society. Research approach implemented in this study was qualitative. In addition, the research technique employed was interview, observation, documentation, and literary study. Results show that the new form of Tayub diminishes the structure of feminism, neglects simplicity, gentleness and spontaneity that are supposed to be part of Tayub dance. The movement of dance, music, and costume are also changed into a total different form, compared with the genuine version of Tayub dance. These major changes do not only bring negative impacts on the dance structure, but also change the society’s mindset and behavior. People living in the countryside part of Java have lost their control towards customs’ regulation and a philosophy that used to be held tightly by them.

  5. The Exploitation of the Traditional Component in Restructuring Modern Food Offer in Romania

    Directory of Open Access Journals (Sweden)

    Magdalena Bobe

    2016-11-01

    Full Text Available Food and eating habits, together with adjacent agricultural activities have had and an important role in the development of modern society and the individual itself. Besides its nutritional role, food has become a main socio-cultural determinant, food consumption patterns being influenced, on one hand, by psycho-sensory and quality characteristics of the food product and, on the other hand, by the physiological state of the consumer and its main determinants: traditions, religion and culture. These elements, together with economic considerations have a significant share in shaping the modern eating habits. In this context, the present paper aims to identify and analyze the main capitalization methods of the food’s traditional potential in reshaping the modern food offer, starting with a literature review and continuing with an exploratory analyze of the traditional food sector in Romania. Considering the main directions outlined by literature, this article tries to identify a set of specific features of the traditional food sector in Romania both in terms of producer and consumer perspectives. In this regard, an interview and an exploratory based questionnaire study were conducted. Having as a starting point the wide variety of Romanian food resources, this study aims to highlight how culinary customs have been modeled throughout history in order to establish eating patterns as an assessment method based on the impact of technological progress on the future alimentation.

  6. Applying traditional signal processing techniques to social media exploitation for situational understanding

    Science.gov (United States)

    Abdelzaher, Tarek; Roy, Heather; Wang, Shiguang; Giridhar, Prasanna; Al Amin, Md. Tanvir; Bowman, Elizabeth K.; Kolodny, Michael A.

    2016-05-01

    Signal processing techniques such as filtering, detection, estimation and frequency domain analysis have long been applied to extract information from noisy sensor data. This paper describes the exploitation of these signal processing techniques to extract information from social networks, such as Twitter and Instagram. Specifically, we view social networks as noisy sensors that report events in the physical world. We then present a data processing stack for detection, localization, tracking, and veracity analysis of reported events using social network data. We show using a controlled experiment that the behavior of social sources as information relays varies dramatically depending on context. In benign contexts, there is general agreement on events, whereas in conflict scenarios, a significant amount of collective filtering is introduced by conflicted groups, creating a large data distortion. We describe signal processing techniques that mitigate such distortion, resulting in meaningful approximations of actual ground truth, given noisy reported observations. Finally, we briefly present an implementation of the aforementioned social network data processing stack in a sensor network analysis toolkit, called Apollo. Experiences with Apollo show that our techniques are successful at identifying and tracking credible events in the physical world.

  7. [Discussion on exploitation of foreign traditional chinese medicine resources based on "the Belt and Road"].

    Science.gov (United States)

    Zhang, Xiao-Bo; Lyu, Dong-Mei; Huang, Lu-Qi; Li, Meng; Guo, Lan-Ping; Peng, Hua-Sheng

    2018-04-01

    At the beginning of the ancient "Silk Road", traditional Chinese medicine resources (TCM resources) have long been integrated into it, and it was once the "important part" of the ancient "Silk Road" in Chinese history, benefited from this, the political connections was strengthened, the economic and trade was developed, and Chinese medicine culture was spread. Before Qing Dynasty, people took out the "silk" and brought back "herbs" on the "Silk Road", which enriched China's medicinal resources. While in the later Qing Dynasty and the period of the Republic of China, more scientific and technological methods were brought back from abroad, and this in turn enriched the medical research methods. With more than 2 000 years' development, China's boundaries have changed countless times, therefore the word "Foreign" has different meanings in different historical periods. The import, development and utilization of foreign TCM resources is different in different historical periods, at present, with the continuous enhancement of China's comprehensiv national strength,especially the "Belt And Road" strategy, the communication and import of TCM resources with countries that participating in the "Belt and Road" initiativ became much easier. In order to actively respond to the "Belt and Road" initiative promote the development and utilization of foreign medicinal resources; serve people from the countries participating in the "Belt and Road" initiative we sorted out the foreign TCM resources from different periods in ancient and modern China, and based on this, we proposed the strategy of import of foreign TCM resources under the new situation, those are: "three levels, four steps, one support and one key". And "three levels" refers to intelligence collection level, field investigation level, scientific research level, "Four steps" refers to the original identification research, safety evaluation research, functional positioning research and medicinal properties research; "One

  8. The genus Sida L. - A traditional medicine: Its ethnopharmacological, phytochemical and pharmacological data for commercial exploitation in herbal drugs industry.

    Science.gov (United States)

    Dinda, Biswanath; Das, Niranjan; Dinda, Subhajit; Dinda, Manikarna; SilSarma, Indrajit

    2015-12-24

    Sida L. (Malvaceae) has been used for centuries in traditional medicines in different countries for the prevention and treatment of different diseases such as diarrhea, dysentery, gastrointestinal and urinary infections, malarial and other fevers, childbirth and miscarriage problems, skin ailments, cardiac and neural problems, asthma, bronchitis and other respiratory problems, weight loss aid, rheumatic and other inflammations, tuberculosis, etc. To assess the scientific evidence for therapeutic potential of Sida L. and to identify the gaps of future research needs. The available information on the ethnomedicinal uses, phytochemistry, pharmacology and toxicology of Sida species was collected via a library and electronic searches in SciFinder, PubMed, ScienceDirect, Google Scholar for the period, 1933-2015. A variety of ethnomedicinal uses of Sida species have been found in India, China, Afrian and American countries. Phytochemical investigation of this genus has resulted in identification of about 142 chemical constituents, among which alkaloids, flavonoids and ecdysteroids are the predominant groups. The crude extracts and isolates have exhibited a wide spectrum of in vitro and in vivo pharmacological effects involving antimicrobial, analgesic, anti-inflammatory, abortifacient, neuroprotective, cardiovascular and cardioprotective, antimalarial, antitubercular, antidiabetic and antiobesity, antioxidant and nephroprotective activities among others. Ethnopharmacological preparations containing Sida species as an ingredient in India, African and American countries possess good efficacy in health disorders. From the toxicity perspective, only three Sida species have been assessed and found safe for oral use in rats. Pharmacological results supported some of the uses of Sida species in the traditional medicine. Alkaloids, flavonoids, other phenolics and ecdysteroids were perhaps responsible for the activities of extracts of the plants of this genus. No clinical study

  9. Tradition

    DEFF Research Database (Denmark)

    Otto, Ton

    2016-01-01

    : beliefs, practices, institutions, and also things. In this sense, the meaning of the term in social research is very close to its usage in common language and is not always theoretically well developed (see Shils, 1971: 123). But the concept of tradition has also been central to major theoretical debates...... on the nature of social change, especially in connection with the notion of modernity. Here tradition is linked to various forms of agency as a factor of both stability and intentional change....

  10. Wideband Low Noise Amplifiers Exploiting Thermal Noise Cancellation

    NARCIS (Netherlands)

    Bruccoleri, F.; Klumperink, Eric A.M.; Nauta, Bram

    2005-01-01

    Low Noise Amplifiers (LNAs) are commonly used to amplify signals that are too weak for direct processing for example in radio or cable receivers. Traditionally, low noise amplifiers are implemented via tuned amplifiers, exploiting inductors and capacitors in resonating LC-circuits. This can render

  11. Bagging Weak Predictors

    DEFF Research Database (Denmark)

    Lukas, Manuel; Hillebrand, Eric

    Relations between economic variables can often not be exploited for forecasting, suggesting that predictors are weak in the sense that estimation uncertainty is larger than bias from ignoring the relation. In this paper, we propose a novel bagging predictor designed for such weak predictor variab...

  12. Elements of kitchen toxicology to exploit the value of traditional (African recipes: The case of Egusi Okra meal in the diet of HIV+/AIDS subjects

    Directory of Open Access Journals (Sweden)

    Chiara Frazzoli

    Full Text Available The Egusi Okra soup is a traditional African meal that is considered of high nutritional value and protective against weight loss. We introduce the concept of “kitchen toxicology” to analyse the recipe of the Egusi Okra soup and highlight possible mitigation measures for toxic and/or antinutritional effects in the wide spectrum of health and nutritional needs of HIV+/AIDS subjects. In particular, we focus on toxicants (environmental contaminants, process contaminants, substances leaching from food contact materials dysregulating the immune status, as well as on interactions between nutrients, contaminants, and/or antinutrients which may lead to secondary/conditioned nutritional deficiencies or imbalances; in their turn, these can modulate the ability to cope with toxicants, and increase nutritional requirements. Recommendations are given for practices preserving the Egusi Okra soup from such risk factors, identifying points of particular attention during meal preparation, from purchase of raw ingredients through to food handling, cooking, storage, and consumption. The Egusi Okra soup is discussed in the context of a diet that is asked to mitigate complications (weight loss, opportunistic infections and support antiretroviral therapy in African countries with high HIV/AIDS prevalence. The paper discusses how nutritional interventions benefit of the integration of kitchen toxicology practices in everyday life. Toxicological risk assessment is crucial to understand the history and status of the person exposed to or affected by infectious diseases. Keywords: Traditional diet, Malnutrition, Food safety, Weight loss, Immune system, Dysmetabolic diseases, Clinical toxicology, Nutrition security

  13. Redefining Exploitation

    DEFF Research Database (Denmark)

    Agarwala, Rina

    2016-01-01

    This article examines how self-employed workers are organizing in the garments and waste collection industries in India. Although the question of who is profiting from self-employed workers’ labor is complex, the cases outlined in this paper highlight telling instances of how some self......-employed workers are organizing as workers. They are fighting labor exploitation by redefining the concept to include additional exploitation axes (from the state and middle class) and forms (including sexual). In doing so, they are redefining potential solutions, including identities and material benefits, to fit...... their unique needs. By expanding the category of “workers” beyond those defined by a narrow focus on a standard employer-employee relationship, these movements are also fighting exclusion from earlier labor protections by increasing the number of entitled beneficiaries. These struggles provide an important...

  14. Weak currents

    International Nuclear Information System (INIS)

    Leite Lopes, J.

    1976-01-01

    A survey of the fundamental ideas on weak currents such as CVC and PCAC and a presentation of the Cabibbo current and the neutral weak currents according to the Salam-Weinberg model and the Glashow-Iliopoulos-Miami model are given [fr

  15. Weak decays

    International Nuclear Information System (INIS)

    Wojcicki, S.

    1978-11-01

    Lectures are given on weak decays from a phenomenological point of view, emphasizing new results and ideas and the relation of recent results to the new standard theoretical model. The general framework within which the weak decay is viewed and relevant fundamental questions, weak decays of noncharmed hadrons, decays of muons and the tau, and the decays of charmed particles are covered. Limitation is made to the discussion of those topics that either have received recent experimental attention or are relevant to the new physics. (JFP) 178 references

  16. Weak interactions

    International Nuclear Information System (INIS)

    Ogava, S.; Savada, S.; Nakagava, M.

    1983-01-01

    The problem of the use of weak interaction laws to study models of elementary particles is discussed. The most typical examples of weak interaction is beta-decay of nucleons and muons. Beta-interaction is presented by quark currents in the form of universal interaction of the V-A type. Universality of weak interactions is well confirmed using as examples e- and μ-channels of pion decay. Hypothesis on partial preservation of axial current is applicable to the analysis of processes with pion participation. In the framework of the model with four flavours lepton decays of hadrons are considered. Weak interaction without lepton participation are also considered. Properties of neutral currents are described briefly

  17. Weak interactions

    International Nuclear Information System (INIS)

    Chanda, R.

    1981-01-01

    The theoretical and experimental evidences to form a basis for Lagrangian Quantum field theory for Weak Interactions are discussed. In this context, gauge invariance aspects of such interactions are showed. (L.C.) [pt

  18. Weak interactions

    International Nuclear Information System (INIS)

    Bjorken, J.D.

    1978-01-01

    Weak interactions are studied from a phenomenological point of view, by using a minimal number of theoretical hypotheses. Charged-current phenomenology, and then neutral-current phenomenology are discussed. This all is described in terms of a global SU(2) symmetry plus an electromagnetic correction. The intermediate-boson hypothesis is introduced and lower bounds on the range of the weak force are inferred. This phenomenology does not yet reconstruct all the predictions of the conventional SU(2)xU(1) gauge theory. To do that requires an additional assumption of restoration of SU(2) symmetry at asymptotic energies

  19. The exploitation argument against commercial surrogacy.

    Science.gov (United States)

    Wilkinson, Stephen

    2003-04-01

    This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships.

  20. Weak relativity

    CERN Document Server

    Selleri, Franco

    2015-01-01

    Weak Relativity is an equivalent theory to Special Relativity according to Reichenbach’s definition, where the parameter epsilon equals to 0. It formulates a Neo-Lorentzian approach by replacing the Lorentz transformations with a new set named “Inertial Transformations”, thus explaining the Sagnac effect, the twin paradox and the trip from the future to the past in an easy and elegant way. The cosmic microwave background is suggested as a possible privileged reference system. Most importantly, being a theory based on experimental proofs, rather than mutual consensus, it offers a physical description of reality independent of the human observation.

  1. The Ethics of Exploitation

    Directory of Open Access Journals (Sweden)

    Paul McLaughlin

    2008-11-01

    Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.

  2. Exploiting Weaknesses: An Approach to Counter Cartel Strategy

    Science.gov (United States)

    2011-12-01

    Surveillance MISO Military Information Support Operations MSB Money Services Businesses NAFTA North American Free Trade Agreement NHRC National...structure. Finally, the last phase constitutes the development of a pragmatic disruption strategy against the financial practices, key terrain and...Forces Unconventional Warfare manual defines an insurgency as, “An organized movement aimed at the overthrow of a constituted government through use of

  3. Exploit Kit traffic analysis

    OpenAIRE

    Καπίρης, Σταμάτης; Kapiris, Stamatis

    2017-01-01

    Exploit kits have become one of the most widespread and destructive threat that Internet users face on a daily basis. Since the first actor, which has been categorized as exploit kit, namely MPack, appeared in 2006, we have seen a new era on exploit kit variants compromising popular websites, infecting hosts and delivering destructive malware, following an exponentially evolvement to date. With the growing threat landscape, large enterprises to domestic networks, have starte...

  4. Exploitability Assessment with TEASER

    Science.gov (United States)

    2017-05-01

    for architectural neutral taint analysis on top of LLVM and QEMU. POC Proof of Concept : Demonstration of an exploit on a program . vii RCE Remote Code...bug with a Proof of Concept (POC), or input to a program demonstrating the ability to use a bug to exploit the application, to demonstrate the...often leads to either computationally difficult constraint solving problems or taint explosion. Given the computational difficulty of exploit

  5. Weak values in collision theory

    Science.gov (United States)

    de Castro, Leonardo Andreta; Brasil, Carlos Alexandre; Napolitano, Reginaldo de Jesus

    2018-05-01

    Weak measurements have an increasing number of applications in contemporary quantum mechanics. They were originally described as a weak interaction that slightly entangled the translational degrees of freedom of a particle to its spin, yielding surprising results after post-selection. That description often ignores the kinetic energy of the particle and its movement in three dimensions. Here, we include these elements and re-obtain the weak values within the context of collision theory by two different approaches, and prove that the results are compatible with each other and with the results from the traditional approach. To provide a more complete description, we generalize weak values into weak tensors and use them to provide a more realistic description of the Stern-Gerlach apparatus.

  6. Anthropology of sexual exploitation

    Directory of Open Access Journals (Sweden)

    Lalić Velibor

    2009-01-01

    Full Text Available In this paper, the authors observe sexual exploitation from an anthropological perspective. They analyze the rational, ethical, emotional and mythological dimensions of human sexuality. Consequently, after setting the phenomenon in a social and historical context, sexual exploitation is closely observed in the contemporary age. Based on thoughts of relevant thinkers, they make the conclusion that the elimination of sexual exploitation is not an utterly legal issue, but political and economical issues as well. Namely, legal norms are not sufficient to overcome sexual exploitation, but, political and economical relationships in contemporary societies, which will be based on sincere equal opportunities must be established.

  7. Exploitation and disadvantage

    NARCIS (Netherlands)

    Ferguson, B.

    2016-01-01

    According to some accounts of exploitation, most notably Ruth Sample's (2003) degradation-based account and Robert Goodin's (1987) vulnerability-based account, exploitation occurs when an advantaged party fails to constrain their advantage in light of another's disadvantage, regardless of the cause

  8. EXPLOITATION OF GRANITE BOULDER

    Directory of Open Access Journals (Sweden)

    Ivan Cotman

    1994-12-01

    Full Text Available The processes of forming, petrography, features, properties and exploitation of granite boulders are described. The directional drilling and black powder blasting is the succesful method in exploitation of granite boulders (boulder technology (the paper is published in Croatian.

  9. Poverty-Exploitation-Alienation.

    Science.gov (United States)

    Bronfenbrenner, Martin

    1980-01-01

    Illustrates how knowledge derived from the discipline of economics can be used to help shed light on social problems such as poverty, exploitation, and alienation, and can help decision makers form policy to minimize these and similar problems. (DB)

  10. Reconstructing weak values without weak measurements

    International Nuclear Information System (INIS)

    Johansen, Lars M.

    2007-01-01

    I propose a scheme for reconstructing the weak value of an observable without the need for weak measurements. The post-selection in weak measurements is replaced by an initial projector measurement. The observable can be measured using any form of interaction, including projective measurements. The reconstruction is effected by measuring the change in the expectation value of the observable due to the projector measurement. The weak value may take nonclassical values if the projector measurement disturbs the expectation value of the observable

  11. Exploiting VM/XA

    International Nuclear Information System (INIS)

    Boeheim, C.

    1990-03-01

    The Stanford Linear Accelerator Center has recently completed a conversion to IBM's VM/XA SP Release 2 operating system. The primary physics application had been constrained by the previous 16 megabyte memory limit. Work is underway to enable this application to exploit the new features of VM/XA. This paper presents a brief tutorial on how to convert an application to exploit VM/XA and discusses some of the SLAC experiences in doing so. 13 figs

  12. Co-Labeling for Multi-View Weakly Labeled Learning.

    Science.gov (United States)

    Xu, Xinxing; Li, Wen; Xu, Dong; Tsang, Ivor W

    2016-06-01

    It is often expensive and time consuming to collect labeled training samples in many real-world applications. To reduce human effort on annotating training samples, many machine learning techniques (e.g., semi-supervised learning (SSL), multi-instance learning (MIL), etc.) have been studied to exploit weakly labeled training samples. Meanwhile, when the training data is represented with multiple types of features, many multi-view learning methods have shown that classifiers trained on different views can help each other to better utilize the unlabeled training samples for the SSL task. In this paper, we study a new learning problem called multi-view weakly labeled learning, in which we aim to develop a unified approach to learn robust classifiers by effectively utilizing different types of weakly labeled multi-view data from a broad range of tasks including SSL, MIL and relative outlier detection (ROD). We propose an effective approach called co-labeling to solve the multi-view weakly labeled learning problem. Specifically, we model the learning problem on each view as a weakly labeled learning problem, which aims to learn an optimal classifier from a set of pseudo-label vectors generated by using the classifiers trained from other views. Unlike traditional co-training approaches using a single pseudo-label vector for training each classifier, our co-labeling approach explores different strategies to utilize the predictions from different views, biases and iterations for generating the pseudo-label vectors, making our approach more robust for real-world applications. Moreover, to further improve the weakly labeled learning on each view, we also exploit the inherent group structure in the pseudo-label vectors generated from different strategies, which leads to a new multi-layer multiple kernel learning problem. Promising results for text-based image retrieval on the NUS-WIDE dataset as well as news classification and text categorization on several real-world multi

  13. Dissemination and Exploitation Strategy

    DEFF Research Database (Denmark)

    Badger, Merete; Monaco, Lucio; Fransson, Torsten

    of Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy...... for project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...

  14. Managing the Innovators for Exploration and Exploitation

    Directory of Open Access Journals (Sweden)

    C. Annique UN

    2007-09-01

    Full Text Available I analyze how to manage employees to achieve a balance between exploration and exploitation in large established firms. Previous studies suggest that, although firms need to undertake both exploration and exploitation simultaneously, this is difficult either because of the scarcity of resources or because of the incompatibility of these two processes. Proposed solutions have been ambidexterity, punctuated equilibrium or specialization. I suggest another method: managing employees. Specifically, I argue that using the so-called “innovative” system of human resource management practices, consisting of team-based incentive system, team-based job design, and job rotation, enables the firm to undertake exploration and exploitation simultaneously because it provides the psychological safety for people to explore new knowledge to make novel products and develops employees to have the perspective-taking capability that enables the integration of knowledge cross-functionally for efficiency. Using the so-called “traditional” system of human resource management practices, consisting of individual-based incentive system, individual-based job design, and no job rotation, has limited impact on either exploration or exploitation because it does not create the psychological safety for people to explore new knowledge and does not develop the perspective-taking capability needed for exploitation. Moreover, mixing practices from both systems is better than only using the traditional system in achieving exploration or exploitation, but less effective than only using the innovative system as the mix of practices can create inconsistent expectations on employees.

  15. Exploitation in International Paid Surrogacy Arrangements

    Science.gov (United States)

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly‐paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty. PMID:27471338

  16. Exploitation in International Paid Surrogacy Arrangements.

    Science.gov (United States)

    Wilkinson, Stephen

    2016-05-01

    Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly-paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty.

  17. A Systematic Approach to Higher-Order Parabolic Propagation in a Weakly Range-Dependent Duct

    National Research Council Canada - National Science Library

    Gragg, Robert F

    2005-01-01

    Energy-conserving transformations are exploited to split a monochromatic field in a weakly inhomogeneous waveguide into a pair of components that undergo uncoupled parabolic propagation in opposite...

  18. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  19. Nanostructured Basaltfiberconcrete Exploitational Characteristics

    Science.gov (United States)

    Saraykina, K. A.; Shamanov, V. A.

    2017-11-01

    The article demonstrates that the mass use of basalt fiber concrete (BFC) is constrained by insufficient study of their durability and serviceability in a variety of environments. This research is aimed at the study of the basalt fiber corrosion processes in the cement stone of BFC, the control of the new products structure formation in order to protect the reinforcing fiber from alkaline destruction and thereby improve the exploitational characteristics of the composite. The research result revealed that the modification of basaltfiber concrete by the dispersion of MWNTs contributes to the directional formation of new products in the cement matrix. The HAM additive in basaltfiberconcrete provides for the binding of portlandite to low-basic calcium hydroaluminosilicates, thus reducing the aggressive effect of the cement environment on the reinforcing fibers properties. The complex modification of BFC with nanostructured additives provides for an increase in its durability and exploitational properties (strength, frost resistance and water resistance) due to basalt fiber protection from alkali corrosion on account of the compacting of the contact zone “basalt fiber - cement stone” and designing of the new products structure and morphology of cement matrix over the fiber surface.

  20. Weakly clopen functions

    International Nuclear Information System (INIS)

    Son, Mi Jung; Park, Jin Han; Lim, Ki Moon

    2007-01-01

    We introduce a new class of functions called weakly clopen function which includes the class of almost clopen functions due to Ekici [Ekici E. Generalization of perfectly continuous, regular set-connected and clopen functions. Acta Math Hungar 2005;107:193-206] and is included in the class of weakly continuous functions due to Levine [Levine N. A decomposition of continuity in topological spaces. Am Math Mon 1961;68:44-6]. Some characterizations and several properties concerning weakly clopenness are obtained. Furthermore, relationships among weak clopenness, almost clopenness, clopenness and weak continuity are investigated

  1. Weak value controversy

    Science.gov (United States)

    Vaidman, L.

    2017-10-01

    Recent controversy regarding the meaning and usefulness of weak values is reviewed. It is argued that in spite of recent statistical arguments by Ferrie and Combes, experiments with anomalous weak values provide useful amplification techniques for precision measurements of small effects in many realistic situations. The statistical nature of weak values is questioned. Although measuring weak values requires an ensemble, it is argued that the weak value, similarly to an eigenvalue, is a property of a single pre- and post-selected quantum system. This article is part of the themed issue `Second quantum revolution: foundational questions'.

  2. Exploiting Non-Markovianity for Quantum Control.

    Science.gov (United States)

    Reich, Daniel M; Katz, Nadav; Koch, Christiane P

    2015-07-22

    Quantum technology, exploiting entanglement and the wave nature of matter, relies on the ability to accurately control quantum systems. Quantum control is often compromised by the interaction of the system with its environment since this causes loss of amplitude and phase. However, when the dynamics of the open quantum system is non-Markovian, amplitude and phase flow not only from the system into the environment but also back. Interaction with the environment is then not necessarily detrimental. We show that the back-flow of amplitude and phase can be exploited to carry out quantum control tasks that could not be realized if the system was isolated. The control is facilitated by a few strongly coupled, sufficiently isolated environmental modes. Our paradigmatic example considers a weakly anharmonic ladder with resonant amplitude control only, restricting realizable operations to SO(N). The coupling to the environment, when harnessed with optimization techniques, allows for full SU(N) controllability.

  3. Exploitation by Economic Necessity

    Directory of Open Access Journals (Sweden)

    Kristian F. Braekkan

    2015-10-01

    Full Text Available This study develops and tests a model that proposes economic necessity moderates the relationship between psychological contract violations (PCVs and organizational commitment and trust in the employing organization among non-unionized manufacturing workers (N = 226. Moderated regression analyses revealed that there was a significant interaction between PCV and economic necessity in predicting both outcomes. Specifically, the findings indicated that individuals experiencing high PCV and high economic necessity did not decrease their organizational commitment like their counterparts who endorsed lower economic necessity. They did, however, experience significantly decreased trust in their employer. The findings suggest that individuals who are forced to sell their labor power and obtain what they need through the market are more likely to continue to be exploited by their employer, as they have no other options than to continue the relationship. The importance of the findings is discussed, and recommendations for future research are provided.

  4. Exploitative Learning by Exporting

    DEFF Research Database (Denmark)

    Golovko, Elena; Lopes Bento, Cindy; Sofka, Wolfgang

    Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies...... and learning about new markets ? R&D investments and marketing investments, in search of novel insights into the content and process underlying learning by exporting. We draw from organizational learning theory for predicting changes in both R&D and marketing investment patterns that accompany firm entry......, it is predominantly the marketing-related investment decisions associated with starting to export that lead to increases in firm productivity. We conclude that learning-by-exporting might be more properly characterized as ?learning about and exploiting new markets? rather than ?learning about new technologies...

  5. Exploiting Redundancy in an OFDM SDR Receiver

    Directory of Open Access Journals (Sweden)

    Tomas Palenik

    2009-01-01

    Full Text Available Common OFDM system contains redundancy necessary to mitigate interblock interference and allows computationally effective single-tap frequency domain equalization in receiver. Assuming the system implements an outer error correcting code and channel state information is available in the receiver, we show that it is possible to understand the cyclic prefix insertion as a weak inner ECC encoding and exploit the introduced redundancy to slightly improve error performance of such a system. In this paper, an easy way to implement modification to an existing SDR OFDM receiver is presented. This modification enables the utilization of prefix redundancy, while preserving full compatibility with existing OFDM-based communication standards.

  6. Learning Metasploit exploitation and development

    CERN Document Server

    Balapure, Aditya

    2013-01-01

    A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st

  7. Second class weak currents

    International Nuclear Information System (INIS)

    Delorme, J.

    1978-01-01

    The definition and general properties of weak second class currents are recalled and various detection possibilities briefly reviewed. It is shown that the existing data on nuclear beta decay can be consistently analysed in terms of a phenomenological model. Their implication on the fundamental structure of weak interactions is discussed [fr

  8. Weak C* Hopf Symmetry

    OpenAIRE

    Rehren, K. -H.

    1996-01-01

    Weak C* Hopf algebras can act as global symmetries in low-dimensional quantum field theories, when braid group statistics prevents group symmetries. Possibilities to construct field algebras with weak C* Hopf symmetry from a given theory of local observables are discussed.

  9. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  10. Profits and Exploitation: A Reappraisal

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2011-01-01

    This paper provides a mathematical analysis of the Marxian theory of the exploitation of labour in general equilibrium models. The two main definitions of Marxian exploitation in the literature, proposed by Morishima (1974) and Roemer (1982), respectively, are analysed in the context of general convex economies. It is shown that, contrary to the received view, in general these definitions do not preserve the so-called Fundamental Marxian Theorem (FMT), which states that the exploitation of la...

  11. Electro-weak theory

    International Nuclear Information System (INIS)

    Deshpande, N.G.

    1980-01-01

    By electro-weak theory is meant the unified field theory that describes both weak and electro-magnetic interactions. The development of a unified electro-weak theory is certainly the most dramatic achievement in theoretical physics to occur in the second half of this century. It puts weak interactions on the same sound theoretical footing as quantum elecrodynamics. Many theorists have contributed to this development, which culminated in the works of Glashow, Weinberg and Salam, who were jointly awarded the 1979 Nobel Prize in physics. Some of the important ideas that contributed to this development are the theory of beta decay formulated by Fermi, Parity violation suggested by Lee and Yang, and incorporated into immensely successful V-A theory of weak interactions by Sudarshan and Marshak. At the same time ideas of gauge invariance were applied to weak interaction by Schwinger, Bludman and Glashow. Weinberg and Salam then went one step further and wrote a theory that is renormalizable, i.e., all higher order corrections are finite, no mean feat for a quantum field theory. The theory had to await the development of the quark model of hadrons for its completion. A description of the electro-weak theory is given

  12. Weakly supervised classification in high energy physics

    International Nuclear Information System (INIS)

    Dery, Lucio Mwinmaarong; Nachman, Benjamin; Rubbo, Francesco; Schwartzman, Ariel

    2017-01-01

    As machine learning algorithms become increasingly sophisticated to exploit subtle features of the data, they often become more dependent on simulations. This paper presents a new approach called weakly supervised classification in which class proportions are the only input into the machine learning algorithm. Using one of the most challenging binary classification tasks in high energy physics — quark versus gluon tagging — we show that weakly supervised classification can match the performance of fully supervised algorithms. Furthermore, by design, the new algorithm is insensitive to any mis-modeling of discriminating features in the data by the simulation. Weakly supervised classification is a general procedure that can be applied to a wide variety of learning problems to boost performance and robustness when detailed simulations are not reliable or not available.

  13. Weakly supervised classification in high energy physics

    Energy Technology Data Exchange (ETDEWEB)

    Dery, Lucio Mwinmaarong [Physics Department, Stanford University,Stanford, CA, 94305 (United States); Nachman, Benjamin [Physics Division, Lawrence Berkeley National Laboratory,1 Cyclotron Rd, Berkeley, CA, 94720 (United States); Rubbo, Francesco; Schwartzman, Ariel [SLAC National Accelerator Laboratory, Stanford University,2575 Sand Hill Rd, Menlo Park, CA, 94025 (United States)

    2017-05-29

    As machine learning algorithms become increasingly sophisticated to exploit subtle features of the data, they often become more dependent on simulations. This paper presents a new approach called weakly supervised classification in which class proportions are the only input into the machine learning algorithm. Using one of the most challenging binary classification tasks in high energy physics — quark versus gluon tagging — we show that weakly supervised classification can match the performance of fully supervised algorithms. Furthermore, by design, the new algorithm is insensitive to any mis-modeling of discriminating features in the data by the simulation. Weakly supervised classification is a general procedure that can be applied to a wide variety of learning problems to boost performance and robustness when detailed simulations are not reliable or not available.

  14. Weak interactions with nuclei

    International Nuclear Information System (INIS)

    Walecka, J.D.

    1983-01-01

    Nuclei provide systems where the strong, electomagnetic, and weak interactions are all present. The current picture of the strong interactions is based on quarks and quantum chromodynamics (QCD). The symmetry structure of this theory is SU(3)/sub C/ x SU(2)/sub W/ x U(1)/sub W/. The electroweak interactions in nuclei can be used to probe this structure. Semileptonic weak interactions are considered. The processes under consideration include beta decay, neutrino scattering and weak neutral-current interactions. The starting point in the analysis is the effective Lagrangian of the Standard Model

  15. Consensual exploitation : the moral wrong in exploitation and legal restrictions on consensual exploitative transactions

    OpenAIRE

    van der Neut, Wendy

    2014-01-01

    This thesis is about so-­‐called consensual exploitative transactions: transactions to which all parties agree voluntarily, and which are beneficial for all parties, but which are still widely considered exploitative, and for that reason legally restricted in many countries. The thesis asks two main questions: 1. What is wrong with consensual exploitation? 2.What implications does the answer to this question have for the legal restriction of consensual transactions ...

  16. History of Weak Interactions

    Science.gov (United States)

    Lee, T. D.

    1970-07-01

    While the phenomenon of beta-decay was discovered near the end of the last century, the notion that the weak interaction forms a separate field of physical forces evolved rather gradually. This became clear only after the experimental discoveries of other weak reactions such as muon-decay, muon-capture, etc., and the theoretical observation that all these reactions can be described by approximately the same coupling constant, thus giving rise to the notion of a universal weak interaction. Only then did one slowly recognize that the weak interaction force forms an independent field, perhaps on the same footing as the gravitational force, the electromagnetic force, and the strong nuclear and sub-nuclear forces.

  17. Hunting the weak bosons

    International Nuclear Information System (INIS)

    Anon.

    1979-01-01

    The possibility of the production of weak bosons in the proton-antiproton colliding beam facilities which are currently being developed, is discussed. The production, decay and predicted properties of these particles are described. (W.D.L.).

  18. Charged weak currents

    International Nuclear Information System (INIS)

    Turlay, R.

    1979-01-01

    In this review of charged weak currents I shall concentrate on inclusive high energy neutrino physics. There are surely still things to learn from the low energy weak interaction but I will not discuss it here. Furthermore B. Tallini will discuss the hadronic final state of neutrino interactions. Since the Tokyo conference a few experimental results have appeared on charged current interaction, I will present them and will also comment on important topics which have been published during the last past year. (orig.)

  19. Weakly oval electron lense

    International Nuclear Information System (INIS)

    Daumenov, T.D.; Alizarovskaya, I.M.; Khizirova, M.A.

    2001-01-01

    The method of the weakly oval electrical field getting generated by the axially-symmetrical field is shown. Such system may be designed with help of the cylindric form coaxial electrodes with the built-in quadrupole duplet. The singularity of the indicated weakly oval lense consists of that it provides the conducting both mechanical and electronic adjustment. Such lense can be useful for elimination of the near-axis astigmatism in the electron-optical system

  20. Weak radiative hyperon decays

    International Nuclear Information System (INIS)

    Roberts, B.L.; Booth, E.C.; Gall, K.P.; McIntyre, E.K.; Miller, J.P.; Whitehouse, D.A.; Bassalleck, B.; Hall, J.R.; Larson, K.D.; Wolfe, D.M.; Fickinger, W.J.; Robinson, D.K.; Hallin, A.L.; Hasinoff, M.D.; Measday, D.F.; Noble, A.J.; Waltham, C.E.; Hessey, N.P.; Lowe, J.; Horvath, D.; Salomon, M.

    1990-01-01

    New measurements of the Σ + and Λ weak radiative decays are discussed. The hyperons were produced at rest by the reaction K - p → Yπ where Y = Σ + or Λ. The monoenergetic pion was used to tag the hyperon production, and the branching ratios were determined from the relative amplitudes of Σ + → pγ to Σ + → pπ 0 and Λ → nγ to Λ → nπ 0 . The photons from weak radiative decays and from π 0 decays were detected with modular NaI arrays. (orig.)

  1. Startpoints via weak contractions

    OpenAIRE

    Agyingi, Collins Amburo; Gaba, Yaé Ulrich

    2018-01-01

    Startpoints (resp. endpoints) can be defined as "oriented fixed points". They arise naturally in the study of fixed for multi-valued maps defined on quasi-metric spaces. In this article, we give a new result in the startpoint theory for quasi-pseudometric spaces. The result we present is obtained via a generalized weakly contractive set-valued map.

  2. Weakly Coretractable Modules

    Science.gov (United States)

    Hadi, Inaam M. A.; Al-aeashi, Shukur N.

    2018-05-01

    If R is a ring with identity and M is a unitary right R-module. Here we introduce the class of weakly coretractable module. Some basic properties are investigated and some relationships between these modules and other related one are introduced.

  3. Keeping Tradition

    NARCIS (Netherlands)

    Zenhong, C.; Buwalda, P.L.

    2011-01-01

    Chinese dumplings such as Jiao Zi and Bao Zi are two of the popular traditional foods in Asia. They are usually made from wheat flour dough (rice flour or starch is sometimes used) that contains fillings. They can be steamed, boiled and fried and are consumed either as a main meal or dessert. As

  4. Quantifying emphysema extent from weakly labeled CT scans of the lungs using label proportions learning

    DEFF Research Database (Denmark)

    Ørting, Silas Nyboe; Petersen, Jens; Wille, Mathilde

    2016-01-01

    Quantification of emphysema extent is important in diagnosing and monitoring patients with chronic obstructive pulmonary disease (COPD). Several studies have shown that emphysema quantification by supervised texture classification is more robust and accurate than traditional densitometry. Current...... techniques require highly time consuming manual annotations of patches or use only weak labels indicating overall disease status (e.g, COPD or healthy). We show how visual scoring of regional emphysema extent can be exploited in a learning with label proportions (LLP) framework to both predict presence...... of emphysema in smaller patches and estimate regional extent. We evaluate performance on 195 visually scored CT scans and achieve an intraclass correlation of 0.72 (0.65–0.78) between predicted region extent and expert raters. To our knowledge this is the first time that LLP methods have been applied...

  5. Introduction to weak interactions

    International Nuclear Information System (INIS)

    Leite Lopes, J.

    An account is first given of the electromagnetic interactions of complex, scalar, vector and spinor fields. It is shown that the electromagnetic field may be considered as a gauge field. Yang-Mills fields and the field theory invariant with respect to the non-Abelian gauge transformation group are then described. The construction, owing to this invariance principle, of conserved isospin currents associated with gauge fields is also demonstrated. This is followed by a historical survey of the development of the weak interaction theory, established at first to describe beta disintegration processes by analogy with electrodynamics. The various stages are mentioned from the discovery of principles and rules and violation of principles, such as those of invariance with respect to spatial reflection and charge conjugation to the formulation of the effective current-current Lagrangian and research on the structure of weak currents [fr

  6. Weak states and security

    OpenAIRE

    Rakipi, Albert

    2006-01-01

    Cataloged from PDF version of article. Although the weak 1 failing states have often been deseribed as the single most important problem for the international order s ince the en d of Cold W ar (F .Fukuyaına 2004:92) several dimensions of this phenomenon still remain unexplored. While this phenomenon has been present in the international politics even earlier, only the post Cold W ar period accentuated its relationship with security issues. Following the Cold W ar' s "peacef...

  7. Composite weak bosons

    Energy Technology Data Exchange (ETDEWEB)

    Suzuki, M.

    1988-04-01

    Dynamical mechanism of composite W and Z is studied in a 1/N field theory model with four-fermion interactions in which global weak SU(2) symmetry is broken explicitly by electromagnetic interaction. Issues involved in such a model are discussed in detail. Deviation from gauge coupling due to compositeness and higher order loop corrections are examined to show that this class of models are consistent not only theoretically but also experimentally.

  8. Survival and weak chaos.

    Science.gov (United States)

    Nee, Sean

    2018-05-01

    Survival analysis in biology and reliability theory in engineering concern the dynamical functioning of bio/electro/mechanical units. Here we incorporate effects of chaotic dynamics into the classical theory. Dynamical systems theory now distinguishes strong and weak chaos. Strong chaos generates Type II survivorship curves entirely as a result of the internal operation of the system, without any age-independent, external, random forces of mortality. Weak chaos exhibits (a) intermittency and (b) Type III survivorship, defined as a decreasing per capita mortality rate: engineering explicitly defines this pattern of decreasing hazard as 'infant mortality'. Weak chaos generates two phenomena from the normal functioning of the same system. First, infant mortality- sensu engineering-without any external explanatory factors, such as manufacturing defects, which is followed by increased average longevity of survivors. Second, sudden failure of units during their normal period of operation, before the onset of age-dependent mortality arising from senescence. The relevance of these phenomena encompasses, for example: no-fault-found failure of electronic devices; high rates of human early spontaneous miscarriage/abortion; runaway pacemakers; sudden cardiac death in young adults; bipolar disorder; and epilepsy.

  9. Exploitation of heterogeneous resources for ATLAS Computing

    CERN Document Server

    Chudoba, Jiri; The ATLAS collaboration

    2018-01-01

    LHC experiments require significant computational resources for Monte Carlo simulations and real data processing and the ATLAS experiment is not an exception. In 2017, ATLAS exploited steadily almost 3M HS06 units, which corresponds to about 300 000 standard CPU cores. The total disk and tape capacity managed by the Rucio data management system exceeded 350 PB. Resources are provided mostly by Grid computing centers distributed in geographically separated locations and connected by the Grid middleware. The ATLAS collaboration developed several systems to manage computational jobs, data files and network transfers. ATLAS solutions for job and data management (PanDA and Rucio) were generalized and now are used also by other collaborations. More components are needed to include new resources such as private and public clouds, volunteers' desktop computers and primarily supercomputers in major HPC centers. Workflows and data flows significantly differ for these less traditional resources and extensive software re...

  10. ROUNDTABLE - SESSION 2 EXPLOITATION, CONSERVATION AND LEGISLATION

    Directory of Open Access Journals (Sweden)

    EDSMAN L.

    2004-01-01

    Full Text Available The link between socioeconomics and conservation and the role of legislation in conservation work was discussed in the group with participants from nine European countries. Interest and knowledge among the general public, stakeholders and managers is the key to successful conservation of native crayfish species. Exploitation and conservation do not necessarily exclude each other. A controlled fishery, where it can be sustained, may be an essential tool for conservation by increasing the general awareness and involving more people in the task of protecting the native crayfish species. This strategy is mainly possible for the noble crayfish in the northern part of its distribution, where strong traditions connected to crayfish also exist. A balance between utilisation and overexploitation has to be found and local guidelines for sustainable exploitation produced. Media, the Internet and educational material aimed at schools and stakeholders are excellent ways of reaching a wide audience with information. Universal objectives, rules and regulations at the European level are desirable and the noble crayfish and the stone crayfish should be included in Annex II of the Habitat Directive. Based on this framework detailed regulations are best worked out at the national level, considering the specific crayfish situation in the country. Information about the legislation, the purpose of the legislation and the consequences when not obeying it should be distributed. Stricter regulation of the trade with live alien crayfish is vital because of the associated risk of introducing new diseases and species.

  11. Hypernuclear weak decay puzzle

    International Nuclear Information System (INIS)

    Barbero, C.; Horvat, D.; Narancic, Z.; Krmpotic, F.; Kuo, T.T.S.; Tadic, D.

    2002-01-01

    A general shell model formalism for the nonmesonic weak decay of the hypernuclei has been developed. It involves a partial wave expansion of the emitted nucleon waves, preserves naturally the antisymmetrization between the escaping particles and the residual core, and contains as a particular case the weak Λ-core coupling formalism. The extreme particle-hole model and the quasiparticle Tamm-Dancoff approximation are explicitly worked out. It is shown that the nuclear structure manifests itself basically through the Pauli principle, and a very simple expression is derived for the neutron- and proton-induced decays rates Γ n and Γ p , which does not involve the spectroscopic factors. We use the standard strangeness-changing weak ΛN→NN transition potential which comprises the exchange of the complete pseudoscalar and vector meson octets (π,η,K,ρ,ω,K * ), taking into account some important parity-violating transition operators that are systematically omitted in the literature. The interplay between different mesons in the decay of Λ 12 C is carefully analyzed. With the commonly used parametrization in the one-meson-exchange model (OMEM), the calculated rate Γ NM =Γ n +Γ p is of the order of the free Λ decay rate Γ 0 (Γ NM th congruent with Γ 0 ) and is consistent with experiments. Yet the measurements of Γ n/p =Γ n /Γ p and of Γ p are not well accounted for by the theory (Γ n/p th p th > or approx. 0.60Γ 0 ). It is suggested that, unless additional degrees of freedom are incorporated, the OMEM parameters should be radically modified

  12. Measurement of weak radioactivity

    CERN Document Server

    Theodorsson , P

    1996-01-01

    This book is intended for scientists engaged in the measurement of weak alpha, beta, and gamma active samples; in health physics, environmental control, nuclear geophysics, tracer work, radiocarbon dating etc. It describes the underlying principles of radiation measurement and the detectors used. It also covers the sources of background, analyzes their effect on the detector and discusses economic ways to reduce the background. The most important types of low-level counting systems and the measurement of some of the more important radioisotopes are described here. In cases where more than one type can be used, the selection of the most suitable system is shown.

  13. On Weak Markov's Principle

    DEFF Research Database (Denmark)

    Kohlenbach, Ulrich Wilhelm

    2002-01-01

    We show that the so-called weak Markov's principle (WMP) which states that every pseudo-positive real number is positive is underivable in E-HA + AC. Since allows one to formalize (atl eastl arge parts of) Bishop's constructive mathematics, this makes it unlikely that WMP can be proved within...... the framework of Bishop-style mathematics (which has been open for about 20 years). The underivability even holds if the ine.ective schema of full comprehension (in all types) for negated formulas (in particular for -free formulas) is added, which allows one to derive the law of excluded middle...

  14. Weak interaction rates

    International Nuclear Information System (INIS)

    Sugarbaker, E.

    1995-01-01

    I review available techniques for extraction of weak interaction rates in nuclei. The case for using hadron charge exchange reactions to estimate such rates is presented and contrasted with alternate methods. Limitations of the (p,n) reaction as a probe of Gamow-Teller strength are considered. Review of recent comparisons between beta-decay studies and (p,n) is made, leading to cautious optimism regarding the final usefulness of (p,n)- derived GT strengths to the field of astrophysics. copyright 1995 American Institute of Physics

  15. [Traditional nostrum].

    Science.gov (United States)

    Sugiyama, Shigeru

    2006-01-01

    The commercialization of drugs started toward the end of Heian period (794-1192) when not only aristocrats and monks who were traditional patrons to drug makers, but also local clans and landlords who became powerful as a result of the disbanding of aristocratic manors accumulated enough wealth to spend money on medicine. Although traveling around the country was still a dangerous endeavor, merchants assembled groups to bring lucrative foreign drugs (mainly Chinese) to remote areas. The spread of commercial drugs to common people, however, did not happen until the early Edo period (1603-1867), when the so-called barrier system was installed nationwide to make domestic travel safe. Commercialization started in large cities and gradually spread to other areas. Many nostrums popular until recently appeared in the Genroku period (1688-1703) or later. Many such nostrums were all-cures, often consisting of such active ingredients as Saussureae radix, Agalloch, or Gambir. Even in the Edo period, many people living in agricultural or fishing villages, as well as those in the lower tier, were still poor. Much of the medication available to those people was therefore made of various plant or animal-derived substances that were traditionally used as folk medicines.

  16. Weakly Supervised Dictionary Learning

    Science.gov (United States)

    You, Zeyu; Raich, Raviv; Fern, Xiaoli Z.; Kim, Jinsub

    2018-05-01

    We present a probabilistic modeling and inference framework for discriminative analysis dictionary learning under a weak supervision setting. Dictionary learning approaches have been widely used for tasks such as low-level signal denoising and restoration as well as high-level classification tasks, which can be applied to audio and image analysis. Synthesis dictionary learning aims at jointly learning a dictionary and corresponding sparse coefficients to provide accurate data representation. This approach is useful for denoising and signal restoration, but may lead to sub-optimal classification performance. By contrast, analysis dictionary learning provides a transform that maps data to a sparse discriminative representation suitable for classification. We consider the problem of analysis dictionary learning for time-series data under a weak supervision setting in which signals are assigned with a global label instead of an instantaneous label signal. We propose a discriminative probabilistic model that incorporates both label information and sparsity constraints on the underlying latent instantaneous label signal using cardinality control. We present the expectation maximization (EM) procedure for maximum likelihood estimation (MLE) of the proposed model. To facilitate a computationally efficient E-step, we propose both a chain and a novel tree graph reformulation of the graphical model. The performance of the proposed model is demonstrated on both synthetic and real-world data.

  17. Importance of weak minerals on earthquake mechanics

    Science.gov (United States)

    Kaneki, S.; Hirono, T.

    2017-12-01

    The role of weak minerals such as smectite and talc on earthquake mechanics is one of the important issues, and has been debated for recent several decades. Traditionally weak minerals in fault have been reported to weaken fault strength causing from its low frictional resistance. Furthermore, velocity-strengthening behavior of such weak mineral (talc) is considered to responsible for fault creep (aseismic slip) in the San Andreas fault. In contrast, recent studies reported that large amount of weak smectite in the Japan Trench could facilitate gigantic seismic slip during the 2011 Tohoku-oki earthquake. To investigate the role of weak minerals on rupture propagation process and magnitude of slip, we focus on the frictional properties of carbonaceous materials (CMs), which is the representative weak materials widely distributed in and around the convergent boundaries. Field observation and geochemical analyses revealed that graphitized CMs-layer is distributed along the slip surface of a fossil plate-subduction fault. Laboratory friction experiments demonstrated that pure quartz, bulk mixtures with bituminous coal (1 wt.%), and quartz with layered coal samples exhibited almost similar frictional properties (initial, yield, and dynamic friction). However, mixtures of quartz (99 wt.%) and layered graphite (1 wt.%) showed significantly lower initial and yield friction coefficient (0.31 and 0.50, respectively). Furthermore, the stress ratio S, defined as (yield stress-initial stress)/(initial stress-dynamic stress), increased in layered graphite samples (1.97) compared to quartz samples (0.14). Similar trend was observed in smectite-rich fault gouge. By referring the reported results of dynamic rupture propagation simulation using S ratio of 1.4 (typical value for the Japan Trench) and 2.0 (this study), we confirmed that higher S ratio results in smaller slip distance by approximately 20 %. On the basis of these results, we could conclude that weak minerals have lower

  18. Teotihuacan, tepeapulco, and obsidian exploitation.

    Science.gov (United States)

    Charlton, T H

    1978-06-16

    Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion.

  19. Network exploitation using WAMI tracks

    Science.gov (United States)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  20. Total exploitation of an ornamental granite quarry

    Directory of Open Access Journals (Sweden)

    Taboada, J.

    2005-09-01

    Full Text Available In this paper we propose a methodology to estimate the recovery percentage for each of the products which can be obtained from the exploitation of an ornamental granite quarry: block, semiblock, masonry-transverse stone, and the smaller materials that can be used to obtain construction aggregates. This methodology ensures that quarry exploitation is exhaustive, thereby minimising the production of spoils and the consequent negative impact on the environment. The analysis is based on a detailed and exhaustive compilation of discontinuity data from the research fronts, which are then interpreted statistically and projected over the three weakness planes that are a particular feature of ornamental granite deposits. Using this information, and bearing in mind the minimum commercially viable sizes for each kind of granite, the corresponding recovery rates are calculated for each material in each plane. The results are then integrated using spatial techniques, and the result is an evaluation of quarry contents with a view to total exploitation. This methodology was applied to a quarry in the opening phase in order to carry out an a priori assessment of the economic feasibility of the quarry.

    En este trabajo se propone una metodología para estimar el porcentaje de recuperación de cada uno de los productos que se pueden obtener en la explotación de una cantera de granito ornamental: bloque, semibloque, manpostería y per piaños, y material restante destinado a la obtención de áridos. De esta manera se logra un aprovechamiento integral de la cantera, evitándose la generación de estériles y el subsiguiente impacto ambiental producido por éstos. La metodología de análisis se basa en la recopilación detallada y exhaustiva de datos de discontinuidades en los frentes de investigación, que se interpretan estadísticamente y se proyectan sobre los tres planos de debilidad propios del granito ornamental. Con esta información, y las

  1. The ESA Geohazard Exploitation Platform

    Science.gov (United States)

    Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore

    2015-04-01

    Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further

  2. Weak interactions: muon decay

    International Nuclear Information System (INIS)

    Sachs, A.M.; Sirlin, A.

    1975-01-01

    The traditional theory of the dominant mode of muon decay is presented, a survey of the experiments which have measured the observable features of the decay is given, and those things which can be learned about the parameters and nature of the theory from the experimental results are indicated. The following aspects of the theory of muon decay are presented first: general four-fermion theory, two-component theory of the neutrino, V--A theory, two-component and V--A theories vs general four-fermion theory, intermediate-boson hypothesis, radiative corrections, radiative corrections in the intermediate-boson theory, and endpoint singularities and corrections of order α 2 . Experiments on muon lifetime, isotropic electron spectrum, total asymmetry and energy dependence of asymmetry of electrons from polarized muons, and electron polarization are described, and a summary of experimental results is given. 7 figures, 2 tables, 109 references

  3. The Exploitation of a Weak State: Al-Qaeda in the Arabian Peninsula in Yemen

    Science.gov (United States)

    2010-06-01

    of the cease-fire to this point, it is unlikely the truce will last. In June 2007, the Qatar government mediated a joint cease- fire between the...http://www.thenational.ae/apps/pbcs.dll/article?AID=/20090925/FOREIGN/709249878/1135. 54 rapidly receding aquifers .”160 In rural areas, only 45...needs to persuade Middle Eastern countries like Qatar to act as a mediator between the Yemeni government and its two disgruntled entities. The Qatari

  4. Exploiting chemically selective weakness in solids as a route to new porous materials

    Czech Academy of Sciences Publication Activity Database

    Morris, R. E.; Čejka, Jiří

    2015-01-01

    Roč. 7, č. 5 (2015), s. 381-388 ISSN 1755-4330 R&D Projects: GA ČR GBP106/12/G015 EU Projects: European Commission 604307 Institutional support: RVO:61388955 Keywords : METAL - ORGANIC FRAMEWORKS * ZEOLITIC IMIDAZOLATE FRAMEWORKS * SINGLE-CRYSTAL TRANSFORMATION Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 27.893, year: 2015

  5. Prospects of geothermal resource exploitation

    International Nuclear Information System (INIS)

    Bourrelier, P.H.; Cornet, F.; Fouillac, C.

    1994-01-01

    The use of geothermal energy to generate electricity has only occurred during the past 50 years by drilling wells in aquifers close to magmas and producing either dry steam or hot water. The world's production of electricity from geothermal energy is over 6000 MWe and is still growing. The direct use of geothermal energy for major urban communities has been developed recently by exploitation of aquifers in sedimentary basins under large towns. Scaling up the extraction of heat implies the exploitation of larger and better located fields requiring an appropriate method of extraction; the objective of present attempts in USA, Japan and Europe is to create heat exchangers by the circulation of water between several deep wells. Two field categories are considered: the extension of classical geothermal fields beyond the aquifer areas, and areas favoured by both a high geothermal gradient, fractures inducing a natural permeability at large scale, and good commercial prospects (such as in the Rhenan Graben). Hot dry rocks concept has gained a large interest. 1 fig., 5 tabs., 11 refs

  6. A new measure of interpersonal exploitativeness

    Directory of Open Access Journals (Sweden)

    Amy B. Brunell

    2013-05-01

    Full Text Available Measures of exploitativeness evidence problems with validity and reliability. The present set of studies assessed a new measure (the Interpersonal Exploitativeness Scale that defines exploitativeness in terms of reciprocity. In Studies 1 and 2, 33 items were administered to participants. Exploratory and Confirmatory Factor Analysis demonstrated that a single factor consisting of six items adequately assess interpersonal exploitativeness. Study 3 results revealed that the Interpersonal Exploitativeness Scale was positively associated with normal narcissism, pathological narcissism, psychological entitlement, and negative reciprocity and negatively correlated with positive reciprocity. In Study 4, participants competed in a commons dilemma. Those who scored higher on the Interpersonal Exploitativeness Scale were more likely to harvest a greater share of resources over time, even while controlling for other relevant variables, such as entitlement. Together, these studies show the Interpersonal Exploitativeness Scale to be a valid and reliable measure of interpersonal exploitativeness. The authors discuss the implications of these studies.

  7. Exploitation in International Paid Surrogacy Arrangements

    OpenAIRE

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate probl...

  8. Standard and Null Weak Values

    OpenAIRE

    Zilberberg, Oded; Romito, Alessandro; Gefen, Yuval

    2013-01-01

    Weak value (WV) is a quantum mechanical measurement protocol, proposed by Aharonov, Albert, and Vaidman. It consists of a weak measurement, which is weighed in, conditional on the outcome of a later, strong measurement. Here we define another two-step measurement protocol, null weak value (NVW), and point out its advantages as compared to WV. We present two alternative derivations of NWVs and compare them to the corresponding derivations of WVs.

  9. Weak openness and almost openness

    Directory of Open Access Journals (Sweden)

    David A. Rose

    1984-01-01

    Full Text Available Weak openness and almost openness for arbitrary functions between topological spaces are defined as duals to the weak continuity of Levine and the almost continuity of Husain respectively. Independence of these two openness conditions is noted and comparison is made between these and the almost openness of Singal and Singal. Some results dual to those known for weak continuity and almost continuity are obtained. Nearly almost openness is defined and used to obtain an improved link from weak continuity to almost continuity.

  10. Weak measurements and quantum weak values for NOON states

    Science.gov (United States)

    Rosales-Zárate, L.; Opanchuk, B.; Reid, M. D.

    2018-03-01

    Quantum weak values arise when the mean outcome of a weak measurement made on certain preselected and postselected quantum systems goes beyond the eigenvalue range for a quantum observable. Here, we propose how to determine quantum weak values for superpositions of states with a macroscopically or mesoscopically distinct mode number, that might be realized as two-mode Bose-Einstein condensate or photonic NOON states. Specifically, we give a model for a weak measurement of the Schwinger spin of a two-mode NOON state, for arbitrary N . The weak measurement arises from a nondestructive measurement of the two-mode occupation number difference, which for atomic NOON states might be realized via phase contrast imaging and the ac Stark effect using an optical meter prepared in a coherent state. The meter-system coupling results in an entangled cat-state. By subsequently evolving the system under the action of a nonlinear Josephson Hamiltonian, we show how postselection leads to quantum weak values, for arbitrary N . Since the weak measurement can be shown to be minimally invasive, the weak values provide a useful strategy for a Leggett-Garg test of N -scopic realism.

  11. The Exploitation of Evolving Resources

    CERN Document Server

    McGlade, Jacqueline; Law, Richard

    1993-01-01

    The impact of man on the biosphere is profound. Quite apart from our capacity to destroy natural ecosystems and to drive species to extinction, we mould the evolution of the survivors by the selection pressures we apply to them. This has implications for the continued health of our natural biological resources and for the way in which we seek to optimise yield from those resources. Of these biological resources, fish stocks are particularly important to mankind as a source of protein. On a global basis, fish stocks provide the major source of protein for human consumption from natural ecosystems, amounting to some seventy million tonnes in 1970. Although fisheries management has been extensively developed over the last century, it has not hitherto considered the evolutionary consequences of fishing activity. While this omission may not have been serious in the past, the ever increasing intensity of exploitation and the deteriorating health of fish stocks has generated an urgent need for a better understanding...

  12. Swedish mines. Underground exploitation methods

    International Nuclear Information System (INIS)

    Paucard, A.

    1960-01-01

    Between 1949 and 1957, 10 engineers of the Mining research and exploitation department of the CEA visited 17 Swedish mines during 5 field trips. This paper presents a compilation of the information gathered during these field trips concerning the different underground mining techniques used in Swedish iron mines: mining with backfilling (Central Sweden and Boliden mines); mining without backfilling (mines of the polar circle area). The following techniques are described successively: pillar drawing and backfilled slices (Ammeberg, Falun, Garpenberg, Boliden group), sub-level pillar drawing (Grangesberg, Bloettberget, Haeksberg), empty room and sub-level pillar drawing (Bodas, Haksberg, Stripa, Bastkarn), storage chamber pillar drawing (Bodas, Haeksberg, Bastkarn), and pillar drawing by block caving (ldkerberget). Reprint of a paper published in Revue de l'Industrie Minerale, vol. 41, no. 12, 1959 [fr

  13. Exploiting social evolution in biofilms

    DEFF Research Database (Denmark)

    Boyle, Kerry E; Heilmann, Silja; van Ditmarsch, Dave

    2013-01-01

    Bacteria are highly social organisms that communicate via signaling molecules, move collectively over surfaces and make biofilm communities. Nonetheless, our main line of defense against pathogenic bacteria consists of antibiotics-drugs that target individual-level traits of bacterial cells...... and thus, regrettably, select for resistance against their own action. A possible solution lies in targeting the mechanisms by which bacteria interact with each other within biofilms. The emerging field of microbial social evolution combines molecular microbiology with evolutionary theory to dissect...... the molecular mechanisms and the evolutionary pressures underpinning bacterial sociality. This exciting new research can ultimately lead to new therapies against biofilm infections that exploit evolutionary cheating or the trade-off between biofilm formation and dispersal....

  14. Energy for lunar resource exploitation

    Science.gov (United States)

    Glaser, Peter E.

    1992-02-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  15. Exploitation of natural resources and conflict in Colombia

    Directory of Open Access Journals (Sweden)

    Luis Eduardo Sandoval

    2017-11-01

    Full Text Available Colombia has increasingly been specializing in the extraction of mineral and energy resources such as gold, coal, oil and ferronickel. These activities, in the context of state weakness, have engendered conflicts of different dimensions. This paper proposes an indicator of conflict related to mineral exploitation that classifies five dimensions of conflict: social, economic, cultural, political and environmental. The aggregate indicator shows that murders, displacement of Afrodescendent populations, flooding, pollution, fires, infant mortality, coca crops and sexual offenses are highly and positively correlated with the number of conflicts.

  16. Motherhood Surrogacy: Progress or Exploitation?

    OpenAIRE

    Hemion Braho

    2015-01-01

    Motherhood surrogacy is almost considered as a new way to born next to natural born, adoption and IVF treatments. If the other practices are accepted by the social and scientific community, the motherhood surrogacy brings some problems, especially on a social point of view. This happens because of the big sufferance of the women involved in this practice and because of the social distortion of this practice transforming the traditional family structures and bringing social, legal and healthy ...

  17. Weak decays of stable particles

    International Nuclear Information System (INIS)

    Brown, R.M.

    1988-09-01

    In this article we review recent advances in the field of weak decays and consider their implications for quantum chromodynamics (the theory of strong interactions) and electroweak theory (the combined theory of electromagnetic and weak interactions), which together form the ''Standard Model'' of elementary particles. (author)

  18. Electromagnetic current in weak interactions

    International Nuclear Information System (INIS)

    Ma, E.

    1983-01-01

    In gauge models which unify weak and electromagnetic interactions, the weak neutral-current interaction also involves the electromagnetic current. The exact nature of such a component can be explored using e + e - experimental data. In recent years, the existence of a new component of the weak interaction has become firmly established, i.e., the neutral-current interaction. As such, it competes with the electromagnetic interaction whenever the particles involved are also charged, but at a very much lower rate because its effective strength is so small. Hence neutrino processes are best for the detection of the neutral-current interaction. However, in any gauge model which unifies weak and electromagnetic interactions, the weak neutral-current interaction also involves the electromagnetic current

  19. Exploiting Symmetry on Parallel Architectures.

    Science.gov (United States)

    Stiller, Lewis Benjamin

    1995-01-01

    This thesis describes techniques for the design of parallel programs that solve well-structured problems with inherent symmetry. Part I demonstrates the reduction of such problems to generalized matrix multiplication by a group-equivariant matrix. Fast techniques for this multiplication are described, including factorization, orbit decomposition, and Fourier transforms over finite groups. Our algorithms entail interaction between two symmetry groups: one arising at the software level from the problem's symmetry and the other arising at the hardware level from the processors' communication network. Part II illustrates the applicability of our symmetry -exploitation techniques by presenting a series of case studies of the design and implementation of parallel programs. First, a parallel program that solves chess endgames by factorization of an associated dihedral group-equivariant matrix is described. This code runs faster than previous serial programs, and discovered it a number of results. Second, parallel algorithms for Fourier transforms for finite groups are developed, and preliminary parallel implementations for group transforms of dihedral and of symmetric groups are described. Applications in learning, vision, pattern recognition, and statistics are proposed. Third, parallel implementations solving several computational science problems are described, including the direct n-body problem, convolutions arising from molecular biology, and some communication primitives such as broadcast and reduce. Some of our implementations ran orders of magnitude faster than previous techniques, and were used in the investigation of various physical phenomena.

  20. Two questions about surrogacy and exploitation.

    Science.gov (United States)

    Wertheimer, Alan

    1992-01-01

    In this article I will consider two related questions about surrogacy and exploitation: (1) Is surrogacy exploitative? (2) If surrogacy is exploitative, what is the moral force of this exploitation? Briefly stated, I shall argue that whether surrogacy is exploitative depends on whether exploitation must be harmful to the exploited party or whether (as I think) there can be mutually advantageous exploitation. It also depends on some facts about surrogacy about which we have little reliable evidence and on our philosophical view on what counts as a harm to the surrogate. Our answer to the second question will turn in part on the account of exploitation we invoke in answering the first question and in part on the way in which we resolve some other questions about the justification of state interference. I shall suggest, however, that if surrogacy is a form of voluntary and mutually advantageous exploitation, then there is a strong presumption that surrogacy contracts should be permitted and even enforceable, although that presumption may be overridden on other grounds.

  1. Hartman effect and weak measurements that are not really weak

    International Nuclear Information System (INIS)

    Sokolovski, D.; Akhmatskaya, E.

    2011-01-01

    We show that in wave packet tunneling, localization of the transmitted particle amounts to a quantum measurement of the delay it experiences in the barrier. With no external degree of freedom involved, the envelope of the wave packet plays the role of the initial pointer state. Under tunneling conditions such ''self-measurement'' is necessarily weak, and the Hartman effect just reflects the general tendency of weak values to diverge, as postselection in the final state becomes improbable. We also demonstrate that it is a good precision, or a 'not really weak' quantum measurement: no matter how wide the barrier d, it is possible to transmit a wave packet with a width σ small compared to the observed advancement. As is the case with all weak measurements, the probability of transmission rapidly decreases with the ratio σ/d.

  2. Radiation environmental impact assessment of copper exploitation

    International Nuclear Information System (INIS)

    Fan Guang; Wen Zhijian

    2010-01-01

    The radiation environmental impact of mineral exploitation on the surrounding environment has become a public concern. This paper presents the radiation environmental impact assessment of copper exploitation. Based on the project description and detailed investigations of surrounding environment, systematic radiation environmental impacts have been identified. The environmental impacts are assessed during both construction and operation phase. The environmental protection measures have also been proposed. The related conclusion and measures can play an active role in copper exploitation and environmental protection. (authors)

  3. Exploitation and exploration dynamics in recessionary times

    OpenAIRE

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting existing resources. As such, firms possessing the ability to simultaneously perform exploitative and explorative initiatives are more resilient. In this respect, the performance implications of balancing ...

  4. Weak Measurement and Quantum Correlation

    Indian Academy of Sciences (India)

    Arun Kumar Pati

    Entanglement: Two quantum systems can be in a strongly correlated state even if .... These are resources which can be used to design quantum computer, quantum ...... Weak measurements have found numerous applications starting from the ...

  5. Weakly infinite-dimensional spaces

    International Nuclear Information System (INIS)

    Fedorchuk, Vitalii V

    2007-01-01

    In this survey article two new classes of spaces are considered: m-C-spaces and w-m-C-spaces, m=2,3,...,∞. They are intermediate between the class of weakly infinite-dimensional spaces in the Alexandroff sense and the class of C-spaces. The classes of 2-C-spaces and w-2-C-spaces coincide with the class of weakly infinite-dimensional spaces, while the compact ∞-C-spaces are exactly the C-compact spaces of Haver. The main results of the theory of weakly infinite-dimensional spaces, including classification via transfinite Lebesgue dimensions and Luzin-Sierpinsky indices, extend to these new classes of spaces. Weak m-C-spaces are characterised by means of essential maps to Henderson's m-compacta. The existence of hereditarily m-strongly infinite-dimensional spaces is proved.

  6. Weak interactions and presupernova evolution

    International Nuclear Information System (INIS)

    Aufderheide, M.B.; State Univ. of New York

    1991-01-01

    The role of weak interactions, particularly electron capture and β - decay, in presupernova evolution is discussed. The present uncertainty in these rates is examined and the possibility of improving the situation is addressed. 12 refs., 4 figs

  7. Weak Business Culture as an Antecedent of Economic Crisis

    DEFF Research Database (Denmark)

    Sigurjonsson, Throstur Olaf; Vaiman, Vlad; Davídsson, Páll Ásgeir

    2011-01-01

    The authors of this article contend that traditional corruption, which was largely blamed for the current situation in the Icelandic economy, was perhaps not the most fundamental reason for the ensuing crisis. The weak business culture and a symbiosis of business and politics have actually allowed......, prior to making any sort of investment decisions in that country....

  8. Potentially exploitable supercritical geothermal resources in the ductile crust

    Science.gov (United States)

    Watanabe, Noriaki; Numakura, Tatsuya; Sakaguchi, Kiyotoshi; Saishu, Hanae; Okamoto, Atsushi; Ingebritsen, Steven E.; Tsuchiya, Noriyoshi

    2017-01-01

    The hypothesis that the brittle–ductile transition (BDT) drastically reduces permeability implies that potentially exploitable geothermal resources (permeability >10−16 m2) consisting of supercritical water could occur only in rocks with unusually high transition temperatures such as basalt. However, tensile fracturing is possible even in ductile rocks, and some permeability–depth relations proposed for the continental crust show no drastic permeability reduction at the BDT. Here we present experimental results suggesting that the BDT is not the first-order control on rock permeability, and that potentially exploitable resources may occur in rocks with much lower BDT temperatures, such as the granitic rocks that comprise the bulk of the continental crust. We find that permeability behaviour for fractured granite samples at 350–500 °C under effective confining stress is characterized by a transition from a weakly stress-dependent and reversible behaviour to a strongly stress-dependent and irreversible behaviour at a specific, temperature-dependent effective confining stress level. This transition is induced by onset of plastic normal deformation of the fracture surface (elastic–plastic transition) and, importantly, causes no ‘jump’ in the permeability. Empirical equations for this permeability behaviour suggest that potentially exploitable resources exceeding 450 °C may form at depths of 2–6 km even in the nominally ductile crust.

  9. Weak Deeply Virtual Compton Scattering

    International Nuclear Information System (INIS)

    Ales Psaker; Wolodymyr Melnitchouk; Anatoly Radyushkin

    2006-01-01

    We extend the analysis of the deeply virtual Compton scattering process to the weak interaction sector in the generalized Bjorken limit. The virtual Compton scattering amplitudes for the weak neutral and charged currents are calculated at the leading twist within the framework of the nonlocal light-cone expansion via coordinate space QCD string operators. Using a simple model, we estimate cross sections for neutrino scattering off the nucleon, relevant for future high intensity neutrino beam facilities

  10. Weakly compact operators and interpolation

    OpenAIRE

    Maligranda, Lech

    1992-01-01

    The class of weakly compact operators is, as well as the class of compact operators, a fundamental operator ideal. They were investigated strongly in the last twenty years. In this survey, we have collected and ordered some of this (partly very new) knowledge. We have also included some comments, remarks and examples. The class of weakly compact operators is, as well as the class of compact operators, a fundamental operator ideal. They were investigated strongly in the last twenty years. I...

  11. Acute muscular weakness in children

    Directory of Open Access Journals (Sweden)

    Ricardo Pablo Javier Erazo Torricelli

    Full Text Available ABSTRACT Acute muscle weakness in children is a pediatric emergency. During the diagnostic approach, it is crucial to obtain a detailed case history, including: onset of weakness, history of associated febrile states, ingestion of toxic substances/toxins, immunizations, and family history. Neurological examination must be meticulous as well. In this review, we describe the most common diseases related to acute muscle weakness, grouped into the site of origin (from the upper motor neuron to the motor unit. Early detection of hyperCKemia may lead to a myositis diagnosis, and hypokalemia points to the diagnosis of periodic paralysis. Ophthalmoparesis, ptosis and bulbar signs are suggestive of myasthenia gravis or botulism. Distal weakness and hyporeflexia are clinical features of Guillain-Barré syndrome, the most frequent cause of acute muscle weakness. If all studies are normal, a psychogenic cause should be considered. Finding the etiology of acute muscle weakness is essential to execute treatment in a timely manner, improving the prognosis of affected children.

  12. Modular overconstrained weak-link mechanism for ultraprecision motion control

    International Nuclear Information System (INIS)

    Shu Deming; Toellner, Thomas S.; Alp, Esen E.

    2001-01-01

    We have designed and constructed a novel miniature overconstrained weak-link mechanism that will allow positioning of two crystals with better than 50 nrad angular resolution and nanometer linear driving sensitivity. The precision and stability of this structure allow the user to align or adjust an assembly of crystals to achieve the same performance as does a single channel-cut crystal, so we call it an ''artificial channel-cut crystal.'' Unlike the traditional kinematic linear spring mechanisms, the overconstrained weak-link mechanism provides much higher structure stiffness and stability. Using a laminar structure configured and manufactured by chemical etching and lithography techniques, we are able to design and build a planar-shape, high stiffness, high precision weak-link mechanism. In this paper, we present recent developments for the overconstrained weak-link mechanism. Applications of this new technique to synchrotron radiation instrumentation are also discussed

  13. Weakness

    Science.gov (United States)

    ... by a slipped disk in the spine) Stroke MUSCLE DISEASES Becker muscular dystrophy Dermatomyositis Muscular dystrophy (Duchenne) Myotonic dystrophy POISONING Botulism Poisoning ( insecticides , nerve gas) ...

  14. The economics of exploiting gas hydrates

    International Nuclear Information System (INIS)

    Döpke, Lena-Katharina; Requate, Till

    2014-01-01

    We investigate the optimal exploitation of methane hydrates, a recent discovery of methane resources under the sea floor, mainly located along the continental margins. Combustion of methane (releasing CO2) and leakage through blow-outs (releasing CH4) contribute to the accumulation of greenhouse gases. A second externality arises since removing solid gas hydrates from the sea bottom destabilizes continental margins and thus increases the risk of marine earthquakes. We show that in such a model three regimes can occur: i) resource exploitation will be stopped in finite time, and some of the resource will stay in situ, ii) the resource will be used up completely in finite time, and iii) the resource will be exhausted in infinite time. We also show how to internalize the externalities by policy instruments. - Highlights: • We set up a model of optimal has hydrate exploitation • We incorporate to types of damages: contribution to global warming and geo-hazards • We characterize optimal exploitation paths and study decentralization with an exploitation tax. • Three regimes can occur: • i) exploitation in finite time and some of the stock remaining in situ, • ii) exploitation in finite time and the resource will be exhausted, • iii) exploitation and exhaustion in infinite time

  15. Exploitation and exploration dynamics in recessionary times

    NARCIS (Netherlands)

    Walrave, B.

    2012-01-01

    Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting

  16. Packaging of Sin Goods - Commitment or Exploitation?

    DEFF Research Database (Denmark)

    Nafziger, Julia

    to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves to exploit...

  17. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    sexual exploitation of children by peacekeepers is particularly insidious. ... sexual exploitation and abuse should involve an understanding of the social .... The charges of sexual misconduct, and the consequent media exposure, have ..... awareness programmes such as video tapes, lectures and training manuals, designed.

  18. Cosmology with weak lensing surveys

    International Nuclear Information System (INIS)

    Munshi, Dipak; Valageas, Patrick; Waerbeke, Ludovic van; Heavens, Alan

    2008-01-01

    Weak gravitational lensing is responsible for the shearing and magnification of the images of high-redshift sources due to the presence of intervening matter. The distortions are due to fluctuations in the gravitational potential, and are directly related to the distribution of matter and to the geometry and dynamics of the Universe. As a consequence, weak gravitational lensing offers unique possibilities for probing the Dark Matter and Dark Energy in the Universe. In this review, we summarise the theoretical and observational state of the subject, focussing on the statistical aspects of weak lensing, and consider the prospects for weak lensing surveys in the future. Weak gravitational lensing surveys are complementary to both galaxy surveys and cosmic microwave background (CMB) observations as they probe the unbiased non-linear matter power spectrum at modest redshifts. Most of the cosmological parameters are accurately estimated from CMB and large-scale galaxy surveys, so the focus of attention is shifting to understanding the nature of Dark Matter and Dark Energy. On the theoretical side, recent advances in the use of 3D information of the sources from photometric redshifts promise greater statistical power, and these are further enhanced by the use of statistics beyond two-point quantities such as the power spectrum. The use of 3D information also alleviates difficulties arising from physical effects such as the intrinsic alignment of galaxies, which can mimic weak lensing to some extent. On the observational side, in the next few years weak lensing surveys such as CFHTLS, VST-KIDS and Pan-STARRS, and the planned Dark Energy Survey, will provide the first weak lensing surveys covering very large sky areas and depth. In the long run even more ambitious programmes such as DUNE, the Supernova Anisotropy Probe (SNAP) and Large-aperture Synoptic Survey Telescope (LSST) are planned. Weak lensing of diffuse components such as the CMB and 21 cm emission can also

  19. Cosmology with weak lensing surveys

    Energy Technology Data Exchange (ETDEWEB)

    Munshi, Dipak [Institute of Astronomy, Madingley Road, Cambridge, CB3 OHA (United Kingdom); Astrophysics Group, Cavendish Laboratory, Madingley Road, Cambridge CB3 OHE (United Kingdom)], E-mail: munshi@ast.cam.ac.uk; Valageas, Patrick [Service de Physique Theorique, CEA Saclay, 91191 Gif-sur-Yvette (France); Waerbeke, Ludovic van [University of British Columbia, Department of Physics and Astronomy, 6224 Agricultural Road, Vancouver, BC V6T 1Z1 (Canada); Heavens, Alan [SUPA - Scottish Universities Physics Alliance, Institute for Astronomy, University of Edinburgh, Blackford Hill, Edinburgh EH9 3HJ (United Kingdom)

    2008-06-15

    Weak gravitational lensing is responsible for the shearing and magnification of the images of high-redshift sources due to the presence of intervening matter. The distortions are due to fluctuations in the gravitational potential, and are directly related to the distribution of matter and to the geometry and dynamics of the Universe. As a consequence, weak gravitational lensing offers unique possibilities for probing the Dark Matter and Dark Energy in the Universe. In this review, we summarise the theoretical and observational state of the subject, focussing on the statistical aspects of weak lensing, and consider the prospects for weak lensing surveys in the future. Weak gravitational lensing surveys are complementary to both galaxy surveys and cosmic microwave background (CMB) observations as they probe the unbiased non-linear matter power spectrum at modest redshifts. Most of the cosmological parameters are accurately estimated from CMB and large-scale galaxy surveys, so the focus of attention is shifting to understanding the nature of Dark Matter and Dark Energy. On the theoretical side, recent advances in the use of 3D information of the sources from photometric redshifts promise greater statistical power, and these are further enhanced by the use of statistics beyond two-point quantities such as the power spectrum. The use of 3D information also alleviates difficulties arising from physical effects such as the intrinsic alignment of galaxies, which can mimic weak lensing to some extent. On the observational side, in the next few years weak lensing surveys such as CFHTLS, VST-KIDS and Pan-STARRS, and the planned Dark Energy Survey, will provide the first weak lensing surveys covering very large sky areas and depth. In the long run even more ambitious programmes such as DUNE, the Supernova Anisotropy Probe (SNAP) and Large-aperture Synoptic Survey Telescope (LSST) are planned. Weak lensing of diffuse components such as the CMB and 21 cm emission can also

  20. Exploration, Exploitation, and Organizational Coordination Mechanisms

    Directory of Open Access Journals (Sweden)

    Silvio Popadiuk

    2016-03-01

    Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.

  1. Peripheral facial weakness (Bell's palsy).

    Science.gov (United States)

    Basić-Kes, Vanja; Dobrota, Vesna Dermanović; Cesarik, Marijan; Matovina, Lucija Zadro; Madzar, Zrinko; Zavoreo, Iris; Demarin, Vida

    2013-06-01

    Peripheral facial weakness is a facial nerve damage that results in muscle weakness on one side of the face. It may be idiopathic (Bell's palsy) or may have a detectable cause. Almost 80% of peripheral facial weakness cases are primary and the rest of them are secondary. The most frequent causes of secondary peripheral facial weakness are systemic viral infections, trauma, surgery, diabetes, local infections, tumor, immune disorders, drugs, degenerative diseases of the central nervous system, etc. The diagnosis relies upon the presence of typical signs and symptoms, blood chemistry tests, cerebrospinal fluid investigations, nerve conduction studies and neuroimaging methods (cerebral MRI, x-ray of the skull and mastoid). Treatment of secondary peripheral facial weakness is based on therapy for the underlying disorder, unlike the treatment of Bell's palsy that is controversial due to the lack of large, randomized, controlled, prospective studies. There are some indications that steroids or antiviral agents are beneficial but there are also studies that show no beneficial effect. Additional treatments include eye protection, physiotherapy, acupuncture, botulinum toxin, or surgery. Bell's palsy has a benign prognosis with complete recovery in about 80% of patients, 15% experience some mode of permanent nerve damage and severe consequences remain in 5% of patients.

  2. Quantum discord with weak measurements

    International Nuclear Information System (INIS)

    Singh, Uttam; Pati, Arun Kumar

    2014-01-01

    Weak measurements cause small change to quantum states, thereby opening up the possibility of new ways of manipulating and controlling quantum systems. We ask, can weak measurements reveal more quantum correlation in a composite quantum state? We prove that the weak measurement induced quantum discord, called as the “super quantum discord”, is always larger than the quantum discord captured by the strong measurement. Moreover, we prove the monotonicity of the super quantum discord as a function of the measurement strength and in the limit of strong projective measurement the super quantum discord becomes the normal quantum discord. We find that unlike the normal discord, for pure entangled states, the super quantum discord can exceed the quantum entanglement. Our results provide new insights on the nature of quantum correlation and suggest that the notion of quantum correlation is not only observer dependent but also depends on how weakly one perturbs the composite system. We illustrate the key results for pure as well as mixed entangled states. -- Highlights: •Introduced the role of weak measurements in quantifying quantum correlation. •We have introduced the notion of the super quantum discord (SQD). •For pure entangled state, we show that the SQD exceeds the entanglement entropy. •This shows that quantum correlation depends not only on observer but also on measurement strength

  3. Learning from Weak and Noisy Labels for Semantic Segmentation

    KAUST Repository

    Lu, Zhiwu

    2016-04-08

    A weakly supervised semantic segmentation (WSSS) method aims to learn a segmentation model from weak (image-level) as opposed to strong (pixel-level) labels. By avoiding the tedious pixel-level annotation process, it can exploit the unlimited supply of user-tagged images from media-sharing sites such as Flickr for large scale applications. However, these ‘free’ tags/labels are often noisy and few existing works address the problem of learning with both weak and noisy labels. In this work, we cast the WSSS problem into a label noise reduction problem. Specifically, after segmenting each image into a set of superpixels, the weak and potentially noisy image-level labels are propagated to the superpixel level resulting in highly noisy labels; the key to semantic segmentation is thus to identify and correct the superpixel noisy labels. To this end, a novel L1-optimisation based sparse learning model is formulated to directly and explicitly detect noisy labels. To solve the L1-optimisation problem, we further develop an efficient learning algorithm by introducing an intermediate labelling variable. Extensive experiments on three benchmark datasets show that our method yields state-of-the-art results given noise-free labels, whilst significantly outperforming the existing methods when the weak labels are also noisy.

  4. Learning from Weak and Noisy Labels for Semantic Segmentation

    KAUST Repository

    Lu, Zhiwu; Fu, Zhenyong; Xiang, Tao; Han, Peng; Wang, Liwei; Gao, Xin

    2016-01-01

    A weakly supervised semantic segmentation (WSSS) method aims to learn a segmentation model from weak (image-level) as opposed to strong (pixel-level) labels. By avoiding the tedious pixel-level annotation process, it can exploit the unlimited supply of user-tagged images from media-sharing sites such as Flickr for large scale applications. However, these ‘free’ tags/labels are often noisy and few existing works address the problem of learning with both weak and noisy labels. In this work, we cast the WSSS problem into a label noise reduction problem. Specifically, after segmenting each image into a set of superpixels, the weak and potentially noisy image-level labels are propagated to the superpixel level resulting in highly noisy labels; the key to semantic segmentation is thus to identify and correct the superpixel noisy labels. To this end, a novel L1-optimisation based sparse learning model is formulated to directly and explicitly detect noisy labels. To solve the L1-optimisation problem, we further develop an efficient learning algorithm by introducing an intermediate labelling variable. Extensive experiments on three benchmark datasets show that our method yields state-of-the-art results given noise-free labels, whilst significantly outperforming the existing methods when the weak labels are also noisy.

  5. Constrained Deep Weak Supervision for Histopathology Image Segmentation.

    Science.gov (United States)

    Jia, Zhipeng; Huang, Xingyi; Chang, Eric I-Chao; Xu, Yan

    2017-11-01

    In this paper, we develop a new weakly supervised learning algorithm to learn to segment cancerous regions in histopathology images. This paper is under a multiple instance learning (MIL) framework with a new formulation, deep weak supervision (DWS); we also propose an effective way to introduce constraints to our neural networks to assist the learning process. The contributions of our algorithm are threefold: 1) we build an end-to-end learning system that segments cancerous regions with fully convolutional networks (FCNs) in which image-to-image weakly-supervised learning is performed; 2) we develop a DWS formulation to exploit multi-scale learning under weak supervision within FCNs; and 3) constraints about positive instances are introduced in our approach to effectively explore additional weakly supervised information that is easy to obtain and enjoy a significant boost to the learning process. The proposed algorithm, abbreviated as DWS-MIL, is easy to implement and can be trained efficiently. Our system demonstrates the state-of-the-art results on large-scale histopathology image data sets and can be applied to various applications in medical imaging beyond histopathology images, such as MRI, CT, and ultrasound images.

  6. Weak-interacting holographic QCD

    International Nuclear Information System (INIS)

    Gazit, D.; Yee, H.-U.

    2008-06-01

    We propose a simple prescription for including low-energy weak-interactions into the frame- work of holographic QCD, based on the standard AdS/CFT dictionary of double-trace deformations. As our proposal enables us to calculate various electro-weak observables involving strongly coupled QCD, it opens a new perspective on phenomenological applications of holographic QCD. We illustrate efficiency and usefulness of our method by performing a few exemplar calculations; neutron beta decay, charged pion weak decay, and meson-nucleon parity non-conserving (PNC) couplings. The idea is general enough to be implemented in both Sakai-Sugimoto as well as Hard/Soft Wall models. (author)

  7. Plane waves with weak singularities

    International Nuclear Information System (INIS)

    David, Justin R.

    2003-03-01

    We study a class of time dependent solutions of the vacuum Einstein equations which are plane waves with weak null singularities. This singularity is weak in the sense that though the tidal forces diverge at the singularity, the rate of divergence is such that the distortion suffered by a freely falling observer remains finite. Among such weak singular plane waves there is a sub-class which does not exhibit large back reaction in the presence of test scalar probes. String propagation in these backgrounds is smooth and there is a natural way to continue the metric beyond the singularity. This continued metric admits string propagation without the string becoming infinitely excited. We construct a one parameter family of smooth metrics which are at a finite distance in the space of metrics from the extended metric and a well defined operator in the string sigma model which resolves the singularity. (author)

  8. Cosmology and the weak interaction

    Energy Technology Data Exchange (ETDEWEB)

    Schramm, D.N. (Fermi National Accelerator Lab., Batavia, IL (USA)):(Chicago Univ., IL (USA))

    1989-12-01

    The weak interaction plays a critical role in modern Big Bang cosmology. This review will emphasize two of its most publicized cosmological connections: Big Bang nucleosynthesis and Dark Matter. The first of these is connected to the cosmological prediction of Neutrino Flavours, N{sub {nu}} {approximately} 3 which is now being confirmed at SLC and LEP. The second is interrelated to the whole problem of galaxy and structure formation in the universe. This review will demonstrate the role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure. 87 refs., 3 figs., 5 tabs.

  9. Cosmology and the weak interaction

    International Nuclear Information System (INIS)

    Schramm, D.N.

    1989-12-01

    The weak interaction plays a critical role in modern Big Bang cosmology. This review will emphasize two of its most publicized cosmological connections: Big Bang nucleosynthesis and Dark Matter. The first of these is connected to the cosmological prediction of Neutrino Flavours, N ν ∼ 3 which is now being confirmed at SLC and LEP. The second is interrelated to the whole problem of galaxy and structure formation in the universe. This review will demonstrate the role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure. 87 refs., 3 figs., 5 tabs

  10. Nonlinear waves and weak turbulence

    CERN Document Server

    Zakharov, V E

    1997-01-01

    This book is a collection of papers on dynamical and statistical theory of nonlinear wave propagation in dispersive conservative media. Emphasis is on waves on the surface of an ideal fluid and on Rossby waves in the atmosphere. Although the book deals mainly with weakly nonlinear waves, it is more than simply a description of standard perturbation techniques. The goal is to show that the theory of weakly interacting waves is naturally related to such areas of mathematics as Diophantine equations, differential geometry of waves, Poincaré normal forms, and the inverse scattering method.

  11. Weak disorder in Fibonacci sequences

    Energy Technology Data Exchange (ETDEWEB)

    Ben-Naim, E [Theoretical Division and Center for Nonlinear Studies, Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Krapivsky, P L [Department of Physics and Center for Molecular Cybernetics, Boston University, Boston, MA 02215 (United States)

    2006-05-19

    We study how weak disorder affects the growth of the Fibonacci series. We introduce a family of stochastic sequences that grow by the normal Fibonacci recursion with probability 1 - {epsilon}, but follow a different recursion rule with a small probability {epsilon}. We focus on the weak disorder limit and obtain the Lyapunov exponent that characterizes the typical growth of the sequence elements, using perturbation theory. The limiting distribution for the ratio of consecutive sequence elements is obtained as well. A number of variations to the basic Fibonacci recursion including shift, doubling and copying are considered. (letter to the editor)

  12. Weak interactions at high energies

    International Nuclear Information System (INIS)

    Ellis, J.

    1978-08-01

    Review lectures are presented on the phenomenological implications of the modern spontaneously broken gauge theories of the weak and electromagnetic interactions, and some observations are made about which high energy experiments probe what aspects of gauge theories. Basic quantum chromodynamics phenomenology is covered including momentum dependent effective quark distributions, the transverse momentum cutoff, search for gluons as sources of hadron jets, the status and prospects for the spectroscopy of fundamental fermions and how fermions may be used to probe aspects of the weak and electromagnetic gauge theory, studies of intermediate vector bosons, and miscellaneous possibilities suggested by gauge theories from the Higgs bosons to speculations about proton decay. 187 references

  13. Direct quantum process tomography via measuring sequential weak values of incompatible observables.

    Science.gov (United States)

    Kim, Yosep; Kim, Yong-Su; Lee, Sang-Yun; Han, Sang-Wook; Moon, Sung; Kim, Yoon-Ho; Cho, Young-Wook

    2018-01-15

    The weak value concept has enabled fundamental studies of quantum measurement and, recently, found potential applications in quantum and classical metrology. However, most weak value experiments reported to date do not require quantum mechanical descriptions, as they only exploit the classical wave nature of the physical systems. In this work, we demonstrate measurement of the sequential weak value of two incompatible observables by making use of two-photon quantum interference so that the results can only be explained quantum physically. We then demonstrate that the sequential weak value measurement can be used to perform direct quantum process tomography of a qubit channel. Our work not only demonstrates the quantum nature of weak values but also presents potential new applications of weak values in analyzing quantum channels and operations.

  14. Weak pion production off the nucleon

    International Nuclear Information System (INIS)

    Hernandez, E.; Nieves, J.; Valverde, M.

    2007-01-01

    We develop a model for the weak pion production off the nucleon, which besides the delta pole mechanism [weak excitation of the Δ(1232) resonance and its subsequent decay into Nπ], includes also some background terms required by chiral symmetry. We refit the C 5 A (q 2 ) form factor to the flux-averaged ν μ p→μ - pπ + ANL q 2 -differential cross section data, finding a substantially smaller contribution of the delta pole mechanism than traditionally assumed in the literature. Within this scheme, we calculate several differential and integrated cross sections, including pion angular distributions, induced by neutrinos and antineutrinos and driven both by charged and neutral currents. In all cases we find that the background terms produce quite significant effects, and that they lead to an overall improved description of the data, as compared to the case where only the delta pole mechanism is considered. We also show that the interference between the delta pole and the background terms produces parity-violating contributions to the pion angular differential cross section, which are intimately linked to T-odd correlations in the contraction between the leptonic and hadronic tensors. However, these latter correlations do not imply a genuine violation of time-reversal invariance because of the existence of strong final state interaction effects

  15. Herbivory eliminates fitness costs of mutualism exploiters.

    Science.gov (United States)

    Simonsen, Anna K; Stinchcombe, John R

    2014-04-01

    A common empirical observation in mutualistic interactions is the persistence of variation in partner quality and, in particular, the persistence of exploitative phenotypes. For mutualisms between hosts and symbionts, most mutualism theory assumes that exploiters always impose fitness costs on their host. We exposed legume hosts to mutualistic (nitrogen-fixing) and exploitative (non-nitrogen-fixing) symbiotic rhizobia in field conditions, and manipulated the presence or absence of insect herbivory to determine if the costly fitness effects of exploitative rhizobia are context-dependent. Exploitative rhizobia predictably reduced host fitness when herbivores were excluded. However, insects caused greater damage on hosts associating with mutualistic rhizobia, as a consequence of feeding preferences related to leaf nitrogen content, resulting in the elimination of fitness costs imposed on hosts by exploitative rhizobia. Our experiment shows that herbivory is potentially an important factor in influencing the evolutionary dynamic between legumes and rhizobia. Partner choice and host sanctioning are theoretically predicted to stabilize mutualisms by reducing the frequency of exploitative symbionts. We argue that herbivore pressure may actually weaken selection on choice and sanction mechanisms, thus providing one explanation of why host-based discrimination mechanisms may not be completely effective in eliminating nonbeneficial partners. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  16. Ultrasonic imaging of material flaws exploiting multipath information

    Science.gov (United States)

    Shen, Xizhong; Zhang, Yimin D.; Demirli, Ramazan; Amin, Moeness G.

    2011-05-01

    In this paper, we consider ultrasonic imaging for the visualization of flaws in a material. Ultrasonic imaging is a powerful nondestructive testing (NDT) tool which assesses material conditions via the detection, localization, and classification of flaws inside a structure. Multipath exploitations provide extended virtual array apertures and, in turn, enhance imaging capability beyond the limitation of traditional multisensor approaches. We utilize reflections of ultrasonic signals which occur when encountering different media and interior discontinuities. The waveforms observed at the physical as well as virtual sensors yield additional measurements corresponding to different aspect angles. Exploitation of multipath information addresses unique issues observed in ultrasonic imaging. (1) Utilization of physical and virtual sensors significantly extends the array aperture for image enhancement. (2) Multipath signals extend the angle of view of the narrow beamwidth of the ultrasound transducers, allowing improved visibility and array design flexibility. (3) Ultrasonic signals experience difficulty in penetrating a flaw, thus the aspect angle of the observation is limited unless access to other sides is available. The significant extension of the aperture makes it possible to yield flaw observation from multiple aspect angles. We show that data fusion of physical and virtual sensor data significantly improves the detection and localization performance. The effectiveness of the proposed multipath exploitation approach is demonstrated through experimental studies.

  17. Weak localization of seismic waves

    International Nuclear Information System (INIS)

    Larose, E.; Margerin, L.; Tiggelen, B.A. van; Campillo, M.

    2004-01-01

    We report the observation of weak localization of seismic waves in a natural environment. It emerges as a doubling of the seismic energy around the source within a spot of the width of a wavelength, which is several tens of meters in our case. The characteristic time for its onset is the scattering mean-free time that quantifies the internal heterogeneity

  18. On Weak-BCC-Algebras

    Science.gov (United States)

    Thomys, Janus; Zhang, Xiaohong

    2013-01-01

    We describe weak-BCC-algebras (also called BZ-algebras) in which the condition (x∗y)∗z = (x∗z)∗y is satisfied only in the case when elements x, y belong to the same branch. We also characterize ideals, nilradicals, and nilpotent elements of such algebras. PMID:24311983

  19. Voltage Weak DC Distribution Grids

    NARCIS (Netherlands)

    Hailu, T.G.; Mackay, L.J.; Ramirez Elizondo, L.M.; Ferreira, J.A.

    2017-01-01

    This paper describes the behavior of voltage weak DC distribution systems. These systems have relatively small system capacitance. The size of system capacitance, which stores energy, has a considerable effect on the value of fault currents, control complexity, and system reliability. A number of

  20. The structure of weak interaction

    International Nuclear Information System (INIS)

    Zee, A.

    1977-01-01

    The effect of introducing righthanded currents on the structure of weak interaction is discussed. The ΔI=1/2 rule is in the spotlight. The discussion provides an interesting example in which the so-called Iizuka-Okubo-Zweing rule is not only evaded, but completely negated

  1. Coverings, Networks and Weak Topologies

    Czech Academy of Sciences Publication Activity Database

    Dow, A.; Junnila, H.; Pelant, Jan

    2006-01-01

    Roč. 53, č. 2 (2006), s. 287-320 ISSN 0025-5793 R&D Projects: GA ČR GA201/97/0216 Institutional research plan: CEZ:AV0Z10190503 Keywords : Banach spaces * weak topologies * networks topologies Subject RIV: BA - General Mathematics

  2. Weak differentiability of product measures

    NARCIS (Netherlands)

    Heidergott, B.F.; Leahu, H.

    2010-01-01

    In this paper, we study cost functions over a finite collection of random variables. For these types of models, a calculus of differentiation is developed that allows us to obtain a closed-form expression for derivatives where "differentiation" has to be understood in the weak sense. The technique

  3. Weak lensing and dark energy

    International Nuclear Information System (INIS)

    Huterer, Dragan

    2002-01-01

    We study the power of upcoming weak lensing surveys to probe dark energy. Dark energy modifies the distance-redshift relation as well as the matter power spectrum, both of which affect the weak lensing convergence power spectrum. Some dark-energy models predict additional clustering on very large scales, but this probably cannot be detected by weak lensing alone due to cosmic variance. With reasonable prior information on other cosmological parameters, we find that a survey covering 1000 sq deg down to a limiting magnitude of R=27 can impose constraints comparable to those expected from upcoming type Ia supernova and number-count surveys. This result, however, is contingent on the control of both observational and theoretical systematics. Concentrating on the latter, we find that the nonlinear power spectrum of matter perturbations and the redshift distribution of source galaxies both need to be determined accurately in order for weak lensing to achieve its full potential. Finally, we discuss the sensitivity of the three-point statistics to dark energy

  4. Weak pion production from nuclei

    Indian Academy of Sciences (India)

    effect of Pauli blocking, Fermi motion and renormalization of weak ∆ properties ... Furthermore, the angular distribution and the energy distribution of ... Here ψα(p ) and u(p) are the Rarita Schwinger and Dirac spinors for ∆ and nucleon.

  5. Weak transitions in 44Ca

    International Nuclear Information System (INIS)

    Tauhata, L.; Marques, A.

    1972-01-01

    Energy levels and gamma radiation transitions of Ca 44 are experimentally determined, mainly the weak transition at 564 KeV and 728 KeV. The decay scheme and the method used (coincidence with Ge-Li detector) are also presented [pt

  6. Understanding traditional African healing

    OpenAIRE

    MOKGOBI, M.G.

    2014-01-01

    Traditional African healing has been in existence for many centuries yet many people still seem not to understand how it relates to God and religion/spirituality. Some people seem to believe that traditional healers worship the ancestors and not God. It is therefore the aim of this paper to clarify this relationship by discussing a chain of communication between the worshipers and the Almighty God. Other aspects of traditional healing namely types of traditional healers, training of tradition...

  7. Peat exploitation - Environment. Effects and measures

    International Nuclear Information System (INIS)

    Stenbeck, G.

    1996-01-01

    This report gives a detailed description of the influence of peat exploitation on the land-, water- and atmospheric environments. Proposals for mitigatory measures to minimize damage to the environment are also given

  8. SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...

    African Journals Online (AJOL)

    Allaiac

    from sexual exploitation and sexual abuse (ST/SGB/2003/13) (UN, Secretary .... In addition, in most situations, UN personnel have enjoyed immunity from local .... 9 Official UN statistics show a higher incidence of allegations reported against.

  9. Exploitation of linkage learning in evolutionary algorithms

    CERN Document Server

    Chen, Ying-ping

    2010-01-01

    The exploitation of linkage learning is enhancing the performance of evolutionary algorithms. This monograph examines recent progress in linkage learning, with a series of focused technical chapters that cover developments and trends in the field.

  10. Exploitative and Deceptive Resource Acquisition Strategies

    Directory of Open Access Journals (Sweden)

    Joshua J. Reynolds

    2015-07-01

    Full Text Available Life history strategy (LHS and life history contingencies (LHCs should theoretically influence the use of exploitative and deceptive resource acquisition strategies. However, little research has been done in this area. The purpose of the present work was to create measures of exploitative strategies and test the predictions of life history theory. Pilot studies developed and validated a behavioral measure of cheating called the Dot Game. The role of individual LHS and LHCs (manipulated via validated story primes on cheating was investigated in Study 1. Studies 2a through 2c were conducted to develop and validate a self-report measure called the Exploitative and Deceptive Resource Acquisition Strategy Scale (EDRASS. Finally, Study 3 investigated life history and EDRASS. Results indicated that while LHS influences exploitative strategies, life history contingences had little effect. Implications of these findings are discussed.

  11. Organ sales: exploitative at any price?

    Science.gov (United States)

    Lawlor, Rob

    2014-05-01

    In many cases, claims that a transaction is exploitative will focus on the details of the transaction, such as the price paid or conditions. For example, in a claim that a worker is exploited, the grounds for the claim are usually that the pay is not sufficient or the working conditions too dangerous. In some cases, however, the claim that a transaction is exploitative is not seen to rely on these finer details. Many, for example, claim that organ sales would be exploitative, in a way that doesn't seem to depend on the details. This article considers, but ultimately rejects, a number of arguments which could be used to defend this sort of claim. © 2012 John Wiley & Sons Ltd.

  12. A Theory of Exploitative Child Labor

    OpenAIRE

    Carol Ann Rogers; Kenneth A. Swinnerton

    2003-01-01

    Child labor laws should aim to protect children who work, instead of trying to remove children from work. In this paper, we identify an instance when the risk of exploitation lowers the expected bene…t of child labor to the child,and therefore suppresses child labor force participation. Targeted legal intervention that lowers or removes the risk of exploitation raises child participation in the labor market, child welfare, and overall societal welfare. Targeting on child labor more broadly ma...

  13. ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES

    Directory of Open Access Journals (Sweden)

    Himanshu Shewale

    2014-03-01

    Full Text Available Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

  14. Understanding traditional African healing.

    Science.gov (United States)

    Mokgobi, M G

    2014-09-01

    Traditional African healing has been in existence for many centuries yet many people still seem not to understand how it relates to God and religion/spirituality. Some people seem to believe that traditional healers worship the ancestors and not God. It is therefore the aim of this paper to clarify this relationship by discussing a chain of communication between the worshipers and the Almighty God. Other aspects of traditional healing namely types of traditional healers, training of traditional healers as well as the role of traditional healers in their communities are discussed. In conclusion, the services of traditional healers go far beyond the uses of herbs for physical illnesses. Traditional healers serve many roles which include but not limited to custodians of the traditional African religion and customs, educators about culture, counselors, social workers and psychologists.

  15. Light weakly interacting massive particles

    Science.gov (United States)

    Gelmini, Graciela B.

    2017-08-01

    Light weakly interacting massive particles (WIMPs) are dark matter particle candidates with weak scale interaction with the known particles, and mass in the GeV to tens of GeV range. Hints of light WIMPs have appeared in several dark matter searches in the last decade. The unprecedented possible coincidence into tantalizingly close regions of mass and cross section of four separate direct detection experimental hints and a potential indirect detection signal in gamma rays from the galactic center, aroused considerable interest in our field. Even if these hints did not so far result in a discovery, they have had a significant impact in our field. Here we review the evidence for and against light WIMPs as dark matter candidates and discuss future relevant experiments and observations.

  16. (Weakly) three-dimensional caseology

    International Nuclear Information System (INIS)

    Pomraning, G.C.

    1996-01-01

    The singular eigenfunction technique of Case for solving one-dimensional planar symmetry linear transport problems is extended to a restricted class of three-dimensional problems. This class involves planar geometry, but with forcing terms (either boundary conditions or internal sources) which are weakly dependent upon the transverse spatial variables. Our analysis involves a singular perturbation about the classic planar analysis, and leads to the usual Case discrete and continuum modes, but modulated by weakly dependent three-dimensional spatial functions. These functions satisfy parabolic differential equations, with a different diffusion coefficient for each mode. Representative one-speed time-independent transport problems are solved in terms of these generalised Case eigenfunctions. Our treatment is very heuristic, but may provide an impetus for more rigorous analysis. (author)

  17. History of the weak interactions

    International Nuclear Information System (INIS)

    Lee, T.D.

    1987-01-01

    At the 'Jackfest' marking the 65th birthday of Jack Steinberger (see July/August 1986 issue, page 29), T.D. Lee gave an account of the history of the weak interactions. This edited version omits some of Lee's tributes to Steinberger, but retains the impressive insight into the subtleties of a key area of modern physics by one who played a vital role in its development. (orig./HSI).

  18. Weak neutral-current interactions

    International Nuclear Information System (INIS)

    Barnett, R.M.

    1978-08-01

    The roles of each type of experiment in establishing uniquely the values of the the neutral-current couplings of u and d quarks are analyzed together with their implications for gauge models of the weak and electromagnetic interactions. An analysis of the neutral-current couplings of electrons and of the data based on the assumption that only one Z 0 boson exists is given. Also a model-independent analysis of parity violation experiments is discussed. 85 references

  19. Submanifolds weakly associated with graphs

    Indian Academy of Sciences (India)

    A CARRIAZO, L M FERN ´ANDEZ and A RODRÍGUEZ-HIDALGO. Department of Geometry and Topology, ..... by means of trees (connected graphs without cycles) and forests (disjoint unions of trees, see [6]) given in [3], by extending it to weak ... CR-submanifold. In this case, every tree is a K2. Finally, Theorem 3.8 of [3] can ...

  20. Cyber Child Sexual Exploitation dalam Perspektif Perlindungan atas Kejahatan Siber

    Directory of Open Access Journals (Sweden)

    Go Lisanawati

    2013-04-01

    Full Text Available Perkembangan teknologi, yang diwujudkan dengan adanya inovasi berupa Internet, yang semakin pesat menempatkan semua pihak berada pada sebuah posisi yang rentan. Kerentanan tersebut dapat berupa tereksploitasinya orang menjadi korban maupun pelaku kejahatan. Teknologi menjadi pedang bermata dua dengan segala kelebihan dan eksplorasi serta eksploitasi atas kelemahan atas pemanfaatan teknologi tersebut oleh orang-orang yang tidak bertanggungjawab. Pada posisi yang sama, anak menjadi korban yang sangat potensial atas penyalahgunaan teknologi, khususnya atas eksploitasi seksual yang dapat meliputi pornografi anak, perdagangan anak, dan child sex tourism. Indonesia memang telah memiliki berbagai perangkat aturan hukum yang dipergunakan untuk memberikan perlindungan kepada anak, termasuk juga di dalamnya adalah perangkat hukum di bidang telematika. Namun demikian belum semua perangkat hukum tersebut dapat dipergunakan secara maksimal untuk mewujudkan perlindungan hukum bagi anak. The rapid development of technology through Internet nowadays has been put all parties in the vulnerable position. The vulnerable form which may appear is the possibility of the exploited parties to be victims and/or the offender of crime. Technology itself brings not only advancement but also the weaknesses which may be explored and exploited by the irresponsible people by doing such a crime. In the same position, children are potentially to be the very vulnerable victims of the misuse of the technology, especially sexual exploitation which including child pornography, child trafficking, and also child sex tourism. Indonesia is already having such kind of law to give protection to children, including also the law related to telematics matter. But not each law could maximize yet implemented to give the law protection for child.

  1. Exploitation of Labour and Exploitation of Commodities: a “New Interpretation”

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2011-01-01

    In the standard Okishio-Morishima approach, the existence of profits is proved to be equivalent to the exploitation of labour. Yet, it can also be proved that the existence of profits is equivalent to the ‘exploitation’ of any good. Labour and commodity exploitation are just different numerical representations of the productiveness of the economy. This paper presents an alternative approach to exploitation theory which is related to the New Interpretation (Duménil 1980; Foley 1982). In this a...

  2. Gossip and Distributed Kalman Filtering: Weak Consensus Under Weak Detectability

    Science.gov (United States)

    Kar, Soummya; Moura, José M. F.

    2011-04-01

    The paper presents the gossip interactive Kalman filter (GIKF) for distributed Kalman filtering for networked systems and sensor networks, where inter-sensor communication and observations occur at the same time-scale. The communication among sensors is random; each sensor occasionally exchanges its filtering state information with a neighbor depending on the availability of the appropriate network link. We show that under a weak distributed detectability condition: 1. the GIKF error process remains stochastically bounded, irrespective of the instability properties of the random process dynamics; and 2. the network achieves \\emph{weak consensus}, i.e., the conditional estimation error covariance at a (uniformly) randomly selected sensor converges in distribution to a unique invariant measure on the space of positive semi-definite matrices (independent of the initial state.) To prove these results, we interpret the filtered states (estimates and error covariances) at each node in the GIKF as stochastic particles with local interactions. We analyze the asymptotic properties of the error process by studying as a random dynamical system the associated switched (random) Riccati equation, the switching being dictated by a non-stationary Markov chain on the network graph.

  3. Weak links in high critical temperature superconductors

    Science.gov (United States)

    Tafuri, Francesco; Kirtley, John R.

    2005-11-01

    The traditional distinction between tunnel and highly transmissive barriers does not currently hold for high critical temperature superconducting Josephson junctions, both because of complicated materials issues and the intrinsic properties of high temperature superconductors (HTS). An intermediate regime, typical of both artificial superconductor-barrier-superconductor structures and of grain boundaries, spans several orders of magnitude in the critical current density and specific resistivity. The physics taking place at HTS surfaces and interfaces is rich, primarily because of phenomena associated with d-wave order parameter (OP) symmetry. These phenomena include Andreev bound states, the presence of the second harmonic in the critical current versus phase relation, a doubly degenerate state, time reversal symmetry breaking and the possible presence of an imaginary component of the OP. All these effects are regulated by a series of transport mechanisms, whose rules of interplay and relative activation are unknown. Some transport mechanisms probably have common roots, which are not completely clear and possibly related to the intrinsic nature of high-TC superconductivity. The d-wave OP symmetry gives unique properties to HTS weak links, which do not have any analogy with systems based on other superconductors. Even if the HTS structures are not optimal, compared with low critical temperature superconductor Josephson junctions, the state of the art allows the realization of weak links with unexpectedly high quality quantum properties, which open interesting perspectives for the future. The observation of macroscopic quantum tunnelling and the qubit proposals represent significant achievements in this direction. In this review we attempt to encompass all the above aspects, attached to a solid experimental basis of junction concepts and basic properties, along with a flexible phenomenological background, which collects ideas on the Josephson effect in the presence

  4. Weak links in high critical temperature superconductors

    International Nuclear Information System (INIS)

    Tafuri, Francesco; Kirtley, John R

    2005-01-01

    The traditional distinction between tunnel and highly transmissive barriers does not currently hold for high critical temperature superconducting Josephson junctions, both because of complicated materials issues and the intrinsic properties of high temperature superconductors (HTS). An intermediate regime, typical of both artificial superconductor-barrier-superconductor structures and of grain boundaries, spans several orders of magnitude in the critical current density and specific resistivity. The physics taking place at HTS surfaces and interfaces is rich, primarily because of phenomena associated with d-wave order parameter (OP) symmetry. These phenomena include Andreev bound states, the presence of the second harmonic in the critical current versus phase relation, a doubly degenerate state, time reversal symmetry breaking and the possible presence of an imaginary component of the OP. All these effects are regulated by a series of transport mechanisms, whose rules of interplay and relative activation are unknown. Some transport mechanisms probably have common roots, which are not completely clear and possibly related to the intrinsic nature of high-T C superconductivity. The d-wave OP symmetry gives unique properties to HTS weak links, which do not have any analogy with systems based on other superconductors. Even if the HTS structures are not optimal, compared with low critical temperature superconductor Josephson junctions, the state of the art allows the realization of weak links with unexpectedly high quality quantum properties, which open interesting perspectives for the future. The observation of macroscopic quantum tunnelling and the qubit proposals represent significant achievements in this direction. In this review we attempt to encompass all the above aspects, attached to a solid experimental basis of junction concepts and basic properties, along with a flexible phenomenological background, which collects ideas on the Josephson effect in the presence

  5. Oil exploitation and the environmental Kuznets curve

    International Nuclear Information System (INIS)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar

    2009-01-01

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  6. Oil exploitation and the environmental Kuznets curve

    Energy Technology Data Exchange (ETDEWEB)

    Esmaeili, Abdoulkarim; Abdollahzadeh, Negar [Department of Agricultural Economics, College of Agriculture, Shiraz University, Shiraz, Fars (Iran)

    2009-01-15

    This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)

  7. Rethinking exploitation: a process-centered account.

    Science.gov (United States)

    Jansen, Lynn A; Wall, Steven

    2013-12-01

    Exploitation has become an important topic in recent discussions of biomedical and research ethics. This is due in no small measure to the influence of Alan Wertheimer's path-breaking work on the subject. This paper presents some objections to Wertheimer's account of the concept. The objections attempt to show that his account places too much emphasis on outcome-based considerations and too little on process-based considerations. Building on these objections, the paper develops an alternative process-centered account of the concept. This alternative account of exploitation takes as its point of departure the broadly Kantian notion that it is wrong to use another as an instrument for the advancement of one's own ends. It sharpens this slippery notion and adds a number of refinements to it. The paper concludes by arguing that process-centered accounts of exploitation better illuminate the ethical challenges posed by research on human subjects than outcome-centered accounts.

  8. Why is gravity so weak?

    International Nuclear Information System (INIS)

    Goradia, S.G.

    2006-01-01

    Why is gravity weak? Gravity is plagued with this and many other questions. After decades of exhausting work we do not have a clear answer. In view of this fact it will be shown in the following pages that there are reasons for thinking that gravity is just a composite force consisting of the long-range manifestations of short range nuclear forces that are too tiny to be measured at illuminated or long ranges by particle colliders. This is consistent with Einstein's proposal in 1919

  9. Weak decays of heavy quarks

    International Nuclear Information System (INIS)

    Gaillard, M.K.

    1978-08-01

    The properties that may help to identify the two additional quark flavors that are expected to be discovered. These properties are lifetime, branching ratios, selection rules, and lepton decay spectra. It is also noted that CP violation may manifest itself more strongly in heavy particle decays than elsewhere providing a new probe of its origin. The theoretical progress in the understanding of nonleptonic transitions among lighter quarks, nonleptonic K and hyperon decay amplitudes, omega minus and charmed particle decay predictions, and lastly the Kobayashi--Maskawa model for the weak coupling of heavy quarks together with the details of its implications for topology and bottomology are treated. 48 references

  10. Weak consistency and strong paraconsistency

    Directory of Open Access Journals (Sweden)

    Gemma Robles

    2009-11-01

    Full Text Available In a standard sense, consistency and paraconsistency are understood as, respectively, the absence of any contradiction and as the absence of the ECQ (“E contradictione quodlibet” rule that allows us to conclude any well formed formula from any contradiction. The aim of this paper is to explain the concepts of weak consistency alternative to the standard one, the concepts of paraconsistency related to them and the concept of strong paraconsistency, all of which have been defined by the author together with José M. Méndez.

  11. Electromagnetic weak turbulence theory revisited

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, P. H. [IPST, University of Maryland, College Park, Maryland 20742 (United States); Ziebell, L. F. [Instituto de Fisica, UFRGS, Porto Alegre, RS (Brazil); Gaelzer, R.; Pavan, J. [Instituto de Fisica e Matematica, UFPel, Pelotas, RS (Brazil)

    2012-10-15

    The statistical mechanical reformulation of weak turbulence theory for unmagnetized plasmas including fully electromagnetic effects was carried out by Yoon [Phys. Plasmas 13, 022302 (2006)]. However, the wave kinetic equation for the transverse wave ignores the nonlinear three-wave interaction that involves two transverse waves and a Langmuir wave, the incoherent analogue of the so-called Raman scattering process, which may account for the third and higher-harmonic plasma emissions. The present paper extends the previous formalism by including such a term.

  12. Shale gas exploitation: Status, problems and prospect

    Directory of Open Access Journals (Sweden)

    Shiqian Wang

    2018-02-01

    Full Text Available Over the past five years, great progress has been made in shale gas exploitation, which has become the most driving force for global gas output growth. Hydrocarbon extraction from shale helps drive the USA on the road to energy independence. Besides, shale oil & gas production has been kept in a sustained growth by continuous improvement in drilling efficiency and well productivity in the case of tumbling oil prices and rig counts. Shale gas reserves and production have been in a rapid growth in China owing to the Lower Paleozoic Wufeng and Longmaxi shale gas exploitation in the Sichuan Basin, which has become an important sector for the future increment of gas reserves and output in China. However, substantial progress has been made neither in non-marine shale gas exploitation as previously expected nor in the broad complicated tectonic areas in South China for which a considerable investment was made. Analysis of the basic situation and issues in domestic shale gas development shows that shale gas exploitation prospects are constrained by many problems in terms of resources endowment, horizontal well fracturing technology, etc. especially in non-marine shale deposits and complicated tectonic areas in South China where hot shales are widely distributed but geological structures are found severely deformed and over matured. Discussion on the prospects shows that the sustained and steady growth in shale gas reserves and production capacity in the coming years lies in the discovery and supersession of new shale plays in addition to Wufeng and Longmaxi shale plays, and that a technological breakthrough in ultra-high-pressure and ultra-deep (over 3500 m buried in the Sichuan Basin marine shale gas exploitation is the key and hope. Keywords: Shale gas, Exploitation, Marine facies, Hot shale, Resource endowment, Sichuan Basin, South China, Complicated tectonic area, Gas play

  13. Population connectivity and larval dispersal of the exploited mangrove crab Ucides cordatus along the Brazilian coast

    Science.gov (United States)

    Schmidt, Anders J.; Carvalho, Adriana M.F.; Vasconcelos, Carolina C.M.P.; Farias, Antonia M.; Bentzen, Paul

    2018-01-01

    Background The mangrove crab Ucides cordatus is considered a key species for the ecological balance of mangrove forests and a major source of employment and income for traditional crab collectors in Brazil. Several studies evidenced weak genetic variation among populations due to an efficient larval transport. However, gene flow patterns of the species is poorly understood, with no information about migration rates. The influence of the two main Brazilian currents in larval dispersion is also not clear. In order to provide baseline information for conservation, planning and management of this important fishery resource, the present study aimed to estimate and evaluate spatial distribution of genetic diversity, migration rates and gene flow directivity among populations of U. cordatus in Brazil. Methods Nine microsatellites were used to resolve population structure of 319 crabs collected from six sites located along the Brazilian coast. The degree of geographical differentiation included estimates of genetic diversity, population structure and gene flow models, with spatial analysis of shared alleles (SAShA), isolation by distance tests, AMOVA, discriminant analysis of principal components (DAPC) and Bayesian clustering. We estimated the amount of ongoing gene flow between clusters using the coalescent-based method implemented in Migrate-N. Results Loci were highly polymorphic (average of 12.4 alleles per locus) evidencing high genetic variability. There was significant differentiation among localities, despite of the low value of FST (= 0.019; P < 0.001). FST and Jost’s D indexes were also estimated in pairwise comparisons and showed significant differences between most of the surveyed site pairs (P < 0.05). Structure evidenced a single genetic group among samples, however SAShA pointed to a non-panmictic condition (P = 0.011). AMOVA detected four statistical significant clusters with low level of differentiation (FCT = 0.037; P = 0.023). The gene flow model that

  14. Population connectivity and larval dispersal of the exploited mangrove crab Ucides cordatus along the Brazilian coast.

    Science.gov (United States)

    Britto, Fábio B; Schmidt, Anders J; Carvalho, Adriana M F; Vasconcelos, Carolina C M P; Farias, Antonia M; Bentzen, Paul; Diniz, Fábio M

    2018-01-01

    The mangrove crab Ucides cordatus is considered a key species for the ecological balance of mangrove forests and a major source of employment and income for traditional crab collectors in Brazil. Several studies evidenced weak genetic variation among populations due to an efficient larval transport. However, gene flow patterns of the species is poorly understood, with no information about migration rates. The influence of the two main Brazilian currents in larval dispersion is also not clear. In order to provide baseline information for conservation, planning and management of this important fishery resource, the present study aimed to estimate and evaluate spatial distribution of genetic diversity, migration rates and gene flow directivity among populations of U. cordatus in Brazil. Nine microsatellites were used to resolve population structure of 319 crabs collected from six sites located along the Brazilian coast. The degree of geographical differentiation included estimates of genetic diversity, population structure and gene flow models, with spatial analysis of shared alleles (SAShA), isolation by distance tests, AMOVA, discriminant analysis of principal components (DAPC) and Bayesian clustering. We estimated the amount of ongoing gene flow between clusters using the coalescent-based method implemented in Migrate-N. Loci were highly polymorphic (average of 12.4 alleles per locus) evidencing high genetic variability. There was significant differentiation among localities, despite of the low value of F ST (= 0.019; P < 0.001). F ST and Jost's D indexes were also estimated in pairwise comparisons and showed significant differences between most of the surveyed site pairs ( P < 0.05). Structure evidenced a single genetic group among samples, however SAShA pointed to a non-panmictic condition ( P = 0.011). AMOVA detected four statistical significant clusters with low level of differentiation ( F CT = 0.037; P = 0.023). The gene flow model that best described the

  15. Population connectivity and larval dispersal of the exploited mangrove crab Ucides cordatus along the Brazilian coast

    Directory of Open Access Journals (Sweden)

    Fábio B. Britto

    2018-04-01

    Full Text Available Background The mangrove crab Ucides cordatus is considered a key species for the ecological balance of mangrove forests and a major source of employment and income for traditional crab collectors in Brazil. Several studies evidenced weak genetic variation among populations due to an efficient larval transport. However, gene flow patterns of the species is poorly understood, with no information about migration rates. The influence of the two main Brazilian currents in larval dispersion is also not clear. In order to provide baseline information for conservation, planning and management of this important fishery resource, the present study aimed to estimate and evaluate spatial distribution of genetic diversity, migration rates and gene flow directivity among populations of U. cordatus in Brazil. Methods Nine microsatellites were used to resolve population structure of 319 crabs collected from six sites located along the Brazilian coast. The degree of geographical differentiation included estimates of genetic diversity, population structure and gene flow models, with spatial analysis of shared alleles (SAShA, isolation by distance tests, AMOVA, discriminant analysis of principal components (DAPC and Bayesian clustering. We estimated the amount of ongoing gene flow between clusters using the coalescent-based method implemented in Migrate-N. Results Loci were highly polymorphic (average of 12.4 alleles per locus evidencing high genetic variability. There was significant differentiation among localities, despite of the low value of FST (= 0.019; P < 0.001. FST and Jost’s D indexes were also estimated in pairwise comparisons and showed significant differences between most of the surveyed site pairs (P < 0.05. Structure evidenced a single genetic group among samples, however SAShA pointed to a non-panmictic condition (P = 0.011. AMOVA detected four statistical significant clusters with low level of differentiation (FCT = 0.037; P = 0.023. The gene

  16. Weak interactions at the SSC

    International Nuclear Information System (INIS)

    Chanowitz, M.S.

    1986-03-01

    Prospects for the study of standard model weak interactions at the SSC are reviewed, with emphasis on the unique capability of the SSC to study the mechanism of electroweak symmetry breaking whether the associated new quanta are at the TeV scale or higher. Symmetry breaking by the minimal Higgs mechanism and by related strong interaction dynamical variants is summarized. A set of measurements is outlined that would calibrate the proton structure functions and the backgrounds to new physics. The ability to measure the three weak gauge boson vertex is found to complement LEP II, with measurements extending to larger Q 2 at a comparable statistical level in detectable decays. B factory physics is briefly reviewed as one example of a possible broad program of high statistics studies of sub-TeV scale phenomena. The largest section of the talk is devoted to the possible manifestations of symmetry breaking in the WW and ZZ production cross sections. Some new results are presented bearing on the ability to detect high mass WW and ZZ pairs. The principal conclusion is that although nonstandard model scenarios are typically more forgiving, the capability to study symmetry breaking in the standard model (and in related strong interaction dynamical variants) requires achieving the SSC design goals of √ s,L = 40Tev, 10 33 cm -2 sec -1 . 28 refs., 5 figs

  17. Probing supervoids with weak lensing

    Science.gov (United States)

    Higuchi, Yuichi; Inoue, Kaiki Taro

    2018-05-01

    The cosmic microwave background (CMB) has non-Gaussian features in the temperature fluctuations. An anomalous cold spot surrounded with a hot ring, called the Cold Spot, is one of such features. If a large underdense region (supervoid) resides towards the Cold Spot, we would be able to detect a systematic shape distortion in the images of background source galaxies via weak lensing effect. In order to estimate the detectability of such signals, we used the data of N-body simulations to simulate full-sky ray-tracing of source galaxies. We searched for a most prominent underdense region using the simulated convergence maps smoothed at a scale of 20° and obtained tangential shears around it. The lensing signal expected in a concordant Λ cold dark matter model can be detected at a signal-to-noise ratio S/N ˜ 3. If a supervoid with a radius of ˜200 h-1 Mpc and a density contrast δ0 ˜ -0.3 at the centre resides at a redshift z ˜ 0.2, on-going and near-future weak gravitational lensing surveys would detect a lensing signal with S/N ≳ 4 without resorting to stacking. From the tangential shear profile, we can obtain a constraint on the projected mass distribution of the supervoid.

  18. How Less Alienation Creates More Exploitation? Audience Labour on Social Network Sites.

    Directory of Open Access Journals (Sweden)

    Eran Fisher

    2012-05-01

    Full Text Available Abstract: The notion of audience labour has been an important contribution to Marxist political economy of the media. It revised the traditional political economy analysis, which focused on media ownership, by suggesting that media was also a site of production, constituting particular relations of production. Such analysis highlighted the active role of audience in the creation of media value as both commodities and workers, thus pointing to audience exploitation. Recently, in light of paradigmatic transformations in the media environment – particularly the emergence of Web 2.0 and social network sites – there has been a renewed interest in such analysis, and a reexamination of audience exploitation. Focusing on Facebook as a case-study, this article examines audience labour on social network sites along two Marxist themes – exploitation and alienation. It argues for a historical shift in the link between exploitation and alienation of audience labour, concurrent with the shift from mass media to social media. In the mass media, the capacity for exploitation of audience labour was quite limited while the alienation that such work created was high. In contrast, social media allows for the expansion and intensification of exploitation. Simultaneously, audience labour on social media – because it involves communication and sociability – also ameliorates alienation by allowing self-expression, authenticity, and relations with others. Moreover, the article argues that the political economy of social network sites is founded on a dialectical link between exploitation and alienation: in order to be de-alienated, Facebook users must communicate and socialize, thus exacerbating their exploitation. And vice-versa, in order for Facebook to exploit the work of its users, it must contribute to their de-alienation.

  19. FSH: fast spaced seed hashing exploiting adjacent hashes.

    Science.gov (United States)

    Girotto, Samuele; Comin, Matteo; Pizzi, Cinzia

    2018-01-01

    Patterns with wildcards in specified positions, namely spaced seeds , are increasingly used instead of k -mers in many bioinformatics applications that require indexing, querying and rapid similarity search, as they can provide better sensitivity. Many of these applications require to compute the hashing of each position in the input sequences with respect to the given spaced seed, or to multiple spaced seeds. While the hashing of k -mers can be rapidly computed by exploiting the large overlap between consecutive k -mers, spaced seeds hashing is usually computed from scratch for each position in the input sequence, thus resulting in slower processing. The method proposed in this paper, fast spaced-seed hashing (FSH), exploits the similarity of the hash values of spaced seeds computed at adjacent positions in the input sequence. In our experiments we compute the hash for each positions of metagenomics reads from several datasets, with respect to different spaced seeds. We also propose a generalized version of the algorithm for the simultaneous computation of multiple spaced seeds hashing. In the experiments, our algorithm can compute the hashing values of spaced seeds with a speedup, with respect to the traditional approach, between 1.6[Formula: see text] to 5.3[Formula: see text], depending on the structure of the spaced seed. Spaced seed hashing is a routine task for several bioinformatics application. FSH allows to perform this task efficiently and raise the question of whether other hashing can be exploited to further improve the speed up. This has the potential of major impact in the field, making spaced seed applications not only accurate, but also faster and more efficient. The software FSH is freely available for academic use at: https://bitbucket.org/samu661/fsh/overview.

  20. Personalized medicine: a confluence of traditional and contemporary medicine.

    Science.gov (United States)

    Jafari, Samineh; Abdollahi, Mohammad; Saeidnia, Soodabeh

    2014-01-01

    Traditional systems of medicine have attained great popularity among patients in recent years. Success of this system in the treatment of disease warrants consideration, particularly in cases for which conventional medicine has been insufficient. This study investigates the similarities in principles and approaches of 3 traditional systems and explores whether conventional medicine is able to exploit the advantages of traditional systems. This study first identifies and explores the advantages of 3 well-known systems-traditional Iranian medicine (TIM), ayurveda, and traditional Chinese medicine (TCM)-that are similar in their basic principles and methods. Second, it clarifies whether and how conventional medicine could exploit the advantages of traditional systems as it modernizes, to become more personalized. Finally, this study investigates the possibility that conventional medicine could benefit from traditional typology to improve its personalization. The acknowledgment of the unity of humans and nature, applying rational methods, and personalized approaches is fundamentally similar in the 3 systems. Additionally, they all promote the holistic view that health is harmony and disease is disharmony of the body. Other similarities include their recognition of the unique nature of every person and their categorization of people into different body types. Although conventional medicine has mostly failed to incorporate the advantages of traditional medicine, its integration with traditional medicine is achievable. For instance, exploiting traditional typologies in genomic and other studies may facilitate personalization of conventional medicine. From its review, the research team concludes that prospects are bright for the integration of traditional and conventional medicines and, consequently, for a dramatic improvement in health systems.

  1. On the dynamics of exploited fish populations

    National Research Council Canada - National Science Library

    Beverton, R. J. H; Holt, Sidney J

    1993-01-01

    ...-brooding cichlids, and viviparity in many sharks and toothcarps. Moreover, fish are of considerable importance to the survival of the human species in the form of nutritious, delicious and diverse food. Rational exploitation and management of our global stocks of fishes must rely upon a detailed and precise insight of their biology. The...

  2. Child Exploitation: Some Pieces of the Puzzle.

    Science.gov (United States)

    Rohlader, Dorothy

    The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…

  3. Exploiting a natural auxotrophy for genetic selection.

    Science.gov (United States)

    Ramage, Elizabeth; Gallagher, Larry; Manoil, Colin

    2012-08-01

    We exploited the natural histidine auxotrophy of Francisella species to develop hisD (encodes histidinol dehydrogenase) as a positive selection marker. A shuttle plasmid (pBR103) carrying Escherichia coli hisD and designed for cloning of PCR fragments replicated in both attenuated and highly virulent Francisella strains. During this work, we formulated a simplified defined growth medium for Francisella novicida.

  4. Growth, Mortality and Exploitation Rates of Sarotherodon ...

    African Journals Online (AJOL)

    Evans

    ABSTRACT. Sarotherodon melanotheron population of Dominli Lagoon in the Western Region of Ghana was studied for its growth and mortality parameters as well as exploitation rate. The study generally aimed at providing basic information necessary for the assessment and management of the fish stock in the lagoon.

  5. Economic factors of vulnerability trade and exploitation

    NARCIS (Netherlands)

    Allodi, L.

    2017-01-01

    Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition

  6. Exploiting indigenous knowledge in the environmental conservation ...

    African Journals Online (AJOL)

    ... of agriculture and reared livestock (especially goats). Over several years, they developed sustainable and effective exploitation mechanisms of the existing biodiversity resources to satisfy their individual needs and those of their societies in general. Journal of Language, Technology and Entrepreneurship in Africa Vol.

  7. Exploiting citation contexts for physics retrieval

    DEFF Research Database (Denmark)

    Dabrowska, Anna; Larsen, Birger

    2015-01-01

    The text surrounding citations within scientific papers may contain terms that usefully describe cited documents and can benefit retrieval. We present a preliminary study that investigates appending ci- tation contexts from citing documents to cited documents in the iSearch test collection. We ex...... in a large collection of physics papers, paving the way for future research that exploits citation contexts for retrieval....

  8. The environmental impacts of foamed concrete production and exploitation

    Science.gov (United States)

    Namsone, E.; Korjakins, A.; Sahmenko, G.; Sinka, M.

    2017-10-01

    This paper presents a study focusing on the environmental impacts of foamed concrete production and exploitation. CO2 emissions are very important factor for describing durability and sustainability of any building material and its life cycle. The building sector is one of the largest energy-consuming sectors in the world. In this study CO2 emissions are evaluated with regard to three types of energy resources (gas, coal and eco-friendly fuel). The related savings on raw materials are up to 120 t of water per 1000 t of traditionally mixed foamed concrete and up to 350 t of sand per 1000 t of foamed concrete produced with intensive mixing technology. In addition, total reduction of CO2 emissions (up to 60 t per 1000 m3 of material) and total energy saving from introduction of foamed concrete production (depending on the type of fuel) were calculated. In order to analyze the conditions of exploitation, both thermal conductivity and thickness of wall was determined. All obtained and calculated results were compared to those of the commercially produced autoclaved aerated concrete.

  9. Activity-based exploitation of Full Motion Video (FMV)

    Science.gov (United States)

    Kant, Shashi

    2012-06-01

    Video has been a game-changer in how US forces are able to find, track and defeat its adversaries. With millions of minutes of video being generated from an increasing number of sensor platforms, the DOD has stated that the rapid increase in video is overwhelming their analysts. The manpower required to view and garner useable information from the flood of video is unaffordable, especially in light of current fiscal restraints. "Search" within full-motion video has traditionally relied on human tagging of content, and video metadata, to provision filtering and locate segments of interest, in the context of analyst query. Our approach utilizes a novel machine-vision based approach to index FMV, using object recognition & tracking, events and activities detection. This approach enables FMV exploitation in real-time, as well as a forensic look-back within archives. This approach can help get the most information out of video sensor collection, help focus the attention of overburdened analysts form connections in activity over time and conserve national fiscal resources in exploiting FMV.

  10. Exploiting the Dynamics of Soft Materials for Machine Learning.

    Science.gov (United States)

    Nakajima, Kohei; Hauser, Helmut; Li, Tao; Pfeifer, Rolf

    2018-06-01

    Soft materials are increasingly utilized for various purposes in many engineering applications. These materials have been shown to perform a number of functions that were previously difficult to implement using rigid materials. Here, we argue that the diverse dynamics generated by actuating soft materials can be effectively used for machine learning purposes. This is demonstrated using a soft silicone arm through a technique of multiplexing, which enables the rich transient dynamics of the soft materials to be fully exploited as a computational resource. The computational performance of the soft silicone arm is examined through two standard benchmark tasks. Results show that the soft arm compares well to or even outperforms conventional machine learning techniques under multiple conditions. We then demonstrate that this system can be used for the sensory time series prediction problem for the soft arm itself, which suggests its immediate applicability to a real-world machine learning problem. Our approach, on the one hand, represents a radical departure from traditional computational methods, whereas on the other hand, it fits nicely into a more general perspective of computation by way of exploiting the properties of physical materials in the real world.

  11. Self-report measure of financial exploitation of older adults.

    Science.gov (United States)

    Conrad, Kendon J; Iris, Madelyn; Ridings, John W; Langley, Kate; Wilber, Kathleen H

    2010-12-01

    this study was designed to improve the measurement of financial exploitation (FE) by testing psychometric properties of the older adult financial exploitation measure (OAFEM), a client self-report instrument. rasch item response theory and traditional validation approaches were used. Questionnaires were administered by 22 adult protective services investigators from 7 agencies in Illinois to 227 substantiated abuse clients. Analyses included tests for dimensionality, model fit, and additional construct validation. Results from the OAFEM were also compared with the substantiation decision of abuse and with investigators' assessments of FE using a staff report version. Hypotheses were generated to test hypothesized relationships. the OAFEM, including the original 79-, 54-, and 30-item measures, met stringent Rasch analysis fit and unidimensionality criteria and had high internal consistency and item reliability. The validation results were supportive, while leading to reconsideration of aspects of the hypothesized theoretical hierarchy. Thresholds were suggested to demonstrate levels of severity. the measure is now available to aid in the assessment of FE of older adults by both clinicians and researchers. Theoretical refinements developed using the empirically generated item hierarchy may help to improve assessment and intervention.

  12. Dissemination and Exploitation: Project Goals beyond Science

    Science.gov (United States)

    Hamann, Kristin; Reitz, Anja

    2017-04-01

    Dissemination and Exploitation are essential parts of public funded projects. In Horizon 2020 a plan for the exploitation and dissemination of results (PEDR) is a requirement. The plan should contain a clear vision on the objectives of the project in relation to actions for dissemination and potential exploitation of the project results. The actions follow the basic idea to spread the knowledge and results gathered within the project and face the challenge of how to bring the results into potentially relevant policy circle and how they impact the market. The plan follows the purpose to assess the impact of the project and to address various target groups who are interested in the project results. Simply put, dissemination concentrates on the transfer of knowledge and exploitation on the commercialization of the project. Beyond the question of the measurability of project`s impact, strategies within science marketing can serve purposes beyond internal and external communication. Accordingly, project managers are facing the challenge to implement a dissemination and exploitation strategy that ideally supports the identification of all partners with the project and matches the current discourse of the project`s content within the society, politics and economy. A consolidated plan might unite all projects partners under a central idea and supports the identification with the project beyond the individual research questions. Which applications, strategies and methods can be used to bring forward a PEDR that accompanies a project successfully and allows a comprehensive assessment of the project afterwards? Which hurdles might project managers experience in the dissemination process and which tasks should be fulfilled by the project manager?

  13. Trolling may intensify exploitation in crappie fisheries

    Science.gov (United States)

    Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.

    2012-01-01

    In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation

  14. Weak KAM for commuting Hamiltonians

    International Nuclear Information System (INIS)

    Zavidovique, M

    2010-01-01

    For two commuting Tonelli Hamiltonians, we recover the commutation of the Lax–Oleinik semi-groups, a result of Barles and Tourin (2001 Indiana Univ. Math. J. 50 1523–44), using a direct geometrical method (Stoke's theorem). We also obtain a 'generalization' of a theorem of Maderna (2002 Bull. Soc. Math. France 130 493–506). More precisely, we prove that if the phase space is the cotangent of a compact manifold then the weak KAM solutions (or viscosity solutions of the critical stationary Hamilton–Jacobi equation) for G and for H are the same. As a corollary we obtain the equality of the Aubry sets and of the Peierls barrier. This is also related to works of Sorrentino (2009 On the Integrability of Tonelli Hamiltonians Preprint) and Bernard (2007 Duke Math. J. 136 401–20)

  15. Fermi and the Theory of Weak Interactions

    Indian Academy of Sciences (India)

    IAS Admin

    Quantum Field Theory created by Dirac and used by Fermi to describe weak ... of classical electrodynamics (from which the electric field and magnetic field can be obtained .... Universe. However, thanks to weak interactions, this can be done.

  16. Nuclear beta decay and the weak interaction

    International Nuclear Information System (INIS)

    Kean, D.C.

    1975-11-01

    Short notes are presented on various aspects of nuclear beta decay and weak interactions including: super-allowed transitions, parity violation, interaction strengths, coupling constants, and the current-current formalism of weak interaction. (R.L.)

  17. EXPLOITATION OF GLASS SAND ON THE OPEN PIT »VRTLINSKA« (MOSLAVINA, CROATIA

    Directory of Open Access Journals (Sweden)

    Slavko Vujec

    1994-12-01

    Full Text Available The exploitation of glass sand in Slavonia and Moslavina has a long tradition. The open-pit »Vrtlinska« is-accordirtg to its dimensions and production capacity the biggest one in this regions. Exploitation reserves within this open pit amount about 1 000 000 t glass sand of a very good quality, and the production capacity is 200 000 t yearly according to real needs during design and opening the pit, i. e. before the war. This article discusses geological and geomechanical characteristics of the deposit, as well as the exploitation process, which is considerably matching natural characteristics of the deposit. A more detailed description is given of the planned exploitation phase I above groundwater level which is carried out according to discontinuous system. For the exploitation of the depth part under groundwater level in the phase II, the necessity of further examination of hydrogeological characteristics of the deposit is presented, in order to acquire necessary information on groundwater regime and drainage conditions. Such knowledge will influence the choice of the most appropriate solutions in the exploitation of the depth part of the deposit.

  18. Weakly distributive modules. Applications to supplement submodules

    Indian Academy of Sciences (India)

    Abstract. In this paper, we define and study weakly distributive modules as a proper generalization of distributive modules. We prove that, weakly distributive supplemented modules are amply supplemented. In a weakly distributive supplemented module every submodule has a unique coclosure. This generalizes a result of ...

  19. TRADITIONAL CHINESE HERBAL MEDICINE

    NARCIS (Netherlands)

    ZHU, YP; WOERDENBAG, HJ

    1995-01-01

    Herbal medicine, acupuncture and moxibustion, and massage and the three major constituent parts of traditional Chinese medicine. Although acupuncture is well known in many Western countries, Chinese herbal medicine, the mos important part of traditional Chinese medicine, is less well known in the

  20. Traditional timber frames

    NARCIS (Netherlands)

    Jorissen, A.J.M.; Hamer, den J.; Leijten, A.J.M.; Salenikovich, A.

    2014-01-01

    Due to new possibilities traditional timber framing has become increasingly popular since the beginning of the 21e century. Although traditional timber framing has been used for centuries, the expected mechanical behaviour is not dealt with in great detail in building codes, guidelines or text

  1. Intelligence, mapping, and geospatial exploitation system (IMAGES)

    Science.gov (United States)

    Moellman, Dennis E.; Cain, Joel M.

    1998-08-01

    This paper provides further detail to one facet of the battlespace visualization concept described in last year's paper Battlespace Situation Awareness for Force XXI. It focuses on the National Imagery and Mapping Agency (NIMA) goal to 'provide customers seamless access to tailorable imagery, imagery intelligence, and geospatial information.' This paper describes Intelligence, Mapping, and Geospatial Exploitation System (IMAGES), an exploitation element capable of CONUS baseplant operations or field deployment to provide NIMA geospatial information collaboratively into a reconnaissance, surveillance, and target acquisition (RSTA) environment through the United States Imagery and Geospatial Information System (USIGS). In a baseplant CONUS setting IMAGES could be used to produce foundation data to support mission planning. In the field it could be directly associated with a tactical sensor receiver or ground station (e.g. UAV or UGV) to provide near real-time and mission specific RSTA to support mission execution. This paper provides IMAGES functional level design; describes the technologies, their interactions and interdependencies; and presents a notional operational scenario to illustrate the system flexibility. Using as a system backbone an intelligent software agent technology, called Open Agent ArchitectureTM (OAATM), IMAGES combines multimodal data entry, natural language understanding, and perceptual and evidential reasoning for system management. Configured to be DII COE compliant, it would utilize, to the extent possible, COTS applications software for data management, processing, fusion, exploitation, and reporting. It would also be modular, scaleable, and reconfigurable. This paper describes how the OAATM achieves data synchronization and enables the necessary level of information to be rapidly available to various command echelons for making informed decisions. The reasoning component will provide for the best information to be developed in the timeline

  2. Sustainable exploitation and management of aquatic resources

    DEFF Research Database (Denmark)

    Neuenfeldt, Stefan; Köster, Fritz

    2014-01-01

    DTU Aqua conducts research, provides advice,educates at university level and contributes toinnovation in sustainable exploitation andmanagement of aquatic resources. The vision of DTUAqua is to enable ecologically and economicallysustainable exploitation of aquatic resourcesapplying an integrated...... management. Marineecosystems aims at understanding the mechanisms that govern the interaction between individuals,species and populations in an ecosystem enabling us to determine the stability and flexibility of theecosystem.Marine living resources looks at the sustainable utilization of fish and shellfish...... stocks.Ecosystem effects expands from the ecosystem approach to fisheries management to an integratedapproach where other human activities are taken into consideration. Fisheries management developsmethods, models and tools for predicting and evaluating the effects of management measures andregulations...

  3. Exploiting HRM in support of lean manufacturing

    DEFF Research Database (Denmark)

    Jørgensen, Frances; Matthiesen, Rikke

    The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the data...... depicting the potential role in supporting HRM/lean integrated practices. The analysis of the model with respect to the theoretical background emphasizes a number of areas in which HRM could be more fully exploited in order to more successfully support lean implementation, for example, by stressing HRM...

  4. Exploiting Quantum Resonance to Solve Combinatorial Problems

    Science.gov (United States)

    Zak, Michail; Fijany, Amir

    2006-01-01

    Quantum resonance would be exploited in a proposed quantum-computing approach to the solution of combinatorial optimization problems. In quantum computing in general, one takes advantage of the fact that an algorithm cannot be decoupled from the physical effects available to implement it. Prior approaches to quantum computing have involved exploitation of only a subset of known quantum physical effects, notably including parallelism and entanglement, but not including resonance. In the proposed approach, one would utilize the combinatorial properties of tensor-product decomposability of unitary evolution of many-particle quantum systems for physically simulating solutions to NP-complete problems (a class of problems that are intractable with respect to classical methods of computation). In this approach, reinforcement and selection of a desired solution would be executed by means of quantum resonance. Classes of NP-complete problems that are important in practice and could be solved by the proposed approach include planning, scheduling, search, and optimal design.

  5. Exploiting Inhibitory Siglecs to Combat Food Allergies

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-16-1-0302 TITLE: Exploiting Inhibitory Siglecs to Combat Food Allergies PRINCIPAL INVESTIGATOR: Michael Kulis, Ph.D...CONTRACTING ORGANIZATION: University of North Carolina at Chapel Hill Chapel Hill, NC 27599 REPORT DATES: October 2017 TYPE OF REPORT: Annual PREPARED FOR...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite

  6. Dandruff: The most commercially exploited skin disease

    Directory of Open Access Journals (Sweden)

    Ranganathan S

    2010-01-01

    Full Text Available The article discuss in detail about the prevalence, pathophysiology, clinical manifestations of dandruff including the etio-pathology. The article also discusses in detail about various treatment methods available for dandruff. The status of dandruff being amphibious - a disease/disorder, and relatively less medical intervention is sought after for the treatment, dandruff is the most commercially exploited skin and scalp disorder/disease by personal care industries.

  7. Exploiting partial knowledge for efficient model analysis

    OpenAIRE

    Macedo, Nuno; Cunha, Alcino; Pessoa, Eduardo José Dias

    2017-01-01

    The advancement of constraint solvers and model checkers has enabled the effective analysis of high-level formal specification languages. However, these typically handle a specification in an opaque manner, amalgamating all its constraints in a single monolithic verification task, which often proves to be a performance bottleneck. This paper addresses this issue by proposing a solving strategy that exploits user-provided partial knowledge, namely by assigning symbolic bounds to the problem’s ...

  8. Amplifiers Exploiting Thermal Noise Canceling: A Review

    OpenAIRE

    Klumperink, Eric A.M.; Bruccoleri, Federico; Stroet, Peter; Nauta, Bram

    2004-01-01

    Wide-band LNAs suffer from a fundamental trade-off between noise figure NF and source impedance matching, which limits NF to values typically above 3dB. Recently, a feed-forward noise canceling technique has been proposed to break this trade-off. This paper reviews the principle of the technique and its key properties. Although the technique has been applied to wideband CMOS LNAs, it can just as well be implemented exploiting transconductance elements realized with oth...

  9. Exploiting thesauri knowledge in medical guideline formalization

    OpenAIRE

    Serban, R.C.; ten Teije, A.C.M.

    2009-01-01

    Objectives: As in software product lifecycle, the effort spent in maintaining medical knowl edge in guidelines can be reduced, if modularization, formalization and tracking of domain knowledge are employed across the guideline development phases. Methods: We propose to exploit and combine knowledge templates with medical background knowledge from existing thesauri in order to produce reusable building blocks used in guideline development. These tem- plates enable easier guideline formalizatio...

  10. Exploitation as the Unequal Exchange of Labour : An Axiomatic Approach

    OpenAIRE

    Yoshihara, Naoki; Veneziani, Roberto

    2009-01-01

    In subsistence economies with general convex technology and rational optimising agents, a new, axiomatic approach is developed, which allows an explicit analysis of the core positive and normative intuitions behind the concept of exploitation. Three main new axioms, called Labour Exploitation in Subsistence Economies , Relational Exploitation , and Feasibility of Non-Exploitation , are presented and it is proved that they uniquely characterise a definition of exploitation conceptually related...

  11. A Universe without Weak Interactions

    Energy Technology Data Exchange (ETDEWEB)

    Harnik, Roni; Kribs, Graham D.; Perez, Gilad

    2006-04-07

    A universe without weak interactions is constructed that undergoes big-bang nucleosynthesis, matter domination, structure formation, and star formation. The stars in this universe are able to burn for billions of years, synthesize elements up to iron, and undergo supernova explosions, dispersing heavy elements into the interstellar medium. These definitive claims are supported by a detailed analysis where this hypothetical ''Weakless Universe'' is matched to our Universe by simultaneously adjusting Standard Model and cosmological parameters. For instance, chemistry and nuclear physics are essentially unchanged. The apparent habitability of the Weakless Universe suggests that the anthropic principle does not determine the scale of electroweak breaking, or even require that it be smaller than the Planck scale, so long as technically natural parameters may be suitably adjusted. Whether the multi-parameter adjustment is realized or probable is dependent on the ultraviolet completion, such as the string landscape. Considering a similar analysis for the cosmological constant, however, we argue that no adjustments of other parameters are able to allow the cosmological constant to raise up even remotely close to the Planck scale while obtaining macroscopic structure. The fine-tuning problems associated with the electroweak breaking scale and the cosmological constant therefore appear to be qualitatively different from the perspective of obtaining a habitable universe.

  12. A Universe without Weak Interactions

    International Nuclear Information System (INIS)

    Harnik, R

    2006-01-01

    A universe without weak interactions is constructed that undergoes big-bang nucleosynthesis, matter domination, structure formation, and star formation. The stars in this universe are able to burn for billions of years, synthesize elements up to iron, and undergo supernova explosions, dispersing heavy elements into the interstellar medium. These definitive claims are supported by a detailed analysis where this hypothetical ''Weakless Universe'' is matched to our Universe by simultaneously adjusting Standard Model and cosmological parameters. For instance, chemistry and nuclear physics are essentially unchanged. The apparent habitability of the Weakless Universe suggests that the anthropic principle does not determine the scale of electroweak breaking, or even require that it be smaller than the Planck scale, so long as technically natural parameters may be suitably adjusted. Whether the multi-parameter adjustment is realized or probable is dependent on the ultraviolet completion, such as the string landscape. Considering a similar analysis for the cosmological constant, however, we argue that no adjustments of other parameters are able to allow the cosmological constant to raise up even remotely close to the Planck scale while obtaining macroscopic structure. The fine-tuning problems associated with the electroweak breaking scale and the cosmological constant therefore appear to be qualitatively different from the perspective of obtaining a habitable universe

  13. A universe without weak interactions

    International Nuclear Information System (INIS)

    Harnik, Roni; Kribs, Graham D.; Perez, Gilad

    2006-01-01

    A universe without weak interactions is constructed that undergoes big-bang nucleosynthesis, matter domination, structure formation, and star formation. The stars in this universe are able to burn for billions of years, synthesize elements up to iron, and undergo supernova explosions, dispersing heavy elements into the interstellar medium. These definitive claims are supported by a detailed analysis where this hypothetical ''weakless universe'' is matched to our Universe by simultaneously adjusting standard model and cosmological parameters. For instance, chemistry and nuclear physics are essentially unchanged. The apparent habitability of the weakless universe suggests that the anthropic principle does not determine the scale of electroweak breaking, or even require that it be smaller than the Planck scale, so long as technically natural parameters may be suitably adjusted. Whether the multiparameter adjustment is realized or probable is dependent on the ultraviolet completion, such as the string landscape. Considering a similar analysis for the cosmological constant, however, we argue that no adjustments of other parameters are able to allow the cosmological constant to raise up even remotely close to the Planck scale while obtaining macroscopic structure. The fine-tuning problems associated with the electroweak breaking scale and the cosmological constant therefore appear to be qualitatively different from the perspective of obtaining a habitable universe

  14. Measurements of weak conversion lines

    International Nuclear Information System (INIS)

    Feoktistov, A.I.; Frantsev, Yu.E.

    1979-01-01

    Described is a new methods for measuring weak conversion lines with the help of the β spectrometer of the π √ 2 type which permits to increase the reliability of the results obtained. According to this method the measurements were carried out by short series with the storage of the information obtained on the punched tape. The spectrometer magnetic field was stabilized during the measuring of the conversion spectra with the help of three nmr recorders. Instead of the dependence of the pulse calculation rate on the magnetic field value was measured the dependence of the calculation rate on the value of the voltage applied between the source and the spectrometer chamber. A short description of the automatic set-up for measuring conversion lines according to the method proposed is given. The main set-up elements are the voltage multiplexer timer, printer, scaler and the pulse analyzer. With the help of the above methods obtained is the K 1035, 8 keV 182 Ta line. It is obtained as a result of the composition of 96 measurement series. Each measurement time constitutes 640 s 12 points are taken on the line

  15. Methodology for analyzing weak spectra

    International Nuclear Information System (INIS)

    Yankovich, T.L.; Swainson, I.P.

    2000-02-01

    There is considerable interest in quantifying radionuclide transfer between environmental compartments. However, in many cases, it can be a challenge to detect concentrations of gamma-emitting radionuclides due to their low levels in environmental samples. As a result, it is valuable to develop analytical protocols to ensure consistent analysis of the areas under weak peaks. The current study has focused on testing how reproducibly peak areas and baselines can be determined using two analytical approaches. The first approach, which can be carried out using Maestro software, involves extracting net counts under a curve without fitting a functional form to the peak, whereas the second approach, which is used by most other peak fitting programs, determines net counts from spectra by fitting a Gaussian form to the data. It was found that the second approach produces more consistent peak area and baseline measurements, with the ability to de-convolute multiple, overlapping peaks. In addition, programs, such as Peak Fit, which can be used to fit a form to spectral data, often provide goodness of fit analyses, since the Gaussian form can be described using a characteristic equation against which peak data can be tested for their statistical significance. (author)

  16. Security option file - Exploitation (DOS-Expl)

    International Nuclear Information System (INIS)

    2016-01-01

    This document aims at presenting functions performed by Cigeo during its exploitation phase, its main technical and security options which are envisaged with respect to different types of internal or external risks, and a first assessment of its impact on mankind and on the environment during its exploitation in normal operation as well as in incidental or accidental situations. A first volume addresses security principles, approach and management in relationship with the legal and regulatory framework. The second volume presents input data related to waste parcels and used for the installation sizing and operation, the main site characteristics, the main technical options regarding structures and equipment, and the main options regarding exploitation (parcel management, organisational and human aspects, and effluent management). The third volume describes how parcel are processed from their arrival to their setting in storage compartment, an inventory of internal and external risks, and a first assessment of consequences of scenarios on mankind and on the environment. The fourth volume presents options and operations which are envisaged regarding Cigeo closure, and inventory of associated risks

  17. Traditional medicine and genomics

    Directory of Open Access Journals (Sweden)

    Kalpana Joshi

    2010-01-01

    Full Text Available ′Omics′ developments in the form of genomics, proteomics and metabolomics have increased the impetus of traditional medicine research. Studies exploring the genomic, proteomic and metabolomic basis of human constitutional types based on Ayurveda and other systems of oriental medicine are becoming popular. Such studies remain important to developing better understanding of human variations and individual differences. Countries like India, Korea, China and Japan are investing in research on evidence-based traditional medicines and scientific validation of fundamental principles. This review provides an account of studies addressing relationships between traditional medicine and genomics.

  18. Traditional medicine and genomics.

    Science.gov (United States)

    Joshi, Kalpana; Ghodke, Yogita; Shintre, Pooja

    2010-01-01

    'Omics' developments in the form of genomics, proteomics and metabolomics have increased the impetus of traditional medicine research. Studies exploring the genomic, proteomic and metabolomic basis of human constitutional types based on Ayurveda and other systems of oriental medicine are becoming popular. Such studies remain important to developing better understanding of human variations and individual differences. Countries like India, Korea, China and Japan are investing in research on evidence-based traditional medicines and scientific validation of fundamental principles. This review provides an account of studies addressing relationships between traditional medicine and genomics.

  19. Homological properties of modules with finite weak injective and weak flat dimensions

    OpenAIRE

    Zhao, Tiwei

    2017-01-01

    In this paper, we define a class of relative derived functors in terms of left or right weak flat resolutions to compute the weak flat dimension of modules. Moreover, we investigate two classes of modules larger than that of weak injective and weak flat modules, study the existence of covers and preenvelopes, and give some applications.

  20. Proceedings of Summer Institute on Particle Physics: the weak interaction

    International Nuclear Information System (INIS)

    Mosher, A.

    1981-01-01

    The SLAC Summer Institute on Particle Physics held its eighth session on July 28-August 8, 1980, and the focus of the meeting was The Weak Interaction. Following the now traditional format, the first seven days of the Institute were spent with the mornings given to pedagogic lectures on the experimental and theoretical foundations of the topic. This year included a very stimulating and successful series on the physics of particle detectors. In the afternoons were seminars on the various experimental tools being designed or constructed to further probe the Weak Interaction, followed by lively discussion of the morning's lectures. Again, following the usual format, the school led into a three-day topical conference at which the most recent theoretical and experimental results were presented and discussed. Abstracts of twenty-seven items from the Institute were prepared separately for the data base

  1. [Archaeology and criminology--Strengths and weaknesses of interdisciplinary cooperation].

    Science.gov (United States)

    Bachhiesl, Christian

    2015-01-01

    Interdisciplinary cooperation of archaeology and criminology is often focussed on the scientific methods applied in both fields of knowledge. In combination with the humanistic methods traditionally used in archaeology, the finding of facts can be enormously increased and the subsequent hermeneutic deduction of human behaviour in the past can take place on a more solid basis. Thus, interdisciplinary cooperation offers direct and indirect advantages. But it can also cause epistemological problems, if the weaknesses and limits of one method are to be corrected by applying methods used in other disciplines. This may result in the application of methods unsuitable for the problem to be investigated so that, in a way, the methodological and epistemological weaknesses of two disciplines potentiate each other. An example of this effect is the quantification of qualia. These epistemological reflections are compared with the interdisciplinary approach using the concrete case of the "Eulau Crime Scene".

  2. Weak boson emission in hadron collider processes

    International Nuclear Information System (INIS)

    Baur, U.

    2007-01-01

    The O(α) virtual weak radiative corrections to many hadron collider processes are known to become large and negative at high energies, due to the appearance of Sudakov-like logarithms. At the same order in perturbation theory, weak boson emission diagrams contribute. Since the W and Z bosons are massive, the O(α) virtual weak radiative corrections and the contributions from weak boson emission are separately finite. Thus, unlike in QED or QCD calculations, there is no technical reason for including gauge boson emission diagrams in calculations of electroweak radiative corrections. In most calculations of the O(α) electroweak radiative corrections, weak boson emission diagrams are therefore not taken into account. Another reason for not including these diagrams is that they lead to final states which differ from that of the original process. However, in experiment, one usually considers partially inclusive final states. Weak boson emission diagrams thus should be included in calculations of electroweak radiative corrections. In this paper, I examine the role of weak boson emission in those processes at the Fermilab Tevatron and the CERN LHC for which the one-loop electroweak radiative corrections are known to become large at high energies (inclusive jet, isolated photon, Z+1 jet, Drell-Yan, di-boson, tt, and single top production). In general, I find that the cross section for weak boson emission is substantial at high energies and that weak boson emission and the O(α) virtual weak radiative corrections partially cancel

  3. Interrogation of weak Bragg grating sensors based on dual-wavelength differential detection.

    Science.gov (United States)

    Cheng, Rui; Xia, Li

    2016-11-15

    It is shown that for weak Bragg gratings the logarithmic ratio of reflected intensities at any two wavelengths within the spectrum follows a linear relationship with the Bragg wavelength shift, with a slope proportional to their wavelength spacing. This finding is exploited to develop a flexible, efficient, and cheap interrogation solution of weak fiber Bragg grating (FBGs), especially ultra-short FBGs, in distributed sensing based on dual-wavelength differential detection. The concept is experimentally studied in both single and distributed sensing systems with ultra-short FBG sensors. The work may form the basis of new and promising FBG interrogation techniques based on detecting discrete rather than continuous spectra.

  4. A Weak Solution of a Stochastic Nonlinear Problem

    Directory of Open Access Journals (Sweden)

    M. L. Hadji

    2015-01-01

    Full Text Available We consider a problem modeling a porous medium with a random perturbation. This model occurs in many applications such as biology, medical sciences, oil exploitation, and chemical engineering. Many authors focused their study mostly on the deterministic case. The more classical one was due to Biot in the 50s, where he suggested to ignore everything that happens at the microscopic level, to apply the principles of the continuum mechanics at the macroscopic level. Here we consider a stochastic problem, that is, a problem with a random perturbation. First we prove a result on the existence and uniqueness of the solution, by making use of the weak formulation. Furthermore, we use a numerical scheme based on finite differences to present numerical results.

  5. Classical field approach to quantum weak measurements.

    Science.gov (United States)

    Dressel, Justin; Bliokh, Konstantin Y; Nori, Franco

    2014-03-21

    By generalizing the quantum weak measurement protocol to the case of quantum fields, we show that weak measurements probe an effective classical background field that describes the average field configuration in the spacetime region between pre- and postselection boundary conditions. The classical field is itself a weak value of the corresponding quantum field operator and satisfies equations of motion that extremize an effective action. Weak measurements perturb this effective action, producing measurable changes to the classical field dynamics. As such, weakly measured effects always correspond to an effective classical field. This general result explains why these effects appear to be robust for pre- and postselected ensembles, and why they can also be measured using classical field techniques that are not weak for individual excitations of the field.

  6. A collapse pressure prediction model for horizontal shale gas wells with multiple weak planes

    Directory of Open Access Journals (Sweden)

    Ping Chen

    2015-01-01

    Full Text Available Since collapse of horizontal wellbore through long brittle shale interval is a major problem, the occurrence characteristics of weak planes were analyzed according to outcrop, core, and SEM and FMI data of shale rocks. A strength analysis method was developed for shale rocks with multiple weak planes based on weak-plane strength theory. An analysis was also conducted of the strength characteristics of shale rocks with uniform distribution of multiple weak planes. A collapse pressure prediction model for horizontal wells in shale formation with multiple weak planes was established, which takes into consideration the occurrence of each weak plane, wellbore stress condition, borehole azimuth, and in-situ stress azimuth. Finally, a case study of a horizontal shale gas well in southern Sichuan Basin was conducted. The results show that the intersection angle between the shale bedding plane and the structural fracture is generally large (nearly orthogonal; with the increase of weak plane number, the strength of rock mass declines sharply and is more heavily influenced by weak planes; when there are more than four weak planes, the rock strength tends to be isotropic and the whole strength of rock mass is greatly weakened, significantly increasing the risk of wellbore collapse. With the increase of weak plane number, the drilling fluid density (collapse pressure to keep borehole stability goes up gradually. For instance, the collapse pressure is 1.04 g/cm3 when there are no weak planes, and 1.55 g/cm3 when there is one weak plane, and 1.84 g/cm3 when there are two weak planes. The collapse pressure prediction model for horizontal wells proposed in this paper presented results in better agreement with those in actual situation. This model, more accurate and practical than traditional models, can effectively improve the accuracy of wellbore collapse pressure prediction of horizontal shale gas wells.

  7. Cloud Based Earth Observation Data Exploitation Platforms

    Science.gov (United States)

    Romeo, A.; Pinto, S.; Loekken, S.; Marin, A.

    2017-12-01

    In the last few years data produced daily by several private and public Earth Observation (EO) satellites reached the order of tens of Terabytes, representing for scientists and commercial application developers both a big opportunity for their exploitation and a challenge for their management. New IT technologies, such as Big Data and cloud computing, enable the creation of web-accessible data exploitation platforms, which offer to scientists and application developers the means to access and use EO data in a quick and cost effective way. RHEA Group is particularly active in this sector, supporting the European Space Agency (ESA) in the Exploitation Platforms (EP) initiative, developing technology to build multi cloud platforms for the processing and analysis of Earth Observation data, and collaborating with larger European initiatives such as the European Plate Observing System (EPOS) and the European Open Science Cloud (EOSC). An EP is a virtual workspace, providing a user community with access to (i) large volume of data, (ii) algorithm development and integration environment, (iii) processing software and services (e.g. toolboxes, visualization routines), (iv) computing resources, (v) collaboration tools (e.g. forums, wiki, etc.). When an EP is dedicated to a specific Theme, it becomes a Thematic Exploitation Platform (TEP). Currently, ESA has seven TEPs in a pre-operational phase dedicated to geo-hazards monitoring and prevention, costal zones, forestry areas, hydrology, polar regions, urban areas and food security. On the technology development side, solutions like the multi cloud EO data processing platform provides the technology to integrate ICT resources and EO data from different vendors in a single platform. In particular it offers (i) Multi-cloud data discovery, (ii) Multi-cloud data management and access and (iii) Multi-cloud application deployment. This platform has been demonstrated with the EGI Federated Cloud, Innovation Platform Testbed Poland

  8. Heisenberg's heirs exploit loopholes in his law

    International Nuclear Information System (INIS)

    Taubes, G.

    1994-01-01

    This article describes research into Heisenberg's Uncertainty Principle. Loopholes in the principle have led to a series of experiments using sophisticated optical techniques to extract information from a quantum system without disturbing the variable being measured. The experiments are based on a technique called back-action evasion, which exploits the possibility of channeling all the uncertainty generated by measuring one quantum variable (e.g. laser beam intensity) onto a related variable known as the conjugate observable (beam phase). These experiments and others are described

  9. Liposomal cancer therapy: exploiting tumor characteristics

    DEFF Research Database (Denmark)

    Kaasgaard, Thomas; Andresen, Thomas Lars

    2010-01-01

    an overview of current strategies for improving the different stages of liposomal cancer therapy, which involve transporting drug-loaded liposomes through the bloodstream, increasing tumor accumulation, and improving drug release and cancer cell uptake after accumulation at the tumor target site. What...... the reader will gain: The review focuses on strategies that exploit characteristic features of solid tumors, such as abnormal vasculature, overexpression of receptors and enzymes, as well as acidic and thiolytic characteristics of the tumor microenvironment. Take home message: It is concluded that the design...

  10. Pilot plant for exploitation of geothermal waters

    Directory of Open Access Journals (Sweden)

    Stojiljković Dragan T.

    2006-01-01

    Full Text Available In Sijarinska spa, there are some 15 mineral and thermomineral springs, that are already being used for therapeutic purposes. For the exploitation of heat energy boring B-4 is very interesting. It is a boring of a closed type, with the water temperature of about 78°C and a flow rate of about 33 l/s. Waters with the flow rate of about 6 l/s are currently used for heating of the Gejzer hotel, and waters of the flow rate of about 0,121 l/s for the pilot drying plant. The paper presents this pilot plant. .

  11. Geothermal resources: exploration and exploitation. A bibliography

    Energy Technology Data Exchange (ETDEWEB)

    1976-07-01

    This comprehensive bibliography contains 5476 citations of foreign and domestic research reports, journal articles, patents, conference proceedings, and books concerned with the exploration and exploitation of geothermal resources. The coverage dates back as far as useful references could be obtained and extends through June 1976. References are arranged in broad subject categories and are made up of complete bibliographic citations. These are followed by a listing of subject descriptors used to describe the subject content of each reference. Four indexes are included: Corporate, Personal Author, Subject, and Report Number. Also included is a list of journals from which articles were selected. (LBS)

  12. Algorithms exploiting ultrasonic sensors for subject classification

    Science.gov (United States)

    Desai, Sachi; Quoraishee, Shafik

    2009-09-01

    Proposed here is a series of techniques exploiting micro-Doppler ultrasonic sensors capable of characterizing various detected mammalian targets based on their physiological movements captured a series of robust features. Employed is a combination of unique and conventional digital signal processing techniques arranged in such a manner they become capable of classifying a series of walkers. These processes for feature extraction develops a robust feature space capable of providing discrimination of various movements generated from bipeds and quadrupeds and further subdivided into large or small. These movements can be exploited to provide specific information of a given signature dividing it in a series of subset signatures exploiting wavelets to generate start/stop times. After viewing a series spectrograms of the signature we are able to see distinct differences and utilizing kurtosis, we generate an envelope detector capable of isolating each of the corresponding step cycles generated during a walk. The walk cycle is defined as one complete sequence of walking/running from the foot pushing off the ground and concluding when returning to the ground. This time information segments the events that are readily seen in the spectrogram but obstructed in the temporal domain into individual walk sequences. This walking sequence is then subsequently translated into a three dimensional waterfall plot defining the expected energy value associated with the motion at particular instance of time and frequency. The value is capable of being repeatable for each particular class and employable to discriminate the events. Highly reliable classification is realized exploiting a classifier trained on a candidate sample space derived from the associated gyrations created by motion from actors of interest. The classifier developed herein provides a capability to classify events as an adult humans, children humans, horses, and dogs at potentially high rates based on the tested sample

  13. How Less Alienation Creates More Exploitation? Audience Labour on Social Network Sites.

    OpenAIRE

    Eran Fisher

    2012-01-01

    Abstract: The notion of audience labour has been an important contribution to Marxist political economy of the media. It revised the traditional political economy analysis, which focused on media ownership, by suggesting that media was also a site of production, constituting particular relations of production. Such analysis highlighted the active role of audience in the creation of media value as both commodities and workers, thus pointing to audience exploitation. Recently, in light of parad...

  14. Analysis on digital management of uranium geological archives and its second exploitation and utilization

    International Nuclear Information System (INIS)

    Kong Hui

    2009-01-01

    The enormous data and examples show that the second exploitation and utilization of geological archives information are important and necessary for geological prospecting. The author deeply studies and analyzes the information service system for uranium geology, it is believed that the traditional management mode of geological archives must be transformed into modernized service mode. The way of how to expand, apply and improve the 'management and analytical system for uranium resources information' is discussed for implementing geo-informational construction. (authors)

  15. Instrumental systematics and weak gravitational lensing

    International Nuclear Information System (INIS)

    Mandelbaum, R.

    2015-01-01

    We present a pedagogical review of the weak gravitational lensing measurement process and its connection to major scientific questions such as dark matter and dark energy. Then we describe common ways of parametrizing systematic errors and understanding how they affect weak lensing measurements. Finally, we discuss several instrumental systematics and how they fit into this context, and conclude with some future perspective on how progress can be made in understanding the impact of instrumental systematics on weak lensing measurements

  16. Fixed points of occasionally weakly biased mappings

    OpenAIRE

    Y. Mahendra Singh, M. R. Singh

    2012-01-01

    Common fixed point results due to Pant et al. [Pant et al., Weak reciprocal continuity and fixed point theorems, Ann Univ Ferrara, 57(1), 181-190 (2011)] are extended to a class of non commuting operators called occasionally weakly biased pair[ N. Hussain, M. A. Khamsi A. Latif, Commonfixed points for JH-operators and occasionally weakly biased pairs under relaxed conditions, Nonlinear Analysis, 74, 2133-2140 (2011)]. We also provideillustrative examples to justify the improvements. Abstract....

  17. Robust weak measurements on finite samples

    International Nuclear Information System (INIS)

    Tollaksen, Jeff

    2007-01-01

    A new weak measurement procedure is introduced for finite samples which yields accurate weak values that are outside the range of eigenvalues and which do not require an exponentially rare ensemble. This procedure provides a unique advantage in the amplification of small nonrandom signals by minimizing uncertainties in determining the weak value and by minimizing sample size. This procedure can also extend the strength of the coupling between the system and measuring device to a new regime

  18. Spin effects in the weak interaction

    International Nuclear Information System (INIS)

    Freedman, S.J.; Chicago Univ., IL; Chicago Univ., IL

    1990-01-01

    Modern experiments investigating the beta decay of the neutron and light nuclei are still providing important constraints on the theory of the weak interaction. Beta decay experiments are yielding more precise values for allowed and induced weak coupling constants and putting constraints on possible extensions to the standard electroweak model. Here we emphasize the implications of recent experiments to pin down the strengths of the weak vector and axial vector couplings of the nucleon

  19. Test of the Weak Equivalence Principle using LIGO observations of GW150914 and Fermi observations of GBM transient 150914

    Directory of Open Access Journals (Sweden)

    Molin Liu

    2017-07-01

    Full Text Available About 0.4 s after the Laser Interferometer Gravitational-Wave Observatory (LIGO detected a transient gravitational-wave (GW signal GW150914, the Fermi Gamma-ray Burst Monitor (GBM also found a weak electromagnetic transient (GBM transient 150914. Time and location coincidences favor a possible association between GW150904 and GBM transient 150914. Under this possible association, we adopt Fermi's electromagnetic (EM localization and derive constraints on possible violations of the Weak Equivalence Principle (WEP from the observations of two events. Our calculations are based on four comparisons: (1 The first is the comparison of the initial GWs detected at the two LIGO sites. From the different polarizations of these initial GWs, we obtain a limit on any difference in the parametrized post-Newtonian (PPN parameter Δγ≲10−10. (2 The second is a comparison of GWs and possible EM waves. Using a traditional super-Eddington accretion model for GBM transient 150914, we again obtain an upper limit Δγ≲10−10. Compared with previous results for photons and neutrinos, our limits are five orders of magnitude stronger than those from PeV neutrinos in blazar flares, and seven orders stronger than those from MeV neutrinos in SN1987A. (3 The third is a comparison of GWs with different frequencies in the range [35 Hz, 250 Hz]. (4 The fourth is a comparison of EM waves with different energies in the range [1 keV, 10 MeV]. These last two comparisons lead to an even stronger limit, Δγ≲10−8. Our results highlight the potential of multi-messenger signals exploiting different emission channels to strengthen existing tests of the WEP.

  20. Characteristics of thermal-mineral waters in Backa region (Vojvodina) and their exploitation in spa tourism

    Energy Technology Data Exchange (ETDEWEB)

    Kosic, Kristina; Pivac, Tatjana; Romelic, Jovan; Lazic, Lazar; Stojanovic, Vladimir [Faculty of Science, Department of Geography, Tourism and Hotel Management, University of Novi Sad, Trg Dositeja Obradovica 3, 21000 Novi Sad (RS)

    2011-01-15

    Hydropower, biomass, biogas, biofuels, wind power, solar energy and geothermal energy are the major resources to provide Backa region with most of its. Backa extends between 45 16' and 46 22' of the northern latitude and 18 36' and 20 37' of the eastern longitude. It occupies the north-eastern part of Vojvodina, i.e. the most north-western part of the Republic of Serbia. That is historical-geographic territory bordered on the Danube on its western and eastern side, the Tisa on its eastern side and with the state border towards Hungary on the north. In this paper, the focus will be on renewable sources, specifically geothermal energy in Backa region. The paper analyzes the characteristics of thermal-mineral waters in Backa, the condition and possibilities of their exploitation in spa tourism, and in other economic branches. The tradition of thermo-mineral waters exploitation in spas and public baths is rather long. Today, this type of thermo-mineral waters exploitation in Backa is the widest spread. Permanent, i.e. continuous exploiters of thermal-mineral waters in Backa are primarily balneal-rehabilitation centres and exploiters using the water for technological purposes. (author)

  1. Weak strange particle production: advantages and difficulties

    International Nuclear Information System (INIS)

    Angelescu, Tatiana; Baker, O.K.

    2002-01-01

    Electromagnetic strange particle production developed at Jefferson Laboratory was an important source of information on strange particle electromagnetic formfactors and induced and transferred polarization. The high quality of the beam and the detection techniques involved could be an argument for detecting strange particles in weak interactions and answer questions about cross sections, weak formfactors, neutrino properties, which have not been investigated yet. The paper analyses some aspects related to the weak lambda production and detection with the Hall C facilities at Jefferson Laboratory and the limitations in measuring the weak interaction quantities. (authors)

  2. The Potential Socio-economic Impacts of Gas Hydrate Exploitation

    Science.gov (United States)

    Riley, David; Schaafsma, Marije; Marin-Moreno, Héctor; Minshull, Tim A.

    2017-04-01

    the labour supply may not fit with the labour demand. In regions with an existing strong fossil fuel energy sector, hydrate development would prolong the timeframe for which this sector could significantly contribute to the local and wider economy. In unexploited areas the industry can provide considerable income to an otherwise undeveloped region. Industrialisation tends to increase regional population, pressuring existing public services, such as healthcare and transport infrastructure. Immigrant fossil fuel sector workers are predominantly young, male and single. Their presence may be linked to elevated levels of certain social issues seen as undesirable problems by the community at large, such as drug usage or alcoholism. Hydrate development provides limited benefit to indigenous communities who are still following a traditional cultural lifestyle in the proposed development area, as many opportunities are not compatible with their way of life. Additionally, industry associated infrastructure can reduce the ability of the indigenous population to utilise the land directly, or as an access route elsewhere. The range of possible impacts show that any hydrate development must be carefully managed to maximise its potential, whether this takes the form of using the revenue from hydrate exploitation to try and counter the associated issues, or whether there needs to be specific limits placed on locations where extraction can occur.

  3. KASTAMONU TRADITIONAL WOMEN CLOTHES

    Directory of Open Access Journals (Sweden)

    E.Elhan ÖZUS

    2015-08-01

    Full Text Available Clothing is a unique dressing style of a community, a period or a profession. In clothing there is social status and difference principle rather than fashion. In this context, the society created a clothing style in line with its own customs, traditions and social structure. One of the features separating societies from each other and indicating their cultural and social classes is the clothing style. As it is known, traditional Turkish clothes reflecting the characteristics of Turkish society is our most beautiful heritage from past to present. From this heritage there are several examples of women's clothes c arried to present. When these examples are examined, it is possible to see the taste, the way of understanding art, joy and the lifestyle of the history. These garments are also the documents outlining the taste and grace of Turkish people. In the present study, traditional Kastamonu women's clothing, that has an important place in traditional cultural clothes of Anatolia, is investigated . The method of the present research is primarily defined as the examination of the written sources. The study is complet ed with the observations and examinations made in Kastamonu. According to the findings of the study, traditional Kastamonu women's clothing are examined and adapted to todays’ clothing.

  4. Competing Discourses about Youth Sexual Exploitation in Canadian News Media.

    Science.gov (United States)

    Saewyc, Elizabeth M; Miller, Bonnie B; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam

    2013-10-01

    Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989-2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called 'customers' or 'consumers,' and occasionally 'predators'; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a 'victimless crime,' maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade.

  5. Uncovering Indicators of Commercial Sexual Exploitation.

    Science.gov (United States)

    Bounds, Dawn; Delaney, Kathleen R; Julion, Wrenetha; Breitenstein, Susan

    2017-07-01

    It is estimated that annually 100,000 to 300,000 youth are at risk for sex trafficking; a commercial sex act induced by force, fraud, or coercion, or any such act where the person induced to perform such an act is younger than 18 years of age. Increasingly, such transactions are occurring online via Internet-based sites that serve the commercial sex industry. Commercial sex transactions involving trafficking are illegal; thus, Internet discussions between those involved must be veiled. Even so, transactions around sex trafficking do occur. Within these transactions are innuendos that provide one avenue for detecting potential activity. The purpose of this study is to identify linguistic indicators of potential commercial sexual exploitation within the online comments of men posted on an Internet site. Six hundred sixty-six posts from five Midwest cities and 363 unique members were analyzed via content analysis. Three main indicators were found: the presence of youth or desire for youthfulness, presence of pimps, and awareness of vulnerability. These findings begin a much-needed dialogue on uncovering online risks of commercial sexual exploitation and support the need for further research on Internet indicators of sex trafficking.

  6. Large size space construction for space exploitation

    Science.gov (United States)

    Kondyurin, Alexey

    2016-07-01

    Space exploitation is impossible without large space structures. We need to make sufficient large volume of pressurized protecting frames for crew, passengers, space processing equipment, & etc. We have to be unlimited in space. Now the size and mass of space constructions are limited by possibility of a launch vehicle. It limits our future in exploitation of space by humans and in development of space industry. Large-size space construction can be made with using of the curing technology of the fibers-filled composites and a reactionable matrix applied directly in free space. For curing the fabric impregnated with a liquid matrix (prepreg) is prepared in terrestrial conditions and shipped in a container to orbit. In due time the prepreg is unfolded by inflating. After polymerization reaction, the durable construction can be fitted out with air, apparatus and life support systems. Our experimental studies of the curing processes in the simulated free space environment showed that the curing of composite in free space is possible. The large-size space construction can be developed. A project of space station, Moon base, Mars base, mining station, interplanet space ship, telecommunication station, space observatory, space factory, antenna dish, radiation shield, solar sail is proposed and overviewed. The study was supported by Humboldt Foundation, ESA (contract 17083/03/NL/SFe), NASA program of the stratospheric balloons and RFBR grants (05-08-18277, 12-08-00970 and 14-08-96011).

  7. PROBA-V Mission Exploitation Platform

    Directory of Open Access Journals (Sweden)

    Erwin Goor

    2016-07-01

    Full Text Available As an extension of the PROBA-Vegetation (PROBA-V user segment, the European Space Agency (ESA, de Vlaamse Instelling voor Technologisch Onderzoek (VITO, and partners TRASYS and Spacebel developed an operational Mission Exploitation Platform (MEP to drastically improve the exploitation of the PROBA-V Earth Observation (EO data archive, the archive from the historical SPOT-VEGETATION mission, and derived products by researchers, service providers, and thematic users. The analysis of the time series of data (petabyte range is addressed, as well as the large scale on-demand processing of the complete archive, including near real-time data. The platform consists of a private cloud environment, a Hadoop-based processing environment and a data manager. Several applications are released to the users, e.g., a full resolution viewing service, a time series viewer, pre-defined on-demand processing chains, and virtual machines with powerful tools and access to the data. After an initial release in January 2016 a research platform was deployed gradually, allowing users to design, debug, and test applications on the platform. From the PROBA-V MEP, access to, e.g., Sentinel-2 and Sentinel-3 data will be addressed as well.

  8. Traditional Chinese Biotechnology

    Science.gov (United States)

    Xu, Yan; Wang, Dong; Fan, Wen Lai; Mu, Xiao Qing; Chen, Jian

    The earliest industrial biotechnology originated in ancient China and developed into a vibrant industry in traditional Chinese liquor, rice wine, soy sauce, and vinegar. It is now a significant component of the Chinese economy valued annually at about 150 billion RMB. Although the production methods had existed and remained basically unchanged for centuries, modern developments in biotechnology and related fields in the last decades have greatly impacted on these industries and led to numerous technological innovations. In this chapter, the main biochemical processes and related technological innovations in traditional Chinese biotechnology are illustrated with recent advances in functional microbiology, microbial ecology, solid-state fermentation, enzymology, chemistry of impact flavor compounds, and improvements made to relevant traditional industrial facilities. Recent biotechnological advances in making Chinese liquor, rice wine, soy sauce, and vinegar are reviewed.

  9. Universal prescriptivism: traditional moral decision-making theory revisited.

    Science.gov (United States)

    Crigger, N J

    1994-09-01

    Universal prescriptivism is a recently developed moral decision-making theory that combines utilitarian and Kantian theories with two levels of moral thinking. A combined approach offers a creative solution to the weaknesses inherent in traditional moral theories. The paper describes the theory and discusses important implications for nursing education, practical ethical decision-making, and research. The relationship of an ethical theory of caring to traditional moral theory is discussed.

  10. Applications of Laminar Weak-Link Mechanisms for Ultraprecision Synchrotron Radiation Instruments

    International Nuclear Information System (INIS)

    Shu, D.; Toellner, T. S.; Alp, E. E.; Maser, J.; Ilavsky, J.; Shastri, S. D.; Lee, P. L.; Narayanan, S.; Long, G. G.

    2007-01-01

    Unlike traditional kinematic flexure mechanisms, laminar overconstrained weak-link mechanisms provide much higher structure stiffness and stability. Using a laminar structure configured and manufactured by chemical etching and lithography techniques, we are able to design and build linear and rotary weak-link mechanisms with ultrahigh positioning sensitivity and stability for synchrotron radiation applications. Applications of laminar rotary weak-link mechanism include: high-energy-resolution monochromators for inelastic x-ray scattering and x-ray analyzers for ultra-small-angle scattering and powder-diffraction experiments. Applications of laminar linear weak-link mechanism include high-stiffness piezo-driven stages with subnanometer resolution for an x-ray microscope. In this paper, we summarize the recent designs and applications of the laminar weak-link mechanisms at the Advanced Photon Source

  11. Healthier Traditional Food

    OpenAIRE

    Edward F. Millen

    2017-01-01

    The study of traditional food and healthy eating habits has been one of the fast growing areas. All humans, both men and women, require food for their survival. However, both men and women indulge in food as if it were their sole purpose of existence. Hence, eating disorders are common among men and women. Then media has played an effective role not only in establishing faulty standards for traditional healthy food but also it has highlighted the importance of healthy eating. It has brought t...

  12. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  13. Detection of weak electric fields by sharks, rays, and skates.

    Science.gov (United States)

    Adair, Robert K.; Astumian, R. Dean; Weaver, James C.

    1998-09-01

    The elasmobranchs-sharks, rays, and skates-can detect very weak electric fields in their aqueous environment through a complex sensory system, the ampullae of Lorenzini. The ampullae are conducting tubes that connect the surface of the animal to its interior. In the presence of an electric field, the potential of the surface of the animal will differ from that of the interior and that potential is applied across the apical membrane of the special sensory cells that line the ampullae. The firing rate of the afferent neurons that transmit signals from the ampullae has been shown to vary with that potential. We show that those firing rates can be described quantitatively in terms of synchronous firing of the sensory cells that feed the neurons. We demonstrate that such synchronism follows naturally from a hypothetical weak cell-to-cell interaction that results in a self-organization of the sensory cells. Moreover, the pulse rates of those cells-and the neurons that service the cells-can be expected to vary with the imposed electric fields in accord with measured values through actions of voltage gated transmembrane proteins in the apical sector of the cell membranes that admit Ca(++) ions. We also present a more conjectural model of signal processing at the neuron level that could exploit small differences in firing rates of nerve fibers servicing different ampullae to send an unambiguous signal to the central nervous system of the animal. (c) 1998 American Institute of Physics.

  14. The Theory of Exploitation as the Unequal Exchange of Labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2016-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  15. The theory of exploitation as the unequal exchange of labour

    OpenAIRE

    Veneziani, Roberto; Yoshihara, Naoki

    2017-01-01

    This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...

  16. S-parameters for weakly excited slots

    DEFF Research Database (Denmark)

    Albertsen, Niels Christian

    1999-01-01

    A simple approach to account for parasitic effects in weakly excited slots cut in the broad wall of a rectangular waveguide is proposed......A simple approach to account for parasitic effects in weakly excited slots cut in the broad wall of a rectangular waveguide is proposed...

  17. Low-energy Electro-weak Reactions

    International Nuclear Information System (INIS)

    Gazit, Doron

    2012-01-01

    Chiral effective field theory (EFT) provides a systematic and controlled approach to low-energy nuclear physics. Here, we use chiral EFT to calculate low-energy weak Gamow-Teller transitions. We put special emphasis on the role of two-body (2b) weak currents within the nucleus and discuss their applications in predicting physical observables.

  18. Weak interaction: past answers, present questions

    International Nuclear Information System (INIS)

    Ne'eman, Y.

    1977-02-01

    A historical sketch of the weak interaction is presented. From beta ray to pion decay, the V-A theory of Marshak and Sudarshan, CVC principle of equivalence, universality as an algebraic condition, PCAC, renormalized weak Hamiltonian in the rehabilitation of field theory, and some current issues are considered in this review. 47 references

  19. Staggering towards a calculation of weak amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Sharpe, S.R.

    1988-09-01

    An explanation is given of the methods required to calculate hadronic matrix elements of the weak Hamiltonians using lattice QCD with staggered fermions. New results are presented for the 1-loop perturbative mixing of the weak interaction operators. New numerical techniques designed for staggered fermions are described. A preliminary result for the kaon B parameter is presented. 24 refs., 3 figs.

  20. Weak measurements with a qubit meter

    DEFF Research Database (Denmark)

    Wu, Shengjun; Mølmer, Klaus

    2009-01-01

    We derive schemes to measure the so-called weak values of quantum system observables by coupling of the system to a qubit meter system. We highlight, in particular, the meaning of the imaginary part of the weak values, and show how it can be measured directly on equal footing with the real part...

  1. Optimization of strong and weak coordinates

    NARCIS (Netherlands)

    Swart, M.; Bickelhaupt, F.M.

    2006-01-01

    We present a new scheme for the geometry optimization of equilibrium and transition state structures that can be used for both strong and weak coordinates. We use a screening function that depends on atom-pair distances to differentiate strong coordinates from weak coordinates. This differentiation

  2. Noodles, traditionally and today

    Directory of Open Access Journals (Sweden)

    Na Zhang

    2016-09-01

    Full Text Available Chinese noodles originated in the Han dynasty, which has more than 4,000 years of history. There are many stories about the origin of noodles. To a certain extent, noodles also reflect the cultural traditions and customs of China, which essentially means “human nature” and “worldly common sense”. There are thousands of varieties of noodles in China, according to the classification of the shape of noodles, seasoning gravy, cooking craft, and so on. Many noodles have local characteristics. Noodles are accepted by people from all over the world. The industrial revolution and the development of the food industry realized the transition from a traditional handicraft industry to mass production using machinery. In addition, the invention of instant noodles and their mass production also greatly changed the noodle industry. In essence, noodles are a kind of cereal food, which is the main body of the traditional Chinese diet. It is the main source of energy for Chinese people and the most economical energy food. Adhering to the principle of “making cereal food the main food”, is to maintain our Chinese good diet tradition, which can avoid the disadvantages of a high energy, high fat, and low carbohydrate diet, and promote health. The importance of the status of noodles in the dietary structure of residents in our country and the health impact should not be ignored.

  3. Traditional Cherokee Food.

    Science.gov (United States)

    Hendrix, Janey B.

    A collection for children and teachers of traditional Cherokee recipes emphasizes the art, rather than the science, of cooking. The hand-printed, illustrated format is designed to communicate the feeling of Cherokee history and culture and to encourage readers to collect and add family recipes. The cookbook could be used as a starting point for…

  4. Modern vs. Traditional.

    Science.gov (United States)

    Zhenhui, Rao

    1999-01-01

    This article discusses traditional methods, such as the grammar-translation, and modern methods, the communicative approach, for teaching English-as-a-foreign-language in China. The relationship between linguistic accuracy and communicative competence, student-centered orientation, and the role of the teacher are highlighted. (Author/VWL)

  5. Non-Traditional Wraps

    Science.gov (United States)

    Owens, Buffy

    2009-01-01

    This article presents a recipe for non-traditional wraps. In this article, the author describes how adults and children can help with the recipe and the skills involved with this recipe. The bigger role that children can play in the making of the item the more they are apt to try new things and appreciate the texture and taste.

  6. Making Tradition Healthy

    Centers for Disease Control (CDC) Podcasts

    2007-11-01

    In this podcast, a Latina nutrition educator shows how a community worked with local farmers to grow produce traditionally enjoyed by Hispanic/Latinos.  Created: 11/1/2007 by National Diabetes Education Program (NDEP), a joint program of the Centers for Disease Control and Prevention and the National Institutes of Health.   Date Released: 11/10/2007.

  7. Challenging tradition in Nigeria.

    Science.gov (United States)

    Supriya, K E

    1991-01-01

    In Nigeria since 1987, the National Association of Nigeria Nurses and Midwives (NSNNM) has used traditional medial and traditional health care workers to curtail the practice of female circumcision. Other harmful traditions are being changed also, such as early marriage, taboos of pregnancy and childbirth, and scarification. 30,000 member of NANNM are involved in this effort to halt the harmful practices themselves and to change community opinion. The program involved national and state level workshops on harmful health consequences of traditional practices and instruction on how to conduct focus group discussions to assess women's beliefs and practices. The focus groups were found to be a particularly successful method of opening up discussion of taboo topics and expressing deep emotions. The response to the knowledge that circumcision was not necessary was rage and anger, which was channeled into advocacy roles or change in the practice. The result was the channeled into advocacy roles for change in the practice. The result was the development of books, leaflets and videos. One community group designed a dress with a decorative motif of tatoos and bodily cuts to symbolize circumcision and scarring. Plays and songs were written and performed. Artists provided models of female genitalia both before and after circumcision. The campaign has been successful in bringing this issue to the public attention in prominent ways, such a national television, health talk shows, and women;s magazines. One of the most important results of the effort has been the demonstration that culture and tradition can be changed from within, rather than from outside imposition of values and beliefs.

  8. Fast-Acquisition/Weak-Signal-Tracking GPS Receiver for HEO

    Science.gov (United States)

    Wintemitz, Luke; Boegner, Greg; Sirotzky, Steve

    2004-01-01

    A report discusses the technical background and design of the Navigator Global Positioning System (GPS) receiver -- . a radiation-hardened receiver intended for use aboard spacecraft. Navigator is capable of weak signal acquisition and tracking as well as much faster acquisition of strong or weak signals with no a priori knowledge or external aiding. Weak-signal acquisition and tracking enables GPS use in high Earth orbits (HEO), and fast acquisition allows for the receiver to remain without power until needed in any orbit. Signal acquisition and signal tracking are, respectively, the processes of finding and demodulating a signal. Acquisition is the more computationally difficult process. Previous GPS receivers employ the method of sequentially searching the two-dimensional signal parameter space (code phase and Doppler). Navigator exploits properties of the Fourier transform in a massively parallel search for the GPS signal. This method results in far faster acquisition times [in the lab, 12 GPS satellites have been acquired with no a priori knowledge in a Low-Earth-Orbit (LEO) scenario in less than one second]. Modeling has shown that Navigator will be capable of acquiring signals down to 25 dB-Hz, appropriate for HEO missions. Navigator is built using the radiation-hardened ColdFire microprocessor and housing the most computationally intense functions in dedicated field-programmable gate arrays. The high performance of the algorithm and of the receiver as a whole are made possible by optimizing computational efficiency and carefully weighing tradeoffs among the sampling rate, data format, and data-path bit width.

  9. Environmental effects of geothermal energy exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Nakamura, H [Japan Metals and Chemicals Co., Ltd., Japan

    1975-01-01

    The environmental effects of geothermal power generation which cause air and water pollution and destruction of natural areas are reviewed. The production of steam and hot water affect existing hot springs sources and can cause ground subsidence. Harmful gas can be released onto the atmosphere from fumarolic gas and hot springs. Hydrothermal geothermal fields occasionally contain harmful substances such as arsenic in the hot water. Serious environmental effects can result from geothermal exploitation activities such as the felling of trees for road construction, well drilling, and plant construction. Once geothermal power generation has begun, the release of H/sub 2/S into the atmosphere and the reinjection of hot water are conducted continuously and sufficient countermeasures can be taken. One problem is the effects of plant construction and operation on natural parks. It is important to reach a compromise between development and protection of natural senic areas. Two figures, two tables, and 13 references are provided.

  10. CHARACTERISTICS OF HYDROCARBON EXPLOITATION IN ARCTIC CIRCLE

    Directory of Open Access Journals (Sweden)

    Vanja Lež

    2013-12-01

    Full Text Available The existence of large quantities of hydrocarbons is supposed within the Arctic Circle. Assumed quantities are 25% of the total undiscovered hydrocarbon reserves on Earth, mostly natural gas. Over 500 major and minor gas accumulations within the Arctic Circle were discovered so far, but apart from Snøhvit gas field, there is no commercial exploitation of natural gas from these fields. Arctic gas projects are complicated, technically hard to accomplish, and pose a great threat to the return of investment, safety of people and equipment and for the ecosystem. Russia is a country that is closest to the realization of the Arctic gas projects that are based on the giant gas fields. The most extreme weather conditions in the seas around Greenland are the reason why this Arctic region is the least explored and furthest from the realization of any gas project (the paper is published in Croatian .

  11. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  12. Geometric saliency to characterize radar exploitation performance

    Science.gov (United States)

    Nolan, Adam; Keserich, Brad; Lingg, Andrew; Goley, Steve

    2014-06-01

    Based on the fundamental scattering mechanisms of facetized computer-aided design (CAD) models, we are able to define expected contributions (EC) to the radar signature. The net result of this analysis is the prediction of the salient aspects and contributing vehicle morphology based on the aspect. Although this approach does not provide the fidelity of an asymptotic electromagnetic (EM) simulation, it does provide very fast estimates of the unique scattering that can be consumed by a signature exploitation algorithm. The speed of this approach is particularly relevant when considering the high dimensionality of target configuration variability due to articulating parts which are computationally burdensome to predict. The key scattering phenomena considered in this work are the specular response from a single bounce interaction with surfaces and dihedral response formed between the ground plane and vehicle. Results of this analysis are demonstrated for a set of civilian target models.

  13. Exploitation and use of coal field gas

    Energy Technology Data Exchange (ETDEWEB)

    Wang, K; Li, Z; Sun, Q

    1982-04-25

    There are slightly more than 440 mine shafts in the world from which gas is pumped at the same time coal is being mined, the volume pumped being 3.125 billion cubic meters. All the countries of the world today widely use gas as a fuel and as a raw material for the chemical industry. In China 40 percent of the total number of mine shafts are high gas mine shafts. In China, gas is used largely as fuel by the people, to fire boilers, to make formaldehyde, and to make carbon ink. Prospects are good for the exploitation of mine shaft gas that is produced in association with coal. Mine shaft gas is a top quality energy source with an extraction life that is longer than coals. (DP)

  14. Summary of radiation protection in exploitation

    International Nuclear Information System (INIS)

    Garcier, Yves; Guers, Rene; Bidard, Francoise; Colson, Philippe; Gonin, Michele; Delabre, Herve; Hemidy, Pierre-Yves; Corgnet, Bruno; Perrin, Marie-Claire; Phan Hoang, Long; Abela, Gonzague; Crepieux, Virginie; Guyot, Pierre; Haranger, Didier; Warembourg, Philippe

    2004-01-01

    This document proposes a large and detailed overview of notions and practices regarding radiation protection in relationship with an NPP exploitation framework. It presents the main notions: matter structure, radioactivity, interactions between matter and radiations, types of ionizing radiation, magnitudes and measurement units, exposure modes, main principles of radiation protection, means of protection against internal and external exposures. The second part proposes an overview of the origin of radiological risks in a nuclear power plant. This origin can be found in fission products, activation products, actinides, designed protections, or circuit contaminations. These radiological risks are more precisely identified and described in terms of detection and prevention (internal exposure risk, contamination risk, iodine-related risk, alpha radiation-related risk, access to the reactor building). The next part addresses the medical and radiological follow-up of exposed workers by a special medical control, by an individual exposure control, by a specific control of female personnel, and by attention to exceptional exposures. Measurement means are presented (detection principles, installation continuous control, workspaces control, personnel contamination control, follow-up of individual dose) as well as collective and individual protection means. The management of radiation protection is addressed through a presentation of decision and management structures for radiation protection, and of EDF objectives and ambitions in this domain. The organization of radiation protection during exploitation is described: responsibilities for radiation protection in a nuclear power station, requirements for workers, preparation of interventions in controlled zone, work execution in controlled zone, zone controls and radiological cleanness of installations. The two last chapters address issues and practices of radiation protection in the case of deconstruction or dismantling, and

  15. Demystifying traditional herbal medicine with modern approach.

    Science.gov (United States)

    Li, Fu-Shuang; Weng, Jing-Ke

    2017-07-31

    Plants have long been recognized for their therapeutic properties. For centuries, indigenous cultures around the world have used traditional herbal medicine to treat a myriad of maladies. By contrast, the rise of the modern pharmaceutical industry in the past century has been based on exploiting individual active compounds with precise modes of action. This surge has yielded highly effective drugs that are widely used in the clinic, including many plant natural products and analogues derived from these products, but has fallen short of delivering effective cures for complex human diseases with complicated causes, such as cancer, diabetes, autoimmune disorders and degenerative diseases. While the plant kingdom continues to serve as an important source for chemical entities supporting drug discovery, the rich traditions of herbal medicine developed by trial and error on human subjects over thousands of years contain invaluable biomedical information just waiting to be uncovered using modern scientific approaches. Here we provide an evolutionary and historical perspective on why plants are of particular significance as medicines for humans. We highlight several plant natural products that are either in the clinic or currently under active research and clinical development, with particular emphasis on their mechanisms of action. Recent efforts in developing modern multi-herb prescriptions through rigorous molecular-level investigations and standardized clinical trials are also discussed. Emerging technologies, such as genomics and synthetic biology, are enabling new ways for discovering and utilizing the medicinal properties of plants. We are entering an exciting era where the ancient wisdom distilled into the world's traditional herbal medicines can be reinterpreted and exploited through the lens of modern science.

  16. Weak Solution and Weakly Uniformly Bounded Solution of Impulsive Heat Equations Containing “Maximum” Temperature

    Directory of Open Access Journals (Sweden)

    Oyelami, Benjamin Oyediran

    2013-09-01

    Full Text Available In this paper, criteria for the existence of weak solutions and uniformly weak bounded solution of impulsive heat equation containing maximum temperature are investigated and results obtained. An example is given for heat flow system with impulsive temperature using maximum temperature simulator and criteria for the uniformly weak bounded of solutions of the system are obtained.

  17. Retrieval-based Face Annotation by Weak Label Regularized Local Coordinate Coding.

    Science.gov (United States)

    Wang, Dayong; Hoi, Steven C H; He, Ying; Zhu, Jianke; Mei, Tao; Luo, Jiebo

    2013-08-02

    Retrieval-based face annotation is a promising paradigm of mining massive web facial images for automated face annotation. This paper addresses a critical problem of such paradigm, i.e., how to effectively perform annotation by exploiting the similar facial images and their weak labels which are often noisy and incomplete. In particular, we propose an effective Weak Label Regularized Local Coordinate Coding (WLRLCC) technique, which exploits the principle of local coordinate coding in learning sparse features, and employs the idea of graph-based weak label regularization to enhance the weak labels of the similar facial images. We present an efficient optimization algorithm to solve the WLRLCC task. We conduct extensive empirical studies on two large-scale web facial image databases: (i) a Western celebrity database with a total of $6,025$ persons and $714,454$ web facial images, and (ii)an Asian celebrity database with $1,200$ persons and $126,070$ web facial images. The encouraging results validate the efficacy of the proposed WLRLCC algorithm. To further improve the efficiency and scalability, we also propose a PCA-based approximation scheme and an offline approximation scheme (AWLRLCC), which generally maintains comparable results but significantly saves much time cost. Finally, we show that WLRLCC can also tackle two existing face annotation tasks with promising performance.

  18. Moving Target Information Exploitation Electronic Learning

    Science.gov (United States)

    2005-10-01

    Traditional - ISR WebTAS – eLearning ................................................................. 6 MTIX e- Learning Technical Requirements...than on a specific schedule, so learners can take the curriculum when needed and at their own pace . E- Learning is a form of instructional authoring...can save training expenses, because it can be used over and over again. E- Learning also allows the user to study at his or her own convenience

  19. Improving industrial yeast strains: exploiting natural and artificial diversity.

    Science.gov (United States)

    Steensels, Jan; Snoek, Tim; Meersman, Esther; Picca Nicolino, Martina; Voordeckers, Karin; Verstrepen, Kevin J

    2014-09-01

    Yeasts have been used for thousands of years to make fermented foods and beverages, such as beer, wine, sake, and bread. However, the choice for a particular yeast strain or species for a specific industrial application is often based on historical, rather than scientific grounds. Moreover, new biotechnological yeast applications, such as the production of second-generation biofuels, confront yeast with environments and challenges that differ from those encountered in traditional food fermentations. Together, this implies that there are interesting opportunities to isolate or generate yeast variants that perform better than the currently used strains. Here, we discuss the different strategies of strain selection and improvement available for both conventional and nonconventional yeasts. Exploiting the existing natural diversity and using techniques such as mutagenesis, protoplast fusion, breeding, genome shuffling and directed evolution to generate artificial diversity, or the use of genetic modification strategies to alter traits in a more targeted way, have led to the selection of superior industrial yeasts. Furthermore, recent technological advances allowed the development of high-throughput techniques, such as 'global transcription machinery engineering' (gTME), to induce genetic variation, providing a new source of yeast genetic diversity. © 2014 The Authors. FEMS Microbiology Reviews published by John Wiley & Sons Ltd on behalf of Federation of European Microbiological Societies.

  20. Exploitation of vegetables and fruits through lactic acid fermentation.

    Science.gov (United States)

    Di Cagno, Raffaella; Coda, Rossana; De Angelis, Maria; Gobbetti, Marco

    2013-02-01

    Lactic acid fermentation represents the easiest and the most suitable way for increasing the daily consumption of fresh-like vegetables and fruits. Literature data are accumulating, and this review aims at describing the main features of the lactic acid bacteria to be used for fermentation. Lactic acid bacteria are a small part of the autochthonous microbiota of vegetables and fruits. The diversity of the microbiota markedly depends on the intrinsic and extrinsic parameters of the plant matrix. Notwithstanding the reliable value of the spontaneous fermentation to stabilize and preserve raw vegetables and fruits, a number of factors are in favour of using selected starters. Two main options may be pursued for the controlled lactic acid fermentation of vegetables and fruits: the use of commercial/allochthonous and the use of autochthonous starters. Several evidences were described in favour of the use of selected autochthonous starters, which are tailored for the specific plant matrix. Pro-technological, sensory and nutritional criteria for selecting starters were reported as well as several functional properties, which were recently ascribed to autochthonous lactic acid bacteria. The main features of the protocols used for the manufacture of traditional, emerging and innovative fermented vegetables and fruits were reviewed. Tailored lactic acid bacteria starters completely exploit the potential of vegetables and fruits, which enhances the hygiene, sensory, nutritional and shelf life properties. Copyright © 2012 Elsevier Ltd. All rights reserved.

  1. Improving industrial yeast strains: exploiting natural and artificial diversity

    Science.gov (United States)

    Steensels, Jan; Snoek, Tim; Meersman, Esther; Nicolino, Martina Picca; Voordeckers, Karin; Verstrepen, Kevin J

    2014-01-01

    Yeasts have been used for thousands of years to make fermented foods and beverages, such as beer, wine, sake, and bread. However, the choice for a particular yeast strain or species for a specific industrial application is often based on historical, rather than scientific grounds. Moreover, new biotechnological yeast applications, such as the production of second-generation biofuels, confront yeast with environments and challenges that differ from those encountered in traditional food fermentations. Together, this implies that there are interesting opportunities to isolate or generate yeast variants that perform better than the currently used strains. Here, we discuss the different strategies of strain selection and improvement available for both conventional and nonconventional yeasts. Exploiting the existing natural diversity and using techniques such as mutagenesis, protoplast fusion, breeding, genome shuffling and directed evolution to generate artificial diversity, or the use of genetic modification strategies to alter traits in a more targeted way, have led to the selection of superior industrial yeasts. Furthermore, recent technological advances allowed the development of high-throughput techniques, such as ‘global transcription machinery engineering’ (gTME), to induce genetic variation, providing a new source of yeast genetic diversity. PMID:24724938

  2. Diagnosis of functional (psychogenic paresis and weakness

    Directory of Open Access Journals (Sweden)

    Savkov V.S.

    2018-03-01

    Full Text Available Functional (conversion neurological symptoms represent one of the most common situations faced by neurologists in their everyday practice. Among them, acute or subacute functional weakness may mimic very prevalent conditions such as stroke or traumatic injury. In the diagnosis of functional weakness, although elements of the history are helpful, physical signs are often of crucial importance in the diagnosis and positive signs are as important as absence of signs of disease. Hence, accurate and reliable positive signs of functional weakness are valuable for obtaining timely diagnosis and treatment, making it possible to avoid unnecessary or invasive tests and procedures up to thrombolysis. Functional weakness commonly presents as weakness of an entire limb, paraparesis, or hemiparesis, with observable or demonstrable inconsistencies and non-anatomic accompaniments. Documentation of limb movements during sleep, the arm drop test, the Babinski’s trunk-thigh test, Hoover tests, the Sonoo abductor test, and various dynamometer tests can provide useful bedside diagnostic information on functional weakness. We therefore present here a brief overview of the positive neurological signs of functional weakness available, both in the lower and in the upper limbs; but none should be used in isolation and must be interpreted in the overall context of the presentation. It should be borne in mind that a patient may have both a functional and an organic disorder.

  3. Sadum: Traditional and Contemporary

    Directory of Open Access Journals (Sweden)

    Ratna Panggabean

    2009-07-01

    Full Text Available Sadum is one of the traditional cloths of the Batak people in North Sumatra. It is woven on a back strap loom with supplementary weft technique. Sadum is a warp faced weaving made of cotton and beads woven into the cloth. Ritually it is used as a shoulder cloth, gifts exchanges, and in dances. It also bears the symbol of good tidings and blessings for the receiver. The cloth has change during times in technique, color, patterns, as well as in functions. But the use as a ritual cloth stays the same. The basic weaving techniques and equipments used to create it hasn’t change, but its material and added techniques has made this cloth become more rich in color, pattern, and texture. Most changes began when the Europeans came to Indonesia and introduced new material such as synthetic fibers and colors. In the 70s traditional cloth of Indonesia got its boost when the government declared batik as Indonesian national attire. This encourages other traditional weavings to develop into contemporary clothing. Later, new techniques and material were introduced to the Sadum weavings including embroidery, silk and golden threads which were never used before.

  4. Organizational Effectiveness = Corporate Performance? Why and How Two Research Traditions Need to be Merged

    NARCIS (Netherlands)

    Glunk, U.; Wilderom, C.P.M.

    1996-01-01

    Organizational effectiveness and corporate performance research seem to deal with the same core construct: organizational effectiveness/performance.However, both research traditions have produced separate bodies of literature and have developed different strengths and weaknesses.Organizational

  5. A fuzzy model for exploiting customer requirements

    Directory of Open Access Journals (Sweden)

    Zahra Javadirad

    2016-09-01

    Full Text Available Nowadays, Quality function deployment (QFD is one of the total quality management tools, where customers’ views and requirements are perceived and using various techniques improves the production requirements and operations. The QFD department, after identification and analysis of the competitors, takes customers’ feedbacks to meet the customers’ demands for the products compared with the competitors. In this study, a comprehensive model for assessing the importance of the customer requirements in the products or services for an organization is proposed. The proposed study uses linguistic variables, as a more comprehensive approach, to increase the precision of the expression evaluations. The importance of these requirements specifies the strengths and weaknesses of the organization in meeting the requirements relative to competitors. The results of these experiments show that the proposed method performs better than the other methods.

  6. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, E.

    2017-12-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (an EC Copernicus contributing mission) EO-data archive, the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers (e.g. the EC Copernicus Global Land Service) and end-users. The analysis of time series of data (PB range) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. New features are still developed, but the platform is yet fully operational since November 2016 and offers A time series viewer (browser web client and API), showing the evolution of Proba-V bands and derived vegetation parameters for any country, region, pixel or polygon defined by the user. Full-resolution viewing services for the complete data archive. On-demand processing chains on a powerfull Hadoop/Spark backend. Virtual Machines can be requested by users with access to the complete data archive mentioned above and pre-configured tools to work with this data, e.g. various toolboxes and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. Jupyter Notebooks is available with some examples python and R projects worked out to show the potential of the data. Today the platform is already used by several international third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. From the Proba-V MEP, access to other data sources such as Sentinel-2 and landsat data is also addressed. Selected components of the MEP are also deployed on public cloud infrastructures in various R&D projects. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to

  7. Mission Exploitation Platform PROBA-V

    Science.gov (United States)

    Goor, Erwin

    2016-04-01

    VITO and partners developed an end-to-end solution to drastically improve the exploitation of the PROBA-V EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data. From November 2015 an operational Mission Exploitation Platform (MEP) PROBA-V, as an ESA pathfinder project, will be gradually deployed at the VITO data center with direct access to the complete data archive. Several applications will be released to the users, e.g. - A time series viewer, showing the evolution of PROBA-V bands and derived vegetation parameters for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains e.g. for the calculation of N-daily composites. - A Virtual Machine will be provided with access to the data archive and tools to work with this data, e.g. various toolboxes and support for R and Python. After an initial release in January 2016, a research platform will gradually be deployed allowing users to design, debug and test applications on the platform. From the MEP PROBA-V, access to Sentinel-2 and landsat data will be addressed as well, e.g. to support the Cal/Val activities of the users. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to the complete data archive. To realise this, private cloud technology (openStack) is used and a distributed processing environment is built based on Hadoop. The Hadoop ecosystem offers a lot of technologies (Spark, Yarn, Accumulo, etc.) which we integrate with several open-source components. The impact of this MEP on the user community will be high and will completely change the way of working with the data and hence open the large time series to a larger

  8. Weak entropy inequalities and entropic convergence

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    A criterion for algebraic convergence of the entropy is presented and an algebraic convergence result for the entropy of an exclusion process is improved. A weak entropy inequality is considered and its relationship to entropic convergence is discussed.

  9. Current problems in the weak interactions

    International Nuclear Information System (INIS)

    Pais, A.

    1977-01-01

    Some reasons are discussed showing why the recent SU(2) x U(1) gauge theory of weak and electromagnetic interactions is not a complete theory of these interactions, Lepton theory, charm, and the CP problem are considered. 60 references

  10. From Suitable Weak Solutions to Entropy Viscosity

    KAUST Repository

    Guermond, Jean-Luc; Pasquetti, Richard; Popov, Bojan

    2010-01-01

    This paper focuses on the notion of suitable weak solutions for the three-dimensional incompressible Navier-Stokes equations and discusses the relevance of this notion to Computational Fluid Dynamics. The purpose of the paper is twofold (i

  11. Diazotisation of Weakly Basic Aromatic and Heterocyclic Amines in Strongly Acid Media

    Science.gov (United States)

    Godovikova, Tamara I.; Rakitin, Oleg A.; Khmel'nitskii, Lenor I.

    1983-05-01

    The review is devoted to the diazotisation of weakly basic aromatic amines. The methods of synthesis of diazonium salts based on these amines by non-traditional methods are examined. Data on the mechanism of the diazotisation reaction in strongly acid media are surveyed. Reactions of diazonium salts leading to the synthesis of new compounds are presented. The bibliography includes 75 references.

  12. Broadband Microwave Wireless Power Transfer for Weak-Signal and Multipath Environments

    Science.gov (United States)

    Barton, Richard J.

    2014-01-01

    In this paper, we study the potential benefits of using relatively broadband wireless power transmission WPT strategies in both weak-signal and multipath environments where traditional narrowband strategies can be very inefficient. The paper is primarily a theoretical and analytical treatment of the problem that attempts to derive results that are widely applicable to many different WPT applications, including space solar power SSP.

  13. Subsidy Competition for FDI: Fierce or Weak?

    OpenAIRE

    Tomáš Havránek

    2009-01-01

    The objective of this paper is to empirically assess the recently introduced models of subsidy competition based on the classical oligopoly theories, using both cross-sectional and panel data. Three crucial scenarios (including coordination, weak competition, and fierce competition) are tested employing OLS, iteratively re-weighted least squares, fixed effects, and Blundell-Bond estimator. The results suggest that none of the scenarios can be strongly supported—although there is some weak sup...

  14. About some distinguishing features of weak interactions

    International Nuclear Information System (INIS)

    Beshtoev, Kh.M.

    1999-01-01

    It is shown that, in contrast to strong and electromagnetic theories, additive conserved numbers (such as lepton, aromatic and another numbers) and γ 5 anomaly do not appear in the standard weak interaction theory. It means that in this interaction the additive numbers cannot be conserved. These results are the consequence of specific character of the weak interaction: the right components of spinors do not participate in this interaction. The schemes of violation of the aromatic and lepton numbers were considered

  15. Weak limits for quantum random walks

    International Nuclear Information System (INIS)

    Grimmett, Geoffrey; Janson, Svante; Scudo, Petra F.

    2004-01-01

    We formulate and prove a general weak limit theorem for quantum random walks in one and more dimensions. With X n denoting position at time n, we show that X n /n converges weakly as n→∞ to a certain distribution which is absolutely continuous and of bounded support. The proof is rigorous and makes use of Fourier transform methods. This approach simplifies and extends certain preceding derivations valid in one dimension that make use of combinatorial and path integral methods

  16. Drift waves in a weakly ionized plasma

    DEFF Research Database (Denmark)

    Popovic, M.; Melchior, H.

    1968-01-01

    A dispersion relation for low frequency drift waves in a weakly ionized plasma has been derived, and through numerical calculations the effect of collisions between the charged and the neutral particles is estimated.......A dispersion relation for low frequency drift waves in a weakly ionized plasma has been derived, and through numerical calculations the effect of collisions between the charged and the neutral particles is estimated....

  17. Relationship between exploitation, oscillation, MSY and extinction.

    Science.gov (United States)

    Ghosh, Bapan; Kar, T K; Legovic, T

    2014-10-01

    We give answers to two important problems arising in current fisheries: (i) how maximum sustainable yield (MSY) policy is influenced by the initial population level, and (ii) how harvesting, oscillation and MSY are related to each other in prey-predator systems. To examine the impact of initial population on exploitation, we analyze a single species model with strong Allee effect. It is found that even when the MSY exists, the dynamic solution may not converge to the equilibrium stock if the initial population level is higher but near the critical threshold level. In a prey-predator system with Allee effect in the prey species, the initial population does not have such important impact neither on MSY nor on maximum sustainable total yield (MSTY). However, harvesting the top predator may cause extinction of all species if odd number of trophic levels exist in the ecosystem. With regard to the second problem, we study two prey-predator models and establish that increasing harvesting effort either on prey, predator or both prey and predator destroys previously existing oscillation. Moreover, equilibrium stock both at MSY and MSTY level is stable. We also discuss the validity of found results to other prey-predator systems. Copyright © 2014 Elsevier Inc. All rights reserved.

  18. Exploiting Virtualization and Cloud Computing in ATLAS

    International Nuclear Information System (INIS)

    Harald Barreiro Megino, Fernando; Van der Ster, Daniel; Benjamin, Doug; De, Kaushik; Gable, Ian; Paterson, Michael; Taylor, Ryan; Hendrix, Val; Vitillo, Roberto A; Panitkin, Sergey; De Silva, Asoka; Walker, Rod

    2012-01-01

    The ATLAS Computing Model was designed around the concept of grid computing; since the start of data-taking, this model has proven very successful in the federated operation of more than one hundred Worldwide LHC Computing Grid (WLCG) sites for offline data distribution, storage, processing and analysis. However, new paradigms in computing, namely virtualization and cloud computing, present improved strategies for managing and provisioning IT resources that could allow ATLAS to more flexibly adapt and scale its storage and processing workloads on varied underlying resources. In particular, ATLAS is developing a “grid-of-clouds” infrastructure in order to utilize WLCG sites that make resources available via a cloud API. This work will present the current status of the Virtualization and Cloud Computing R and D project in ATLAS Distributed Computing. First, strategies for deploying PanDA queues on cloud sites will be discussed, including the introduction of a “cloud factory” for managing cloud VM instances. Next, performance results when running on virtualized/cloud resources at CERN LxCloud, StratusLab, and elsewhere will be presented. Finally, we will present the ATLAS strategies for exploiting cloud-based storage, including remote XROOTD access to input data, management of EC2-based files, and the deployment of cloud-resident LCG storage elements.

  19. Exploiting intrinsic fluctuations to identify model parameters.

    Science.gov (United States)

    Zimmer, Christoph; Sahle, Sven; Pahle, Jürgen

    2015-04-01

    Parameterisation of kinetic models plays a central role in computational systems biology. Besides the lack of experimental data of high enough quality, some of the biggest challenges here are identification issues. Model parameters can be structurally non-identifiable because of functional relationships. Noise in measured data is usually considered to be a nuisance for parameter estimation. However, it turns out that intrinsic fluctuations in particle numbers can make parameters identifiable that were previously non-identifiable. The authors present a method to identify model parameters that are structurally non-identifiable in a deterministic framework. The method takes time course recordings of biochemical systems in steady state or transient state as input. Often a functional relationship between parameters presents itself by a one-dimensional manifold in parameter space containing parameter sets of optimal goodness. Although the system's behaviour cannot be distinguished on this manifold in a deterministic framework it might be distinguishable in a stochastic modelling framework. Their method exploits this by using an objective function that includes a measure for fluctuations in particle numbers. They show on three example models, immigration-death, gene expression and Epo-EpoReceptor interaction, that this resolves the non-identifiability even in the case of measurement noise with known amplitude. The method is applied to partially observed recordings of biochemical systems with measurement noise. It is simple to implement and it is usually very fast to compute. This optimisation can be realised in a classical or Bayesian fashion.

  20. Fostering the Exploitation of Open Educational Resources

    Directory of Open Access Journals (Sweden)

    Thomas Richter

    2014-07-01

    Full Text Available The central concept behind Open Educational Resources (OER is opening up the access to educational resources for stakeholders who are not the usual target user group. This concept must be perceived as innovative because it describes a general economic and social paradigm shift: Education, which formerly was limited to a specific group of learners, now, is promoted as a public good. However, despite very good intentions, internationally agreed quality standards, and the availability of the required technological infrastructure, the critical threshold is not yet met. Due to several reasons, the usefulness of OER is often limited to the originally targeted context. Questions arise if the existing quality standards for Technology Enhanced Learning (TEL actually meet the specific requirements within the OER value chain, if the existing quality standards are applicable to OER in a meaningful way, and under which conditions related standards generally could support the exploitation of OER.We analyze quality standards for TEL and contrast the life cycle model of commercial learning resources against the life cycle model of OER. We investigate special demands on quality from the context of OER and, taking the former results into account, derive emergent quality criteria for OER. The paper concludes with recommendations for the design of OER and a future standard development.

  1. Exploiting Genetic Interference for Antiviral Therapy.

    Directory of Open Access Journals (Sweden)

    Elizabeth J Tanner

    2016-05-01

    Full Text Available Rapidly evolving viruses are a major threat to human health. Such viruses are often highly pathogenic (e.g., influenza virus, HIV, Ebola virus and routinely circumvent therapeutic intervention through mutational escape. Error-prone genome replication generates heterogeneous viral populations that rapidly adapt to new selection pressures, leading to resistance that emerges with treatment. However, population heterogeneity bears a cost: when multiple viral variants replicate within a cell, they can potentially interfere with each other, lowering viral fitness. This genetic interference can be exploited for antiviral strategies, either by taking advantage of a virus's inherent genetic diversity or through generating de novo interference by engineering a competing genome. Here, we discuss two such antiviral strategies, dominant drug targeting and therapeutic interfering particles. Both strategies harness the power of genetic interference to surmount two particularly vexing obstacles-the evolution of drug resistance and targeting therapy to high-risk populations-both of which impede treatment in resource-poor settings.

  2. Radiation protection in exploitation of uranium ores

    International Nuclear Information System (INIS)

    Pavlov, I.V.; Shalaev, I.L.

    1976-01-01

    The results are analyzed of the study of the radiation conditions in uranium mines, design and testing of protection means, improvement of methods and equipment for the dosimetric control in different countries since 1968 to 1975. There are outlined radiation hazards and their role in the formation of the radiation situation in mines, dispersive composition of aerosols of short-living daughter products of Rn(DPR) in the mine atmosphere. Among means of the radiation protection the following are dealt with: ventilation including the calculation of air requirements, design of ventilation systems, ventilation practices in working mines; lowering of the release of radon into the mine atmosphere by isolating non-exploited pits, application of gas-proof covers to cofferdams in faces of jointing zones, intensification of mining works in dangerous zones. Methods of air cleaning to remove Rn are suggested in brief. Apparatus are described for the individual control of the level of latent energy in the zone of miners' respiration: track dosimeters, thermoluminescent crystalls (TLC), photographic films, semiconductor systems and biophysical methods of the control for uranium mines. The efficient use of existing protection means provides the normal radiation situation in mines without significant additional investments

  3. Accelerating Large Data Analysis By Exploiting Regularities

    Science.gov (United States)

    Moran, Patrick J.; Ellsworth, David

    2003-01-01

    We present techniques for discovering and exploiting regularity in large curvilinear data sets. The data can be based on a single mesh or a mesh composed of multiple submeshes (also known as zones). Multi-zone data are typical to Computational Fluid Dynamics (CFD) simulations. Regularities include axis-aligned rectilinear and cylindrical meshes as well as cases where one zone is equivalent to a rigid-body transformation of another. Our algorithms can also discover rigid-body motion of meshes in time-series data. Next, we describe a data model where we can utilize the results from the discovery process in order to accelerate large data visualizations. Where possible, we replace general curvilinear zones with rectilinear or cylindrical zones. In rigid-body motion cases we replace a time-series of meshes with a transformed mesh object where a reference mesh is dynamically transformed based on a given time value in order to satisfy geometry requests, on demand. The data model enables us to make these substitutions and dynamic transformations transparently with respect to the visualization algorithms. We present results with large data sets where we combine our mesh replacement and transformation techniques with out-of-core paging in order to achieve significant speed-ups in analysis.

  4. Attending to weak signals: the leader's challenge.

    Science.gov (United States)

    Kerfoot, Karlene

    2005-12-01

    Halverson and Isham (2003) quote sources that report the accidental death rate of simply being in a hospital is " ... four hundred times more likely than your risk of death from traveling by train, forty times higher than driving a car, and twenty times higher than flying in a commercial aircraft" (p. 13). High-reliability organizations such as nuclear power plants and aircraft carriers have been pioneers in the business of recognizing weak signals. Weike and Sutcliffe (2001) note that high-reliability organizations distinguish themselves from others because of their mindfulness which enables them to see the significance of weak signals and to give strong interventions to weak signals. To act mindfully, these organizations have an underlying mental model of continually updating, anticipating, and focusing the possibility of failure using the intelligence that weak signals provides. Much of what happens is unexpected in health care. However, with a culture that is continually looking for weak signals, and intervenes and rescues when these signals are detected, the unexpected happens less often. This is the epitome of how leaders can build a culture of safety that focuses on recognizing the weak signals to manage the unforeseen.

  5. Traditional sorghum beer "ikigage"

    OpenAIRE

    Lyumugabe Loshima, François

    2010-01-01

    Samples of traditional sorghum beer Ikigage was collected in the southern province of Rwanda and analyzed for microbiological and physico-chemical contents. Ikigage contained total aerobic mesophilic bacteria (33.55 x 106 cfu/ml), yeast (10.15 x 106 cfu/ml), lactic acid bacteria (35.35 x 104 cfu/ml), moulds (4.12 x 104 cfu/ml), E. coli (21.90 x 103 cfu/ml), fecal streptococci (22.50 x 103 cfu/ml), Staphylococcus aureus (16.02 x 103 cfu/ml), total coliform (32.30 x 103 cfu/ml), eth...

  6. In the Dirac tradition

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1988-04-15

    It was Paul Dirac who cast quantum mechanics into the form we now use, and many generations of theoreticians openly acknowledge his influence on their thinking. When Dirac died in 1984, St. John's College, Cambridge, his base for most of his lifetime, instituted an annual lecture in his memory at Cambridge. The first lecture, in 1986, attracted two heavyweights - Richard Feynman and Steven Weinberg. Far from using the lectures as a platform for their own work, in the Dirac tradition they presented stimulating material on deep underlying questions.

  7. In the Dirac tradition

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    It was Paul Dirac who cast quantum mechanics into the form we now use, and many generations of theoreticians openly acknowledge his influence on their thinking. When Dirac died in 1984, St. John's College, Cambridge, his base for most of his lifetime, instituted an annual lecture in his memory at Cambridge. The first lecture, in 1986, attracted two heavyweights - Richard Feynman and Steven Weinberg. Far from using the lectures as a platform for their own work, in the Dirac tradition they presented stimulating material on deep underlying questions

  8. Main principles of developing exploitation models of semiconductor devices

    Science.gov (United States)

    Gradoboev, A. V.; Simonova, A. V.

    2018-05-01

    The paper represents primary tasks, solutions of which allow to develop the exploitation modes of semiconductor devices taking into account complex and combined influence of ionizing irradiation and operation factors. The structure of the exploitation model of the semiconductor device is presented, which is based on radiation and reliability models. Furthermore, it was shown that the exploitation model should take into account complex and combine influence of various ionizing irradiation types and operation factors. The algorithm of developing the exploitation model of the semiconductor devices is proposed. The possibility of creating the radiation model of Schottky barrier diode, Schottky field-effect transistor and Gunn diode is shown based on the available experimental data. The basic exploitation model of IR-LEDs based upon double AlGaAs heterostructures is represented. The practical application of the exploitation models will allow to output the electronic products with guaranteed operational properties.

  9. Transnational gestational surrogacy: does it have to be exploitative?

    Science.gov (United States)

    Kirby, Jeffrey

    2014-01-01

    This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative.

  10. Proba-V Mission Exploitation Platform

    Science.gov (United States)

    Goor, Erwin; Dries, Jeroen

    2017-04-01

    VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (a Copernicus contributing mission) EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. Furthermore data from the Copernicus Global Land Service is in scope of the platform. From November 2015 an operational Proba-V MEP environment, as an ESA operation service, is gradually deployed at the VITO data center with direct access to the complete data archive. Since autumn 2016 the platform is operational and yet several applications are released to the users, e.g. - A time series viewer, showing the evolution of Proba-V bands and derived vegetation parameters from the Copernicus Global Land Service for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains on a powerfull Hadoop/Spark backend e.g. for the calculation of N-daily composites. - Virtual Machines can be provided with access to the data archive and tools to work with this data, e.g. various toolboxes (GDAL, QGIS, GrassGIS, SNAP toolbox, …) and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. - A prototype of jupyter Notebooks is available with some examples worked out to show the potential of the data. Today the platform is used by several third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. In parallel the platform is further improved and extended. From the MEP PROBA-V, access to Sentinel-2 and landsat data will

  11. Enhancing QKD security with weak measurements

    Science.gov (United States)

    Farinholt, Jacob M.; Troupe, James E.

    2016-10-01

    Publisher's Note: This paper, originally published on 10/24/2016, was replaced with a corrected/revised version on 11/8/2016. If you downloaded the original PDF but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. In the late 1980s, Aharonov and colleagues developed the notion of a weak measurement of a quantum observable that does not appreciably disturb the system.1, 2 The measurement results are conditioned on both the pre-selected and post-selected state of the quantum system. While any one measurement reveals very little information, by making the same measurement on a large ensemble of identically prepared pre- and post-selected (PPS) states and averaging the results, one may obtain what is known as the weak value of the observable with respect to that PPS ensemble. Recently, weak measurements have been proposed as a method of assessing the security of QKD in the well-known BB84 protocol.3 This weak value augmented QKD protocol (WV-QKD) works by additionally requiring the receiver, Bob, to make a weak measurement of a particular observable prior to his strong measurement. For the subset of measurement results in which Alice and Bob's measurement bases do not agree, the weak measurement results can be used to detect any attempt by an eavesdropper, Eve, to correlate her measurement results with Bob's. Furthermore, the well-known detector blinding attacks, which are known to perfectly correlate Eve's results with Bob's without being caught by conventional BB84 implementations, actually make the eavesdropper more visible in the new WV-QKD protocol. In this paper, we will introduce the WV-QKD protocol and discuss its generalization to the 6-state single qubit protocol. We will discuss the types of weak measurements that are optimal for this protocol, and compare the predicted performance of the 6- and 4-state WV-QKD protocols.

  12. Weak interactions in astrophysics and cosmology

    International Nuclear Information System (INIS)

    Taylor, R.J.

    1977-01-01

    There ar many problems in astrophysics and cosmology in which the form of the weak interactions, their strength or the number of weakly interacting particles, is very important. It is possible that astronomical observations may give some information about the weak interactions. In the conventional hot big bang cosmological theory the number of leptons with associated neutrinos influences the speed of expansion of the Universe and the chemical composition of pre-galactic matter. The strength of the weak interaction, as exemplified by the half-life of the neutron, has a similar effect. In addition, the form of the weak interactions will determine how effectively neutrino viscosity can smooth out irregularities in the early Universe. Because neutrinos have a very long mean free path, they can escape from the central region of stars whereas photons can only escape from the surface. In late stages of stellar evolution, neutrino luminosity is often believed to be much greater than photon luminosity. This can both accelerate the cooling of dying stars and influence the stages of stellar evolution leading to the onset of supernova explosions. In pre-super-novae it is even possible that very dense stellar cores can be opaque to neutrinos and that the absorption or scattering of neutrinos can cause the explosion. These results depend crucially on the form of the weak interactions, with the discovery of neutral currents being very important. Until the solar neutrino experiment has been reconciled with theory, the possible role of uncertainties in the weak interactions cannot be ignored. (author)

  13. SIMULATION OF SUBGRADE EMBANKMENT ON WEAK BASE

    Directory of Open Access Journals (Sweden)

    V. D. Petrenko

    2015-08-01

    Full Text Available Purpose. This article provides: the question of the sustainability of the subgrade on a weak base is considered in the paper. It is proposed to use the method of jet grouting. Investigation of the possibility of a weak base has an effect on the overall deformation of the subgrade; the identification and optimization of the parameters of subgrade based on studies using numerical simulation. Methodology. The theoretical studies of the stress-strain state of the base and subgrade embankment by modeling in the software package LIRA have been conducted to achieve this goal. Findings. After making the necessary calculations perform building fields of a subsidence, borders cramped thickness, bed’s coefficients of Pasternak and Winkler. The diagrams construction of vertical stress performs at any point of load application. Also, using the software system may perform peer review subsidence, rolls railroad tracks in natural and consolidated basis. Originality. For weak soils is the most appropriate nonlinear model of the base with the existing areas of both elastic and limit equilibrium, mixed problem of the theory of elasticity and plasticity. Practical value. By increasing the load on the weak base as a result of the second track construction, adds embankment or increasing axial load when changing the rolling stock process of sedimentation and consolidation may continue again. Therefore, one of the feasible and promising options for the design and reconstruction of embankments on weak bases is to strengthen the bases with the help of jet grouting. With the expansion of the railway infrastructure, increasing speed and weight of the rolling stock is necessary to ensure the stability of the subgrade on weak bases. LIRA software package allows you to perform all the necessary calculations for the selection of a proper way of strengthening weak bases.

  14. Exploiting Untapped Information Resources in Earth Science

    Science.gov (United States)

    Ramachandran, R.; Fox, P. A.; Kempler, S.; Maskey, M.

    2015-12-01

    One of the continuing challenges in any Earth science investigation is the amount of time and effort required for data preparation before analysis can begin. Current Earth science data and information systems have their own shortcomings. For example, the current data search systems are designed with the assumption that researchers find data primarily by metadata searches on instrument or geophysical keywords, assuming that users have sufficient knowledge of the domain vocabulary to be able to effectively utilize the search catalogs. These systems lack support for new or interdisciplinary researchers who may be unfamiliar with the domain vocabulary or the breadth of relevant data available. There is clearly a need to innovate and evolve current data and information systems in order to improve data discovery and exploration capabilities to substantially reduce the data preparation time and effort. We assert that Earth science metadata assets are dark resources, information resources that organizations collect, process, and store for regular business or operational activities but fail to utilize for other purposes. The challenge for any organization is to recognize, identify and effectively utilize the dark data stores in their institutional repositories to better serve their stakeholders. NASA Earth science metadata catalogs contain dark resources consisting of structured information, free form descriptions of data and pre-generated images. With the addition of emerging semantic technologies, such catalogs can be fully utilized beyond their original design intent of supporting current search functionality. In this presentation, we will describe our approach of exploiting these information resources to provide novel data discovery and exploration pathways to science and education communities

  15. Postural Hand Synergies during Environmental Constraint Exploitation

    Directory of Open Access Journals (Sweden)

    Cosimo Della Santina

    2017-08-01

    Full Text Available Humans are able to intuitively exploit the shape of an object and environmental constraints to achieve stable grasps and perform dexterous manipulations. In doing that, a vast range of kinematic strategies can be observed. However, in this work we formulate the hypothesis that such ability can be described in terms of a synergistic behavior in the generation of hand postures, i.e., using a reduced set of commonly used kinematic patterns. This is in analogy with previous studies showing the presence of such behavior in different tasks, such as grasping. We investigated this hypothesis in experiments performed by six subjects, who were asked to grasp objects from a flat surface. We quantitatively characterized hand posture behavior from a kinematic perspective, i.e., the hand joint angles, in both pre-shaping and during the interaction with the environment. To determine the role of tactile feedback, we repeated the same experiments but with subjects wearing a rigid shell on the fingertips to reduce cutaneous afferent inputs. Results show the persistence of at least two postural synergies in all the considered experimental conditions and phases. Tactile impairment does not alter significantly the first two synergies, and contact with the environment generates a change only for higher order Principal Components. A good match also arises between the first synergy found in our analysis and the first synergy of grasping as quantified by previous work. The present study is motivated by the interest of learning from the human example, extracting lessons that can be applied in robot design and control. Thus, we conclude with a discussion on implications for robotics of our findings.

  16. Exploiting core knowledge for visual object recognition.

    Science.gov (United States)

    Schurgin, Mark W; Flombaum, Jonathan I

    2017-03-01

    Humans recognize thousands of objects, and with relative tolerance to variable retinal inputs. The acquisition of this ability is not fully understood, and it remains an area in which artificial systems have yet to surpass people. We sought to investigate the memory process that supports object recognition. Specifically, we investigated the association of inputs that co-occur over short periods of time. We tested the hypothesis that human perception exploits expectations about object kinematics to limit the scope of association to inputs that are likely to have the same token as a source. In several experiments we exposed participants to images of objects, and we then tested recognition sensitivity. Using motion, we manipulated whether successive encounters with an image took place through kinematics that implied the same or a different token as the source of those encounters. Images were injected with noise, or shown at varying orientations, and we included 2 manipulations of motion kinematics. Across all experiments, memory performance was better for images that had been previously encountered with kinematics that implied a single token. A model-based analysis similarly showed greater memory strength when images were shown via kinematics that implied a single token. These results suggest that constraints from physics are built into the mechanisms that support memory about objects. Such constraints-often characterized as 'Core Knowledge'-are known to support perception and cognition broadly, even in young infants. But they have never been considered as a mechanism for memory with respect to recognition. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  17. Beneath Still Waters - Multistage Aquatic Exploitation of Euryale ferox (Salisb. during the Acheulian

    Directory of Open Access Journals (Sweden)

    Naama Goren-Inbar1

    2014-09-01

    Full Text Available Remains of the highly nutritious aquatic plant Fox nut – Euryale ferox Salisb. (Nymphaeaceae – were found at the Acheulian site of Gesher Benot Ya'aqov, Israel. Here, we present new evidence for complex cognitive strategies of hominins as seen in their exploitation of E. ferox nuts. We draw on excavated data and on parallels observed in traditional collecting and processing practices from Bihar, India. We suggest that during the early Middle Pleistocene, hominins implemented multistage procedures comprising underwater gathering and subsequent processing (drying, roasting and popping of E. ferox nuts. Hierarchical processing strategies are observed in the Acheulian lithic reduction sequences and butchering of game at this and other sites, but are poorly understood as regards the exploitation of aquatic plant resources. We highlight the ability of Acheulian hominins to resolve issues related to underwater gathering of E. ferox nuts during the plant's life cycle and to adopt strategies to enhance their nutritive value.

  18. Possibilities of collecting evidences about crime act of sexual exploitation in human beings

    Directory of Open Access Journals (Sweden)

    Mijalković Saša

    2006-01-01

    Full Text Available Collecting evidences about organized crime act of sexual exploitation in human begins often is very difficult because of high level of organization, secrecy ant precaution taken during committing prostitution, pornography, sex tourism and human trafficking. On the other side, high illegal profit enable criminals to engage "expensive" and experienced lawyers, whose often make values and reliability of collected evidences questionable, appealing to irregularities during police collecting procedure. Among traditional criminalities methods and proofing activities, in the study, modern tendencies in special investigative measures and techniques are considered. After that, there is pointing at specificity, meaning and value of material tracks and objects, which are essential for proofing crime act or perpetrator’s guiltiness. On the end, there is pointing at importance of victims’ cooperation in collecting evidences about their sexual exploitation.

  19. Thermal Property Engineering: Exploiting the Properties of Ceramic Nanocomposites

    Science.gov (United States)

    2018-03-01

    ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the Properties of Ceramic...return it to the originator. ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the...2015 – Dec 31 2017 4. TITLE AND SUBTITLE Thermal Property Engineering : Exploiting the Properties of Ceramic Nanocomposites 5a. CONTRACT NUMBER 5b

  20. Implementation synergies that exploit situational knowledge strategically

    DEFF Research Database (Denmark)

    Quitzau, Maj-Britt; Petersen, Jens-Phillip

    This paper illustrates how strategic and situated forms of knowledge may increase capacity to implement energy strategies in local urban development projects. Through analysis of front runner implementation projects, we show that the involved planners utilize situational learning processes...... strategically to develop more viable implementation trajectories. These findings resonate well with relational and network orienteered research in contemporary planning theory. In the selected case studies, we can see that planners deliberately seek to extend traditional planning approaches, like e.......g. regulation, with broader context‐specific learning processes. In doing so, we argue that – what we call – an implementation synergy is established by interlacing different forms of situational knowledge with strategic knowledge about how to reach a desired energy target. In conclusion, the paper identifies...

  1. The Problem of Weak Governments and Weak Societies in Eastern Europe

    Directory of Open Access Journals (Sweden)

    Marko Grdešić

    2008-01-01

    Full Text Available This paper argues that, for Eastern Europe, the simultaneous presence of weak governments and weak societies is a crucial obstacle which must be faced by analysts and reformers. The understanding of other normatively significant processes will be deficient without a consciousness-raising deliberation on this problem and its implications. This paper seeks to articulate the “relational” approach to state and society. In addition, the paper lays out a typology of possible patterns of relationship between state and society, dependent on whether the state is weak or strong and whether society is weak or strong. Comparative data are presented in order to provide an empirical support for the theses. Finally, the paper outlines two reform approaches which could enable breaking the vicious circle emerging in the context of weak governments and weak societies.

  2. Geometric phase topology in weak measurement

    Science.gov (United States)

    Samlan, C. T.; Viswanathan, Nirmal K.

    2017-12-01

    The geometric phase visualization proposed by Bhandari (R Bhandari 1997 Phys. Rep. 281 1-64) in the ellipticity-ellipse orientation basis of the polarization ellipse of light is implemented to understand the geometric aspects of weak measurement. The weak interaction of a pre-selected state, acheived via spin-Hall effect of light (SHEL), results in a spread in the polarization ellipticity (η) or ellipse orientation (χ) depending on the resulting spatial or angular shift, respectively. The post-selection leads to the projection of the η spread in the complementary χ basis results in the appearance of a geometric phase with helical phase topology in the η - χ parameter space. By representing the weak measurement on the Poincaré sphere and using Jones calculus, the complex weak value and the geometric phase topology are obtained. This deeper understanding of the weak measurement process enabled us to explore the techniques’ capabilities maximally, as demonstrated via SHEL in two examples—external reflection at glass-air interface and transmission through a tilted half-wave plate.

  3. Non-traditional inheritance

    International Nuclear Information System (INIS)

    Hall, J.G.

    1992-01-01

    In the last few years, several non-traditional forms of inheritance have been recognized. These include mosaicism, cytoplasmic inheritance, uniparental disomy, imprinting, amplification/anticipation, and somatic recombination. Genomic imprinting (GI) is the dependence of the phenotype on the sex of the transmitting parent. GI in humans seems to involve growth, behaviour, and survival in utero. The detailed mechanism of genomic imprinting is not known, but it seems that some process is involved in turning a gene off; this probably involves two genes, one of which produces a product that turns a gene off, and the gene that is itself turned off. The process of imprinting (turning off) may be associated with methylation. Erasure of imprinting can occur, and seems to be associated with meiosis. 10 refs

  4. Weak KAM theory for a weakly coupled system of Hamilton–Jacobi equations

    KAUST Repository

    Figalli, Alessio; Gomes, Diogo A.; Marcon, Diego

    2016-01-01

    Here, we extend the weak KAM and Aubry–Mather theories to optimal switching problems. We consider three issues: the analysis of the calculus of variations problem, the study of a generalized weak KAM theorem for solutions of weakly coupled systems of Hamilton–Jacobi equations, and the long-time behavior of time-dependent systems. We prove the existence and regularity of action minimizers, obtain necessary conditions for minimality, extend Fathi’s weak KAM theorem, and describe the asymptotic limit of the generalized Lax–Oleinik semigroup. © 2016, Springer-Verlag Berlin Heidelberg.

  5. Weak KAM theory for a weakly coupled system of Hamilton–Jacobi equations

    KAUST Repository

    Figalli, Alessio

    2016-06-23

    Here, we extend the weak KAM and Aubry–Mather theories to optimal switching problems. We consider three issues: the analysis of the calculus of variations problem, the study of a generalized weak KAM theorem for solutions of weakly coupled systems of Hamilton–Jacobi equations, and the long-time behavior of time-dependent systems. We prove the existence and regularity of action minimizers, obtain necessary conditions for minimality, extend Fathi’s weak KAM theorem, and describe the asymptotic limit of the generalized Lax–Oleinik semigroup. © 2016, Springer-Verlag Berlin Heidelberg.

  6. Exploiting Laboratory and Heliophysics Plasma Synergies

    Directory of Open Access Journals (Sweden)

    Jill Dahlburg

    2010-05-01

    Full Text Available Recent advances in space-based heliospheric observations, laboratory experimentation, and plasma simulation codes are creating an exciting new cross-disciplinary opportunity for understanding fast energy release and transport mechanisms in heliophysics and laboratory plasma dynamics, which had not been previously accessible. This article provides an overview of some new observational, experimental, and computational assets, and discusses current and near-term activities towards exploitation of synergies involving those assets. This overview does not claim to be comprehensive, but instead covers mainly activities closely associated with the authors’ interests and reearch. Heliospheric observations reviewed include the Sun Earth Connection Coronal and Heliospheric Investigation (SECCHI on the National Aeronautics and Space Administration (NASA Solar Terrestrial Relations Observatory (STEREO mission, the first instrument to provide remote sensing imagery observations with spatial continuity extending from the Sun to the Earth, and the Extreme-ultraviolet Imaging Spectrometer (EIS on the Japanese Hinode spacecraft that is measuring spectroscopically physical parameters of the solar atmosphere towards obtaining plasma temperatures, densities, and mass motions. The Solar Dynamics Observatory (SDO and the upcoming Solar Orbiter with the Heliospheric Imager (SoloHI on-board will also be discussed. Laboratory plasma experiments surveyed include the line-tied magnetic reconnection experiments at University of Wisconsin (relevant to coronal heating magnetic flux tube observations and simulations, and a dynamo facility under construction there; the Space Plasma Simulation Chamber at the Naval Research Laboratory that currently produces plasmas scalable to ionospheric and magnetospheric conditions and in the future also will be suited to study the physics of the solar corona; the Versatile Toroidal Facility at the Massachusetts Institute of Technology that

  7. Efficient quantum computing with weak measurements

    International Nuclear Information System (INIS)

    Lund, A P

    2011-01-01

    Projective measurements with high quantum efficiency are often assumed to be required for efficient circuit-based quantum computing. We argue that this is not the case and show that the fact that they are not required was actually known previously but was not deeply explored. We examine this issue by giving an example of how to perform the quantum-ordering-finding algorithm efficiently using non-local weak measurements considering that the measurements used are of bounded weakness and some fixed but arbitrary probability of success less than unity is required. We also show that it is possible to perform the same computation with only local weak measurements, but this must necessarily introduce an exponential overhead.

  8. Weak layer fracture: facets and depth hoar

    Directory of Open Access Journals (Sweden)

    I. Reiweger

    2013-09-01

    Full Text Available Understanding failure initiation within weak snow layers is essential for modeling and predicting dry-snow slab avalanches. We therefore performed laboratory experiments with snow samples containing a weak layer consisting of either faceted crystals or depth hoar. During these experiments the samples were loaded with different loading rates and at various tilt angles until fracture. The strength of the samples decreased with increasing loading rate and increasing tilt angle. Additionally, we took pictures of the side of four samples with a high-speed video camera and calculated the displacement using a particle image velocimetry (PIV algorithm. The fracture process within the weak layer could thus be observed in detail. Catastrophic failure started due to a shear fracture just above the interface between the depth hoar layer and the underlying crust.

  9. Weak lensing in the Dark Energy Survey

    Science.gov (United States)

    Troxel, Michael

    2016-03-01

    I will present the current status of weak lensing results from the Dark Energy Survey (DES). DES will survey 5000 square degrees in five photometric bands (grizY), and has already provided a competitive weak lensing catalog from Science Verification data covering just 3% of the final survey footprint. I will summarize the status of shear catalog production using observations from the first year of the survey and discuss recent weak lensing science results from DES. Finally, I will report on the outlook for future cosmological analyses in DES including the two-point cosmic shear correlation function and discuss challenges that DES and future surveys will face in achieving a control of systematics that allows us to take full advantage of the available statistical power of our shear catalogs.

  10. Weak self-adjoint differential equations

    International Nuclear Information System (INIS)

    Gandarias, M L

    2011-01-01

    The concepts of self-adjoint and quasi self-adjoint equations were introduced by Ibragimov (2006 J. Math. Anal. Appl. 318 742-57; 2007 Arch. ALGA 4 55-60). In Ibragimov (2007 J. Math. Anal. Appl. 333 311-28), a general theorem on conservation laws was proved. In this paper, we generalize the concept of self-adjoint and quasi self-adjoint equations by introducing the definition of weak self-adjoint equations. We find a class of weak self-adjoint quasi-linear parabolic equations. The property of a differential equation to be weak self-adjoint is important for constructing conservation laws associated with symmetries of the differential equation. (fast track communication)

  11. On weakly D-differentiable operators

    DEFF Research Database (Denmark)

    Christensen, Erik

    2016-01-01

    Let DD be a self-adjoint operator on a Hilbert space HH and aa a bounded operator on HH. We say that aa is weakly DD-differentiable, if for any pair of vectors ξ,ηξ,η from HH the function 〈eitDae−itDξ,η〉〈eitDae−itDξ,η〉 is differentiable. We give an elementary example of a bounded operator aa......, such that aa is weakly DD-differentiable, but the function eitDae−itDeitDae−itD is not uniformly differentiable. We show that weak  DD-differentiability   may be characterized by several other properties, some of which are related to the commutator (Da−aD)...

  12. Strong effects in weak nonleptonic decays

    International Nuclear Information System (INIS)

    Wise, M.B.

    1980-04-01

    In this report the weak nonleptonic decays of kaons and hyperons are examined with the hope of gaining insight into a recently proposed mechanism for the ΔI = 1/2 rule. The effective Hamiltonian for ΔS = 1 weak nonleptonic decays and that for K 0 -anti K 0 mixing are calculated in the six-quark model using the leading logarithmic approximation. These are used to examine the CP violation parameters of the kaon system. It is found that if Penguin-type diagrams make important contributions to K → ππ decay amplitudes then upcoming experiments may be able to distinguish the six-quark model for CP violation from the superweak model. The weak radiative decays of hyperons are discussed with an emphasis on what they can teach us about hyperon nonleptonic decays and the ΔI = 1/2 rule

  13. Line identification studies using traditional techniques and wavelength coincidence statistics

    International Nuclear Information System (INIS)

    Cowley, C.R.; Adelman, S.J.

    1990-01-01

    Traditional line identification techniques result in the assignment of individual lines to an atomic or ionic species. These methods may be supplemented by wavelength coincidence statistics (WCS). The strength and weakness of these methods are discussed using spectra of a number of normal and peculiar B and A stars that have been studied independently by both methods. The present results support the overall findings of some earlier studies. WCS would be most useful in a first survey, before traditional methods have been applied. WCS can quickly make a global search for all species and in this way may enable identifications of an unexpected spectrum that could easily be omitted entirely from a traditional study. This is illustrated by O I. WCS is a subject to well known weakness of any statistical technique, for example, a predictable number of spurious results are to be expected. The danger of small number statistics are illustrated. WCS is at its best relative to traditional methods in finding a line-rich atomic species that is only weakly present in a complicated stellar spectrum

  14. Simulated population responses of common carp to commercial exploitation

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.

    2011-12-01

    Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance

  15. Precision cosmology with weak gravitational lensing

    Science.gov (United States)

    Hearin, Andrew P.

    In recent years, cosmological science has developed a highly predictive model for the universe on large scales that is in quantitative agreement with a wide range of astronomical observations. While the number and diversity of successes of this model provide great confidence that our general picture of cosmology is correct, numerous puzzles remain. In this dissertation, I analyze the potential of planned and near future galaxy surveys to provide new understanding of several unanswered questions in cosmology, and address some of the leading challenges to this observational program. In particular, I study an emerging technique called cosmic shear, the weak gravitational lensing produced by large scale structure. I focus on developing strategies to optimally use the cosmic shear signal observed in galaxy imaging surveys to uncover the physics of dark energy and the early universe. In chapter 1 I give an overview of a few unsolved mysteries in cosmology and I motivate weak lensing as a cosmological probe. I discuss the use of weak lensing as a test of general relativity in chapter 2 and assess the threat to such tests presented by our uncertainty in the physics of galaxy formation. Interpreting the cosmic shear signal requires knowledge of the redshift distribution of the lensed galaxies. This redshift distribution will be significantly uncertain since it must be determined photometrically. In chapter 3 I investigate the influence of photometric redshift errors on our ability to constrain dark energy models with weak lensing. The ability to study dark energy with cosmic shear is also limited by the imprecision in our understanding of the physics of gravitational collapse. In chapter 4 I present the stringent calibration requirements on this source of uncertainty. I study the potential of weak lensing to resolve a debate over a long-standing anomaly in CMB measurements in chapter 5. Finally, in chapter 6 I summarize my findings and conclude with a brief discussion of my

  16. Extrapolating Weak Selection in Evolutionary Games

    Science.gov (United States)

    Wu, Bin; García, Julián; Hauert, Christoph; Traulsen, Arne

    2013-01-01

    In evolutionary games, reproductive success is determined by payoffs. Weak selection means that even large differences in game outcomes translate into small fitness differences. Many results have been derived using weak selection approximations, in which perturbation analysis facilitates the derivation of analytical results. Here, we ask whether results derived under weak selection are also qualitatively valid for intermediate and strong selection. By “qualitatively valid” we mean that the ranking of strategies induced by an evolutionary process does not change when the intensity of selection increases. For two-strategy games, we show that the ranking obtained under weak selection cannot be carried over to higher selection intensity if the number of players exceeds two. For games with three (or more) strategies, previous examples for multiplayer games have shown that the ranking of strategies can change with the intensity of selection. In particular, rank changes imply that the most abundant strategy at one intensity of selection can become the least abundant for another. We show that this applies already to pairwise interactions for a broad class of evolutionary processes. Even when both weak and strong selection limits lead to consistent predictions, rank changes can occur for intermediate intensities of selection. To analyze how common such games are, we show numerically that for randomly drawn two-player games with three or more strategies, rank changes frequently occur and their likelihood increases rapidly with the number of strategies . In particular, rank changes are almost certain for , which jeopardizes the predictive power of results derived for weak selection. PMID:24339769

  17. Weak Acid Ionization Constants and the Determination of Weak Acid-Weak Base Reaction Equilibrium Constants in the General Chemistry Laboratory

    Science.gov (United States)

    Nyasulu, Frazier; McMills, Lauren; Barlag, Rebecca

    2013-01-01

    A laboratory to determine the equilibrium constants of weak acid negative weak base reactions is described. The equilibrium constants of component reactions when multiplied together equal the numerical value of the equilibrium constant of the summative reaction. The component reactions are weak acid ionization reactions, weak base hydrolysis…

  18. Weak hadronic currents in compensation theory

    International Nuclear Information System (INIS)

    Pappas, R.C.

    1975-01-01

    Working within the framework of a compensation theory of strong and weak interactions, it is shown that: (1) an axial vector baryon number current can be included in the weak current algebra if certain restrictions on the K-meson strong couplings are relaxed; (2) the theory does not permit the introduction of strange currents of the chiral form V + A; and (3) the assumption that the superweak currents of the theory cannot contain certain CP conserving terms can be justified on the basis of compensation requirements

  19. Weak interactions of the b quark

    International Nuclear Information System (INIS)

    Branco, G.C.; Mohapatra, R.N.

    1978-01-01

    In weak-interaction models with two charged W bosons of comparable mass, there exists a novel possibility for the weak interactions of the b quark, in which the (u-barb)/sub R/ current occurs with maximal strength. It is noted that multimuon production in e + e - annihilation at above Q 2 > or approx. = (12 GeV) 2 will distinguish this scheme from the conventional one. We also present a Higgs system that leads naturally to this type of coupling, in a class of gauge models

  20. Fast measure proceeding of weak currents

    International Nuclear Information System (INIS)

    Taieb, J.

    1953-01-01

    The process of fast measure of the weak currents that we are going to describe briefly apply worthy of the provided currents by the sources to elevated value internal resistance, as it is the case for the ionization chamber, the photocells, mass spectroscopic tubes. The problem to measure weak currents is essentially a problem of amplifier and of input circuit. We intended to achieve a whole amplifier and input circuit with advanced performances, meaning that for a measured celerity we wanted to have an signal/noise ratio the most important as in the classic systems and for a same report signal/noise a more quickly done measure. (M.B.) [fr

  1. A Continuation Method for Weakly Kannan Maps

    Directory of Open Access Journals (Sweden)

    Ariza-Ruiz David

    2010-01-01

    Full Text Available The first continuation method for contractive maps in the setting of a metric space was given by Granas. Later, Frigon extended Granas theorem to the class of weakly contractive maps, and recently Agarwal and O'Regan have given the corresponding result for a certain type of quasicontractions which includes maps of Kannan type. In this note we introduce the concept of weakly Kannan maps and give a fixed point theorem, and then a continuation method, for this class of maps.

  2. From Suitable Weak Solutions to Entropy Viscosity

    KAUST Repository

    Guermond, Jean-Luc

    2010-12-16

    This paper focuses on the notion of suitable weak solutions for the three-dimensional incompressible Navier-Stokes equations and discusses the relevance of this notion to Computational Fluid Dynamics. The purpose of the paper is twofold (i) to recall basic mathematical properties of the three-dimensional incompressible Navier-Stokes equations and to show how they might relate to LES (ii) to introduce an entropy viscosity technique based on the notion of suitable weak solution and to illustrate numerically this concept. © 2010 Springer Science+Business Media, LLC.

  3. Weak form factors of beauty baryons

    International Nuclear Information System (INIS)

    Ivanov, M.A.; Lyubovitskij, V.E.

    1992-01-01

    Full analysis of semileptonic decays of beauty baryons with J p =1/2 2 and J p =3/2 2 into charmed ones within the Quark Confinement Model is reported. Weak form factors and decay rates are calculated. Also the heavy quark limit m Q →∞ (Isgur-Wise symmetry) is examined. The weak heavy-baryon form factors in the Isgur-Wise limit and 1/m Q -corrections to them are computered. The Ademollo-Gatto theorem is spin-flavour symmetry of heavy quarks is checked. 33 refs.; 1 fig.; 9 tabs

  4. Weak interactions at high energies. [Lectures, review

    Energy Technology Data Exchange (ETDEWEB)

    Ellis, J.

    1978-08-01

    Review lectures are presented on the phenomenological implications of the modern spontaneously broken gauge theories of the weak and electromagnetic interactions, and some observations are made about which high energy experiments probe what aspects of gauge theories. Basic quantum chromodynamics phenomenology is covered including momentum dependent effective quark distributions, the transverse momentum cutoff, search for gluons as sources of hadron jets, the status and prospects for the spectroscopy of fundamental fermions and how fermions may be used to probe aspects of the weak and electromagnetic gauge theory, studies of intermediate vector bosons, and miscellaneous possibilities suggested by gauge theories from the Higgs bosons to speculations about proton decay. 187 references. (JFP)

  5. Shock waves in weakly compressed granular media.

    Science.gov (United States)

    van den Wildenberg, Siet; van Loo, Rogier; van Hecke, Martin

    2013-11-22

    We experimentally probe nonlinear wave propagation in weakly compressed granular media and observe a crossover from quasilinear sound waves at low impact to shock waves at high impact. We show that this crossover impact grows with the confining pressure P0, whereas the shock wave speed is independent of P0-two hallmarks of granular shocks predicted recently. The shocks exhibit surprising power law attenuation, which we model with a logarithmic law implying that shock dissipation is weak and qualitatively different from other granular dissipation mechanisms. We show that elastic and potential energy balance in the leading part of the shocks.

  6. Categorization of States Beyond Strong and Weak

    Directory of Open Access Journals (Sweden)

    Peter Tikuisis

    2017-09-01

    Full Text Available The discourse on poor state performers has suffered from widely varying definitions on what distinguishes certain weak states from others. Indices that rank states from strong to weak conceal important distinctions that can adversely affect intervention policy. This deficiency is addressed by grouping states according to their performance on three dimensions of statehood: authority, legitimacy, and capacity. The resultant categorization identifies brittle states that are susceptible to regime change, impoverished states often considered as aid darlings, and fragile states that experience disproportionately high levels of violent internal conflict. It also provides a quantifiable means to analyze transitions from one state type to another for more insightful intervention policy.

  7. Theoretical status of weak and electromagnetic interactions

    Energy Technology Data Exchange (ETDEWEB)

    Pandit, L. K.

    1980-07-01

    An extended simple version of the Weinberg gauge model is proposed to bring together weak and electromagnetic interactions under one theory. The essential features of the standard SU/sub 2/ (operating on)U/sub 1/ gauge scheme with four leptons and four quark flavours is recalled. Charged-current and neutral current interactions are described. Non-leptonic decays of strange particles are studied. The treatment is extended to 6-leptons and 6-quark flavours. The short comings of this model are discussed. Speculations on the unification of strong, weak and electromagnetic interactions are made.

  8. CPT non-invariance and weak interactions

    International Nuclear Information System (INIS)

    Hsu, J.P.

    1973-01-01

    In this talk, I will describe a possible violation of CPT invariance in the domain of weak interactions. One can construct a model of weak interactions which, in order to be consistent with all experimental data, must violate CPT maximally. The model predicts many specific results for decay processes which could be tested in the planned neutral hyperon beam or neutrino beam at NAL. The motivations and the physical idea in the model are explained and the implications of the model are discussed. (U.S.)

  9. Exploiting for medical and biological applications

    Science.gov (United States)

    Giano, Michael C.

    Biotherapeutics are an emerging class of drug composed of molecules ranging in sizes from peptides to large proteins. Due to their poor stability and mucosal membrane permeability, biotherapeutics are administered by a parenteral method (i.e., syringe, intravenous or intramuscular). Therapeutics delivered systemically often experience short half-lives. While, local administration may involve invasive surgical procedures and suffer from poor retention at the site of application. To compensate, the patient receives frequent doses of highly concentrated therapeutic. Unfortunately, the off-target side effects and discomfort associated with multiple injections results in poor patient compliance. Therefore, new delivery methods which can improve therapeutic retention, reduce the frequency of administration and may aid in decreasing the off-target side effects is a necessity. Hydrogels are a class of biomaterials that are gaining interests for tissue engineering and drug delivery applications. Hydrogel materials are defined as porous, 3-dimensional networks that are primarily composed of water. Generally, they are mechanically rigid, cytocompatible and easily chemically functionalized. Collectively, these properties make hydrogels fantastic candidates to perform as drug delivery depots. Current hydrogel delivery systems physically entrap the target therapeutic which is then subsequently released over time at the site of administration. The swelling and degradation of the material effect the diffusion of the therapy from the hydrogel, and therefore should be controlled. Although these strategies provide some regulation over therapeutic release, full control of the delivery is not achieved. Newer approaches are focused on designing hydrogels that exploit known interactions, covalently attach the therapy or respond to an external stimulus in an effort to gain improved control over the therapy's release. Unfortunately, the biotherapeutic is typically required to be chemically

  10. Exploiting big data for critical care research.

    Science.gov (United States)

    Docherty, Annemarie B; Lone, Nazir I

    2015-10-01

    Over recent years the digitalization, collection and storage of vast quantities of data, in combination with advances in data science, has opened up a new era of big data. In this review, we define big data, identify examples of critical care research using big data, discuss the limitations and ethical concerns of using these large datasets and finally consider scope for future research. Big data refers to datasets whose size, complexity and dynamic nature are beyond the scope of traditional data collection and analysis methods. The potential benefits to critical care are significant, with faster progress in improving health and better value for money. Although not replacing clinical trials, big data can improve their design and advance the field of precision medicine. However, there are limitations to analysing big data using observational methods. In addition, there are ethical concerns regarding maintaining confidentiality of patients who contribute to these datasets. Big data have the potential to improve medical care and reduce costs, both by individualizing medicine, and bringing together multiple sources of data about individual patients. As big data become increasingly mainstream, it will be important to maintain public confidence by safeguarding data security, governance and confidentiality.

  11. Attending Weak Signals: The Prevention of Work-related Illnesses

    Directory of Open Access Journals (Sweden)

    Roy Liff

    2017-06-01

    Full Text Available This article examines the characteristics of communication among managers, human resource (HR experts, and occupational health care specialists, as they deal with such informal information as weak signals in the prevention of work-related illnesses, using a theoretical framework in which the prevention of work-related illness is analogous to theory on crisis management. This is a qualitative study in which individual and focus-group interviews were conducted in a Swedish context with occupational health care specialists, managers, and HR experts. The results suggest that organizational solutions have failed and continue to fail at controlling workers’ health problems, although the main difficulty is not in identifying the ‘right’ individually oriented weak signals. Rather, it is upper management’s reliance on formal information (e.g., statistics and surveys – because of the difficulty in supplementing it with informal information (e.g., rumors and gossip – that makes it difficult to improve traditional health and safety work

  12. Inferring 'weak spots' in phylogenetic trees: application to mosasauroid nomenclature.

    Science.gov (United States)

    Madzia, Daniel; Cau, Andrea

    2017-01-01

    Mosasauroid squamates represented the apex predators within the Late Cretaceous marine and occasionally also freshwater ecosystems. Proper understanding of the origin of their ecological adaptations or paleobiogeographic dispersals requires adequate knowledge of their phylogeny. The studies assessing the position of mosasauroids on the squamate evolutionary tree and their origins have long given conflicting results. The phylogenetic relationships within Mosasauroidea, however, have experienced only little changes throughout the last decades. Considering the substantial improvements in the development of phylogenetic methodology that have undergone in recent years, resulting, among others, in numerous alterations in the phylogenetic hypotheses of other fossil amniotes, we test the robustness in our understanding of mosasauroid beginnings and their evolutionary history. We re-examined a data set that results from modifications assembled in the course of the last 20 years and performed multiple parsimony analyses and Bayesian tip-dating analysis. Following the inferred topologies and the 'weak spots' in the phylogeny of mosasauroids, we revise the nomenclature of the 'traditionally' recognized mosasauroid clades, to acknowledge the overall weakness among branches and the alternative topologies suggested previously, and discuss several factors that might have an impact on the differing phylogenetic hypotheses and their statistical support.

  13. Early Sexual Exploitation as an Influence in Prostitution.

    Science.gov (United States)

    Silbert, Mimi H.; Pines, Ayala M.

    1983-01-01

    Surveyed 200 female street prostitutes to determine whether they were sexually exploited during childhood. Results showed 60 percent of the subjects were sexually exploited. The few girls who discussed their abuse with others were met with shame and most often inaction. Only 10 percent were abused by strangers. (JAC)

  14. A Descriptive Study on Sexually Exploited Children in Residential Treatment

    Science.gov (United States)

    Twill, Sarah E.; Green, Denise M.; Traylor, Amy

    2010-01-01

    Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis,…

  15. Exploiting opportunities at all cost? Entrepreneurial intent and externalities

    NARCIS (Netherlands)

    Urbig, D.; Weitzel, G.U.; Rosenkranz, S.; van Witteloostuijn, A.

    2011-01-01

    they exploit welfare-enhancing opportunities as it is assumed in several normative models? Do we need to prevent potential entrepreneurs from being destructive or are there intrinsic limits to harm others? We experimentally investigate how people with different entrepreneurial intent exploit risky

  16. Exploitation program of ''Adamow'' quarry up to 2015

    International Nuclear Information System (INIS)

    Hadlaw, A.

    1994-01-01

    The brown coal deposits exploited by the quarry ''Adamow'' located in Central Poland are shortly described and the prognosis of their exploitation up to 2015 is given. The basis data on the perspective deposits in the quarry's area are also presented. All deposits are shown on the map. 3 ills, 2 tabs

  17. Panel discussion on exploitation of geothermal resources in thermal zones

    Energy Technology Data Exchange (ETDEWEB)

    Viramonte, J G; Mange, J; Stefani, G

    1978-03-01

    The topics discussed include the major known geothermal resources, varying ways of exploiting geothermal resources, technical and economic difficulties in the exploitation, the place of geothermal energy in the total energy policy of a given country, advanced exploration techniques, and indications of needed areas of study. The panelists represented most of the South American countries, Mexico, and Italy. (JSR)

  18. A weak balance: the contribution of muscle weakness to postural instability and falls.

    NARCIS (Netherlands)

    Horlings, G.C.; Engelen, B.G.M. van; Allum, J.H.J.; Bloem, B.R.

    2008-01-01

    Muscle strength is a potentially important factor contributing to postural control. In this article, we consider the influence of muscle weakness on postural instability and falling. We searched the literature for research evaluating muscle weakness as a risk factor for falls in community-dwelling

  19. Tobacco industry misappropriation of American Indian culture and traditional tobacco.

    Science.gov (United States)

    D'Silva, Joanne; O'Gara, Erin; Villaluz, Nicole T

    2018-02-19

    Describe the extent to which tobacco industry marketing tactics incorporated American Indian culture and traditional tobacco. A keyword search of industry documents was conducted using document archives from the Truth Tobacco Documents Library. Tobacco industry documents (n=76) were analysed for themes. Tobacco industry marketing tactics have incorporated American Indian culture and traditional tobacco since at least the 1930s, with these tactics prominently highlighted during the 1990s with Natural American Spirit cigarettes. Documents revealed the use of American Indian imagery such as traditional headdresses and other cultural symbols in product branding and the portrayal of harmful stereotypes of Native people in advertising. The historical and cultural significance of traditional tobacco was used to validate commercially available tobacco. The tobacco industry has misappropriated culture and traditional tobacco by misrepresenting American Indian traditions, values and beliefs to market and sell their products for profit. Findings underscore the need for ongoing monitoring of tobacco industry marketing tactics directed at exploiting Native culture and counter-marketing tactics that raise awareness about the distinction between commercial and traditional tobacco use. Such efforts should be embedded within a culturally sensitive framework to reduce the burden of commercial tobacco use. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  20. [Ecotourism exploitation model in Bita Lake Natural Reserve of Yunnan].

    Science.gov (United States)

    Yang, G; Wang, Y; Zhong, L

    2000-12-01

    Bita lake provincial natural reserve is located in Shangri-La region of North-western Yunnan, and was set as a demonstrating area for ecotourism exploitation in 1998. After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists, it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism, i.e., tourism, protection, poverty clearing and environment education. Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model, local Tibetan family reception model and environmental monitoring model, were also successful, which were demonstrated and spreaded to the whole province. Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.

  1. Fingerprinting dark energy. II. Weak lensing and galaxy clustering tests

    International Nuclear Information System (INIS)

    Sapone, Domenico; Kunz, Martin; Amendola, Luca

    2010-01-01

    The characterization of dark energy is a central task of cosmology. To go beyond a cosmological constant, we need to introduce at least an equation of state and a sound speed and consider observational tests that involve perturbations. If dark energy is not completely homogeneous on observable scales, then the Poisson equation is modified and dark matter clustering is directly affected. One can then search for observational effects of dark energy clustering using dark matter as a probe. In this paper we exploit an analytical approximate solution of the perturbation equations in a general dark energy cosmology to analyze the performance of next-decade large-scale surveys in constraining equation of state and sound speed. We find that tomographic weak lensing and galaxy redshift surveys can constrain the sound speed of the dark energy only if the latter is small, of the order of c s < or approx. 0.01 (in units of c). For larger sound speeds the error grows to 100% and more. We conclude that large-scale structure observations contain very little information about the perturbations in canonical scalar field models with a sound speed of unity. Nevertheless, they are able to detect the presence of cold dark energy, i.e. a dark energy with nonrelativistic speed of sound.

  2. Weakly nonlocal symplectic structures, Whitham method and weakly nonlocal symplectic structures of hydrodynamic type

    International Nuclear Information System (INIS)

    Maltsev, A Ya

    2005-01-01

    We consider the special type of field-theoretical symplectic structures called weakly nonlocal. The structures of this type are, in particular, very common for integrable systems such as KdV or NLS. We introduce here the special class of weakly nonlocal symplectic structures which we call weakly nonlocal symplectic structures of hydrodynamic type. We investigate then the connection of such structures with the Whitham averaging method and propose the procedure of 'averaging' the weakly nonlocal symplectic structures. The averaging procedure gives the weakly nonlocal symplectic structure of hydrodynamic type for the corresponding Whitham system. The procedure also gives 'action variables' corresponding to the wave numbers of m-phase solutions of the initial system which give the additional conservation laws for the Whitham system

  3. Weak organic acid stress in Bacillus subtilis

    NARCIS (Netherlands)

    ter Beek, A.S.

    2009-01-01

    Weak organic acids are commonly used food preservatives that protect food products from bacterial contamination. A variety of spore-forming bacterial species pose a serious problem to the food industry by causing extensive food spoilage or even food poisoning. Understanding the mechanisms of

  4. Common Fixed Points for Weakly Compatible Maps

    Indian Academy of Sciences (India)

    The purpose of this paper is to prove a common fixed point theorem, from the class of compatible continuous maps to a larger class of maps having weakly compatible maps without appeal to continuity, which generalized the results of Jungck [3], Fisher [1], Kang and Kim [8], Jachymski [2], and Rhoades [9].

  5. Weak MSO: automata and expressiveness modulo bisimilarity

    NARCIS (Netherlands)

    Carreiro, F.; Facchini, A.; Venema, Y.; Zanasi, F.

    2014-01-01

    We prove that the bisimulation-invariant fragment of weak monadic second-order logic (WMSO) is equivalent to the fragment of the modal μ-calculus where the application of the least fixpoint operator μp.φ is restricted to formulas φ that are continuous in p. Our proof is automata-theoretic in nature;

  6. Weak lensing probes of modified gravity

    International Nuclear Information System (INIS)

    Schmidt, Fabian

    2008-01-01

    We study the effect of modifications to general relativity on large-scale weak lensing observables. In particular, we consider three modified gravity scenarios: f(R) gravity, the Dvali-Gabadadze-Porrati model, and tensor-vector-scalar theory. Weak lensing is sensitive to the growth of structure and the relation between matter and gravitational potentials, both of which will in general be affected by modified gravity. Restricting ourselves to linear scales, we compare the predictions for galaxy-shear and shear-shear correlations of each modified gravity cosmology to those of an effective dark energy cosmology with the same expansion history. In this way, the effects of modified gravity on the growth of perturbations are separated from the expansion history. We also propose a test which isolates the matter-potential relation from the growth factor and matter power spectrum. For all three modified gravity models, the predictions for galaxy and shear correlations will be discernible from those of dark energy with very high significance in future weak lensing surveys. Furthermore, each model predicts a measurably distinct scale dependence and redshift evolution of galaxy and shear correlations, which can be traced back to the physical foundations of each model. We show that the signal-to-noise for detecting signatures of modified gravity is much higher for weak lensing observables as compared to the integrated Sachs-Wolfe effect, measured via the galaxy-cosmic microwave background cross-correlation.

  7. Weak contractions via $\\lambda$-sequences

    OpenAIRE

    Agyingi, Collins Amburo; Gaba, Yaé Ulrich

    2018-01-01

    In this note, we discuss common fixed point for a family of self mapping defined on a metric type space and satisfying a weakly contractive condition. In our development, we make use of the $\\lambda$-sequence approach and also of a certain class of real valued maps. We derive some implications for self-mappings on quasi-pseudometric type spaces.

  8. Reducing Weak to Strong Bisimilarity in CCP

    Directory of Open Access Journals (Sweden)

    Andrés Aristizábal

    2012-12-01

    Full Text Available Concurrent constraint programming (ccp is a well-established model for concurrency that singles out the fundamental aspects of asynchronous systems whose agents (or processes evolve by posting and querying (partial information in a global medium. Bisimilarity is a standard behavioural equivalence in concurrency theory. However, only recently a well-behaved notion of bisimilarity for ccp, and a ccp partition refinement algorithm for deciding the strong version of this equivalence have been proposed. Weak bisimiliarity is a central behavioural equivalence in process calculi and it is obtained from the strong case by taking into account only the actions that are observable in the system. Typically, the standard partition refinement can also be used for deciding weak bisimilarity simply by using Milner's reduction from weak to strong bisimilarity; a technique referred to as saturation. In this paper we demonstrate that, because of its involved labeled transitions, the above-mentioned saturation technique does not work for ccp. We give an alternative reduction from weak ccp bisimilarity to the strong one that allows us to use the ccp partition refinement algorithm for deciding this equivalence.

  9. Weak radiative baryonic decays of B mesons

    International Nuclear Information System (INIS)

    Kohara, Yoji

    2004-01-01

    Weak radiative baryonic B decays B→B 1 B 2 -barγ are studied under the assumption of the short-distance b→sγ electromagnetic penguin transition dominance. The relations among the decay rates of various decay modes are derived

  10. Weak NNM couplings and nuclear parity violation

    International Nuclear Information System (INIS)

    Holstein, B.R.

    1987-01-01

    After many years of careful theoretical and experimental study of nuclear parity violation, rough empirical values for weak parity violation nucleon-nucleon-meson vertices have been deduced. We address some of the physics which has been learned from this effort and show that it has implications for work going on outside this field. (author)

  11. Weak universality in inhomogeneous Ising quantum chains

    International Nuclear Information System (INIS)

    Karevski, Dragi

    2006-01-01

    The Ising quantum chain with arbitrary coupling distribution {λ i } leading to an anisotropic scaling is considered. The smallest gap of the chain is connected to the surface magnetization by the relation Λ 1 = m s ({λ i })m s ({λ -1 i }). For some aperiodic distribution {λ i }, a weak universality of the critical behaviour is found. (letter to the editor)

  12. Broken color symmetry and weak currents

    International Nuclear Information System (INIS)

    Stech, B.

    1976-01-01

    Broken colour symmetry predicts a very rich spectrum of new particles. If broken colour is relevant at all, charged psi-particles should be found in particular at the 4 GeV region. For the weak hadronic currents no completely satisfactory suggestion exists. Broken colour symmetry describes qualitatively several of the new effects observed recently. (BJ) [de

  13. Solitons and Weakly Nonlinear Waves in Plasmas

    DEFF Research Database (Denmark)

    Pécseli, Hans

    1985-01-01

    Theoretical descriptions of solitons and weakly nonlinear waves propagating in plasma media are reviewed, with particular attention to the Korteweg-de Vries (KDV) equation and the Nonlinear Schrödinger equation (NLS). The modifications of these basic equations due to the effects of resonant...

  14. Efficient bootstrap with weakly dependent processes

    NARCIS (Netherlands)

    Bravo, Francesco; Crudu, Federico

    The efficient bootstrap methodology is developed for overidentified moment conditions models with weakly dependent observation. The resulting bootstrap procedure is shown to be asymptotically valid and can be used to approximate the distributions of t-statistics, the J-statistic for overidentifying

  15. Weak equivalence classes of complex vector bundles

    Czech Academy of Sciences Publication Activity Database

    Le, Hong-Van

    LXXVII, č. 1 (2008), s. 23-30 ISSN 0862-9544 R&D Projects: GA AV ČR IAA100190701 Institutional research plan: CEZ:AV0Z10190503 Keywords : chern classes * complex Grassmannians weak equivalence Subject RIV: BA - General Mathematics

  16. Gauge theories of the weak interactions

    International Nuclear Information System (INIS)

    Quinn, H.

    1978-08-01

    Two lectures are presented on the Weinberg--Salam--Glashow--Iliopoulos--Maiani gauge theory for weak interactions. An attempt is made to give some impressions of the generality of this model, how it was developed, variations found in the literature, and the status of the standard model. 21 references

  17. Electric properties of weakly nonideal plasmas

    Energy Technology Data Exchange (ETDEWEB)

    Guenther, K; Radtke, R

    1984-01-01

    The progress in theory as well as in diagnostics and measurement during the last fifteen years is reviewed. Starting from the transport theory of ideal plasmas physically justified corrections are introduced which allow the quantitative calculation of the transport properties of weakly nonideal plasmas. Essential coefficients and numerical data of the electrical conductivity for plasmas of technical importance are given in tables and diagrams.

  18. Localization on weakly disordered Cayley tree

    International Nuclear Information System (INIS)

    Brezini, A.; Olivier, G.

    1980-08-01

    The localization model of Kumar et al. is critically re-examined for the approximation γ → 0, which describes weak disorder. By using an improved method of approximation, we have studied the displacement of the band and the mobility edges and compared the result of Kumar et al. and Abou-Chacra et al. in the light of the present approximation. (author)

  19. Studying dark matter haloes with weak lensing

    NARCIS (Netherlands)

    Velander, Malin Barbro Margareta

    2012-01-01

    Our Universe is comprised not only of normal matter but also of unknown components: dark matter and dark energy. This Thesis recounts studies of dark matter haloes, using a technique known as weak gravitational lensing, in order to learn more about the nature of these dark components. The haloes

  20. Completely continuous and weakly completely continuous abstract ...

    Indian Academy of Sciences (India)

    An algebra A is called right completely continuous (right weakly completely continuous) ... Moreover, some applications of these results in group algebras are .... A linear subspace S(G) of L1(G) is said to be a Segal algebra, if it satisfies the.

  1. Collisional properties of weakly bound heteronuclear dimers

    NARCIS (Netherlands)

    Marcelis, B.; Kokkelmans, S.J.J.M.F.; Shlyapnikov, G.V.; Petrov, D.S.

    2008-01-01

    We consider collisional properties of weakly bound heteronuclear molecules (dimers) formed in a two-species mixture of atoms with a large mass difference. We focus on dimers containing light fermionic atoms as they manifest collisional stability due to an effective dimer-dimer repulsion originating

  2. Quantum mechanical calculations on weakly interacting complexes

    NARCIS (Netherlands)

    Heijmen, T.G.A.

    1998-01-01

    Symmetry-adapted perturbation theory (SAPT) has been applied to compute the intermolecular potential energy surfaces and the interaction-induced electrical properties of weakly interacting complexes. Asymptotic (large R) expressions have been derived for the contributions to the collision-induced

  3. Weak-interaction rates in stellar conditions

    Science.gov (United States)

    Sarriguren, Pedro

    2018-05-01

    Weak-interaction rates, including β-decay and electron captures, are studied in several mass regions at various densities and temperatures of astrophysical interest. In particular, we study odd-A nuclei in the pf-shell region, which are involved in presupernova formations. Weak rates are relevant to understand the late stages of the stellar evolution, as well as the nucleosynthesis of heavy nuclei. The nuclear structure involved in the weak processes is studied within a quasiparticle proton-neutron random-phase approximation with residual interactions in both particle-hole and particle-particle channels on top of a deformed Skyrme Hartree-Fock mean field with pairing correlations. First, the energy distributions of the Gamow-Teller strength are discussed and compared with the available experimental information, measured under terrestrial conditions from charge-exchange reactions. Then, the sensitivity of the weak-interaction rates to both astrophysical densities and temperatures is studied. Special attention is paid to the relative contribution to these rates of thermally populated excited states in the decaying nucleus and to the electron captures from the degenerate electron plasma.

  4. Black holes and the weak cosmic censorship

    International Nuclear Information System (INIS)

    Krolak, A.

    1984-01-01

    A theory of black holes is developed under the assumption of the weak cosmic censorship. It includes Hawking's theory of black holes in the future asymptotically predictable space-times as a special case but it also applies to the cosmological situations including models with nonzero cosmological constant of both signs. (author)

  5. How weak is the subduction zone interface?

    NARCIS (Netherlands)

    Duarte, João C.; Schellart, Wouter P.; Cruden, Alexander R.

    2015-01-01

    Several lines of evidence suggest that subduction zones are weak and that the unique availability of water on Earth is a critical factor in the weakening process. We have evaluated the strength of subduction zone interfaces using two approaches: (i) from empirical relationships between shear stress

  6. Typical horticultural products between tradition and innovation

    Directory of Open Access Journals (Sweden)

    Innocenza Chessa

    Full Text Available Recent EU and National policies for agriculture and rural development are mainly focused to foster the production of high quality products as a result of the increasing demand of food safety, typical foods and traditional processing methods. Another word very often used to describe foods in these days is “typicality” which pools together the concepts of “food connected with a specific place”, “historical memory and tradition” and “culture”. The importance for the EU and the National administrations of the above mentioned kind of food is demonstrated, among other things, by the high number of the PDO, PGI and TSG certificated products in Italy. In this period of global markets and economical crisis farmers are realizing how “typical products” can be an opportunity to maintain their market share and to improve the economy of local areas. At the same time, new tools and strategy are needed to reach these goals. A lack of knowledge has being recognized also on how new technologies and results coming from recent research can help in exploiting traditional product and in maintaining the biodiversity. Taking into account the great variety and richness of typical products, landscapes and biodiversity, this report will describe and analyze the relationships among typicality, innovation and research in horticulture. At the beginning “typicality” and “innovation” will be defined also through some statistical features, which ranks Italy at the first place in terms of number of typical labelled products, then will be highlighted how typical products of high quality and connected with the tradition and culture of specific production areas are in a strict relationship with the value of agro-biodiversity. Several different examples will be used to explain different successful methods and/or strategies used to exploit and foster typical Italian vegetables, fruits and flowers. Finally, as a conclusion, since it is thought that

  7. Traditional Medicine in Developing Countries

    DEFF Research Database (Denmark)

    Thorsen, Rikke Stamp

    or spiritual healer and self-treatment with herbal medicine or medicinal plants. Reliance on traditional medicine varies between countries and rural and urban areas, but is reported to be as high as 80% in some developing countries. Increased realization of the continued importance of traditional medicine has......People use traditional medicine to meet their health care needs in developing countries and medical pluralism persists worldwide despite increased access to allopathic medicine. Traditional medicine includes a variety of treatment opportunities, among others, consultation with a traditional healer...... led to the formulation of policies on the integration of traditional medicine into public health care. Local level integration is already taking place as people use multiple treatments when experiencing illness. Research on local level use of traditional medicine for health care, in particular the use...

  8. SWOT analysis and revelation in traditional Chinese medicine internationalization.

    Science.gov (United States)

    Tang, Haitao; Huang, Wenlong; Ma, Jimei; Liu, Li

    2018-01-01

    Traditional Chinese medicine (TCM) is currently the best-preserved and most influential traditional medical system with the largest number of users worldwide. In recent years, the trend of TCM adoption has increased greatly, but the process of TCM internationalization has suffered from a series of setbacks for both internal and external reasons. Thus, the process of TCM internationalization faces formidable challenges, although it also has favourable opportunities. Using SWOT analysis, this paper investigates the strengths, weaknesses, opportunities and threats for TCM. These findings can serve as references for TCM enterprises with global ambitions.

  9. Facilities upgrade for natural forces: traditional vs. realistic approach

    International Nuclear Information System (INIS)

    Terkun, V.

    1985-01-01

    The traditional method utilized for upgrading existing buildings and equipment involves the following steps: performs structural study using finite element analysis and some in situ testing; compare predicted member forces/stresses to material code allowables; determine strengthening schemes for those structural members judged to be weak; estimate cost for required upgrades. This approach will result in structural modifications that are not only conservative but very expensive as well. The realistic structural evaluation approach uses traditional data to predict structural weaknesses as a final step. Next, using considerable information now available for buildings and equipment exposed to natural hazards, engineering judgments about structures being evaluated can be made with a great deal of confidence. This approach does not eliminate conservatism entirely, but it does reduce it to a reasonable and realistic level. As a result, the upgrade cost goes down without compromising the low risk necessary for vital facilities

  10. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  11. Compatibility between weak gel and microorganisms in weak gel-assisted microbial enhanced oil recovery.

    Science.gov (United States)

    Qi, Yi-Bin; Zheng, Cheng-Gang; Lv, Cheng-Yuan; Lun, Zeng-Min; Ma, Tao

    2018-03-20

    To investigate weak gel-assisted microbial flooding in Block Wang Long Zhuang in the Jiangsu Oilfield, the compatibility of weak gel and microbe was evaluated using laboratory experiments. Bacillus sp. W5 was isolated from the formation water in Block Wang Long Zhuang. The rate of oil degradation reached 178 mg/day, and the rate of viscosity reduction reached 75.3%. Strain W5 could produce lipopeptide with a yield of 1254 mg/L. Emulsified crude oil was dispersed in the microbial degradation system, and the average diameter of the emulsified oil particles was 18.54 μm. Bacillus sp. W5 did not affect the rheological properties of the weak gel, and the presence of the weak gel did not significantly affect bacterial reproduction (as indicated by an unchanged microbial biomass), emulsification (surface tension is 35.56 mN/m and average oil particles size is 21.38 μm), oil degradation (162 mg/day) and oil viscosity reduction (72.7%). Core-flooding experiments indicated oil recovery of 23.6% when both weak gel and Bacillus sp. W5 were injected into the system, 14.76% when only the weak gel was injected, and 9.78% with strain W5 was injected without the weak gel. The results demonstrate good compatibility between strains W5 and the weak gel and highlight the application potential of weak gel-assisted microbial flooding. Copyright © 2018 The Society for Biotechnology, Japan. Published by Elsevier B.V. All rights reserved.

  12. On Roof Geometry for Urban Wind Energy Exploitation in High-Rise Buildings

    Directory of Open Access Journals (Sweden)

    Francisco Toja-Silva

    2015-06-01

    Full Text Available The European program HORIZON2020 aims to have 20% of electricity produced by renewable sources. The building sector represents 40% of the European Union energy consumption. Reducing energy consumption in buildings is therefore a priority for energy efficiency. The present investigation explores the most adequate roof shapes compatible with the placement of different types of small wind energy generators on high-rise buildings for urban wind energy exploitation. The wind flow around traditional state-of-the-art roof shapes is considered. In addition, the influence of the roof edge on the wind flow on high-rise buildings is analyzed. These geometries are investigated, both qualitatively and quantitatively, and the turbulence intensity threshold for horizontal axis wind turbines is considered. The most adequate shapes for wind energy exploitation are identified, studying vertical profiles of velocity, turbulent kinetic energy and turbulence intensity. Curved shapes are the most interesting building roof shapes from the wind energy exploitation point of view, leading to the highest speed-up and the lowest turbulence intensity.

  13. Self-Similarity Based Corresponding-Point Extraction from Weakly Textured Stereo Pairs

    Directory of Open Access Journals (Sweden)

    Min Mao

    2014-01-01

    Full Text Available For the areas of low textured in image pairs, there is nearly no point that can be detected by traditional methods. The information in these areas will not be extracted by classical interest-point detectors. In this paper, a novel weakly textured point detection method is presented. The points with weakly textured characteristic are detected by the symmetry concept. The proposed approach considers the gray variability of the weakly textured local regions. The detection mechanism can be separated into three steps: region-similarity computation, candidate point searching, and refinement of weakly textured point set. The mechanism of radius scale selection and texture strength conception are used in the second step and the third step, respectively. The matching algorithm based on sparse representation (SRM is used for matching the detected points in different images. The results obtained on image sets with different objects show high robustness of the method to background and intraclass variations as well as to different photometric and geometric transformations; the points detected by this method are also the complement of points detected by classical detectors from the literature. And we also verify the efficacy of SRM by comparing with classical algorithms under the occlusion and corruption situations for matching the weakly textured points. Experiments demonstrate the effectiveness of the proposed weakly textured point detection algorithm.

  14. The Hausa Lexicographic Tradition

    Directory of Open Access Journals (Sweden)

    Roxana Ma Newman

    2011-10-01

    Full Text Available

    Abstract: Hausa, a major language of West Africa, is one of the most widely studied languagesof Sub-Saharan Africa. It has a rich lexicographic tradition dating back some two centuries. Sincethe first major vocabulary published in 1843 up to the present time, almost 60 lexicographic works— dictionaries, vocabularies, glossaries — have been published, in a range of metalanguages, fromEnglish to Hausa itself. This article traces the historical development of the major studies accordingto their type and function as general reference works, specialized works, pedagogical works, andterminological works. For each work, there is a general discussion of its size, accuracy of the phonological,lexical, and grammatical information, and the adequacy of its definitions and illustrativematerial. A complete list of the lexicographic works is included.

    Keywords: ARABIC, BILINGUAL LEXICOGRAPHY, DIALECTAL VARIANTS, DICTIONARIES,ENGLISH, ETYMOLOGIES, FRENCH, GERMAN, GLOSSARIES, GRAMMATICALCATEGORIES, HAUSA, LANGUAGE LEARNING, LOANWORDS, NEOLOGISMS, NIGER,NIGERIA, ORTHOGRAPHY, PHONETIC TRANSCRIPTION, PHONOLOGY, RUSSIAN, STANDARDDIALECT, STANDARDIZATION, TERMINOLOGY, VOCABULARIES, WEST AFRICA.

    Opsomming: Die leksikografiese tradisie in Hausa. Hausa, 'n belangrike taal vanWes-Afrika, is een van die tale van Afrika suid van die Sahara wat die wydste bestudeer word. Dithet 'n ryk leksikografiese tradisie wat ongeveer twee eeue oud is. Van die eerste groot woordeboekwat in 1843 gepubliseer is tot die hede is ongeveer 60 leksikografiese werke — woordeboeke,naamlyste, woordelyste — gepubliseer in 'n reeks metatale van Engels tot Hausa self. Hierdie artikelgaan die historiese ontwikkeling van die groter studies aan die hand van hulle tipe en funksieas algemene naslaanwerke, gespesialiseerde werke, opvoedkundige werke, en terminologiesewerke na. Vir elke werk is daar 'n algemene bespreking oor sy grootte, akkuraatheid van die fonologiese,leksikale en

  15. Rationalising predictors of child sexual exploitation and sex-trading.

    Science.gov (United States)

    Klatt, Thimna; Cavner, Della; Egan, Vincent

    2014-02-01

    Although there is evidence for specific risk factors leading to child sexual exploitation and prostitution, these influences overlap and have rarely been examined concurrently. The present study examined case files for 175 young persons who attended a voluntary organization in Leicester, United Kingdom, which supports people who are sexually exploited or at risk of sexual exploitation. Based on the case files, the presence or absence of known risk factors for becoming a sex worker was coded. Data were analyzed using t-test, logistic regression, and smallest space analysis. Users of the voluntary organization's services who had been sexually exploited exhibited a significantly greater number of risk factors than service users who had not been victims of sexual exploitation. The logistic regression produced a significant model fit. However, of the 14 potential predictors--many of which were associated with each other--only four variables significantly predicted actual sexual exploitation: running away, poverty, drug and/or alcohol use, and having friends or family members in prostitution. Surprisingly, running away was found to significantly decrease the odds of becoming involved in sexual exploitation. Smallest space analysis of the data revealed 5 clusters of risk factors. Two of the clusters, which reflected a desperation and need construct and immature or out-of-control lifestyles, were significantly associated with sexual exploitation. Our research suggests that some risk factors (e.g. physical and emotional abuse, early delinquency, and homelessness) for becoming involved in sexual exploitation are common but are part of the problematic milieu of the individuals affected and not directly associated with sex trading itself. Our results also indicate that it is important to engage with the families and associates of young persons at risk of becoming (or remaining) a sex worker if one wants to reduce the numbers of persons who engage in this activity. Copyright

  16. Thermodynamic identities and particle number fluctuations in weakly interacting Bose-Einstein condensates

    Energy Technology Data Exchange (ETDEWEB)

    Illuminati, Fabrizio [Institut fuer Physik, Universitaet Potsdam, Am Neuen Palais 10, D-14415, Potsdam (Germany); Dipartimento di Fisica, Universita di Salerno, and INFM, Unita di Salerno, I-84081 Baronissi SA (Italy); Navez, Patrick [Institut fuer Physik, Universitaet Potsdam, Am Neuen Palais 10, D-14415, Potsdam (Germany); Institute of Materials Science, Demokritos NCSR, POB 60228, 15310 Athens (Greece); Wilkens, Martin [Institut fuer Physik, Universitaet Potsdam, Am Neuen Palais 10, D-14415, Potsdam (Germany)

    1999-08-14

    We derive exact thermodynamic identities relating the average number of condensed atoms and the root-mean-square fluctuations determined in different statistical ensembles for the weakly interacting Bose gas confined in a box. This is achieved by introducing the concept of auxiliary partition functions for model Hamiltonians that do conserve the total number of particles. Exploiting such thermodynamic identities, we provide the first, completely analytical prediction of the microcanonical particle number fluctuations in the weakly interacting Bose gas. Such fluctuations, as a function of the volume V of the box are found to behave normally, in contrast with the anomalous scaling behaviour V{sup 4/3} of the fluctuations in the ideal Bose gas. (author). Letter-to-the-editor.

  17. Weak mixing below the weak scale in dark-matter direct detection

    Science.gov (United States)

    Brod, Joachim; Grinstein, Benjamin; Stamou, Emmanuel; Zupan, Jure

    2018-02-01

    If dark matter couples predominantly to the axial-vector currents with heavy quarks, the leading contribution to dark-matter scattering on nuclei is either due to one-loop weak corrections or due to the heavy-quark axial charges of the nucleons. We calculate the effects of Higgs and weak gauge-boson exchanges for dark matter coupling to heavy-quark axial-vector currents in an effective theory below the weak scale. By explicit computation, we show that the leading-logarithmic QCD corrections are important, and thus resum them to all orders using the renormalization group.

  18. Dark-Matter Particles without Weak-Scale Masses or Weak Interactions

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Kumar, Jason

    2008-01-01

    We propose that dark matter is composed of particles that naturally have the correct thermal relic density, but have neither weak-scale masses nor weak interactions. These models emerge naturally from gauge-mediated supersymmetry breaking, where they elegantly solve the dark-matter problem. The framework accommodates single or multiple component dark matter, dark-matter masses from 10 MeV to 10 TeV, and interaction strengths from gravitational to strong. These candidates enhance many direct and indirect signals relative to weakly interacting massive particles and have qualitatively new implications for dark-matter searches and cosmological implications for colliders

  19. Genotoxicity of extracts of Japanese traditional herbal medicines (Kampo)

    OpenAIRE

    Makoto, Katami; Haruo, Kuboniwa; Shunichi, Maemura; Toshihiko, Yanagisawa; New Drug Discovery Laboratory, R & D Division, TSUMURA & Co.; New Drug Discovery Laboratory, R & D Division, TSUMURA & Co.; New Drug Discovery Laboratory, R & D Division, TSUMURA & Co.; New Drug Discovery Laboratory, R & D Division, TSUMURA & Co.

    2002-01-01

    The possible genotoxicity potential of 128 Japanese traditional herbal medicines (Kampo) was investigated using a bacterial reverse mutation test (the Ames test), an in vivo micronucleus test (MN test) in mouse bone marrow cells and an unscheduled DNA synthesis test (UDS test) in rat hepatocytes. Of 128 Kampo extracts examined, 98 did not induce mutations in bacteria while 30 induced mutations weakly in Salmonella typhimurium TA1537. Extracts of Scutellariae Radix, a common herbal drug, and i...

  20. Meaning, function and methods of the recultivation in mining exploitation

    OpenAIRE

    Dambov, Risto; Ljatifi, Ejup

    2015-01-01

    With the exploitation of mineral resources is performed degradation and deformation of the relief and the general part of surface of the Earth's crust. Depending on the type of open pit mine, this degradation can be expressed to a lesser or greater extent, and sometimes in several square kilometers. The exploitation of mineral resources is with unbreakable link with the environment. Very often it is said that mining is „enemy No. 1“ for environment. With exploitation comes to degradation of h...

  1. The possibilities of exploitation of Serbian thermomineral waters

    International Nuclear Information System (INIS)

    Jovanovic, L.

    2002-01-01

    Global ecological problem of petrol resources deficit caused an intensive search of alternative energy sources. Deficit of conventional energy fluids in Yugoslavia requires serious efforts to create a program of alternative energy sources exploitation. Geothermal energy represents an important energetic source for the countries with poor energy resources. Geothermal energy can become the basis for economic development. At present these geothermal resources are not being exploited in Yugoslavia. The possibilities of effective exploitation of thermal and thermomineral water resources in Yugoslavia are presented in this paper

  2. Imouraren mining exploitation : Complementary studies Synthetic report Volum B - Mines

    International Nuclear Information System (INIS)

    1980-01-01

    The object of the current study is to determine the main technical characteristics of the reference project of a mine that can supply the necessary ore quantity at a production of 3000 tonnes uranium per year, along 10 years. The project is one of the possible solutions for exploiting the mine. The current study permits to establish : investment and functioning cost estimation, overall project of the mining exploitation program, necessary strength estimation, average ore grades evaluation and variations of these grades, utilities needs, production vizing program, main exploitation methods and necessary materials. Reference project study of the mine serves as base to the economics studies and studies optimization [fr

  3. Asymptotic theory of weakly dependent random processes

    CERN Document Server

    Rio, Emmanuel

    2017-01-01

    Presenting tools to aid understanding of asymptotic theory and weakly dependent processes, this book is devoted to inequalities and limit theorems for sequences of random variables that are strongly mixing in the sense of Rosenblatt, or absolutely regular. The first chapter introduces covariance inequalities under strong mixing or absolute regularity. These covariance inequalities are applied in Chapters 2, 3 and 4 to moment inequalities, rates of convergence in the strong law, and central limit theorems. Chapter 5 concerns coupling. In Chapter 6 new deviation inequalities and new moment inequalities for partial sums via the coupling lemmas of Chapter 5 are derived and applied to the bounded law of the iterated logarithm. Chapters 7 and 8 deal with the theory of empirical processes under weak dependence. Lastly, Chapter 9 describes links between ergodicity, return times and rates of mixing in the case of irreducible Markov chains. Each chapter ends with a set of exercises. The book is an updated and extended ...

  4. Nulling tomography with weak gravitational lensing

    International Nuclear Information System (INIS)

    Huterer, Dragan; White, Martin

    2005-01-01

    We explore several strategies of eliminating (or nulling) the small-scale information in weak lensing convergence power spectrum measurements in order to protect against undesirable effects, for example, the effects of baryonic cooling and pressure forces on the distribution of large-scale structures. We selectively throw out the small-scale information in the convergence power spectrum that is most sensitive to the unwanted bias, while trying to retain most of the sensitivity to cosmological parameters. The strategies are effective in the difficult but realistic situations when we are able to guess the form of the contaminating effect only approximately. However, we also find that the simplest scheme of simply not using information from the largest multipoles works about as well as the proposed techniques in most, although not all, realistic cases. We advocate further exploration of nulling techniques and believe that they will find important applications in the weak lensing data mining

  5. A dynamical weak scale from inflation

    Energy Technology Data Exchange (ETDEWEB)

    You, Tevong, E-mail: tty20@cam.ac.uk [DAMTP, University of Cambridge, Wilberforce Road, Cambridge, CB3 0WA (United Kingdom)

    2017-09-01

    Dynamical scanning of the Higgs mass by an axion-like particle during inflation may provide a cosmological component to explaining part of the hierarchy problem. We propose a novel interplay of this cosmological relaxation mechanism with inflation, whereby the backreaction of the Higgs vacuum expectation value near the weak scale causes inflation to end. As Hubble drops, the relaxion's dissipative friction increases relative to Hubble and slows it down enough to be trapped by the barriers of its periodic potential. Such a scenario raises the natural cut-off of the theory up to ∼ 10{sup 10} GeV, while maintaining a minimal relaxion sector without having to introduce additional scanning scalars or new physics coincidentally close to the weak scale.

  6. Weak-light phase locking for LISA

    International Nuclear Information System (INIS)

    McNamara, Paul W

    2005-01-01

    The long armlengths of the LISA interferometer, and the finite aperture of the telescope, lead to an optical power attenuation of ∼10 -10 of the transmitted to received light. Simple reflection at the end of the arm is therefore not an optimum interferometric design. Instead, a local laser is offset phase locked to the weak incoming beam, transferring the phase information of the incoming to the outgoing light. This paper reports on an experiment to characterize a weak-light phase-locking scheme suitable for LISA in which a diode-pumped, Nd:YAG, non-planar ring oscillator (NPRO) is offset phase locked to a low-power (13 pW) frequency stabilized master NPRO. Preliminary results of the relative phase noise of the slave laser shows shot noise limited performance above 0.4 Hz. Excess noise is observed at lower frequencies, most probably due to thermal effects in the optical arrangement and phase-sensing electronics

  7. Towards weakly constrained double field theory

    Directory of Open Access Journals (Sweden)

    Kanghoon Lee

    2016-08-01

    Full Text Available We show that it is possible to construct a well-defined effective field theory incorporating string winding modes without using strong constraint in double field theory. We show that X-ray (Radon transform on a torus is well-suited for describing weakly constrained double fields, and any weakly constrained fields are represented as a sum of strongly constrained fields. Using inverse X-ray transform we define a novel binary operation which is compatible with the level matching constraint. Based on this formalism, we construct a consistent gauge transform and gauge invariant action without using strong constraint. We then discuss the relation of our result to the closed string field theory. Our construction suggests that there exists an effective field theory description for massless sector of closed string field theory on a torus in an associative truncation.

  8. Quantum Groups, Property (T), and Weak Mixing

    Science.gov (United States)

    Brannan, Michael; Kerr, David

    2018-06-01

    For second countable discrete quantum groups, and more generally second countable locally compact quantum groups with trivial scaling group, we show that property (T) is equivalent to every weakly mixing unitary representation not having almost invariant vectors. This is a generalization of a theorem of Bekka and Valette from the group setting and was previously established in the case of low dual by Daws, Skalski, and Viselter. Our approach uses spectral techniques and is completely different from those of Bekka-Valette and Daws-Skalski-Viselter. By a separate argument we furthermore extend the result to second countable nonunimodular locally compact quantum groups, which are shown in particular not to have property (T), generalizing a theorem of Fima from the discrete setting. We also obtain quantum group versions of characterizations of property (T) of Kerr and Pichot in terms of the Baire category theory of weak mixing representations and of Connes and Weiss in terms of the prevalence of strongly ergodic actions.

  9. Orbits in weak and strong bars

    CERN Document Server

    Contopoulos, George

    1980-01-01

    The authors study the plane orbits in simple bar models embedded in an axisymmetric background when the bar density is about 1% (weak), 10% (intermediate) or 100% (strong bar) of the axisymmetric density. Most orbits follow the stable periodic orbits. The basic families of periodic orbits are described. In weak bars with two Inner Lindblad Resonances there is a family of stable orbits extending from the center up to the Outer Lindblad Resonance. This family contains the long period orbits near corotation. Other stable families appear between the Inner Lindblad Resonances, outside the Outer Lindblad Resonance, around corotation (short period orbits) and around the center (retrograde). Some families become unstable or disappear in strong bars. A comparison is made with cases having one or no Inner Lindblad Resonance. (12 refs).

  10. Weakly Collisional and Collisionless Astrophysical Plasmas

    DEFF Research Database (Denmark)

    Berlok, Thomas

    are used to study weakly collisional, stratified atmospheres which offer a useful model of the intracluster medium of galaxy clusters. Using linear theory and computer simulations, we study instabilities that feed off thermal and compositional gradients. We find that these instabilities lead to vigorous...... investigate helium mixing in the weakly collisional intracluster medium of galaxy clusters using Braginskii MHD. Secondly, we present a newly developed Vlasov-fluid code which can be used for studying fully collisionless plasmas such as the solar wind and hot accretions flows. The equations of Braginskii MHD...... associated with the ions and is thus well suited for studying collisionless plasmas. We have developed a new 2D-3V Vlasov-fluid code which works by evolving the phase-space density distribution of the ions while treating the electrons as an inertialess fluid. The code uses the particle-incell (PIC) method...

  11. Weak mixing angle measurements at hadron colliders

    CERN Document Server

    Di Simone, Andrea; The ATLAS collaboration

    2015-01-01

    The Talk will cover weak mixing angle measurements at hadron colliders ATLAS and CMS in particular. ATLAS has measured the forward-backward asymmetry for the neutral current Drell Yan process in a wide mass range around the Z resonance region using dielectron and dimuon final states with $\\sqrt{s}$ =7 TeV data. For the dielectron channel, the measurement includes electrons detected in the forward calorimeter which extends the covered phase space. The result is then used to extract a measurement of the effective weak mixing angle. Uncertainties from the limited knowledge on the parton distribution functions in the proton constitute a significant part of the uncertainty and a dedicated study is performed to obtain a PDF set describing W and Z data measured previously by ATLAS. Similar studies from CMS will be reported.

  12. Bound states in weakly disordered spin ladders

    Energy Technology Data Exchange (ETDEWEB)

    Arlego, M. [Departamento de Fisica, Universidad Nacional de La Plata, CC 67 (1900) La Plata (Argentina)]. E-mail: arlego@venus.fisica.unlp.edu.ar; Brenig, W. [Institut fuer Theoretische Physik, Technische Universitaet Braunschweig (Germany); Cabra, D.C. [Laboratoire de Physique Theorique, Universite Louis Pasteur Strasbourg (France); Heidrich-Meisner, F. [Institut fuer Theoretische Physik, Technische Universitaet Braunschweig (Germany); Honecker, A. [Institut fuer Theoretische Physik, Technische Universitaet Braunschweig (Germany); Rossini, G. [Departamento de Fisica, Universidad Nacional de La Plata, CC 67 (1900) La Plata (Argentina)

    2005-04-30

    We study the appearance of bound states in the spin gap of spin-12 ladders induced by weak bond disorder. Starting from the strong-coupling limit, i.e., the limit of weakly coupled dimers, we perform a projection on the single-triplet subspace and derive the position of bound states for the single impurity problem of one modified coupling as well as for small impurity clusters. The case of a finite concentration of impurities is treated with the coherent-potential approximation (CPA) in the strong-coupling limit and compared with numerical results. Further, we analyze the details in the structure of the density of states and relate their origin to the influence of impurity clusters.

  13. Weak cosmic censorship: as strong as ever.

    Science.gov (United States)

    Hod, Shahar

    2008-03-28

    Spacetime singularities that arise in gravitational collapse are always hidden inside of black holes. This is the essence of the weak cosmic censorship conjecture. The hypothesis, put forward by Penrose 40 years ago, is still one of the most important open questions in general relativity. In this Letter, we reanalyze extreme situations which have been considered as counterexamples to the weak cosmic censorship conjecture. In particular, we consider the absorption of scalar particles with large angular momentum by a black hole. Ignoring back reaction effects may lead one to conclude that the incident wave may overspin the black hole, thereby exposing its inner singularity to distant observers. However, we show that when back reaction effects are properly taken into account, the stability of the black-hole event horizon is irrefutable. We therefore conclude that cosmic censorship is actually respected in this type of gedanken experiments.

  14. Shock Wave Dynamics in Weakly Ionized Plasmas

    Science.gov (United States)

    Johnson, Joseph A., III

    1999-01-01

    An investigation of the dynamics of shock waves in weakly ionized argon plasmas has been performed using a pressure ruptured shock tube. The velocity of the shock is observed to increase when the shock traverses the plasma. The observed increases cannot be accounted for by thermal effects alone. Possible mechanisms that could explain the anomalous behavior include a vibrational/translational relaxation in the nonequilibrium plasma, electron diffusion across the shock front resulting from high electron mobility, and the propagation of ion-acoustic waves generated at the shock front. Using a turbulence model based on reduced kinetic theory, analysis of the observed results suggest a role for turbulence in anomalous shock dynamics in weakly ionized media and plasma-induced hypersonic drag reduction.

  15. SANS observations on weakly flocculated dispersions

    DEFF Research Database (Denmark)

    Mischenko, N.; Ourieva, G.; Mortensen, K.

    1997-01-01

    Structural changes occurring in colloidal dispersions of poly-(methyl metacrylate) (PMMA) particles, sterically stabilized with poly-(12-hydroxystearic acid) (PHSA), while varying the solvent quality, temperature and shear rate, are investigated by small-angle neutron scattering (SANS......). For a moderately concentrated dispersion in a marginal solvent the transition on cooling from the effective stability to a weak attraction is monitored, The degree of attraction is determined in the framework of the sticky spheres model (SSM), SANS and rheological results are correlated....

  16. The weak conversion rate in quark matter

    International Nuclear Information System (INIS)

    Heiselberg, H.

    1992-01-01

    The weak conversion rate of strange to down quarks, s + u ↔ u + d, is calculated analytically for degenerate u, d and s quark matter to leading orders in temperature and deviations from chemical equilibrium. The rate is applied to burning of neutron matter into quark matter, to evaporation from quark nuggets in the early universe, for estimating the lifetime of strangelets, and to pulsar glitches

  17. BCS superconductivity for weakly coupled clusters

    International Nuclear Information System (INIS)

    Friedel, J.

    1992-01-01

    BCS superconductivity is expected to have fairly high critical temperatures when clusters of moderate sizes are weakly coupled to form a crystal. This remark extends to quasi zerodimensional cases, a remark initially made by Labbe for quasi one-dimensional ones and by Hirsch, Bok and Labbe for quasi twodimensional ones. Possible applications are envisaged for twodimensional clusters (fullerene) or threedimensional ones (metal clusters, Chevrel phases). Conditions for optimal applicability of the scheme are somewhat restricted. (orig.)

  18. Deep inelastic inclusive weak and electromagnetic interactions

    International Nuclear Information System (INIS)

    Adler, S.L.

    1976-01-01

    The theory of deep inelastic inclusive interactions is reviewed, emphasizing applications to electromagnetic and weak charged current processes. The following reactions are considered: e + N → e + X, ν + N → μ - + X, anti ν + N → μ + + X where X denotes a summation over all final state hadrons and the ν's are muon neutrinos. After a discussion of scaling, the quark-parton model is invoked to explain the principle experimental features of deep inelastic inclusive reactions

  19. Weakly interacting massive particles and stellar structure

    International Nuclear Information System (INIS)

    Bouquet, A.

    1988-01-01

    The existence of weakly interacting massive particles (WIMPs) may solve both the dark matter problem and the solar neutrino problem. Such particles affect the energy transport in the stellar cores and change the stellar structure. We present the results of an analytic approximation to compute these effects in a self-consistent way. These results can be applied to many different stars, but we focus on the decrease of the 8 B neutrino flux in the case of the Sun

  20. Search for weakly decaying b -flavored pentaquarks

    NARCIS (Netherlands)

    Aaij, R.; Adeva, B.; Ajaltouni, Z.; Akar, S.; Alessio, F.; Alexander, M.; Alfonso Albero, A.; Ali, S.; Alkhazov, G.; Alvarez Cartelle, P.; Alves, A. A.; Amato, S.; Amerio, S.; Amhis, Y.; An, L.; Anderlini, L.; Andreassi, G.; Andreotti, M.; Andrews, J. E.; Appleby, R. B.; Archilli, F.; D'Argent, P.; Arnau Romeu, J.; Artamonov, A.; Artuso, M.; Aslanides, E.; Atzeni, M.; Auriemma, G.; Baalouch, M.; Babuschkin, I.; Bachmann, S.; BacK, J. J.; Badalov, A.; Baesso, C.; Baker, S.; Balagura, V.; Baldini, W.; Baranov, A.; Barlow, R. J.; Barschel, C.; BarsuK, S.; Barter, W.; Baryshnikov, F.; Batozskaya, V.; Battista, V.; Bay, A.; Beaucourt, L.; Beddow, J.; Bedeschi, F.; Bediaga, I.; Beiter, A.; Bel, L. J.; Beliy, N.; Bellee, V.; Belloli, N.; Belous, K.; Belyaev, I.; Ben-Haim, E.; Bencivenni, G.; Benson, S.; BeraneK, S.; Berezhnoy, A.; Bernet, R.; Berninghoff, D.; Bertholet, E.; Bertolin, A.; Betancourt, C.; Betti, F.; Bettler, M. O.; Van Beuzekom, M.; Bezshyiko, Ia; Bifani, S.; Billoir, P.; Birnkraut, A.; Bizzeti, A.; Bjørn, M.; Blake, T.; Blanc, F.; BlusK, S.; Bocci, V.; Boettcher, T.; Bondar, A.; Bondar, N.; Bordyuzhin, I.; Borghi, S.; BorisyaK, M.; Borsato, M.; Bossu, F.; Boubdir, M.; BowcocK, T. J.V.; Bowen, E.; Bozzi, C.; Brodzicka, J.; Brundu, D.; Buchanan, E.; Burr, C.; Bursche, A.; Buytaert, J.; Byczynski, W.; Cadeddu, S.; Cai, H.; Calabrese, R.; Calladine, R.; Calvi, M.; Calvo Gomez, M.; Camboni, A.; Campana, P.; Campora Perez, D. H.; Capriotti, L.; Carbone, A.; Carboni, G.; Cardinale, R.; Cardini, A.; Carniti, P.; Carvalho Akiba, K.; Casse, G.; Cassina, L.; Cattaneo, M.; Cavallero, G.; Cenci, R.; Chamont, D.; Chapman, M. G.; Charles, M.; Charpentier, Ph; Chatzikonstantinidis, G.; Chefdeville, M.; Cheung, S. F.; Chitic, S. G.; Chobanova, V.; Chrzaszcz, M.; Chubykin, A.; Ciambrone, P.; Cid Vidal, X.; CiezareK, G.; Clarke, P. E.L.; Clemencic, M.; Cliff, H. V.; Closier, J.; Coco, V.; Cogan, J.; Cogneras, E.; Cogoni, V.; Cojocariu, L.; Collins, P.; Colombo, T.; Comerma-Montells, A.; Contu, A.; Coombs, G.; Coquereau, S.; Corti, G.; Corvo, M.; Costa Sobral, C. M.; Couturier, B.; Cowan, G. A.; CraiK, D. C.; Crocombe, A.; Cruz Torres, M.; Currie, R.; D'Ambrosio, C.; Da Cunha Marinho, F.; Da Silva, C. L.; Dall'Occo, E.; Dalseno, J.; Davis, A.; De Aguiar Francisco, O.; De Bruyn, K.; De Capua, S.; De Cian, M.; De Miranda, J. M.; De Paula, L.; De Serio, M.; De Simone, P.; Dean, C. T.; Decamp, D.; Del Buono, L.; Dembinski, H. P.; Demmer, M.; DendeK, A.; Derkach, D.; Deschamps, O.; Dettori, F.; Dey, B.; Di Canto, A.; Di Nezza, P.; Dordei, F.; Dorigo, M.; Dosil Suárez, A.; Douglas, L.; Dovbnya, A.; Dreimanis, K.; Dujany, G.; Durante, P.; Durham, J. M.; Dutta, D.; Dzhelyadin, R.; Dziewiecki, M.; Dziurda, A.; Dzyuba, A.; Easo, S.; Ebert, M.; Egede, U.; Egorychev, V.; Eidelman, S.; Eisenhardt, S.; Eitschberger, U.; Ekelhof, R.; Eklund, L.; Ely, S.; Esen, S.; Evans, H. M.; Evans, T.; Falabella, A.; Farley, N.; Farry, S.; Fazzini, D.; Federici, L.; Ferguson, D.; Fernandez, G.; Fernandez Declara, P.; Fernandez Prieto, A.; Ferrari, F.; Ferreira Lopes, L.; Ferreira Rodrigues, F.; Ferro-Luzzi, M.; Filippov, S.; Fini, R. A.; Fiorini, M.; Firlej, M.; FitzpatricK, C.; Fiutowski, T.; Fleuret, F.; Fontana, M.; Fontanelli, F.; Forty, R.; Franco Lima, V.; FranK, M.; Frei, C.; Fu, J.; FunK, W.; Furfaro, E.; Färber, C.; Gabriel, E.; Gallas Torreira, A.; Galli, D.; Gallorini, S.; Gambetta, S.; Gandelman, M.; Gandini, P.; Gao, Y.; Garcia Martin, L. M.; García Pardiñas, J.; Garra Tico, J.; Garrido, L.; Gascon, D.; Gaspar, C.; Gavardi, L.; Gazzoni, G.; GericK, D.; GersabecK, E.; GersabecK, M.; Gershon, T.; Ghez, Ph; Gianì, S.; Gibson, V.; Girard, O. G.; Giubega, L.; Gizdov, K.; Gligorov, V. V.; Golubkov, D.; Golutvin, A.; Gomes, A.; Gorelov, I. V.; Gotti, C.; Govorkova, E.; Grabowski, J. P.; Graciani Diaz, R.; Granado Cardoso, L. A.; Graugés, E.; Graverini, E.; Graziani, G.; Grecu, A.; Greim, R.; Grillo, L.; Gruber, L.; Gruberg Cazon, B. R.; Grünberg, O.; Gushchin, E.; Guz, Yu; Gys, T.; Göbel, C.; Hadavizadeh, T.; Hadjivasiliou, C.; Haefeli, G.; Haen, C.; Haines, S. C.; Hamilton, B.; Han, X.; HancocK, T. H.; Hansmann-Menzemer, S.; Harnew, N.; Harnew, S. T.; Hasse, C.; Hatch, M.; Hecker, M.; Heinicke, K.; Heister, A.; Hennessy, K.; Henrard, P.; Van Herwijnen, E.; Heß, M.; Hicheur, A.; Hill, D.; Hopchev, P. H.; Huard, Z. C.; Hulsbergen, W.; Humair, T.; Hushchyn, M.; Hutchcroft, D.; Ibis, P.; IdziK, M.; Ilten, P.; Jacobsson, R.; Jalocha, J.; Jans, E.; Jawahery, A.; John, M.; Jones, C. R.; Joram, C.; Jost, B.; JuriK, N.; Kandybei, S.; Karacson, M.; Kariuki, J. M.; Karodia, S.; Kazeev, N.; Kecke, M.; Keizer, F.; Kelsey, M.; Kenzie, M.; Ketel, T.; Khairullin, E.; Khanji, B.; Khurewathanakul, C.; Kirn, T.; Klaver, S.; Klimaszewski, K.; Klimkovich, T.; Koliiev, S.; Kolpin, M.; Kopecna, R.; Koppenburg, P.; Kosmyntseva, A.; Kotriakhova, S.; Kozeiha, M.; KravchuK, L.; Kreps, M.; Kress, F.; Krokovny, P.; Krzemien, W.; Kucewicz, W.; KucharczyK, M.; Kudryavtsev, V.; Kuonen, A. K.; Kvaratskheliya, T.; Lacarrere, D.; Lafferty, G.; Lai, A.; Lanfranchi, G.; Langenbruch, C.; Latham, T.; Lazzeroni, C.; Le Gac, R.; Leflat, A.; Lefrançois, J.; Lefèvre, R.; Lemaitre, F.; Lemos Cid, E.; Leroy, O.; LesiaK, T.; Leverington, B.; Liang, X.; Likhomanenko, T.; Lindner, R.; Lionetto, F.; Lisovskyi, V.; Loh, D.; Loi, A.; Longstaff, I.; Lopes, J. H.; Lucchesi, D.; Lucio Martinez, M.; Luo, H.; Lupato, A.; Luppi, E.; Lupton, O.; Lusiani, A.; Lyu, X.; Machefert, F.; Maciuc, F.; Macko, V.; MackowiaK, P.; Maddrell-Mander, S.; Maev, O.; Maguire, K.; Maisuzenko, D.; Majewski, M. W.; Malde, S.; Malecki, B.; Malinin, A.; Maltsev, T.; Manca, G.; Mancinelli, G.; Marangotto, D.; Maratas, J.; Marchand, J. F.; Marconi, U.; Marin Benito, C.; Marinangeli, M.; Marino, P.; Marks, J.; Martellotti, G.; Martin, M.; Martinelli, M.; Martinez Santos, D.; Martinez Vidal, F.; Massafferri, A.; Matev, R.; Mathad, A.; Mathe, Z.; Matteuzzi, C.; Mauri, A.; Maurice, E.; Maurin, B.; Mazurov, A.; McCann, M.; McNab, A.; McNulty, R.; Mead, J. V.; Meadows, B.; Meaux, C.; Meier, F.; Meinert, N.; MelnychuK, D.; MerK, M.; Merli, A.; Michielin, E.; Milanes, D. A.; Millard, E.; Minard, M. N.; Minzoni, L.; Mitzel, D. S.; Mogini, A.; Molina Rodriguez, J.; Mombächer, T.; Monroy, I. A.; Monteil, S.; Morandin, M.; Morello, M. J.; Morgunova, O.; Moron, J.; Morris, A. B.; Mountain, R.; Muheim, F.; Müller, D.; Müller, K.; Müller, V.; NaiK, P.; Nakada, T.; Nandakumar, R.; Nandi, A.; Nasteva, I.; Needham, M.; Neri, N.; Neubert, S.; Neufeld, N.; Neuner, M.; Nguyen-Mau, C.; Nieswand, S.; Niet, R.; Nikitin, N.; Nikodem, T.; Nogay, A.; O'Hanlon, D. P.; Oblakowska-Mucha, A.; Obraztsov, V.; Ogilvy, S.; Oldeman, R.; Onderwater, C. J.G.; Ossowska, A.; Otalora Goicochea, J. M.; Owen, P.; Oyanguren, A.; Pais, P. R.; Palano, A.; Palutan, M.; Papanestis, A.; Pappagallo, M.; Pappalardo, L. L.; Parker, W.; Parkes, C.; Passaleva, G.; Pastore, A.; Patel, M.; Patrignani, C.; Pellegrino, A.; Penso, G.; Pepe Altarelli, M.; Perazzini, S.; Pereima, D.; Perret, P.; Pescatore, L.; Petridis, K.; Petrolini, A.; Petrov, A.; Petruzzo, M.; Picatoste Olloqui, E.; PietrzyK, B.; PietrzyK, G.; Pikies, M.; Pinci, D.; Pisani, F.; Pistone, A.; Piucci, A.; Placinta, V.; Playfer, S.; Plo Casasus, M.; Polci, F.; Poli Lener, M.; Poluektov, A.; Polyakov, I.; Polycarpo, E.; Pomery, G. J.; Ponce, S.; Popov, A.; Popov, D.; Poslavskii, S.; Potterat, C.; Price, E.; Prisciandaro, J.; Prouve, C.; Pugatch, V.; Puig Navarro, A.; Pullen, H.; Punzi, G.; Qian, W.; Qin, J.; Quagliani, R.; Quintana, B.; Rachwal, B.; Rademacker, J. H.; Rama, M.; Ramos Pernas, M.; Rangel, M. S.; RaniuK, I.; Ratnikov, F.; Raven, G.; Ravonel Salzgeber, M.; Reboud, M.; Redi, F.; Reichert, S.; Dos Reis, A. C.; Remon Alepuz, C.; Renaudin, V.; Ricciardi, S.; Richards, S.; Rihl, M.; Rinnert, K.; Robbe, P.; Robert, A.; Rodrigues, A. B.; Rodrigues, E.; Rodriguez Lopez, J. A.; Rogozhnikov, A.; Roiser, S.; Rollings, A.; Romanovskiy, V.; Romero Vidal, A.; Rotondo, M.; Rudolph, M. S.; Ruf, T.; Ruiz Valls, P.; Ruiz Vidal, J.; Saborido Silva, J. J.; Sadykhov, E.; Sagidova, N.; Saitta, B.; Salustino Guimaraes, V.; Sanchez Mayordomo, C.; Sanmartin Sedes, B.; Santacesaria, R.; Santamarina Rios, C.; Santimaria, M.; Santovetti, E.; Sarpis, G.; Satriano, C.; Satta, A.; Saunders, D. M.; Savrina, D.; Schael, S.; Schellenberg, M.; Schiller, M.; Schindler, H.; Schmelling, M.; Schmelzer, T.; Schmidt, B.; Schneider, O.; Schopper, A.; Schreiner, H. F.; Schubiger, M.; Schune, M. H.; Schwemmer, R.; Sciascia, B.; Sciubba, A.; Semennikov, A.; Sepulveda, E. S.; Sergi, A.; Serra, N.; Serrano, J.; Sestini, L.; Seyfert, P.; Shapkin, M.; Shapoval, I.; Shcheglov, Y.; Shears, T.; Shekhtman, L.; Shevchenko, V.; Siddi, B. G.; Silva Coutinho, R.; Silva De Oliveira, L.; Simi, G.; Simone, S.; Sirendi, M.; Skidmore, N.; Skwarnicki, T.; Smith, J.; Smith, M.; Soares Lavra, L.; Sokoloff, M. D.; Soler, F. J.P.; Souza De Paula, B.; Spaan, B.; Spradlin, P.; Sridharan, S.; Stagni, F.; Stahl, M.; Stahl, S.; Stefko, P.; Stefkova, S.; Steinkamp, O.; Stemmle, S.; Stenyakin, O.; Stepanova, M.; Stevens, H.; Stone, S.; Storaci, B.; Stracka, S.; Stramaglia, M. E.; Straticiuc, M.; Straumann, U.; Sun, J.; Sun, L.; SwienteK, K.; Syropoulos, V.; SzumlaK, T.; Szymanski, M.; T'Jampens, S.; Tayduganov, A.; Tekampe, T.; Tellarini, G.; Teubert, F.; Van Tilburg, J.; Tilley, M. J.; Tisserand, V.; Tobin, M.; TolK, S.; Tomassetti, L.; Tonelli, D.; Tourinho Jadallah Aoude, R.; Tournefier, E.; Traill, M.; Tran, M. T.; Tresch, M.; Trisovic, A.; Tsaregorodtsev, A.; Tsopelas, P.; Tully, A.; Tuning, N.; Ukleja, A.; Usachov, A.; Ustyuzhanin, A.; Uwer, U.; Vacca, C.; Vagner, A.; Vagnoni, V.; Valassi, A.; Valat, S.; Valenti, G.; Vazquez Gomez, R.; Vazquez Regueiro, P.; Vecchi, S.; Van Veghel, M.; Velthuis, J. J.; Veltri, M.; Veneziano, G.; Venkateswaran, A.; Verlage, T. A.; Vernet, M.; Vesterinen, M.; Viana Barbosa, J. V.; Vieira, D.; Vieites Diaz, M.; Viemann, H.; Vilasis-Cardona, X.; Vitti, M.; Volkov, V.; Vollhardt, A.; Voneki, B.; Vorobyev, A.; Vorobyev, V.; Voß, C.; Vázquez Sierra, C.; Waldi, R.; Walsh, J.; Ward, D. R.; WarK, H. M.; Watson, N. K.; Websdale, D.; Weiden, A.; Weisser, C.; Whitehead, M.; Wicht, J.; Wilkinson, G.; Wilkinson, M.; Williams, M.; Williams, M.; Wilson, F. F.; Wimberley, J.; Winn, M.; Wishahi, J.; Wislicki, W.; WiteK, M.; Wormser, G.; Wotton, S. A.; Wyllie, K.; Xie, Y.; Xu, M.; Xu, Q.; Yang, Z.; Yang, Z.; Yao, Y.; Yin, H.; Yuan, X.; Yushchenko, O.; Zarebski, K. A.; Zavertyaev, M.; Zhelezov, A.; Zhukov, V.; Zonneveld, J. B.; Zucchelli, S.

    2018-01-01

    Investigations of the existence of pentaquark states containing a single b (anti)quark decaying weakly into four specific final states J/ψK+π-p, J/ψK-π-p, J/ψK-π+p, and J/ψφ(1020)p are reported. The data sample corresponds to an integrated luminosity of 3.0 fb-1 in 7 and 8 TeV pp collisions acquired

  1. Nonmesonic weak decay of the hypertriton

    International Nuclear Information System (INIS)

    Bennhold, C.; Ramos, A.; Aruliah, D.A.; Oelfke, U.

    1992-01-01

    The nonmesonic weak decay of Λ 3 H is evaluated microscopically in the pion exchange model. The correlated three-body wave function of the hypertriton is approximated by a bound Λ-deuteron system obtained by averaging the YN interaction over the deuteron wave function. The relevant matrix elements are calculated in momentum space. The resulting decay rate is 4.9% of the free Λ decay rate

  2. Acute neuromuscular weakness associated with dengue infection

    Directory of Open Access Journals (Sweden)

    Harmanjit Singh Hira

    2012-01-01

    Full Text Available Background: Dengue infections may present with neurological complications. Whether these are due to neuromuscular disease or electrolyte imbalance is unclear. Materials and Methods: Eighty-eight patients of dengue fever required hospitalization during epidemic in year 2010. Twelve of them presented with acute neuromuscular weakness. We enrolled them for study. Diagnosis of dengue infection based on clinical profile of patients, positive serum IgM ELISA, NS1 antigen, and sero-typing. Complete hemogram, kidney and liver functions, serum electrolytes, and creatine phosphokinase (CPK were tested. In addition, two patients underwent nerve conduction velocity (NCV test and electromyography. Results: Twelve patients were included in the present study. Their age was between 18 and 34 years. Fever, myalgia, and motor weakness of limbs were most common presenting symptoms. Motor weakness developed on 2 nd to 4 th day of illness in 11 of 12 patients. In one patient, it developed on 10 th day of illness. Ten of 12 showed hypokalemia. One was of Guillain-Barré syndrome and other suffered from myositis; they underwent NCV and electromyography. Serum CPK and SGOT raised in 8 out of 12 patients. CPK of patient of myositis was 5098 IU. All of 12 patients had thrombocytopenia. WBC was in normal range. Dengue virus was isolated in three patients, and it was of serotype 1. CSF was normal in all. Within 24 hours, those with hypokalemia recovered by potassium correction. Conclusions: It was concluded that the dengue virus infection led to acute neuromuscular weakness because of hypokalemia, myositis, and Guillain-Barré syndrome. It was suggested to look for presence of hypokalemia in such patients.

  3. Sherlockology and Galactica.tv: Fan sites as gifts or exploited labor?

    Directory of Open Access Journals (Sweden)

    Bertha Chin

    2014-03-01

    Full Text Available Current scholarship on fandom has been preoccupied with examining the changing relationship between media industry professionals and fans. Media producers, celebrities, and industry insiders are increasingly establishing contact with fans, bypassing traditional media entertainment outlets to provide them with information directly. This contact is facilitated by social media networks. Fans serve as grassroots campaigners, promoters, and sometimes even public relations officers, acting as liaisons between media producers, celebrities, or industry insiders and fandom in general. In doing so, they take on roles traditionally fulfilled by professional PR and marketing personnel, and they do it for free, resulting in accusations that they are being exploited for their labor. However, fans do not necessarily view themselves as being exploited. We need to consider the possibility that they may regard their contributions as a service—or gift—to fandom. In examining the roles played by two popular fan sites, Sherlockology and Galactica.tv, I propose to examine how fan labor may be considered an act of gift giving in fandom.

  4. Weak interaction studies from nuclear beta decay

    International Nuclear Information System (INIS)

    Morita, M.

    1981-01-01

    The studies performed at the theoretical nuclear physics division of the Laboratory of Nuclear Studies, Osaka University, are reported. Electron spin density and internal conversion process, nuclear excitation by electron transition, beta decay, weak charged current, and beta-ray angular distributions in oriented nuclei have been studied. The relative intensity of internal conversion electrons for the case in which the radial wave functions of orbital electrons are different for electron spin up and down was calculated. The calculated value was in good agreement with the experimental one. The nuclear excitation following the transition of orbital electrons was studied. The calculated probability of the nuclear excitation of Os 189 was 1.4 x 10 - 7 in conformity with the experimental value 1.7 x 10 - 7 . The second class current and other problems on beta-decay have been extensively studied, and described elsewhere. Concerning weak charged current, the effects of all induced terms, the time component of main axial vector, all partial waves of leptons, Coulomb correction for the electrons in finite size nuclei, and radiative correction were studied. The beta-ray angular distribution for the 1 + -- 0 + transition in oriented B 12 and N 12 was investigated. In this connection, investigation on the weak magnetism to include all higher order corrections for the evaluation of the spectral shape factors was performed. Other works carried out by the author and his collaborators are also explained. (Kato, T.)

  5. Skeletal muscle weakness in osteogenesis imperfecta mice.

    Science.gov (United States)

    Gentry, Bettina A; Ferreira, J Andries; McCambridge, Amanda J; Brown, Marybeth; Phillips, Charlotte L

    2010-09-01

    Exercise intolerance, muscle fatigue and weakness are often-reported, little-investigated concerns of patients with osteogenesis imperfecta (OI). OI is a heritable connective tissue disorder hallmarked by bone fragility resulting primarily from dominant mutations in the proα1(I) or proα2(I) collagen genes and the recently discovered recessive mutations in post-translational modifying proteins of type I collagen. In this study we examined the soleus (S), plantaris (P), gastrocnemius (G), tibialis anterior (TA) and quadriceps (Q) muscles of mice expressing mild (+/oim) and moderately severe (oim/oim) OI for evidence of inherent muscle pathology. In particular, muscle weight, fiber cross-sectional area (CSA), fiber type, fiber histomorphology, fibrillar collagen content, absolute, relative and specific peak tetanic force (P(o), P(o)/mg and P(o)/CSA respectively) of individual muscles were evaluated. Oim/oim mouse muscles were generally smaller, contained less fibrillar collagen, had decreased P(o) and an inability to sustain P(o) for the 300-ms testing duration for specific muscles; +/oim mice had a similar but milder skeletal muscle phenotype. +/oim mice had mild weakness of specific muscles but were less affected than their oim/oim counterparts which demonstrated readily apparent skeletal muscle pathology. Therefore muscle weakness in oim mice reflects inherent skeletal muscle pathology. Copyright © 2010 Elsevier B.V. All rights reserved.

  6. Weak signal detection: A discrete window of opportunity for achieving 'Vision 90:90:90'?

    Science.gov (United States)

    Burman, Christopher J; Aphane, Marota; Delobelle, Peter

    2016-01-01

    UNAIDS' Vision 90:90:90 is a call to 'end AIDS'. Developing predictive foresight of the unpredictable changes that this journey will entail could contribute to the ambition of 'ending AIDS'. There are few opportunities for managing unpredictable changes. We introduce 'weak signal detection' as a potential opportunity to fill this void. Combining futures and complexity theory, we reflect on two pilot case studies that involved the Archetype Extraction technique and the SenseMaker(®) Collector(™) tool. Both the piloted techniques have the potentials to surface weak signals--but there is room for improvement. A management response to a complex weak signal requires pattern management, rather than an exclusive focus on behaviour management. Weak signal detection is a window of opportunity to improve resilience to unpredictable changes in the HIV/AIDS landscape that can both reduce the risk that emerges from the changes and increase the visibility of opportunities to exploit the unpredictable changes that could contribute to 'ending AIDS'.

  7. Reception of the Istrian musical tradition(s

    Directory of Open Access Journals (Sweden)

    Marušić Dario

    2007-01-01

    Full Text Available The successive colonization of Istria with culturally differentiated populations, and peripheral position of the peninsula regarding both the Latin and Slav worlds, has conditioned interesting phenomena which defines the traditional life of the province. On the spiritual level it is primarily reflected in two cultural dimensions: the language and traditional music.

  8. Policy-based benchmarking of weak heaps and their relatives

    DEFF Research Database (Denmark)

    Bruun, Asger; Edelkamp, Stefan; Katajainen, Jyrki

    2010-01-01

    In this paper we describe an experimental study where we evaluated the practical efficiency of three worst-case efficient priority queues: 1) a weak heap that is a binary tree fulfilling half-heap ordering, 2) a weak queue that is a forest of perfect weak heaps, and 3) a runrelaxed weak queue tha...

  9. Exploiting Data Sparsity In Covariance Matrix Computations on Heterogeneous Systems

    KAUST Repository

    Charara, Ali M.

    2018-05-24

    Covariance matrices are ubiquitous in computational sciences, typically describing the correlation of elements of large multivariate spatial data sets. For example, covari- ance matrices are employed in climate/weather modeling for the maximum likelihood estimation to improve prediction, as well as in computational ground-based astronomy to enhance the observed image quality by filtering out noise produced by the adap- tive optics instruments and atmospheric turbulence. The structure of these covariance matrices is dense, symmetric, positive-definite, and often data-sparse, therefore, hier- archically of low-rank. This thesis investigates the performance limit of dense matrix computations (e.g., Cholesky factorization) on covariance matrix problems as the number of unknowns grows, and in the context of the aforementioned applications. We employ recursive formulations of some of the basic linear algebra subroutines (BLAS) to accelerate the covariance matrix computation further, while reducing data traffic across the memory subsystems layers. However, dealing with large data sets (i.e., covariance matrices of billions in size) can rapidly become prohibitive in memory footprint and algorithmic complexity. Most importantly, this thesis investigates the tile low-rank data format (TLR), a new compressed data structure and layout, which is valuable in exploiting data sparsity by approximating the operator. The TLR com- pressed data structure allows approximating the original problem up to user-defined numerical accuracy. This comes at the expense of dealing with tasks with much lower arithmetic intensities than traditional dense computations. In fact, this thesis con- solidates the two trends of dense and data-sparse linear algebra for HPC. Not only does the thesis leverage recursive formulations for dense Cholesky-based matrix al- gorithms, but it also implements a novel TLR-Cholesky factorization using batched linear algebra operations to increase hardware occupancy and

  10. ATLAS Experiment Brochure - Chinese (Traditional)

    CERN Multimedia

    AUTHOR|(CDS)2081027

    2018-01-01

    ATLAS is one of the four major experiments at the Large Hadron Collider at CERN. It is a general-purpose particle physics experiment run by an international collaboration, and is designed to exploit the full discovery potential and the huge range of physics opportunities that the LHC provides.

  11. Conflicts Related to Natural Resources Exploitation: A Case Study of ...

    African Journals Online (AJOL)

    Conflicts Related to Natural Resources Exploitation: A Case Study of Oil Crisis in Nigeria's Niger Delta Region and its Socio-Political and Economic Implications. ... on the environment leading to pollution of land, rivers, creeks and waterways.

  12. Exploitation of unconventional protein sources in the feed of weaner ...

    African Journals Online (AJOL)

    Exploitation of unconventional protein sources in the feed of weaner rabbits ... as protein sources for feeding ruminants but rarely considered as feed for micro ... 26.88 g/100g DM in Centrosema pubescens and Moringa oleifera, respectively.

  13. Exploiting Formation Flying for Fuel Saving Supersonic Oblique Wing Aircraft

    Science.gov (United States)

    2007-07-01

    used and developed during recent wing / winglet / morphing design programmes (Refs.13-14). By exploiting this method, we have assessed the aerodynamics ...parameters, Propulsion Issues, Size Issues, Aero-elastic effects 15. SUBJECT TERMS EOARD, Control System, Aerodynamics 16...

  14. Human trafficking and exploitation: A global health concern.

    Science.gov (United States)

    Zimmerman, Cathy; Kiss, Ligia

    2017-11-01

    In this collection review, Cathy Zimmerman and colleague introduce the PLOS Medicine Collection on Human Trafficking, Exploitation and Health, laying out the magnitude of the global trafficking problem and offering a public health policy framework to guide responses to trafficking.

  15. Uncertainty avoidance and the exploration-exploitation trade-off

    NARCIS (Netherlands)

    Broekhuizen, Thijs; Giarratana, Marco S.; Torres, Anna

    2017-01-01

    Purpose - This study aims to investigate how a firm's uncertainty avoidance - as indicated by the headquarters' national culture - impacts firm performance by affecting exploratory (product innovation) and exploitative (brand trademark protection) activities. It aims to show that firms characterized

  16. Enhanced surrogate models for statistical design exploiting space mapping technology

    DEFF Research Database (Denmark)

    Koziel, Slawek; Bandler, John W.; Mohamed, Achmed S.

    2005-01-01

    We present advances in microwave and RF device modeling exploiting Space Mapping (SM) technology. We propose new SM modeling formulations utilizing input mappings, output mappings, frequency scaling and quadratic approximations. Our aim is to enhance circuit models for statistical analysis...

  17. Trajectories and cycles of sexual exploitation and trafficking for sexual exploitation of women in the Peruvian Amazon

    OpenAIRE

    Mujica, Jaris

    2015-01-01

    The commercial sexual exploitation is a constant activity in the Peruvian Amazon. Around the river port of Pucallpa in ucayali region, the practice appears systematically: teenage attend taverns around the port, and those dedicated to the work of cooking camps logging, are victims of constant exploitation and many also of trafficking. this article aims to reconstruct the path of life and reproductive cycle of the forms of exploitation in a sample of 20 women, and focuses on: (i) evidence of s...

  18. Communication: A Jastrow factor coupled cluster theory for weak and strong electron correlation

    International Nuclear Information System (INIS)

    Neuscamman, Eric

    2013-01-01

    We present a Jastrow-factor-inspired variant of coupled cluster theory that accurately describes both weak and strong electron correlation. Compatibility with quantum Monte Carlo allows for variational energy evaluations and an antisymmetric geminal power reference, two features not present in traditional coupled cluster that facilitate a nearly exact description of the strong electron correlations in minimal-basis N 2 bond breaking. In double-ζ treatments of the HF and H 2 O bond dissociations, where both weak and strong correlations are important, this polynomial cost method proves more accurate than either traditional coupled cluster or complete active space perturbation theory. These preliminary successes suggest a deep connection between the ways in which cluster operators and Jastrow factors encode correlation

  19. Escaping from the exploitation trap by shaping the digital future

    OpenAIRE

    Füzes, Péter; Gódor, Zoltán; Szabó, Zsolt Roland

    2017-01-01

    Even Fortune 500 firms can disappear quickly, because many of them falls into an exploitation trap. Examples show that certain organizations – that manifest ambidextrous features – can avoid the exploitation trap. But, how can they do it? Authors tracked the digital transformation of a Fortune 500 company in order to understand the strategic and organizational challenges and solutions to become resilient and prosperous. A cutting edge example is shown in the paper about how an industry leader...

  20. The concept of exploitation in international human trafficking law

    OpenAIRE

    von der Pütten, Tuija Kaarina

    2017-01-01

    Human trafficking is commonly known as a criminal practice that takes place in the framework of sex trade: women and children are trafficked within a state, or from one state to another, for the purpose of sexual exploitation. Similarly, the early 20th century international conventions aimed to tackle ‘white slave traffic’, trafficking of women and children for sexual exploitation. However, it is misleading to see trafficking only within this context. People are trafficked so that they can be...

  1. The Gambler’s Fallacy Is Associated with Weak Affective Decision Making but Strong Cognitive Ability

    OpenAIRE

    Xue, Gui; He, Qinghua; Lei, Xuemei; Chen, Chunhui; Liu, Yuyun; Chen, Chuansheng; Lu, Zhong-Lin; Dong, Qi; Bechara, Antoine

    2012-01-01

    Humans demonstrate an inherent bias towards making maladaptive decisions, as shown by a phenomenon known as the gambler's fallacy (GF). The GF has been traditionally considered as a heuristic bias supported by the fast and automatic intuition system, which can be overcome by the reasoning system. The present study examined an intriguing hypothesis, based on emerging evidence from neuroscience research, that the GF might be attributed to a weak affective but strong cognitive decision making me...

  2. Riemann Geometric Color-Weak Compensationfor Individual Observers

    OpenAIRE

    Kojima, Takanori; Mochizuki, Rika; Lenz, Reiner; Chao, Jinhui

    2014-01-01

    We extend a method for color weak compensation based on the criterion of preservation of subjective color differences between color normal and color weak observers presented in [2]. We introduce a new algorithm for color weak compensation using local affine maps between color spaces of color normal and color weak observers. We show howto estimate the local affine map and how to determine correspondences between the origins of local coordinates in color spaces of color normal and color weak ob...

  3. Feasibility of isotachochromatography as a method for the preparative separation of weak acids and weak bases. I. Theoretical considerations

    NARCIS (Netherlands)

    Kooistra, C.; Sluyterman, L.A.A.E.

    1988-01-01

    The fundamental equation of isotachochromatography, i.e., isotachophoresis translated into ion-exchange chromatography, has been derived for weak acids and weak bases. Weak acids are separated on strong cation exchangers and weak bases on strong anion exchangers. According to theory, the elution

  4. Systematic review: role of acid, weakly acidic and weakly alkaline reflux in gastro-oesophageal reflux disease

    NARCIS (Netherlands)

    Boeckxstaens, G. E.; Smout, A.

    2010-01-01

    The importance of weakly acidic and weakly alkaline reflux in gastro-oesophageal reflux disease (GERD) is gaining recognition. To quantify the proportions of reflux episodes that are acidic (pH <4), weakly acidic (pH 4-7) and weakly alkaline (pH >7) in adult patients with GERD, and to evaluate their

  5. How 'Digital' is Traditional Crime?

    NARCIS (Netherlands)

    Montoya, L.; Junger, Marianne; Hartel, Pieter H.

    Measuring how much cybercrime exists is typically done by first defining cybercrime and then quantifying how many cases fit that definition. The drawback is that definitions vary across countries and many cybercrimes are recorded as traditional crimes. An alternative is to keep traditional

  6. A Framework for Exploiting Internet of Things for Context-Aware Trust-Based Personalized Services

    Directory of Open Access Journals (Sweden)

    Abayomi Otebolaku

    2018-01-01

    Full Text Available In the last years, we have witnessed the introduction of the Internet of Things (IoT as an integral part of the Internet with billions of interconnected and addressable everyday objects. On one hand, these objects generate a massive volume of data that can be exploited to gain useful insights into our day-to-day needs. On the other hand, context-aware recommender systems (CARSs are intelligent systems that assist users to make service consumption choices that satisfy their preferences based on their contextual situations. However, one of the key challenges facing the development and deployment of CARSs is the lack of functionality for providing dynamic and reliable context information required by the recommendation decision process. Thus, data obtained from IoT objects and other sources can be exploited to build CARSs that satisfy users’ preferences, improve quality of experience, and boost recommendation accuracy. This article describes various components of a conceptual IoT-based framework for context-aware personalized recommendations. The framework addresses the weakness whereby CARSs rely on static and limited contexts from user’s mobile phone by providing additional components for reliable and dynamic context information, using IoT context sources. The core of the framework consists of a context classification and reasoning management and a dynamic user profile model, incorporating trust to improve the accuracy of context-aware personalized recommendations. Experimental evaluations show that incorporating context and trust into personalized recommendation process can improve accuracy.

  7. From Exploitation to Industry: Definitions, Risks, and Consequences of Domestic Sexual Exploitation and Sex Work Among Women and Girls

    OpenAIRE

    Gerassi, Lara

    2015-01-01

    In the last 15 years, terms such as prostitution, sex trafficking, sexual exploitation, modern-day slavery, and sex work have elicited much confusion and debate as to their definitions. Consequently several challenges have emerged for both law enforcement in the prosecution of criminals and practitioners in service provision. This article reviews the state of the literature with regard to domestic, sexual exploitation among women and girls in the United States and seeks to (1) provide definit...

  8. Weak polyelectrolyte complexation driven by associative charging

    Science.gov (United States)

    Rathee, Vikramjit S.; Zervoudakis, Aristotle J.; Sidky, Hythem; Sikora, Benjamin J.; Whitmer, Jonathan K.

    2018-03-01

    Weak polyelectrolytes are relevant for a wide range of fields; in particular, they have been investigated as "smart" materials for chemical separations and drug delivery. The charges on weak polyelectrolytes are dynamic, causing polymer chains to adopt different equilibrium conformations even with relatively small changes to the surrounding environment. Currently, there exists no comprehensive picture of this behavior, particularly where polymer-polymer interactions have the potential to affect charging properties significantly. In this study, we elucidate the novel interplay between weak polyelectrolyte charging and complexation behavior through coupled molecular dynamics and Monte Carlo simulations. Specifically, we investigate a model of two equal-length and oppositely charging polymer chains in an implicit salt solution represented through Debye-Hückel interactions. The charging tendency of each chain, along with the salt concentration, is varied to determine the existence and extent of cooperativity in charging and complexation. Strong cooperation in the charging of these chains is observed at large Debye lengths, corresponding to low salt concentrations, while at lower Debye lengths (higher salt concentrations), the chains behave in apparent isolation. When the electrostatic coupling is long-ranged, we find that a highly charged chain strongly promotes the charging of its partner chain, even if the environment is unfavorable for an isolated version of that partner chain. Evidence of this phenomenon is supported by a drop in the potential energy of the system, which does not occur at the lower Debye lengths where both potential energies and charge fractions converge for all partner chain charging tendencies. The discovery of this cooperation will be helpful in developing "smart" drug delivery mechanisms by allowing for better predictions for the dissociation point of delivery complexes.

  9. The magnetosphere under weak solar wind forcing

    Directory of Open Access Journals (Sweden)

    C. J. Farrugia

    2007-02-01

    Full Text Available The Earth's magnetosphere was very strongly disturbed during the passage of the strong shock and the following interacting ejecta on 21–25 October 2001. These disturbances included two intense storms (Dst*≈−250 and −180 nT, respectively. The cessation of this activity at the start of 24 October ushered in a peculiar state of the magnetosphere which lasted for about 28 h and which we discuss in this paper. The interplanetary field was dominated by the sunward component [B=(4.29±0.77, −0.30±0.71, 0.49±0.45 nT]. We analyze global indicators of geomagnetic disturbances, polar cap precipitation, ground magnetometer records, and ionospheric convection as obtained from SuperDARN radars. The state of the magnetosphere is characterized by the following features: (i generally weak and patchy (in time low-latitude dayside reconnection or reconnection poleward of the cusps; (ii absence of substorms; (iii a monotonic recovery from the previous storm activity (Dst corrected for magnetopause currents decreasing from ~−65 to ~−35 nT, giving an unforced decreased of ~1.1 nT/h; (iv the probable absence of viscous-type interaction originating from the Kelvin-Helmholtz (KH instability; (v a cross-polar cap potential of just 20–30 kV; (vi a persistent, polar cap region containing (vii very weak, and sometimes absent, electron precipitation and no systematic inter-hemisphere asymmetry. Whereas we therefore infer the presence of a moderate amount of open flux, the convection is generally weak and patchy, which we ascribe to the lack of solar wind driver. This magnetospheric state approaches that predicted by Cowley and Lockwood (1992 but has never yet been observed.

  10. Spurious Shear in Weak Lensing with LSST

    Energy Technology Data Exchange (ETDEWEB)

    Chang, C.; Kahn, S.M.; Jernigan, J.G.; Peterson, J.R.; AlSayyad, Y.; Ahmad, Z.; Bankert, J.; Bard, D.; Connolly, A.; Gibson, R.R.; Gilmore, K.; Grace, E.; Hannel, M.; Hodge, M.A.; Jee, M.J.; Jones, L.; Krughoff, S.; Lorenz, S.; Marshall, P.J.; Marshall, S.; Meert, A.

    2012-09-19

    The complete 10-year survey from the Large Synoptic Survey Telescope (LSST) will image {approx} 20,000 square degrees of sky in six filter bands every few nights, bringing the final survey depth to r {approx} 27.5, with over 4 billion well measured galaxies. To take full advantage of this unprecedented statistical power, the systematic errors associated with weak lensing measurements need to be controlled to a level similar to the statistical errors. This work is the first attempt to quantitatively estimate the absolute level and statistical properties of the systematic errors on weak lensing shear measurements due to the most important physical effects in the LSST system via high fidelity ray-tracing simulations. We identify and isolate the different sources of algorithm-independent, additive systematic errors on shear measurements for LSST and predict their impact on the final cosmic shear measurements using conventional weak lensing analysis techniques. We find that the main source of the errors comes from an inability to adequately characterise the atmospheric point spread function (PSF) due to its high frequency spatial variation on angular scales smaller than {approx} 10{prime} in the single short exposures, which propagates into a spurious shear correlation function at the 10{sup -4}-10{sup -3} level on these scales. With the large multi-epoch dataset that will be acquired by LSST, the stochastic errors average out, bringing the final spurious shear correlation function to a level very close to the statistical errors. Our results imply that the cosmological constraints from LSST will not be severely limited by these algorithm-independent, additive systematic effects.

  11. Toward justice and social transformation? Appealing to the tradition against the tradition

    Directory of Open Access Journals (Sweden)

    Piet J. Naude

    2017-05-01

    Full Text Available This article starts with a brief statement on the well-known contradictory nature of the Reformed tradition in South Africa, defending injustice and struggling for justice in the name of the same tradition. By following the work of Reformed systematic theologian D.J. Smit, it argues that the justice-affirming potential of the Reformed tradition is a hermeneutical task built on three specific re-interpretations: (1 the reinterpretation of Scripture from the perspective of the weak, the poor and the oppressed (against a hermeneutic of creation orders and God-willed division of people (2 a rereading of John Calvin to affirm the dignity and freedom of all humans (against the grain of neo-Calvinist interpretations (3 a rereading of Karl Barth with a focus on God’s inclusive grace, Christian confessions and the nature of the Christian life (against the limitation of his influence because of his perceived actualistic view on Scripture or unscientific, foundational methodology. The article closes with a brief look into the agenda for social transformation faced by us in the second decade of the 21st century, and under what conditions the  Reformed faith will be able to make an enduring contribution to public life in (South Africa.

  12. Spectral line profiles in weakly turbulent plasmas

    International Nuclear Information System (INIS)

    Capes, H.; Voslamber, D.

    1976-07-01

    The unified theory of line broadening by electron perturbers is generalized to include the case of a weakly turbulent plasma. The collision operator in the line shape expression is shown to be the sum of two terms, both containing effects arising from the non-equilibrium nature of the plasma. One of the two terms represents the influence of individual atom-particle interactions occuring via the nonequilibrium dielectric plasma medium. The other term is due to the interaction of the atom with the turbulent waves. Both terms contain damping and diffusion effects arising from the plasma turbulence

  13. Weak mixing angles and heavy flavours

    International Nuclear Information System (INIS)

    Jarlskog, C.

    1984-05-01

    The present status of the weak mixing angles, in the standard six quark model, is reviewed. The implications of the recent measurements of the beauty lifetime and branching ratios are discussed, in the framework of the Kobayashi-Maskawa and the Wolfenstein parametrizations. Expectations for B(sup)o - B(sup)-o mixing and consequences for the collider data are given. Other topics briefly reviewed are CP-violation, top quark mass and possible implications of the existence of a fourth family. (author)

  14. Why is hydrofluoric acid a weak acid?

    Science.gov (United States)

    Ayotte, Patrick; Hébert, Martin; Marchand, Patrick

    2005-11-08

    The infrared vibrational spectra of amorphous solid water thin films doped with HF at 40 K reveal a strong continuous absorbance in the 1000-3275 cm(-1) range. This so-called Zundel continuum is the spectroscopic hallmark for aqueous protons. The extensive ionic dissociation of HF at such low temperature suggests that the reaction enthalpy remains negative down to 40 K. These observations support the interpretation that dilute HF aqueous solutions behave as weak acids largely due to the large positive reaction entropy resulting from the structure making character of the hydrated fluoride ion.

  15. Superconductor in a weak static gravitational field

    Energy Technology Data Exchange (ETDEWEB)

    Ummarino, Giovanni Alberto [Dipartimento DISAT, Politecnico di Torino, Turin (Italy); National Research Nuclear University MEPhI-Moscow Engineering Physics Institute, Moscow (Russian Federation); Gallerati, Antonio [Dipartimento DISAT, Politecnico di Torino, Turin (Italy)

    2017-08-15

    We provide the detailed calculation of a general form for Maxwell and London equations that takes into account gravitational corrections in linear approximation. We determine the possible alteration of a static gravitational field in a superconductor making use of the time-dependent Ginzburg-Landau equations, providing also an analytic solution in the weak field condition. Finally, we compare the behavior of a high-T{sub c} superconductor with a classical low-T{sub c} superconductor, analyzing the values of the parameters that can enhance the reduction of the gravitational field. (orig.)

  16. Unification of electromagnetic, strong and weak interaction

    International Nuclear Information System (INIS)

    Duong Van Phi; Duong Anh Duc

    1993-09-01

    The Unification of Electromagnetic, Strong and Weak Interactions is realized in the framework of the Quantum Field Theory, established in an 8-dimensional Unified Space. Two fundamental, spinor and vector field equations are considered. The first of the matter particles and the second is of the gauge particles. Interaction Lagrangians are formed from the external and internal currents and the external and internal vector field operators. Generators of the local gauge transformations are the combinations of the matrices of the first field equation. (author). 15 refs

  17. Relativistic rapprochement of weak and strong interactions

    International Nuclear Information System (INIS)

    Strel'tsov, V.N.

    1995-01-01

    On the basis of the relativistic Yukawa potentials for the nuclear (quark) field and the field of intermediate vector W-, Z-bosons, it is shown that the interactions described by them increase differently with growing velocity (the weak one increases more rapidly). According to the estimates, they are compared (at distances of the 'action radius' of nuclear forces) at an energy of about 10 12 GeV (10 6 GeV for the pion field) what is smaller than the corresponding value in the model of 'grand unification'. 3 refs., 2 tabs

  18. [The weakness of individual psychologic dream theory].

    Science.gov (United States)

    Strunz, F

    1988-05-13

    This article undertakes a critical evaluation of Adlerian dream theory. The main weakness of the theory is found to be its lack of an inherent instance of truth that shows the dreamer the way to a better and more feasible life style. Contemporary Adlerians' treatment of the master's dream dogmas and their practical use in psychotherapy are described. There seems to be a convergence movement of today's practical application methods of the dream in all psychotherapeutic schools. Adlerian dream interpretation in the original sense intended by Adler is practised nowhere by psychotherapists today and seems largely antiquated.

  19. Superconductivity in multilayer perovskite. Weak coupling analysis

    International Nuclear Information System (INIS)

    Koikegami, Shigeru; Yanagisawa, Takashi

    2006-01-01

    We investigate the superconductivity of a three-dimensional d-p model with a multilayer perovskite structure on the basis of the second-order perturbation theory within the weak coupling framework. Our model has been designed with multilayer high-T c superconducting cuprates in mind. In our model, multiple Fermi surfaces appear, and the component of a superconducting gap function develops on each band. We have found that the multilayer structure can stabilize the superconductivity in a wide doping range. (author)

  20. Weak measurement and its experimental realisation

    International Nuclear Information System (INIS)

    Flack, R; Hiley, B J

    2014-01-01

    The relationship between the real part of the weak value of the momentum operator at a post selected position is discussed and the meaning of the experimentally determined stream-lines in the Toronto experiment of Kocsis et al is re-examined. We argue against interpreting the energy flow lines as photon trajectories. The possibility of performing an analogous experiment using atoms is proposed in order that a direct comparison can be made with the trajectories calculated by Philippidis, Dewdney and Hiley using the Bohm approach.

  1. Weak field approximation of new general relativity

    International Nuclear Information System (INIS)

    Fukui, Masayasu; Masukawa, Junnichi

    1985-01-01

    In the weak field approximation, gravitational field equations of new general relativity with arbitrary parameters are examined. Assuming a conservation law delta sup(μ)T sub(μν) = 0 of the energy-momentum tensor T sub(μν) for matter fields in addition to the usual one delta sup(ν)T sub(μν) = 0, we show that the linearized gravitational field equations are decomposed into equations for a Lorentz scalar field and symmetric and antisymmetric Lorentz tensor fields. (author)

  2. New quark model with weak triplet

    International Nuclear Information System (INIS)

    Suzuki, T.; Hori, S.; Yamada, E.; Yamanashi, K.; Abe, Y.

    1976-01-01

    We propose a new anomaly-free quark model with weak isotriplets for quarks. The ΔI=1/2 enhancement may be accounted for, the requirement of Golowich and Holstein being satisfied. There arises a mixing of left-handed charmed quarks with left-handed nucleonic ones - such mixing essentially gives an overall explanation of neutral-current effects, inclusive y distribution, the ratio sigma/sup T/(anti νd)/sigma/sup T/(νd), and copious dilepton events in ν and anti ν reactions

  3. Excavating wide inclines in weak strata

    Energy Technology Data Exchange (ETDEWEB)

    Kuznetsov, N N [Ukrspetsstroiproekt (USSR)

    1990-09-01

    Discusses schemes for excavation of transport inclines in surface mines under conditions of weak, unstable rocks characterized by a high water content. The schemes are aimed at maximum reduction of excavation operations without infringing the safety of personnel. Use of walking draglines (the EhSh-20/90, EhSh-100/100 and EhSh-10/70) is evaluated. Optimum schemes for incline excavation and determining optimum slope inclination are described on the example of the Berezovsk brown coal surface mine in the USSR. Efficiency of optimum schemes is analyzed: range of excavation, safety degree, landslide hazards, water influx rate, accident rate, etc.

  4. Thermodynamics of Weakly Measured Quantum Systems.

    Science.gov (United States)

    Alonso, Jose Joaquin; Lutz, Eric; Romito, Alessandro

    2016-02-26

    We consider continuously monitored quantum systems and introduce definitions of work and heat along individual quantum trajectories that are valid for coherent superposition of energy eigenstates. We use these quantities to extend the first and second laws of stochastic thermodynamics to the quantum domain. We illustrate our results with the case of a weakly measured driven two-level system and show how to distinguish between quantum work and heat contributions. We finally employ quantum feedback control to suppress detector backaction and determine the work statistics.

  5. PLASMA EMISSION BY WEAK TURBULENCE PROCESSES

    Energy Technology Data Exchange (ETDEWEB)

    Ziebell, L. F.; Gaelzer, R. [Instituto de Física, UFRGS, Porto Alegre, RS (Brazil); Yoon, P. H. [Institute for Physical Science and Technology, University of Maryland, College Park, MD (United States); Pavan, J., E-mail: luiz.ziebell@ufrgs.br, E-mail: rudi.gaelzer@ufrgs.br, E-mail: yoonp@umd.edu, E-mail: joel.pavan@ufpel.edu.br [Instituto de Física e Matemática, UFPel, Pelotas, RS (Brazil)

    2014-11-10

    The plasma emission is the radiation mechanism responsible for solar type II and type III radio bursts. The first theory of plasma emission was put forth in the 1950s, but the rigorous demonstration of the process based upon first principles had been lacking. The present Letter reports the first complete numerical solution of electromagnetic weak turbulence equations. It is shown that the fundamental emission is dominant and unless the beam speed is substantially higher than the electron thermal speed, the harmonic emission is not likely to be generated. The present findings may be useful for validating reduced models and for interpreting particle-in-cell simulations.

  6. On Uniform Weak König's Lemma

    DEFF Research Database (Denmark)

    Kohlenbach, Ulrich

    2002-01-01

    The so-called weak Konig's lemma WKL asserts the existence of an infinite path b in any infinite binary tree (given by a representing function f). Based on this principle one can formulate subsystems of higher-order arithmetic which allow to carry out very substantial parts of classical mathematics...... which-relative to PRA -implies the schema of 10-induction). In this setting one can consider also a uniform version UWKL of WKL which asserts the existence of a functional which selects uniformly in a given infinite binary tree f an infinite path f of that tree. This uniform version of WKL...

  7. Rational Exploitation and Utilizing of Groundwater in Jiangsu Coastal Area

    Science.gov (United States)

    Kang, B.; Lin, X.

    2017-12-01

    Jiangsu coastal area is located in the southeast coast of China, where is a new industrial base and an important coastal and Land Resources Development Zone of China. In the areas with strong human exploitation activities, regional groundwater evolution is obviously affected by human activities. In order to solve the environmental geological problems caused by groundwater exploitation fundamentally, we must find out the forming conditions of regional groundwater hydrodynamic field, and the impact of human activities on groundwater hydrodynamic field evolution and hydrogeochemical evolition. Based on these results, scientific management and reasonable exploitation of the regional groundwater resources can be provided for the utilization. Taking the coastal area of Jiangsu as the research area, we investigate and analyze of the regional hydrogeological conditions. The numerical simulation model of groundwater flow was established according to the water power, chemical and isotopic methods, the conditions of water flow and the influence of hydrodynamic field on the water chemical field. We predict the evolution of regional groundwater dynamics under the influence of human activities and climate change and evaluate the influence of groundwater dynamic field evolution on the environmental geological problems caused by groundwater exploitation under various conditions. We get the following conclusions: Three groundwater exploitation optimal schemes were established. The groundwater salinization was taken as the primary control condition. The substitution model was proposed to model groundwater exploitation and water level changes by BP network method.Then genetic algorithm was used to solve the optimization solution. Three groundwater exploitation optimal schemes were submit to local water resource management. The first sheme was used to solve the groundwater salinization problem. The second sheme focused on dual water supply. The third sheme concerned on emergency water

  8. Traditional access and forest management arrangements for beekeeping: the case of Southwest Ethiopia forest region

    NARCIS (Netherlands)

    Endalamaw, T.B.; Wiersum, K.F.

    2009-01-01

    Forest beekeeping is an ancient form of forest exploitation in south west Ethiopia. The practice has continued to the present with a gradual evolution in beekeeping technology and resource access and management arrangements. The aim of the present study is to study traditional forest management

  9. Business continuity 2014: From traditional to integrated Business Continuity Management.

    Science.gov (United States)

    Ee, Henry

    As global change continues to generate new challenges and potential threats to businesses, traditional business continuity management (BCM) slowly reveals its limitations and weak points to ensuring 'business resiliency' today. Consequently, BCM professionals also face the challenge of re-evaluating traditional concepts and introducing new strategies and industry best practices. This paper points to why traditional BCM is no longer sufficient in terms of enabling businesses to survive in today's high-risk environment. It also looks into some of the misconceptions about BCM and other stumbling blocks to establishing effective BCM today. Most importantly, however, this paper provides tips based on the Business Continuity Institute's (BCI) Good Practices Guideline (GPG) and the latest international BCM standard ISO 22301 on how to overcome the issues and challenges presented.

  10. The Biological Effects of Weak Electromagnetic Fields

    International Nuclear Information System (INIS)

    Algattawi, A.; Elshyrih, H.

    2010-01-01

    Many studies investigated that weak electromagnetic fields remove calcium ions bound to the membranes of living cells, making them more likely to tear,. There is an enzyme that destroys DNA this enzyme leaking through the membranes of lysosomes explains the fragmentation of DNA. This case was seen in cells exposed to mobile phone signals. When this occurs in the germ line it reduces fertility and predicts genetic damage in future generations. Although leakage of calcium ions into the cytosol (the main part of the cell) accelerates the growth, but it also promotes the growth of tumors. Leakage of calcium ions into neurons (brain cells) makes nerve impulses accounting for pain and other neurological symptoms in electro sensitive. It also reduces the signal to noise ratio of the brain making it less likely to respond. This may be partially responsible for the increased accident rate of drivers using mobile phones. More details for the molecular mechanisms to explain characteristics of electromagnetic exposure are needed, e.g. I) why weak fields are more effective than strong ones, II) why some frequencies such as 16 Hz are especially potent and III) why pulsed fields do more damage

  11. Critical potentials, leptons, and weak currents

    International Nuclear Information System (INIS)

    Smith, P.F.; Lewin, J.D.

    1977-12-01

    A theoretical study is made of the interaction of very strong localised electromagnetic potentials with charged leptons, and with the vacuum state. The principal objective is to investigate the phenomena which occur when the potential reaches or exceeds the critical value at which bound levels are drawn into the lower continuum. The behaviour of bound and continuum solutions of the Dirac equation for the specific model of a short range potential well in an arbitrarily large bounded volume is examined in detail. Vacuum polarisation effects are computed by summation over the infinite set of single particle levels, and special attention is given to the behaviour of the overall charge distribution as the potential strength increases through the critical value. The most significant features of the results are (a) the formation of highly localised electron or muon bound states, (b) similar critical potential strengths for electrons and muons, and (c) redefinition of the vacuum by one charge unit at the critical potential. These features are analogous to some properties of leptonic and hadronic weak currents, and the hypothesis is proposed that strong short range potentials may provide a possible mediating mechanism for the weak interaction and also a lepton confinement mechanism within the structure of hadrons. (author)

  12. Weak lensing of the Lyman α forest

    Science.gov (United States)

    Croft, Rupert A. C.; Romeo, Alessandro; Metcalf, R. Benton

    2018-06-01

    The angular positions of quasars are deflected by the gravitational lensing effect of foreground matter. The Lyman α (Lyα) forest seen in the spectra of these quasars is therefore also lensed. We propose that the signature of weak gravitational lensing of the Lyα forest could be measured using similar techniques that have been applied to the lensed cosmic microwave background (CMB), and which have also been proposed for application to spectral data from 21-cm radio telescopes. As with 21-cm data, the forest has the advantage of spectral information, potentially yielding many lensed `slices' at different redshifts. We perform an illustrative idealized test, generating a high-resolution angular grid of quasars (of order arcminute separation), and lensing the Lyα forest spectra at redshifts z = 2-3 using a foreground density field. We find that standard quadratic estimators can be used to reconstruct images of the foreground mass distribution at z ˜ 1. There currently exists a wealth of Lyα forest data from quasar and galaxy spectral surveys, with smaller sightline separations expected in the future. Lyα forest lensing is sensitive to the foreground mass distribution at redshifts intermediate between CMB lensing and galaxy shear, and avoids the difficulties of shape measurement associated with the latter. With further refinement and application of mass reconstruction techniques, weak gravitational lensing of the high-redshift Lyα forest may become a useful new cosmological probe.

  13. Conformational transitions of a weak polyampholyte

    KAUST Repository

    Nair, Arun Kumar Narayanan

    2014-10-07

    Using grand canonical Monte Carlo simulations of a flexible polyelectrolyte where the charges are in contact with a reservoir of constant chemical potential given by the solution pH, we study the behavior of weak polyelectrolytes in poor and good solvent conditions for polymer backbone. We address the titration behavior and conformational properties of a flexible diblock polyampholyte chain formed of two oppositely charged weak polyelectrolyte blocks, each containing equal number of identical monomers. The change of solution pH induces charge asymmetry in a diblock polyampholyte. For diblock polyampholyte chains in poor solvents, we demonstrate that a discontinuous transition between extended (tadpole) and collapsed (globular) conformational states is attainable by varying the solution pH. The double-minima structure in the probability distribution of the free energy provides direct evidence for the first-order like nature of this transition. At the isoelectric point electrostatically driven coil-globule transition of diblock polyampholytes in good solvents is found to consist of different regimes identified with increasing electrostatic interaction strength. At pH values above or below the isoelectric point diblock chains are found to have polyelectrolyte-like behavior due to repulsion between uncompensated charges along the chain.

  14. Weak scale from the maximum entropy principle

    Science.gov (United States)

    Hamada, Yuta; Kawai, Hikaru; Kawana, Kiyoharu

    2015-03-01

    The theory of the multiverse and wormholes suggests that the parameters of the Standard Model (SM) are fixed in such a way that the radiation of the S3 universe at the final stage S_rad becomes maximum, which we call the maximum entropy principle. Although it is difficult to confirm this principle generally, for a few parameters of the SM, we can check whether S_rad actually becomes maximum at the observed values. In this paper, we regard S_rad at the final stage as a function of the weak scale (the Higgs expectation value) vh, and show that it becomes maximum around vh = {{O}} (300 GeV) when the dimensionless couplings in the SM, i.e., the Higgs self-coupling, the gauge couplings, and the Yukawa couplings are fixed. Roughly speaking, we find that the weak scale is given by vh ˜ T_{BBN}2 / (M_{pl}ye5), where ye is the Yukawa coupling of electron, T_BBN is the temperature at which the Big Bang nucleosynthesis starts, and M_pl is the Planck mass.

  15. Probing hysteretic elasticity in weakly nonlinear materials

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, Paul A [Los Alamos National Laboratory; Haupert, Sylvain [UPMC UNIV PARIS; Renaud, Guillaume [UPMC UNIV PARIS; Riviere, Jacques [UPMC UNIV PARIS; Talmant, Maryline [UPMC UNIV PARIS; Laugier, Pascal [UPMC UNIV PARIS

    2010-12-07

    Our work is aimed at assessing the elastic and dissipative hysteretic nonlinear parameters' repeatability (precision) using several classes of materials with weak, intermediate and high nonlinear properties. In this contribution, we describe an optimized Nonlinear Resonant Ultrasound Spectroscopy (NRUS) measuring and data processing protocol applied to small samples. The protocol is used to eliminate the effects of environmental condition changes that take place during an experiment, and that may mask the intrinsic elastic nonlinearity. As an example, in our experiments, we identified external temperature fluctuation as a primary source of material resonance frequency and elastic modulus variation. A variation of 0.1 C produced a frequency variation of 0.01 %, which is similar to the expected nonlinear frequency shift for weakly nonlinear materials. In order to eliminate environmental effects, the variation in f{sub 0} (the elastically linear resonance frequency proportional to modulus) is fit with the appropriate function, and that function is used to correct the NRUS calculation of nonlinear parameters. With our correction procedure, we measured relative resonant frequency shifts of 10{sup -5} , which are below 10{sup -4}, often considered the limit to NRUS sensitivity under common experimental conditions. Our results show that the procedure is an alternative to the stringent control of temperature often applied. Applying the approach, we report nonlinear parameters for several materials, some with very small nonclassical nonlinearity. The approach has broad application to NRUS and other Nonlinear Elastic Wave Spectroscopy approaches.

  16. Conformational transitions of a weak polyampholyte

    KAUST Repository

    Nair, Arun Kumar Narayanan; Uyaver, Sahin; Sun, Shuyu

    2014-01-01

    Using grand canonical Monte Carlo simulations of a flexible polyelectrolyte where the charges are in contact with a reservoir of constant chemical potential given by the solution pH, we study the behavior of weak polyelectrolytes in poor and good solvent conditions for polymer backbone. We address the titration behavior and conformational properties of a flexible diblock polyampholyte chain formed of two oppositely charged weak polyelectrolyte blocks, each containing equal number of identical monomers. The change of solution pH induces charge asymmetry in a diblock polyampholyte. For diblock polyampholyte chains in poor solvents, we demonstrate that a discontinuous transition between extended (tadpole) and collapsed (globular) conformational states is attainable by varying the solution pH. The double-minima structure in the probability distribution of the free energy provides direct evidence for the first-order like nature of this transition. At the isoelectric point electrostatically driven coil-globule transition of diblock polyampholytes in good solvents is found to consist of different regimes identified with increasing electrostatic interaction strength. At pH values above or below the isoelectric point diblock chains are found to have polyelectrolyte-like behavior due to repulsion between uncompensated charges along the chain.

  17. Weak interactions in hot nucleon matter

    International Nuclear Information System (INIS)

    Cowell, S.; Pandharipande, V.R.

    2006-01-01

    The reaction rates for electron capture, neutrino absorption, and neutrino scattering in hot asymmetric nuclear matter are calculated with two-body effective interactions and one-body effective weak operators obtained from realistic models of nuclear forces by use of correlated basis theory. The infinite system is modeled in a box with periodic boundary conditions, and the one-quasiparticle quasi-hole response functions are calculated with a large microcanonical sample and the Tamm-Dancoff approximation. Results for matter at a temperature of 10 MeV, proton fraction 0.4, and densities ρ=(1/2),1,(3/2)ρ 0 , where ρ 0 is the equilibrium density of symmetric nuclear matter, are presented to illustrate the method. In general, the strength of the response is shifted to higher-energy transfers when compared with that of a noninteracting Fermi gas. The shift in the response and the weakness of effective operators as compared with the bare operators significantly reduce the cross sections for electron capture and neutrino scattering by factors of ∼2.5-3.5. In contrast, the symmetry energy enhances the neutrino absorption reaction rate relative to the Fermi gas. However, this reaction rate is still quite small because of Pauli blocking

  18. Unveiling Cebuano Traditional Healing Practices

    Directory of Open Access Journals (Sweden)

    ZachiaRaiza Joy S. Berdon

    2016-02-01

    Full Text Available This study aims to identify the features of Cebuano’s traditional healing practices. Specifically, it also answers the following objectives: analyze traditional healing in Cebuano’s perspectives, explain the traditional healing process practiced in terms of the traditional healers’ belief, and extrapolate perceptions of medical practitioners toward traditional healing. This study made use of qualitative approach, among five traditional healers who performed healing for not less than ten years, in the mountain barangays of Cebu City. These healers served as the primary informants who were selected because of their popularity in healing. The use of open-ended interview in local dialect and naturalistic observation provided a free listing of their verbatim accounts were noted and as primary narratives. Participation in the study was voluntary and participants were interviewed privately after obtaining their consent. The Cebuano traditional healing practices or “panambal” comprise the use of “himolso” (pulse-checking, “palakaw” (petition, “pasubay” (determining what causes the sickness and its possible means of healing, “pangalap” (searching of medicinal plants for “palina” (fumigation, “tayhop” (gentle-blowing, “tutho” (saliva-blowing,“tuob” (boiling, “orasyon” (mystical prayers, “hilot” (massage, and “barang” (sorcery. Though traditional with medical science disapproval, it contributes to a mystical identity of Cebuano healers, as a manifestation of folk Catholicism belief, in order to do a good legacy to the community that needs help. For further study, researchers may conduct further the studies on the: curative effects of medicinal plants in Cebu, psychological effect pulsechecking healed persons by the mananambal, and unmasking the other features of traditional healing.

  19. Aurorae in Australian Aboriginal Traditions

    Science.gov (United States)

    Hamacher, Duane W.

    2013-07-01

    Transient celestial phenomena feature prominently in the astronomical knowledge and traditions of Aboriginal Australians. In this paper, I collect accounts of the Aurora Australis from the literature regarding Aboriginal culture. Using previous studies of meteors, eclipses, and comets in Aboriginal traditions, I anticipate that the physical properties of aurora, such as their generally red colour as seen from southern Australia, will be associated with fire, death, blood, and evil spirits. The survey reveals this to be the case and also explores historical auroral events in Aboriginal cultures, aurorae in rock art, and briefly compares Aboriginal auroral traditions with other global indigenous groups, including the Maori of New Zealand.

  20. Exploitation and Utilization of Oilfield Geothermal Resources in China

    Directory of Open Access Journals (Sweden)

    Shejiao Wang

    2016-09-01

    Full Text Available Geothermal energy is a clean, green renewable resource, which can be utilized for power generation, heating, cooling, and could effectively replace oil, gas, and coal. In recent years, oil companies have put more efforts into exploiting and utilizing geothermal energy with advanced technologies for heat-tracing oil gathering and transportation, central heating, etc., which has not only reduced resource waste, but also improved large-scale and industrial resource utilization levels, and has achieved remarkable economic and social benefits. Based on the analysis of oilfield geothermal energy development status, resource potential, and exploitation and utilization modes, the advantages and disadvantages of harnessing oilfield geothermal resource have been discussed. Oilfield geothermal energy exploitation and utilization have advantages in resources, technical personnel, technology, and a large number of abandoned wells that could be reconstructed and utilized. Due to the high heat demand in oilfields, geothermal energy exploitation and utilization can effectively replace oil, gas, coal, and other fossil fuels, and has bright prospects. The key factors limiting oilfield geothermal energy exploitation and utilization are also pointed out in this paper, including immature technologies, lack of overall planning, lack of standards in resource assessment, and economic assessment, lack of incentive policies, etc.

  1. Traditional birth attendants in Malawi

    Directory of Open Access Journals (Sweden)

    J. J. M. Smit

    1994-03-01

    Full Text Available Traditional Birth Attendants (TBAs and traditional healers form an important link in the chain of health personnel providing primary health care in Malawi. In spite of the establishment of hospitals and health centres, it is to these traditional healers and TBAs that the majority of people turn in times of sickness and child-birth. Approximately 60 percent of all deliveries in Malawi occur in the villages. It is therefore important that due regard be paid to the activities of these traditional practitioners in order to ensure the achievement of the goal - "Health for all by the year 2000". The training of TBAs is seen as part of the Maternal and Child Health Services in the country.

  2. Traditional birth attendants in Malawi

    Directory of Open Access Journals (Sweden)

    J. J. M. Smit

    1994-05-01

    Full Text Available Traditional Birth Attendants (TBAs and traditional healers form an important link in the chain of health personnel providing primary health care in Malawi. In spite of the establishment of hospitals and health centres, it is to these traditional healers and TBAs that the majority of people turn in times of sickness and child-birth. Approximately 60 percent of all deliveries in Malawi occur in the villages. It is therefore important that due regard be paid to the activities of these traditional practitioners in order to ensure the achievement of the goal - "Health for all by the year 2000". The training of TBAs is seen as part of the Maternal and Child Health Services in the country.

  3. [Common household traditional Chinese medicines].

    Science.gov (United States)

    Zhang, Shu-Yuan; Li, Mei; Fu, Dan; Liu, Yang; Wang, Hui; Tan, Wei

    2016-02-01

    With the enhancement in the awareness of self-diagnosis among residents, it's very common for each family to prepare common medicines for unexpected needs. Meanwhile, with the popularization of the traditional Chinese medicine knowledge, the proportion of common traditional Chinese medicines prepared at residents' families is increasingly higher than western medicines year by year. To make it clear, both pre-research and closed questionnaire research were adopted for residents in Chaoyang District, Beijing, excluding residents with a medical background. Based on the results of data, a analysis was made to define the role and influence on the quality of life of residents and give suggestions for relevant departments to improve the traditional Chinese medicine popularization and promote the traditional Chinese medicine market. Copyright© by the Chinese Pharmaceutical Association.

  4. Traditional Chinese Medicine: An Introduction

    Science.gov (United States)

    ... Resources CME/CEU and Online Lectures Online Continuing Education Series Distinguished Lecture Series Integrated Medicine Research Lecture ... TCM, it is important to separate questions about traditional theories and ... of modern science-based medicine and health promotion practices. The ...

  5. The Zulu traditional birth attendant

    African Journals Online (AJOL)

    Some of the important practices of Zulu traditional birth attendants ... the people as regards pregnancy and labour. This article docu- .... into account previous perinatal deaths. ... They were either widows or married to husbands unable to work.

  6. Sexual exploitation and labor during adolescence: A case study

    Directory of Open Access Journals (Sweden)

    Luciana Dutra-Thomé

    2011-09-01

    Full Text Available The present article focused on the perception of sexual exploitation as a job, using a single case study design. The aim of the study was to investigate the case of a 14 year-old girl, involved in commercial sexual exploitation, who considered this situation as her labor activity. A content analysis showed protective and risk factors as categories, especially related to her labor activities. The girl perceived the sexual exploitation activity as a job that provided autonomy, subsistence, and survival. The study revealed that the negative effects of working during adolescence may bring consequences to health and development. Youth work may be defined as a risk factor, especially when the labour conditions are not adequate and protected.

  7. Information source exploitation/exploration and NPD decision-making

    DEFF Research Database (Denmark)

    Jespersen, Kristina Risom

    different Scandinavian companies. Data was analyzed using hierarchical regression models across decision criteria dimensions and NPD stages as well as analyzing the combination of selected information sources. Rather than forwarding one optimal search behavior for the entire NPD process, we find optimal...... information search behavior at either end of the exploitation/exploration continuum. Additionally, we find that overexploitation and overexploration is caused by managerial bias. This creates managerial misbehavior at gate decision-points of the NPD process.......The purpose of this study is to examine how the exploration/exploitation continuum is applied by decision-makers in new product gate decision-making. Specifically, we analyze at gate decision-points how the evaluation of a new product project is affected by the information source exploitation...

  8. The ALARA project of the EDF nuclear park exploitation

    International Nuclear Information System (INIS)

    Potoczek, J.

    1998-01-01

    To bring the exploitation of the nuclear park of EDF at the level of the best exploiters in the world in matter of collective and individual dosimetry, the ALARA principle coordinates numerous actions: to associate the temporary societies, to define common language, methods and tools for the whole park to organize a level effect in this area, to optimize the maintenance that is expansive in radiation doses, to make the different levels of management responsible on dosimetric stakes, to reduce the singular sources of exposure, to assure the organisation and exploitation of the experience back in this field and adapt consequently the system of information. The results are cheerful and the objectives for 2000 are: less than 1.2 h.Sv by year and by reactor, no intervener whom annual radiation dose is upper than 20 mSv (out of exceptional case). (N.C.)

  9. The exploitation of swamp plants for dewatering liquid sewage sludge

    Directory of Open Access Journals (Sweden)

    Jiří Šálek

    2006-01-01

    Full Text Available The operators of little rural wastewater treatment plants have been interested in economic exploitation of sewage sludge in local conditions. The chance is searching simply and natural ways of processing and exploitation stabilized sewage sludge in agriculture. Manure substrate have been obtained by composting waterless sewage sludge including rest plant biomass after closing 6–8 years period of filling liquid sewage sludge to the basin. Main attention was focused on exploitation of swamp plants for dewatering liquid sewage sludge and determination of influence sewage sludge on plants, intensity and course of evapotranspiration and design and setting of drying beds. On the base of determined ability of swamp plants evapotranspiration were edited suggestion solutions of design and operation sludge bed facilities in the conditions of small rural wastewater treatment plant.

  10. Cultural Work as a Site of Struggle: Freelancers and Exploitation

    Directory of Open Access Journals (Sweden)

    Nicole S. Cohen

    2012-05-01

    Full Text Available This paper argues that Marxist political economy is a useful framework for understanding contemporary conditions of cultural work. Drawing on Karl Marx’s foundational concepts, labour process theory, and a case study of freelance writers, I argue that the debate over autonomy and control in cultural work ignores exploitation in labour-capital relationships, which is a crucial process shaping cultural work. To demonstrate the benefits of this approach, I discuss two methods media firms use to extract surplus value from freelance writers: exploitation of unpaid labour time and exploitation of intellectual property through aggressive copyright regimes. I argue that a Marxist perspective can uncover the dynamics that are transforming cultural industries and workers’ experiences. From this perspective, cultural work is understood as a site of struggle.

  11. Little Eyolf and dramatic tradition

    Directory of Open Access Journals (Sweden)

    Roland Lysell

    2015-02-01

    Full Text Available The article criticises an Ibsen tradition who has seen the last scene of Little Eyolf as a reconciliation. Instead, the article discusses the improbability of a happy marriage characterised by social engagement. The play is open but it is hardly probable that Rita, with her erotic desire, and Allmers, whose desire has turned into metaphysics, can be happy together. The arguments refer to inner criteria and the constantly present dramatic tradition.

  12. TRADITIONAL PHYSICAL CULTURE OF BELARUSIANS

    OpenAIRE

    Shamak, Ales

    2017-01-01

    Relevance. The study of the history of physical culture makes it possible to reveal the laws of its development, the relationship with socio-political and economic factors. The aim of the research is to substantiate the essence, types and structure of the traditional physical culture of Belarusians. Results of the Research. Traditional physical culture has been the main type of physical culture of the Belarusian people for about a thousand years. It is regarded as the activity of the society ...

  13. Was the Monetarist Tradition Invented?

    OpenAIRE

    George S. Tavlas

    1998-01-01

    In 1969, Harry Johnson charged that Milton Friedman 'invented' a Chicago oral quantity theory tradition, the idea being that in order to launch a monetarist counter-revolution, Friedman needed to establish a linkage with pre-Keynesian orthodoxy. This paper shows that there was a distinct pre-Keynesian Chicago quantity-theory tradition that advocated increased government expenditure during the Great Depression in order to put money directly into circulation. This policy stance distinguished th...

  14. Electronic commerce versus traditional commerce

    OpenAIRE

    Dorin Vicentiu Popescu; Manoela Popescu

    2007-01-01

    The internet represents new opportunities for the traditional companies, including the diversification of the given services and also the promotion of the new ones, which are personalized and attractive and they are possible thanks to the information and communication technologies. According to this, the Internet impact, which has allowed the development of a new form of commerce- the commerce via Internet (which is a component of the electronic commerce), against the traditional global comme...

  15. Chapter 1. Traditional marketing revisited

    OpenAIRE

    Lambin, Jean-Jacques

    2013-01-01

    The objective of this chapter is to review the traditional marketing concept and to analyse its main ambiguities as presented in popular textbooks. The traditional marketing management model placing heavy emphasis of the marketing mix is in fact a supply-driven approach of the market, using the understanding of consumers’ needs to mould demand to the requirements of supply, instead of adapting supply to the expectations of demand. To clarify the true role of marketing, a distinction is made b...

  16. [Establishment of prescription research technology system in Chinese medicine secondary exploitation based on "component structure" theory].

    Science.gov (United States)

    Cheng, Xu-Dong; Feng, Liang; Gu, Jun-Fei; Zhang, Ming-Hua; Jia, Xiao-Bin

    2014-11-01

    Chinese medicine prescriptions are the wisdom outcomes of traditional Chinese medicine (TCM) clinical treatment determinations which based on differentiation of symptoms and signs. Chinese medicine prescriptions are also the basis of secondary exploitation of TCM. The study on prescription helps to understand the material basis of its efficacy, pharmacological mechanism, which is an important guarantee for the modernization of traditional Chinese medicine. Currently, there is not yet dissertation n the method and technology system of basic research on the prescription of Chinese medicine. This paper focuses on how to build an effective system of prescription research technology. Based on "component structure" theory, a technology system contained four-step method that "prescription analysis, the material basis screening, the material basis of analysis and optimization and verify" was proposed. The technology system analyzes the material basis of the three levels such as Chinese medicine pieces, constituents and the compounds which could respect the overall efficacy of Chinese medicine. Ideas of prescription optimization, remodeling are introduced into the system. The technology system is the combination of the existing research and associates with new techniques and methods, which used for explore the research thought suitable for material basis research and prescription remodeling. The system provides a reference for the secondary development of traditional Chinese medicine, and industrial upgrading.

  17. The Living Indian Critical Tradition

    Directory of Open Access Journals (Sweden)

    Vivek Kumar Dwivedi

    2010-11-01

    Full Text Available This paper attempts to establish the identity of something that is often considered to be missing – a living Indian critical tradition. I refer to the tradition that arises out of the work of those Indians who write in English. The chief architects of this tradition are Sri Aurobindo, C.D. Narasimhaiah, Gayatri Chakravorty Spivak and Homi K. Bhabha. It is possible to believe that Indian literary theories derive almost solely from ancient Sanskrit poetics. Or, alternatively, one can be concerned about the sad state of affairs regarding Indian literary theories or criticism in English. There have been scholars who have raised the question of the pathetic state of Indian scholarship in English and have even come up with some positive suggestions. But these scholars are those who are ignorant about the living Indian critical tradition. The significance of the Indian critical tradition lies in the fact that it provides the real focus to the Indian critical scene. Without an awareness of this tradition Indian literary scholarship (which is quite a different thing from Indian literary criticism and theory as it does not have the same impact as the latter two do can easily fail to see who the real Indian literary critics and theorists are.

  18. Meson exchange and neutral weak currents

    Energy Technology Data Exchange (ETDEWEB)

    Beck, D.H. [Univ. of Illinois, Urbana, IL (United States)

    1994-04-01

    Measurements of parity-violating electron scattering asymmetries to determine weak neutral currents in nuclei will be effected by the presence of meson exchange currents. Present low momentum transfer calculations, based on a flavor independent framework, show these effects to be small. In general, however, as the momentum transfer increases to values typical of deep-inelastic scattering, fragmentation functions show a clear flavor dependence. It is suggested that a good experimental starting point for understanding the flavor dependence of meson production and exchange currents is the Q{sup 2} dependence of parity-violating asymmetry in inclusive single pion electroproduction. A CEBAF facility with doubled energy is necessary to approach momentum transfers where this process begins to scale.

  19. Astrophysical evidence for weak new forces

    International Nuclear Information System (INIS)

    Burgess, C.; Cloutier, J.

    1988-01-01

    Recent observations of the orbital precession rate for eclipsing binary star systems appear to be in disagreement with the predictions of general relativity. We here analyse whether these discrepancies can be interpreted as being due to the existence of a new, long range, very weak force. We find that, with a conservative estimate of the astrophysical errors involved, the binary-star data by itself is consistent with what would be expected of a new force. The coupling and range required to fit the data can be consistent with the present limits on the existence of new forces. The strongest constraints come from recent terrestrial searches for a ''fifth force''. This analysis underlines the fact that these binary star systems are sensitive to forces whose coupling strength can be as low as 10 -5 that of gravity

  20. Weak lensing cosmology beyond ΛCDM

    International Nuclear Information System (INIS)

    Das, Sudeep; Linder, Eric V.; Nakajima, Reiko; Putter, Roland de

    2012-01-01

    Weak gravitational lensing is one of the key probes of the cosmological model, dark energy, and dark matter, providing insight into both the cosmic expansion history and large scale structure growth history. Taking into account a broad spectrum of physics affecting growth — dynamical dark energy, extended gravity, neutrino masses, and spatial curvature — we analyze the cosmological constraints. Similarly we consider the effects of a range of systematic uncertainties, in shear measurement, photometric redshifts, intrinsic alignments, and the nonlinear power spectrum, on cosmological parameter extraction. We also investigate, and provide fitting formulas for, the influence of survey parameters such as redshift depth, galaxy number densities, and sky area on the cosmological constraints in the beyond-ΛCDM parameter space. Finally, we examine the robustness of results for different fiducial cosmologies