WorldWideScience

Sample records for hidden clues modern

  1. A Brief Study on Hidden Narrative Clues in Romance of the Three Kingdoms%简论《三国演义》的叙事暗线

    Institute of Scientific and Technical Information of China (English)

    宋婷

    2016-01-01

    《三国演义》的叙事有明线和暗线两套线索。明线即表层线索,是在叙事过程中自然展示的事件发展的逻辑线索;暗线则是在事件沿着表层线索推进的过程中,在特定时候以梦境、星象、灾异、谶谣、甚至卜筮、面相等方式预先布设,用以预示事件结局或人物命运走向的深层线索。《三国演义》通过诸多方式布设叙事暗线可以藉此传达“天命”和“天道”思想,向受众提前透露相关情节推进和人物命运方面的信息,满足受众的好奇心,以便留住受众,也可使小说形成严整的内外结构,形式更加完善。%Obvious clue and logical clue are both included in the narration of Romance of the Three Kingdoms . The obvious clue also called as surface clue and is the logical clue shown naturally in the course of narration . The logical clue is previously set up and buried in advance in events pro-cessing along surface clue via dreams , star images , disasters resulting from unusual phenomena , supersti-tious prediction even divination and physiognomy . In this situation , the clue is hidden from the ending of the stories and the direction of character's life can be predicated . Through many ways to set up the narrative logical clue , Romance of Three Kingdoms can express the thoughts of both the“Mandate of Heaven”and“Natural Law”. Meanwhile , it also can disclose on the relevant plots processing and infor-mation of character's fate to audiences in advance , so as to satisfy curiosity of audiences and retain the audiences . At the same time , the external and internal structure and the novel forms can be more inte-grated and perfected as well .

  2. Developing Human Resources Through Hidden Curriculum: The experience of Pondok Modern Darussalam Gontor, Indonesia

    Directory of Open Access Journals (Sweden)

    M. Akrim Mariyat

    2011-06-01

    Full Text Available Pondok Modern Gontor, as a modern type of pesantren, grows very fast inthe term of quality and quantity, the amount of applicants is growing everyyear, and its graduates spread through Indonesian provincies. They take variouskinds of role e.g politicians, traders, civil-servants, rectors, deans, teachers,lecturers, doctors, muballighs, religious leadders, head of pesantrens etc.Due to the variety of occupation they take, and status they gain, it raisedsome questions related to the notion as well as the phylosophy of PondokModern, the curriculum they provide and the process they carried out. One ofthe answers is probably because the Pondok run boarding school system whichmakes Pondok Modern different from other educational institutions in general.By this system many kinds of educational process in the form of pro grammeand activities could be easily undertaken, because the three centres of education(home - school - community are mixed in one campus. Students are accustomedto practice “learning by doing” method and are supervised by their elders andteachers.Questions emerge due to the uniqueness of Pondok Modern eg. Whydid Gontor adopt boarding school system? How was the curriculum constructedand applied? And there are still a lot more questions related to this matter. Thispaper tries to offer some answers to these questions.

  3. 潜藏于现代设计中的未来主义%Futurism Hidden in Modern Design

    Institute of Scientific and Technical Information of China (English)

    吕秋琼

    2014-01-01

    未来主义艺术思潮衰落于20世纪20年代,加上两次世界大战导致艺术家大批量丧生,它受到重创。然而,未来主义所倡导的理念和元素,至今仍出现在生活的各领域中,这些身影并非历史的遗迹,而是未来主义被引用及进化的结果。%Futurism as a movement in art began to decline from the 1920s .Many artists of futurism were killed in two world wars ,and now futurism has basically disappeared .However ,some elements advocated by futurism are still an important part of Western culture .They qui-etly have hidden in the design of modern life .These are not the relic of history ,but the results of the design elements that was referenced and continuously evolving .

  4. Female and Male Perspectives on the Neolithic Transition in Europe: Clues from Ancient and Modern Genetic Data

    Science.gov (United States)

    Rasteiro, Rita; Chikhi, Lounès

    2013-01-01

    The arrival of agriculture into Europe during the Neolithic transition brought a significant shift in human lifestyle and subsistence. However, the conditions under which the spread of the new culture and technologies occurred are still debated. Similarly, the roles played by women and men during the Neolithic transition are not well understood, probably due to the fact that mitochondrial DNA (mtDNA) and Y chromosome (NRY) data are usually studied independently rather than within the same statistical framework. Here, we applied an integrative approach, using different model-based inferential techniques, to analyse published datasets from contemporary and ancient European populations. By integrating mtDNA and NRY data into the same admixture approach, we show that both males and females underwent the same admixture history and both support the demic diffusion model of Ammerman and Cavalli-Sforza. Similarly, the patterns of genetic diversity found in extant and ancient populations demonstrate that both modern and ancient mtDNA support the demic diffusion model. They also show that population structure and differential growth between farmers and hunter-gatherers are necessary to explain both types of data. However, we also found some differences between male and female markers, suggesting that the female effective population size was larger than that of the males, probably due to different demographic histories. We argue that these differences are most probably related to the various shifts in cultural practices and lifestyles that followed the Neolithic Transition, such as sedentism, the shift from polygyny to monogamy or the increase of patrilocality. PMID:23613761

  5. Tracing Clues

    DEFF Research Database (Denmark)

    Feldt, Liv Egholm

    must carefully look for even the smallest and insignificant signs to understand the messiness and blurredness of each phenomenon. Second, it stresses that the context is always situational and thus related to the specific and concrete phenomenon under study. Hence, reading signs becomes an enterprise...... is through an empirical analysis to show how a combination of elements from Ginzburg´s clues article, a sociology of translation and conceptual history contribute to the study of messiness....

  6. "The Root is Hidden and the Material Uncertain": the challenges of prosecuting witchcraft in early modern Venice.

    Science.gov (United States)

    Seitz, Jonathan

    2009-01-01

    The rich archival records of the Holy Office of the Inquisition in Venice have yielded much information about early modern society and culture. The transcripts of witchcraft trials held before the Inquisition reveal the complexities of early modern conceptions of natural and supernatural. The tribunal found itself entirely unable to convict individuals charged with performing harmful magic, or maleficio, as different worldviews clashed in the courtroom. Physicians, exorcists, and inquisitors all had different approaches to distinguishing natural phenomena from supernatural, and without a consensus guilty verdicts could not be obtained.

  7. The hidden truths of the belly: the uncertainties of pregnancy in early modern Europe. (Society for the Social History of Medicine Student Prize Essay 1999, runner-up.).

    Science.gov (United States)

    McClive, Cathy

    2002-08-01

    For early modern men and women and their medical practitioners, the experience and understanding of pregnancy was primarily uncertain. This uncertainty extended to the whole process of pregnancy--from the moment of conception to delivery, the detection and bearing of a 'true fruit' was doubtful. This 'uncertainty' was heightened by the fact that both body and language could conceal the truth. The woman herself was frequently uncertain and could be mistaken in her interpretation of the condition of her belly. This ambiguity is expressed in the vague and faltering language used to describe such experiences. Women's bodies were believed to conceal the truth more readily than their male counterparts. Equally a woman's physical narrative was more likely to be distrusted. Tensions surrounding the appropriate nature of women's 'knowledge' of such hidden 'secrets' also affected the ways in which women and their practitioners described the 'truths' of the belly. This article traces the ambiguities faced by women and their midwives/accoucheurs through three areas of pregnancy: quickening, false conceptions, and the threat of miscarriage. The much-neglected source of medical texts and observations is drawn upon, alongside letters and diaries and judicial material.

  8. Unraveling Parkinson's: Three Clues

    Science.gov (United States)

    ... to find fascinating new clues. Free radicals: One theory holds that free radicals—unstable and potentially damaging ... such as a pesticide or a toxin. This theory is based on the fact that a number ...

  9. Pornography classification: The hidden clues in video space-time.

    Science.gov (United States)

    Moreira, Daniel; Avila, Sandra; Perez, Mauricio; Moraes, Daniel; Testoni, Vanessa; Valle, Eduardo; Goldenstein, Siome; Rocha, Anderson

    2016-11-01

    As web technologies and social networks become part of the general public's life, the problem of automatically detecting pornography is into every parent's mind - nobody feels completely safe when their children go online. In this paper, we focus on video-pornography classification, a hard problem in which traditional methods often employ still-image techniques - labeling frames individually prior to a global decision. Frame-based approaches, however, ignore significant cogent information brought by motion. Here, we introduce a space-temporal interest point detector and descriptor called Temporal Robust Features (TRoF). TRoF was custom-tailored for efficient (low processing time and memory footprint) and effective (high classification accuracy and low false negative rate) motion description, particularly suited to the task at hand. We aggregate local information extracted by TRoF into a mid-level representation using Fisher Vectors, the state-of-the-art model of Bags of Visual Words (BoVW). We evaluate our original strategy, contrasting it both to commercial pornography detection solutions, and to BoVW solutions based upon other space-temporal features from the scientific literature. The performance is assessed using the Pornography-2k dataset, a new challenging pornographic benchmark, comprising 2000 web videos and 140h of video footage. The dataset is also a contribution of this work and is very assorted, including both professional and amateur content, and it depicts several genres of pornography, from cartoon to live action, with diverse behavior and ethnicity. The best approach, based on a dense application of TRoF, yields a classification error reduction of almost 79% when compared to the best commercial classifier. A sparse description relying on TRoF detector is also noteworthy, for yielding a classification error reduction of over 69%, with 19× less memory footprint than the dense solution, and yet can also be implemented to meet real-time requirements.

  10. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main...... the ill parent. These findings contribute to a deeper understanding of the traumatic process of parental ABI that some children experience and emphasize the importance of family-centred interventions that include the children....

  11. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  12. Development of the Contact Lens User Experience: CLUE Scales.

    Science.gov (United States)

    Wirth, R J; Edwards, Michael C; Henderson, Michael; Henderson, Terri; Olivares, Giovanna; Houts, Carrie R

    2016-08-01

    The field of optometry has become increasingly interested in patient-reported outcomes, reflecting a common trend occurring across the spectrum of healthcare. This article reviews the development of the Contact Lens User Experience: CLUE system designed to assess patient evaluations of contact lenses. CLUE was built using modern psychometric methods such as factor analysis and item response theory. The qualitative process through which relevant domains were identified is outlined as well as the process of creating initial item banks. Psychometric analyses were conducted on the initial item banks and refinements were made to the domains and items. Following this data-driven refinement phase, a second round of data was collected to further refine the items and obtain final item response theory item parameters estimates. Extensive qualitative work identified three key areas patients consider important when describing their experience with contact lenses. Based on item content and psychometric dimensionality assessments, the developing CLUE instruments were ultimately focused around four domains: comfort, vision, handling, and packaging. Item response theory parameters were estimated for the CLUE item banks (377 items), and the resulting scales were found to provide precise and reliable assignment of scores detailing users' subjective experiences with contact lenses. The CLUE family of instruments, as it currently exists, exhibits excellent psychometric properties.

  13. 现代政治经济学重大前沿问题的理论线索与研究思路%Theoretical Clues and Research Ideas of Major Frontier Issues in Modern Political Economics

    Institute of Scientific and Technical Information of China (English)

    马艳; 王宝珠

    2016-01-01

    文章围绕现代政治经济学若干重大理论问题,诸如联合生产的“负价值”、商品价值量变动规律、价值转形、平均利润率下降规律、经济长波、公平与效率、国际不平等交换以及虚拟经济与虚拟价值等问题进行了理论梳理。在这一基础上沿着这些理论争论的关节点,对价值理论的新理论、经济增长与经济周期、收入分配和国际交换不平等性、虚拟价值的宏观经济框架及其应用四大方面,将国内外学术界关于这些问题跨世纪的挑战与辩护的核心点进行了概括与总结,并同时进行了新的思考与探讨。就价值理论的新理论而言,我们针对“斯蒂德曼诘难”,提出了环境领域“负价值”理论;为回应“世纪之谜”,探析了竞争与垄断、同类异质商品和联合生产背景下商品价值量变动规律;面对转形问题“百年之争”的“盲人摸象”,进行了动态转形模型的实例演示。就经济增长与经济周期而言,为批判“置盐定理”,建立了技术与制度有机构成理论模型(TICC );在对三大长波理论进行比较的基础上,建立了基于技术力、制度力、耦合力的长波理论。就收入分配和国际交换不平等性而言,针对我国收入分配的“倒逆”现象,将机会不平等纳入马克思主义收入分配理论框架之内进行理论分析;根据国际经济三大领域中国际不平等交换的新变化,提出了国际不平等交融理论。就虚拟价值与虚拟经济而言,构建了虚拟经济理论模型,并将其应用到“互联网+”和“比特币”以及“新媒体”等若干领域。%This paper focuses on several major theoretical problems of modern political eco-nomics ,such as“negative value”of joint production ,the law of changes in commodity value ,the transformation of values ,the law of the decline in average margin ,economic long waves

  14. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression wher...

  15. Entanglement without hidden nonlocality

    Science.gov (United States)

    Hirsch, Flavien; Túlio Quintino, Marco; Bowles, Joseph; Vértesi, Tamás; Brunner, Nicolas

    2016-11-01

    We consider Bell tests in which the distant observers can perform local filtering before testing a Bell inequality. Notably, in this setup, certain entangled states admitting a local hidden variable model in the standard Bell scenario can nevertheless violate a Bell inequality after filtering, displaying so-called hidden nonlocality. Here we ask whether all entangled states can violate a Bell inequality after well-chosen local filtering. We answer this question in the negative by showing that there exist entangled states without hidden nonlocality. Specifically, we prove that some two-qubit Werner states still admit a local hidden variable model after any possible local filtering on a single copy of the state.

  16. Clues to occult cancer in patients with ischemic stroke.

    Directory of Open Access Journals (Sweden)

    Suk Jae Kim

    Full Text Available BACKGROUND: We hypothesized that hidden malignancy could be detected in patients with cryptogenic stroke without active cancer when they showed the distinctive characteristics of cancer-related stroke. METHODS AND FINDINGS: Among 2,562 consecutive patients with acute ischemic stroke, patients with cryptogenic stroke were analyzed and categorized into two groups according to the presence of active cancer: cryptogenic stroke with active cancer (cancer-related stroke, CA-stroke group and without active cancer (CR-stroke group. Patients with active lung cancer without stroke were also recruited for comparison purposes (CA-control. Clinical factors, lesion patterns on diffusion-weighted MRI (DWI, and laboratory findings were analyzed among groups. A total of 348 patients with cryptogenic stroke were enrolled in this study. Among them, 71 (20.4% patients had active cancer at the time of stroke. The D-dimer levels were significantly higher in patients with CA-stroke than those with CR-stroke or CA-control (both p<0.001. Regarding lesion patterns, patients with CA-stroke mostly had multiple lesions in multiple vascular territories, while more than 80% of patients with CR-stroke had single/multiple lesions in a single vascular territory (P<0.001. D-dimer levels (OR 1.11 per 1 µg/mL increase; 95% CI 1.06-1.15; P<0.001 and DWI lesion patterns (OR 7.13; 95% CI 3.42-14.87; P<0.001 were independently associated with CA-stroke. Workup for hidden malignancy was performed during hospitalization in 10 patients who showed elevated D-dimer levels and multiple infarcts involving multiple vascular territories but had no known cancer, and it revealed hidden malignancies in all the patients. CONCLUSION: Patients with CA-stroke have distinctive D-dimer levels and lesion patterns. These characteristics can serve as clues to occult cancer in patients with cryptogenic stroke.

  17. Hidden circuits and argumentation

    Science.gov (United States)

    Leinonen, Risto; Kesonen, Mikko H. P.; Hirvonen, Pekka E.

    2016-11-01

    Despite the relevance of DC circuits in everyday life and schools, they have been shown to cause numerous learning difficulties at various school levels. In the course of this article, we present a flexible method for teaching DC circuits at lower secondary level. The method is labelled as hidden circuits, and the essential idea underlying hidden circuits is in hiding the actual wiring of DC circuits, but to make their behaviour evident for pupils. Pupils are expected to find out the wiring of the circuit which should enhance their learning of DC circuits. We present two possible ways to utilise hidden circuits in a classroom. First, they can be used to test and enhance pupils’ conceptual understanding when pupils are expected to find out which one of the offered circuit diagram options corresponds to the actual circuit shown. This method aims to get pupils to evaluate the circuits holistically rather than locally, and as a part of that aim this method highlights any learning difficulties of pupils. Second, hidden circuits can be used to enhance pupils’ argumentation skills with the aid of argumentation sheet that illustrates the main elements of an argument. Based on the findings from our co-operating teachers and our own experiences, hidden circuits offer a flexible and motivating way to supplement teaching of DC circuits.

  18. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  19. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  20. Solar Hidden Photon Search

    CERN Document Server

    Schwarz, Matthias; Redondo, Javier; Ringwald, Andreas; Wiedemann, Guenter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope.

  1. Solar Hidden Photon Search

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Max-Planck-Institut fuer Physik und Astrophysik, Muenchen (Germany)

    2011-11-15

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope. (orig.)

  2. Ancient Magnetic Reversals: Clues to the Geodynamo.

    Science.gov (United States)

    Hoffman, Kenneth A.

    1988-01-01

    Discusses the question posed by some that the earth's magnetic field may reverse. States that rocks magnetized by ancient fields may offer clues to the underlying reversal mechanism in the earth's core. (TW)

  3. Scientists Discover More Clues to Stuttering

    Science.gov (United States)

    ... fullstory_162368.html Scientists Discover More Clues to Stuttering MRI shows involvement of brain areas controlling speech, ... speech, attention and emotion are all linked to stuttering. Stuttering is characterized by involuntarily repeating certain sounds, ...

  4. Modeling the spatial dynamics of regional land use: the clue-s model

    NARCIS (Netherlands)

    Verburg, P.H.; Soepboer, W.; Veldkamp, A.; Limpiada, R.; Espaldon, V.; Mastura, S.S.A.

    2002-01-01

    Land-use change models are important tools for integrated environmental management. Through scenario analysis they can help to identify near-future critical locations in the face of environmental change. A dynamic, spatially explicit, land-use change model is presented for the regional scale: CLUE-S

  5. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  6. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  7. Hidden variables and hidden time in quantum theory

    OpenAIRE

    Kurakin, Pavel V.

    2005-01-01

    Bell's theorem proves only that hidden variables evolving in true physical time can't exist; still the theorem's meaning is usually interpreted intolerably wide. The concept of hidden time (and, in general, hidden space-time) is introduced. Such concept provides a whole new class of physical theories, fully compatible with current knowledge, but giving new tremendous possibilities. Those theories do not violate Bell's theorem.

  8. Using textual clues to improve metaphor processing

    CERN Document Server

    Ferrari, S

    1996-01-01

    In this paper, we propose a textual clue approach to help metaphor detection, in order to improve the semantic processing of this figure. The previous works in the domain studied the semantic regularities only, overlooking an obvious set of regularities. A corpus-based analysis shows the existence of surface regularities related to metaphors. These clues can be characterized by syntactic structures and lexical markers. We present an object oriented model for representing the textual clues that were found. This representation is designed to help the choice of a semantic processing, in terms of possible non-literal meanings. A prototype implementing this model is currently under development, within an incremental approach allowing step-by-step evaluations. AUPELF-UREF (Francophone Agency For Education and Research)}

  9. Herculaneum: Clues to Vesuvius eruption

    Science.gov (United States)

    Richman, Barbara T.

    More than 80 skeletons have been unearthed in the ancient Mediterranean town of Herculaneum, west of Italy's Mount Vesuvius. This anthropological find corroborates a reinterpretation by three University of Rhode Island scientists of the sequence of the August A.D. 79 eruption of Vesuvius. In addition, the discovery is the first proof that large numbers of people perished as they tried to flee from the eruption, estimated to have been about 10 times more powerful than the May 1980 Mount St. Helens blast.‘Who says dead men don't talk? Their bones have something to say about them and their everyday lives,’ says Sara C. Bisel, a physical anthropologist who analyzed the skeletons. Among the remains are a cluster of skeletons from six adults, four children, and two infants trying to shield themselves from the volcanic onslaught; the skeleton of a sailor, still clutching an oar, lying on his back beside an 8-m-long capsized boat; a woman whose now bony hand was still graced with gem-encrusted gold rings; and a soldier (see Figure 1). From these and other finds the anthropological team was able to discern that the ancient Romans, on average, were shorter than modern citizens and, judging from the condition of some of the teeth, probably had a low-sugar diet.

  10. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  11. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  12. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  13. Women's hidden transcripts about abortion in Brazil.

    Science.gov (United States)

    Nations, M K; Misago, C; Fonseca, W; Correia, L L; Campbell, O M

    1997-06-01

    Two folk medical conditions, "delayed" (atrasada) and "suspended" (suspendida) menstruation, are described as perceived by poor Brazilian women in Northeast Brazil. Culturally prescribed methods to "regulate" these conditions and provoke menstrual bleeding are also described, including ingesting herbal remedies, patent drugs, and modern pharmaceuticals. The ingestion of such self-administered remedies is facilitated by the cognitive ambiguity, euphemisms, folklore, etc., which surround conception and gestation. The authors argue that the ethnomedical conditions of "delayed" and "suspended" menstruation and subsequent menstrual regulation are part of the "hidden reproductive transcript" of poor and powerless Brazilian women. Through popular culture, they voice their collective dissent to the official, public opinion about the illegality and immorality of induced abortion and the chronic lack of family planning services in Northeast Brazil. While many health professionals consider women's explanations of menstrual regulation as a "cover-up" for self-induced abortions, such popular justifications may represent either an unconscious or artful manipulation of hegemonic, anti-abortion ideology expressed in prudent, unobtrusive and veiled ways. The development of safer abortion alternatives should consider women's hidden reproductive transcripts.

  14. There is no 16-Clue Sudoku: Solving the Sudoku Minimum Number of Clues Problem

    CERN Document Server

    McGuire, Gary; Civario, Gilles

    2012-01-01

    We apply our new hitting set enumeration algorithm to solve the sudoku minimum number of clues problem, which is the following question: What is the smallest number of clues (givens) that a sudoku puzzle may have? It was conjectured that the answer is 17. We have performed an exhaustive search for a 16-clue sudoku puzzle, and we did not find one, thereby proving that the answer is indeed 17. This article describes our method and the actual search. The hitting set problem is computationally hard; it is one of Karp's twenty-one classic NP-complete problems. We have designed a new algorithm that allows us to efficiently enumerate hitting sets of a suitable size. Hitting set problems have applications in many areas of science, such as bioinformatics and software testing.

  15. Modernity after Modernity

    Directory of Open Access Journals (Sweden)

    Marin Dinu

    2007-08-01

    Full Text Available A strategy for the second modernization raises, beyond objectives, a series of epistemicresponsibilities. It is known that modernization stemming from the Enlightment had, among other things,the pretense that it is a project which is self-legitimating. Its profound rationales are the only justification.Referential self-centering proved to be the one that made possible a practice of the new. Modernizationhaving the function of renouncing myth – meaning an eliminatory formula for the past – and thefixation in the opportunity and potentiality of the present, seemed to close an insoluble but extremelyengrossing problem: that of a propensity towards utopia, of the risky escape towards the future. Thetraditionalization of the new constitutes a support for the daring to break out of the captivity of themoment.Modernization becomes the experience of combining the new which, thus, creates a succession ofpresent times. The future is no longer the result of fantasy, but a system’s direct expression to combine thenew. Therefore the future is an option for one or another model of the present, often tested previouslysomewhere else. In a non-metaphysical way, the future can be seen, touched, tried, lived by simplegeographical movement. The sense of evolution has de-temporalized taking the form of the concomitant,parallel, enclosed, neighboring space. We just have to be in the trend, to evolve in the context.Globalization defines the context and its conception – as a project of the second modernity – showsus the trends. The problem is how to understand the context in order to find the sense of the trend. Are wethe load the sense with the values of the first modernity or will we have to turn to the values of anothermodernity? Why do we have to move away from the significance of the processes which made up the firstmodernity? How do we relate to the content of the new context in which the structural trends of today’sworld are taking place? What is the

  16. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  17. Microgenetic analysis of hidden figures

    OpenAIRE

    Marković Slobodan S.; Gvozdenović Vasilije P.

    2006-01-01

    In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenes...

  18. The Hidden Subgroup Problem

    CERN Document Server

    Wang, Frédéric

    2010-01-01

    We give an overview of the Hidden Subgroup Problem (HSP) as of July 2010, including new results discovered since the survey of arXiv:quant-ph/0411037v1. We recall how the problem provides a framework for efficient quantum algorithms and present the standard methods based on coset sampling. We study the Dihedral and Symmetric HSPs and how they relate to hard problems on lattices and graphs. Finally, we conclude with the known solutions and techniques, describe connections with efficient algorithms as well as miscellaneous variants of HSP. We also bring various contributions to the topic. We show that in theory, we can solve HSP over a given group inductively: the base case is solving HSP over its simple factor groups and the inductive step is building efficient oracles over a normal subgroup N and over the factor group G/N. We apply this analysis to the Dedekindian HSP to get an alternative abelian HSP algorithm based on a change of the underlying group. We also propose a quotient reduction by the normal group...

  19. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs. In......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group.......This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  20. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs of offshor...... of our study is to suggest how hidden costs of offshoring can be mitigated through an explicit orientation towards improving organizational processes and structures as well as experience with offshoring.......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  1. Crouching tiger - Hidden payload

    DEFF Research Database (Denmark)

    Heiderich, Mario; Frosch, Tilman; Jensen, Meiko

    2011-01-01

    are circumventable by using SVG files and subsequently propose an approach to mitigate these risks. The paper showcases our research into the usage of SVG images as attack tools, and determines its impact on state-of-the-art web browsers such as Firefox 4, Internet Explorer 9, and Opera 11. © 2011 ACM.......Scalable Vector Graphics (SVG) images so far played a rather small role on the Internet, mainly due to the lack of proper browser support. Recently, things have changed: the W3C and WHATWG draft specifications for HTML5 require modern web browsers to support SVG images to be embedded in a multitude...... several novel attack techniques targeted at major websites, as well as modern browsers, email clients and other comparable tools. In particular, we illustrate that SVG images embedded via tag and CSS can execute arbitrary JavaScript code. We examine and present how current filtering techniques...

  2. Mary Shelley’s Frankenstein, the Guillotine, and Modern Ontological Anxiety

    National Research Council Canada - National Science Library

    Kristen Lacefield

    2016-01-01

    ... Shelley’s characterization of Victor Frankenstein. Given the importance of the guillotine as a powerful metaphor for anxieties emergent during this period, Lacefield employs it as a clue signaling a labyrinth of modern meanings embedded...

  3. Astronomers Gain Clues About Fundamental Physics

    Science.gov (United States)

    2005-12-01

    An international team of astronomers has looked at something very big -- a distant galaxy -- to study the behavior of things very small -- atoms and molecules -- to gain vital clues about the fundamental nature of our entire Universe. The team used the National Science Foundation's Robert C. Byrd Green Bank Telescope (GBT) to test whether the laws of nature have changed over vast spans of cosmic time. The Green Bank Telescope The Robert C. Byrd Green Bank Telescope CREDIT: NRAO/AUI/NSF (Click on image for GBT gallery) "The fundamental constants of physics are expected to remain fixed across space and time; that's why they're called constants! Now, however, new theoretical models for the basic structure of matter indicate that they may change. We're testing these predictions." said Nissim Kanekar, an astronomer at the National Radio Astronomy Observatory (NRAO), in Socorro, New Mexico. So far, the scientists' measurements show no change in the constants. "We've put the most stringent limits yet on some changes in these constants, but that's not the end of the story," said Christopher Carilli, another NRAO astronomer. "This is the exciting frontier where astronomy meets particle physics," Carilli explained. The research can help answer fundamental questions about whether the basic components of matter are tiny particles or tiny vibrating strings, how many dimensions the Universe has, and the nature of "dark energy." The astronomers were looking for changes in two quantities: the ratio of the masses of the electron and the proton, and a number physicists call the fine structure constant, a combination of the electron charge, the speed of light and the Planck constant. These values, considered fundamental physical constants, once were "taken as time independent, with values given once and forever" said German particle physicist Christof Wetterich. However, Wetterich explained, "the viewpoint of modern particle theory has changed in recent years," with ideas such as

  4. Crouching tiger - Hidden payload

    DEFF Research Database (Denmark)

    Heiderich, Mario; Frosch, Tilman; Jensen, Meiko

    2011-01-01

    Scalable Vector Graphics (SVG) images so far played a rather small role on the Internet, mainly due to the lack of proper browser support. Recently, things have changed: the W3C and WHATWG draft specifications for HTML5 require modern web browsers to support SVG images to be embedded in a multitude...... of ways. Now SVG images can be embedded through the classical method via specific tags such as or , or in novel ways, such as with tags, CSS or inline in any HTML5 document. SVG files are generally considered to be plain images or animations, and security-wise, they are being treated...

  5. Hidden Trigger for the Giant Starburst Arc in M 83?

    CERN Document Server

    Díaz, R J; Agüero, M P; Mediavilla, E; Rodrigues, I; Mast, D; Diaz, Ruben J.; Dottori, Horacio; Aguero, Maria P.; Mediavilla, Evencio; Rodrigues, Irapuan; Mast, Damian

    2006-01-01

    The huge star formation events that occur at some galactic centers do not provide enough clues as to their origin, since the morphological signatures of the triggering mechanism are smeared out in the timescale of a few orbital revolutions of the galaxy core. Our high spatial resolution three-dimensional near-infrared spectroscopy for the first time reveals that a previously known hidden mass concentration is located exactly at the youngest end of a giant star-forming arc. This location, the inferred average cluster ages, and the dynamical times clearly indicate that the interloper has left behind a spur of violent star formation in M 83, in a transient event lasting less than one orbital revolution. The study of the origin (bar funneling or cannibalized satellite) and fate (black hole merging or giant stellar cluster) of this system could provide clues to the question of core growing and morphological evolution in grand-design spiral galaxies. In particular, our TreeSPH numerical modeling suggests that the t...

  6. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  7. From epistemology to hidden curriculum: Critical vs. 'commercial' pedagogic perspective

    Directory of Open Access Journals (Sweden)

    Marojević Jovana C.

    2016-01-01

    Full Text Available Knowledge or, more precisely, its power is one of central themes in critical pedagogy. Since they are interested in school as the site of social critique, aimed at social transformations, critically oriented pedagogues pay special attention to the relation of knowledge and power or, to simplify it, the function of knowledge in the reproduction of the existing (often oppressive social relations. Not recognizing school as a mere site of social, economic or cultural preservation, they often study epistemology on which modern school is founded (positivistic epistemology and its hidden curriculum who function so that they legitimate social reproductive function of the school in a continuous cycle of self-justification. Since a certain understanding of knowledge and its function reveals the hidden curriculum of a certain educational philosophy, and since this consequently changes school into a site of social transformation or social transmission, viewed from the critical position this is the subject of the analysis of our paper. By final sublimation and contrasting the opposite positivistic and critical positions we conclude that the hidden curriculum of the first is the curriculum of the soliloquies while the curriculum of the second, critical tendency is entirely of a dialogue nature. It is clear that uni-directedness of the hidden curriculum formed according the postulates of positivistic epistemology can contribute only to positivistic transmission and regeneration of the existing social order, while the discursivity of critically oriented school defines the relation towards society as two-way, transformational, active and emancipatory.

  8. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  9. Hidden Variables or Positive Probabilities?

    CERN Document Server

    Rothman, T; Rothman, Tony

    2001-01-01

    Despite claims that Bell's inequalities are based on the Einstein locality condition, or equivalent, all derivations make an identical mathematical assumption: that local hidden-variable theories produce a set of positive-definite probabilities for detecting a particle with a given spin orientation. The standard argument is that because quantum mechanics assumes that particles are emitted in a superposition of states the theory cannot produce such a set of probabilities. We examine a paper by Eberhard who claims to show that a generalized Bell inequality, the CHSH inequality, can be derived solely on the basis of the locality condition, without recourse to hidden variables. We point out that he nonetheless assumes a set of positive-definite probabilities, which supports the claim that hidden variables or "locality" is not at issue here, positive-definite probabilities are. We demonstrate that quantum mechanics does predict a set of probabilities that violate the CHSH inequality; however these probabilities ar...

  10. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  11. Hidden symmetries in jammed systems

    Science.gov (United States)

    Morse, Peter K.; Corwin, Eric I.

    2016-07-01

    There are deep, but hidden, geometric structures within jammed systems, associated with hidden symmetries. These can be revealed by repeated transformations under which these structures lead to fixed points. These geometric structures can be found in the Voronoi tesselation of space defined by the packing. In this paper we examine two iterative processes: maximum inscribed sphere (MIS) inversion and a real-space coarsening scheme. Under repeated iterations of the MIS inversion process we find invariant systems in which every particle is equal to the maximum inscribed sphere within its Voronoi cell. Using a real-space coarsening scheme we reveal behavior in geometric order parameters which is length-scale invariant.

  12. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  13. Clues to prolific productivity among prominent scientists.

    Science.gov (United States)

    Kantha, S S

    1992-10-01

    In a survey based on the biographical sketches, obituary notes and eulogies of notable scientists, eight were identified as belonging to an elite group, having authored more than 1000 research publications, which include books, monographs and patents. They were, in chronological order, Thomas Alva Edison, Paul Karrer, Margaret Mead, Giulio Natta, Hans Selye, Herbert C Brown, Tetsuji Kametani and Carl Djerassi. Among these, Karrer, Natta and Brown were Nobelists in chemistry. Four criteria which can be identified as clues to their prolific productivity are, 1) enthusiasm for compulsive work and eccentric life style, 2) physical and/or environmental handicap, 3) pioneering efforts in a new research field, and 4) selection of research area, predominantly organic chemistry.

  14. Engineering of Algorithms for Hidden Markov models and Tree Distances

    DEFF Research Database (Denmark)

    Sand, Andreas

    grown exponentially because of drastic improvements in the technology behind DNA and RNA sequencing, and focus on the research field has increased due to its potential to expand our knowledge about biological mechanisms and to improve public health. There has therefore been a continuously growing demand...... of the algorithms to exploit the parallel architecture of modern computers. In this PhD dissertation, I present my work with algorithmic optimizations and parallelizations in primarily two areas in algorithmic bioinformatics: algorithms for analyzing hidden Markov models and algorithms for computing distance...... measures between phylogenetic trees. Hidden Markov models is a class of probabilistic models that is used in a number of core applications in bioinformatics such as modeling of proteins, gene finding and reconstruction of species and population histories. I show how a relatively simple parallelization can...

  15. Modeling Multiple Risks: Hidden Domain of Attraction

    CERN Document Server

    Mitra, Abhimanyu

    2011-01-01

    Hidden regular variation is a sub-model of multivariate regular variation and facilitates accurate estimation of joint tail probabilities. We generalize the model of hidden regular variation to what we call hidden domain of attraction. We exhibit examples that illustrate the need for a more general model and discuss detection and estimation techniques.

  16. Pentaquark states with hidden charm

    Science.gov (United States)

    Bijker, Roelof

    2017-07-01

    I develop an extension of the usual three-flavor quark model to four flavors (u, d, s and c), and discuss the classification of pentaquark states with hidden charm. This work is motivated by the recent observation of such states by the LHCb Collatoration at CERN.

  17. Microgenetic analysis of hidden figures

    Directory of Open Access Journals (Sweden)

    Marković Slobodan S.

    2006-01-01

    Full Text Available In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenesis of the perception of hidden figures was investigated. The primed matching paradigm and the same-different task were used. In each experiment two types of test figures were contrasted: the more frequent and the less frequent ones. There were two prime types: identical (equal to test figures and complex (the pattern with hidden test figures. The prime duration was varied, 50 ms and 400 ms. The main result indicates that in the case of complex priming the more frequent test figures were processed significantly faster than the less frequent ones in both prime duration conditions. These results suggest that the faster the processing of a figure, the more probable the perceptual generation of this figure.

  18. Nonintentional behavioural responses to psi : hidden targets and hidden observers

    OpenAIRE

    Anderson, Mary-Jane Charlotte

    2012-01-01

    Psi is the phenomenon of apparently responding to or receiving information by means other than the recognised senses. Psi information may influence human behaviour, without the individual intending this or even being aware of it. This thesis seeks to investigate nonintentional behavioural responses to psi. We present five empirical studies that investigated nonintentional behavioural responses to psi information. In each study, the psi information was hidden from participants, ...

  19. Ophthalmic clues to the endocrine disorders.

    Science.gov (United States)

    Liu, Z; Chen, Y; Lin, Z; Shi, X

    2017-01-01

    Eye is a vital sense organ and reflects the physical and mental wellbeing of a person. Detailed examination of the eye is an essential part in the clinical evaluation of patients with any systemic disorder. The interaction between ophthalmologists and endocrinologists is often limited to Graves' ophthalmopathy and diabetic retinopathy. However, there are many ophthalmic manifestations, which are characteristically seen in endocrine disorders. In this review, we shall discuss the ocular manifestations of the endocrine syndromes excluding the Graves' ophthalmopathy and diabetic retinopathy. We performed a PubMed search of articles published in English showing the ophthalmic features in the endocrine disorders. Relevant cited articles were also retrieved. Most of the publications included in the review were case reports and review articles. Many endocrine disorders have characteristic manifestations pertaining to the various structures of the eye. The involvement is seen from the external structures of the eye to the inner most layers of the retina. Many ocular-endocrine syndromes also exist with characteristic clues to the clinical diagnosis. The endocrinologists need to be aware of these ocular signs that help in the early diagnosis of the underlying disorder. A syndromic approach is essential in the diagnosis of endocrinopathy in patients presenting with ophthalmic features.

  20. Hidden attraction the history and mystery of magnetism

    CERN Document Server

    Verschuur, Gerrit L

    1993-01-01

    Long one of nature's most fascinating phenomena, magnetism was once the subject of many superstitions. Magnets were thought useful to thieves, effective as a love potion or as a cure for gout or spasms. They could remove sorcery from women and put demons to flight and even reconcile married couples. It was said that a lodestone pickled in the salt of sucking fish had the power to attract gold. Today, these beliefs have been put aside, but magnetism is no less remarkable for our modern understanding of it. In Hidden Attraction, Gerrit L. Verschuur, a noted astronomer and National Book Award nom

  1. Modernity: Are Modern Times Different?

    Directory of Open Access Journals (Sweden)

    Lynn Hunt

    2014-12-01

    Full Text Available “Modernity” has recently been the subject of considerable discussion among historians. This article reviews some of the debates and argues that modernity is a problematic concept because it implies a complete rupture with “traditional” ways of life. Studies of key terms are undertaken with the aid of Google Ngrams. These show that “modernity,” “modern times,” and “traditional” —in English and other languages— have a history of their own. A brief analysis of the shift from a self oriented toward equilibrium to a self oriented toward stimulation demonstrates that modernity is not necessary to historical analysis.

  2. 'Groundbreaking' Research Offers Clues to Cause of Dyslexia

    Science.gov (United States)

    ... html 'Groundbreaking' Research Offers Clues to Cause of Dyslexia Brain scans revealed that those with the reading ... 2016 (HealthDay News) -- People with the reading disability dyslexia may have brain differences that are surprisingly wide- ...

  3. Animal Research Yields Clues to Sexual Spread of Zika

    Science.gov (United States)

    ... Animal Research Yields Clues to Sexual Spread of Zika Researchers think vaginal fluid may be ideal breeding ... in mice may offer insight into how the Zika virus is transmitted sexually and affects a fetus. ...

  4. Germs on Smartphones Yield Clues to Owners' Lifestyles

    Science.gov (United States)

    ... medlineplus.gov/news/fullstory_162015.html Germs on Smartphones Yield Clues to Owners' Lifestyles Personal molecules are ... By analyzing chemicals, molecules and germs on people's smartphones, researchers say they were able to get a ...

  5. Astronaut Twins Give Clues to Health Hazards of Spaceflight

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_163391.html Astronaut Twins Give Clues to Health Hazards of Spaceflight NASA ... aboard the International Space Station, and his identical twin Mark, a retired astronaut. Mark remained on Earth ...

  6. New Clues to Age-Related Hearing Loss

    Science.gov (United States)

    ... fullstory_161359.html New Clues to Age-Related Hearing Loss Older people's brains have a harder time processing ... conversation, many older people chalk it up to hearing loss. But a new, small study finds that the ...

  7. Picking up Clues from the Discard Pile

    Science.gov (United States)

    2008-01-01

    As NASA's Phoenix Mars Lander excavates trenches, it also builds piles with most of the material scooped from the holes. The piles, like this one called 'Caterpillar,' provide researchers some information about the soil. On Aug. 24, 2008, during the late afternoon of the 88th Martian day after landing, Phoenix's Surface Stereo Imager took separate exposures through red, green and blue filters that have been combined into this approximately true-color image. This conical pile of soil is about 10 centimeters (4 inches) tall. The sources of material that the robotic arm has dropped onto the Caterpillar pile have included the 'Dodo' and ''Upper Cupboard' trenches and, more recently, the deeper 'Stone Soup' trench. Observations of the pile provide information, such as the slope of the cone and the textures of the soil, that helps scientists understand properties of material excavated from the trenches. For the Stone Soup trench in particular, which is about 18 centimeters (7 inches) deep, the bottom of the trench is in shadow and more difficult to observe than other trenches that Phoenix has dug. The Phoenix team obtained spectral clues about the composition of material from the bottom of Stone Soup by photographing Caterpillar through 15 different filters of the Surface Stereo Imager when the pile was covered in freshly excavated material from the trench. The spectral observation did not produce any sign of water-ice, just typical soil for the site. However, the bigger clumps do show a platy texture that could be consistent with elevated concentration of salts in the soil from deep in Stone Soup. The team chose that location as the source for a soil sample to be analyzed in the lander's wet chemistry laboratory, which can identify soluble salts in the soil. The Phoenix Mission is led by the University of Arizona, Tucson, on behalf of NASA. Project management of the mission is by NASA's Jet Propulsion Laboratory, Pasadena, Calif. Spacecraft development is by Lockheed

  8. Modern algebra

    CERN Document Server

    Warner, Seth

    1990-01-01

    Standard text provides an exceptionally comprehensive treatment of every aspect of modern algebra. Explores algebraic structures, rings and fields, vector spaces, polynomials, linear operators, much more. Over 1,300 exercises. 1965 edition.

  9. Behavioural Modernity

    OpenAIRE

    McLean, Laura

    2015-01-01

    Behavioural Modernity explores the changing politics of representation and ethics of care in curatorial practice, necessitated by an increasing blurring of boundaries between the human, the technological, and the planetary.

  10. Modernity's Prometheus.

    Science.gov (United States)

    Morris, Richard

    1993-01-01

    Argues for reframing and reforging the relationship between text and context. Argues that the silences that modernity's tribute to text invites are grotesque, untenable, and fundamentally anti-intellectual. (SR)

  11. Modernity's Prometheus.

    Science.gov (United States)

    Morris, Richard

    1993-01-01

    Argues for reframing and reforging the relationship between text and context. Argues that the silences that modernity's tribute to text invites are grotesque, untenable, and fundamentally anti-intellectual. (SR)

  12. On quantum algorithms for noncommutative hidden subgroups

    Energy Technology Data Exchange (ETDEWEB)

    Ettinger, M. [Los Alamos National Lab., NM (United States); Hoeyer, P. [Odense Univ. (Denmark)

    1998-12-01

    Quantum algorithms for factoring and discrete logarithm have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the possibility of extending this general viewpoint to finding hidden subgroups of noncommutative groups. The authors present a quantum algorithm for the special case of dihedral groups which determines the hidden subgroup in a linear number of calls to the input function. They also explore the difficulties of developing an algorithm to process the data to explicitly calculate a generating set for the subgroup. A general framework for the noncommutative hidden subgroup problem is discussed and they indicate future research directions.

  13. Dynamic modelling of future land-use change: a comparison between CLUE-S and Dinamica EGO models

    Science.gov (United States)

    Yi, Wei; Gao, Zhiqiang; Chen, Maosi

    2012-10-01

    Land-use and land-cover change has been a research focus in global environmental change. Recent research found that land-use change could influence the structure of biogeochemical spheres as well as material and energy recycle directly or indirectly. Land-use dynamic models are considered as an effective technique to study the processes of land-use modification. The objective of this paper is to compare two widely use land-use dynamic models, CLUE-S and Dinamica EGO, from the perspective of land-use change amount, spatial characteristics, and their utility. A case study was conducted to examine the ascendants of each model and Kappa coefficient was used to compare the simulation accuracy. The modelling experiments reflected that the predictions of land-use change based on CLUE-S and Dinamica EGO matched broadly with actual situation. CLUE-S was better in overall accuracy whereas the Markov process in Dinamica EGO could precisely predict the amount of land-use change. Moreover, the spatial pattern of simulation map based on Dinamica EGO was more consistent with empirical result. Both results indicate their possible further applicability for forecasting future land-use change and corresponding studies.

  14. Prediction of protein binding sites in protein structures using hidden Markov support vector machine

    Directory of Open Access Journals (Sweden)

    Lin Lei

    2009-11-01

    Full Text Available Abstract Background Predicting the binding sites between two interacting proteins provides important clues to the function of a protein. Recent research on protein binding site prediction has been mainly based on widely known machine learning techniques, such as artificial neural networks, support vector machines, conditional random field, etc. However, the prediction performance is still too low to be used in practice. It is necessary to explore new algorithms, theories and features to further improve the performance. Results In this study, we introduce a novel machine learning model hidden Markov support vector machine for protein binding site prediction. The model treats the protein binding site prediction as a sequential labelling task based on the maximum margin criterion. Common features derived from protein sequences and structures, including protein sequence profile and residue accessible surface area, are used to train hidden Markov support vector machine. When tested on six data sets, the method based on hidden Markov support vector machine shows better performance than some state-of-the-art methods, including artificial neural networks, support vector machines and conditional random field. Furthermore, its running time is several orders of magnitude shorter than that of the compared methods. Conclusion The improved prediction performance and computational efficiency of the method based on hidden Markov support vector machine can be attributed to the following three factors. Firstly, the relation between labels of neighbouring residues is useful for protein binding site prediction. Secondly, the kernel trick is very advantageous to this field. Thirdly, the complexity of the training step for hidden Markov support vector machine is linear with the number of training samples by using the cutting-plane algorithm.

  15. Ultrasonographic clues for diagnosis of spina bifida occulta in children.

    Science.gov (United States)

    Cakmakci, Emin; Cinar, Hasibe Gokce; Uner, Cigdem; Ucan, Berna; Eksioglu, Ayse Secil; Pala, Melek; Yildiz, Yasemin Tasci; Cakmakci, Selma; Yikmaz, Hulya Seker

    2016-10-01

    The aim of the current study was to find out if spinal ultrasonography might have a predictive potential for detection of spina bifida occulta (SBO) in pediatric nocturnal enuresis patients. A total of 108 children (58 females, 50 males) with a mean age of 8 (range, 6-15) years diagnosed for nocturnal enuresis in our tertiary care center were included in this cross-sectional analysis. Half of the cases (n=54, 50%) were found to have SBO, while the other half did not have SBO. After obtaining radiographs and computed tomography examinations of L5-S1 vertebra, patients were examined by spinal ultrasound regarding radiologic clues which may aid in the detection of SBO. The clues of "single and double echogeneous cap signs and the V-shaped tip of spine" were found useful for diagnosing SBO at levels of L5 and S1 in pediatric patients suspected for SBO. Receiver operating curve (ROC) curve analysis of CT and ultrasonographic clues for diagnosis of SBO on S1 level revealed that these clues yielded a comparable diagnostic accuracy to CT. Areas under curve for CT and studied ultrasonographic clues were are 0.667±0.053 and 0.907±0.032 (Pbifida. However, to implement our ultrasonographic criteria in routine radiological practice, further studies in larger series are warranted.

  16. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  17. Estimating an Activity Driven Hidden Markov Model

    OpenAIRE

    Meyer, David A.; Shakeel, Asif

    2015-01-01

    We define a Hidden Markov Model (HMM) in which each hidden state has time-dependent $\\textit{activity levels}$ that drive transitions and emissions, and show how to estimate its parameters. Our construction is motivated by the problem of inferring human mobility on sub-daily time scales from, for example, mobile phone records.

  18. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  19. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  20. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  1. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  2. Hidden Web信息获取

    Institute of Scientific and Technical Information of China (English)

    陈珂; 陈小英; 徐科

    2007-01-01

    如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词.由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面.然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值.文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息.

  3. Montreal Modern

    DEFF Research Database (Denmark)

    Handberg, Kristian

    2015-01-01

    Through analyses of the retro scenes in Montreal, Canada, the article discusses retro culture’s role as cultural memory. It is shown how Montreal’s cultural identity is formed by memories of modern culture such as the Red-light and Sin City reputation of the illicit nightlife of the 1940s and 1950s...

  4. Modern Spectroscopy

    Science.gov (United States)

    Barrow, Gordon M.

    1970-01-01

    Presents the basic ideas of modern spectroscopy. Both the angular momenta and wave-nature approaches to the determination of energy level patterns for atomic and molecular systems are discussed. The interpretation of spectra, based on atomic and molecular models, is considered. (LC)

  5. Italian Modernities

    DEFF Research Database (Denmark)

    Thomassen, Bjørn; Forlenza, Rosario

    assumptions that have substituted for thought and that have perpetuated prejudices both within and outside Italy’s borders. Grounded in meticulous historical and ethnological research, Italian Modernities deserves as wide an audience as its scholarship is deep.” (Michael Herzfeld, Ernest E. Monrad Professor...

  6. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...

  7. Hidden scale in quantum mechanics

    CERN Document Server

    Giri, Pulak Ranjan

    2007-01-01

    We show that the intriguing localization of a free particle wave-packet is possible due to a hidden scale present in the system. Self-adjoint extensions (SAE) is responsible for introducing this scale in quantum mechanical models through the nontrivial boundary conditions. We discuss a couple of classically scale invariant free particle systems to illustrate the issue. In this context it has been shown that a free quantum particle moving on a full line may have localized wave-packet around the origin. As a generalization, it has also been shown that particles moving on a portion of a plane or on a portion of a three dimensional space can have unusual localized wave-packet.

  8. SU Lyncis, a hard X-ray bright M giant: Clues point to a large hidden population of symbiotic stars

    CERN Document Server

    Mukai, K; Cusumano, G; Segreto, A; Munari, U; Sokoloski, J L; Lucy, A B; Nelson, T; Nunez, N E

    2016-01-01

    Symbiotic star surveys have traditionally relied almost exclusively on low resolution optical spectroscopy. However, we can obtain a more reliable estimate of their total Galactic population by using all available signatures of the symbiotic phenomenon. Here we report the discovery of a hard X-ray source, 4PBC J0642.9+5528, in the Swift hard X-ray all-sky survey, and identify it with a poorly studied red giant, SU Lyn, using pointed Swift observations and ground-based optical spectroscopy. The X-ray spectrum, the optical to UV spectrum, and the rapid UV variability of SU Lyn are all consistent with our interpretation that it is a symbiotic star containing an accreting white dwarf. The symbiotic nature of SU Lyn went unnoticed until now, because it does not exhibit emission lines strong enough to be obvious in low resolution spectra. We argue that symbiotic stars without shell-burning have weak emission lines, and that the current lists of symbiotic stars are biased in favor of shell-burning systems. We conclu...

  9. SU Lyncis, a Hard X-Ray Bright M Giant: Clues Point to a Large Hidden Population of Symbiotic Stars

    Science.gov (United States)

    Mukai, K.; Luna, G. J. M.; Cusumano, G.; Segreto, A.; Munari, U.; Sokoloski, J. L.; Lucy, A. B.; Nelson, T.; Nunez, N. E.

    2016-01-01

    Symbiotic star surveys have traditionally relied almost exclusively on low resolution optical spectroscopy. However, we can obtain amore reliable estimate of their total Galactic population by using all available signatures of the symbiotic phenomenon. Here we report the discovery of a hard X-ray source, 4PBC J0642.9+5528, in the Swift hard X-ray all-sky survey, and identify it with a poorly studied red giant, SU Lyn, using pointed Swift observations and ground-based optical spectroscopy. The X-ray spectrum, the optical to UV spectrum, and the rapid UV variability of SU Lyn are all consistent with our interpretation that it is a symbiotic star containing an accreting white dwarf. The symbiotic nature of SU Lyn went unnoticed until now, because it does not exhibit emission lines strong enough to be obvious in low resolution spectra. We argue that symbiotic stars without shell-burning have weak emission lines, and that the current lists of symbiotic stars are biased in favour of shell-burning systems. We conclude that the true population of symbiotic stars has been underestimated, potentially by a large factor.

  10. Modern maths

    CERN Document Server

    Thom,R

    1974-01-01

    Le Prof. R. Thom expose ses vues sur l'enseignement des mathématiques modernes et des mathémathiques de toujours. Il est un grand mathématicien et était professeur à Strasbourg; maintenant il est professeur de hautes études scientifiques et était invité par le Prof. Piaget à Genève

  11. Cyberspace modernization :

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M.; McLane, Victor N.

    2014-07-01

    A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internet of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.

  12. Hidden torsion, 3-manifolds, and homology cobordism

    CERN Document Server

    Cha, Jae Choon

    2011-01-01

    This paper continues our exploration of homology cobordism of 3-manifolds using our recent results on Cheeger-Gromov rho-invariants associated to amenable representations. We introduce a new type of torsion in 3-manifold groups we call hidden torsion, and an algebraic approximation we call local hidden torsion. We construct infinitely many hyperbolic 3-manifolds which have local hidden torsion in the transfinite lower central subgroup. By realizing Cheeger-Gromov invariants over amenable groups, we show that our hyperbolic 3-manifolds are not pairwise homology cobordant, yet remain indistinguishable by any prior known homology cobordism invariants.

  13. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  14. Visible Effects of Invisible Hidden Valley Radiation

    CERN Document Server

    Carloni, Lisa

    2010-01-01

    Assuming there is a new gauge group in a Hidden Valley, and a new type of radiation, can we observe it through its effect on the kinematic distributions of recoiling visible particles? Specifically, what are the collider signatures of radiation in a hidden sector? We address these questions using a generic SU(N)-like Hidden Valley model that we implement in Pythia. We find that in both the e+e- and the LHC cases the kinematic distributions of the visible particles can be significantly affected by the valley radiation. Without a proper understanding of such effects, inferred masses of "communicators" and of invisible particles can be substantially off.

  15. NA62: Hidden Sector Physics

    CERN Document Server

    Cesarotti, Carissa Joyce

    2016-01-01

    Modern experimental physics is often probing for new physics by either finding deviations from predictions on extremely precise measurements, or by looking for a new signal that cannot be explained with existing models. The NA62 experiment at CERN does the former by measuring the ultra-rare decay $K^+ \\rightarrow \\pi^+ \

  16. Genital ulcer as a new clinical clue to PFAPA syndrome.

    Science.gov (United States)

    Scattoni, R; Verrotti, A; Rinaldi, V E; Paglino, A; Carelli, A; D'Alonzo, R

    2015-04-01

    Vaginal ulcers can be associated with a number of different diseases. We describe two girls who presented genital ulcers as a persistent symptom of PFAPA (periodic fever, aphthous stomatitis, pharyngitis, cervical adenitis) syndrome. The possibility of considering this clinical manifestation as a clue for the diagnosis of PFAPA is discussed. © 2014 British Association of Dermatologists.

  17. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  18. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  19. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  20. Faddeev-Jackiw approach to hidden symmetries

    CERN Document Server

    Wotzasek, C

    1994-01-01

    The study of hidden symmetries within Dirac's formalism does not possess a systematic procedure due to the lack of first-class constraints to act as symmetry generators. On the other hand, in the Faddeev-Jackiw approach, gauge and reparametrization symmetries are generated by the null eigenvectors of the sympletic matrix and not by constraints, suggesting the possibility of dealing systematically with hidden symmetries through this formalism. It is shown in this paper that indeed hidden symmetries of noninvariant or gauge fixed systems are equally well described by null eigenvectors of the sympletic matrix, just as the explicit invariances. The Faddeev-Jackiw approach therefore provide a systematic algorithm for treating all sorts of symmetries in an unified way. This technique is illustrated here by the SL(2,R) Kac-Moody current algebra of the 2-D induced gravity proposed by Polyakov, which is a hidden symmetry in the canonical approach of constrained systems via Dirac's method, after conformal and reparamet...

  1. Fibroid Tumors in Women: A Hidden Epidemic?

    Science.gov (United States)

    ... Issue Past Issues Fibroid Tumors in Women: A Hidden Epidemic? Past Issues / Spring 2007 Table of Contents ... fibroids@rics.bwh.harvard.edu , or visit our Web site: www.fibroids.net . You may also write ...

  2. Hidden Regular Variation: Detection and Estimation

    CERN Document Server

    Mitra, Abhimanyu

    2010-01-01

    Hidden regular variation defines a subfamily of distributions satisfying multivariate regular variation on $\\mathbb{E} = [0, \\infty]^d \\backslash \\{(0,0, ..., 0) \\} $ and models another regular variation on the sub-cone $\\mathbb{E}^{(2)} = \\mathbb{E} \\backslash \\cup_{i=1}^d \\mathbb{L}_i$, where $\\mathbb{L}_i$ is the $i$-th axis. We extend the concept of hidden regular variation to sub-cones of $\\mathbb{E}^{(2)}$ as well. We suggest a procedure of detecting the presence of hidden regular variation, and if it exists, propose a method of estimating the limit measure exploiting its semi-parametric structure. We exhibit examples where hidden regular variation yields better estimates of probabilities of risk sets.

  3. Modern plasmonics

    CERN Document Server

    Maradudin, Alexei A; Barnes, William L

    2014-01-01

    Plasmonics is entering the curriculum of many universities, either as a stand alone subject, or as part of some course or courses. Nanotechnology institutes have been, and are being, established in universities, in which plasmonics is a significant topic of research. Modern Plasmonics book offers a comprehensive presentation of the properties of surface plasmon polaritons, in systems of different structures and various natures, e.g. active, nonlinear, graded, theoretical/computational and experimental techniques for studying them, and their use in a variety of applications. Contains materia

  4. Hidden figures are ever present.

    Science.gov (United States)

    Mens, L H; Leeuwenberg, E L

    1988-11-01

    Preference judgments about alternative interpretations of unambiguous patterns can be explained in terms of a rivalry between a preferred and a second-best interpretation (cf. Leeuwenberg & Buffart, 1983). We tested whether this second-best interpretation corresponds to a suppressed but concurrently present interpretation or whether it merely reflects an alternative view that happens to be preferred less often. Two patterns were present immediately following each other with a very short onset asynchrony: a complete pattern and one out of three possible subpatterns of it, corresponding to the best, the second best, or an odd interpretation of the complete pattern. Subjects indicated which subpattern was presented by choosing among the three subpatterns shown after each trial. The scores, corrected for response-bias effects, indicated a relative facilitation of the second-best interpretation, in agreement with its predicted "hidden" presence. This result is more in line with theories that capitalize on the quality of the finally selected representation than with processing models aimed at reaching one single solution as fast and as economically as possible.

  5. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  6. Hidden local symmetry and beyond

    Science.gov (United States)

    Yamawaki, Koichi

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here, I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H = SU(2)L × SU(2)R/SU(2)V with additional symmetry, the nonlinearly-realized scale symmetry. Then, the SM does have a dynamical gauge boson of the SU(2)V HLS, "SM ρ meson", in addition to the Higgs as a pseudo-dilaton as well as the NG bosons to be absorbed in to the W and Z. Based on the recent work done with Matsuzaki and Ohki, I discuss a novel possibility that the SM ρ meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "dark SM skyrmion (DSMS)".

  7. Constraining solar hidden photons using HPGe detector

    Energy Technology Data Exchange (ETDEWEB)

    Horvat, R.; Kekez, D., E-mail: Dalibor.Kekez@irb.hr; Krčmar, M.; Krečak, Z.; Ljubičić, A.

    2013-04-25

    In this Letter we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory. With our experimental setup we observe the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, entails both photon into hidden state oscillations and a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in Sun's interior as well as in the detector. We exclude hidden photons with kinetic couplings χ>(2.2×10{sup −13}–3×10{sup −7}) in the mass region 0.2 eV≲m{sub γ{sup ′}}≲30 keV. Our constraints on the mixing parameter χ in the mass region from 20 eV up to 15 keV prove even slightly better then those obtained recently by using data from the CAST experiment, albeit still somewhat weaker than those obtained from solar and HB stars lifetime arguments.

  8. Orthographic Analogies and Early Reading: Evidence from a Multiple Clue Word Paradigm

    Science.gov (United States)

    Savage, Robert S.; Deault, Louise; Daki, Julia; Aouad, Julie

    2011-01-01

    Two experiments using a variation of the clue word analogy task (Goswami, 1986) explored whether children can make orthographic analogies when given multiple clue words, beyond the known effects of purely phonological activation. In Experiment 1, 42 children (mean age 6 years and 8 months) were first taught 3 "clue" words (e.g.,…

  9. Modern optics

    CERN Document Server

    Guenther, B D

    2015-01-01

    Modern Optics is a fundamental study of the principles of optics using a rigorous physical approach based on Maxwell's Equations. The treatment provides the mathematical foundations needed to understand a number of applications such as laser optics, fiber optics and medical imaging covered in an engineering curriculum as well as the traditional topics covered in a physics based course in optics. In addition to treating the fundamentals in optical science, the student is given an exposure to actual optics engineering problems such as paraxial matrix optics, aberrations with experimental examples, Fourier transform optics (Fresnel-Kirchhoff formulation), Gaussian waves, thin films, photonic crystals, surface plasmons, and fiber optics. Through its many pictures, figures, and diagrams, the text provides a good physical insight into the topics covered. The course content can be modified to reflect the interests of the instructor as well as the student, through the selection of optional material provided in append...

  10. Modern electrodynamics

    CERN Document Server

    Zangwill, Andrew

    2013-01-01

    An engaging writing style and a strong focus on the physics make this comprehensive, graduate-level textbook unique among existing classical electromagnetism textbooks. Charged particles in vacuum and the electrodynamics of continuous media are given equal attention in discussions of electrostatics, magnetostatics, quasistatics, conservation laws, wave propagation, radiation, scattering, special relativity and field theory. Extensive use of qualitative arguments similar to those used by working physicists makes Modern Electrodynamics a must-have for every student of this subject. In 24 chapters, the textbook covers many more topics than can be presented in a typical two-semester course, making it easy for instructors to tailor courses to their specific needs. Close to 120 worked examples and 80 applications boxes help the reader build physical intuition and develop technical skill. Nearly 600 end-of-chapter homework problems encourage students to engage actively with the material. A solutions manual is availa...

  11. Modern thermodynamics

    CERN Document Server

    Ben-Naim, Arieh

    2017-01-01

    This textbook introduces thermodynamics with a modern approach, starting from four fundamental physical facts (the atomic nature of matter, the indistinguishability of atoms and molecules of the same species, the uncertainty principle, and the existence of equilibrium states) and analyzing the behavior of complex systems with the tools of information theory, in particular with Shannon's measure of information (or SMI), which can be defined on any probability distribution. SMI is defined and its properties and time evolution are illustrated, and it is shown that the entropy is a particular type of SMI, i.e. the SMI related to the phase-space distribution for a macroscopic system at equilibrium. The connection to SMI allows the reader to understand what entropy is and why isolated systems follow the Second Law of Thermodynamics. The Second Llaw is also formulated for other systems, not thermally isolated and even open with respect to the transfer of particles. All the fundamental aspects of thermodynamics are d...

  12. Retrospective and modern views on modernization and alternative modernization components of shinto and zen buddhism

    Directory of Open Access Journals (Sweden)

    Y. Y. Medviedieva

    2016-03-01

    Full Text Available The article is devoted to the ratio of modernization and counter modernizing key components of Japan and religions (partly introduced Christianity. The author concludes that the various components of the religious consciousness of the Japanese were kontratetycal on two main elements that form the basis of modern Western culture Japanese resistance and cause upgrade. First, science and technology, working on the basis of the laws of nature, which are opposed to the supernatural and the metaphysical world. Secondly, expressed individualism and atomism as hypertrophic respect for the human person, liberal nadzoseredzhenist to a person who undermines the consolidation of corporate social society. Japanese culture in the past was oriented toward modernization, but progress has been very slow. Moreover, in this process, Japan was much more conservative because in Japanese society regulatory institutions of the army, religion and industrial corporations can be considered a kind of constants which not only can be adapted to the modernization of Euro-American style, as suggested selection of authentic script compatible, especially with life values corporatism and solidarity. It is in this dimension of modernization projects related to Christian proselytism, as were «frustrated.» The reason for this breakdown can be considered inherence religion with social cohesion, its actual merging of social institutions, as well as hidden mahizm skepticism and religious outlook that combines Shinto, Confucian and Zen Buddhist elements. Since modernization in Christianity included the distinction darkened minds clerical era and «enlightened enlightenment» of consciousness era of modern times, it is this dichotomy allowed to oppose religious «ignorance» and scientific «enlightenment», the clergy and secular intellectuals, universities and intellectual clubs as a medium spreading the ideology of the bourgeoisie and monasteries as centers of religious clericalism

  13. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  14. Endocrine origins of rheumatic disease. Diagnostic clues to interrelated syndromes.

    Science.gov (United States)

    Lockshin, Michael D

    2002-04-01

    Heightened awareness of endocrine abnormalities is important in evaluation of patients presenting with musculoskeletal symptoms. Endocrine disorders such as diabetes, hyperthyroidism, hypothyroidism, hyperparathyroidism, hypoparathyroidism, hyperadrenocorticism, and acromegaly cause a unique array of rheumatic manifestations. Such conditions include Dupuytren's contracture, carpal tunnel syndrome, chondrocalcinosis, pseudogout, scleredema, and osteoporosis. Characteristic changes on radiologic evaluation and serum enzyme testing are additional clues to these atypical presentations. Consideration of a possible endocrine cause early in the evaluation may improve management in patients with such an underlying disorder.

  15. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  16. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  17. Probing Hidden Sector Photons through the Higgs Window.

    OpenAIRE

    Ahlers, M.; Jaeckel, J; Redondo, J.; Ringwald, A.

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light...

  18. Land use scenarios simulation based on the CLUE-S model of the Lijiang River Basin in Guilin, China

    Science.gov (United States)

    Jin, Qingwen; Liu, Guang; Li, Lei; He, Chengxin; Huang, Yuqing; Yao, Yuefeng

    2016-11-01

    The relationship between government policy and land use change is very important, which can provide important information for understanding of land use change and for helping in development of sustainable policy. Returning Farmland to Forest Program is simulated by the CLUE-S model. Land use maps in 1993, 2006, 2010 and 2015 in Lijiang River Basin are interpreted based on remote sensing change from 1993 to 2025 under two scenarios (i.e., Natural Growth Scenarios, Government Intervention Scenarios). In the “Natural Growth Scenarios”, the area of construction land and cultivated land are increased, the others are decreased. In the “Government Intervention Scenarios”, the area of construction land, woodland, cultivated land, and water are increased, the others is in declined. The compared results of two scenarios provide a scientific support for the government policy in the Lijiang River Basin.

  19. Supersymmetric leptogenesis and light hidden sectors

    CERN Document Server

    Weniger, Christoph

    2010-01-01

    Thermal leptogenesis and supergravity are attractive scenarios for physics beyond the standard model. However, it is well known that the super-weak interaction of the gravitino often leads to problems with primordial nucleosynthesis in the standard scenario of matter parity conserving MSSM + three right-handed neutrinos. We will present and compare two related solutions to these problems: 1) The conflict between BBN and leptogenesis can be avoided in presence of a hidden sector with light supersymmetric particles which open new decay channels for the dangerous long-lived particles. 2) If there is a condensate in the hidden sector, such additional decay channels can be alternatively opened by dynamical breaking of matter parity in the hidden sector.

  20. Filsafat Pendidikan dan Hidden Curriculum dalam Perspektif KH. Imam Zarkasyi (1910-1985

    Directory of Open Access Journals (Sweden)

    Abdurrahim Yapono

    2015-11-01

    Full Text Available KH. Imam Zarkasyi (1910-1985 of Gontor Ponorogo East Java along with his two other brothers called Trimurti (the three founders of Pondok Modern Gontor, both KH. Ahmad Sahal (1901-1977 and KH. Zainuddin Fannani (1905- 1967 were the most dedicated figures on the modern Indonesian Islamic boarding schools education system. Kiai Zarkasyi was not only well known in Indonesia but even in the Muslim world. This article attempts to gain a deeper understanding about Zarkasyi’s educational philosophy and his hidden curriculum; and how the patterns of its implementation in the educational system processes thus provides a significant influence on his discipliners, with a qualitative approach in the form of naturalistic phenomenology through literature study and empirical experience as a means of checking the validity of confirmatory data. The findings revealed that all educational activities in Pondok Modern Gontor has governed by a soul by design which maintained formal curriculum (intra-curricular and extra-curricular called written curriculum. On the top of all, the study discoveres the patterns of hidden curriculum applicable as the affect of edicational process under the formal curriculum. It took place in many models such as learning by instruction, learning by doing, and so on. Here, in fact, there is the strength and success of education in dormitories, such as in Pondok Modern Gontor which has a significant direct effect on the students, who in turn has an effect on the nation character building and the religion.

  1. CLUE-S模型在规划环境影响评价中的应用%The Application of CLUE-S Model in Planning Environmental Impact Assessment

    Institute of Scientific and Technical Information of China (English)

    刘仁志; 沙博

    2011-01-01

    CLUE-S模型用于模拟土地利用空间变化,可为定量预测生态影响提供技术手段.在总结规划环境影响评价研究现状和CLUE-S模型应用实践的基础上,深入理解CLUE-S模型的模拟机制,针对规划环评特点,确定CLUE-S模型在模拟生态影响过程中的技术步骤和要求.以大兴区为例,通过Logistic回归分析该区域土地利用变化驱动力,利用Erdas、Arcgis等工具获取2001、2005、2007年三期土地利用图,对模型的模拟效果进行检验.在此基础上预测得到大兴区2010年、2015年和2020年的土地利用变化图,借助Fragstats软件计算景观格局指数,进一步分析大兴区规划年由于土地利用变化给景观格局带来的影响,将结果反馈到规划方案中,进而提出优化调整建议.%The Conversion of land Use and its Effect at Small regional extent (CLUE-S) model is used for simulating and locating land use/cover change,which could provide a useful tool for quantify the ecological impact in Planning Environmental Impact Assessment (PEIA). Based on the progress of PEIA and the applications of CLUE-S model, the steps and requirements of CLUE-S model' s simulating process in PEIA were proposed. In the case study of the Daxing District in Beijing,five driving factors were analyzed with Logistic regression in SPSS. Using tools of Erdas and Arcgis,land use/cover maps in 2001,2005 and 2007 were prepared to validate the CLUE-S model. And land use/cover change maps in 2010,2015 and 2020 of Daxing were produced by the verified CLUE-S model. Then landscape pattern indexes were calculated from these forecasted maps by the Fragstats tool, and ecological impacts on landscape pattern due to land use/cover change were quantified and assessed,in feedback to PEIA in Daxing.

  2. Hidden Attraction - The History and Mystery of Magnetism

    Science.gov (United States)

    Verschuur, Gerrit L.

    1996-04-01

    Long one of nature's most fascinating phenomena, magnetism was once the subject of many superstitions. Magnets were thought useful to thieves, effective as a love potion, and as a cure for gout or spasms. They could remove sorcery from women and put demons to flight and even reconcile married couples. It was said that a lodestone pickled in the salt of sucking fish had the power to attract gold. Today, these beliefs have been put aside, but magnetism is no less remarkable for our modern understanding of it. In Hidden Attraction , Gerrit L. Verschuur, a noted astronomer and National Book Award nominee for The Invisible Universe , traces the history of our fascination with magnetism, from the mystery and superstition that propelled the first alchemical experiments with lodestone, through the more tangible works of Faraday, Maxwell, Hertz and other great pioneers of magnetism (scientists responsible for the extraordinary advances in modern science and technology, including radio, the telephone, and computers, that characterize the twentieth century), to state-of-the-art theories that see magnetism as a basic force in the universe. Boasting many informative illustrations, this is an adventure of the mind, using the specific phenomenon of magnetism to show how we have moved from an era of superstitions to one in which the Theory of Everything looms on the horizon.

  3. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  4. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  5. Hidden simplicity of gauge theory amplitudes

    Science.gov (United States)

    Drummond, J. M.

    2010-11-01

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in \\ {N}=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  6. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...

  7. Dark Radiation from a hidden U(1)

    CERN Document Server

    Vogel, Hendrik

    2015-01-01

    We discuss the impact of a hidden sector consisting of Minicharged Particles (MCPs) and massless hidden photons on the expansion history of our Universe. We present parameter scans for the amount of extra relativistic particles (Neff) and the abundance of light nuclei for fermionic MCPs with masses between ~100 keV and 10 GeV and minicharges in the range 10^(-11)-1. Current CMB and BBN data significantly constrain the available parameter space of MCPs. The shown results are a valuable indicator for future experimental searches and are presented in a flexible way so that more accurate results on Neff can be easily interpreted.

  8. Hidden Symmetries, Central Charges and All That

    CERN Document Server

    de Wit, Bernard; Wit, Bernard de; Nicolai, Hermann

    2001-01-01

    In this review we discuss hidden symmetries of toroidal compactifications of eleven-dimensional supergravity. We recall alternative versions of this theory which exhibit traces of the hidden symmetries when still retaining the massive Kaluza-Klein states. We reconsider them in the broader perspective of M-theory which incorporates a more extended variety of BPS states. We also argue for a new geometry that may underly these theories. All our arguments point towards an extension of the number of space-time coordinates beyond eleven.

  9. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  10. Dispelling the Quantum Spooks -- a Clue that Einstein Missed?

    CERN Document Server

    Price, Huw

    2013-01-01

    It is well-known that Bell's Theorem and other No Hidden Variable theorems have a "retrocausal loophole", because they assume that the values of pre-existing hidden variables are independent of future measurement settings. (This is often referred to, misleadingly, as the assumption of "free will".) However, it seems to have gone unnoticed until recently that a violation of this assumption is a straightforward consequence of time-symmetry, given an understanding of the quantization of light that would have seemed natural to Einstein after 1905. The new argument shows precisely why quantization makes a difference, and why time-symmetry alone does not imply retrocausality, in the classical context. It is true that later developments in quantum theory provide a way to avoid retrocausality, without violating time-symmetry; but this escape route relies on the "ontic" conception of the wave function that Einstein rejected. Had this new argument been noticed much sooner, then, it seems likely that retrocausality woul...

  11. Anthropology and Multiple Modernities

    DEFF Research Database (Denmark)

    Thomassen, Bjørn

    , as the concept was pluralized into a variety of forms: multiple modernities, parallel modernities, manifold modernities, alternative modernities, competing modernities, reflexive modernities, early modernities, other modernities – the list still unfolding. By reviewing various attempts to conceptualise...... configurations. However, if the current pluralizing of modernity ultimately serves to describe the variety of cultural forms that co-exist in the World today, the analytical value of the concept risks being watered down, and little is gained in perspective. Arguably, other concepts would have served the purpose...

  12. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2015-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  13. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  14. The Corporate Illiterates: The Hidden Illiterates of Silicon Valley.

    Science.gov (United States)

    Chase, Sharon

    1991-01-01

    Describes the writing and business communication problems of college-educated workers in Silicon Valley. Discusses hidden illiterates in the universities and in the workplace. Offers solutions for professors and managers faced with the problem of hidden illiterates. (PRA)

  15. Design and Implementation of Domain based Semantic Hidden Web Crawler

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Web is a wide term which mainly consists of surface web and hidden web. One can easily access the surface web using traditional web crawlers, but they are not able to crawl the hidden portion of the web. These traditional crawlers retrieve contents from web pages, which are linked by hyperlinks ignoring the information hidden behind form pages, which cannot be extracted using simple hyperlink structure. Thus, they ignore large amount of data hidden behind search forms. This paper emphasizes o...

  16. The Impact of Contextual Clue Selection on Inference

    Directory of Open Access Journals (Sweden)

    Leila Barati

    2010-05-01

    Full Text Available Linguistic information can be conveyed in the form of speech and written text, but it is the content of the message that is ultimately essential for higher-level processes in language comprehension, such as making inferences and associations between text information and knowledge about the world. Linguistically, inference is the shovel that allows receivers to dig meaning out from the text with selecting different embedded contextual clues. Naturally, people with different world experiences infer similar contextual situations differently. Lack of contextual knowledge of the target language can present an obstacle to comprehension (Anderson & Lynch, 2003. This paper tries to investigate how true contextual clue selection from the text can influence listener’s inference. In the present study 60 male and female teenagers (13-19 and 60 male and female young adults (20-26 were selected randomly based on Oxford Placement Test (OPT. During the study two fiction and two non-fiction passages were read to the participants in the experimental and control groups respectively and they were given scores according to Lexile’s Score (LS[1] based on their correct inference and logical thinking ability. In general the results show that participants’ clue selection based on their personal schematic references and background knowledge differ between teenagers and young adults and influence inference and listening comprehension. [1]- This is a framework for reading and listening which matches the appropriate score to each text based on degree of difficulty of text and each text was given a Lexile score from zero to four.

  17. Variational Hidden Conditional Random Fields with Coupled Dirichlet Process Mixtures

    NARCIS (Netherlands)

    Bousmalis, K.; Zafeiriou, S.; Morency, L.P.; Pantic, Maja; Ghahramani, Z.

    2013-01-01

    Hidden Conditional Random Fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An infinite HCRF is an HCRF with a countably infinite number of hidden states, which rids us not only of the necessit

  18. Perceptual consequences of "hidden" hearing loss.

    Science.gov (United States)

    Plack, Christopher J; Barker, Daphne; Prendergast, Garreth

    2014-09-09

    Dramatic results from recent animal experiments show that noise exposure can cause a selective loss of high-threshold auditory nerve fibers without affecting absolute sensitivity permanently. This cochlear neuropathy has been described as hidden hearing loss, as it is not thought to be detectable using standard measures of audiometric threshold. It is possible that hidden hearing loss is a common condition in humans and may underlie some of the perceptual deficits experienced by people with clinically normal hearing. There is some evidence that a history of noise exposure is associated with difficulties in speech discrimination and temporal processing, even in the absence of any audiometric loss. There is also evidence that the tinnitus experienced by listeners with clinically normal hearing is associated with cochlear neuropathy, as measured using Wave I of the auditory brainstem response. To date, however, there has been no direct link made between noise exposure, cochlear neuropathy, and perceptual difficulties. Animal experiments also reveal that the aging process itself, in the absence of significant noise exposure, is associated with loss of auditory nerve fibers. Evidence from human temporal bone studies and auditory brainstem response measures suggests that this form of hidden loss is common in humans and may have perceptual consequences, in particular, regarding the coding of the temporal aspects of sounds. Hidden hearing loss is potentially a major health issue, and investigations are ongoing to identify the causes and consequences of this troubling condition.

  19. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements

  20. Discovering Hidden Treasures with GPS Technology

    Science.gov (United States)

    Nagel, Paul; Palmer, Roger

    2014-01-01

    "I found it!" Addison proudly proclaimed, as she used an iPhone and Global Positioning System (GPS) software to find the hidden geocache along the riverbank. Others in Lisa Bostick's fourth grade class were jealous, but there would be other geocaches to find. With the excitement of movies like "Pirates of the Caribbean" and…

  1. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover...

  2. Dermatologic hazards from hidden contacts with penicillin

    Energy Technology Data Exchange (ETDEWEB)

    Boonk, W.J.

    1981-01-01

    The unbridled use of penicillin after its discovery by Fleming has resulted in possible hazards to human health due to traces of the drug being present in food and other hidden sources. These hazards may include toxic effects, hypersensitivity reactions and possibly a raising of the frequency and duration of allergy to penicillin.

  3. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements incr

  4. Computerized Testing: The Hidden Figures Test.

    Science.gov (United States)

    Jacobs, Ronald L.; And Others

    1985-01-01

    This study adapted the Hidden Figures Test for use on PLATO and determined the reliability of the computerized version compared to the paper and pencil version. Results indicate the test was successfully adapted with some modifications, and it was judged reliable although it may be measuring additional constructs. (MBR)

  5. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  6. Hidden Costs and Challenges of Servitization

    DEFF Research Database (Denmark)

    Yang, Yifan; Slepniov, Dmitrij

    of these labels, the potential benefits of servitization are often overshadowed by costs associated with it. By using the cases of Chinese and Danish manufacturing firms, this study takes a closer look at possible hidden costs of servitization and contributes to our understanding of servitization performance...

  7. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  8. Multiple modernities, modern subjectivities and social order

    DEFF Research Database (Denmark)

    Jung, Dietrich; Sinclair, Kirstine

    2015-01-01

    to modern subjectivity formation. In combining conceptual tools from these strands of social theory, we argue that the emergence of multiple modernities should be understood as a historical result of idiosyncratic social constructions combining global social imaginaries with religious and other cultural......Taking its point of departure in the conceptual debate about modernities in the plural, this article presents a heuristic framework based on an interpretative approach to modernity. The article draws on theories of multiple modernities, successive modernities and poststructuralist approaches...... traditions. In the second part of the article we illustrate this argument with three short excursions into the history of Islamic reform in the 19th and 20th centuries. In this way we interpret the modern history of Muslim societies as based on cultural conflicts between different forms of social order...

  9. Simulating land-use changes by incorporating spatial autocorrelation and self-organization in CLUE-S modeling: a case study in Zengcheng District, Guangzhou, China

    Science.gov (United States)

    Mei, Zhixiong; Wu, Hao; Li, Shiyun

    2017-04-01

    The Conversion of Land Use and its Effects at Small regional extent (CLUE-S), which is a widely used model for land-use simulation, utilizes logistic regression to estimate the relationships between land use and its drivers, and thus, predict land-use change probabilities. However, logistic regression disregards possible spatial autocorrelation and self-organization in land-use data. Autologistic regression can depict spatial autocorrelation but cannot address self-organization, while logistic regression by considering only self-organization (NElogistic regression) fails to capture spatial autocorrelation. Therefore, this study developed a regression (NE-autologistic regression) method, which incorporated both spatial autocorrelation and self-organization, to improve CLUE-S. The Zengcheng District of Guangzhou, China was selected as the study area. The land-use data of 2001, 2005, and 2009, as well as 10 typical driving factors, were used to validate the proposed regression method and the improved CLUE-S model. Then, three future land-use scenarios in 2020: the natural growth scenario, ecological protection scenario, and economic development scenario, were simulated using the improved model. Validation results showed that NE-autologistic regression performed better than logistic regression, autologistic regression, and NE-logistic regression in predicting land-use change probabilities. The spatial allocation accuracy and kappa values of NE-autologistic-CLUE-S were higher than those of logistic-CLUE-S, autologistic-CLUE-S, and NE-logistic-CLUE-S for the simulations of two periods, 2001-2009 and 2005-2009, which proved that the improved CLUE-S model achieved the best simulation and was thereby effective to a certain extent. The scenario simulation results indicated that under all three scenarios, traffic land and residential/industrial land would increase, whereas arable land and unused land would decrease during 2009-2020. Apparent differences also existed in the

  10. Hidden penis release: adjunctive suprapubic lipectomy.

    Science.gov (United States)

    Horton, C E; Vorstman, B; Teasley, D; Winslow, B

    1987-08-01

    We believe the hidden penis may be caused and concealed by a prominent suprapubic fat pad in addition to the restrictive fibrous bands of the dartos fascia fixing the shaft of the penis proximally while loose skin folds prolapse distally over the phallus. A penis of inadequate length or appearance may affect body image. Patients with this problem often require psychological support. Hidden penis may be distinguished from micropenis by palpating adequate corpora and showing a stretched penile length within 2 SD of normal. Excision of suprapubic fat with sectioning of the tethering dartos bands will release and increase the length of the penis. Suprapubic fat pad resection may also be helpful to elongate a short penis in cases of adult microphallus, or after partial penectomy because of trauma or cancer. Circumcision is contraindicated.

  11. Laser experiments explore the hidden sector

    CERN Document Server

    Ahlers, M; Jaeckel, J; Redondo, J; Ringwald, A

    2007-01-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses <~0.05 eV, the charge is now restricted to be less than (3-4)x10^(-7) times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background.

  12. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  13. Hidden geometric correlations in real multiplex networks

    Science.gov (United States)

    Kleineberg, Kaj-Kolja; Boguñá, Marián; Ángeles Serrano, M.; Papadopoulos, Fragkiskos

    2016-11-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.

  14. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  15. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  16. Finite State Transducers Approximating Hidden Markov Models

    CERN Document Server

    Kempe, A

    1999-01-01

    This paper describes the conversion of a Hidden Markov Model into a sequential transducer that closely approximates the behavior of the stochastic model. This transformation is especially advantageous for part-of-speech tagging because the resulting transducer can be composed with other transducers that encode correction rules for the most frequent tagging errors. The speed of tagging is also improved. The described methods have been implemented and successfully tested on six languages.

  17. Hidden symmetries in dilaton-axion gravity

    CERN Document Server

    Kechkin, O V

    1996-01-01

    Four--dimensional Einstein--Maxwell--dilaton--axion system restricted to space--times with one non--null Killing symmetry is formulated as the three--dimensional gravity coupled sigma--model. Several alternative representations are discussed and the associated hidden symmetries are revealed. The action of target space isometries on the initial set of (non--dualized ) variables is found. New mulicenter solutions are obtained via generating technique based on the formulation in terms of the non--dualized variables.

  18. Caldera rim collapse: A hidden volcanic hazard

    OpenAIRE

    Merle, Olivier; Michon, Laurent; Bachèlery, Patrick

    2008-01-01

    International audience; Following the emblematic flank collapse of Mount St Helens in 1981, numerous models of flank sliding have been proposed. These models have allowed to largely improve the understanding of mechanisms involved in such landslides, which represent a tremendous risk for populations living around volcanoes. In this article, a new mode of landslide formation, related to buried calderas, is described. The model emphasizes the paramount importance of the hidden ring fault that, ...

  19. Killing and letting die: hidden value assumptions.

    Science.gov (United States)

    Atkinson, G

    1983-01-01

    In this paper I argue for several related theses: first, that the distinction between killing and letting die, as it is drawn by ordinary persons in ordinary contexts, is more complex than is generally understood; second, that the key feature of this complexity lies in the presence of a hidden normative component in what appears to be a straightforwardly descriptive distinction; and, third, that this complexity renders the killing/letting die distinction an inadequate and hazardous guide for moral reasoning.

  20. Online Learning in Discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2007-01-01

    We present and analyse three online algorithms for learning in discrete Hidden Markov Models (HMMs) and compare them with the Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalisation error we draw learning curves in simplified situations. The performance for learning drifting concepts of one of the presented algorithms is analysed and compared with the Baldi-Chauvin algorithm in the same situations. A brief discussion about learning and symmetry breaking b...

  1. Exploring an Ecologically Sustainable Scheme for Landscape Restoration of Abandoned Mine Land: Scenario-Based Simulation Integrated Linear Programming and CLUE-S Model

    OpenAIRE

    Zhang, Liping; Zhang, Shiwen; Huang, Yajie; Cao, Meng; Huang, Yuanfang; Zhang, Hongyan

    2016-01-01

    Understanding abandoned mine land (AML) changes during land reclamation is crucial for reusing damaged land resources and formulating sound ecological restoration policies. This study combines the linear programming (LP) model and the CLUE-S model to simulate land-use dynamics in the Mentougou District (Beijing, China) from 2007 to 2020 under three reclamation scenarios, that is, the planning scenario based on the general land-use plan in study area (scenario 1), maximal comprehensive benefit...

  2. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  3. Otoendoscopic treatment of hidden lesions in otomastoiditis

    Institute of Scientific and Technical Information of China (English)

    LIU Yang; SUN Jian-jun; LIN Yong-sheng; ZHAO Dan-heng; ZHAO Jing; LEI Fei

    2010-01-01

    Background Surgical treatments for chronic suppurative and cholesteatoma otitis media have been discussed for several decades, but recurrences still occur because of the complex dissection required and hidden lesions associated with otomastoiditis. This study investigated the technology and strategy behind the use of otoendoscopic-assisted otosurgery.Methods We reported on hidden lesions in 32 ears of patients with otomastoiditis between November 2006 and January 2009. All the patients were treated with the aid of an otoendoscope. The advantages of otoendoscopy, including multi-angle light scattering, aperture illumination, and magnification of the local operative field, were utilized in otologic microsurgery, and otoendoscopic operative techniques were introduced for operative sites such as the epitympanum, aditus of the antrum, facial recess, sinus tympani and the mastoid tip.Results All patients were followed up from 3 months to 2 years after surgery. All patients recovered well within 3 months following surgery, except for one case of epithelialization of the mastoid cavity occurring 6 months after surgery for cholesteatoma on the cerebellar surface and another case with Bezold's abscess, hyperplastic granulation tissue developed at the antrum.Conclusions Otoendoscopy can overcome the technical deficiency of rectilinearity of the visual axis associated with otomicroscopic illumination, which presents a problem when dealing with otomastoiditis lesions in hidden areas. This technique allows such lesions within the complex three-dimensional structure to be visualized and cleaned. Otoendoscopy thus has significant potential for improving the quality of surgery and reducing the risk of postoperative recurrence.

  4. Dark matter in the hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2014-01-01

    The cosmological scenario of the dark matter generated in the hidden gauge theory based on the grand unification is discussed. It is found that the stability of the dark matter halo of our Galaxy and the cosmic ray observation constrain, respectively, the dark matter mass and the unification scale between the standard model and the hidden gauge theory sectors. To obtain a phenomenologically consistent thermal evolution, the entropy of the standard model sector needs to be increased. We therefore propose a scenario where the mini-inflation is induced from the potential coupled to the Standard model sector, in particular the Higgs sector. This scenario makes consistent the current dark matter density as well as the baryon-to-photon ratio for the case of pion dark matter. For the glueball or heavy pion of hidden gauge theory, an additional mini-inflation in the standard model sector before the leptogenesis is required. We also propose the possibility to confirm this scenario by known prospective experimental app...

  5. Prehistoric Packrats Piled Up Clues to Climate Change

    Science.gov (United States)

    Cole, Kenneth L.

    2008-01-01

    Scientists from the U.S. Geological Survey and Northern Arizona University studying climate change in the Southwestern United States are getting a helping hand?or would that be paw??from prehistoric packrats. By hoarding parts of animals and plants, including seeds and leaves, in garbage piles or ?middens,? these bushy-tailed rodents preserved crucial ecological and environmental information about the past. From these middens, scientists are able to reconstruct plant communities and natural systems from as long ago as 50,000 years. The contents of middens allow scientists to understand how ecosystems responded to rapid, large-scale climate changes of the past. The insights gained from midden research could offer clues to future changes driven by rapid climate shifts.

  6. Observational clues to the progenitors of Type-Ia supernovae

    CERN Document Server

    Maoz, Dan; Nelemans, Gijs

    2013-01-01

    Type-Ia supernovae (SNe Ia) are important distance indicators, element factories, cosmic-ray accelerators, kinetic-energy sources in galaxy evolution, and endpoints of stellar binary evolution. It has long been clear that a SN Ia must be the runaway thermonuclear explosion of a degenerate carbon-oxygen stellar core, most likely a white dwarf (WD). However, the specific progenitor systems of SNe Ia, and the processes that lead to their ignition, have not been identified. Two broad classes of progenitor binary systems have long been considered: single-degenerate (SD), in which a WD gains mass from a non-degenerate star; and double-degenerate (DD), involving the merger of two WDs. New theoretical work has enriched these possibilities with some interesting updates and variants. We review the significant recent observational progress in addressing the progenitor problem. We consider clues that have emerged from the observed properties of the various proposed progenitor populations, from studies of their sites, pre...

  7. Enthesitis: The clue to the pathogenesis of spondyloarthritis?

    Science.gov (United States)

    Miceli-Richard, Corinne

    2015-12-01

    The term "spondyloarthritis" designates a group of conditions whose shared characteristic is inflammation at the interface between the bone and either the tendons and ligaments or the joint capsule. This interface, known as the enthesis, can be the site of ossification in spondyloarthritis. The advent of high-performance imaging techniques such as magnetic resonance imaging has rekindled interest in the enthesis by providing new insights into the sequence that leads to entheseal ossification. These techniques have established initial inflammation and fatty metaplasia as key events that precede ossification. The pathophysiological mechanisms that trigger the initial inflammation probably involve multiple factors such as mechanical stress and the presence of resident cells responsive to interleukin-23 and capable of releasing proinflammatory cytokines. Research into the triggers of entheseal inflammation and ossification may thus provide the clue to the pathophysiology of spondyloarthritis.

  8. Observations give us CLUES to Cosmic Flows' origins

    Science.gov (United States)

    Sorce, Jenny; Courtois, H.; Gottloeber, S.; Hoffman, Y.; Pomarede, D.; Tully, R. B.; Flows, Cosmic; CLUES

    2014-01-01

    In an era where the wealth of telescope-data and the development of computer superclusters keep increasing, the knowledge of Large Scale Structures' formation and evolution constitutes a tremendous challenge. Within this context the project Cosmic Flows has recently produced a catalog of peculiar velocities up to 150 Mpc. These velocities, obtained from direct distance measurements, are ideal markers of the underlying gravitational potential. They form a fantastic input to perform constrained simulations of the Local Universe within the CLUES project. A new method has recently been elaborated to achieve these simulations which prove to be excellent replicas of our neighborhood. The Wiener-Filter, the Reverse Zel'dovich Approximation and the Constrained Realization techniques are combined to build Initial Conditions. The resulting second generation of constrained simulations presents us the formidable history of the Great Attractor's and nearby supercluster's formation.

  9. Red ochre and shells: clues to human evolution.

    Science.gov (United States)

    Duarte, Carlos M

    2014-10-01

    The 200-kiloannus (ka) use of red ochre and shells by humans is interpreted as a simple clue of symbolic thinking. Integration of multiple lines of evidence supports the opinion that the use of red ochre and shells might have had direct significance for human evolution. Use of seafood and red ochre supplies docosahexaenoic acid (DHA), possibly iron, and other essential nutrients for brain development and reproductive health, improving human fitness and triggering brain growth. The fitness advantages to humans of using shells, and possibly red ochre, might have selected for artistic and symbolic expression, and, thereby, lead to social cohesion. Current global health syndromes show that an adequate supply of seafood and iron continues to play a fundamental role in human health.

  10. Hidden attraction the history and mystery of magnetism

    CERN Document Server

    Verschuur, Gerrit L

    1996-01-01

    Long one of nature''s most fascinating phenomena, magnetism was once the subject of many superstitions. Magnets were thought useful to thieves, effective as a love potion or as a cure for gout or spasms. They could remove sorcery from women and put demons to flight and even reconcile married couples. It was said that a lodestone pickled in the salt of sucking fish had the power to attract gold. Today, these beliefs have been put aside, but magnetism is no less remarkable for our modern understanding of it. In Hidden Attraction, Gerrit L. Verschuur, a noted astronomer and National Book Award nominee for The Invisible Universe, traces the history of our fascination with magnetism, from the first discovery of magnets in Greece, to state-of-the-art theories that see magnetism as a basic force in the universe. The book begins with the early debunking of superstitions by Peter Peregrinus (Pierre de Maricourt), whom Roger Bacon hailed as one of the world''s first experimental scientists (Perigrinus held that "experi...

  11. Hidden laser communications through matter. An application of meV-scale hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-04-15

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  12. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  13. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  14. Hidden History: A Mobile Application for Discovering Surrounding Landscapes

    OpenAIRE

    2016-01-01

    This thesis work describes the design, development and evaluation of a mobile application called Hidden History. This application lets users discover and explore three types of landscapes (Historic, Scenic and Cultural) using three different modes of discovery (Route, Explore and Tour). Before designing Hidden History, the feature set of other applications that help users explore surrounding landscapes were identified and analyzed. Hidden History was then designed to implement the best fea...

  15. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  16. ADAPTIVE LEARNING OF HIDDEN MARKOV MODELS FOR EMOTIONAL SPEECH

    Directory of Open Access Journals (Sweden)

    A. V. Tkachenia

    2014-01-01

    Full Text Available An on-line unsupervised algorithm for estimating the hidden Markov models (HMM parame-ters is presented. The problem of hidden Markov models adaptation to emotional speech is solved. To increase the reliability of estimated HMM parameters, a mechanism of forgetting and updating is proposed. A functional block diagram of the hidden Markov models adaptation algorithm is also provided with obtained results, which improve the efficiency of emotional speech recognition.

  17. Hidden Photons in Aharonov-Bohm-Type Experiments

    OpenAIRE

    Arias, Paola; Diaz, Christian; Diaz, Marco Aurelio; Jaeckel, Joerg; Koch, Benjamin; Redondo, Javier

    2016-01-01

    We discuss the Aharonov-Bohm effect in the presence of hidden photons kinetically mixed with the ordinary electromagnetic photons. The hidden photon field causes a slight phase shift in the observable interference pattern. It is then shown how the limited sensitivity of this experiment can be largely improved. The key observation is that the hidden photon field causes a leakage of the ordinary magnetic field into the supposedly field-free region. The direct measurement of this magnetic field ...

  18. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  19. MODERN PHYSICS LETTERS B

    OpenAIRE

    Chang, LN; Lewis, Z.; Minic, D.; Takeuchi, T

    2013-01-01

    We construct a discrete quantum mechanics using a vector space over the Galois field GF(q). We find that the correlations in our model do not violate the Clauser-Horne-Shimony-Holt (CHSH) version of Bell's inequality, despite the fact that the predictions of this discrete quantum mechanics cannot be reproduced with any hidden variable theory.

  20. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  1. Critical scaling in hidden state inference for linear Langevin dynamics

    OpenAIRE

    Bravi, Barbara; Sollich, Peter

    2016-01-01

    We consider the problem of inferring the dynamics of unknown (i.e. hidden) nodes from a set of observed trajectories and we study analytically the average prediction error given by the Extended Plefka Expansion applied to it, as presented in [1]. We focus on a stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings in the infinite network size limit. The expected error on the hidden time courses can be found as the equal-time hidden-to-hidden cova...

  2. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  3. Error statistics of hidden Markov model and hidden Boltzmann model results

    Science.gov (United States)

    Newberg, Lee A

    2009-01-01

    Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results. PMID:19589158

  4. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  5. OFDM System Channel Estimation with Hidden Pilot

    Institute of Scientific and Technical Information of China (English)

    YANG Feng; LIN Cheng-yu; ZHANG Wen-jun

    2007-01-01

    Channel estimation using pilot is common used in OFDM system. The pilot is usually time division multiplexed with the informative sequence. One of the main drawbacks is bandwidth losing. In this paper, a new method was proposed to perform channel estimation in OFDM system. The pilot is arithmetically added to the output of OFDM modulator. Receiver uses the hidden pilot to get an accurate estimation of the channel. Then pilot is removed after channel estimation. The Cramer-Rao lower bound for this method was deprived. The performance of the algorithm is then shown. Compared with traditional methods, the proposed algorithm increases the bandwidth efficiency dramatically.

  6. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  7. Hidden photon CDM search at Tokyo

    CERN Document Server

    Suzuki, Jun'ya; Horie, Tomoki; Minowa, Makoto

    2015-01-01

    We report on a search for hidden photon cold dark matter (HP CDM) using a novel technique with a dish antenna. We constructed two independent apparatus: one is aiming at the detection of the HP with a mass of $\\sim\\,\\rm{eV}$ which employs optical instruments, and the other is for a mass of $\\sim5\\times10^{-5}\\, \\rm{eV}$ utilizing a commercially available parabolic antenna facing on a plane reflector. From the result of the measurements, we found no evidence for the existence of HP CDM and set upper limits on the photon-HP mixing parameter $\\chi$.

  8. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  9. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  10. Scaling dimensions in hidden Kerr/CFT

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2011-01-01

    It has been proposed that a hidden conformal field theory (CFT) governs the dynamics of low frequency scattering in a general Kerr black hole background. We further investigate this correspondence by mapping higher order corrections to the massless wave equations in a Kerr background to an expansion within the CFT in terms of higher dimension operators. This implies the presence of infinite towers of CFT primary operators with positive conformal dimensions compatible with unitarity. The exact Kerr background softly breaks the conformal symmetry and the scaling dimensions of these operators run with frequency. The scale-invariant fixed point is dual to a degenerate case of flat spacetime.

  11. Hidden Kerr/CFT at finite frequencies

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2013-01-01

    Massless fields propagating in a generic Kerr black hole background enjoy a hidden SL(2,R)xSL(2,R) symmetry. We determine how the exact mode functions decompose into representations of this symmetry group. This extends earlier results on the low frequency limit of the massless scalar case to finite frequencies and general spin. As an application, we numerically determine the parameters of the representations that appear in quasinormal modes. These results represent a first step to formulating a more precise mapping to a holographic dual conformal field theory for generic black holes.

  12. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  13. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  14. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  15. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  16. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The locations of the breaks are subsequently obtained by assigning states to data points according to the Maximum Posterior Mode (MPM) algorithm. The Integrated Classification Likelihood-Bayesian Information Criterion (ICL-BIC) allows for the determination of the number of regimes by taking into account...... in the monetary policy of United States, the dierent functional form being variants of the Taylor (1993) rule....

  17. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  18. The multiple autoimmune syndromes. A clue for the autoimmune tautology.

    Science.gov (United States)

    Anaya, Juan-Manuel; Castiblanco, John; Rojas-Villarraga, Adriana; Pineda-Tamayo, Ricardo; Levy, Roger A; Gómez-Puerta, José; Dias, Carlos; Mantilla, Ruben D; Gallo, Juan Esteban; Cervera, Ricard; Shoenfeld, Yehuda; Arcos-Burgos, Mauricio

    2012-12-01

    The multiple autoimmune syndromes (MAS) consist on the presence of three or more well-defined autoimmune diseases (ADs) in a single patient. The aim of this study was to analyze the clinical and genetic characteristics of a large series of patients with MAS. A cluster analysis and familial aggregation analysis of ADs was performed in 84 patients. A genome-wide microsatellite screen was performed in MAS families, and associated loci were investigated through the pedigree disequilibrium test. Systemic lupus erythematosus (SLE), autoimmune thyroid disease (AITD), and Sjögren's syndrome together were the most frequent ADs encountered. Three main clusters were established. Aggregation for type 1 diabetes, AITD, SLE, and all ADs as a trait was found. Eight loci associated with MAS were observed harboring autoimmunity genes. The MAS represent the best example of polyautoimmunity as well as the effect of a single genotype on diverse phenotypes. Its study provides important clues to elucidate the common mechanisms of ADs (i.e., autoimmune tautology).

  19. Hair shaft abnormalities--clues to diagnosis and treatment.

    Science.gov (United States)

    Itin, Peter H; Fistarol, Susanna K

    2005-01-01

    Hair dysplasias are congenital or acquired alterations which often involve the hair shaft. Hair shaft abnormalities are characterized by changes in color, density, length and structure. Hair shaft alterations often result from structural changes within the hair fibers and cuticles which may lead to brittle and uncombable hair. The hair of patients with hair shaft diseases feels dry and looks lusterless. Hair shaft diseases may occur as localized or generalized disorders. Genetic predisposition or exogenous factors produce and maintain hair shaft abnormalities. Hair shaft diseases are separated into those with and those without increased hair fragility. In general, optic microscopy and polarized light microscopy of hair shafts provide important clues to the diagnosis of isolated hair shaft abnormalities or complex syndromes. To establish an exact diagnosis of dysplastic hair shafts, a structured history and physical examination of the whole patient are needed which emphasizes other skin appendages such as the nails, sweat and sebaceous glands. Profound knowledge on hair biology and embryology is necessary to understand the different symptom complexes. Therapy of hair shaft disorders should focus on the cause. In addition, minimizing traumatic influences to hair shafts, such as drying hair with an electric dryer or permanent waves and dyes, is important. A short hairstyle is more suitable for patients with hair shaft disorders.

  20. Clues of subjective social status among young adults.

    Science.gov (United States)

    Nielsen, François; Roos, J Micah; Combs, R M

    2015-07-01

    We investigate determinants of subjective social status (SSS) as measured by respondents placing themselves on a ten-rung ladder from least to most "money", "education" and "respected job", in a large sample of young adults. The most potent clues of SSS are proximate in the life course, reflecting educational attainment and current socioeconomic and job situation, rather than distal characteristics such as family background, although relatively distal High school GPA has a lingering effect. Additional analyses reveal that College selectivity has a substantial impact on SSS, net of other variables in the model; Currently married does not significantly contribute to SSS, but contrary to some expectations Number of children significantly lowers SSS. We find no evidence of greater "status borrowing" by women as associations of SSS with shared household characteristics (Household income, Household assets, Home ownership) do not differ by gender. Our findings for these young adults support the conclusion of earlier research that SSS reflects a "cognitive averaging" of standard dimensions of socioeconomic status.

  1. Anthropology and Multiple Modernities

    DEFF Research Database (Denmark)

    Thomassen, Bjørn

    as a discipline, and has important roots in Max Weber’s comparative sociology, elaborated for example by Shmul Eisenstadt. If anthropology, as Arjun Appadurai argues in Modernity at Large, wishes to contribute to a new social theory of modernity, it would need to tackle the theoretical luggage that the modernity......Anthropology never had an easy relationship with the concept of modernity. The “reflexive turn” which developed during the 1980s and 1990s tackled the concept of modernity as a culturally constructed narrative underlying Western self-assumptions of self and other– assumptions that needed...... to be unpacked and left behind. The debate was an essential part of a disciplininary reflexivity reconsidering anthropology’s epistemological and political roots in that very modernity. From the mid 1990s modernity was, somewhat surprisingly, reintroduced as a useful if not necessary conceptual tool...

  2. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  3. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  4. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  5. Quantum Hidden Subgroup Problems A Mathematical Perspective

    CERN Document Server

    Lomonaco, S J; Lomonaco, Samuel J.; Kauffman, Louis H.

    2002-01-01

    The ultimate objective of this paper is to create a stepping stone to the development of new quantum algorithms. The strategy chosen is to begin by focusing on the class of abelian quantum hidden subgroup algorithms, i.e., the class of abelian algorithms of the Shor/Simon genre. Our strategy is to make this class of algorithms as mathematically transparent as possible. By the phrase "mathematically transparent" we mean to expose, to bring to the surface, and to make explicit the concealed mathematical structures that are inherently and fundamentally a part of such algorithms. In so doing, we create symbolic abelian quantum hidden subgroup algorithms that are analogous to the those symbolic algorithms found within such software packages as Axiom, Cayley, Maple, Mathematica, and Magma. As a spin-off of this effort, we create three different generalizations of Shor's quantum factoring algorithm to free abelian groups of finite rank. We refer to these algorithms as wandering (or vintage Z_Q) Shor algorithms. They...

  6. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  7. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  8. Hidden charm molecules in finite volume

    CERN Document Server

    Albaladejo, Miguel; Nieves, Juan; Oset, Eulogio

    2013-01-01

    In the present paper we address the interaction of pairs of charmed mesons with hidden charm in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and from them some synthetic data are generated. These data are then employed to study the inverse problem of getting the energies of the bound states and phase shifts for $D \\bar D$ or $D^* {\\bar D}^*$. Different strategies are investigated using the lowest two levels for different values of the box size, carrying a study of the errors produced. Starting from the upper level, fits to the synthetic data are carried out to determine the scattering length and effective range plus the binding energy of the ground state. A similar strategy using the effective range formula is considered with a simultaneous fit to the two levels, one above and the other one below threshold. This method turns out to be more...

  9. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  10. Bayesian structural inference for hidden processes.

    Science.gov (United States)

    Strelioff, Christopher C; Crutchfield, James P

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ε-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ε-machines, irrespective of estimated transition probabilities. Properties of ε-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  11. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    Decker, T.; Draisma, J.; Wocjan, P.

    2009-01-01

    We consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be m-variate po

  12. Hidden attractor in the Rabinovich system, Chua circuits and PLL

    Science.gov (United States)

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Seledzhi, S. M.

    2016-06-01

    In this report the existence of hidden attractors in Rabinovich system, phase-locked loop and coupled Chua circuits is considered. It is shown that the existence of hidden attractors may complicate the analysis of the systems and significantly affect the synchronization.

  13. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  14. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  15. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  16. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  17. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in Seuss's…

  18. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  19. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  20. Face Aging Effect Simulation Using Hidden Factor Analysis Joint Sparse Representation

    Science.gov (United States)

    Yang, Hongyu; Huang, Di; Wang, Yunhong; Wang, Heng; Tang, Yuanyan

    2016-06-01

    Face aging simulation has received rising investigations nowadays, whereas it still remains a challenge to generate convincing and natural age-progressed face images. In this paper, we present a novel approach to such an issue by using hidden factor analysis joint sparse representation. In contrast to the majority of tasks in the literature that handle the facial texture integrally, the proposed aging approach separately models the person-specific facial properties that tend to be stable in a relatively long period and the age-specific clues that change gradually over time. It then merely transforms the age component to a target age group via sparse reconstruction, yielding aging effects, which is finally combined with the identity component to achieve the aged face. Experiments are carried out on three aging databases, and the results achieved clearly demonstrate the effectiveness and robustness of the proposed method in rendering a face with aging effects. Additionally, a series of evaluations prove its validity with respect to identity preservation and aging effect generation.

  1. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  2. Secluded Dark Matter Coupled to a Hidden CFT

    CERN Document Server

    von Harling, Benedict

    2012-01-01

    Models of secluded dark matter offer a variant on the standard WIMP picture and can modify our expectations for hidden sector phenomenology and detection. In this work we extend a minimal model of secluded dark matter, comprised of a U(1)'-charged dark matter candidate, to include a confining hidden-sector CFT. This provides a technically natural explanation for the hierarchically small mediator-scale, with hidden-sector confinement generating m_{gamma'}>0. Furthermore, the thermal history of the universe can differ markedly from the WIMP picture due to (i) new annihilation channels, (ii) a (potentially) large number of hidden-sector degrees of freedom, and (iii) a hidden-sector phase transition at temperatures T << M_{dm} after freeze out. The mediator allows both the dark matter and the Standard Model to communicate with the CFT, thus modifying the low-energy phenomenology and cosmic-ray signals from the secluded sector.

  3. Abelian Hidden Sectors at a GeV

    Energy Technology Data Exchange (ETDEWEB)

    Morrissey, David E.; Poland, David; /Harvard U.; Zurek, Kathryn; /Fermilab /Michigan U.

    2009-04-16

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1){sub x} gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  4. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  5. Gauge Coupling Unification with Hidden Photon, and Minicharged Dark Matter

    CERN Document Server

    Daido, Ryuji; Yokozaki, Norimi

    2016-01-01

    We show that gauge coupling unification is realized with a greater accuracy in the presence of a massless hidden photon which has a large kinetic mixing with hypercharge. We solve the renormalization group equations at two-loop level and find that the GUT unification scale is around $10^{16.5}$ GeV which sufficiently suppresses the proton decay rate, and that the unification depends only on the kinetic mixing, but not on the hidden gauge coupling nor the presence of vector-like matter fields charged under U(1)$_H$ and/or SU(5). Matter fields charged under the unbroken hidden U(1)$_H$ are stable and they contribute to dark matter. Interestingly, they become minicharged dark matter which carries a small but non-zero electric charge, if the hidden gauge coupling is tiny. The minicharged dark matter is a natural outcome of the gauge coupling unification with a hidden photon.

  6. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  7. TV Crime Reporter Missed Clues | NIH MedlinePlus the Magazine

    Science.gov (United States)

    ... JavaScript on. Feature: Women and Heart Disease TV Crime Reporter Missed Clues Past Issues / Spring 2016 Table ... heart attack at the age of 36. A crime reporter for WJLA-TV in Washington, D.C., ...

  8. Emergent Linguistic Rules from Inducing Decision Trees Disambiguating Discourse Clue Words

    CERN Document Server

    Siegel, E V; Siegel, Eric V.; Keown, Kathleen R. Mc

    1994-01-01

    We apply decision tree induction to the problem of discourse clue word sense disambiguation with a genetic algorithm. The automatic partitioning of the training set which is intrinsic to decision tree induction gives rise to linguistically viable rules.

  9. Bacterial vaginosis (clue cell-positive discharge) : diagnostic, ultra-structural and therapeutic aspects

    NARCIS (Netherlands)

    W.I. van der Meijden (Willem)

    1987-01-01

    textabstractThis thesis deals with several aspects of (abnormal) vaginal discharge, focusing especially on clue cell-positive discharge (bacterial vaginosis, nonspecific vaginitis). It reports data on epidemiology and clinical features, pathogenesis, and treatment of this vaginal disease entity,

  10. Neutrino oscillation provides clues to dark matter and signals from the chilled universe

    CERN Multimedia

    2006-01-01

    The new verification that oscillations exists and neutrinos have mass though not detectible easy provides the first clue to extra dimensions, dark matter, hyperspace and chilled universe acting as a platform below it. (1/2 page)

  11. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  12. Er Rousseau moderne?

    DEFF Research Database (Denmark)

    Dupont, Søren

    1985-01-01

    Artiklen analyserer på hvilken måde Rousseau kan siges at være moderne, og den diskuterer på hvilken måde Rouseau har været medvirkende til at opbygge den moderne civilisation, og på hvilken måde han var kritisk i forhold til den gryende og moderne kapitalisme.......Artiklen analyserer på hvilken måde Rousseau kan siges at være moderne, og den diskuterer på hvilken måde Rouseau har været medvirkende til at opbygge den moderne civilisation, og på hvilken måde han var kritisk i forhold til den gryende og moderne kapitalisme....

  13. Late-Modern Symbolism

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2015-01-01

    Through analysis of key texts, I seek to demonstrate the explanative potential of Durkheim’s sociology of religion in the present context. I critically readdress the idea, found in his early work, that modernity is characterized by a rupture with pre-modern forms of solidarity. First, I investigate...... the ways in which Durkheim sets up a stark distinction between the pre-modern and the modern in his early work, and how this distinction is further cemented by his orthodox critique of the modern economy and its negative effects on social life. Second, I show how another timeless and positive understanding...... of “mechanical” solidarity is to be found behind the “symbolist” template crystalizing in Durkheim’s late work. Third, I develop this template for a modern context by critically addressing and removing other obstacles and prejudices on Durkheim’s part....

  14. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  15. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  16. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  17. Grand unified hidden-sector dark matter

    Science.gov (United States)

    Lonsdale, Stephen J.; Volkas, Raymond R.

    2014-10-01

    We explore G×G unified theories with the visible and the hidden or dark sectors paired under a Z2 symmetry. Developing a system of "asymmetric symmetry breaking" we motivate such models on the basis of their ability to generate dark baryons that are confined with a mass scale just above that of the proton, as motivated by asymmetric dark matter. This difference is achieved from the distinct but related confinement scales that develop in unified theories that have the two factors of G spontaneously breaking in an asymmetric manner. We show how Higgs potentials that admit different gauge group breaking chains in each sector can be constructed, and demonstrate the capacity for generating different fermion mass scales. Lastly we discuss supersymmetric extensions of such schemes.

  18. Hidden caries’ challenge diagnosis: case report

    Directory of Open Access Journals (Sweden)

    Fernanda Mara de Paiva Bertoli

    2013-06-01

    Full Text Available Introduction: Hidden caries is a term used to describe occlusal dentine caries that is missed on a visual examination, but is large and demineralised enough to be detected by another exam for example, radiographs. Case report: This article reports a case of large dentine caries, which presented as to be a small pit-and-fissure carious lesion on the occlusal surface of the right mandibular permanent first molar in a 10-year-old girl. The treatment included root canal treatment and the sealing of the cavity with composite resin. Conclusion: Careful visual examination, with cleaning and drying of teeth, associated to bitewing radiographs may improve occlusal caries detection. Dentists should examine bitewing radiographs carefully for proximal caries and occlusal demineralization. Radiographs are an effective method of caries diagnosis that can avoid large destruction and allows less invasive treatment.

  19. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  20. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  1. Nuclear scissors modes and hidden angular momenta

    CERN Document Server

    Balbutsev, E B; Schuck, P

    2016-01-01

    The coupled dynamics of low lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time Dependent Hartree-Fock-Bogoliubov equations. The model of the harmonic oscillator including spin-orbit potential plus quadrupole-quadrupole and spin-spin interactions is considered. New low lying spin dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  2. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school......Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...

  3. Hidden baryons: The physics of Compton composites

    Science.gov (United States)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  4. Hidden realities inside PBL design processes

    DEFF Research Database (Denmark)

    Pihl, Ole Verner

    2015-01-01

    Design Process, but is a group-based architecture and design education better than that which is individually based? How does PBL affect space, form, and creative processes? Hans Kiib, professor and one of the founders of the Department of Architecture and Design in Aalborg, describes his intentions...... within the group work, as it is closer related to the actual PBL process”. Is the Integrated Design Process (Knudstrup 2004) and is Colb (1975) still current and valid? Can we still use these methodologies when we must create “learning for an unknown future,” as Ronald Barnett (2004) claims that we...... investigates the creative processes of the collective and the individual and clarifies some of the hidden realities behind the PBL-based creative processes, both through an inquiry with the students and a more methodological and theoretical approach. The paper also explores how to integrate artistic...

  5. Aluminium Diphosphamethanides: Hidden Frustrated Lewis Pairs.

    Science.gov (United States)

    Styra, Steffen; Radius, Michael; Moos, Eric; Bihlmeier, Angela; Breher, Frank

    2016-07-04

    The synthesis and characterisation of two aluminium diphosphamethanide complexes, [Al(tBu)2 {κ(2) P,P'-Mes*PCHPMes*}] (3) and [Al(C6 F5 )2 {κ(2) P,P'-Mes*PCHPMes*}] (4), and the silylated analogue, Mes*PCHP(SiMe3 )Mes* (5), are reported. The aluminium complexes feature four-membered PCPAl core structures consisting of diphosphaallyl ligands. The silylated phosphine 5 was found to be a valuable precursor for the synthesis of 4 as it cleanly reacts with the diaryl aluminium chloride [(C6 F5 )2 AlCl]2 . The aluminium complex 3 reacts with molecular dihydrogen at room temperature under formation of the acyclic σ(2) λ(3) ,σ(3) λ(3) -diphosphine Mes*PCHP(H)Mes* and the corresponding dialkyl aluminium hydride [tBu2 AlH]3 . Thus, 3 belongs to the family of so-called hidden frustrated Lewis pairs.

  6. Wavelet domain hidden markovian bayesian document segmentation

    Institute of Scientific and Technical Information of China (English)

    Sun Junxi; Xiao Changyan; Zhang Su; Chen Yazhu

    2005-01-01

    A novel algorithm for Bayesian document segmentation is proposed based on the wavelet domain hidden Markov tree (HMT) model. Once the parameters of model are known, according to the sequential maximum a posterior probability (SMAP) rule, firstly, the likelihood probability of HMT model for each pattern is computed from fine to coarse procedure. Then, the interscale state transition probability is solved using Expectation Maximum (EM) algorithm based on hybrid-quadtree and multiscale context information is fused from coarse to fine procedure. In order to get pixellevel segmentation, the redundant wavelet domain Gaussian mixture model (GMM) is employed to formulate pixel-level statistical property. The experiment results show that the proposed scheme is feasible and robust.

  7. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  8. Hidden fungi, emergent properties: endophytes and microbiomes.

    Science.gov (United States)

    Porras-Alfaro, Andrea; Bayman, Paul

    2011-01-01

    Endophytes are microorganisms that live within plant tissues without causing symptoms of disease. They are important components of plant microbiomes. Endophytes interact with, and overlap in function with, other core microbial groups that colonize plant tissues, e.g., mycorrhizal fungi, pathogens, epiphytes, and saprotrophs. Some fungal endophytes affect plant growth and plant responses to pathogens, herbivores, and environmental change; others produce useful or interesting secondary metabolites. Here, we focus on new techniques and approaches that can provide an integrative understanding of the role of fungal endophytes in the plant microbiome. Clavicipitaceous endophytes of grasses are not considered because they have unique properties distinct from other endophytes. Hidden from view and often overlooked, endophytes are emerging as their diversity, importance for plant growth and survival, and interactions with other organisms are revealed.

  9. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  10. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  11. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments.

  12. Productions, modern (Scandinavia)

    DEFF Research Database (Denmark)

    Lech, Marcel Lysgaard

    2017-01-01

    Greek comedy has never been as popular on the modern Scandinavian scene as Greek tragedy, but one play stands out among them all as a modern classic, Aristophanes’ Lysistrata, which has inspired many adaptations not only on the stage, but also in radio and cinema.......Greek comedy has never been as popular on the modern Scandinavian scene as Greek tragedy, but one play stands out among them all as a modern classic, Aristophanes’ Lysistrata, which has inspired many adaptations not only on the stage, but also in radio and cinema....

  13. Nuclear weapons modernizations

    Energy Technology Data Exchange (ETDEWEB)

    Kristensen, Hans M. [Federation of American Scientists, Washington, DC (United States)

    2014-05-09

    This article reviews the nuclear weapons modernization programs underway in the world's nine nuclear weapons states. It concludes that despite significant reductions in overall weapons inventories since the end of the Cold War, the pace of reductions is slowing - four of the nuclear weapons states are even increasing their arsenals, and all the nuclear weapons states are busy modernizing their remaining arsenals in what appears to be a dynamic and counterproductive nuclear competition. The author questions whether perpetual modernization combined with no specific plan for the elimination of nuclear weapons is consistent with the nuclear Non-Proliferation Treaty and concludes that new limits on nuclear modernizations are needed.

  14. Indonesia - Procurement Modernization Project

    Data.gov (United States)

    Millennium Challenge Corporation — The evaluation seeks to establish evidence on the possible effects of an intervention designed to modernize public procurement: effects on cost savings, performance...

  15. Ancient migratory events in the Middle East: new clues from the Y-chromosome variation of modern Iranians.

    Directory of Open Access Journals (Sweden)

    Viola Grugni

    Full Text Available Knowledge of high resolution Y-chromosome haplogroup diversification within Iran provides important geographic context regarding the spread and compartmentalization of male lineages in the Middle East and southwestern Asia. At present, the Iranian population is characterized by an extraordinary mix of different ethnic groups speaking a variety of Indo-Iranian, Semitic and Turkic languages. Despite these features, only few studies have investigated the multiethnic components of the Iranian gene pool. In this survey 938 Iranian male DNAs belonging to 15 ethnic groups from 14 Iranian provinces were analyzed for 84 Y-chromosome biallelic markers and 10 STRs. The results show an autochthonous but non-homogeneous ancient background mainly composed by J2a sub-clades with different external contributions. The phylogeography of the main haplogroups allowed identifying post-glacial and Neolithic expansions toward western Eurasia but also recent movements towards the Iranian region from western Eurasia (R1b-L23, Central Asia (Q-M25, Asia Minor (J2a-M92 and southern Mesopotamia (J1-Page08. In spite of the presence of important geographic barriers (Zagros and Alborz mountain ranges, and the Dasht-e Kavir and Dash-e Lut deserts which may have limited gene flow, AMOVA analysis revealed that language, in addition to geography, has played an important role in shaping the nowadays Iranian gene pool. Overall, this study provides a portrait of the Y-chromosomal variation in Iran, useful for depicting a more comprehensive history of the peoples of this area as well as for reconstructing ancient migration routes. In addition, our results evidence the important role of the Iranian plateau as source and recipient of gene flow between culturally and genetically distinct populations.

  16. Using HPGe detector for a solar hidden-photons search

    CERN Document Server

    Horvat, R; Krcmar, M; Krecak, Z; Ljubicic, A

    2012-01-01

    In this paper we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory, by observing the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, leads to both photon into hidden states oscillations and to a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in the Sun's interior. We exclude hidden photons with kinetic couplings chi > (1.5x10^{-6}-2.6x10^{-11}) for the mass region 1.7x10^{-4} eV < m_\\gamma' < 3.4 eV. Our constraints on the mixing parameter chi at sub-eV hidden-photon masses p...

  17. Development as modernity, modernity as development

    NARCIS (Netherlands)

    Lushaba, L.S.

    2006-01-01

    Albeit the divergences on the debate about development in Africa, it is indubitable that the continent remains underdeveloped after five decades of development efforts. To understand this impasse, it is necessary to trace Africa's encounter with Europe to the period of early modernity. This paper

  18. Picking up Clues from the Discard Pile (Stereo)

    Science.gov (United States)

    2008-01-01

    As NASA's Phoenix Mars Lander excavates trenches, it also builds piles with most of the material scooped from the holes. The piles, like this one called 'Caterpillar,' provide researchers some information about the soil. On Aug. 24, 2008, during the late afternoon of the 88th Martian day after landing, Phoenix's Surface Stereo Imager took separate exposures through its left eye and right eye that have been combined into this stereo view. The image appears three dimensional when seen through red-blue glasses. This conical pile of soil is about 10 centimeters (4 inches) tall. The sources of material that the robotic arm has dropped onto the Caterpillar pile have included the 'Dodo' and ''Upper Cupboard' trenches and, more recently, the deeper 'Stone Soup' trench. Observations of the pile provide information, such as the slope of the cone and the textures of the soil, that helps scientists understand properties of material excavated from the trenches. For the Stone Soup trench in particular, which is about 18 centimeters (7 inches) deep, the bottom of the trench is in shadow and more difficult to observe than other trenches that Phoenix has dug. The Phoenix team obtained spectral clues about the composition of material from the bottom of Stone Soup by photographing Caterpillar through 15 different filters of the Surface Stereo Imager when the pile was covered in freshly excavated material from the trench. The spectral observation did not produce any sign of water-ice, just typical soil for the site. However, the bigger clumps do show a platy texture that could be consistent with elevated concentration of salts in the soil from deep in Stone Soup. The team chose that location as the source for a soil sample to be analyzed in the lander's wet chemistry laboratory, which can identify soluble salts in the soil. The Phoenix Mission is led by the University of Arizona, Tucson, on behalf of NASA. Project management of the mission is by NASA's Jet Propulsion Laboratory

  19. Modern History of Tibet

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Authored by Xu Guangzhi, this book is a subsidiary project of Research Into Traditional Culture and History (of the PRC Ministry of Education) conducted by China Tibetology Research Institute of Tibet University. The book combines modern history of Tibet with modern history of China as a whole. It tells the close ties between various members of the Chinese nation.

  20. Liquid Modernity & Late Capitalism

    DEFF Research Database (Denmark)

    Hansen, Claus D.

    In Liquid Modernity, Bauman portrays Adorno and the rest of the early Frankfurt School as sociologists and thinkers belonging to the ‘heavy’ phase of modernity. In other words, they are deemed irrelevant to the discussion of current sociological time diagnoses and the purpose of critique under co...

  1. Spotting modern Copenhagen

    DEFF Research Database (Denmark)

    Ovesen, Hans; Bøgelund, Helle; Darger, Birgitte

    2002-01-01

    Med udgangspunkt i Københavns Rådhus og området omkring Banegårdspladsen analyseres Københavns indtræden i det moderne......Med udgangspunkt i Københavns Rådhus og området omkring Banegårdspladsen analyseres Københavns indtræden i det moderne...

  2. Mod den moderne skole

    DEFF Research Database (Denmark)

    Vindum, Kjeld; Birk Morgen, Pernille

    2003-01-01

    Gennemgang af fem skoler som eksemplificerer væsentlige udviklingstrin i overgangen fra det sene 1800 tals etageskolebygninger til det moderne skolebyggeris gennemsalg i 1930erne.......Gennemgang af fem skoler som eksemplificerer væsentlige udviklingstrin i overgangen fra det sene 1800 tals etageskolebygninger til det moderne skolebyggeris gennemsalg i 1930erne....

  3. Patriotism, nationalism and modernity

    DEFF Research Database (Denmark)

    Engelhardt, Juliane

    2007-01-01

    they reflected two different understandings of core concepts such as state, language and folk culture is explained. However, both ideologies correlate to modernity, since the reflect the same dialectic tension in the relationship between the individual, the social community and the modern state...

  4. Adult learning in modernity

    DEFF Research Database (Denmark)

    Rasmussen, Palle

    2007-01-01

    The paper discusses the conditions for the growth of adult education in modern societies. It is argued that in modern adult life individual biographical reflection plays an increasing role, not only for educational and occupational choice but also in the process of identity formation and emotional...

  5. Modernism / Andrus Kallastu

    Index Scriptorium Estoniae

    Kallastu, Andrus, 1967-

    2003-01-01

    Pärnu Nüüdismuusika Päevade kujutava kunsti programmist "Modernism", kava. Raul Meele tuleetendus "Wanad Sõbrad" Pärnu jõel, Academia Grata tegevuskunstirühmituse Leegion performanceid "Sport ja loomad", "Die Modernkunst". Ettekanded Reiu Tüürilt, Ants Juskelt jt. Sven Kivisildniku performance "...text@modern"

  6. Hidden photon dark matter search with large metallic mirror

    Energy Technology Data Exchange (ETDEWEB)

    Doebrich, Babette; Lindner, Axel [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Daumiller, Kai; Engel, Ralph; Roth, Markus [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany); Kowalski, Marek [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Redondo, Javier [Zaragoza Univ. (Spain)

    2014-10-15

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  7. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  8. Suppressing the QCD axion abundance by hidden monopoles

    Directory of Open Access Journals (Sweden)

    Masahiro Kawasaki

    2016-02-01

    Full Text Available We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 1012GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei–Quinn symmetry is spontaneously broken after inflation.

  9. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  10. Using the Power of Modern Processors in Bioformatics

    DEFF Research Database (Denmark)

    Simonsen, Martin; Sand, Andreas; Mailund, Thomas

    of today’s major challenges in e.g. bioinformatics. At the Bioinformatics Research Center (BiRC), we are currently working on two projects involving the exploitation of modern multi-core architectures: 1. In molecular docking we aim to identify small proteins called ligands which show strong interaction...... of ligands against several target molecules, requiring use of expensive computer clusters. By using GPUs to exploit the parallel nature of molecular docking, we reduce the hardware requirements of large scale molecular docking significantly. 2. Hidden Markov Models (HMMs) is a statistical tool used in a wide...

  11. Jacques Joseph: Father of modern aesthetic surgery

    Directory of Open Access Journals (Sweden)

    Bhattacharya Surajit

    2008-10-01

    Full Text Available When we review the history of modern aesthetic surgery, a name that stands out as bright as a beacon and precious as gold is undoubtedly that of Jacques Joseph. A surgeon, par excellence, far ahead of his time, who chose to think out of the box, Joseph, despite all odds set out to give respectability to Aesthetic Surgery without depriving it of any scientific core values. By his words and deeds proved beyond doubt that only the very best in the field of reconstructive surgery, can visualize the hidden perfection in imperfection and formulate a treatment plan and a surgical strategy to achieve that elusive perfection. The rich surgical literature that he has left behind, the wealth of surgical instruments that he had designed and above all a way of thinking that he propagated, that aesthetic surgery is not frivolous but very serious endeavor, and treating the psychology of the patient is as important as treating his disease, undoubtedly makes him the revered ′Father of Modern Aesthetic Surgery′.

  12. The Imaginary Significations of Modernity

    DEFF Research Database (Denmark)

    Carleheden, Mikael

    2010-01-01

    This article deals with the concept of modernity upon which one of the most interesting contemporary theories about modern social change is based - Peter Wagner's theory of successive modernities. Wagner understands modernity as a double imaginary signification which entails a basic tension between...... theory of successive modernities partly inconsistent. A stance is taken for one of these versions and it is argued that the theory of successive modernities should appropriate that version as its point of departure in order to grasp the history of modernity in a consistent way. Keywords: Cornelius...... Castoriadis; modernity; social change; successive modernities; Peter Wagner....

  13. Spatio-temporal Dynamic Simulation of Urban Land Use in Karst Areas Based on CLUE-S Model——A Case Study of Dahua Yao Nationality Autonomous County in Guangxi Zhuang Autonomous Region

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    This article uses TM images in 1999 and 2006 in Dahua County,selects the driving factors having great impact on urban land use change,and conducts data processing using GIS software.It then uses CLUE-S model to simulate land use change pattern in 2006,and uses land use map in 2006 to test the simulation results.The results show that the simulation achieves good effect,indicating that we can use CLUE-S model to simulate the future urban land use change in karst areas,to provide scientific decision-making support for sustainable development of land use.

  14. Isovector and hidden-beauty partners of the X(3872)

    Energy Technology Data Exchange (ETDEWEB)

    Høgaasen, Hallstein, E-mail: hallstein.hogasen@fys.uio.no [Department of Physics, University of Oslo, Box 1048, NO-0316 Oslo (Norway); Kou, Emi, E-mail: kou@lal.in2p3.fr [Laboratoire de l' Accélérateur Linéaire, Université Paris-Sud, IN2P3-CNRS, Centre Scientifique d' Orsay, 91898 Orsay Cedex (France); Richard, Jean-Marc, E-mail: j-m.richard@ipnl.in2p3.fr [Université de Lyon, Institut de Physique Nucléaire de Lyon, UCBL–IN2P3-CNRS, 4, rue Enrico Fermi, 69622 Villeurbanne Cedex (France); Sorba, Paul, E-mail: paul.sorba@lapth.cnrs.fr [LAPTh, Laboratoire d' Annecy-le-Vieux de Physique Théorique, CNRS, Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France)

    2014-05-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  15. Local clustering in scale-free networks with hidden variables.

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A J E M; van Leeuwaarden, Johan S H; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ∈(2,3), so that the degrees have infinite variance. The natural cutoff h_{c} characterizes the largest degrees in the hidden variable models, and a structural cutoff h_{s} introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N, as a function of h_{s} and h_{c}. For scale-free networks with exponent 2vanish only for networks as large as N=10^{9}.

  16. A Bell-type Theorem Without Hidden Variables

    CERN Document Server

    Stapp, Henry P

    2002-01-01

    Bell's theorem rules out local hidden-variable theories. The locality condition is the demand that what an experimenter freely chooses to measure in one space-time region has no influence in a second space-time region that is spacelike separated from the first. The hidden-variable stipulation means that this demand is implemented through requirements on an assumed-to-exist substructure involving hidden variables. The question thus arises whether the locality condition itself fails, or only its implementation by means of the assumed hidden-variable structure. This paper shows that any theory that satisfies two generally accepted features of orthodox quantum theory and that yields certain predictions of quantum theory cannot satisfy the afore-mentioned locality condition. These two features are that the choices made by the experimenters can be treated as localized free variables and that such free choices do not affect outcomes that have already occurred.

  17. Modelling proteins' hidden conformations to predict antibiotic resistance

    Science.gov (United States)

    Hart, Kathryn M.; Ho, Chris M. W.; Dutta, Supratik; Gross, Michael L.; Bowman, Gregory R.

    2016-10-01

    TEM β-lactamase confers bacteria with resistance to many antibiotics and rapidly evolves activity against new drugs. However, functional changes are not easily explained by differences in crystal structures. We employ Markov state models to identify hidden conformations and explore their role in determining TEM's specificity. We integrate these models with existing drug-design tools to create a new technique, called Boltzmann docking, which better predicts TEM specificity by accounting for conformational heterogeneity. Using our MSMs, we identify hidden states whose populations correlate with activity against cefotaxime. To experimentally detect our predicted hidden states, we use rapid mass spectrometric footprinting and confirm our models' prediction that increased cefotaxime activity correlates with reduced Ω-loop flexibility. Finally, we design novel variants to stabilize the hidden cefotaximase states, and find their populations predict activity against cefotaxime in vitro and in vivo. Therefore, we expect this framework to have numerous applications in drug and protein design.

  18. Recent Applications of Hidden Markov Models in Computational Biology

    Institute of Scientific and Technical Information of China (English)

    Khar Heng Choo; Joo Chuan Tong; Louxin Zhang

    2004-01-01

    This paper examines recent developments and applications of Hidden Markov Models (HMMs) to various problems in computational biology, including multiple sequence alignment, homology detection, protein sequences classification, and genomic annotation.

  19. Self-similarity of complex networks and hidden metric spaces

    CERN Document Server

    Serrano, M Angeles; Boguna, Marian

    2007-01-01

    We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.

  20. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  1. Dark matter in the nonabelian hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2015-01-01

    We discuss the dark matter in the hidden gauge theory. We propose a scenario where the mini-inflation dilutes the dark matter density. This scenario is consistent with the current baryon number asymmetry.

  2. A simulation study of gene-by-environment interactions in GWAS implies ample hidden effects

    Directory of Open Access Journals (Sweden)

    Urko M Marigorta

    2014-07-01

    Full Text Available The switch to a modern lifestyle in recent decades has coincided with a rapid increase in prevalence of obesity and other diseases. These shifts in prevalence could be explained by the release of genetic susceptibility for disease in the form of gene-by-environment (GxE interactions. Yet, the detection of interaction effects requires large sample sizes, little replication has been reported, and a few studies have demonstrated environmental effects only after summing the risk of GWAS alleles into genetic risk scores (GRSxE. We performed extensive simulations of a quantitative trait controlled by 2,500 causal variants to inspect the feasibility to detect gene-by-environment interactions in the context of GWAS. The simulated individuals were assigned either to an ancestral or a modern setting that alters the phenotype by increasing the effect size by 1.05 to 2-fold at a varying fraction of perturbed SNPs (from 1% to 20%. We report two main results. First, for a wide range of realistic scenarios, highly significant GRSxE is detected despite the absence of individual genotype GxE evidence at the contributing loci. Second, an increase in phenotypic variance after environmental perturbation reduces the power to discover susceptibility variants by GWAS in mixed cohorts with individuals from both ancestral and modern environments. We conclude that a pervasive presence of gene-by-environment effects can remain hidden even though it contributes to the genetic architecture of complex traits.

  3. Hidden Symmetry from Supersymmetry in One-Dimensional Quantum Mechanics

    Directory of Open Access Journals (Sweden)

    Alexander A. Andrianov

    2009-06-01

    Full Text Available When several inequivalent supercharges form a closed superalgebra in Quantum Mechanics it entails the appearance of hidden symmetries of a Super-Hamiltonian. We examine this problem in one-dimensional QM for the case of periodic potentials and potentials with finite number of bound states. After the survey of the results existing in the subject the algebraic and analytic properties of hidden-symmetry differential operators are rigorously elaborated in the Theorems and illuminated by several examples.

  4. Stabilization of stochastic systems with hidden Markovian jumps

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper considers the adaptive control of discrete-time hybrid stochastic systems with unknown randomly jumping parameters described by a finite-state hidden Markov chain. An intuitive yet longstanding conjecture in this area is that such hybrid systems can be adaptively stabilized whenever the rate of transition of the hidden Markov chain is small enough. This paper provides a rigorous positive answer to this conjecture by establishing the global stability of a gradient-algorithm-based adaptive linear-quadratic control.

  5. Extracting hidden trails and roads under canopy using LIDAR

    OpenAIRE

    Krougios, Prokopios

    2008-01-01

    The field of Remote Sensing has been greatly benefited by the development of LIDAR. The extraction of bare earth under tree canopies and especially the identification of hidden trails are important tools for military and civilian operations in dense forests. LIDAR data from Sequoia National Park in California (2008) and Fort Belvoir Military Base in Virginia (2007) were two areas that were selected for analysis. Quick Terrain Modeler software was used in order to recognize hidden trails....

  6. Physical nature of a hidden mass in the Universe

    Energy Technology Data Exchange (ETDEWEB)

    Doroshkevich, A.G.; Khlopov, M.Yu. (AN SSSR, Moscow. Inst. Prikladnoj Matematiki)

    1984-04-01

    The problem of an origin of the hidden mass of the Universe is discussed. Observation astronomic data on large-scale Universe structure and hidden mass distribution within the framework of the adiabatic theory of galaxies formation point out the dominance in nowadays Universe of weakly-interacting particles with 15-60 eV mass. Restrictions are obtained for a possible admixture of other relict particles.

  7. Hidden Markov Models with Factored Gaussian Mixtures Densities

    Institute of Scientific and Technical Information of China (English)

    LI Hao-zheng; LIU Zhi-qiang; ZHU Xiang-hua

    2004-01-01

    We present a factorial representation of Gaussian mixture models for observation densities in Hidden Markov Models(HMMs), which uses the factorial learning in the HMM framework. We derive the reestimation formulas for estimating the factorized parameters by the Expectation Maximization (EM) algorithm. We conduct several experiments to compare the performance of this model structure with Factorial Hidden Markov Models(FHMMs) and HMMs, some conclusions and promising empirical results are presented.

  8. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...

  9. Answers to modernity

    DEFF Research Database (Denmark)

    Petersen, Karen Bjerg

    2008-01-01

    In his book The consequences of modernity, the British sociologist Giddens predicts e-learning environments. He emphasises that 'modernity is inherently globalising' creating 'disembedded' social relations and tearing 'space away form place by fostering relations between "absent" others...... - teacher, learner or curriculum planner positions - result in different strategies or 'answers to modernity'. The research has taken place as a study of e-learning and virtual teachhing of Danish as a second language for adults. The fact that relations in virtual learning are established between physically...

  10. Reduced-Rank Hidden Markov Models

    CERN Document Server

    Siddiqi, Sajid M; Gordon, Geoffrey J

    2009-01-01

    We introduce the Reduced-Rank Hidden Markov Model (RR-HMM), a generalization of HMMs that can model smooth state evolution as in Linear Dynamical Systems (LDSs) as well as non-log-concave predictive distributions as in continuous-observation HMMs. RR-HMMs assume an m-dimensional latent state and n discrete observations, with a transition matrix of rank k <= m. This implies the dynamics evolve in a k-dimensional subspace, while the shape of the set of predictive distributions is determined by m. Latent state belief is represented with a k-dimensional state vector and inference is carried out entirely in R^k, making RR-HMMs as computationally efficient as k-state HMMs yet more expressive. To learn RR-HMMs, we relax the assumptions of a recently proposed spectral learning algorithm for HMMs (Hsu, Kakade and Zhang 2009) and apply it to learn k-dimensional observable representations of rank-k RR-HMMs. The algorithm is consistent and free of local optima, and we extend its performance guarantees to cover the RR-...

  11. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  12. A hidden classical symmetry of QCD

    CERN Document Server

    Glozman, L Ya

    2016-01-01

    The classical part of the QCD partition function (the integrand) has, ignoring irrelevant exact zero modes of the Dirac operator, a local SU(2N_F) \\supset SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A symmetry which is absent at the Lagrangian level. This symmetry is broken anomalously and spontaneously. Effects of spontaneous breaking of chiral symmetry are contained in the near-zero modes of the Dirac operator. If physics of anomaly is also encoded in the same near-zero modes, then their truncation on the lattice should recover a hidden classical SU(2N_F) symmetry in correlators and spectra. This naturally explains observation on the lattice of a large degeneracy of hadrons, that is higher than the SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A chiral symmetry, upon elimination by hands of the lowest-lying modes of the Dirac operator. We also discuss an implication of this symmetry for the high temperature QCD.

  13. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  14. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  15. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  16. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  17. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  18. Stochastic precipitation generator with hidden state covariates

    Science.gov (United States)

    Kim, Yongku; Lee, GyuWon

    2017-08-01

    Time series of daily weather such as precipitation, minimum temperature and maximum temperature are commonly required for various fields. Stochastic weather generators constitute one of the techniques to produce synthetic daily weather. The recently introduced approach for stochastic weather generators is based on generalized linear modeling (GLM) with covariates to account for seasonality and teleconnections (e.g., with the El Niño). In general, stochastic weather generators tend to underestimate the observed interannual variance of seasonally aggregated variables. To reduce this overdispersion, we incorporated time series of seasonal dry/wet indicators in the GLM weather generator as covariates. These seasonal time series were local (or global) decodings obtained by a hidden Markov model of seasonal total precipitation and implemented in the weather generator. The proposed method is applied to time series of daily weather from Seoul, Korea and Pergamino, Argentina. This method provides a straightforward translation of the uncertainty of the seasonal forecast to the corresponding conditional daily weather statistics.

  19. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  20. Coulomb gauge model for hidden charm tetraquarks

    Science.gov (United States)

    Xie, W.; Mo, L. Q.; Wang, Ping; Cotanch, Stephen R.

    2013-08-01

    The spectrum of tetraquark states with hidden charm is studied within an effective Coulomb gauge Hamiltonian approach. Of the four independent color schemes, two are investigated, the (qcbar)1(cqbar)1 singlet-singlet (molecule) and the (qc)3(qbarcbar)3 triplet-triplet (diquark), for selected JPC states using a variational method. The predicted masses of triplet-triplet tetraquarks are roughly a GeV heavier than the singlet-singlet states. There is also an interesting flavor dependence with (qqbar)1 (ccbar1) states about half a GeV lighter than (qcbar)1(qbarc)1. The lightest 1++ and 1-- predictions are in agreement with the observed X (3872) and Y (4008) masses suggesting they are molecules with ωJ / ψ and ηhc, rather than D*Dbar* and DDbar, type structure, respectively. Similarly, the lightest isovector 1++ molecule, having a ρJ / ψ flavor composition, has mass near the recently observed charged Zc (3900) value. These flavor configurations are consistent with observed X, Y and Zc decays to ππJ / ψ.

  1. Hidden topological angles and Lefschetz thimbles

    CERN Document Server

    Behtash, Alireza; Schaefer, Thomas; Unsal, Mithat

    2015-01-01

    We demonstrate the existence of hidden topological angles (HTAs) in a large class of quantum field theories and quantum mechanical systems. HTAs are distinct from theta-parameters in the lagrangian. They arise as invariant angle associated with saddle points of the complexified path integral and their descent manifolds (Lefschetz thimbles). Physical effects of HTAs become most transparent upon analytic continuation in $n_f$ to non-integer number of flavors, reducing in the integer $n_f$ limit to a $\\mathbb Z_2$ valued phase difference between dominant saddles. In ${\\cal N}=1$ super Yang-Mills theory we demonstrate the microscopic mechanism for the vanishing of the gluon condensate. The same effect leads to an anomalously small condensate in a QCD-like $SU(N)$ gauge theory with fermions in the two-index representation. The basic phenomenon is that, contrary to folklore, the gluon condensate can receive both positive and negative contributions in a semi-classical expansion. In quantum mechanics, a HTA leads to ...

  2. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  3. Hidden Web Data Extraction Using Dynamic Rule Generation

    Directory of Open Access Journals (Sweden)

    Anuradha

    2011-08-01

    Full Text Available World Wide Web is a global information medium of interlinked hypertext documents accessed via computers connected to the internet. Most of the users rely on traditional search engines to search theinformation on the web. These search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called Hidden Web which is hidden to present-day search engines. It lies behind search forms and this part of the web containing an almost endless amount of sources providing high quality information stored in specialized databases can be found in the depths of the WWW. A large amount of this Hidden web is structured i.e Hidden websites contain the information in the form of lists and tables. However visiting dozens of these sites and analyzing the results is very much time consuming task for user. Hence, it is desirable to build a prototype which will minimize user’s effort and give him high quality information in integrated form. This paper proposes a novel method that extracts the data records from the lists and tables of various hidden web sites of same domain using dynamic rule generation and forms a repository which is used for later searching. By searching the data from this repository, user will find the desired data at one place. It reduces the user’s effort to look at various result pages of different hidden websites.

  4. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  5. QCD sum rule study of hidden-charm pentaquarks

    CERN Document Server

    Chen, Hua-Xing; Chen, Wei; Steele, T G; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    We study the mass spectra of hidden-charm pentaquarks having spin $J = {1\\over2},{3\\over2},{5\\over2}$ and quark contents $uud c \\bar c$. We systematically construct all the relevant local hidden-charm pentaquark currents, and select some of them to perform QCD sum rule analyses. We find that the $P_c(4380)$ and $P_c(4450)$ can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. We also find the lowest-lying hidden-charm $J^P = 1/2^-$ pentaquark state of mass $4.33^{+0.17}_{-0.13}$ GeV, while the $J^P = 1/2^+$ mass prediction of 4.7--4.9 GeV is significantly higher. Similarly, the lowest-lying hidden-charm $J^P = 3/2^-$ pentaquark state mass is $4.37^{+0.18}_{-0.13}$ GeV, consistent with the $J^P = 3/2^-$ $P_c(4380)$, while the $J^P = 3/2^+$ is also significantly higher with a mass above 4.6 GeV. The hidden-charm $J^P = 5/2^-$ pentaquark state mass is 4.5--4.6 GeV, slightly larger than the $J^P = 5/2^+$ $P_c(4450)$.

  6. A computationally efficient approach for hidden-Markov model-augmented fingerprint-based positioning

    Science.gov (United States)

    Roth, John; Tummala, Murali; McEachen, John

    2016-09-01

    This paper presents a computationally efficient approach for mobile subscriber position estimation in wireless networks. A method of data scaling assisted by timing adjust is introduced in fingerprint-based location estimation under a framework which allows for minimising computational cost. The proposed method maintains a comparable level of accuracy to the traditional case where no data scaling is used and is evaluated in a simulated environment under varying channel conditions. The proposed scheme is studied when it is augmented by a hidden-Markov model to match the internal parameters to the channel conditions that present, thus minimising computational cost while maximising accuracy. Furthermore, the timing adjust quantity, available in modern wireless signalling messages, is shown to be able to further reduce computational cost and increase accuracy when available. The results may be seen as a significant step towards integrating advanced position-based modelling with power-sensitive mobile devices.

  7. Modern technologies in Endodontics

    Directory of Open Access Journals (Sweden)

    Alfredo Iandolo

    2016-06-01

    Conclusions: The positive results highlighted by these clinical cases demonstrate how the use of modern technologies are essential to avoid iatrogenic injury, and guarantee, on the other hand, safe and reproducible results.

  8. Modern technologies in Endodontics

    National Research Council Canada - National Science Library

    Iandolo, Alfredo; Iandolo, Giuseppe; Malvano, Mariano; Pantaleo, Giuseppe; Simeone, Michele

    2016-01-01

    .... Materials and methods: Today, thanks to modern technologies as Operative Microscope, ultrasonic tips, M-Wire Files, devices to activate irrigation and tridimensional obturation performed with thermo plasticized gutta...

  9. Genealogies of Modern Technology

    DEFF Research Database (Denmark)

    Riis, Søren

    2008-01-01

    Does modern technology differ from ancient technology and does it have a unique essence? This twofold question opens one of Martin Heidegger's most influential philosophical inquiries, The Question Concerning Technology. The answer Heidegger offers has inspired various critiques and appraisals from...... a vast number of contemporary scholars of technology.1 Heidegger's answer is traditionally thought to suggest a great difference between ancient and modern technology. However, by re-examining Heidegger's text, it is possible to discover previously ignored or misunderstood lines of thoughts that affirm...... a multi-stable interpretation of the origin of modern technology. In what follows, we shall see how The Question Concerning Technology in fact supports three different genealogies of modern technology...

  10. Genealogies of Modern Technology

    DEFF Research Database (Denmark)

    Riis, Søren

    2008-01-01

    Does modern technology differ from ancient technology and does it have a unique essence? This twofold question opens one of Martin Heidegger's most influential philosophical inquiries, The Question Concerning Technology. The answer Heidegger offers has inspired various critiques and appraisals from...... a vast number of contemporary scholars of technology.1 Heidegger's answer is traditionally thought to suggest a great difference between ancient and modern technology. However, by re-examining Heidegger's text, it is possible to discover previously ignored or misunderstood lines of thoughts that affirm...... a multi-stable interpretation of the origin of modern technology. In what follows, we shall see how The Question Concerning Technology in fact supports three different genealogies of modern technology...

  11. Modern optimization with R

    CERN Document Server

    Cortez, Paulo

    2014-01-01

    The goal of this book is to gather in a single document the most relevant concepts related to modern optimization methods, showing how such concepts and methods can be addressed using the open source, multi-platform R tool. Modern optimization methods, also known as metaheuristics, are particularly useful for solving complex problems for which no specialized optimization algorithm has been developed. These methods often yield high quality solutions with a more reasonable use of computational resources (e.g. memory and processing effort). Examples of popular modern methods discussed in this book are: simulated annealing; tabu search; genetic algorithms; differential evolution; and particle swarm optimization. This book is suitable for undergraduate and graduate students in Computer Science, Information Technology, and related areas, as well as data analysts interested in exploring modern optimization methods using R.

  12. Foucault and modern medicine.

    Science.gov (United States)

    Peerson, A

    1995-06-01

    Modernity as a concept or ideal, resulting from the age of Enlightenment and the French Revolution gave hope of a better future and new possibilities. To be modern means an 'enlightened' individual and society, welcoming change and development. In this paper, I will discuss Foucault's analysis (1973) of problematics in medicine in eighteenth century France. Three themes prominent in the text are: 'the birth of the clinic', 'the clinical gaze' and the power-knowledge relationship. Three problematics identified in modern medicine by Foucault and which are particularly relevant to twentieth century medicine are: (i) the extension of the clinical gaze from the individual body to the wider population; (ii) the increasing medical intervention and use of technology in fundamental life processes; and (iii) the relationship between society and medicine. I will argue that Foucault's analysis is fraught with ambiguities. It is useful, however, for establishing an explanation for medicine today and for presenting a particular interpretation of modernity.

  13. The ability of modern secretary

    Institute of Scientific and Technical Information of China (English)

    张诗怡; 张婉玲

    2014-01-01

    Modern secretaries need to master a lot of old and new skills including some required skills and some modern abilities. And secretaries in modern offices also have to master some special skills to be supportive to their bosses.

  14. Den moderne patient

    DEFF Research Database (Denmark)

    Lassen, Trine

    2012-01-01

    Kapitlet indkredser, hvordan vi som sundhedsprofessionelle kan forklare den moderne patient. I særdeleshed lægges vægt på definerende faktorer i skabelsen af den patient vi møder i sundhedsvæsnet i dag. Kapitlet giver forskellige teoretiske bud på, hvordan man som sundhedsprofessionel kan anskue...... den moderne, nutidige patienter samt en kortere beskrivelse af, hvordan patienten tidligere er blev anskuet....

  15. Turbine maintenance and modernization

    Energy Technology Data Exchange (ETDEWEB)

    Unga, E. [Teollisuuden Voima Oy, Olkiluoto (Finland)

    1998-12-31

    The disturbance-free operation of the turbine plant plays an important role in reaching good production results. In the turbine maintenance of the Olkiluoto nuclear power plant the lifetime and efficiency of turbine components and the lifetime costs are taken into account in determining the turbine maintenance and modernization/improvement program. The turbine maintenance program and improvement/modernization measures taken in the plant units are described in this presentation. (orig.)

  16. Modern mathematics made simple

    CERN Document Server

    Murphy, Patrick

    1982-01-01

    Modern Mathematics: Made Simple presents topics in modern mathematics, from elementary mathematical logic and switching circuits to multibase arithmetic and finite systems. Sets and relations, vectors and matrices, tesselations, and linear programming are also discussed.Comprised of 12 chapters, this book begins with an introduction to sets and basic operations on sets, as well as solving problems with Venn diagrams. The discussion then turns to elementary mathematical logic, with emphasis on inductive and deductive reasoning; conjunctions and disjunctions; compound statements and conditional

  17. Letterkunde en moderne tyd

    OpenAIRE

    2009-01-01

    Inaugural lecture--Department of Afrikaans, Rand Afrikaans University, 13 July 1968 In this inaugural lecture the characteristics of contemporary literature and its relation to modern life are analysed. The most important influences upon modern literature are traced, amongst others those of mass communication media, the other arts, and earlier literary forms. The notion "portrayal of reality" as a literary criterium is discussed and an attempt made to place it into its proper perspective.

  18. Was ist das Hidden Web? Die Entstehung, Eigenschaften und gesellschaftliche Bedeutung von anonymer Kommunikation im Hidden Web.

    OpenAIRE

    Papsdorf, Christian

    2016-01-01

    More than two-and-a-half million people currently use the Tor network to communicate anonymously via the Internet and gain access to online media that are not accessible using standard Internet technology. This sphere of communication can be described as the hidden web. In part because this phenomenon is very recent, the subject has scarcely been studied in the social sciences. It is therefore the purpose of this paper to answer four fundamental questions: What is the hidden web? What charact...

  19. Modernization of credit relations

    Directory of Open Access Journals (Sweden)

    S.V. Volosovich

    2015-03-01

    Full Text Available Nowadays it is essential to modernize credit relations in the conditions of global economy transformations. This is due to the influence of integration processes on credit relations and transformation of the risks inherent in the credit field. The purpose of this article is to develop measures that help to improve the efficiency of interaction of credit relations’ participants. Modernization of credit relations is based on the interaction of its main and indirect subjects who belong to the subsystems of loans granting, deposits attraction and provision of related services. Its goal is to pass from extensive to intensive model of interaction between the subjects of credit relations. Components of the credit relations modernization are the following: institutional modernization, which is based on the interaction of credit relations’ subjects, and ensures the development of competition in all credit market’s segments, the creation of its corresponding infrastructure, qualitative change in the approaches of regulation and supervision; technological modernization, which involves the formation of joint products on the credit market and the formation of an integrated informational and analytical system. In the result of the credit relations’ modernization it is expected to achieve synergies between the subjects of credit relations, that will lead to changes in the business architecture of the financial market.

  20. Parsing social network survey data from hidden populations using stochastic context-free grammars.

    Directory of Open Access Journals (Sweden)

    Art F Y Poon

    Full Text Available BACKGROUND: Human populations are structured by social networks, in which individuals tend to form relationships based on shared attributes. Certain attributes that are ambiguous, stigmatized or illegal can create a OhiddenO population, so-called because its members are difficult to identify. Many hidden populations are also at an elevated risk of exposure to infectious diseases. Consequently, public health agencies are presently adopting modern survey techniques that traverse social networks in hidden populations by soliciting individuals to recruit their peers, e.g., respondent-driven sampling (RDS. The concomitant accumulation of network-based epidemiological data, however, is rapidly outpacing the development of computational methods for analysis. Moreover, current analytical models rely on unrealistic assumptions, e.g., that the traversal of social networks can be modeled by a Markov chain rather than a branching process. METHODOLOGY/PRINCIPAL FINDINGS: Here, we develop a new methodology based on stochastic context-free grammars (SCFGs, which are well-suited to modeling tree-like structure of the RDS recruitment process. We apply this methodology to an RDS case study of injection drug users (IDUs in Tijuana, México, a hidden population at high risk of blood-borne and sexually-transmitted infections (i.e., HIV, hepatitis C virus, syphilis. Survey data were encoded as text strings that were parsed using our custom implementation of the inside-outside algorithm in a publicly-available software package (HyPhy, which uses either expectation maximization or direct optimization methods and permits constraints on model parameters for hypothesis testing. We identified significant latent variability in the recruitment process that violates assumptions of Markov chain-based methods for RDS analysis: firstly, IDUs tended to emulate the recruitment behavior of their own recruiter; and secondly, the recruitment of like peers (homophily was dependent on

  1. A Modern Dunciad A Modern Dunciad

    Directory of Open Access Journals (Sweden)

    Anita Flanders Rebelo

    2008-04-01

    Full Text Available "Push-button war demands a woman's touch!" shrills Nason's twentieth century goddess Dullness, (in his book length poetic plagiarism of Pope's mock epic Dunciad, as she reestablishes her Empire in the modern New World by masking, cancelling, and attacking Progress and Liberty in a lustful attempt to destroy the Moral and Emotional content of poetry. She sluttishly breeds and fosters the Dunces of the literary kingdom of today, (Pope's Dunces were the poet Laureates of his day, and sallies brazenly everywhere in the company of her muses Self-Service, Smuggnes, sadism, and "sweet Anality", so light and fair,/ Enlaced with tender plaits her public hair".

  2. A New Clue in the Mystery of Fast Radio Bursts

    Science.gov (United States)

    Kohler, Susanna

    2017-06-01

    .Bassa and collaborators also found that the properties of the host galaxy are consistent with those of a type of galaxy known as extreme emission line galaxies. This provides a tantalizing clue, as these galaxies are known to host both hydrogen-poor superluminous supernovae and long-duration gamma-ray bursts.Linking to the CauseWhat can this tell us about the cause of FRB 121102? The fact that this burst repeats already eliminates cataclysmic events as the origin. But the projected location of FRB 121102 within a star-forming region especially in a host galaxy thats similar to those typically hosting superluminous supernovae and long gamma-ray bursts strongly suggests theres a relation between these events.Artists impression of a gamma-ray burst in a star-forming region. [NASA/Swift/Mary Pat Hrybyk-Keith and John Jones]The authors propose that this observed coincidence, supported by models of magnetized neutron star birth, indicate an evolutionary link between fast radio bursts and neutron stars. In this picture, neutron stars or magnetars are born as long gamma-ray bursts or hydrogen-poor supernovae, and then evolve into fast-radio-burst-emitting sources.This picture may finally explain the cause of fast radio bursts but Bassa and collaborators caution that its also possible that this model applies only to FRB 121102. Since FRB 121102 is unique in being the only burst discovered to repeat, its cause may also be unique. The authors suggest that targeted searches of star-forming regions in galaxies similar to FRB 121102s host may reveal other repeating burst candidates, helping us to unravel the ongoing mystery of fast radio bursts.CitationC. G. Bassa et al 2017 ApJL 843 L8. doi:10.3847/2041-8213/aa7a0c

  3. Disease surveillance using a hidden Markov model

    Directory of Open Access Journals (Sweden)

    Wright Graeme

    2009-08-01

    Full Text Available Abstract Background Routine surveillance of disease notification data can enable the early detection of localised disease outbreaks. Although hidden Markov models (HMMs have been recognised as an appropriate method to model disease surveillance data, they have been rarely applied in public health practice. We aimed to develop and evaluate a simple flexible HMM for disease surveillance which is suitable for use with sparse small area count data and requires little baseline data. Methods A Bayesian HMM was designed to monitor routinely collected notifiable disease data that are aggregated by residential postcode. Semi-synthetic data were used to evaluate the algorithm and compare outbreak detection performance with the established Early Aberration Reporting System (EARS algorithms and a negative binomial cusum. Results Algorithm performance varied according to the desired false alarm rate for surveillance. At false alarm rates around 0.05, the cusum-based algorithms provided the best overall outbreak detection performance, having similar sensitivity to the HMMs and a shorter average time to detection. At false alarm rates around 0.01, the HMM algorithms provided the best overall outbreak detection performance, having higher sensitivity than the cusum-based Methods and a generally shorter time to detection for larger outbreaks. Overall, the 14-day HMM had a significantly greater area under the receiver operator characteristic curve than the EARS C3 and 7-day negative binomial cusum algorithms. Conclusion Our findings suggest that the HMM provides an effective method for the surveillance of sparse small area notifiable disease data at low false alarm rates. Further investigations are required to evaluation algorithm performance across other diseases and surveillance contexts.

  4. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  5. Foundational Forces & Hidden Variables in Technology Commercialization

    Science.gov (United States)

    Barnett, Brandon

    2011-03-01

    The science of physics seems vastly different from the process of technology commercialization. Physics strives to understand our world through the experimental deduction of immutable laws and dependent variables and the resulting macro-scale phenomenon. In comparison, the~goal of business is to make a profit by addressing the needs, preferences, and whims of individuals in a market. It may seem that this environment is too dynamic to identify all the hidden variables and deduct the foundational forces that impact a business's ability to commercialize innovative technologies. One example of a business ``force'' is found in the semiconductor industry. In 1965, Intel co-founder Gordon Moore predicted that the number of transistors incorporated in a chip will approximately double every 24 months. Known as Moore's Law, this prediction has become the guiding principle for the semiconductor industry for the last 40 years. Of course, Moore's Law is not really a law of nature; rather it is the result of efforts by Intel and the entire semiconductor industry. A closer examination suggests that there are foundational principles of business that underlie the macro-scale phenomenon of Moore's Law. Principles of profitability, incentive, and strategic alignment have resulted in a coordinated influx of resources that has driven technologies to market, increasing the profitability of the semiconductor industry and optimizing the fitness of its participants. New innovations in technology are subject to these same principles. So, in addition to traditional market forces, these often unrecognized forces and variables create challenges for new technology commercialization. In this talk, I will draw from ethnographic research, complex adaptive theory, and industry data to suggest a framework with which to think about new technology commercialization. Intel's bio-silicon initiative provides a case study.

  6. Hidden Gauge Structure of Supersymmetric Free Differential Algebras

    CERN Document Server

    Andrianopoli, L; Ravera, L

    2016-01-01

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q' introduced in Ref. [3] and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B^(2) and B^(3) in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of t...

  7. Modern Media Phenomenon

    Directory of Open Access Journals (Sweden)

    Erika Prijatelj

    2011-09-01

    Full Text Available Contemporary media culture is de fi ned by the logic of the victorious spectacle expanding to all areas of life. Post-modern capitalism has turned everyday life and culture into entertainment with the help of the spectacular. In fact, such entertainment results in a fake sense of happiness, pop mainstream, the swallowing up alternatives and therefore the creation of a passive consumer society. The media today have a unique power of overwhelming a person with information. They enable a modern person to know much, but understand little. This discussion has cast some light on very popular reality shows, the body and sports. It concludes with a re fl ection on modern media, which leave a person of this age with a patchwork identity.

  8. Liquid Modernity & Late Capitalism

    DEFF Research Database (Denmark)

    Hansen, Claus D.

    conditions of such liquid modernity. In this paper, I want to argue that this picture of Adorno is mistaken and extend the view proposed by Frederic Jameson that Adorno was not only the philosopher of 1990’s but is also very useful in the 2010’s. In fact, the critique of critical theory and emancipation......In Liquid Modernity, Bauman portrays Adorno and the rest of the early Frankfurt School as sociologists and thinkers belonging to the ‘heavy’ phase of modernity. In other words, they are deemed irrelevant to the discussion of current sociological time diagnoses and the purpose of critique under....... The paper argues that there are great similarities but that Adorno (and the rest of the Early Frankfurt School) has a much more well founded philosophical layout of their critique of individualization....

  9. Correction: Rule out pulmonary tuberculosis: clinical and radiographic clues for the internist.

    Science.gov (United States)

    Curley, Catherine Anne

    2015-02-01

    In the article "Rule out pulmonary tuberculosis: Clinical and radiographic clues for the internist" (Curley CA. Cleve Clin J Med 2015; 82:32-38), on page 33, "Bacillus Calmette-Guérin vaccine" has been corrected to "BCG vaccine."

  10. Bacterial vaginosis (clue cell-positive discharge) : diagnostic, ultra-structural and therapeutic aspects

    NARCIS (Netherlands)

    W.I. van der Meijden (Willem)

    1987-01-01

    textabstractThis thesis deals with several aspects of (abnormal) vaginal discharge, focusing especially on clue cell-positive discharge (bacterial vaginosis, nonspecific vaginitis). It reports data on epidemiology and clinical features, pathogenesis, and treatment of this vaginal disease entity, as

  11. Better Contextual Suggestions in ClueWeb12 Using Domain Knowledge Inferred from The Open Web

    NARCIS (Netherlands)

    T. Samar (Thaer); A. Bellogín Kouki (Alejandro); A.P. de Vries (Arjen)

    2015-01-01

    htmlabstractThis paper provides an overview of our participation in the Contextual Suggestion Track. The TREC 2014 Contextual Suggestion Track allowed participants to submit personalized rankings using documents either from the Open Web or from an archived, static Web collection (ClueWeb12)

  12. Devil-nets of clues: True Detective and the search for meaning

    DEFF Research Database (Denmark)

    Tybjerg, Casper

    2016-01-01

    reactions of critics and fans, arguing that the idea that the show intended to exploit digitization by adopting a more game-like approach, offering clues that could only be found using digital tools, is undercut by the many loose ends left unresolved by the finale. The article concludes that the density...

  13. New Literacies and Multimediacy: The Immersive Universe of "The 39 Clues"

    Science.gov (United States)

    Sekeres, Diane Carver; Watson, Christopher

    2011-01-01

    "The 39 Clues" (2009) is a multimedia series produced by Scholastic for readers 7-14 years old that includes printed texts released periodically; trading cards also published periodically in print and virtually; and a complex, intriguing, and entertaining website. To fully experience the multimedia series, the publishers expect that readers can…

  14. clues: An R Package for Nonparametric Clustering Based on Local Shrinking

    Directory of Open Access Journals (Sweden)

    Fang Chang

    2010-02-01

    Full Text Available Determining the optimal number of clusters appears to be a persistent and controversial issue in cluster analysis. Most existing R packages targeting clustering require the user to specify the number of clusters in advance. However, if this subjectively chosen number is far from optimal, clustering may produce seriously misleading results. In order to address this vexing problem, we develop the R package clues to automate and evaluate the selection of an optimal number of clusters, which is widely applicable in the field of clustering analysis. Package clues uses two main procedures, shrinking and partitioning, to estimate an optimal number of clusters by maximizing an index function, either the CH index or the Silhouette index, rather than relying on guessing a pre-specified number. Five agreement indices (Rand index, Hubert and Arabie’s adjusted Rand index, Morey and Agresti’s adjusted Rand index, Fowlkes and Mallows index and Jaccard index, which measure the degree of agreement between any two partitions, are also provided in clues. In addition to numerical evidence, clues also supplies a deeper insight into the partitioning process with trajectory plots.

  15. Det sentimentalt moderne

    DEFF Research Database (Denmark)

    Thule Kristensen, Peter

    2005-01-01

    Romantikken er blevet afskrevet som en mørk epoke, hvor en hang til mystik og tvetydighed ikke passer til det moderne oplysningsprojekts mål om klarhed og orden. Afhendlingen viser imidlertid, hvordan dele af arkitekturen i det 20. århundrede er fyldt med romantisk tankegods, og hvordan romantisk...... nøglemotiver som f.eks. fragment, arabesk, krystal, symbol eller poesi kan bruges i en analyse - også af moderne arkitektur. det ses i bogens nyfortolkninger af værker og teorier hos arkitekterne Erik Gunnar Asplund, Josef Frank, Rudolf Schwarz, Aldo Rossi og Daniel Libeskind...

  16. Modern electronic maintenance principles

    CERN Document Server

    Garland, DJ

    2013-01-01

    Modern Electronic Maintenance Principles reviews the principles of maintaining modern, complex electronic equipment, with emphasis on preventive and corrective maintenance. Unfamiliar subjects such as the half-split method of fault location, functional diagrams, and fault finding guides are explained. This book consists of 12 chapters and begins by stressing the need for maintenance principles and discussing the problem of complexity as well as the requirements for a maintenance technician. The next chapter deals with the connection between reliability and maintenance and defines the terms fai

  17. BARCELONA: URBANSCAPES OF MODERNITY

    Directory of Open Access Journals (Sweden)

    Antoni Remesar

    2015-04-01

    The Do.Co.Mo.Mo’s. database, referring to Barcelona, lists 34 buildings that could be classified as rationalists and / or modern. According to other sources, we could reach fifty constructed buildings between the late 1920s and the end of the war in Spain. The article presents the results of a field work that, using different sources, has tried to to order and record the architectural production that can be considered modern / rationalist in Barcelona in the 1920s and 1930s

  18. European Regional Modernism

    Directory of Open Access Journals (Sweden)

    Vincent Brian Canizaro

    2014-03-01

    Full Text Available In recent years, beginning with the publication in 2003 of Liane Lefaivre and Alexander Tzonis’ 'Critical Regionalism', followed by my 'Architectural Regionalism: Collected Writings on Place, Identity, Modernity and Tradition 'in 2007, there has been a quiet resurgence in the discourse of architectural regionalism.' 'Leuven University Press’s 'Regionalism and Modernity: Architecture in Western Europe 1914–1940 'continues in this direction, with eleven chapters devoted to variations of the regionalist tendency in European architecture focused primarily on Belgium and France, but also Great Britain, Italy, and Germany.

  19. Modernisms and Postmodernisms

    Institute of Scientific and Technical Information of China (English)

    蒋轶阳

    2009-01-01

    The Phrase "modernisms and postmodernisms" is developed for presenting complexity and mutability exiting within and between Modernism and Postmodernism. This thesis attempts to offer the essentiality of the above-mentioned in terms of the respective definitions, the differences in arguing the concept of "tradition" and "new" as well as the terms of "epistemology" and "ontology", the non-abrupt developing process between them. By doing so, the materials, such as T. S. Eliot's poem "The Waste Land" and Langston Hughes' poem "Christ in Alabama", Virginia Woolf "Mrs. Dalloway: are offered for analysis.

  20. Modern recording techniques

    CERN Document Server

    Huber, David Miles

    2013-01-01

    As the most popular and authoritative guide to recording Modern Recording Techniques provides everything you need to master the tools and day to day practice of music recording and production. From room acoustics and running a session to mic placement and designing a studio Modern Recording Techniques will give you a really good grounding in the theory and industry practice. Expanded to include the latest digital audio technology the 7th edition now includes sections on podcasting, new surround sound formats and HD and audio.If you are just starting out or looking for a step up

  1. Modern physics for engineers

    CERN Document Server

    Singh, Jasprit

    1999-01-01

    Linking physics fundamentals to modern technology-a highly applied primer for students and engineersReminding us that modern inventions-new materials, information technologies, medical technological breakthroughs-are based on well-established fundamental principles of physics, Jasprit Singh integrates important topics from quantum mechanics, statistical thermodynamics, and materials science, as well as the special theory of relativity. He then goes a step farther and applies these fundamentals to the workings of electronic devices-an essential leap for anyone interested in developing n

  2. Evidence Feed Forward Hidden Markov Model: A New Type of Hidden Markov Model

    CERN Document Server

    DelRose, Michael; Frederick, Philip; 10.5121/ijaia.2011.2101

    2011-01-01

    The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM), and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important...

  3. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  4. Riboswitch Detection Using Profile Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Krishnamachari A

    2009-10-01

    Full Text Available Abstract Background Riboswitches are a type of noncoding RNA that regulate gene expression by switching from one structural conformation to another on ligand binding. The various classes of riboswitches discovered so far are differentiated by the ligand, which on binding induces a conformational switch. Every class of riboswitch is characterized by an aptamer domain, which provides the site for ligand binding, and an expression platform that undergoes conformational change on ligand binding. The sequence and structure of the aptamer domain is highly conserved in riboswitches belonging to the same class. We propose a method for fast and accurate identification of riboswitches using profile Hidden Markov Models (pHMM. Our method exploits the high degree of sequence conservation that characterizes the aptamer domain. Results Our method can detect riboswitches in genomic databases rapidly and accurately. Its sensitivity is comparable to the method based on the Covariance Model (CM. For six out of ten riboswitch classes, our method detects more than 99.5% of the candidates identified by the much slower CM method while being several hundred times faster. For three riboswitch classes, our method detects 97-99% of the candidates relative to the CM method. Our method works very well for those classes of riboswitches that are characterized by distinct and conserved sequence motifs. Conclusion Riboswitches play a crucial role in controlling the expression of several prokaryotic genes involved in metabolism and transport processes. As more and more new classes of riboswitches are being discovered, it is important to understand the patterns of their intra and inter genomic distribution. Understanding such patterns will enable us to better understand the evolutionary history of these genetic regulatory elements. However, a complete picture of the distribution pattern of riboswitches will emerge only after accurate identification of riboswitches across genomes

  5. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  6. Evidence Feed Forward Hidden Markov Model: A New Type Of Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Michael Del Rose

    2011-01-01

    Full Text Available The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM, and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important in creating intelligent algorithms for determining human actions based on visual observations. The Evidence Feed Forward Hidden Markov Model is a newly developed algorithm which provides observation to observation linkages. The following research addresses the theory behind Evidence Feed Forward HMMs, provides mathematical proofs of their learning of these parameters to optimize the likelihood of observations with a Evidence Feed Forwards HMM, which is important in all computational intelligence algorithm, and gives comparative examples with standard HMMs in classification of both visual action data and measurement data; thus providing a strong base for Evidence Feed Forward HMMs in classification of many types of problems.

  7. Recent Progress in Search for Hidden/Dark Photon

    CERN Document Server

    Deliyergiyev, M A

    2015-01-01

    We will try to communicate the many difficulties that we encounter when attempting to pinpoint a common origin for the several observed anomalies, or assessing their tension with existing exclusion limits. These include systematics affecting the operation of the detectors, our knowledge of their response, astrophysical uncertainties, and the broad range of particle couplings that can mediate the interaction with a detector target. The interesting astrophysical evidence that motivates a search for dark-photon and focuses our attention on a Hidden Valleys model with a GeV-scale dark sector that produces the exciting signatures, which may include the possible constituent of dark matter, the possible existence of extra gauge groups. Results from the recent underground experiments are also considered. Many models of new physics beyond the Standard Model contain a 'light' hidden sector (dark sector) with a colorful spectrum of new particles. Recently, it has been shown that the hidden sector can give rise to unique...

  8. Applications of hidden symmetries to black hole physics

    Energy Technology Data Exchange (ETDEWEB)

    Frolov, Valeri, E-mail: vfrolov@ualberta.ca [Institute of Theoretical Physics, Department of Physics University of Alberta, Edmonton, Alberta, T6G 2G7 (Canada)

    2011-02-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  9. The hidden-charm pentaquark and tetraquark states

    CERN Document Server

    Chen, Hua-Xing; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    In the past decade many charmonium-like states were observed experimentally. Especially those charged charmonium-like $Z_c$ states and bottomonium-like $Z_b$ states can not be accommodated within the naive quark model. These charged $Z_c$ states are good candidates of either the hidden-charm tetraquark states or molecules composed of a pair of charmed mesons. Recently, the LHCb Collaboration discovered two hidden-charm pentaquark states, which are also beyond the quark model. In this work, we review the current experimental progress and investigate various theoretical interpretations of these candidates of the multiquark states. We list the puzzles and theoretical challenges of these models when confronted with the experimental data. We also discuss possible future measurements which may distinguish the theoretical schemes on the underlying structures of the hidden-charm multiquark states.

  10. Ontology-based Knowledge Extraction from Hidden Web

    Institute of Scientific and Technical Information of China (English)

    SONG Hui; MA Fan-yuan; LIU Xiao-qiang

    2004-01-01

    Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not refer how to make extracted information available for knowledge system. This paper describes a novel approach to build a domain-specific knowledge service with the data retrieved from Hidden Web. Ontology serves to model the domain knowledge. Queries forms of different Web sites are translated into machine-understandable format, defined knowledge concepts, so that they can be accessed automatically. Also knowledge data are extracted from Web pages and organized in ontology format knowledge. The experiment proves the algorithm achieves high accuracy and the system facilitates constructing knowledge services greatly.

  11. Applications of hidden symmetries to black hole physics

    CERN Document Server

    Frolov, Valeri

    2010-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set (`tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  12. Using the hidden curriculum to teach professionalism in nursing students.

    Science.gov (United States)

    Karimi, Zohreh; Ashktorab, Tahereh; Mohammadi, Easa; Abedi, Heidar Ali

    2014-03-01

    Professionalism in nursing is critical for creating credibility and a positive image. This study was carried out to explain the use of hidden curriculum in teaching professionalism in nursing students. This qualitative study was conducted through purposeful sampling strategy by the participation of 32 nursing students. The data were collected by using semi-structured interviews, and this process was continued until achieving data saturation and themes' emergence. Content analysis method was used for data analysis. DATA ANALYSIS REVEALED THREE MAIN THEMES: Development of understanding the professionalism elements, Variety of influenceability strategies, and Influenceability to various resources. Each theme consisted of some subthemes. The nursing students learnt the professionalism elements by different methods from different resources through the hidden curriculum. Therefore, exploration of the currently administered hidden curricula is suggested.

  13. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  14. Detect and exploit hidden structure in fatty acid signature data

    Science.gov (United States)

    Budge, Suzanne; Bromaghin, Jeffrey; Thiemann, Gregory

    2017-01-01

    Estimates of predator diet composition are essential to our understanding of their ecology. Although several methods of estimating diet are practiced, methods based on biomarkers have become increasingly common. Quantitative fatty acid signature analysis (QFASA) is a popular method that continues to be refined and extended. Quantitative fatty acid signature analysis is based on differences in the signatures of prey types, often species, which are recognized and designated by investigators. Similarly, predator signatures may be structured by known factors such as sex or age class, and the season or region of sample collection. The recognized structure in signature data inherently influences QFASA results in important and typically beneficial ways. However, predator and prey signatures may contain additional, hidden structure that investigators either choose not to incorporate into an analysis or of which they are unaware, being caused by unknown ecological mechanisms. Hidden structure also influences QFASA results, most often negatively. We developed a new method to explore signature data for hidden structure, called divisive magnetic clustering (DIMAC). Our DIMAC approach is based on the same distance measure used in diet estimation, closely linking methods of data exploration and parameter estimation, and it does not require data transformation or distributional assumptions, as do many multivariate ordination methods in common use. We investigated the potential benefits of the DIMAC method to detect and subsequently exploit hidden structure in signature data using two prey signature libraries with quite different characteristics. We found that the existence of hidden structure in prey signatures can increase the confusion between prey types and thereby reduce the accuracy and precision of QFASA diet estimates. Conversely, the detection and exploitation of hidden structure represent a potential opportunity to improve predator diet estimates and may lead to new

  15. Performance based analysis of hidden beams in reinforced concrete structures

    Directory of Open Access Journals (Sweden)

    Helou Samir H.

    2014-01-01

    Full Text Available Local and perhaps regional vernacular reinforced concrete building construction leans heavily against designing slabs with imbedded hidden beams for flooring systems in most structures including major edifices. The practice is distinctive in both framed and in shear wall structures. Hidden beams are favoured structural elements due to their many inherent features that characterize them; they save on floor height clearance; they also save on formwork, labour and material cost. Moreover, hidden beams form an acceptable aesthetic appearance that does not hinder efficient interior space partitioning. Such beams have the added advantage of clearing the way for horizontal electromechanical ductwork. However, seismic considerations, in all likelihood, are seldom seriously addressed. The mentioned structural system of shallow beams is adopted in ribbed slabs, waffle slabs and at times with solid slabs. Ribbed slabs and waffle slabs are more prone to hidden beam inclusion due to the added effective height of the concrete section. Due to the presence of a relatively high reinforcement ratio at the joints the sections at such location tend to become less ductile with unreliable contribution to spandrel force resistance. In the following study the structural influence of hidden beams within slabs is investigated. With the primary focus on a performance based analysis of such elements within a structure. This is investigated with due attention to shear wall contribution to the overall behaviour of such structures. Numerical results point in the direction that the function of hidden beams is not as adequate as desired. Therefore it is strongly believed that they are generally superfluous and maybe eliminated altogether. Conversely, shallow beams seem to render the overall seismic capacity of the structure unreliable. Since such an argument is rarely manifested within the linear analysis domain; a pushover analysis exercise is thus mandatory for behaviour

  16. Modern Versus Traditional Mathematics

    Science.gov (United States)

    Roberts, A. M.

    1974-01-01

    The effect of different secondary school mathematics syllabi on first-year performance in college-level mathematics was studied in an attempt to evaluate the syllabus change. Students with a modern mathematics background performed sigficantly better on most first-year units. A topic-by-topic analysis of results is included. (DT)

  17. Modern Biotechnology in China

    Science.gov (United States)

    Wang, Qing-Zhao; Zhao, Xue-Ming

    In recent years, with the booming economy, the Chinese government has increased its financial input to biotechnology research, which has led to remarkable achievements by China in modern biotechnology. As one of the key parts of modern biotechnology, industrial biotechnology will be crucial for China's sustainable development in this century. This review presents an overview of Chinese industrial biotechnology in last 10 years. Modern biotechnology had been classified into metabolic engineering and systems biology framework. Metabolic engineering is a field of broad fundamental and practical concept so we integrated the related technology achievements into the real practices of many metabolic engineering cases, such as biobased products production, environmental control and others. Now metabolic engineering is developing towards the systems level. Chinese researchers have also embraced this concept and have contributed invaluable things in genomics, transcriptomics, proteomics and related bioinformatics. A series of advanced laboratories or centers were established which will represent Chinese modern biotechnology development in the near future. At the end of this review, metabolic network research advances have also been mentioned.

  18. A Modern Periodic Table.

    Science.gov (United States)

    Herrenden-Harker, B. D.

    1997-01-01

    Presents a modern Periodic Table based on the electron distribution in the outermost shell and the order of filling of the sublevels within the shells. Enables a student to read off directly the electronic configuration of the element and the order in which filling occurs. (JRH)

  19. Meta Modernism: An Introduction

    Science.gov (United States)

    Snell, Joel

    2016-01-01

    The author introduces Hegel. From the triad (Hegelian Dialect), he briefly gives an overview of the history of philosophy. In true Hegelian form, it is now time to reform "Postmodernism" and replace it with "Meta modernism." Postmodern had a short life from 1950 to now and has left few adherents. It is confusing and…

  20. Modern Reduction Methods

    CERN Document Server

    Andersson, Pher G

    2008-01-01

    With its comprehensive overview of modern reduction methods, this book features high quality contributions allowing readers to find reliable solutions quickly and easily. The monograph treats the reduction of carbonyles, alkenes, imines and alkynes, as well as reductive aminations and cross and heck couplings, before finishing off with sections on kinetic resolutions and hydrogenolysis. An indispensable lab companion for every chemist.

  1. Facility Modernization Report

    Energy Technology Data Exchange (ETDEWEB)

    Robinson, D; Ackley, R

    2007-05-10

    Modern and technologically up-to-date facilities and systems infrastructure are necessary to accommodate today's research environment. In response, Lawrence Livermore National Laboratory (LLNL) has a continuing commitment to develop and apply effective management models and processes to maintain, modernize, and upgrade its facilities to meet the science and technology mission. The Facility Modernization Pilot Study identifies major subsystems of facilities that are either technically or functionally obsolete, lack adequate capacity and/or capability, or need to be modernized or upgraded to sustain current operations and program mission. This study highlights areas that need improvement, system interdependencies, and how these systems/subsystems operate and function as a total productive unit. Although buildings are 'grandfathered' in and are not required to meet current codes unless there are major upgrades, this study also evaluates compliance with 'current' building, electrical, and other codes. This study also provides an evaluation of the condition and overall general appearance of the structure.

  2. Medicalized weapons & modern war.

    Science.gov (United States)

    Gross, Michael L

    2010-01-01

    "Medicalized" weapons--those that rely on advances in neuroscience, physiology, and pharmacology--offer the prospect of reducing casualties and protecting civilians. They could be especially useful in modern asymmetric wars in which conventional states are pitted against guerrilla or insurgent forces. But may physicians and other medical workers participate in their development?

  3. Customs Modernization Handbook

    OpenAIRE

    De Wulf, Luc; Sokol, José B.

    2005-01-01

    This handbook aims to make a positive contribution to the efforts that many countries are undertaking to modernize their customs administrations. The handbook views a competent and well-organized customs service as one that successfully balances its various responsibilities to ensure a high level of compliance with revenue objectives and regulatory requirements while at the same time inter...

  4. A Modern Periodic Table.

    Science.gov (United States)

    Herrenden-Harker, B. D.

    1997-01-01

    Presents a modern Periodic Table based on the electron distribution in the outermost shell and the order of filling of the sublevels within the shells. Enables a student to read off directly the electronic configuration of the element and the order in which filling occurs. (JRH)

  5. Euripides in Modern Europe

    NARCIS (Netherlands)

    den Boer, P.

    2010-01-01

    Euripides is considered the most human, modern and existentialist of the famous Greek tragedians. Extremely popular after his death, he continued to be staged, read and much recited in Hellenistic and Roman times. As the Greek-speaking elite of the Roman Empire disappeared, the popularity of the Eur

  6. Modern biotechnology in China.

    Science.gov (United States)

    Wang, Qing-Zhao; Zhao, Xue-Ming

    2010-01-01

    In recent years, with the booming economy, the Chinese government has increased its financial input to biotechnology research, which has led to remarkable achievements by China in modern biotechnology. As one of the key parts of modern biotechnology, industrial biotechnology will be crucial for China's sustainable development in this century. This review presents an overview of Chinese industrial biotechnology in last 10 years. Modern biotechnology had been classified into metabolic engineering and systems biology framework. Metabolic engineering is a field of broad fundamental and practical concept so we integrated the related technology achievements into the real practices of many metabolic engineering cases, such as biobased products production, environmental control and others. Now metabolic engineering is developing towards the systems level. Chinese researchers have also embraced this concept and have contributed invaluable things in genomics, transcriptomics, proteomics and related bioinformatics. A series of advanced laboratories or centers were established which will represent Chinese modern biotechnology development in the near future. At the end of this review, metabolic network research advances have also been mentioned.

  7. Meta Modernism: An Introduction

    Science.gov (United States)

    Snell, Joel

    2016-01-01

    The author introduces Hegel. From the triad (Hegelian Dialect), he briefly gives an overview of the history of philosophy. In true Hegelian form, it is now time to reform "Postmodernism" and replace it with "Meta modernism." Postmodern had a short life from 1950 to now and has left few adherents. It is confusing and…

  8. Shiwan Modern Pottery

    Institute of Scientific and Technical Information of China (English)

    1996-01-01

    Shiwan, Guangdong Province, is the native home of the ancient Chinese pottery culture. The soft, fine and smooth pottery clay found in Shiwan is highly suited for sculpting various figures, animals and utensils. Shiwan has now introduced modern pottery techniques, with local craftsmen combining calligraphy, painting,

  9. Modern Fortran in practice

    NARCIS (Netherlands)

    Markus, A.

    2012-01-01

    From its earliest days, the Fortran programming language has been designed with computing efficiency in mind. The latest standard, Fortran 2008, incorporates a host of modern features, including object-orientation, array operations, user-defined types, and provisions for parallel computing. This tut

  10. Reheating the Standard Model from a hidden sector

    Science.gov (United States)

    Tenkanen, Tommi; Vaskonen, Ville

    2016-10-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before big bang nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful big bang nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  11. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-01-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  12. Backward causation, hidden variables and the meaning of completeness

    Indian Academy of Sciences (India)

    Huw Price

    2001-02-01

    Bell’s theorem requires the assumption that hidden variables are independent of future measurement settings. This independence assumption rests on surprisingly shaky ground. In particular, it is puzzlingly time-asymmetric. The paper begins with a summary of the case for considering hidden variable models which, in abandoning this independence assumption, allow a degree of ‘backward causation’. The remainder of the paper clarifies the physical significance of such models, in relation to the issue as to whether quantum mechanics provides a complete description of physical reality.

  13. Dynamically Generated Open and Hidden Charm Meson Systems

    CERN Document Server

    Gamermann, D; Strottman, D D; Vacas, M J V

    2006-01-01

    The lowest order chiral Lagrangian successfully applied to study the interaction of the SU(3) octet of pseudo-scalar mesons is generalized to include all mesons from the SU(4) 15-plet of pseudo-scalar mesons. Exchanges of heavy vector mesons, which are indirectly taken into account via this approach, are suppressed. Unitarization in coupled channels leads to dynamical generation of resonances in the open and hidden charm sectors. In particular, for reasonable values of the input, a new narrow scalar resonance in the hidden charm sector appears with a mass of 3.7 GeV.

  14. Reheating the Standard Model from a Hidden Sector

    CERN Document Server

    Tenkanen, Tommi

    2016-01-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before Big Bang Nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful Big Bang Nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  15. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-02-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  16. Image Coding using Markov Models with Hidden States

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto

    1999-01-01

    The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same.......The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same....

  17. How to Find a Hidden World at the LHC

    CERN Document Server

    Wells, James D

    2008-01-01

    I discuss how the Large Hadron Collider era should broaden our view of particle physics research, and apply this thinking to the case of Hidden Worlds. I focus on one of the simplest representative cases of a Hidden World, and detail the rich implications it has for LHC physics, including universal suppression of Higgs boson production, trans-TeV heavy Higgs boson signatures, heavy-to-light Higgs boson decays, weakly coupled exotic gauge bosons, and Higgs boson decays to four fermions via light exotic gauge bosons. Some signatures may be accessible in the very early stages of collider operation, whereas others motivate a later high-lumonosity upgrade.

  18. 78 FR 17744 - Culturally Significant Objects Imported for Exhibition Determinations: “Maya: Hidden Worlds...

    Science.gov (United States)

    2013-03-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Culturally Significant Objects Imported for Exhibition Determinations: ``Maya: Hidden Worlds Revealed... determine that the objects to be included in the exhibition ``Maya: Hidden Worlds Revealed,'' imported...

  19. The Function and the Utilization of Hidden Curriculum in College English Teaching

    Institute of Scientific and Technical Information of China (English)

    张英

    2013-01-01

    Explore the nature of the hidden curriculum, and utilize the positive functions of hidden curriculum with theory on English teaching and psychological linguistics to obtain desirable effects in College English teaching.

  20. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    Indian Academy of Sciences (India)

    H Itoh; N Okada; T Yamashita

    2007-11-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden.

  1. Coarse-grained hidden entropy production in partially inaccessible quantum jump trajectories

    OpenAIRE

    Frenzel, Max F.; Sagawa, Takahiro

    2016-01-01

    We consider an open quantum system for which only a subset of all possible transitions are accessible, while the remaining ones are hidden from direct observation. Using a modification of the notion of quantum jump trajectories we introduce the coarse-grained hidden entropy, which quantifies the entropy production in the hidden subsystem conditioned on our observations of the visible part. The entropy production consisting of the sum of visible and coarse-grained hidden entropy is shown to sa...

  2. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  3. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  4. MODERN BIOGAS TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Yu. I. Sidorov

    2013-02-01

    Full Text Available The modern technical level of biogas technologies is considered, in particular in Ukraine. It is shown that in Ukraine the level of introduction of these technologies remains unsatisfactory. The main reason of such state is absence of the government program of development of sufficiently not profitable biogas industry, which again depends on availability of investment facilities including the state one. On the example of the company’s data Zorg Biogas AG, which is dominant in Ukraine among the foreign ones that offer their products using the technique of the net present value — NPV — it is shown insolvency of functioning of profitable biogas power plants. A conclusion is done about the necessity of orientation on own development in area of biogas technologies, State support and intensive technologies. The world level of modern intensive biogas technologies, in particular the use of the cogeneration plants.

  5. Modernism in American Literature

    Institute of Scientific and Technical Information of China (English)

    徐君

    2011-01-01

    Modernism is a movement of artists and designers who rebelled against late 19th century's academic and historicist tradition, and embraced the new economic, social and political aspects of the emerging modem world. This thesis is going to analyze the key dements like experimentation, anti-realism and individualism of Modernism in literature by introducing well-known writers and their works in different period. The thesis also draws a conclusion that the work of modernist writers is characterized by showing the disenchantment, dislocation, and alienation of men in the world, and by the emphasis on experimentation and formalism and objectivism which are reactions to the cataclysm known as the Modem Age.

  6. Modern particle physics

    CERN Document Server

    AUTHOR|(CDS)2079874

    2013-01-01

    Unique in its coverage of all aspects of modern particle physics, this textbook provides a clear connection between the theory and recent experimental results, including the discovery of the Higgs boson at CERN. It provides a comprehensive and self-contained description of the Standard Model of particle physics suitable for upper-level undergraduate students and graduate students studying experimental particle physics. Physical theory is introduced in a straightforward manner with full mathematical derivations throughout. Fully-worked examples enable students to link the mathematical theory to results from modern particle physics experiments. End-of-chapter exercises, graded by difficulty, provide students with a deeper understanding of the subject. Online resources available at www.cambridge.org/MPP feature password-protected fully-worked solutions to problems for instructors, numerical solutions and hints to the problems for students and PowerPoint slides and JPEGs of figures from the book.

  7. Methods in Modern Biophysics

    CERN Document Server

    Nölting, Bengt

    2006-01-01

    Incorporating recent dramatic advances, this textbook presents a fresh and timely introduction to modern biophysical methods. An array of new, faster and higher-power biophysical methods now enables scientists to examine the mysteries of life at a molecular level. This innovative text surveys and explains the ten key biophysical methods, including those related to biophysical nanotechnology, scanning probe microscopy, X-ray crystallography, ion mobility spectrometry, mass spectrometry, proteomics, and protein folding and structure. Incorporating much information previously unavailable in tutorial form, Nölting employs worked examples and 267 illustrations to fully detail the techniques and their underlying mechanisms. Methods in Modern Biophysics is written for advanced undergraduate and graduate students, postdocs, researchers, lecturers and professors in biophysics, biochemistry and related fields. Special features in the 2nd edition: • Illustrates the high-resolution methods for ultrashort-living protei...

  8. Modern examples of extinctions

    DEFF Research Database (Denmark)

    Lövei, Gabor L

    2013-01-01

    No species lives forever, and extinction is the ultimate fate of all living species. The fossil record indicates that a recent extinction wave affecting terrestrial vertebrates was parallel with the arrival of modern humans to areas formerly uninhabited by them. These modern instances of extinction...... started at around 40,000 years ago. On continents, large mammals (especially those >50 kg body mass) were affected, while on islands, the impacts were mainly felt by birds. The causes of these extinctions are not well known but hunting, habitat alteration and the introduction of non-native species...... reasons (certain groups do not fossilize) and methodological problems (methods of excavation and identification). Consequently, we can only crudely estimate the current rate of extinction. Nonetheless, it is evident that humans generated a new mass extinction, affecting all species in all habitats, and...

  9. Gold in Modern Economy

    Directory of Open Access Journals (Sweden)

    Boryshkevych Olena V.

    2014-01-01

    Full Text Available The article studies the role of gold in modern economy. It analyses dynamics and modern state of the gold market. It studies volumes of contracts in exchange and off-exchange markets. In order to reveal changes of key features of the gold market, it focuses on the study of gold demand volumes, studies volumes and geographical changes in the world gold mining, and analyses volumes of monetary gold of central banks and its share in gold and currency reserves. It analyses price fluctuations in the gold market during 1968 – 2013 and identifies main factors that determine the gold price. It identifies interconnection between the state of the gold market and financial markets of countries. The study showed that namely geopolitical and economic instability restricts the spectrum of financial assets for investing and gold is not only a safe investment object but also a profitable one.

  10. Modern water resources engineering

    CERN Document Server

    Yang, Chih

    2014-01-01

    The Handbook of Environmental Engineering series is an incredible collection of methodologies that study the effects of pollution and waste in their three basic forms: gas, solid, and liquid. This exciting new addition to the series, Volume 15: Modern Water Resources Engineering , has been designed to serve as a water resources engineering reference book as well as a supplemental textbook. We hope and expect it will prove of equal high value to advanced undergraduate and graduate students, to designers of water resources systems, and to scientists and researchers. A critical volume in the Handbook of Environmental Engineering series, chapters employ methods of practical design and calculation illustrated by numerical examples, include pertinent cost data whenever possible, and explore in great detail the fundamental principles of the field. Volume 15: Modern Water Resources Engineering, provides information on some of the most innovative and ground-breaking advances in the field today from a panel of esteemed...

  11. Modern operating systems

    CERN Document Server

    Tanenbaum, Andrew S

    2015-01-01

    Modern Operating Systems, Fourth Edition, is intended for introductory courses in Operating Systems in Computer Science, Computer Engineering, and Electrical Engineering programs. It also serves as a useful reference for OS professionals ' The widely anticipated revision of this worldwide best-seller incorporates the latest developments in operating systems (OS) technologies. The Fourth Edition includes up-to-date materials on relevant'OS. Tanenbaum also provides information on current research based on his experience as an operating systems researcher. ' Modern Operating Systems, Third Editionwas the recipient of the 2010 McGuffey Longevity Award. The McGuffey Longevity Award recognizes textbooks whose excellence has been demonstrated over time.'http://taaonline.net/index.html " Teaching and Learning Experience This program will provide a better teaching and learning experience-for you and your students. It will help: ' *Provide Practical Detail on the Big Picture Concepts: A clear and entertaining writing s...

  12. Phase transitions modern applications

    CERN Document Server

    Gitterman, Moshe

    2014-01-01

    This book provides a comprehensive review of the theory of phase transitions and its modern applications, based on the five pillars of the modern theory of phase transitions i.e. the Ising model, mean field, scaling, renormalization group and universality. This expanded second edition includes, along with a description of vortices and high temperature superconductivity, a discussion of phase transitions in chemical reaction and moving systems. The book covers a close connection between phase transitions and small world phenomena as well as scale-free systems such as the stock market and the Internet. Readership: Scientists working in different fields of physics, chemistry, biology and economics as well as teaching material for undergraduate and graduate courses.

  13. Methods in Modern Biophysics

    CERN Document Server

    Nölting, Bengt

    2010-01-01

    Incorporating recent dramatic advances, this textbook presents a fresh and timely introduction to modern biophysical methods. An array of new, faster and higher-power biophysical methods now enables scientists to examine the mysteries of life at a molecular level. This innovative text surveys and explains the ten key biophysical methods, including those related to biophysical nanotechnology, scanning probe microscopy, X-ray crystallography, ion mobility spectrometry, mass spectrometry, proteomics, and protein folding and structure. Incorporating much information previously unavailable in tutorial form, Nölting employs worked examples and about 270 illustrations to fully detail the techniques and their underlying mechanisms. Methods in Modern Biophysics is written for advanced undergraduate and graduate students, postdocs, researchers, lecturers, and professors in biophysics, biochemistry and related fields. Special features in the 3rd edition: Introduces rapid partial protein ladder sequencing - an important...

  14. Modern examples of extinctions

    DEFF Research Database (Denmark)

    Lövei, Gabor L

    2013-01-01

    No species lives forever, and extinction is the ultimate fate of all living species. The fossil record indicates that a recent extinction wave affecting terrestrial vertebrates was parallel with the arrival of modern humans to areas formerly uninhabited by them. These modern instances of extinction...... started at around 40,000 years ago. On continents, large mammals (especially those >50 kg body mass) were affected, while on islands, the impacts were mainly felt by birds. The causes of these extinctions are not well known but hunting, habitat alteration and the introduction of non-native species...... are the main causes of extinction. Our knowledge about extinctions is very incomplete, due to bias in research by taxonomy (vertebrate groups are better studied), geography (northern areas have received more attention), habitat (terrestrial habitats are better known than marine ones), as well as biological...

  15. Modern electronic materials

    CERN Document Server

    Watkins, John B

    2013-01-01

    Modern Electronic Materials focuses on the development of electronic components. The book first discusses the history of electronic components, including early developments up to 1900, developments up to World War II, post-war developments, and a comparison of present microelectric techniques. The text takes a look at resistive materials. Topics include resistor requirements, basic properties, evaporated film resistors, thick film resistors, and special resistors. The text examines dielectric materials. Considerations include basic properties, evaporated dielectric materials, ceramic dielectri

  16. Cobol software modernization

    CERN Document Server

    Barbier, Franck

    2015-01-01

    Nowadays, billions of lines of code are in the COBOL programming language. This book is an analysis, a diagnosis, a strategy, a MDD method and a tool to transform legacy COBOL into modernized applications that comply with Internet computing, Service-Oriented Architecture (SOA) and the Cloud.  It serves as a blueprint for those in charge of finding solutions to this considerable challenge.

  17. 1998 Army Modernization Plan

    Science.gov (United States)

    1998-01-01

    Biological (CB) Protective Duty Uniform (STO) • Biometrics (SRO) • Nanoscience (SRO) • Millimeter Wave Material and Dissemination Technology... Biometrics and Nanoscience SROs will enable the development of advanced NBC detection and characterization systems, including the exploitation of biologically...Requirements Trailers • Procure HEMAT Trailers Figure K-23 K-19 //;<?. U.S. Army 1997Modernization Plan This final fleet assessment, made against the

  18. Early modern sport

    OpenAIRE

    Huggins, Mike

    2017-01-01

    The "early modern" has always suffered problems of periodization. Its beginnings overlap with the Late Middle Ages when sport and athletic exercise were moving away from military training. It encompasses the Renaissance, Reformation, and Counter-Reformation and the scientific shifts of the Age of Enlightenment, movements that were diverse chronologically, geographically, culturally and intellectually. Some historians link its beginnings to block-printing, the beginning of the Tudor period, or...

  19. Modern algebra essentials

    CERN Document Server

    Lutfiyya, Lutfi A

    2012-01-01

    REA's Essentials provide quick and easy access to critical information in a variety of different fields, ranging from the most basic to the most advanced. As its name implies, these concise, comprehensive study guides summarize the essentials of the field covered. Essentials are helpful when preparing for exams, doing homework and will remain a lasting reference source for students, teachers, and professionals. Modern Algebra includes set theory, operations, relations, basic properties of the integers, group theory, and ring theory.

  20. Modern Human Capital Management

    OpenAIRE

    Feldberger, Madita

    2008-01-01

    Title: Modern Human Capital Management Seminar date: 30th of May 2008 Course: Master thesis in Business Administration, 15 ECTS Authors: Madita Feldberger Supervisor: Lars Svensson Keywords: Human capital, SWOT Analysis, Strategic Map, Balanced Scorecard Research Problem: Despite of the success of Human Capital Management (HCM) in research it did not arrive yet in the HR departments of many companies. Numerous firms even have problems to set their strategic goals with focus on HR. The HR Bala...

  1. Den moderne russiske stat

    DEFF Research Database (Denmark)

    Hansen, Flemming Splidsboel

    Briefet er inddelt i tre hovedafsnit. I første del gennemgås de tre verdensordener kort, og Flemming Splidsboel forklarer hvorledes de forholder sig til hinanden. Derefter diskuteres det russiske syn på fire elementer fra de moderne og postmoderne verdensordener - suverænitet, magt, de nationale ...... interesser og individets status. Flemming Splidsboel slutter af med at præsentere nogle tanker vedrørende den fremtidige læring i Rusland....

  2. Jihad, Modernity, and Sectarianism

    DEFF Research Database (Denmark)

    Sedgwick, Mark

    2007-01-01

    are relatively modern: anti-colonial jihad, pacifist jihad, and Islamist jihad. All three are explored further by other articles in this issue. This essay also argues that the internal dynamics of the Islamist terrorist cell have much in common with the internal dynamics of the sectarian NRM......, and that understanding this helps to explain both the moral and the strategic/operational decisions made by Islamist terrorists....

  3. Revisiting modern portfolio theory

    OpenAIRE

    Tenani, Paulo

    2016-01-01

    This paper revisits Modern Portfolio Theory and derives eleven properties of Efficient Allocations and Portfolios in the presence of leverage. With different degrees of leverage, an Efficient Portfolio is a linear combination of two portfolios that lie in different efficient frontiers - which allows for an attractive reinterpretation of the Separation Theorem. In particular a change in the investor risk-return preferences will leave the allocation between the Minimum Risk and Risk Portfolios ...

  4. Modern Methods in Marketing

    OpenAIRE

    Jandová, Pavlína

    2007-01-01

    Traditional marketing methods are losing their effectiveness and credibility. It has been worse and worse to communicate with customers, and marketers are therefore looking for new techniques and way how to appeal buyers. They turn to the use of modern marketing methods, which typical features are possibility of accurate targeting and low costs, and, also, the fact that they are still not considered being a classic promotion. In the theoretical part of the diploma thesis the alternative marke...

  5. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De...

  6. Searching for a hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Sanchis-Lozano Miguel-Angel

    2016-01-01

    Full Text Available A hidden sector beyond the Standard Model can show up in multiparticle production altering inclusive correlations and factorial cumulants of multiplicity distributions. In this report such a study is advocated with a special emphasis on the searches at LHC.

  7. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  8. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  9. Is the Hidden Curriculum a Relevant Issue in Educational Processes

    Directory of Open Access Journals (Sweden)

    Patarroyo Esther

    2004-08-01

    Full Text Available This paper explores some ideas about the hidden curriculum as an amount of ideas and beliefs which are implicit in an indirect way into the scholar life. Those ideas are regarding to gender equality, social status and racial difference, among others. We consider teachers are able to integrate the hidden curriculum as a pedagogical strategy in the classroom. Examples of integration include activities such as observation techniques, role-plays, peer modeling and particularly, the portfolio as a useful tool for reflection which reveals the hidden curriculum. Key words: Hidden Curriculum, Pedagogical Strategy, Portfolio, ELT Processes, Stereotypes Este documento explora algunas ideas acerca del currículo oculto como una suma de ideas y creencias que están implícitos de una forma indirecta dentro de la vida escolar. Estas ideas están relacionadas con la equidad de género, diferencias sociales y raciales, entre otros. Consideramos que es posible para los docentes integrar el currículo como estrategia pedagógica en el aula. Ejemplos de esta integración incluyen técnicas de observación, juegos de roles, modelamiento en parejas y particularmente, el portafolio como herramienta de reflexión que permita hacer evidente el currículo oculto. Palabras claves: Currículo Oculto, Estrategia Pedagógica, Estereotipos, Enseñanza de Inglés, Portafolio

  10. Multistability and hidden attractors in a relay system with hysteresis

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.

    2015-01-01

    For nonlinear dynamic systems with switching control, the concept of a "hidden attractor" naturally applies to a stable dynamic state that either (1) coexists with the stable switching cycle or (2), if the switching cycle is unstable, has a basin of attraction that does not intersect with the nei...

  11. The Hidden Curriculum of Youth Policy: A Dutch Example

    NARCIS (Netherlands)

    Hopman, M.; De Winter, M.; Koops, W.

    2014-01-01

    Youth policy is more than a mere response to the actual behavior of children, but it is equally influenced by values and beliefs of policy makers. These values are however rarely made explicit and, therefore, the authors refer to them as “the hidden curriculum” of youth policy. The study investigati

  12. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel

    2016-01-01

    Most signatures of new physics in colliders have been studied so far on the transverse plane with respect to the beam direction. In this work however we study the impact of a hidden sector beyond the Standard Model (SM) on inclusive (pseudo)rapidity correlations and moments of the multiplicity distributions, with special emphasis in the LHC results.

  13. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  14. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...

  15. Thermoelectric generator hidden in a shirt with a fabric radiator

    Science.gov (United States)

    Leonov, Vladimir; Vullers, Ruud J. M.; Hoof, Chris Van

    2012-06-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers of a shirt and its characteristics are reported.

  16. Discriminative training of self-structuring hidden control neural models

    DEFF Research Database (Denmark)

    Sørensen, Helge Bjarup Dissing; Hartmann, Uwe; Hunnerup, Preben

    1995-01-01

    This paper presents a new training algorithm for self-structuring hidden control neural (SHC) models. The SHC models were trained non-discriminatively for speech recognition applications. Better recognition performance can generally be achieved, if discriminative training is applied instead. Thus...

  17. Old, New and Hidden Causes of Perioperative Hypersensitivity.

    Science.gov (United States)

    Garvey, Lene Heise

    2016-01-01

    Perioperative hypersensitivity reactions are rare, often life-threatening events, and subsequent investigations to identify the culprit are important to avoid re-exposure. All exposures in the perioperative setting may potentially be the cause of a hypersensitivity reaction, but drugs administered intravenously such as neuromuscular blocking agents (NMBA), induction agents and antibiotics have traditionally been reported to be implicated most commonly. It has recently become apparent that there are geographical differences in sensitization patterns related to variation in exposures, referral patterns and performance and interpretation of investigations. Differences in sensitization to NMBAs are partly explained by cross sensitization to pholcodine, an ingredient in cough-medicines available in some countries. While NMBAs are the most common causes of perioperative hypersensitivity in some countries, this may not necessarily be the case in all countries. New and hidden allergens have emerged as causes of perioperative hypersensitivity such as blue dyes, chlorhexidine and excipients. Detailed knowledge of the events at the time of reaction is necessary to identify potential culprits including rare and hidden allergens. Cooperation between allergists and anaesthetists, or other staff present perioperatively, is often needed to identify hidden or even undocumented exposures. The objectives of this review are to provide an overview of the history of investigation of perioperative hypersensitivity, to describe the differences in causes of perioperative hypersensitivity emerging over time and to increase awareness about the "hidden allergens" in the perioperative setting. Some practical advice on how to approach the patient testing negative on all initial investigations is also included.

  18. Parameter estimation of hidden periodic model in random fields

    Institute of Scientific and Technical Information of China (English)

    何书元

    1999-01-01

    Two-dimensional hidden periodic model is an important model in random fields. The model is used in the field of two-dimensional signal processing, prediction and spectral analysis. A method of estimating the parameters for the model is designed. The strong consistency of the estimators is proved.

  19. Beyond the hidden curriculum: The challenging search for authentic ...

    African Journals Online (AJOL)

    2013-11-01

    Nov 1, 2013 ... [6] It was erroneously assumed that medical students ... hidden curriculum, therefore, demands an authentic and comprehensive enquiry into the concept of human dignity, ... reasoning that underpins the desirable values-based healthcare. ... and highly interpersonal form of teaching and learning that takes.

  20. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    2014-01-01

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated S-lemma

  1. Recognizing Strokes in Tennis Videos Using Hidden Markov Models

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, W.; Zivkovic, Z.

    2001-01-01

    This paper addresses content-based video retrieval with an emphasis on recognizing events in tennis game videos. In particular, we aim at recognizing different classes of tennis strokes using automatic learning capability of Hidden Markov Models. Driven by our domain knowledge, a robust player segme

  2. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving...

  3. Evolving the Topology of Hidden Markov Models using Evolutionary Algorithms

    DEFF Research Database (Denmark)

    Thomsen, Réne

    2002-01-01

    Hidden Markov models (HMM) are widely used for speech recognition and have recently gained a lot of attention in the bioinformatics community, because of their ability to capture the information buried in biological sequences. Usually, heuristic algorithms such as Baum-Welch are used to estimate...

  4. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a techniqu

  5. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a

  6. Optical Test of Local Hidden-Variable Model

    Institute of Scientific and Technical Information of China (English)

    WU XiaoHua; ZONG HongShi; PANG HouRong

    2001-01-01

    An inequality is deduced from local realism and a supplementary assumption. This inequality defines an experiment that can be actually performed with the present technology to test local hidden-variable models, and it is violated by quantum mechanics with a factor 1.92, while it can be simplified into a form where just two measurements are required.``

  7. New Caledonian crows reason about hidden causal agents.

    Science.gov (United States)

    Taylor, Alex H; Miller, Rachael; Gray, Russell D

    2012-10-02

    The ability to make inferences about hidden causal mechanisms underpins scientific and religious thought. It also facilitates the understanding of social interactions and the production of sophisticated tool-using behaviors. However, although animals can reason about the outcomes of accidental interventions, only humans have been shown to make inferences about hidden causal mechanisms. Here, we show that tool-making New Caledonian crows react differently to an observable event when it is caused by a hidden causal agent. Eight crows watched two series of events in which a stick moved. In the first set of events, the crows observed a human enter a hide, a stick move, and the human then leave the hide. In the second, the stick moved without a human entering or exiting the hide. The crows inspected the hide and abandoned probing with a tool for food more often after the second, unexplained series of events. This difference shows that the crows can reason about a hidden causal agent. Comparative studies with the methodology outlined here could aid in elucidating the selective pressures that led to the evolution of this cognitive ability.

  8. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  9. Search for dark photons from supersymmetric hidden valleys

    NARCIS (Netherlands)

    Abazov, V.M.; et al., [Unknown; Ancu, L.S.; de Jong, S.J.; Filthaut, F.; Galea, C.F.; Hegeman, J.G.; Houben, P.; Meijer, M.M.; Svoisky, P.; van den Berg, P.J.; van Leeuwen, W.M.

    2009-01-01

    We search for a new light gauge boson, a dark photon, with the D0 experiment. In the model we consider, supersymmetric partners are pair produced and cascade to the lightest neutralinos that can decay into the hidden sector state plus either a photon or a dark photon. The dark photon decays through

  10. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  11. Simple yet Hidden Counterexamples in Undergraduate Real Analysis

    Science.gov (United States)

    Shipman, Barbara A.; Shipman, Patrick D.

    2013-01-01

    We study situations in introductory analysis in which students affirmed false statements as true, despite simple counterexamples that they easily recognized afterwards. The study draws attention to how simple counterexamples can become hidden in plain sight, even in an active learning atmosphere where students proposed simple (as well as more…

  12. Local clustering in scale-free networks with hidden variables

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A. J. E. M.; van Leeuwaarden, Johan S. H.; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ ∈(2 ,3 ) , so that the degrees have infinite variance. The natural cutoff hc characterizes the largest degrees in the hidden variable models, and a structural cutoff hs introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N , as a function of hs and hc. For scale-free networks with exponent 2 universality class at hand. We characterize the extremely slow decay of C when τ ≈2 and show that for τ =2.1 , say, clustering starts to vanish only for networks as large as N =109 .

  13. On local-hidden-variable no-go theorems

    Science.gov (United States)

    Methot, A. A.

    2006-06-01

    The strongest attack against quantum mechanics came in 1935 in the form of a paper by Einstein, Podolsky, and Rosen. It was argued that the theory of quantum mechanics could not be called a complete theory of Nature, for every element of reality is not represented in the formalism as such. The authors then put forth a proposition: we must search for a theory where, upon knowing everything about the system, including possible hidden variables, one could make precise predictions concerning elements of reality. This project was ultimately doomed in 1964 with the work of Bell, who showed that the most general local hidden variable theory could not reproduce correlations that arise in quantum mechanics. There exist mainly three forms of no-go theorems for local hidden variable theories. Although almost every physicist knows the consequences of these no-go theorems, not every physicist is aware of the distinctions between the three or even their exact definitions. Thus, we will discuss here the three principal forms of no-go theorems for local hidden variable theories of Nature. We will define Bell theorems, Bell theorems without inequalities, and pseudo-telepathy. A discussion of the similarities and differences will follow.

  14. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  15. Isovector and hidden-beauty partners of the X(3872)

    CERN Document Server

    Hogaasen, Hallstein; Richard, Jean-Marc; Sorba, Paul

    2014-01-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks (H. Hogaasen, J-M. Richard and P. Sorba, Phys. Rev. D73, 054013, 2006). The extension to the hidden-beauty sector is discussed.

  16. Bayesian online algorithms for learning in discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2008-01-01

    We propose and analyze two different Bayesian online algorithms for learning in discrete Hidden Markov Models and compare their performance with the already known Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalization we draw learning curves in simplified situations for these algorithms and compare their performances.

  17. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  18. Exploring an Ecologically Sustainable Scheme for Landscape Restoration of Abandoned Mine Land: Scenario-Based Simulation Integrated Linear Programming and CLUE-S Model

    Science.gov (United States)

    Zhang, Liping; Zhang, Shiwen; Huang, Yajie; Cao, Meng; Huang, Yuanfang; Zhang, Hongyan

    2016-01-01

    Understanding abandoned mine land (AML) changes during land reclamation is crucial for reusing damaged land resources and formulating sound ecological restoration policies. This study combines the linear programming (LP) model and the CLUE-S model to simulate land-use dynamics in the Mentougou District (Beijing, China) from 2007 to 2020 under three reclamation scenarios, that is, the planning scenario based on the general land-use plan in study area (scenario 1), maximal comprehensive benefits (scenario 2), and maximal ecosystem service value (scenario 3). Nine landscape-scale graph metrics were then selected to describe the landscape characteristics. The results show that the coupled model presented can simulate the dynamics of AML effectively and the spatially explicit transformations of AML were different. New cultivated land dominates in scenario 1, while construction land and forest land account for major percentages in scenarios 2 and 3, respectively. Scenario 3 has an advantage in most of the selected indices as the patches combined most closely. To conclude, reclaiming AML by transformation into more forest can reduce the variability and maintain the stability of the landscape ecological system in study area. These findings contribute to better mapping AML dynamics and providing policy support for the management of AML. PMID:27023575

  19. Exploring an Ecologically Sustainable Scheme for Landscape Restoration of Abandoned Mine Land: Scenario-Based Simulation Integrated Linear Programming and CLUE-S Model.

    Science.gov (United States)

    Zhang, Liping; Zhang, Shiwen; Huang, Yajie; Cao, Meng; Huang, Yuanfang; Zhang, Hongyan

    2016-03-24

    Understanding abandoned mine land (AML) changes during land reclamation is crucial for reusing damaged land resources and formulating sound ecological restoration policies. This study combines the linear programming (LP) model and the CLUE-S model to simulate land-use dynamics in the Mentougou District (Beijing, China) from 2007 to 2020 under three reclamation scenarios, that is, the planning scenario based on the general land-use plan in study area (scenario 1), maximal comprehensive benefits (scenario 2), and maximal ecosystem service value (scenario 3). Nine landscape-scale graph metrics were then selected to describe the landscape characteristics. The results show that the coupled model presented can simulate the dynamics of AML effectively and the spatially explicit transformations of AML were different. New cultivated land dominates in scenario 1, while construction land and forest land account for major percentages in scenarios 2 and 3, respectively. Scenario 3 has an advantage in most of the selected indices as the patches combined most closely. To conclude, reclaiming AML by transformation into more forest can reduce the variability and maintain the stability of the landscape ecological system in study area. These findings contribute to better mapping AML dynamics and providing policy support for the management of AML.

  20. Modern windships. Phase 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-11-01

    Knud E. Hansen A/S (KEH) has, partly funded by the Energy Research Programme, (EFP-95) investigated in the possibilities of using windships for transportation of cargo on long routes, i.e. across the Atlantic or Pacific Ocean. The task was to peruse experiences from projects made during the past 30 years and then, based on new materials and design principle to make proposals to modern wind driven ships to transportation of cargo - especially bulk carriers. KEH has thus prepared a suggestion for a 50,000 DWT wind driven bulk carrier on these terms. The bulk carrier in question is a modern rig inspired by the classical lugger and junk sail with a total sail area of abt. 10,000 m{sup 2}. The hull of the ship has been developed in order to limit wave resistance and drifting. Project Windship has, in contrast to earlier tests and projects, designed a bulk carrier based on a complete evaluation of ecology, safety, economy and reasonable transportation speed. The research project shows that international sea transportation, with wind as the primary source of energy, does not seem to run up against any obstacles as regards safety. The economical analyses show that windship transportation, with today`s oil prices, will be about 10% higher compared to the diesel driven transportation. In the light of the positive results of the research project the steering committee recommends that phase II of project `Modern Windships` is carried out. (EG)

  1. Modern anaesthesia vapourisers

    Directory of Open Access Journals (Sweden)

    Sucharita Chakravarti

    2013-01-01

    Full Text Available Inhalational anaesthetic agents are usually liquids at room temperature and barometric pressure and need to be converted to vapour before being used and this conversion is effected using a vapouriser. Vapourisers have evolved from very basic devices to more complicated ones. Anaesthetists should understand the basic principles of anaesthetic vapouriser, including the principles that affect vapouriser output and how they influence vapouriser design. Most of the modern vapourisers in use are designed to be used between the flow meter and the common gas outlet on the anaesthesia machine. Modern vapourisers are flow and temperature compensated, concentration calibrated, direct reading, dial controlled and are unaffected by positive-pressure ventilation. Safety features include an anti-spill and a select-a-tec mechanism and a specific vapouriser filling device. Desflurane has unique physical properties requiring the use of a specific desflurane vapouriser. The most recently designed vapourisers are controlled by a central processing unit in the anaesthetic machine. The concentration of vapour is continuously monitored and adjusted by altering fresh gas flow through the vapouriser. This article looks at the basic design and functioning of the modern vapourisers.

  2. Modern anaesthesia vapourisers.

    Science.gov (United States)

    Chakravarti, Sucharita; Basu, Srabani

    2013-09-01

    Inhalational anaesthetic agents are usually liquids at room temperature and barometric pressure and need to be converted to vapour before being used and this conversion is effected using a vapouriser. Vapourisers have evolved from very basic devices to more complicated ones. Anaesthetists should understand the basic principles of anaesthetic vapouriser, including the principles that affect vapouriser output and how they influence vapouriser design. Most of the modern vapourisers in use are designed to be used between the flow meter and the common gas outlet on the anaesthesia machine. Modern vapourisers are flow and temperature compensated, concentration calibrated, direct reading, dial controlled and are unaffected by positive-pressure ventilation. Safety features include an anti-spill and a select-a-tec mechanism and a specific vapouriser filling device. Desflurane has unique physical properties requiring the use of a specific desflurane vapouriser. The most recently designed vapourisers are controlled by a central processing unit in the anaesthetic machine. The concentration of vapour is continuously monitored and adjusted by altering fresh gas flow through the vapouriser. This article looks at the basic design and functioning of the modern vapourisers.

  3. Modern sports eye injuries.

    Science.gov (United States)

    Capão Filipe, J A; Rocha-Sousa, A; Falcão-Reis, F; Castro-Correia, J

    2003-11-01

    To determine the severity and long term sequelae of eye injuries caused by modern sports that could be responsible for significant ocular trauma in the future. Prospective observational study of 24 (25 eyes) athletes with sports related ocular injuries from health clubs, war games, adventure, radical and new types of soccer, presenting to an eye emergency department between 1992 and 2002 (10 years). Modern sports were responsible for 8.3% of the 288 total sports eye injuries reported. Squash (29.2%) was the most common cause, followed by paintball (20.8%) and motocross (16.6%). The most common diagnosis during the follow up period was retinal breaks (20%). 18 (75%) patients sustained a severe injury. The final visual acuity remained <20/100 in two paintball players. Ocular injuries resulting from modern sports are often severe. Adequate instruction of the participants in the games, proper use of eye protectors, and a routine complete ophthalmological examination after an eye trauma should be mandatory.

  4. Modernization of African Armed Forces

    DEFF Research Database (Denmark)

    Mandrup, Thomas

    2015-01-01

    Concept paper framing the debate at the Dakar Forum Workshop on Modernization of Armed forces in Africa.......Concept paper framing the debate at the Dakar Forum Workshop on Modernization of Armed forces in Africa....

  5. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  6. Hidden Owners, Hidden Profits, and Poor Nursing Home Care: A Case Study.

    Science.gov (United States)

    Harrington, Charlene; Ross, Leslie; Kang, Taewoon

    2015-01-01

    The study examined the ownership transparency, financial accountability, and quality indicators of a regional for-profit nursing home chain in California, using a case study methodology to analyze data on the chain's ownership and management structure, financial data, staffing levels, deficiencies and complaints, and litigation. Secondary data were obtained from regulatory and cost reports and litigation cases. Qualitative descriptions of ownership and management were presented and quantitative analyses were conducted by comparing financial and quality indicators with other California for-profit chains, for-profit non-chains, and nonprofit nursing home groups in 2011. The chain's complex, interlocking individual and corporate owners and property companies obscured its ownership structure and financial arrangements. Nursing and support services expenditures were lower than nonprofits and administrative costs were higher than for-profit non-chains. The chain's nurse staffing was lower than expected staffing levels; its deficiencies and citations were higher than in nonprofits; and a number of lawsuits resulted in bankruptcy. Profits were hidden in the chain's management fees, lease agreements, interest payments to owners, and purchases from related-party companies. Greater ownership transparency and financial accountability requirements are needed to ensure regulatory oversight and quality of care.

  7. Buddhist Activism and Chinese Modernity

    OpenAIRE

    2015-01-01

    The history of modern Chinese Buddhism has begun to attract attention in recent years. Some scholars have done inspiring research as they unravel the integration of Buddhism into the highly secularized process of Chinese modernity by drawing on the repository of knowledge on modern China. While this special issue joins this exciting endeavor, it also uses Buddhism as a window to reflect on scholarship on Chinese modernity. Conceptually, this special issue presses scholars in the field of mode...

  8. CMU OAQA at TREC 2015 LiveQA: Discovering the Right Answer with Clues

    Science.gov (United States)

    2015-11-20

    issue them to different search engines (Bing Web Search , Yahoo! An- swers) in order to retrieve web pages related to the question. 2. Answer Ranking...to search engines for web retrieval. We collect the snippets returned for each hit and also download the full text of the web page for each hit. Our...into three major processing phases: 1. Clue Retrieval. Given a question title and its full text description, we formulate search engine queries and

  9. Ross syndrome with ANA positivity: A clue to possible autoimmune origin and treatment with intravenous immunoglobulin

    Directory of Open Access Journals (Sweden)

    Vasudevan Biju

    2010-01-01

    Full Text Available A 28-year-old serving soldier presented with patchy areas of absence of sweating and blurring of vision. On examination he was found to have segmental anhidrosis, right sided tonic pupil and absent ankle jerks. Investigations revealed ANA positivity with no other abnormalities. He was treated with Intravenous immunoglobulin. This case of Ross syndrome is reported for its rarity as well as a clue to its probable autoimmune origin and treatment option with intravenous immunoglobulins.

  10. The Impact of Videos Presenting Speakers’ Gestures and Facial Clues on Iranian EFL Learners’ Listening Comprehension

    Directory of Open Access Journals (Sweden)

    Somayeh Karbalaie Safarali

    2012-11-01

    Full Text Available The current research sought to explore the effectiveness of using videos presenting speakers’ gestures and facial clues on Iranian EFL learners’ listening comprehension proficiency. It was carried out at Ayandeh English Institute among 60 advanced female learners with the age range of 17-30 through a quasi-experimental research design. The researcher administered a TOEFL test to determine the homogeneity of the participants regarding both their general English language proficiency level and listening comprehension ability. Participants were randomly assigned into two groups. After coming up with the conclusion that the two groups were homogeneous,  during 10 sessions of treatment, they received two different listening comprehension techniques, i.e. audio-visual group watching the video was equipped with the speaker’s gestures and facial clues, while the audio-only group could just listen to speaker’s voice and no additional clue was presented. Meanwhile, the participants were supposed to answer the questions related to each video. At the end of the treatment, both groups participated in the listening comprehension test of the Longman TOEFL test as the post-test. A t-test was used to compare the mean scores of the two groups, the result of which showed that the learners’ mean score in the audio-visual group was significantly higher than the learners’ mean score in the audio-only group. In conclusion, the result of this study suggests that foreign language pedagogy, especially for adult English learners, would benefit from applying videos presenting speakers’ gestures and facial clues.

  11. Mood disorders and parity – A clue to the aetiology of the postpartum trigger

    OpenAIRE

    di Florio, Arianna; Jones, Lisa; Forty, Liz; Gordon-Smith, Katherine; Robertson Blackmore, Emma; Heron, Jess; Craddock, Nick; Jones, Ian

    2014-01-01

    Background Episodes of postpartum psychosis have been associated with first pregnancies in women with bipolar I disorder. It is unclear, however, if the effect extends to episodes at other times in relation to childbirth and to women with other mood disorders such as major depression and bipolar II disorder. This primiparity effect, which is also seen in other pregnancy related conditions such as pre-eclampsia, is a potentially important clue to the aetiology of childbirth related mood episod...

  12. Arrival of Paleo-Indians to the Southern Cone of South America: New Clues from Mitogenomes

    OpenAIRE

    Paschou, Peristera; de Saint Pierre, Michelle; Gandini, Francesca; Perego, Ugo A.; Bodner, Martin; Gómez-Carballa, Alberto; Corach, Daniel; Angerhofer, Norman; Woodward, Scott R.; Semino, Ornella; Salas, Antonio; Parson, Walther; Moraga, Mauricio; Achilli, Alessandro; Torroni, Antonio

    2012-01-01

    With analyses of entire mitogenomes, studies of Native American mitochondrial DNA (MTDNA) variation have entered the final phase of phylogenetic refinement: the dissection of the founding haplogroups into clades that arose in America during and after human arrival and spread. Ages and geographic distributions of these clades could provide novel clues on the colonization processes of the different regions of the double continent. As for the Southern Cone of South America, this approach has rec...

  13. Antibodies to peptidoglycan in patients with spondylarthritis: a clue to disease aetiology?

    OpenAIRE

    1984-01-01

    Although the aetiology of the spondylarthritic diseases, ankylosing spondylitis and Reiter's syndrome, is obscure, a clue to the pathogenesis might be an animal model, adjuvant arthritis. Rats with this disease develop a spectrum of pathology with marked similarity to the spondylarthritides. Since peptidoglycan, a major cell wall component of most bacteria is causally implicated in adjuvant arthritis, we sought evidence that peptidoglycan exposure accompanies both Reiter's syndrome and ankylo...

  14. Rich Cultural Heritage amid Modernization

    Institute of Scientific and Technical Information of China (English)

    Liu Jian

    2004-01-01

    @@ The Indian civilization has thus far experienced three phases of ancient, medieval and modern stages and is now entering steadily the real modern stage in the true sense of the term. After further advances in another five to ten decades, the Indian civilization will surely appear in a new vigorous look of prosperity and strength, boasting both traditional splendor and modern wonders.

  15. Chinese Modernization in Comparative Perspective

    Directory of Open Access Journals (Sweden)

    Andrey Vladimirovich Vinogradov

    2010-01-01

    Full Text Available China's rise has become subject to fierce academic debates about the nature and possible consequences of this growth. The phenomenon of the Chinese modernization was also studied from the angle of the theories of modernization. This article analyzes the historical stages of political and economic modernization in China, as well as Russian and Soviet experience.

  16. Institutions and Modernity

    Directory of Open Access Journals (Sweden)

    Witold Morawski

    2013-09-01

    Full Text Available Purpose: Modernity consists of many confl icting aspects: It brings many empty promises, yet has resulted in new institutions that create bridges between the values and interests of millions of people who seek freedom, prosperity, quality of life, strengthened democracy and social justice. In this paper I attempt to a gain and loss account against modernity, because institutional rules are not only conducive to cooperative interactions, but to hostile interactions as well. People are not always guided by moral commitment, but rather more often driven by cold calculation or coercion.Methodology: Modernity has at least three defi nitions. The fi rst defi nition is based on ideas that took over the imagination of the era. The second defi nition is based on an analysis of the behavior of people who respond to reason as well as emotion and believe that they act more rationally than their ancestors or the traditional “others”. The third defi nition is the one closest to my heart, consisting of the use of institutional categories. Institutions offer practical ways of connecting ideas and people. The challenge for them is the result of deepening local and national interdependencies, but increasingly often also regional (e.g. European and global. Interdependencies are the result of the scientifi c and technological revolution, global markets, global governance mechanisms, the emergence of new social forces and cultural confl icts (against the background of reconciling identity and differences.Conclusions: The most important task is to identify the mechanisms of complex systems so that people know how to act under conditions of uncertainty, risk and crisis. Hence, the expectations toward institutions often exceed their abilities. Even though new institutions are being created and old ones are being fixed, we are witnessing and participating in, institutional paralysis and the decay (e.g. corruption. In this situation, it is imperative not only to

  17. Acupuncture in modern society.

    Science.gov (United States)

    Vanderploeg, Kristin; Yi, Xiaobin

    2009-03-01

    For at least 2,500 years, acupuncture has been an integral part of traditional Chinese medicine. However, recently as more people in western countries are diagnosed with chronic disease poorly treated with modern medical therapies, many are turning to acupuncture and other forms of alternative medical treatments. Based on the theory of harmonious flowing qi being the basis of good health, acupuncture focuses on restoring qi by manipulation of the complementary and opposing elements of yin and yang. However, in the modern medical community we struggle to with the concept of qi, given a lack of anatomic and histological evidence supporting its existence. However, with the surge in public interest in acupuncture, the scientific community begun heavy investigation of acupuncture's efficacy, as well as the physiologic basis behind it. Thus far, evidence supports the use of acupuncture in post-operative nausea and vomiting, postoperative dental pain, chronic pain conditions such as lower back pain, and possibly also such psychologic conditions as addiction. It is possible that by affecting afferent nerve signaling, acupuncture may influence the release of endogenous opioids to promote pain relief. This effect may be augmented by release of ACTH and cortisol, as well as through down-regulation of signaling through pain fibers. When treating patients who may utilize alternative forms of medicine, it is important that medical practitioners be educated in regards to the basic fundamental beliefs behind acupuncture, as well as the scientific evidence supporting its use and revealing its efficacy. The purpose of this review is to give western trained physicians exposure to history, basic knowledge and its clinical applications of acupuncture to accommodate accelerating interests in acupuncture in modern society.

  18. MODERN AMERICAN ENGLISH

    Institute of Scientific and Technical Information of China (English)

    1994-01-01

    With China’s open door policy advocating that Chinese people study abroad, primarily in English-speaking countries, a text tailored to preparing these students is needed. Modern American English, (MAE) composed jointly by Chinese and American linguists, attempts to fill the void. The book’s introduction states a twofold purpose: to help Chinese students learn situational English and to introduce Western culture and society. By assessing MAE’s strength’s and weaknesses it is my intention to provide the publisher with some feedback that may be of some help for forthcoming revisions.

  19. Introduction to modern optics

    CERN Document Server

    Fowles, Grant R

    1989-01-01

    This incisive text provides a basic undergraduate-level course in modern optics for students in physics, technology and engineering. The first half of the book deals with classical physical optics; the second principally with the quantum nature of light. Chapters 1 and 2 treat the propagation of light waves, including the concepts of phase and group velocities, and the vectorial nature of light. Chapter 3 applies the concepts of partial coherence and coherence length to the study of interference, and Chapter 4 takes up multiple-beam interference and includes Fabry-Perot interferometry and mul

  20. 2010 Army Modernization Strategy

    Science.gov (United States)

    2010-01-01

    Capability Release ( JCR ) software upgrades with BFT2 and KGV-72s provides Type-1 security and enhanced (10X) L-band bandwidth to current FBCB2 terminals...Additionally, JCR will include the co-host of the TiGR and the Army will leverage to support HBCT to SBCT conversions starting in FY11. By FY13...Army Human Intelligence 89 2010 ARMY MODERNIZATION STRATEGY WWW.G8.ARMY.MIL IBCT: IED: IED: IFPC: IPADS: IRB: ISR: IT: JAB: JBC-P: JCR : JETS

  1. Der moderne Frege

    OpenAIRE

    Lämmel, Uwe

    2004-01-01

    Gottlob Frege ist einer der größten (der größte?) Wissenschaftler Mecklenburg-Vorpommerns. Als Mathematiker und Philosoph hat er die moderne mathematische Logik begründet, dazu Beiträge zur Mengenlehrer, Axiomatisierung sowie der Sprachphilosophie geleistet. Viele seiner Leistungen haben Spuren hinterlassen, die noch heute wirken, und dass nicht nur in der Mathematik und Philosophie sondern insbesondere auch in der Informatik. Diese Schrift möge dazu beitragen, den Namen Gottlob Frege und sei...

  2. MODERN MILITARY GEOGRAPHY

    Directory of Open Access Journals (Sweden)

    Jacques Bezuidenhout

    2012-05-01

    Full Text Available Modern Military Geography is a new text that explores the relationship between geography and military conflict. As such, it covers many different scenarios and operational theatres and brings perspective to the link between local topography, hydrographical settings, climate, coastal conditions and military operations. The text goes further by examining the influence of secondary factors, which include, biological, health and environmental issues on military operations. The unique interaction between physical conditions and the geopolitical realities of different geographical settings are well illustrated. This book is therefore an excellent addition to the fields of military geography and military history, as well as other related military disciplines.

  3. Dialogues on modern physics

    CERN Document Server

    Sachs, Mendel

    1998-01-01

    In this book, important conceptual developments of the two major revolutions of modern physics - the quantum and relativity theories - are presented in a nonmathematical, dialectical form of dialogue. The implications of conflicting philosophical attitudes of these revolutions in physics and applications to topics such as cosmology/astrophysics and high energy physics are emphasized. It is argued that for any substantial progress in our understanding of 21st century physics, it will be necessary to resolve these 20th century conflicts. These richly rewarding dialogues provide a starting point

  4. Modern diffraction methods

    CERN Document Server

    Mittemeijer, E J

    2013-01-01

    The role of diffraction methods for the solid-state sciences has been pivotal to determining the (micro)structure of a material. Particularly, the expanding activities in materials science have led to the development of new methods for analysis by diffraction. This book offers an authoritative overview of the new developments in the field of analysis of matter by (in particular X-ray, electron and neutron) diffraction. It is composed of chapters written by leading experts on 'modern diffraction methods'. The focus in the various chapters of this book is on the current forefront of research on

  5. Modern TTL circuits manual

    CERN Document Server

    Marston, R M

    2013-01-01

    Modern TTL Circuits Manual provides an introduction to the basic principles of Transistor-Transistor Logic (TTL). This book outlines the major features of the 74 series of integrated circuits (ICs) and introduces the various sub-groups of the TTL family.Organized into seven chapters, this book begins with an overview of the basics of digital ICs. This text then examines the symbology and mathematics of digital logic. Other chapters consider a variety of topics, including waveform generator circuitry, clocked flip-flop and counter circuits, special counter/dividers, registers, data latches, com

  6. Advances in modern cosmology

    CERN Document Server

    2011-01-01

    The twentieth century elevated our understanding of the Universe from its early stages to what it is today and what is to become of it. Cosmology is the weapon that utilizes all the scientific tools that we have created to feel less lost in the immensity of our Universe. The standard model is the theory that explains the best what we observe. Even with all the successes that this theory had, two main questions are still to be answered: What is the nature of dark matter and dark energy? This book attempts to understand these questions while giving some of the most promising advances in modern cosmology.

  7. Introduction to modern cryptography

    CERN Document Server

    Katz, Jonathan

    2014-01-01

    Praise for the First Edition:""This book is a comprehensive, rigorous introduction to what the authors name 'modern' cryptography. … a novel approach to how cryptography is taught, replacing the older, construction-based approach. … The concepts are clearly stated, both in an intuitive fashion and formally. … I would heartily recommend this book to anyone who is interested in cryptography. … The exercises are challenging and interesting, and can benefit readers of all academic levels.""-IACR Book Reviews, January 2010""Over the past 30 years, cryptography has been transformed from a mysterious

  8. Charisma, Medieval and Modern

    Directory of Open Access Journals (Sweden)

    Gary Dickson

    2012-08-01

    Full Text Available Popularized by the mass media, Max Weber’s sociological concept of charisma now has a demotic meaning far from what Weber had in mind. Weberian charismatic leaders have followers, not fans, although, exceptionally, fans mutate into followers. This essay aims to trace some of the dimensions of Weberian charismatic religious leadership in comparative perspective, medieval and modern. Examples include: preachers, “double charisma,” professors, “collective charisma,” religious radicals, the economy of charisma, transgressive sexuality, demagogues, living saints.1

  9. Late-modern hipsters

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2014-01-01

    The article deals with the cultural significance of a new figure in late-modern Western culture: the hipster. The current hipster culture, so I argue, can be used as a magnifying glass that makes impending changes to our conception of culture and of cultural development visible. It ushers in broa...... redemptive gesture toward the objects of the recent past and its predilection for irony. The article seeks to unfold hipster culture and sociality in an ongoing dialogue with sociological theory in general and conventional ways of thinking subculture in particular....

  10. Liminality and the Modern

    DEFF Research Database (Denmark)

    Thomassen, Bjørn

    . Applying this framework to questions surrounding the implosion of ‘non-spaces’, the analysis of major historical periods and the study of political revolution, the book also explores its possible uses in social science research and its implications for our understanding of the uncertainty and contingency...... of the liquid structures of modern society. Shedding new light on a concept central to social thought, as well as its capacity for pushing social and political theory in new directions, this book will be of interest to scholars across the social sciences and philosophy working in fields such as social......, political and anthropological theory, cultural studies, social and cultural geography, and historical anthropology and sociology....

  11. History as Modernity. Introduction

    Directory of Open Access Journals (Sweden)

    Pierangelo Schiera

    2016-12-01

    Full Text Available The introduction starts from the exhaustion of modernity, drawing the fundamental lines of its development inside Western historical experience. The end of the political nexus between theology and politics, the evanescence of nation-state sovereignty, the check of great historical interpretations reveal the necessity of new categories and new organizational models, able to make us answer to the violence that the ongoing processes are liberating. Schiera underlines in particular the relevance of the administrative apparatus because of its capacity to link the global government with global organization, human rights and the commons.

  12. Modern French Grammar Workbook

    CERN Document Server

    Lang, Margaret

    2012-01-01

    An innovative new workbook of exercises and language tasks for intermediate and advanced learners of French. This Workbook can be used independently or alongside Modern French Grammar.This Workbook provides exercises in:* Essential grammatical structures* Everyday functions such as agreeing and disagreeing* Role-plays set in a wide range of different contextsIt is suitable for group or pair work and for private study.A comprehensive answer key at the back of the Workbook enables you to check on your progress.This Workbook is ideal for all learners who have a basic knowledge of French, includin

  13. Visualization in modern cartography

    CERN Document Server

    MacEachren, AM

    1994-01-01

    Visualization in Modern Cartography explores links between the centuries-old discipline of cartography and today's revolutionary developments in scientific visualization. The book has three main goals: (1) to pass on design and symbolization expertise to the scientific visualization community - information that comes from centuries of pre-computer visualization by cartographers, and their more recent experiences with computerizing the discipline; (2) to help cartographers cope with the dramatic shift from print cartography to a dynamic virtual cartography for which their role is changing from

  14. Modern gear production

    CERN Document Server

    Watson, H J

    1970-01-01

    Modern Gear Production focuses on the processes and methods in gear making. The book first gives information on the history of gear making and types of gears. Topics such as the classification of gears based on the disposition of their shafts; shafts lying in the same plane with axes intersecting; and shafts lying in parallel planes but with axes inclined to one another are then discussed. The text describes gear groups, tooth forms, and gear materials. Heat treatment of steels, casehardening, nitriding, induction hardening, sulfinuzing, and flame hardening are explained. The book takes a look

  15. Modern wiring practice

    CERN Document Server

    Steward, W E

    2012-01-01

    Continuously in print since 1952, Modern Wiring Practice has now been fully revised to provide an up-to-date source of reference to building services design and installation in the 21st century. This compact and practical guide addresses wiring systems design and electrical installation together in one volume, creating a comprehensive overview of the whole process for contractors and architects, as well as electricians and other installation engineers. Best practice is incorporated throughout, combining theory and practice with clear and accessible explanation, all

  16. Modern garden delphiniums

    Directory of Open Access Journals (Sweden)

    Bassett, Shirley E.

    1990-12-01

    Full Text Available The characteristic features or modern English garden hybrid delphiniums are described. The development by Reinelt of the «Pacific» seed strain in America, and the successful introduction or red colours by Legro in Holland are discussed. The evolution of the tetraploid garden hybrid is considered in the light of species available to early breeders. The role of the Delphinium Society in the promotion of the flower and the encouragement or breeding programs is reviewed.

    [ca] Es descriuen les característiques dels delphiniums híbrids de jardí anglesos moderns. Es discuteix el desenvolupament de la raça de granes «Pacific» a Amèrica per Reinelt i l'èxit de la introducció de colors vermells a Holanda per Legro. L'evolució dels híbrids de jardineria tetraploides és considerada a la llum de les espècies que eren disponibles per als primers milloradors. Es revisa el paper de la Delphinium Society en la promoció de la flor i en la promoció dels programes de millora.

  17. Modern introductory physics

    CERN Document Server

    Holbrow, Charles H; Amato, Joseph C; Galvez, Enrique; Parks, M. Elizabeth

    2010-01-01

    Modern Introductory Physics, 2nd Edition, by Charles H. Holbrow, James N. Lloyd, Joseph C. Amato, Enrique Galvez, and Beth Parks, is a successful innovative text for teaching introductory college and university physics. It is thematically organized to emphasize the physics that answers the fundamental question: Why do we believe in atoms and their properties?  The book provides a sound introduction to basic physical concepts with particular attention to the nineteenth- and twentieth-century physics underlying our modern ideas of atoms and their structure.  After a review of basic Newtonian mechanics, the book discusses early physical evidence that matter is made of atoms.  With a simple model of the atom Newtonian mechanics can explain the ideal gas laws, temperature, and viscosity.  Basic concepts of electricity and magnetism are introduced along with a more complicated model of the atom to account for the observed electrical properties of atoms. The physics of waves---particularly light and x-rays---an...

  18. Assess Sleep Stage by Modern Signal Processing Techniques

    CERN Document Server

    Wu, Hau-tieng; Lo, Yu-Lun

    2014-01-01

    In this paper, two modern adaptive signal processing techniques, Empirical Intrinsic Geometry and Synchrosqueezing transform, are applied to quantify different dynamical features of the respiratory and electroencephalographic signals. We show that the proposed features are theoretically rigorously supported, as well as capture the sleep information hidden inside the signals. The features are used as input to multiclass support vector machines with the radial basis function to automatically classify sleep stages. The effectiveness of the classification based on the proposed features is shown to be comparable to human expert classification -- the proposed classification of awake, REM, N1, N2 and N3 sleeping stages based on the respiratory signal (resp. respiratory and EEG signals) has the overall accuracy $81.7\\%$ (resp. $89.3\\%$) in the relatively normal subject group. In addition, by examining the combination of the respiratory signal with the electroencephalographic signal, we conclude that the respiratory s...

  19. Towards High Performance Processing In Modern Java Based Control Systems

    CERN Document Server

    Misiowiec, M; Buttner, M

    2011-01-01

    CERN controls software is often developed on Java foundation. Some systems carry out a combination of data, network and processor intensive tasks within strict time limits. Hence, there is a demand for high performing, quasi real time solutions. Extensive prototyping of the new CERN monitoring and alarm software required us to address such expectations. The system must handle dozens of thousands of data samples every second, along its three tiers, applying complex computations throughout. To accomplish the goal, a deep understanding of multithreading, memory management and interprocess communication was required. There are unexpected traps hidden behind an excessive use of 64 bit memory or severe impact on the processing flow of modern garbage collectors. Tuning JVM configuration significantly affects the execution of the code. Even more important is the amount of threads and the data structures used between them. Accurately dividing work into independent tasks might boost system performance. Thorough profili...

  20. Modeling and assessing the effects of land use changes on runoff generation with the CLUE-s and WetSpa models

    Science.gov (United States)

    Mohammady, Majid; Moradi, Hamid Reza; Zeinivand, Hossein; Temme, A. J. A. M.; Yazdani, Mohammad Reza; Pourghasemi, Hamid Reza

    2017-06-01

    Land use change is an important determinant of hydrological processes and is known to affect hydrological parameters such as runoff volume, flood frequency, base flow, and the partitioning into surface flow and subsurface flow. The main objective of this research was to assess the magnitude of the effect of land use changes on runoff parameters, using the Baghsalian watershed in Iran as a case study site. At first, land use maps of years 1986 and 2012 were prepared using synthetic method, and then simulation was done based on land use changes in the 1986 to 2012 period. Land use map of year 2030 was simulated using CLUE-s model. Spatially distributed hydrological WetSpa model was used to simulate runoff at daily scale with land use maps of 1986, 2012, and 2030. Total volume of runoff, peak flow, and surface flow were compared. The accuracy of the WetSpa model simulation was assessed with the Nash-Sutcliffe efficiency, which had values of 0.61 and 0.56% for the calibration and validation dataset, respectively. The aggregation measure criterion was also calculated and had values of 64 and 62% for the calibration and validation periods, respectively. The main land use changes in Baghsalian watershed between 1986, 2012, and 2030 were the conversion of forest and rangeland to agriculture and residential land use types. Because of these conversions, simulated total runoff volume increased; and the rate of increase in surface runoff was larger than the rate of increase in subsurface runoff. In addition, surface and subsurface runoff increased in 2012 and 2030 compared to 1986 land use map, but the rate of increase of subsurface runoff was less than surface runoff.

  1. Valuable Clues

    Institute of Scientific and Technical Information of China (English)

    江河

    2002-01-01

    A policeman was investigating a case of murder. He asked the only witness, “Did you see the murderer when he was killing the old man?”“ No. But I saw a man sitting near the old man's house. He had a knife in his hand.”.

  2. Extraction of hidden information by efficient community detection in networks

    CERN Document Server

    Lee, Juyong; Lee, Jooyoung

    2012-01-01

    Currently, we are overwhelmed by a deluge of experimental data, and network physics has the potential to become an invaluable method to increase our understanding of large interacting datasets. However, this potential is often unrealized for two reasons: uncovering the hidden community structure of a network, known as community detection, is difficult, and further, even if one has an idea of this community structure, it is not a priori obvious how to efficiently use this information. Here, to address both of these issues, we, first, identify optimal community structure of given networks in terms of modularity by utilizing a recently introduced community detection method. Second, we develop an approach to use this community information to extract hidden information from a network. When applied to a protein-protein interaction network, the proposed method outperforms current state-of-the-art methods that use only the local information of a network. The method is generally applicable to networks from many areas.

  3. Effectiveness of AODV Protocol under Hidden Node Environment

    Science.gov (United States)

    Garg, Ruchi; Sharma, Himanshu; Kumar, Sumit

    IEEE 802.11 is a standard for mobile ad hoc networks (MANET), implemented with various different protocols. Ad Hoc on Demand Distance Vector Routing (AODV) is one of the several protocols of IEEE 802.11, intended to provide various Quality of Service (QOS) parameters under acceptable range. To avoid the collision and interference the MAC protocol has only two solutions, one, to sense the physical carrier and second, to use the RTS/CTS handshake mechanism. But with the help of these methods AODV is not free from the problem of hidden nodes like other several protocols. Under the hidden node environment, performance of AODV depends upon various factors. The position of receiver and sender among the other nodes is very crucial and it affects the performance. Under the various situations the AODV is simulated with the help of NS2 and the outcomes are discussed.

  4. Perpetual points and hidden attractors in dynamical systems

    Energy Technology Data Exchange (ETDEWEB)

    Dudkowski, Dawid, E-mail: dawid.dudkowski@p.lodz.pl [Division of Dynamics, Technical University of Lodz, Stefanowskiego 1/15, 90-924 Lodz (Poland); Prasad, Awadhesh [Department of Physics and Astrophysics, University of Delhi, Delhi 110007 (India); Kapitaniak, Tomasz [Division of Dynamics, Technical University of Lodz, Stefanowskiego 1/15, 90-924 Lodz (Poland)

    2015-10-23

    We discuss the use of perpetual points for tracing the hidden and the rare attractors of dynamical systems. The analysis of perpetual points and their co-existence due to the parameters values is presented and the impact of these points on the behavior of the systems is shown. The results are obtained for single as well as coupled externally excited van der Pol–Duffing oscillators. The presented results can be generalized to other systems having different dynamics. - Highlights: • Computation of perpetual points in forced nonlinear dynamical systems. • Locating the hidden and rare attractors using perpetual points. • Analysis of states and different types of synchronization in coupled systems. • Understanding the complexity in coupled and uncoupled forced van der Pol–Duffing oscillator.

  5. Penta-Quark States with Strangeness, Hidden Charm and Beauty

    Science.gov (United States)

    Wu, Jia-Jun; Zou, Bing-Song

    The classical quenched quark models with three constituent quarks provide a good description for the baryon spatial ground states, but fail to reproduce the spectrum of baryon excited states. More and more evidences suggest that unquenched effects with multi-quark dynamics are necessary ingredients to solve the problem. Several new hyperon resonances reported recently could fit in the picture of penta-quark states. Based on this picture, some new hyperon excited states were predicted to exist; meanwhile with extension from strangeness to charm and beauty, super-heavy narrow N* and Λ* resonances with hidden charm or beauty were predicted to be around 4.3 and 11 GeV, respectively. Recently, two of such N* with hidden charm might have been observed by the LHCb experiment. More of those states are expected to be observed in near future. This opens a new window in order to study hadronic dynamics for the multi-quark states.

  6. Penta-quark States with Strangeness, Hidden Charm and Beauty

    CERN Document Server

    Wu, Jia-Jun

    2015-01-01

    The classical quenched quark models with three constituent quarks provide a good description for the baryon spatial ground states, but fail to reproduce the spectrum of baryon excited states. More and more evidences suggest that unquenched effects with multi-quark dynamics are necessary ingredients to solve the problem. Several new hyperon resonances reported recently could fit in the picture of penta-quark states. Based on this picture, some new hyperon excited states were predicted to exist; meanwhile with extension from strangeness to charm and beauty, super-heavy narrow $N^*$ and $\\Lambda^*$ resonances with hidden charm or beauty were predicted to be around 4.3 and 11 GeV, respectively. Recently, two of such $N^*$ with hidden charm might have been observed by the LHCb experiment. More of those states are expected to be observed in near future. This opens a new window in order to study hadronic dynamics for the multi-quark states.

  7. Markov chain Monte Carlo simulation for Bayesian Hidden Markov Models

    Science.gov (United States)

    Chan, Lay Guat; Ibrahim, Adriana Irawati Nur Binti

    2016-10-01

    A hidden Markov model (HMM) is a mixture model which has a Markov chain with finite states as its mixing distribution. HMMs have been applied to a variety of fields, such as speech and face recognitions. The main purpose of this study is to investigate the Bayesian approach to HMMs. Using this approach, we can simulate from the parameters' posterior distribution using some Markov chain Monte Carlo (MCMC) sampling methods. HMMs seem to be useful, but there are some limitations. Therefore, by using the Mixture of Dirichlet processes Hidden Markov Model (MDPHMM) based on Yau et. al (2011), we hope to overcome these limitations. We shall conduct a simulation study using MCMC methods to investigate the performance of this model.

  8. Wikipedia mining of hidden links between political leaders

    CERN Document Server

    Frahm, Klaus M; Shepelyansky, Dima L

    2016-01-01

    We describe a new method of reduced Google matrix which allows to establish direct and hidden links between a subset of nodes of a large directed network. This approach uses parallels with quantum scattering theory, developed for processes in nuclear and mesoscopic physics and quantum chaos. The method is applied to the Wikipedia networks in different language editions analyzing several groups of political leaders of USA, UK, Germany, France, Russia and G20. We demonstrate that this approach allows to recover reliably direct and hidden links among political leaders. We argue that the reduced Google matrix method can form the mathematical basis for studies in social and political sciences analyzing Leader-Members eXchange (LMX).

  9. Attribute-Based Encryption with Partially Hidden Ciphertext Policies

    Science.gov (United States)

    Nishide, Takashi; Yoneyama, Kazuki; Ohta, Kazuo

    We propose attribute-based encryption schemes where encryptor-specified policies (called ciphertext policies) are hidden. By using our schemes, an encryptor can encrypt data with a hidden access control policy. A decryptor obtains her secret key associated with her attributes from a trusted authority in advance and if the attributes associated with the decryptor's secret key do not satisfy the access control policy associated with the encrypted data, the decryptor cannot decrypt the data or guess even what access control policy was specified by the encryptor. We prove security of our construction based on the Decisional Bilinear Diffie-Hellman assumption and the Decision Linear assumption. In our security notion, even the legitimate decryptor cannot obtain the information about the access control policy associated with the encrypted data more than the fact that she can decrypt the data.

  10. Inhomogeneous spatial point processes with hidden second-order stationarity

    DEFF Research Database (Denmark)

    Hahn, Ute; Jensen, Eva B. Vedel

    correlation function g(u, v) is a function of u −˘ v, where −˘ is a generalized subtraction operator. For the reweighted second-order stationary processes, the subtraction operator is simply u −˘ v = u − v. The processes in the extended class are called hidden second-order stationary because, in many cases......Modelling of inhomogeneous spatial point patterns is a challenging research area with numerous applications in diverse areas of science. In recent years, the focus has mainly been on the class of reweighted second-order stationary point processes that is characterized by the mathematically...... attractive property of a translation invariant pair correlation function. Motivated by examples where this model class is not adequate, we extend the class of reweighted second-order stationary processes. The extended class consists of hidden second-order stationary point processes for which the pair...

  11. Generation and Analysis of Hidden Optical-Polarization States

    CERN Document Server

    Singh, Ravi S

    2010-01-01

    A hybrid Optical-Device (Phase-Conjugating Mirror Michelson Interferometer), made up of Phase-conjugate mirror along with ordinary mirror and Polarization Beam-splitter, is formally designed and investigated for the generation of an unusual Optical-Polarization States. This weird yet 'essentially single-mode' optical-polarization state has non-random 'ratio of amplitudes' and non-random 'sum of phases' in orthogonal bases-modes contrary to usual 'truly single-mode' optical-polarization states of which non-random 'ratio of amplitudes' and non-random 'difference of phases' serves as optical-polarization characteristic parameters. Since it is seen not to be characterized by Stokes parameters, one may, therefore, assign the name 'Hidden Optical-Polarization States (HOPS)'. HOPS are characterized by a set of parameters, namely, Hidden Optical-Polarization parameters. Formal experimental schemes are presented to experimentally measure these parameters and, thus, offering characterization of HOPS.

  12. Hidden Wounds? Inflammatory Links Between Childhood Trauma and Psychopathology.

    Science.gov (United States)

    Danese, Andrea; Baldwin, Jessie R

    2017-01-03

    Childhood trauma is a key risk factor for psychopathology. However, little is known about how exposure to childhood trauma is translated into biological risk for psychopathology. Observational human studies and experimental animal models suggest that childhood exposure to stress can trigger an enduring systemic inflammatory response not unlike the bodily response to physical injury. In turn, these "hidden wounds" of childhood trauma can affect brain development, key behavioral domains (e.g., cognition, positive valence systems, negative valence systems), reactivity to subsequent stressors, and, ultimately, risk for psychopathology. Further research is needed to better characterize the inflammatory links between childhood trauma and psychopathology. Detecting and healing these hidden wounds may help prevent and treat psychopathology emerging after childhood trauma.

  13. A Sequence of Relaxations Constraining Hidden Variable Models

    CERN Document Server

    Steeg, Greg Ver

    2011-01-01

    Many widely studied graphical models with latent variables lead to nontrivial constraints on the distribution of the observed variables. Inspired by the Bell inequalities in quantum mechanics, we refer to any linear inequality whose violation rules out some latent variable model as a "hidden variable test" for that model. Our main contribution is to introduce a sequence of relaxations which provides progressively tighter hidden variable tests. We demonstrate applicability to mixtures of sequences of i.i.d. variables, Bell inequalities, and homophily models in social networks. For the last, we demonstrate that our method provides a test that is able to rule out latent homophily as the sole explanation for correlations on a real social network that are known to be due to influence.

  14. Wikipedia mining of hidden links between political leaders

    Science.gov (United States)

    Frahm, Klaus M.; Jaffrès-Runser, Katia; Shepelyansky, Dima L.

    2016-12-01

    We describe a new method of reduced Google matrix which allows to establish direct and hidden links between a subset of nodes of a large directed network. This approach uses parallels with quantum scattering theory, developed for processes in nuclear and mesoscopic physics and quantum chaos. The method is applied to the Wikipedia networks in different language editions analyzing several groups of political leaders of USA, UK, Germany, France, Russia and G20. We demonstrate that this approach allows to recover reliably direct and hidden links among political leaders. We argue that the reduced Google matrix method can form the mathematical basis for studies in social and political sciences analyzing Leader-Members eXchange (LMX).

  15. HMMEditor: a visual editing tool for profile hidden Markov model

    Directory of Open Access Journals (Sweden)

    Cheng Jianlin

    2008-03-01

    Full Text Available Abstract Background Profile Hidden Markov Model (HMM is a powerful statistical model to represent a family of DNA, RNA, and protein sequences. Profile HMM has been widely used in bioinformatics research such as sequence alignment, gene structure prediction, motif identification, protein structure prediction, and biological database search. However, few comprehensive, visual editing tools for profile HMM are publicly available. Results We develop a visual editor for profile Hidden Markov Models (HMMEditor. HMMEditor can visualize the profile HMM architecture, transition probabilities, and emission probabilities. Moreover, it provides functions to edit and save HMM and parameters. Furthermore, HMMEditor allows users to align a sequence against the profile HMM and to visualize the corresponding Viterbi path. Conclusion HMMEditor provides a set of unique functions to visualize and edit a profile HMM. It is a useful tool for biological sequence analysis and modeling. Both HMMEditor software and web service are freely available.

  16. Perpetual points and hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Prasad, Awadhesh; Kapitaniak, Tomasz

    2015-10-01

    We discuss the use of perpetual points for tracing the hidden and the rare attractors of dynamical systems. The analysis of perpetual points and their co-existence due to the parameters values is presented and the impact of these points on the behavior of the systems is shown. The results are obtained for single as well as coupled externally excited van der Pol-Duffing oscillators. The presented results can be generalized to other systems having different dynamics.

  17. Uncovering Hidden Mathematics of the Multiplication Table Using Spreadsheets

    Directory of Open Access Journals (Sweden)

    Sergei Abramovich

    2007-05-01

    Full Text Available This paper reveals a number of learning activities emerging from a spreadsheetgenerated multiplication table. These activities are made possible by using such features of the software as conditional formatting, circular referencing, calculation through iteration, scroll bars, and graphing. The paper is a reflection on a mathematics content course designed for prospective elementary teachers using the hidden mathematics curriculum framework. It is written in support of standards for teaching and recommendations for teachers in North America.

  18. Blind Extraction and Security Analysis of Spread Spectrum Hidden Watermarks

    Science.gov (United States)

    2012-04-01

    DATES COVERED (From - To) JAN 2009 – DEC 2010 4. TITLE AND SUBTITLE BLIND EXTRACTION AND SECURITY ANALYSIS OF SPREAD SPECTRUM HIDDEN WATERMARKS ...Multi Signature Embedding, Watermarking , DSSS. 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 15 19a... watermarks John A. Marsh*a,b, and Gerard F. Wohlrabc aSUNY Institute of Technology, 100 Seymour Dr., Utica, NY 13502; bAssured Information

  19. Hidden Markov Model Based Automated Fault Localization for Integration Testing

    OpenAIRE

    Ge, Ning; NAKAJIMA, SHIN; Pantel, Marc

    2013-01-01

    International audience; Integration testing is an expensive activity in software testing, especially for fault localization in complex systems. Model-based diagnosis (MBD) provides various benefits in terms of scalability and robustness. In this work, we propose a novel MBD approach for the automated fault localization in integration testing. Our method is based on Hidden Markov Model (HMM) which is an abstraction of system's component to simulate component's behaviour. The core of this metho...

  20. Information- Theoretic Analysis for the Difficulty of Extracting Hidden Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wei-ming; LI Shi-qu; CAO Jia; LIU Jiu-fen

    2005-01-01

    The difficulty of extracting hidden information,which is essentially a kind of secrecy, is analyzed by information-theoretic method. The relations between key rate, message rate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance of stego-key, and the theoretic conclusion is used to analyze the actual extracting attack on Least Significant Bit(LSB) steganographic algorithms.