WorldWideScience

Sample records for hidden dangers guide

  1. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  2. Stroke: a Hidden Danger of Margin Trading in Stock Markets.

    Science.gov (United States)

    Lin, Shu-Hui; Wang, Chien-Ho; Liu, Tsai-Ching; Chen, Chin-Shyan

    2015-10-01

    Using 10-year population data from 2000 through 2009 in Taiwan, this is the first paper to analyze the relationship between margin trading in stock markets and stroke hospitalizations. The results show that 3 and 6 days after an increase of margin trading in the Taiwan stock markets are associated with greater stoke hospitalizations. In general, a 1 % increase in total margin trading positions is associated with an increment of 2.5 in the total number of stroke hospitalizations, where the mean number of hospital admissions is 233 cases a day. We further examine the effects of margin trading by gender and age groups and find that the effects of margin trading are significant for males and those who are 45-74 years old only. In summary, buying stocks with money you do not have is quite risky, especially if the prices of those stocks fall past a certain level or if there is a sudden and severe drop in the stock market. There is also a hidden danger to one's health from margin trading. A person should be cautious before conducting margin trading, because while it can be quite profitable, danger always lurks just around the corner.

  3. Detection technology and application of electromagnetic method for hidden danger of water gushing at coal face

    Energy Technology Data Exchange (ETDEWEB)

    Xian-xin Shi; Shu Yan; Ming-sheng Chen; Jun-mei Fu [China Coal Research Institute, Xi' an (China). Xi' an Research Institute

    2009-06-15

    The principles, methods, technologies and application effects of several electromagnetic methods for the detection of the hidden danger of water gushing at the coal face were introduced. Also, emphasis was laid on expounding the methods, principles and effects of down-hole detections by electric transmission tomography and transient electromagnetic method. The potential of point power supplied in the underground homogeneous semi-space, as well as the response to a low-resistivity abnormal body in the homogeneous semi-space, was simulated by adopting 3-D finite element method to interpret the basic theory of the electric transmission tomography. The results of actual measurement show that the mine electromagnetic method is sensitive to water-bearing low-resistivity bodies and can play a unique role in detecting the hidden danger of water gushing at the coal face. 9 refs., 9 figs.

  4. Detection technology and application of electromagnetic method for hidden danger of water gushing at coal face

    Institute of Scientific and Technical Information of China (English)

    SHI Xian-xin; YAN Shu; CHEN Ming-sheng; FU Jun-mei

    2009-01-01

    The principles, methods, technologies and application effects of several elec-tromagnetic methods for the detection of the hidden danger of water gushing at the coal face were introduced. Also, emphasis was laid on expounding the methods, principles and effects of down-hole detections by electric transmission tomography and transient elec-tromagnetic method. The potential of point power supplied in the underground homoge-neous semi-space, as well as the response to a low-resistivity abnormal body in the ho-mogeneous semi-space, was simulated by adopting 3-D finite element method to interpret the basic theory of the electric transmission tomography. The results of actual measure-ment show that the mine electromagnetic method is sensitive to water-bearing low-resistivity bodies and can play a unique role in detecting the hidden danger of water gushing at the coal face.

  5. EMPLOYING SENSOR NETWORK TO GUIDE FIREFIGHTERS IN DANGEROUS AREA

    DEFF Research Database (Denmark)

    Koohi, Hamidreza; Nadernejad, Ehsan; Fathi, Mahmoud

    2010-01-01

    itself against possible changes. The protocol developed, will integrate the artificial potential field of the sensors with the information of the intended place of moving firefighter so that it guides the firefighter step by step through the sensor network by choosing the safest path in dangerous zones......In this paper, we intend to focus on the sensor network applications in firefighting. A distributed algorithm is developed for the sensor network to guide firefighters through a burning area. The sensor network models the danger of the area under coverage as obstacles, and has the property to adapt....... This protocol is simulated by Visual-Sense and the simulation results are available. Keyword: Firefighter, Sensor Network, Potential Field, Area’s Danger, Navigation...

  6. New algorithm for detection of dangerous objects hidden on a human body using passive THz camera

    Science.gov (United States)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.; Shestakov, Ivan L.

    2016-10-01

    We discuss a correlation function using for developing of new algorithm that allows us to detect a hidden object without analyzing of image captured by the passive THz camera. Main idea of this approach concludes in correlation calculating between the image characteristics and corresponding characteristics of standard image. Obviously, a difference in temperature between a person body and object hidden under clothes takes place always. However, this difference can be invisible for human eyes. Using the correlation function we can increase a contrast between two objects and this allows to see an object or to produce alarm by computer. We discuss a choice of standard image characteristics for an achievement of correlation function for high contrast. Other feature of our approach arises from a possibility of a person image coming to the THz camera by using a computer processing of the image only. It means that we can "decrease" a distance between a person and the passive THz camera. This algorithm is very convenient for using and has a high performance.

  7. Ambulance staging for potentially dangerous scenes: another hidden component of response time.

    Science.gov (United States)

    Gratton, Matthew; Garza, Alex; Salomone, Joseph A; McElroy, James; Shearer, Jason

    2010-01-01

    Emergency medical services (EMS) responses to some scenes are potentially more dangerous than others, requiring EMS systems to develop policies that stage medical responders away from the scene until law enforcement has the area secured. We sought to characterize the calls that are staged and to demonstrate the effect of staging on the response time interval and differences in red lights and sirens (RLS) transport to the hospital between staged calls (SC) and nonstaged calls (NSC). This was a retrospective cohort study of all 9-1-1 calls received during calendar year 2006 in a midwestern, high-performance system. Descriptive statistics, Mann-Whitney U test, and chi-square analysis were used as appropriate; p protocol, dispatchers ordered EMS to stage on five categories: 924 for assault/rape (20.9%), 393 for unknown problem/man down (8.9%), 918 for overdose (20.8%), 734 for psychiatric/suicide attempt (16.6%), and 413 for stab/gunshot wound (9.4%). Dispatchers ordered staging using their own discretion for 1,032 (23.4%) calls. The median response time interval (call received until ambulance arrived at the scene) was 10 minutes 55 seconds (i.e., 10:55 minutes) (interquartile range [IQR]: 8:00-14:27) for SC and 6:16 minutes (IQR: 4:42-8:28) for NSC (p ambulances while police secure potentially dangerous scenes added approximately 4.5 minutes to the response time. We were unable to demonstrate a difference in RLS return to the hospital (our proxy for patient acuity) between SC and NSC.

  8. 水库除险加固的安全隐患研究%Study of the Safety and Hidden Dangers of Reservoir’s Danger Control and Reinforcement Project

    Institute of Scientific and Technical Information of China (English)

    吴旭新

    2012-01-01

      文章以4座病险水库为例,探讨了小型水库除险加固中存在的安全隐患,通过对防洪、抗震、结构、渗流、金属结构、运行管理等方面进行分析后发现,水库除险加固存在安全隐患,主要原因是大部分水库不满足规范要求,存在严重的结构、渗流安全隐患;闸门锈蚀、启闭设备破坏;防汛抢险道路雨天通行困难;无降雨观测设施;大坝的运行管理工作差。%  Taking four risky reservoirs as examples, the paper expounds the hidden dangers of small-sized reservoirs’ danger control and reinforcement projects. By analyzing the flood control, anti-seismic, structure, transfusion, metal structure and operation management, reservoir’s danger control and reinforcement projects have hidden dangers. The causes are that most reservoirs cannot satisfy the standards and have hidden dangers in structure and transfusion; gates are rust, hoisting devices damaged;the roads for flood control and relief are difficult to be passed in rainy days;there is no rainfall observation facilities and the operation management of dams are bad.

  9. Boiler hidden danger early warning and evaluation system based on FES and FTA%基于FES和FTA的锅炉安全隐患预警及评价系统

    Institute of Scientific and Technical Information of China (English)

    司明

    2016-01-01

    锅炉系统中安全隐患与隐患征兆之间具有一定模糊性,难以建立精确的数学模型预测锅炉安全隐患。提出了一种基于FES和FTA的锅炉安全隐患预警及评价模型,该模型通过模糊推理,判断安全隐患征兆,预警锅炉安全隐患,对锅炉系统进行安全性、经济性等系统评价,为管理人员提供最优系统运行方案的重要参考依据。最后,基于We b技术设计开发了B/S结构的锅炉安全隐患预警及评价系统,系统应用结果表明,安全隐患预警结果准确率高,系统评价结果可靠有效。%There are some fuzziness between boiler hidden danger and hidden danger symptom in boiler system. It is diffi-cult to establish precise mathematical model to predict boiler hidden danger. A boiler hidden danger early warning and evaluation model based on fuzzy expert system and fault tree analysis is proposed. The model judges hidden danger symp-tom and alerts hidden danger. Safety, economy and other systematic evaluation of boiler are given. Important references of optimal system operation program are provided for managers. Finally, boiler hidden danger early warning and evalua-tion system based on B/S structure and WEB technology is designed and developed. System application results show that the accuracy of hidden danger early warning results is high. System evaluation results are reliable and effective.

  10. 急诊科药嘱相关隐患原因分析及对策%Analysis and countermeasures of emergency medicine related hidden dangers

    Institute of Scientific and Technical Information of China (English)

    姜艳; 李素玲

    2014-01-01

    Objective To investigate the related problems and countermeasures of emergency medicine pre-scription. Methods The related problems of drug related orders in the second half of 2013 were analyzed,and the cau-ses of the trouble,measures to eliminate the drug hidden dangers were found. Results The hidden danger of drug order was related to doctors unfamiliar with interaction,usage and dosage of drugs,drug administration personnel lack of re-sponsibility. Conclusion Strengthening the verification link in nursing work,the training of medical staff rotation,drug administration responsibility,the training of clinical staff,can reduce the drug related risks,so as to reduce medication errors.%目的:探讨急诊科药嘱相关问题及对策。方法对2013年下半年用药医嘱中的隐患进行分析,发现造成药嘱隐患的原因,寻找消除药嘱隐患的对策。结果隐患药嘱与医生对药物作用、用法、剂量不熟悉,药局人员缺乏责任心有着直接的关系。结论加强护理工作中的核对环节,对轮转医生加强培训,加强药局工作人员的责任心,对临床医护人员加强相关培训,可以减少药嘱相关隐患,从而减少用药错误。

  11. Monitoring of hidden damage in multi-layered aerospace structures using high-frequency guided waves

    Science.gov (United States)

    Semoroz, A.; Masserey, B.; Fromme, P.

    2011-04-01

    Aerospace structures contain multi-layered components connected by fasteners, where fatigue cracks and disbonds or localized lack of sealant can develop due to cyclic loading conditions and stress concentration. High frequency guided waves propagating along such a structure allow for the efficient non-destructive testing of large components, such as aircraft wings. The type of multi-layered model structure investigated in this contribution consists of two aluminium plates adhesively bonded with an epoxy based sealant layer. Using commercially available transducer equipment, specific high frequency guided ultrasonic wave modes that penetrate through the complete thickness of the structure were excited. The wave propagation along the structure was measured experimentally using a laser interferometer. Two types of hidden damage were considered: a localized lack of sealant and small surface defects in the metallic layer facing the sealant. The detection sensitivity using standard pulse-echo measurement equipment has been quantified and the detection of small hidden defects from significant stand-off distances has been shown. Fatigue experiments were carried out and the potential of high frequency guided waves for the monitoring of fatigue crack growth at a fastener hole during cyclic loading was discussed.

  12. High frequency guided waves for hidden fatigue crack growth monitoring in multi-layer aerospace structures

    Science.gov (United States)

    Chan, Henry; Fromme, Paul

    2015-03-01

    Varying loading conditions of aircraft structures result in stress concentration at fastener holes, where multi-layered components are connected, possibly leading to the development of fatigue cracks. High frequency guided waves propagating along the structure allow for the non-destructive testing of such components, e.g., aircraft wings. However, the sensitivity for the detection of small, potentially hidden, fatigue cracks has to be ascertained. The type of multi-layered model structure investigated consists of two adhesively bonded aluminium plate-strips. Fatigue experiments were carried out. The sensitivity of the high frequency guided wave modes to monitor fatigue crack growth at a fastener hole during cyclic loading was investigated, using both standard pulse-echo equipment and laser interferometry. The sensitivity and repeatability of the measurements were ascertained, having the potential for fatigue crack growth monitoring at critical and difficult to access fastener locations from a stand-off distance.

  13. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Patient Stories Español Eye Health / News Halloween Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without ... been properly fitted by an eye care professional, the lenses stuck to my eye like a suction ...

  14. Colored Contact Lens Dangers

    Science.gov (United States)

    ... Prevention News Ask an Ophthalmologist Patient Stories Español Eye Health / News Halloween Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without a Prescription Sep. 26, 2013 It started ...

  15. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Hidden Dangers of Buying Decorative Contact Lenses Without a Prescription Leer en Español: Peligros asociados con los ... contacto de color Sep. 26, 2013 It started as an impulsive buy from a souvenir shop, but ...

  16. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Patient Stories Español Eye Health / News Halloween Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without ... been properly fitted by an eye care professional, the lenses stuck to my eye like a suction ...

  17. Analysis of Hidden Danger in Farmer’s Rights and Interests during Farmland Transfer——An Evaluation of Rights Safeguarding Effect of Farmland Transfer Contract

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Taking Shuangliu County,Chengdu City,China as an example,evaluation index system for the rights protection effects of farmland transfer is established contract from three aspects of basic information,transfer agreement and legal safeguards in the contracts.According to the investigation data,weight of evaluation index is determined by both entropy weight and Analytic Hierarchy Process.Comprehensive index method is used to evaluate the rights protection effects of farmland transfer contract in the flat dam,high hill and low hill in Shuangliu County,Chengdu,China.Result shows that the transfer agreement of farmland and the basic information of contract greatly affect the rights protection effects of farmland transfer contract.There are differences in the five indices of the information of the signature of contract,pricing for payment,time limit for farmland transfer,transfer mode of farmland,and use range of farmland transfer.During the farmland transfer in reality,there are three hidden dangers in farmer’s land rights and interests,which are the ill-formed transfer behavior,the relatively low income of farmers from farmland transfer,and the quality decline of farmland and difficult full reclamation in transfer period.Based on the evaluation result and investigation data,countermeasures are put forward to improve the rights protection effects of farmland transfer contract.

  18. 既有建筑幕墙的安全隐患及整改技术方案%ALSO HAS CONSTRUCTION CURTAIN WALL SAFE HIDDEN DANGER AND REORGANIZES TECHNICAL PROGRAM

    Institute of Scientific and Technical Information of China (English)

    邓锦振

    2011-01-01

    针对既有玻璃幕墙的安全隐患,从材料、技术、施工、验收等方面提出改造和出新的方案和思路.%In view of already has the glass curtain wall safe hidden danger , From aspects and so on material, technology, construction, approval proposes the transformation and the new proposal and the mentality.

  19. Study on Comprehensive Features of Sphere Hidden Dangers Under Electric Excitation of Large Fixed Power Site Building%大定源建场电激励下球状隐患综合特征研究

    Institute of Scientific and Technical Information of China (English)

    朱德兵; 王猛; 邓红卫; 周科平

    2013-01-01

    为了克服电法超前地质预报中巷道内供电的诸多不便,及数据解释复杂化的问题,采用地面供电的长极距大定源建场模式,通过测量工作面附近的电位差及激发极化率异常,判定地下工程隐患是否存在.物理模拟试验表明:在迫近低阻地下工程隐患时,电位差出现明显的增大,而极化率异常出现负值,且不断减小;采用三维观测系统测量,可以实现对隐患的实时预警,通过对各个方向异常的比较分析,可以确定隐患的空间位置.这种预报方法用于地下掘进工程隐患超前预报,对工作面前方或附近异常体有一定的分辨能力.%In order to overcome the inconvenient power supply in the mine roadway during the electric advance geological prediction and the complicated problems of the data explanation, a long pole span fixed power site building mode with a power supply from the surface ground was provided.With the measurement of the potential difference near the coal mining face and the abnormal of excitation polarization, hidden dangers were judged. The physical simulation experiments showed that when the low resistances sphere hidden danger was reached closely, the potential difference would be increased obviously, abnormal of the polarization rate would be a negative value and would be reduced continuously.The 3D observation system measurement was applied to realize the real time early warning of the hidden danger. With the comparison analysis on the abnormal in each direction, the space location of the hidden danger could be determined. The prediction method applied to the advance prediction of the hidden danger in the underground excavation project could have a certain distinguishing ability of the abnormal mass in front or near the working face.

  20. Monitoring of hidden fatigue crack growth in multi-layer aircraft structures using high frequency guided waves

    Science.gov (United States)

    Chan, H.; Masserey, B.; Fromme, P.

    2015-03-01

    Varying loading conditions of aircraft structures result in stress concentration at fastener holes, where multi-layered components are connected, potentially leading to the development of hidden fatigue cracks in inaccessible layers. High frequency guided waves propagating along the structure allow for the structural health monitoring (SHM) of such components, e.g., aircraft wings. Experimentally the required guided wave modes can be easily excited using standard ultrasonic wedge transducers. However, the sensitivity for the detection of small, potentially hidden, fatigue cracks has to be ascertained. The type of multi-layered model structure investigated consists of two adhesively bonded aluminum plate-strips with a sealant layer. Fatigue experiments were carried out and the growth of fatigue cracks at the fastener hole in one of the metallic layers was monitored optically during cyclic loading. The influence of the fatigue cracks of increasing size on the scattered guided wave field was evaluated. The sensitivity and repeatability of the high frequency guided wave modes to detect and monitor the fatigue crack growth was investigated, using both standard pulse-echo equipment and a laser interferometer. The potential for hidden fatigue crack growth monitoring at critical and difficult to access fastener locations from a stand-off distance was ascertained. The robustness of the methodology for practical in situ ultrasonic monitoring of fatigue crack growth is discussed.

  1. 威金斯煤气柜几种典型危险性隐患原因分析及对策%Analysis of the Causes of Several Typical Hidden Dangers in Wiggins Gasholder and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    丛占柱; 赵琦

    2016-01-01

    威金斯煤气柜在煤气系统运行当中具有十分突出的重要作用.威金斯煤气柜在本钢已经有了超过20年的服役历史,运行实际中,威金斯煤气柜也出现了多种隐患,其中一些尤为典型并具有危险性.结合威金斯煤气柜在本钢20余年的运行经验,分析和总结威金斯煤气柜几种典型危险性隐患的原因及对策,对于掌握威金斯煤气柜缺陷处理及维护具有十分重要的意义.%Wiggins gasholder has a very prominent role in gas system and has served in Benxi Steel for more than 20 years. In the past Wiggins gasholder has had various hidden dangers in actual operation, some of which were quite typical and dangerous. Combining with 20 years of experience, the paper analyzes and summarizes the causes and countermeasures of several typical hidden troubles in Wiggins gasholder, bearing much importance for defect treatment and maintenance of Wiggins gasholder.

  2. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Tips & Prevention News Ask an Ophthalmologist Patient Stories Español Eye Health / News Halloween Hazard: The Hidden Dangers ... entire eye had to be rem… Leer en Español: Peligros asociados con los lentes de contacto de ...

  3. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Tips & Prevention News Ask an Ophthalmologist Patient Stories Español Eye Health / News Halloween Hazard: The Hidden Dangers ... Decorative Contact Lenses Without a Prescription Leer en Español: Peligros asociados con los lentes de contacto de ...

  4. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Tips & Prevention News Ask an Ophthalmologist Patient Stories Español Eye Health / News Halloween Hazard: The Hidden Dangers ... for 35 years, according the m… Leer en Español: Peligros asociados con los lentes de contacto de ...

  5. 儿科门诊留观室医院感染隐患及干预措施%Hidden danger and intervention measures for nosocomial infections in pediatric observation room

    Institute of Scientific and Technical Information of China (English)

    田茂强; 任洋; 姚毅

    2012-01-01

    目的 调查、了解儿科门诊留观室医院感染的隐患,进一步探讨预防医院感染的干预措施.方法 调查医院儿科门诊留观室存在的医院感染隐患,制定相应的预防医院感染措施.结果 门诊及留观室的医师缺乏较详细的病史询问和仔细的体格检查、儿科门诊留观室空气质量差、医护人员预防感染的意识薄弱、手卫生重视不够、抗菌药物的不规则使用等方面存在着医院感染隐患.结论 积极采取相应的干预措施,加强健康卫生宣传教育工作,注重消毒、隔离与监测,合理使用抗菌药物等,以达到预防及控制医院感染的目的.%OBJECTIVE To investigate and study the hidden dangers for nosocomial infections in pediatric observation room, and to further explore the intervention measures to prevent nosocomial infections. METHODS The hidden dangers for nosocomial infections in pediatric observation room were investigated, the corresponding counlermeasures were enacted to prevent nosocomial infections. RESULTS The lack of detailed inquiry of medical history and the careful physical examination, the poor air quality in observation room, weak sense of the prevention of infections, insufficient attention to hand hygiene, and the unreasonable use of antibiotics were the hidden dangers for nosocomial infections. CONCLUSION Taking appropriate intervention measures, intensifying the propaganda of the healthcare education, stressing the sterilization, isolation and surveillance, and reasonably using antibiotics can achieve the purpose of preventing and controlling nosocomial infections.

  6. “水产动物疾病学”实践教学的安全隐患与防范%Hidden Danger and Precaution Measures in Practice Teaching of"Diseases of Aquatic Animals"

    Institute of Scientific and Technical Information of China (English)

    陈言峰

    2014-01-01

    Much hidden danger in practice teaching of"Diseases of Aquatic Animals" in the university was elaborated and many precaution measures were brought out in this article. These could provide security guarantee for the practice teaching of this course and avoid some dispensable harm and losses.%本文对高等院校“水产动物疾病学”实践教学中存在的诸多安全隐患进行了阐述,并提出了相应的防范措施,旨在为今后该课程的实践教学提供安全保障,力求避免一些不必要的伤害和损失。

  7. Prevention Measures of Nursing Security Hidden Danger on Obstetrics and Gynecology nursing Department%妇产护理存在的安全隐患及防范对策

    Institute of Scientific and Technical Information of China (English)

    谢晓辉

    2015-01-01

    妇产科是医院所有科室中出现护理风险相对较高的科室,因此,妇产科护理工作中采取有效的防范措施,能够减少患者伤亡事故的发生,在提高患者疾病治疗效果的同时,树立良好的科室形象。鉴于此该文对妇产科护理存在的安全隐患进行分析,并提出相关防范措施,以降低妇产科护理安全隐患,为患者营造安全的治疗环境。%Nursing security hidden danger refers to the mental or body structure injury for nurses to patients nursing appeared when the law does not allow and even death. Department of Obstetrics and gynecology nursing department is relatively higher risk of hospital in all departments, affected by many factors such as the woman's individual difference, more security risks, prone to nursing process, therefore, effective prevention measures taken in obstetrics and gynecology nursing work, to reduce the occurrence of accidents in patients, improve patient disease treatment effect at the same time the Department, establish a good image of the. In view of this, this article carries on the analysis to the potential safety problems of maternity care, and puts forward relevant pre-vention measures, to reduce the nursing safety hidden danger for patients in Department of Obstetrics and Gynecology, create a safe environment for treatment.

  8. The Hidden Dangers in during the Utilization of Digital Resources and Countermeasures%数字资源利用期间的安全隐患与对策

    Institute of Scientific and Technical Information of China (English)

    金蕊

    2014-01-01

    The digitalization is a main trend of library’s reform, and digital technology aided processing library’s internal resources can reduce the difficulty of the manual operation process, and improve comprehensively the utilization of digital resources. At the same time, the hidden danger in computer network itself leads to the existence of different safety risks in digital resources utilization, increasing the control difficulty of new library construction. This paper analyzes the structural features of digital library, sums up the hidden dangers existing in the utilization of digital materials, and puts forward some effective countermeasures for constructing the safe utilization mechanism for digital resources.%数字化是图书馆改革的主要趋势,利用数字技术辅助图书馆内部资源处理,可以降低人工操作流程的难度,全面提升数字资源的利用率。同时,计算机网络自身存在的安全隐患,导致了数字资源利用存在着不同的安全风险,增加了新型图书馆建设的操控难度。分析了数字图书馆的结构特点,总结了数字资料利用中存在的隐患,提出了构建数字资源安全利用机制的有效对策。

  9. Preliminary Discussion on reducing the hidden birth dangers in Senile Birth Group based on the“Individual Two Children”Policy%降低“单独二孩”高龄群体生育隐患的初探

    Institute of Scientific and Technical Information of China (English)

    赖秋华; 潘华峰

    2015-01-01

    文章总结了高龄妇女生育存在母婴健康风险大、人工辅助生殖技术异化、家庭经济负担沉重、家庭教育困难等隐患,认为可从端正群众的生育观念、建立人工辅助生殖技术正确认识观、建立新型家庭福利制度、发挥中医药特色生育保健服务职能等方面构建高龄妇女优质生育保障服务体系,呼吁社会关注高龄生育群体,降低二次生育隐患,维护“单独二孩”政策受益群体的权益。%This paper summarizes that the elderly women exist hidden perils of childbearing ,such as the health risks between mother and child,the alienation in ART,the economic burden in family ,difficulties in family education and so on.It puts forward some ideas to construct the reproductive system with high quality in senile birth group,for examples,to correct the attitudes of the masses on giving birth to a child,to set up the correct understanding of ART,to set up the new family welfare system,and play the service function of Chinese medicine on the characteristics of reproductive health care.Senile birth group is calling for social attention to reduce the hidden dangers in the second birth.The main beneficiaries of the policy should be protected.

  10. 基于B/S模式的燃气管网安全隐患监控系统的研究%A Study of Gas Network Hidden danger Monitoring System Based on B/S Mode

    Institute of Scientific and Technical Information of China (English)

    余舒扬

    2016-01-01

    This paper designs a gas network hidden danger monitoring system to achieve the automatic detection and rapid deter-mination of gas network leakage combined with current situation of gas network in Chongqing in order to cope with the increas-ingly prominent security risks of various types of gas network and ensure the safe operation of it. This system uses three-tier ar-chitecture of the B/S mode. The manager can monitor the running state of the pipe network, query the history data and grasp the hidden danger in time. It achieves the full monitoring of 24 hours. Once the accident occurs, it can alarm quickly through short message and provide accurate location and accident status. Spot test and field operation indicate that the labor intensity of line patrol person is greatly reduced, the time of emergency response is shortened and the work efficiency is improved.%为应对日益凸显的各类燃气管网安全隐患,确保燃气管网安全运行,本文结合重庆市燃气管网的现状,设计了燃气管网安全隐患监控系统,实现了管网中燃气泄漏自动检测与速报。该系统采用三层B/S体系结构;管理人员可监测管网的运行状态,查询历史数据,及时掌握安全隐患;全天24小时监测,一旦发生事故,迅速通过短信报警,并提供准确的地点和事故状态。现场测试与使用表明,该系统减轻了巡线工劳动强度,缩短了应急响应的时间,提高工作效率。

  11. 药房发药差错及其隐患的综合性防范措施%Hair medicine pharmacy errors and comprehensive preventive measures against hidden danger

    Institute of Scientific and Technical Information of China (English)

    杨志刚

    2014-01-01

    目的:对药房发药差错的综合性防范措施进行分析和探讨。方法:对我院2011年1月份到2012年1月份发生的发药差错进行统计和分析,并制定相应的综合性防范措施,观察和比较干预前后的发药差错以及隐患情况。结果:干预后的发药差错发生率和隐患率相比干预前明显下降,其中发药差错以药物种类差错居多,干预后发药差错下降率为78%;发药隐患以药物数量隐患居多,干预后发药隐患下降率为36.2%。结论:通过制定和实施综合性防范措施,有利于减少药房发药差错以及隐患的发生率,值得推广和普及。%objective: to send medicine pharmacy errors in the comprehensive preventive measures are analyzed and discussed. Methods: our hospital from January 2011 to January 2012 in the dispensing error statistics and analysis, and formulate the corresponding comprehensive preventive measures, observed and compared before and after the intervention of the dispensing errors and pitfals. Results: after the intervention of the dispensing error rate and hazard rate significantly decreased, compared with before, in which the dispensing errors in the majority with drug type error, drug intervention backwardness errors decline rate is 78%; Hair medicine to drug number mostly hidden trouble, the intervention of backwardness medicine hidden trouble faling at a rate of 36.2%. Conclusion: through formulating and implementing comprehensive preventive measures, to reduce the incidence of hair medicine pharmacy errors and hidden dangers, worthy of promotion and popularization.

  12. High-frequency guided ultrasonic waves for hidden defect detection in multi-layer aircraft structures

    Science.gov (United States)

    Masserey, B.; Raemy, C.; Fromme, P.

    2012-05-01

    Aerospace structures contain multi-layer components subjected to cyclic loading conditions; fatigue cracks and disbonds can develop, often at fastener holes. High-frequency guided waves have the potential for non-destructive damage detection at critical and difficult to access locations from a stand-off distance. Using commercially available ultrasonic transducers, high frequency guided waves were generated that penetrate through the complete thickness of a model structure, consisting of two adhesively bonded aluminum plates. The wave propagation along the specimen was measured and quantified using a laser interferometer. The wave propagation and scattering at internal defects was simulated using Finite Element (FE) models and good agreement with the measurement results found. The detection sensitivity using standard pulse-echo measurements was verified and the influence of the stand-off distance predicted from the FE simulation results.

  13. 试验场空中信号泄密隐患及基于安全代理基站的解决方案研究%Research on Hidden Danger of Testing Field Wireless Signal Divulge Secret and Solution Based on Security Agency Station

    Institute of Scientific and Technical Information of China (English)

    高小玲; 刘力天; 闫冰

    2013-01-01

    Wireless signal divulge secret is one of most serious hidden danger of mobile communi-cation .Based on the analysis of testing field's mobile communication status and researching the tech-nology of security agency station ,through simulating and analyzing the hidden danger of wireless sig-nal divulge secret of testing field's mobile communication , this paper puts forward the solution scheme w hich is based on security agency station ,and this scheme can effectively solve the problem of the hidden danger of wireless signal divulge secret of testing field's mobile communication .%空中信号泄密是移动通信最大的安全隐患之一,在分析试验场移动通信现状和研究安全代理基站技术的基础上,通过仿真分析试验场移动通信空中信号的泄密隐患,提出基于安全代理基站的解决方案,该方案能够有效解决试验场移动通信的空中接口泄密隐患。

  14. 分析计算机网络安全的主要隐患及管理方法%The main hidden danger and management method of computer network security

    Institute of Scientific and Technical Information of China (English)

    意合巴古力.吴思满江

    2016-01-01

    Aiming at the main problems of computer network security analysis,introduces the basic concepts of computer network,and puts forward the main computer network security risks including network hacker attacks,vulnerabilities exist in the network,network virus invasion,the Internet fraud,lack of lack of awareness of safety.These problems lead to the security of user information and related data is threatened. In order to avoid the damage caused by these hidden dangers,the computer network security needs to be scientific management,and attaches great importance to the calculation of the previous network security technology.%针对计算机网络安全的主要隐患进行分析,介绍了计算机网络的基本概念,并提出了计算机网络安全主要隐患包括网络黑客的攻击,网络存在的漏洞,网络病毒的入侵,网络诈骗行为,缺乏安全意识等.这些问题的存在导致用户的信息以及相关数据的安全性受到威胁.为了避免这些隐患带来的破坏,需要对计算机网络安全进行科学管理,高度重视计算既往网络安全防范技术.

  15. Application of three dimensional high-density resistivity method in hidden danger detection of tailings%三维高密度电法在尾矿库隐患检测中的应用

    Institute of Scientific and Technical Information of China (English)

    胡文志; 马海涛; 谢振华; 李全明

    2011-01-01

    Three dimensional high-density resistivity method is developed on the basis of two dimensional high-density resistivity method, overcoming the defect of two dimensional high-density resistivity method that can not vividly reveals the trend, spatial location and shape of target abnormal regions. Three dimensional high-density resistivity method was applied to hidden danger detection of tailings, which can get rich land resistivity data. Three dimensional resistivity processing software was applied to process the land resistivity data, realizing three dimensional geological data of tailings dam visualization. By three dimensional resistivity iso-surface figure and three dimensional resistivity dynamic sectional figure, we can realize the distribution of saturation and the abnormal geological condition of tailings dam, and provide scientific basis for the risk assessment of tailings.%三维高密度电阻率法是在二维的基础上发展起来的,克服了二维高密度电法不能直观地展示目标异常区域的走向、空间位置与形态的不足.将三维高密度电法应用于尾矿库隐患检测中,可得到丰富的地电数据,利用三维电阻率处理软件对地电数据进行反演,实现了尾矿坝三维地质数据的可视化.通过三维电阻率等值面图和三维电阻率动态截面图,可以直观、可靠的了解到尾矿坝浸润线的分布规律和坝体异常地质情况,为尾矿库的风险评估工作提供科学依据.

  16. Contesting danger

    DEFF Research Database (Denmark)

    Heathershaw, John; Megoran, Nick

    2011-01-01

    and subsequent considerations of the region in terms of the war on terror. It considers several examples of this discourse of danger including the popular US TV drama about presidential politics, The West Wing, the policy texts of ‘Washingtonian security analysis’ and accounts of danger, insecurity and urban...

  17. Contesting danger

    DEFF Research Database (Denmark)

    Heathershaw, John; Megoran, Nick

    2011-01-01

    and subsequent considerations of the region in terms of the war on terror. It considers several examples of this discourse of danger including the popular US TV drama about presidential politics, The West Wing, the policy texts of ‘Washingtonian security analysis’ and accounts of danger, insecurity and urban...... violence in the Ferghana Valley. It is argued that popular policy and academic texts are relatively consistent across the three dimensions of endangerment. This argument is demonstrated through a discussion of how policy-making and practice is informed by this discourse of danger and of how the discourse...... of danger is contested within the region. The example of urban violence in Osh, Kyrgyzstan and Jalalabad, Afghanistan in 2010 demonstrates how opportunities to mitigate conflict may have been lost due to the distortions of this discourse of danger. It concludes by raising the challenge to policy...

  18. 基于透明代理的域名系统隐患分析与防御策略%DNS hidden danger analysis and defense strategy based on transparent proxies

    Institute of Scientific and Technical Information of China (English)

    彭勇; 范乐君; 陈冬青; 程学旗

    2011-01-01

    域名系统现有机制无法对域名解析请求和应答的信息来源进行有效确认,使得攻击者能够伪造数据对域名系统进行攻击,该文在对域名系统安全隐患分析的基础上,提出了一种透明代理的安全组件,不需改变现有域名系统的架构与通信机制,实现了对域名解析请求和应答信息的鉴别与过滤。该透明代理运行在2种工作模式即选择性重查询模式和安全标签查询模式,能够根据安全要求和风险水平在2种模式之间进行动态切换。仿真分析表明:这种架构使得攻击域名系统的成功率大为降低,明显提高了系统安全性,同时对系统平均查询时间和网络吞吐率影响较小。%Existing mechanisms in the domain name system(DNS) can not verify the information sources of DNS requests and responses,which means an attacker can forge data to trick the DNS.To address the problem,this study analyzes this DNS hidden danger to develop a security component called "transparent proxy" which verifies and filters DNS requests and responses and can be easily deployed on the existing DNS without modification of the DNS itself.The proxy has two operating modes,a selective re-query mode and a security label query mode.This system dynamically switches between these two modes according to the security requirements and current risk level.Simulations show that the proxy dramatically reduces the success probability of attacks on the DNS,improves system security and has acceptable impact on the mean query time and network throughput.

  19. A Signal Processing Approach with a Smooth Empirical Mode Decomposition to Reveal Hidden Trace of Corrosion in Highly Contaminated Guided Wave Signals for Concrete-Covered Pipes

    Directory of Open Access Journals (Sweden)

    Javad Rostami

    2017-02-01

    Full Text Available Ultrasonic guided waves have been extensively applied for non-destructive testing of plate-like structures particularly pipes in past two decades. In this regard, if a structure has a simple geometry, obtained guided waves’ signals are easy to explain. However, any small degree of complexity in the geometry such as contacting with other materials may cause an extra amount of complication in the interpretation of guided wave signals. The problem deepens if defects have irregular shapes such as natural corrosion. Signal processing techniques that have been proposed for guided wave signals’ analysis are generally good for simple signals obtained in a highly controlled experimental environment. In fact, guided wave signals in a real situation such as the existence of natural corrosion in wall-covered pipes are much more complicated. Considering pipes in residential buildings that pass through concrete walls, in this paper we introduced Smooth Empirical Mode Decomposition (SEMD to efficiently separate overlapped guided waves. As empirical mode decomposition (EMD which is a good candidate for analyzing non-stationary signals, suffers from some shortcomings, wavelet transform was adopted in the sifting stage of EMD to improve its outcome in SEMD. However, selection of mother wavelet that suits best for our purpose plays an important role. Since in guided wave inspection, the incident waves are well known and are usually tone-burst signals, we tailored a complex tone-burst signal to be used as our mother wavelet. In the sifting stage of EMD, wavelet de-noising was applied to eliminate unwanted frequency components from each IMF. SEMD greatly enhances the performance of EMD in guided wave analysis for highly contaminated signals. In our experiment on concrete covered pipes with natural corrosion, this method not only separates the concrete wall indication clearly in time domain signal, a natural corrosion with complex geometry that was hidden and

  20. A Signal Processing Approach with a Smooth Empirical Mode Decomposition to Reveal Hidden Trace of Corrosion in Highly Contaminated Guided Wave Signals for Concrete-Covered Pipes.

    Science.gov (United States)

    Rostami, Javad; Chen, Jingming; Tse, Peter W

    2017-02-07

    Ultrasonic guided waves have been extensively applied for non-destructive testing of plate-like structures particularly pipes in past two decades. In this regard, if a structure has a simple geometry, obtained guided waves' signals are easy to explain. However, any small degree of complexity in the geometry such as contacting with other materials may cause an extra amount of complication in the interpretation of guided wave signals. The problem deepens if defects have irregular shapes such as natural corrosion. Signal processing techniques that have been proposed for guided wave signals' analysis are generally good for simple signals obtained in a highly controlled experimental environment. In fact, guided wave signals in a real situation such as the existence of natural corrosion in wall-covered pipes are much more complicated. Considering pipes in residential buildings that pass through concrete walls, in this paper we introduced Smooth Empirical Mode Decomposition (SEMD) to efficiently separate overlapped guided waves. As empirical mode decomposition (EMD) which is a good candidate for analyzing non-stationary signals, suffers from some shortcomings, wavelet transform was adopted in the sifting stage of EMD to improve its outcome in SEMD. However, selection of mother wavelet that suits best for our purpose plays an important role. Since in guided wave inspection, the incident waves are well known and are usually tone-burst signals, we tailored a complex tone-burst signal to be used as our mother wavelet. In the sifting stage of EMD, wavelet de-noising was applied to eliminate unwanted frequency components from each IMF. SEMD greatly enhances the performance of EMD in guided wave analysis for highly contaminated signals. In our experiment on concrete covered pipes with natural corrosion, this method not only separates the concrete wall indication clearly in time domain signal, a natural corrosion with complex geometry that was hidden and located inside the

  1. Killing Fields: The Deadly Legacy of Landmines. Study Guide. Episode #738. America's Defense Monitor, Educational TV for the Classroom.

    Science.gov (United States)

    Center for Defense Information, Washington, DC.

    This program explores the dangers of landmines as "weapons of mass destruction in slow motion." These hidden killers have been called the "perfect soldier"--never sleeping and never missing--yet kill thousands of people each year, many innocent civilians. The study guide offers questions to use before viewing the video,…

  2. [Dangerous aquaria].

    Science.gov (United States)

    Satora, Leszek; Morawska, Jowanka; Szkolnicka, Beata; Mitrus, Małgorzata; Targosz, Dorota; Gwiazdowski, Andrzej

    2005-01-01

    World trends for a home breeding of exotic freshwater and marine fishes did not miss Poland. There are almost all species of aquarium fishes available in Polish pet shops, but there is not enough information about threat given to customers. In some fish, there are masses of one-cell glands, mainly serous, in the proximity of the spines. In others, those one-cell glands may be grouped in larger aggregates of cells called venom glands, that may form organs resembling multicellular glands of terrestrial animals. They are usually located around the spines or hard rays of the fins. Even if covered with a connective tissue sheath, the aggregates of the venom cells do not have any common outlet; they are not, therefore, proper multicellular glands. The venom glands of the catfish are covered with a thin sheath and they release their contents when the fin ray is pressed. Spines are derived from fin rays. When the spine penetrates the body of its prey, it presses its base against the cells, squashes them and squeezes the venomous contents into the wound. Catfish, lionfish and stonefish have the venom glands producing secretion which could be dangerous. The eels and morays blood is also dangerous, as well as slime of reduced squamae. Poison information centers noted several cases of fishes' stings in Poland.

  3. Looming Danger

    Institute of Scientific and Technical Information of China (English)

    WangXuewen

    2003-01-01

    Is all well with the roaring Chinese economy now that severe acute respiratory syndrome has almost vanished? For beginners,SARS is still a looming danger, as Chinese leaders and medical professionals relentlessly try tobring across to a wider, more relaxed post-SARS public. Meanwhile, economistsand analysts struggle to make sense of various news, facts and figures from the frontlines of trade and industry. Early on, while acknowledging that SARS had some negative impact on the development of some industries and regions,President and Party General Secretary Hu Jintao acted as true leader. He saidthat the people and country would triumph over “these temporary difficulties”and would finally win the war against this nasty disease.

  4. Hidden Treasure

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    There are many times I feel close to going crazy in Beijing.The overhooting horns and the dangerous driving of local drivers are slowly driving us cyclists to extinction,here in the bicyclecapital of the world.

  5. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main...... the ill parent. These findings contribute to a deeper understanding of the traumatic process of parental ABI that some children experience and emphasize the importance of family-centred interventions that include the children....

  6. A danger-theory-based immune network optimization algorithm.

    Science.gov (United States)

    Zhang, Ruirui; Li, Tao; Xiao, Xin; Shi, Yuanquan

    2013-01-01

    Existing artificial immune optimization algorithms reflect a number of shortcomings, such as premature convergence and poor local search ability. This paper proposes a danger-theory-based immune network optimization algorithm, named dt-aiNet. The danger theory emphasizes that danger signals generated from changes of environments will guide different levels of immune responses, and the areas around danger signals are called danger zones. By defining the danger zone to calculate danger signals for each antibody, the algorithm adjusts antibodies' concentrations through its own danger signals and then triggers immune responses of self-regulation. So the population diversity can be maintained. Experimental results show that the algorithm has more advantages in the solution quality and diversity of the population. Compared with influential optimization algorithms, CLONALG, opt-aiNet, and dopt-aiNet, the algorithm has smaller error values and higher success rates and can find solutions to meet the accuracies within the specified function evaluation times.

  7. Danger signals in stroke.

    Science.gov (United States)

    Gelderblom, Mathias; Sobey, Christopher G; Kleinschnitz, Christoph; Magnus, Tim

    2015-11-01

    Danger molecules are the first signals released from dying tissue after stroke. These danger signals bind to receptors on immune cells that will result in their activation and the release of inflammatory and neurotoxic mediators, resulting in amplification of the immune response and subsequent enlargement of the damaged brain volume. The release of danger signals is a central event that leads to a multitude of signals and cascades in the affected and neighbouring tissue, therefore providing a potential target for therapy.

  8. Supersymmetric leptogenesis and light hidden sectors

    CERN Document Server

    Weniger, Christoph

    2010-01-01

    Thermal leptogenesis and supergravity are attractive scenarios for physics beyond the standard model. However, it is well known that the super-weak interaction of the gravitino often leads to problems with primordial nucleosynthesis in the standard scenario of matter parity conserving MSSM + three right-handed neutrinos. We will present and compare two related solutions to these problems: 1) The conflict between BBN and leptogenesis can be avoided in presence of a hidden sector with light supersymmetric particles which open new decay channels for the dangerous long-lived particles. 2) If there is a condensate in the hidden sector, such additional decay channels can be alternatively opened by dynamical breaking of matter parity in the hidden sector.

  9. Microwaves - the hidden danger. Mikrowellen - die verheimlichte Gefahr

    Energy Technology Data Exchange (ETDEWEB)

    Brodeur, P.

    1987-01-01

    Today, highly frequent radio waves are regarded as undangerous to man. Diseases seen at radar-technicians during the 2nd World War, however, indicated that microwaves applied in radar systems were hazardous to health. The Russian work medicine has been knowing microwave-caused hazards in industry since the beginning of the thirties. Therefore in some East-European countries there are terms of protection and severe norms of safety for the staying of persons in the radiation sphere of microwaves.

  10. FOREIGN BODY ASPIRATION IN CHILDREN: A HIDDEN DANGER

    OpenAIRE

    Marlene Rodrigues; Joana Teixeira; Patrícia Nascimento; Susana Carvalho; Augusta Gonçalves; José Almeida; Cristiana Ribeiro

    2016-01-01

    Introduction: Foreign body aspiration (FBA) is a common pediatric emergency and an important cause of accidental death in children. The majority of cases occur with small organic or inorganic objects in preschool age. FBA may be associated with a broad spectrum manifestations and its diagnosis represents a challenge. Case report: We report a case of a two-year-old child admitted in the emergency department with cough, dysphonia and dysphagia. On physical examination she had persistent coug...

  11. FOREIGN BODY ASPIRATION IN CHILDREN: A HIDDEN DANGER

    Directory of Open Access Journals (Sweden)

    Marlene Rodrigues

    2016-09-01

    Conclusion: The aim of this report is to emphasize the need to maintain a high index of suspicion concerning the possibility of FBA, because the late recognition can lead to irreversible consequences.

  12. On the Forbidden Pleasures and Hidden Dangers of Covert Reading.

    Science.gov (United States)

    Salvio, Paula M.

    1995-01-01

    Explains how female preservice teachers describe their covert reading histories in assigned autobiographical narratives. Uses textual devices borrowed from Bertolt Brecht to show how preservice teachers can critically analyze the assumptions underlying their understanding of their early reading experiences. (TB)

  13. Bacterial danger sensing.

    Science.gov (United States)

    LeRoux, Michele; Peterson, S Brook; Mougous, Joseph D

    2015-11-20

    Here we propose that bacteria detect and respond to threats posed by other bacteria via an innate immune-like process that we term danger sensing. We find support for this contention by reexamining existing literature from the perspective that intermicrobial antagonism, not opportunistic pathogenesis, is the major evolutionary force shaping the defensive behaviors of most bacteria. We conclude that many bacteria possess danger sensing pathways composed of a danger signal receptor and corresponding signal transduction mechanism that regulate pathways important for survival in the presence of the perceived competitor.

  14. Second Hand Smoke: Danger

    Science.gov (United States)

    ... What's this? Submit Button Past Emails Second Hand Smoke: Danger! Recommend on Facebook Tweet Share Compartir Make ... the United States are still exposed to secondhand smoke, even though cigarette smoking rates are dropping and ...

  15. Semantic Gaps Are Dangerous

    DEFF Research Database (Denmark)

    Ejstrup, Michael; le Fevre Jakobsen, Bjarne

    2014-01-01

    . That seems not to be possible. We have to use words, metaphors and comparisons containing adverse connotations, and this situation creates ways of using unpolite language and tend to create dangerous relations where specialy language creates problems that could be avoided if we had better language tools...... at hand. But we have not these tools of communication, and we are in a situation today where media and specially digital and social media, supported by new possibilities of migration, create dangerous situations....

  16. Semantic Gaps Are Dangerous

    DEFF Research Database (Denmark)

    Ejstrup, Michael; le Fevre Jakobsen, Bjarne

    Semantic gaps are dangerous Language adapts to the environment where it serves as a tool to communication. Language is a social agreement, and we all have to stick to both grammaticalized and non-grammaticalized rules in order to pass information about the world around us. As such language develops...... unpolite language and tend to create dangerous relations where specialy language creates problems and trouble that could be avoided if we had better language tools at hand. But we have not these tools of communication, and we are in a situation today where media and specially digital and social media......, supported by new possibilities of migration, create dangerous situations. How can we avoid these accidental gaps in language and specially the gaps in semantic and metaphoric tools. Do we have to keep silent and stop discusing certain isues, or do we have other ways to get acces to sufficient language tools...

  17. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Academy Publications EyeNet Ophthalmology ... Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced ...

  18. A Danger to Ourselves

    Science.gov (United States)

    Barbieri, Richard

    2013-01-01

    In this article Richard Barbieri asserts that the biggest danger to our own safety and well-being, and that of our children, comes not from adult predators, environmental hazards, or the class bully, but from traits common to us all. The enemy is us, and not least because we too often jump to such strategies as clobbering. Writers from such varied…

  19. Dangerous Raw Oysters

    Centers for Disease Control (CDC) Podcasts

    2013-08-05

    Dr. Duc Vugia, chief of the Infectious Diseases Branch at the California Department of Public Health, discusses the dangers of eating raw oysters.  Created: 8/5/2013 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 8/7/2013.

  20. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression wher...

  1. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  2. Trauma is Danger

    Science.gov (United States)

    2011-01-01

    to treatment . Further, identifying which patients are most likely to develop severe SIRS after injury may allow for early intervention. Our current...significant danger signal to the immune system. Cell Stress Chaperones 2003, 8:272-286. 35. Martinon F, Petrilli V, Mayor A, Tardivel A, Tschopp J: Gout ...understanding of gout . Arthritis Res Ther 2008, 10:221. 37. Hawkins PN, Lachmann HJ, Aganna E, McDermott MF: Spectrum of clinical features in Muckle-Wells

  3. La mesure du danger

    CERN Document Server

    Manceron, Vanessa; Revet, Sandrine

    2014-01-01

    La mesure du danger permet d’explorer des dangers de nature aussi diverse que la délinquance, la pollution, l’écueil maritime, la maladie ou l’attaque sorcellaire, l’extinction d’espèces animales ou végétales, voire de la Planète tout entière. Au croisement de la sociologie, de l’anthropologie et de l’histoire, les différents articles analysent les pratiques concrètes de mesure pour tenter de comprendre ce qui se produit au cours de l’opération d’évaluation du danger sans préjuger de la nature de celui-ci. L’anthropologie a contribué à la réflexion sur l’infortune en s’intéressant aux temporalités de l’après : maladies, catastrophes, pandémies, etc. et en cherchant à rendre compte de l’expérience des victimes, de leur vie ordinaire bouleversée, de la recomposition du quotidien. Elle s’intéresse aussi aux autres types de mesures, les savoirs incorporés, qui reposent sur l’odorat, la vue ou le toucher et ceux qui ressortent d’une épistémologie « non ...

  4. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide ... and Public Technicians and Nurses Senior Ophthalmologists Young Ophthalmologists Tools ...

  5. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Ophthalmology Guide Academy Publications EyeNet Ophthalmology Information for: International Ophthalmologists Media Medical Students Patients and Public Technicians and Nurses Senior Ophthalmologists ...

  6. Dangers of peace journalism

    Directory of Open Access Journals (Sweden)

    Wilhelm Kempf

    2016-10-01

    Full Text Available The sense of mission shared by some peace journalists is a dangerous attitude. All journalists can do to give peace a chance is to serve as mediators, helping conflict parties overcome the competitive misperceptions and societal beliefs that fuel conflict. If peace journalists try to promote and impose their own solutions, however, frustration is inevitable and will finally result in the search for an evildoer who can be made responsible. Thus by involving themselves in conflicts, journalists can become unintentional agents of conflict escalation.

  7. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Member Services Advocacy Foundation About Subspecialties & More Eye Health Home Annual Meeting Clinical Education Practice Management Member ... Center Redmond Ethics Center Global Ophthalmology Guide Eye Health Find an Ophthalmologist Academy Store Eye Health A- ...

  8. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Member Services Advocacy Foundation About Subspecialties & More Eye Health Home Annual Meeting Clinical Education Practice Management Member ... Center Redmond Ethics Center Global Ophthalmology Guide Eye Health Find an Ophthalmologist Academy Store Eye Health A- ...

  9. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Intervention Retina/Vitreous Uveitis Focus On Pediatric Ophthalmology Education Center Oculofacial Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Academy ...

  10. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Academy Publications EyeNet Ophthalmology Information for: International Ophthalmologists Media Medical Students Patients and Public Technicians and Nurses ...

  11. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Management Member Services Advocacy Foundation About Subspecialties & More Eye Health Home Annual Meeting Clinical Education Practice Management ... Education Center Redmond Ethics Center Global Ophthalmology Guide Eye Health Find an Ophthalmologist Academy Store Eye Health ...

  12. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Intervention Retina/Vitreous Uveitis Focus On Pediatric Ophthalmology Education Center Oculofacial Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Academy ...

  13. Entanglement without hidden nonlocality

    Science.gov (United States)

    Hirsch, Flavien; Túlio Quintino, Marco; Bowles, Joseph; Vértesi, Tamás; Brunner, Nicolas

    2016-11-01

    We consider Bell tests in which the distant observers can perform local filtering before testing a Bell inequality. Notably, in this setup, certain entangled states admitting a local hidden variable model in the standard Bell scenario can nevertheless violate a Bell inequality after filtering, displaying so-called hidden nonlocality. Here we ask whether all entangled states can violate a Bell inequality after well-chosen local filtering. We answer this question in the negative by showing that there exist entangled states without hidden nonlocality. Specifically, we prove that some two-qubit Werner states still admit a local hidden variable model after any possible local filtering on a single copy of the state.

  14. Discussion of the classification concept and definition of the hidden accident%事故隐患分级概念与定义商榷

    Institute of Scientific and Technical Information of China (English)

    史宗保; 史聪聪; 冯文刚; 张椿婷

    2015-01-01

    针对安全隐患与事故隐患概念的理解各不同的问题,对安全隐患和事故隐患进行了准确定义。认为在实际的安全生产和安全监管工作中,为实现安全关口前移,实现早防早治,把事故隐患和安全隐患统称为安全隐患是比较合适的。对安全隐患分级提出了更为合理的分级标准。%Aiming at the problem that the concept of the hidden danger and the hidden acci-dent was differently understood,this paper accurately defined the hidden danger and the hidden accident.It was appropriate that the hidden accident and hidden danger were collectively referred to as the hidden danger to achieve safety gate moved forward as well as early prevention and treatment at the work of the actual safety production and safety supervision.The more reasonable classification standard of the hidden danger was proposed.

  15. Killing and letting die: hidden value assumptions.

    Science.gov (United States)

    Atkinson, G

    1983-01-01

    In this paper I argue for several related theses: first, that the distinction between killing and letting die, as it is drawn by ordinary persons in ordinary contexts, is more complex than is generally understood; second, that the key feature of this complexity lies in the presence of a hidden normative component in what appears to be a straightforwardly descriptive distinction; and, third, that this complexity renders the killing/letting die distinction an inadequate and hazardous guide for moral reasoning.

  16. Is moral bioenhancement dangerous?

    Science.gov (United States)

    Drake, Nicholas

    2016-01-01

    In a recent response to Persson and Savulescu's Unfit for the Future, Nicholas Agar argues that moral bioenhancement is dangerous. His grounds for this are that normal moral judgement should be privileged because it involves a balance of moral subcapacities; moral bioenhancement, Agar argues, involves the enhancement of only particular moral subcapacities, and thus upsets the balance inherent in normal moral judgement. Mistaken moral judgements, he says, are likely to result. I argue that Agar's argument fails for two reasons. First, having strength in a particular moral subcapacity does not necessarily entail a worsening of moral judgement; it can involve strength in a particular aspect of morality. Second, normal moral judgement is not sufficiently likely to be correct to be the standard by which moral judgements are measured. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  17. Dangers and Pleasures

    DEFF Research Database (Denmark)

    Järvinen, Margaretha Maria; Østergaard, Jeanette

    2011-01-01

    This is a study of young people’s conceptions of illegal drug use as dangerous and/or pleasurable and an analysis of the relationship between attitudes to drugs, drinking, friends’ reported drug use and own experience with drug use and drinking. The article applies a mixed methods approach using...... both survey data and focus group interviews. The main statistical method is Multiple Correspondence Analysis (MCA), which constructs a social space of young people’s attitudes to drugs and drug experiences relationally. We identify four interrelated positions on illegal drug use among 17 to 19-year......-old Danes: the anti-drug position, usually held by youths who do not use illegal drugs and do not have drug-using friends; the ambivalent position, occupied by non-users who report that they have drug-using friends; the transitory position, held by cannabis users, some of whom express positive attitudes...

  18. Hidden circuits and argumentation

    Science.gov (United States)

    Leinonen, Risto; Kesonen, Mikko H. P.; Hirvonen, Pekka E.

    2016-11-01

    Despite the relevance of DC circuits in everyday life and schools, they have been shown to cause numerous learning difficulties at various school levels. In the course of this article, we present a flexible method for teaching DC circuits at lower secondary level. The method is labelled as hidden circuits, and the essential idea underlying hidden circuits is in hiding the actual wiring of DC circuits, but to make their behaviour evident for pupils. Pupils are expected to find out the wiring of the circuit which should enhance their learning of DC circuits. We present two possible ways to utilise hidden circuits in a classroom. First, they can be used to test and enhance pupils’ conceptual understanding when pupils are expected to find out which one of the offered circuit diagram options corresponds to the actual circuit shown. This method aims to get pupils to evaluate the circuits holistically rather than locally, and as a part of that aim this method highlights any learning difficulties of pupils. Second, hidden circuits can be used to enhance pupils’ argumentation skills with the aid of argumentation sheet that illustrates the main elements of an argument. Based on the findings from our co-operating teachers and our own experiences, hidden circuits offer a flexible and motivating way to supplement teaching of DC circuits.

  19. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  20. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  1. A dangerous mixture

    Directory of Open Access Journals (Sweden)

    Anna Piva

    2014-03-01

    Full Text Available A 59-year old woman was admitted for fatigue and arm paresthesias with Trousseau sign. Her medical history included thyroidectomy and hypercholesterolemia recently treated with simvastatin. Laboratory tests showed severe hypokalemia and hypocalcemia, severe increase in muscle enzymes, metabolic alkalosis; low plasma renin activity, increased thyroid-stimulating hormone, normal free thyroxine, increased parathyroid hormone, decreased vitamin D3; alterations in electrolyte urinary excretion, cortisol and aldosterone were excluded. Hypothesizing a statin-related myopathy, simvastatin was suspended; the patient reported use of laxatives containing licorice. Electrolytes normalized with intravenous supplementation. Among many biochemical alterations, none stands out as a major cause for muscular and electrolyte disorders. All co-factors are inter-connected, starting with statin-induced myopathy, worsened by hypothyroidism, secondary hyperaldosteronism and vitamin D deficiency, leading to hypocalcemia and hypokalemia, perpetrating muscular and electrolyte disorders. The importance of considering clinical conditions as a whole emerges with multiple co-factors involved. Another issue concerns herbal products and their potential dangerous effects.

  2. Solar Hidden Photon Search

    CERN Document Server

    Schwarz, Matthias; Redondo, Javier; Ringwald, Andreas; Wiedemann, Guenter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope.

  3. Solar Hidden Photon Search

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Max-Planck-Institut fuer Physik und Astrophysik, Muenchen (Germany)

    2011-11-15

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope. (orig.)

  4. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  5. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  6. Hidden variables and hidden time in quantum theory

    OpenAIRE

    Kurakin, Pavel V.

    2005-01-01

    Bell's theorem proves only that hidden variables evolving in true physical time can't exist; still the theorem's meaning is usually interpreted intolerably wide. The concept of hidden time (and, in general, hidden space-time) is introduced. Such concept provides a whole new class of physical theories, fully compatible with current knowledge, but giving new tremendous possibilities. Those theories do not violate Bell's theorem.

  7. Default-all is dangerous!

    CERN Document Server

    Gatterbauer, Wolfgang; Suciu, Dan

    2011-01-01

    We show that the default-all propagation scheme for database annotations is dangerous. Dangerous here means that it can propagate annotations to the query output which are semantically irrelevant to the query the user asked. This is the result of considering all relationally equivalent queries and returning the union of their where-provenance in an attempt to define a propagation scheme that is insensitive to query rewriting. We propose an alternative query-rewrite-insensitive (QRI) where-provenance called minimum propagation. It is analogous to the minimum witness basis for why-provenance, straight-forward to evaluate, and returns all relevant and only relevant annotations.

  8. The dangers of sports journalism

    DEFF Research Database (Denmark)

    Sparre, Kirsten

    2017-01-01

    According to The Committee to Protect Journalists, 2 per cent of all journalists killed since 1992 worked on the sports beat. However, at present there is little understanding of the specific dangers faced by sports journalists. This chapter presents findings from exploratory research on 78 repor...

  9. The dangers of sports journalism

    DEFF Research Database (Denmark)

    Sparre, Kirsten

    2017-01-01

    According to The Committee to Protect Journalists, 2 per cent of all journalists killed since 1992 worked on the sports beat. However, at present there is little understanding of the specific dangers faced by sports journalists. This chapter presents findings from exploratory research on 78 repor...

  10. Self/not self, innate immunity, danger, cancer potential

    Science.gov (United States)

    Cooper, Edwin L.

    2010-03-01

    Self/not self is an important hypothesis that has guided research in immunology. It is closely connected to adaptive immunity (restricted to vertebrates) and innate immunity (found in vertebrates and invertebrates). Self/not self is now being challenged and investigators are turning to the danger hypothesis to guide and open new areas of research. Emerging information suggests that genes involved in development of cancer are present in Drosophila and C. elegans. Short life span may not preclude the presence of genes that are related to the development of cancer.

  11. Danger of Antibiotic Overuse (For Parents)

    Science.gov (United States)

    ... Be Smart About Social Media The Danger of Antibiotic Overuse KidsHealth > For Parents > The Danger of Antibiotic ... by not reaching for the prescription pad. How Antibiotics Work Antibiotics, first used in the 1940s, are ...

  12. Dangerous Dogs, Constructivism and Normativity

    DEFF Research Database (Denmark)

    Hansen, Allan Dreyer

    2010-01-01

    This article argues that although there is no necessary link between constructivism and particular sets of norms, constructivism opens up a space for normativity and can be articulated through particular normative or political programs. I show how Laclau’s deconstructive constructivism can be art...... be articulated within the framework of an ethos of democratization. The article takes its empirical point of departure in debates over dangerous dogs....

  13. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  14. 29 CFR 1903.13 - Imminent danger.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 5 2010-07-01 2010-07-01 false Imminent danger. 1903.13 Section 1903.13 Labor Regulations... INSPECTIONS, CITATIONS AND PROPOSED PENALTIES § 1903.13 Imminent danger. Whenever and as soon as a Compliance... immediately or before the imminence of such danger can be eliminated through the enforcement...

  15. 30 CFR 56.12021 - Danger signs.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Danger signs. 56.12021 Section 56.12021 Mineral... HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES Electricity § 56.12021 Danger signs. Suitable danger signs shall be posted at all major electrical installations....

  16. 30 CFR 57.12021 - Danger signs.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Danger signs. 57.12021 Section 57.12021 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND... Underground § 57.12021 Danger signs. Suitable danger signs shall be posted at all major...

  17. Seasonal fire danger forecasts for the USA

    Science.gov (United States)

    J. Roads; F. Fujioka; S. Chen; R. Burgan

    2005-01-01

    The Scripps Experimental Climate Prediction Center has been making experimental, near-real-time, weekly to seasonal fire danger forecasts for the past 5 years. US fire danger forecasts and validations are based on standard indices from the National Fire Danger Rating System (DFDRS), which include the ignition component (IC), energy release component (ER), burning...

  18. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  19. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  20. Blocking Underhand Attacks by Hidden Coalitions (Extended Version)

    CERN Document Server

    Cristani, Matteo; Viganò, Luca

    2010-01-01

    Similar to what happens between humans in the real world, in open multi-agent systems distributed over the Internet, such as online social networks or wiki technologies, agents often form coalitions by agreeing to act as a whole in order to achieve certain common goals. However, agent coalitions are not always a desirable feature of a system, as malicious or corrupt agents may collaborate in order to subvert or attack the system. In this paper, we consider the problem of hidden coalitions, whose existence and the purposes they aim to achieve are not known to the system, and which carry out so-called underhand attacks. We give a first approach to hidden coalitions by introducing a deterministic method that blocks the actions of potentially dangerous agents, i.e. possibly belonging to such coalitions. We also give a non-deterministic version of this method that blocks the smallest set of potentially dangerous agents. We calculate the computational cost of our two blocking methods, and prove their soundness and ...

  1. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  2. Microgenetic analysis of hidden figures

    OpenAIRE

    Marković Slobodan S.; Gvozdenović Vasilije P.

    2006-01-01

    In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenes...

  3. The Hidden Subgroup Problem

    CERN Document Server

    Wang, Frédéric

    2010-01-01

    We give an overview of the Hidden Subgroup Problem (HSP) as of July 2010, including new results discovered since the survey of arXiv:quant-ph/0411037v1. We recall how the problem provides a framework for efficient quantum algorithms and present the standard methods based on coset sampling. We study the Dihedral and Symmetric HSPs and how they relate to hard problems on lattices and graphs. Finally, we conclude with the known solutions and techniques, describe connections with efficient algorithms as well as miscellaneous variants of HSP. We also bring various contributions to the topic. We show that in theory, we can solve HSP over a given group inductively: the base case is solving HSP over its simple factor groups and the inductive step is building efficient oracles over a normal subgroup N and over the factor group G/N. We apply this analysis to the Dedekindian HSP to get an alternative abelian HSP algorithm based on a change of the underlying group. We also propose a quotient reduction by the normal group...

  4. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs. In......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group.......This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  5. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs of offshor...... of our study is to suggest how hidden costs of offshoring can be mitigated through an explicit orientation towards improving organizational processes and structures as well as experience with offshoring.......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  6. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  7. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  8. The danger theory: 20 years later.

    Science.gov (United States)

    Pradeu, Thomas; Cooper, Edwin L

    2012-01-01

    The self-non-self theory has dominated immunology since the 1950s. In the 1990s, Matzinger and her colleagues suggested a new, competing theory, called the "danger theory." This theory has provoked mixed acclaim: enthusiasm and criticism. Here we assess the danger theory vis-à-vis recent experimental data on innate immunity, transplantation, cancers and tolerance to foreign entities, and try to elucidate more clearly whether danger is well defined.

  9. Meteoroids are Dangerous to Spacecraft

    Science.gov (United States)

    Moorhead, Althea V.

    2017-01-01

    Meteoroids put dents in Shuttle windows much like bouncing gravel puts dents in your car's windshield. However, meteoroids move at such high speeds that they can partly vaporize the surfaces they strike! A dust particle (smaller than a meteoroid) hit the STEREO spacecraft and produced this fountain of smaller particles. When a meteoroid breaks up, its "shrapnel" can also be dangerous. Even when meteoroids don't damage a spacecraft, they can cause problems. Here, a small meteoroid bumped a camera on the Lunar Reconnaissance Orbiter (LRO), causing wiggles in this scan of the lunar surface. Meteoroids and pieces of space junk create rough edges on the outside of the Space Station that can damage space suits. The astronauts' gloves had to be thickened to help prevent them from ripping.

  10. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  11. Hidden Variables or Positive Probabilities?

    CERN Document Server

    Rothman, T; Rothman, Tony

    2001-01-01

    Despite claims that Bell's inequalities are based on the Einstein locality condition, or equivalent, all derivations make an identical mathematical assumption: that local hidden-variable theories produce a set of positive-definite probabilities for detecting a particle with a given spin orientation. The standard argument is that because quantum mechanics assumes that particles are emitted in a superposition of states the theory cannot produce such a set of probabilities. We examine a paper by Eberhard who claims to show that a generalized Bell inequality, the CHSH inequality, can be derived solely on the basis of the locality condition, without recourse to hidden variables. We point out that he nonetheless assumes a set of positive-definite probabilities, which supports the claim that hidden variables or "locality" is not at issue here, positive-definite probabilities are. We demonstrate that quantum mechanics does predict a set of probabilities that violate the CHSH inequality; however these probabilities ar...

  12. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  13. Hidden symmetries in jammed systems

    Science.gov (United States)

    Morse, Peter K.; Corwin, Eric I.

    2016-07-01

    There are deep, but hidden, geometric structures within jammed systems, associated with hidden symmetries. These can be revealed by repeated transformations under which these structures lead to fixed points. These geometric structures can be found in the Voronoi tesselation of space defined by the packing. In this paper we examine two iterative processes: maximum inscribed sphere (MIS) inversion and a real-space coarsening scheme. Under repeated iterations of the MIS inversion process we find invariant systems in which every particle is equal to the maximum inscribed sphere within its Voronoi cell. Using a real-space coarsening scheme we reveal behavior in geometric order parameters which is length-scale invariant.

  14. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  15. Dangers of Texting While Driving

    Science.gov (United States)

    ... nhtsa.gov/risky-driving/distracted-driving . Print Out Texting While Driving Guide (pdf) File a Complaint with the FCC ... Office: Consumer and Governmental Affairs Tags: Consumers - Distracted Driving - Health and Safety - Texting Federal Communications Commission 445 12th Street SW, Washington, ...

  16. The accessory papillary muscle with inferior J-waves - peculiarity or hidden danger?

    Directory of Open Access Journals (Sweden)

    du Toit Lorraine

    2009-10-01

    Full Text Available Abstract Originally described in 1953, today the so-called J-wave is the source of much controversy. As a marker of so-called "early repolarization", this variant has been regarded as a totally benign variant since the 1960's. However, since then a wealth of data have indicated that the J-wave may be a marker of a highly arrhythmogenic substrate with a resultant high risk of sudden cardiac death. In this case report a case of an accessory papillary muscle with a prominent J-wave is described. This may be the first of many possible cases where papillary muscle variants may be the cause of the J-wave.

  17. Risk Management in Adventure Programs with Special Populations: Two Hidden Dangers.

    Science.gov (United States)

    Stich, Thomas F.; Gaylor, Michael S.

    1984-01-01

    Presents practical information about psychiatric medications and psychological emergencies to assist staff working in outdoor settings with mental health patients. Discusses the potential hazards and side effects of psychotropic drugs. Provides step-by-step guidelines for distinguishing between medical and psychological problems, assessing…

  18. Exploring knowledge transfer within manufacturing networks and codified information characteristics: the hidden dangers of inaccurate information

    NARCIS (Netherlands)

    Steenhuis, Harm-Jan; Bruijn, de Erik J.

    2004-01-01

    Technology transfer is an important aspect of, and takes frequently place in, international manufacturing networks. A key component of a specific technology is the knowledge and information that accompanies it. This study explores the difficulties with transferring technological knowledge and codifi

  19. Presence of phthalates in gastrointestinal medications: is there a hidden danger?

    Science.gov (United States)

    Gallinger, Zane R; Nguyen, Geoffrey C

    2013-11-01

    Pharmaceutical companies that produce gastrointestinal (GI) medications often utilize phthalates for their ability to localize medication release. Commonly prescribed GI medications that may utilize phthalates are 5-Aminosalicylates, proton pump inhibitors, and pancreatic enzymes. Our understanding of the cumulative health effects of phthalates from medications remains unclear, and there is increasing evidence that phthalates are not harmless. Experimental studies in animals have shown that phthalates, specifically dibutyl phthalate and Di-(2-ethyl-hexyl) phthalate, have the potential to alter and/or inhibit reproductive biology and in utero development. Despite the lack of definitive human data, many cohort and cross-sectional studies demonstrate concerning associations between phthalates and poor health status, specifically developmental problems. Longitudinal studies and studies with larger sample sizes are required to determine whether phthalates actually cause negative health consequences. It is also important that physicians regularly review and discuss with patients the medicinal ingredients in their medications and supplements, specifically in pregnant woman with inflammatory bowel disease.

  20. Keeping track of hidden dangers - The short history of the Sabiá virus

    Directory of Open Access Journals (Sweden)

    Joel Henrique Ellwanger

    Full Text Available Abstract Emerging infectious diseases are a global threat. In countries like Brazil, where biodiversity is high and public health conditions in terms of infrastructure and medical care are often precarious, emerging diseases are particularly worrisome. The lack of monitoring strategies to identify pathogens with the potential to cause outbreaks or epidemics is another problem in Brazil and other developing countries. In this article, we present the history of the Sabiá virus (SABV, a pathogen that was described in the 1990s in Brazil. Several aspects of the biology and ecology of the SABV remain unknown. The SABV has the potential to cause hemorrhagic fever in humans. To date, four cases of human infections have been reported worldwide; two were naturally acquired (both in Brazil, whereas the other two were linked to occupational exposure in the laboratory environment (one in Brazil and one in the USA. In this review, we summarize the basic biological and ecological characteristics of the SABV. This is the first work to gather all available data on the historical aspects involving the cases of SABV infection along with an update on its characteristic features.

  1. Distinct neural circuits underlie assessment of a diversity of natural dangers by American crows.

    Science.gov (United States)

    Cross, Donna J; Marzluff, John M; Palmquist, Ila; Minoshima, Satoshi; Shimizu, Toru; Miyaoka, Robert

    2013-08-22

    Social animals encountering natural dangers face decisions such as whether to freeze, flee or harass the threat. The American crow, Corvus brachyrhynchos, conspicuously mobs dangers. We used positron emission tomography to test the hypothesis that distinct neuronal substrates underlie the crow's consistent behavioural response to different dangers. We found that crows activated brain regions associated with attention and arousal (nucleus isthmo-opticus/locus coeruleus), and with motor response (arcopallium), as they fixed their gaze on a threat. However, despite this consistent behavioural and neural response, the sight of a person who previously captured the crow, a person holding a dead crow and a taxidermy-mounted hawk activated distinct forebrain regions (amygdala, hippocampus and portion of the caudal nidopallium, respectively). We suggest that aspects of mobbing behaviour are guided by unique neural circuits that respond to differences in mental processing-learning, memory formation and multisensory discrimination-required to appropriately nuance a risky behaviour to specific dangers.

  2. The Dangers of Educated Girls and Women

    Science.gov (United States)

    John, Vaughn M.

    2016-01-01

    Why do educated girls and women constitute a danger in some societies and for this face extreme danger in their educational endeavours? This article argues that historical and contemporary educational discrimination of girls and women is the hallmark of a violently patriarchal society, and this stubborn injustice is exacerbated under conditions of…

  3. Community Violent Crime Rates and School Danger.

    Science.gov (United States)

    Bowen, Gary L.; Van Dorn, Richard A.

    2002-01-01

    This study investigated the association between community violent crime rates and middle school students' (N=857) perceptions of school danger. Findings indicate that community crime rates are associated with male middle school students' reports of school danger but not female students' reports. Discusses community- and school-based prevention…

  4. Modeling Multiple Risks: Hidden Domain of Attraction

    CERN Document Server

    Mitra, Abhimanyu

    2011-01-01

    Hidden regular variation is a sub-model of multivariate regular variation and facilitates accurate estimation of joint tail probabilities. We generalize the model of hidden regular variation to what we call hidden domain of attraction. We exhibit examples that illustrate the need for a more general model and discuss detection and estimation techniques.

  5. Pentaquark states with hidden charm

    Science.gov (United States)

    Bijker, Roelof

    2017-07-01

    I develop an extension of the usual three-flavor quark model to four flavors (u, d, s and c), and discuss the classification of pentaquark states with hidden charm. This work is motivated by the recent observation of such states by the LHCb Collatoration at CERN.

  6. Microgenetic analysis of hidden figures

    Directory of Open Access Journals (Sweden)

    Marković Slobodan S.

    2006-01-01

    Full Text Available In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenesis of the perception of hidden figures was investigated. The primed matching paradigm and the same-different task were used. In each experiment two types of test figures were contrasted: the more frequent and the less frequent ones. There were two prime types: identical (equal to test figures and complex (the pattern with hidden test figures. The prime duration was varied, 50 ms and 400 ms. The main result indicates that in the case of complex priming the more frequent test figures were processed significantly faster than the less frequent ones in both prime duration conditions. These results suggest that the faster the processing of a figure, the more probable the perceptual generation of this figure.

  7. [Dangerous sharks in tropical seas].

    Science.gov (United States)

    Maslin, J; Menard, G; Drouin, C; Pollet, L

    2000-01-01

    Sightseeing travel in tropical zones is a growing industry. The risks incurred by travelers depend on the destination, duration of stay, individual behavior, and type of leisure activity. Water sports expose visitors to encounters with dangerous marine animals. Shark attacks are rare but always serious occurrences. Divers should handle any shark, regardless of size, with due precaution. Prevention of shark attack depends on avoiding encounters by not attracting the attention of the shark and knowing the proper attitude to adopt in case an encounter should occur. Active and passive protection can be used, but each method has advantages and disadvantages depending on the situation. Rescue operations are difficult due to the gravity of injuries and their occurrence in a marine environment. This along with the nature of the aggressor explain that many attacks are immediately fatal. Wounds are often deep with involvement of bone, blood vessels, and nerves. A possible source of complication in survivors is infection, which can involve uncommon microorganisms associated with bacteria in sharks mouth or marine environment.

  8. Predicting Danger: The Nature, Consequences, and Neural Mechanisms of Predictive Fear Learning

    Science.gov (United States)

    McNally, Gavan P.; Westbrook, R. Frederick

    2006-01-01

    The ability to detect and learn about the predictive relations existing between events in the world is essential for adaptive behavior. It allows us to use past events to predict the future and to adjust our behavior accordingly. Pavlovian fear conditioning allows anticipation of sources of danger in the environment. It guides attention away from…

  9. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  10. Nonintentional behavioural responses to psi : hidden targets and hidden observers

    OpenAIRE

    Anderson, Mary-Jane Charlotte

    2012-01-01

    Psi is the phenomenon of apparently responding to or receiving information by means other than the recognised senses. Psi information may influence human behaviour, without the individual intending this or even being aware of it. This thesis seeks to investigate nonintentional behavioural responses to psi. We present five empirical studies that investigated nonintentional behavioural responses to psi information. In each study, the psi information was hidden from participants, ...

  11. Dendritic Cells as Danger-Recognizing Biosensors

    Directory of Open Access Journals (Sweden)

    Seokmann Hong

    2009-08-01

    Full Text Available Dendritic cells (DCs are antigen presenting cells that are characterized by a potent capacity to initiate immune responses. DCs comprise several subsets with distinct phenotypes. After sensing any danger(s to the host via their innate immune receptors such as Toll-like receptors, DCs become mature and subsequently present antigens to CD4+ T cells. Since DCs possess the intrinsic capacity to polarize CD4+ helper cells, it is critical to understand the immunological roles of DCs for clinical applications. Here, we review the different DC subsets, their danger-sensing receptors and immunological functions. Furthermore, the cytokine reporter mouse model for studying DC activation is introduced.

  12. Modeling Driver Behavior near Intersections in Hidden Markov Model.

    Science.gov (United States)

    Li, Juan; He, Qinglian; Zhou, Hang; Guan, Yunlin; Dai, Wei

    2016-12-21

    Intersections are one of the major locations where safety is a big concern to drivers. Inappropriate driver behaviors in response to frequent changes when approaching intersections often lead to intersection-related crashes or collisions. Thus to better understand driver behaviors at intersections, especially in the dilemma zone, a Hidden Markov Model (HMM) is utilized in this study. With the discrete data processing, the observed dynamic data of vehicles are used for the inference of the Hidden Markov Model. The Baum-Welch (B-W) estimation algorithm is applied to calculate the vehicle state transition probability matrix and the observation probability matrix. When combined with the Forward algorithm, the most likely state of the driver can be obtained. Thus the model can be used to measure the stability and risk of driver behavior. It is found that drivers' behaviors in the dilemma zone are of lower stability and higher risk compared with those in other regions around intersections. In addition to the B-W estimation algorithm, the Viterbi Algorithm is utilized to predict the potential dangers of vehicles. The results can be applied to driving assistance systems to warn drivers to avoid possible accidents.

  13. Microbe- and danger-induced inflammation.

    Science.gov (United States)

    Broggi, Achille; Granucci, Francesca

    2015-02-01

    The ability of the immune system to give rise to an effective response against pathogens while maintaining tolerance towards self-tissues has always been an object of keen interest for immunologist. Over the years, different theories have been proposed to explain if and how the immune system is able to discriminate between self and non-self, including the Infectious Non-self theory from Charles Janeway and Polly Matzinger's Danger theory. Nowadays we know Janeway's theory is largely true, however the immune system does respond to injured, stressed and necrotic cells releasing danger signals (DAMPs) with a potent inflammatory response. To avoid unwanted prolonged autoimmune reactions, though, danger-induced inflammation should be tightly regulated. In the present review we discuss how prototypic DAMPs are able to induce inflammation and the peculiarity of danger-induced inflammation, as opposed to a complete immune response to fight pathogen invasions.

  14. (Neuro)predictions, Dangerousness, and Retributivism

    DEFF Research Database (Denmark)

    Petersen, Thomas Søbirk

    2014-01-01

    Through the criminal justice system so-called dangerous offenders are, besides the offence that they are being convicted of and sentenced to, also punished for acts that they have not done but that they are believe to be likely to commit in the future. The aim of this paper is to critically discuss...... whether some adherents of retributivism give a plausible rationale for punishing offenders more harshly if they, all else being equal, by means of predictions are believed to be more dangerous than other offenders. While consequentialism has no problem, at least in principle, with this use of predictions...... to be dangerous in the future more harshly than non-dangerous offenders. After having reconstructed their arguments in detail, it will be argued that both Duff's and Morse's attempts to give a retributivistic justification have several shortcomings....

  15. Inherent Dangers in Orogenital Sex During Pregnancy

    African Journals Online (AJOL)

    dangerous, causing even the death of the women. We carried out a search of ... KEY WORDS: Air embolism, cunnilingus, orogenital sex, pregnancy ... contained multiple case report. ... The average age of women was 20.2 years, and only one.

  16. Opioids and Alcohol a Dangerous Cocktail

    Science.gov (United States)

    ... taken opioids previously. Oxycodone, an ingredient in the brand-name drugs OxyContin and Percocet, is widely prescribed ... in the journal Anesthesiology . "We hope to increase awareness regarding the dangers of prescription opioids, the increased ...

  17. Xylitol and Your Dog: Danger, Paws Off

    Science.gov (United States)

    ... Devices Radiation-Emitting Products Vaccines, Blood & Biologics Animal & Veterinary Cosmetics Tobacco ... Foods Containing Xylitol Why is Xylitol Dangerous to Dogs, but Not People? Symptoms to Look For in Your Dog What Can ...

  18. Dangerous effects of methane gas in atmosphere

    OpenAIRE

    Mohajan, Haradhan

    2011-01-01

    This paper discusses the effects of methane gas which causes sever global warming in the atmosphere. Global warming becomes main issue in economics in the 21st century. Because global climate change becomes more dangerous and every nation realized that this is due to greenhouse gas emissions. Methane is dangerous greenhouse gas, since it is 21 times more global warming potential than carbon dioxide. All the nations talk about the reduction of only carbon dioxide and no nation stress on methan...

  19. Revealing pentimenti: the hidden history in a painting

    Science.gov (United States)

    Gooch, Amy A.

    2007-02-01

    Art conservators often explore X-ray images of paintings to help find pentimenti, the artist's revisions hidden beneath the painting's visible first surfaces. X-ray interpretation is difficult due to artifacts in the image, superimposed features from all paint layers, and because image intensity depends on both the paint layer thickness and each pigment's opacity. We present a robust user-guided method to suppress clutter, find visually significant differences between X-ray images and color photographs, and visualize them together. These tools allow domain experts as well as museum visitors to explore the artist's creative decisions that led to a masterpiece.

  20. Everyday calculus discovering the hidden math all around us

    CERN Document Server

    Fernandez, Oscar E

    2014-01-01

    Calculus. For some of us, the word conjures up memories of ten-pound textbooks and visions of tedious abstract equations. And yet, in reality, calculus is fun, accessible, and surrounds us everywhere we go. In Everyday Calculus, Oscar Fernandez shows us how to see the math in our coffee, on the highway, and even in the night sky. Fernandez uses our everyday experiences to skillfully reveal the hidden calculus behind a typical day's events. He guides us through how math naturally emerges from simple observations-how hot coffee cools down, for example-and in discussions of over fifty familia

  1. Is red the colour of danger? Testing an implicit red-danger association.

    Science.gov (United States)

    Pravossoudovitch, Karyn; Cury, Francois; Young, Steve G; Elliot, Andrew J

    2014-01-01

    Research using participant's self-reports has documented a link between red and danger. In this research, we used two different variants of a Stroop word evaluation task to test for the possibility of an implicit red-danger association using carefully controlled colour stimuli (equated on lightness and chroma). Experiment 1, using words as stimuli, yielded strong evidence of a link between red and danger, and weaker evidence of a green-safety association. Experiment 2, using symbols as stimuli, again yielded strong evidence of a link between red and danger; no green effects were observed. The findings were discussed in terms of the power and promise of red in signal communication.

  2. On quantum algorithms for noncommutative hidden subgroups

    Energy Technology Data Exchange (ETDEWEB)

    Ettinger, M. [Los Alamos National Lab., NM (United States); Hoeyer, P. [Odense Univ. (Denmark)

    1998-12-01

    Quantum algorithms for factoring and discrete logarithm have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the possibility of extending this general viewpoint to finding hidden subgroups of noncommutative groups. The authors present a quantum algorithm for the special case of dihedral groups which determines the hidden subgroup in a linear number of calls to the input function. They also explore the difficulties of developing an algorithm to process the data to explicitly calculate a generating set for the subgroup. A general framework for the noncommutative hidden subgroup problem is discussed and they indicate future research directions.

  3. Radiation danger of exclusion zone objects

    Energy Technology Data Exchange (ETDEWEB)

    Kholosha, V.I.; Proskura, N.I.; Ivanov, Yu.A.; Kazakov, S.V.; Arkhipov, A.N. [Ministry of Ukraine of Emergencies and Affairs of Population Protection from the Consequences of Chornobyl Catastrophe (Ukraine)

    2001-03-01

    The analysis of radiation danger of the Exclusion Zone objects was made. Here, the Zone is defined as the territory from which the population has been evacuated in 1986 owing to the Chernobyl accident and possible outflow of the contaminated substances out of the borders is potentially dangerous to the Ukraine. In the present work were analyzed such problems as sources of radiation danger in the Zone, ways of radionuclide migration out of the borders of the Zone in normal and emergency situations, the non-radiation (ecological) danger factors of the Zone objects, doses (individual and collective) from various sources and on separate ways of their formation, and the characteristics of radiation danger of the Zone objects. The conclusions are: (1) Radionuclide flows both from technologic and natural sources exceed those from Shelter objects, (2) Under emergency conditions, radionuclide flows and doze loading remain comparable with those from emergency sources, (3) To solve some management tasks in radiation situation, the basic works on the Shelter objects should be oriented to decrease probability of emergency occurrence and to reduce radiation influence (prevention wash-outs during high waters, fire-prevention measures in forests and strengthening of the control behind non-authorized use of objects in the Zone). (S. Ohno)

  4. DANGERS AND SAFETY MEASURES IN A MOUNTAIN

    Directory of Open Access Journals (Sweden)

    Jovica Petković

    2013-07-01

    Full Text Available Mountaineering and everything that is connected with it is a sport with con¬tro¬lled risk. Mountaineers, alpinists, climbers, cavers and all the others who visit and sojourn in mountains are faced with many risks and dangers, which are caused by na¬ture and also by their own mistakes. The dangers in the mountains, like dangers in any other environment, are mainly predictable, so it is best to deal with them with good esti¬mation, knowledge and skill. One has to be aware of his surroundings – the moun¬tain, to respect it and to know what is dangerous and how much it is dangerous at any moment. The organization of the mountaineering expeditions and leadership per¬haps re¬present the highest level of security control. To develop skills for organizing and lead¬ing a group means to ensure the safety of the entire group – to work pre¬ven¬ti¬ve¬ly at the level of the entire group, not only at the level of an individual. The success of the enti¬re group as well as safety depends on the organization and leadership.

  5. 33 CFR 334.1340 - Pacific Ocean, Hawaii; danger zones.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Pacific Ocean, Hawaii; danger... ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA REGULATIONS § 334.1340 Pacific Ocean, Hawaii; danger zones. (a) Danger zones—(1) Aerial bombing and strafing target surrounding Kaula...

  6. 33 CFR 62.29 - Isolated danger marks.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Isolated danger marks. 62.29... NAVIGATION UNITED STATES AIDS TO NAVIGATION SYSTEM The U.S. Aids to Navigation System § 62.29 Isolated danger marks. Isolated danger marks indicate an isolated danger which may be passed on all sides. As...

  7. 33 CFR 334.5 - Disestablishment of a danger zone.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Disestablishment of a danger zone..., DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA REGULATIONS § 334.5 Disestablishment of a danger zone. (a) Upon receipt of a request from any agency for the disestablishment of a danger zone, the...

  8. The danger signal S100B integrates pathogen- and danger-sensing pathways to restrain inflammation.

    Science.gov (United States)

    Sorci, Guglielmo; Giovannini, Gloria; Riuzzi, Francesca; Bonifazi, Pierluigi; Zelante, Teresa; Zagarella, Silvia; Bistoni, Francesco; Donato, Rosario; Romani, Luigina

    2011-03-01

    Humans inhale hundreds of Aspergillus conidia without adverse consequences. Powerful protective mechanisms may ensure prompt control of the pathogen and inflammation. Here we reveal a previously unknown mechanism by which the danger molecule S100B integrates pathogen- and danger-sensing pathways to restrain inflammation. Upon forming complexes with TLR2 ligands, S100B inhibited TLR2 via RAGE, through a paracrine epithelial cells/neutrophil circuit that restrained pathogen-induced inflammation. However, upon binding to nucleic acids, S100B activated intracellular TLRs eventually resolve danger-induced inflammation via transcriptional inhibition of S100B. Thus, the spatiotemporal regulation of TLRs and RAGE by S100B provides evidence for an evolving braking circuit in infection whereby an endogenous danger protects against pathogen-induced inflammation and a pathogen-sensing mechanism resolves danger-induced inflammation.

  9. The danger signal S100B integrates pathogen- and danger-sensing pathways to restrain inflammation.

    Directory of Open Access Journals (Sweden)

    Guglielmo Sorci

    2011-03-01

    Full Text Available Humans inhale hundreds of Aspergillus conidia without adverse consequences. Powerful protective mechanisms may ensure prompt control of the pathogen and inflammation. Here we reveal a previously unknown mechanism by which the danger molecule S100B integrates pathogen- and danger-sensing pathways to restrain inflammation. Upon forming complexes with TLR2 ligands, S100B inhibited TLR2 via RAGE, through a paracrine epithelial cells/neutrophil circuit that restrained pathogen-induced inflammation. However, upon binding to nucleic acids, S100B activated intracellular TLRs eventually resolve danger-induced inflammation via transcriptional inhibition of S100B. Thus, the spatiotemporal regulation of TLRs and RAGE by S100B provides evidence for an evolving braking circuit in infection whereby an endogenous danger protects against pathogen-induced inflammation and a pathogen-sensing mechanism resolves danger-induced inflammation.

  10. The danger model: questioning an unconvincing theory.

    Science.gov (United States)

    Józefowski, Szczepan

    2016-02-01

    Janeway's pattern recognition theory holds that the immune system detects infection through a limited number of the so-called pattern recognition receptors (PRRs). These receptors bind specific chemical compounds expressed by entire groups of related pathogens, but not by host cells (pathogen-associated molecular patterns (PAMPs). In contrast, Matzinger's danger hypothesis postulates that products released from stressed or damaged cells have a more important role in the activation of immune system than the recognition of nonself. These products, named by analogy to PAMPs as danger-associated molecular patterns (DAMPs), are proposed to act through the same receptors (PRRs) as PAMPs and, consequently, to stimulate largely similar responses. Herein, I review direct and indirect evidence that contradict the widely accepted danger theory, and suggest that it may be false.

  11. Dangerous arachnids-Fake news or reality?

    Science.gov (United States)

    Hauke, Tobias J; Herzig, Volker

    2017-09-01

    The public perception of spiders and scorpions is skewed towards the potential harm they can inflict in humans, despite recent scientific evidence that arachnid venom components might be useful as bioinsecticides or even human therapeutics. Nevertheless, arachnids are becoming more popular as pets in Europe, America and Asia, raising the question for regulatory agencies in these regions as to whether they need to take measurements to protect their citizens. In order to decide upon the necessary regulatory steps, they first need to determine which arachnids are actually dangerous to humans. This review therefore provides an overview of the current literature on verified bites and stings from spiders and scorpions with the aim of assessing their potential danger for human health. As a guideline, we also provide a list of those arachnid genera that we consider as potentially dangerous, which includes 10 spider and 11 scorpion genera. The arachnid genera classified as dangerous comprise less than a quarter of all extant scorpion species and only 0.5% of all spiders species, with the actual number most likely being much lower than that, as not all species in those genera might turn out to pose an actual threat for humans. In conclusion, we found that only a small percentage of scorpions and a minute percentage of all spiders can be considered as potentially dangerous to humans. While in some countries of origin the high incidence of envenomations by dangerous arachnids can result in a serious problem to the health system, we assessed the risk that the same species pose when kept as pets under controlled maintenance conditions as significantly lower. Copyright © 2017 Elsevier Ltd. All rights reserved.

  12. Cartographies of danger mapping hazards in America

    CERN Document Server

    Monmonier, Mark

    1997-01-01

    No place is perfectly safe, but some places are more dangerous than others. Whether we live on a floodplain or in ""Tornado Alley,"" near a nuclear facility or in a neighborhood poorly lit at night, we all co-exist uneasily with natural and man-made hazards. As Mark Monmonier shows in this entertaining and immensely informative book, maps can tell us a lot about where we can anticipate certain hazards, but they can also be dangerously misleading. California, for example, takes earthquakes seriously, with a comprehensive program of seismic mapping, whereas Washington has been comparatively lax

  13. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  14. Estimating an Activity Driven Hidden Markov Model

    OpenAIRE

    Meyer, David A.; Shakeel, Asif

    2015-01-01

    We define a Hidden Markov Model (HMM) in which each hidden state has time-dependent $\\textit{activity levels}$ that drive transitions and emissions, and show how to estimate its parameters. Our construction is motivated by the problem of inferring human mobility on sub-daily time scales from, for example, mobile phone records.

  15. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  16. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  17. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  18. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  19. Hidden Web信息获取

    Institute of Scientific and Technical Information of China (English)

    陈珂; 陈小英; 徐科

    2007-01-01

    如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词.由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面.然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值.文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息.

  20. Keep away from danger: Dangerous objects in dynamic and static situations

    Directory of Open Access Journals (Sweden)

    Filomena eAnelli

    2013-07-01

    Full Text Available Behavioral and neuroscience studies have shown that objects observation evokes specific affordances (i.e., action possibilities and motor responses. Recent findings provide evidence that even dangerous objects can modulate the motor system evoking aversive affordances. This sounds intriguing since so far the majority of behavioral, brain imaging, and transcranial magnetic stimulation studies with painful and dangerous stimuli strictly concerned the domain of pain, excepted for evidence suggesting sensitivity to objects’ affordances when neutral objects are located in participants’ peripersonal space. This study investigates whether the observation of a neutral or dangerous object in a static or dynamic situation differently influences motor responses, and the time-course of the dangerous objects’ processing. In three experiments we manipulated: object dangerousness (neutral vs. dangerous; object category (artifact vs. natural; manual response typology (press vs. release a key; object presentation (Experiment 1: dynamic, Experiments 2 and 3: static; object movement direction (Experiment 1: away vs. toward the participant or size (Experiments 2 and 3: big vs. normal vs. small. The task required participants to decide whether the object was an artifact or a natural object, by pressing or releasing one key. Results showed a facilitation for neutral over dangerous objects in the static situation, probably due to an affordance effect. Instead, in the dynamic condition responses were modulated by the object movement direction, with a dynamic affordance effect of neutral objects and an escape-avoidance effect of dangerous objects (neutral objects were processed faster when they moved toward-approached the participant, whereas dangerous objects were processed faster when they moved away from the participant. Moreover, static stimuli influenced the manual response typology. These data indicate the emergence of dynamic affordance and escaping

  1. Transport of dangerous goods through road tunnels

    DEFF Research Database (Denmark)

    Jørgensen, N O; Lacroix, Didier; Amundsen, F.H.;

    1999-01-01

    A paper which describes the work of an OECD research group. The group has suggested a grouping of dangerous materials, a quantitative risk assessment model and a decision support model which should allow tunnel operators to determine if a given material should be allowed throug a given tunnel...

  2. Securing the dangerous UN convoys in Mali

    DEFF Research Database (Denmark)

    Haugegaard, Rikke; Albrecht, Peter; Ravnkilde, Signe Cold

    2017-01-01

    It has proven particularly challenging for the UN stabilization mission in Mali (MINUSMA) to transport fuel, food and water to military camps in Sector North on the frontline of the mission. Convoy escorts drain the UN mission of resources and is one of its most dangerous tasks, mainly carried ou...

  3. Augustine on the Dangers of Friendship

    NARCIS (Netherlands)

    Nawar, Tamer

    2015-01-01

    The philosophers of antiquity had much to say about the place of friendship in the good life and its role in helping us live virtuously. Augustine is unusual in giving substantial attention to the dangers of friendship and its potential to serve as an obstacle (rather than an aid) to virtue. Despite

  4. Transhumanism: projections of opportunities, risks and dangers

    OpenAIRE

    Kindras, Natasha

    2013-01-01

    The experience of recent decades reveals a special changeability of various aspects of human existence. The nomadic movement in space «trans» is especially typical. Modern philosophical thought for these processes uses the term «transhumanism». The paper considers scientifically oriented outlook of transhumanism, analyzes the opportunities, risks and dangers of biotechnological transformation of human into posthuman.

  5. Honeybee communication: a signal for danger.

    Science.gov (United States)

    Srinivasan, Mandyam V

    2010-04-27

    Scout honeybees recruit other bees to visit a newly discovered food source through the famous 'waggle dance'. Now a new study reports that other nest mates can induce the dancer to stop advertising, if they have experienced danger at that location.

  6. knowledge about obstetric danger signs among preg

    African Journals Online (AJOL)

    user

    about knowledge level of pregnant women on obstetric danger signs. The objective of this ... deficiencies in awareness should be addressed through maternal and child health services by designing an appro- ..... demographic, cultural, and health interventions as well as ... Baby Package: Implementing Safe Motherhood.

  7. The dangers of non-empirical confirmation

    CERN Document Server

    Rovelli, Carlo

    2016-01-01

    In the book "String Theory and the Scientific Method", Richard Dawid describes a few of the many non-empirical arguments that motivate theoretical physicists' confidence in a theory, taking string theory as case study. I argue that excessive reliance on non-empirical evidence compromises the reliability of science, and that precisely the case of string theory well illustrates this danger.

  8. (Neuro)predictions, Dangerousness, and Retributivism

    DEFF Research Database (Denmark)

    Petersen, Thomas Søbirk

    2014-01-01

    Through the criminal justice system so-called dangerous offenders are, besides the offence that they are being convicted of and sentenced to, also punished for acts that they have not done but that they are believe to be likely to commit in the future. The aim of this paper is to critically discu...

  9. Guiding young adults at risk

    DEFF Research Database (Denmark)

    Andreasen, Karen Egedal; Rasmussen, Palle Damkjær; Ydesen, Christian

    2016-01-01

    Karen Egedal Andreasen, Palle Rasmussen and Christian Ydesen question in their article, how to guide youth in danger of being marginalised or excluded from society in general and the labour market in particular. They analyse the guidance dimension in the youth in development project as described ...

  10. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...

  11. Hidden scale in quantum mechanics

    CERN Document Server

    Giri, Pulak Ranjan

    2007-01-01

    We show that the intriguing localization of a free particle wave-packet is possible due to a hidden scale present in the system. Self-adjoint extensions (SAE) is responsible for introducing this scale in quantum mechanical models through the nontrivial boundary conditions. We discuss a couple of classically scale invariant free particle systems to illustrate the issue. In this context it has been shown that a free quantum particle moving on a full line may have localized wave-packet around the origin. As a generalization, it has also been shown that particles moving on a portion of a plane or on a portion of a three dimensional space can have unusual localized wave-packet.

  12. Foundational Forces & Hidden Variables in Technology Commercialization

    Science.gov (United States)

    Barnett, Brandon

    2011-03-01

    The science of physics seems vastly different from the process of technology commercialization. Physics strives to understand our world through the experimental deduction of immutable laws and dependent variables and the resulting macro-scale phenomenon. In comparison, the~goal of business is to make a profit by addressing the needs, preferences, and whims of individuals in a market. It may seem that this environment is too dynamic to identify all the hidden variables and deduct the foundational forces that impact a business's ability to commercialize innovative technologies. One example of a business ``force'' is found in the semiconductor industry. In 1965, Intel co-founder Gordon Moore predicted that the number of transistors incorporated in a chip will approximately double every 24 months. Known as Moore's Law, this prediction has become the guiding principle for the semiconductor industry for the last 40 years. Of course, Moore's Law is not really a law of nature; rather it is the result of efforts by Intel and the entire semiconductor industry. A closer examination suggests that there are foundational principles of business that underlie the macro-scale phenomenon of Moore's Law. Principles of profitability, incentive, and strategic alignment have resulted in a coordinated influx of resources that has driven technologies to market, increasing the profitability of the semiconductor industry and optimizing the fitness of its participants. New innovations in technology are subject to these same principles. So, in addition to traditional market forces, these often unrecognized forces and variables create challenges for new technology commercialization. In this talk, I will draw from ethnographic research, complex adaptive theory, and industry data to suggest a framework with which to think about new technology commercialization. Intel's bio-silicon initiative provides a case study.

  13. Hidden torsion, 3-manifolds, and homology cobordism

    CERN Document Server

    Cha, Jae Choon

    2011-01-01

    This paper continues our exploration of homology cobordism of 3-manifolds using our recent results on Cheeger-Gromov rho-invariants associated to amenable representations. We introduce a new type of torsion in 3-manifold groups we call hidden torsion, and an algebraic approximation we call local hidden torsion. We construct infinitely many hyperbolic 3-manifolds which have local hidden torsion in the transfinite lower central subgroup. By realizing Cheeger-Gromov invariants over amenable groups, we show that our hyperbolic 3-manifolds are not pairwise homology cobordant, yet remain indistinguishable by any prior known homology cobordism invariants.

  14. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  15. Visible Effects of Invisible Hidden Valley Radiation

    CERN Document Server

    Carloni, Lisa

    2010-01-01

    Assuming there is a new gauge group in a Hidden Valley, and a new type of radiation, can we observe it through its effect on the kinematic distributions of recoiling visible particles? Specifically, what are the collider signatures of radiation in a hidden sector? We address these questions using a generic SU(N)-like Hidden Valley model that we implement in Pythia. We find that in both the e+e- and the LHC cases the kinematic distributions of the visible particles can be significantly affected by the valley radiation. Without a proper understanding of such effects, inferred masses of "communicators" and of invisible particles can be substantially off.

  16. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  17. A New Roadway Danger: Drivers Chasing 'Pokemon Go'

    Science.gov (United States)

    ... gov/news/fullstory_161005.html A New Roadway Danger: Drivers Chasing 'Pokemon Go' At least 14 crashes ... it remains imperative for people to understand the dangers of driving with that level of distraction. "This ...

  18. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  19. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  20. Faddeev-Jackiw approach to hidden symmetries

    CERN Document Server

    Wotzasek, C

    1994-01-01

    The study of hidden symmetries within Dirac's formalism does not possess a systematic procedure due to the lack of first-class constraints to act as symmetry generators. On the other hand, in the Faddeev-Jackiw approach, gauge and reparametrization symmetries are generated by the null eigenvectors of the sympletic matrix and not by constraints, suggesting the possibility of dealing systematically with hidden symmetries through this formalism. It is shown in this paper that indeed hidden symmetries of noninvariant or gauge fixed systems are equally well described by null eigenvectors of the sympletic matrix, just as the explicit invariances. The Faddeev-Jackiw approach therefore provide a systematic algorithm for treating all sorts of symmetries in an unified way. This technique is illustrated here by the SL(2,R) Kac-Moody current algebra of the 2-D induced gravity proposed by Polyakov, which is a hidden symmetry in the canonical approach of constrained systems via Dirac's method, after conformal and reparamet...

  1. Fibroid Tumors in Women: A Hidden Epidemic?

    Science.gov (United States)

    ... Issue Past Issues Fibroid Tumors in Women: A Hidden Epidemic? Past Issues / Spring 2007 Table of Contents ... fibroids@rics.bwh.harvard.edu , or visit our Web site: www.fibroids.net . You may also write ...

  2. Hidden Regular Variation: Detection and Estimation

    CERN Document Server

    Mitra, Abhimanyu

    2010-01-01

    Hidden regular variation defines a subfamily of distributions satisfying multivariate regular variation on $\\mathbb{E} = [0, \\infty]^d \\backslash \\{(0,0, ..., 0) \\} $ and models another regular variation on the sub-cone $\\mathbb{E}^{(2)} = \\mathbb{E} \\backslash \\cup_{i=1}^d \\mathbb{L}_i$, where $\\mathbb{L}_i$ is the $i$-th axis. We extend the concept of hidden regular variation to sub-cones of $\\mathbb{E}^{(2)}$ as well. We suggest a procedure of detecting the presence of hidden regular variation, and if it exists, propose a method of estimating the limit measure exploiting its semi-parametric structure. We exhibit examples where hidden regular variation yields better estimates of probabilities of risk sets.

  3. Geophysical Investigations at Hidden Dam, Raymond, California Flow Simulations

    Science.gov (United States)

    Minsley, Burke J.; Ikard, Scott

    2010-01-01

    Numerical flow modeling and analysis of observation-well data at Hidden Dam are carried out to supplement recent geophysical field investigations at the site (Minsley and others, 2010). This work also is complementary to earlier seepage-related studies at Hidden Dam documented by Cedergren (1980a, b). Known seepage areas on the northwest right abutment area of the downstream side of the dam was documented by Cedergren (1980a, b). Subsequent to the 1980 seepage study, a drainage blanket with a sub-drain system was installed to mitigate downstream seepage. Flow net analysis provided by Cedergren (1980a, b) suggests that the primary seepage mechanism involves flow through the dam foundation due to normal reservoir pool elevations, which results in upflow that intersects the ground surface in several areas on the downstream side of the dam. In addition to the reservoir pool elevations and downstream surface topography, flow is also controlled by the existing foundation geology as well as the presence or absence of a horizontal drain in the downstream portion of the dam. The current modeling study is aimed at quantifying how variability in dam and foundation hydrologic properties influences seepage as a function of reservoir stage. Flow modeling is implemented using the COMSOL Multiphysics software package, which solves the partially saturated flow equations in a two-dimensional (2D) cross-section of Hidden Dam that also incorporates true downstream topography. Use of the COMSOL software package provides a more quantitative approach than the flow net analysis by Cedergren (1980a, b), and allows for rapid evaluation of the influence of various parameters such as reservoir level, dam structure and geometry, and hydrogeologic properties of the dam and foundation materials. Historical observation-well data are used to help validate the flow simulations by comparing observed and predicted water levels for a range of reservoir elevations. The flow models are guided by, and

  4. Hidden figures are ever present.

    Science.gov (United States)

    Mens, L H; Leeuwenberg, E L

    1988-11-01

    Preference judgments about alternative interpretations of unambiguous patterns can be explained in terms of a rivalry between a preferred and a second-best interpretation (cf. Leeuwenberg & Buffart, 1983). We tested whether this second-best interpretation corresponds to a suppressed but concurrently present interpretation or whether it merely reflects an alternative view that happens to be preferred less often. Two patterns were present immediately following each other with a very short onset asynchrony: a complete pattern and one out of three possible subpatterns of it, corresponding to the best, the second best, or an odd interpretation of the complete pattern. Subjects indicated which subpattern was presented by choosing among the three subpatterns shown after each trial. The scores, corrected for response-bias effects, indicated a relative facilitation of the second-best interpretation, in agreement with its predicted "hidden" presence. This result is more in line with theories that capitalize on the quality of the finally selected representation than with processing models aimed at reaching one single solution as fast and as economically as possible.

  5. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  6. Hidden local symmetry and beyond

    Science.gov (United States)

    Yamawaki, Koichi

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here, I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H = SU(2)L × SU(2)R/SU(2)V with additional symmetry, the nonlinearly-realized scale symmetry. Then, the SM does have a dynamical gauge boson of the SU(2)V HLS, "SM ρ meson", in addition to the Higgs as a pseudo-dilaton as well as the NG bosons to be absorbed in to the W and Z. Based on the recent work done with Matsuzaki and Ohki, I discuss a novel possibility that the SM ρ meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "dark SM skyrmion (DSMS)".

  7. Constraining solar hidden photons using HPGe detector

    Energy Technology Data Exchange (ETDEWEB)

    Horvat, R.; Kekez, D., E-mail: Dalibor.Kekez@irb.hr; Krčmar, M.; Krečak, Z.; Ljubičić, A.

    2013-04-25

    In this Letter we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory. With our experimental setup we observe the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, entails both photon into hidden state oscillations and a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in Sun's interior as well as in the detector. We exclude hidden photons with kinetic couplings χ>(2.2×10{sup −13}–3×10{sup −7}) in the mass region 0.2 eV≲m{sub γ{sup ′}}≲30 keV. Our constraints on the mixing parameter χ in the mass region from 20 eV up to 15 keV prove even slightly better then those obtained recently by using data from the CAST experiment, albeit still somewhat weaker than those obtained from solar and HB stars lifetime arguments.

  8. 30 CFR 77.511 - Danger signs at electrical installations.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Danger signs at electrical installations. 77... UNDERGROUND COAL MINES Electrical Equipment-General § 77.511 Danger signs at electrical installations. Suitable danger signs shall be posted at all major electrical installations....

  9. NCEP-ECPC monthly to seasonal US fire danger forecasts

    Science.gov (United States)

    J. Roads; P. Tripp; H. Juang; J. Wang; F. Fujioka; S. Chen

    2010-01-01

    Five National Fire Danger Rating System indices (including the Ignition Component, Energy Release Component, Burning Index, Spread Component, and the Keetch–Byram Drought Index) and the Fosberg Fire Weather Index are used to characterise US fire danger. These fire danger indices and input meteorological variables, including temperature, relative humidity, precipitation...

  10. Affective and Emotional Performances of Danger on Tours

    NARCIS (Netherlands)

    Buda, Dorina; van Hoven, Bettina

    2014-01-01

    In this paper we discuss how danger is affectively and emotionally experienced and performed in different tourism contexts. We draw on Brian Massumi’s work on affect as intensity to show how danger is experienced and outlived to tell the story. The exact origin of danger is not the most important, t

  11. Leadership Aspects of Hidden Curriculum Students Practice in Nigerian Universities: A Preview of Students' Union Government Contributions in University Governance

    Science.gov (United States)

    Emesini, Nnenna Orieoma

    2016-01-01

    The paper examined the leadership aspect of Hidden Curriculum that students practice in Nigerian Universities and their contributions to university governance. Four research questions guided the study and Ex-Post-Facto Method was adopted as the design. Unstructured interviews with staff/students officials cum critical analysis of Students' Union…

  12. Prediction of super-heavy N{sup Low-Asterisk} and {Lambda}{sup Low-Asterisk} resonances with hidden beauty

    Energy Technology Data Exchange (ETDEWEB)

    Wu Jiajun, E-mail: wujiajun@ihep.ac.cn [Institute of High Energy Physics, CAS, P.O. Box 918(4), Beijing 100049 (China); Zhao Lu [Institute of High Energy Physics, CAS, P.O. Box 918(4), Beijing 100049 (China); Zou, B.S. [Institute of High Energy Physics, CAS, P.O. Box 918(4), Beijing 100049 (China); Theoretical Physics Center for Science Facilities, CAS, Beijing 100049 (China)

    2012-03-13

    The meson-baryon coupled channel unitary approach with the local hidden gauge formalism is extended to the hidden beauty sector. A few narrow N{sup Low-Asterisk} and {Lambda}{sup Low-Asterisk} resonances around 11 GeV are predicted as dynamically generated states from the interactions of heavy beauty mesons and baryons. Production cross sections of these predicted resonances in pp and ep collisions are estimated as a guide for the possible experimental search at relevant facilities.

  13. The hidden crime: human trafficking.

    Science.gov (United States)

    Clause, Kristen J; Lawler, Kate Byrnes

    2013-01-01

    As the primary contact in the health care system, nurses can play a role in combating this crime and assisting the victims. Assessment for abuse, neglect, trauma, recurrent sexually transmitted infections (STIs) and fear of a controlling partner is critical. Following up on "red flags" and understanding methods of safe questioning can make the difference between slavery and recovery for victims. Nurses must also know the professional referrals in their areas once a potential victim has been identified. This may be a very dangerous undertaking and must be handled by experienced personnel. Referrals to forensic nurses or physicians, domestic violence professionals or law enforcement may be indicated. Initially, a nurse may want to consult with the agency social worker for guidance. Human trafficking is a human rights crime. Unfortunately, it is more prevalent in all types of communities than most people suspect. Nurses can be heroes to the victims through understanding of this crime and vigilance in the assessment and care of all people they encounter in their practices.

  14. The hidden crime: human trafficking.

    Science.gov (United States)

    Clause, Kristen J; Lawler, Kate Byrnes

    2013-01-01

    As the primary contact in the health care system, nurses can play a role in combating this crime and assisting the victims. Assessment for abuse, neglect, trauma, recurrent sexually transmitted infections (STIs) and fear of a controlling partner is critical. Following up on "red flags" and understanding methods of safe questioning can make the difference between slavery and recovery for victims. Nurses must also know the professional referrals in their areas once a potential victim has been identified. This may be a very dangerous undertaking and must be handled by experienced personnel. Referrals to forensic nurses or physicians, domestic violence professionals or law enforcement may be indicated. Initially, a nurse may want to consult with the agency social worker for guidance. Human trafficking is a human rights crime. Unfortunately, it is more prevalent in all types of communities than most people suspect. Nurses can be heroes to the victims through understanding of this crime and vigilance in the assessment and care of all people they encounter in their practices. To learn more or to help with this cause, visit the Somaly Mam Foundation at www.somaly.org or the U.S. Department of State at www. state.gov.

  15. Assessing the Danger: Validation of Taiwan Intimate Partner Violence Danger Assessment.

    Science.gov (United States)

    Wang, Pei-ling

    2015-09-01

    The Taiwan Intimate Partner Violence Danger Assessment (TIPVDA) is an IPV risk assessment instrument developed to assist front-line professionals with assessing victim's likelihood of experiencing lethal danger, and is also used to identify intervention strategies. The validation of TIPVDA with an independent sample of 543 female IPV victims in a program was examined in this study. The analysis results revealed the discriminant power of the TIPVDA. In addition, the area under the curve for the receiver operating characteristic curve analysis was strongly supportive of predictive effects of the TIPVDA. And the findings suggest that the TIPVDA had stronger predictive power for high dangerousness. Implications for future research and utilization of the TIPVDA are discussed.

  16. Comparisons and Assessment of Forest Fire Danger Systems

    Institute of Scientific and Technical Information of China (English)

    Tian Xiao-rui; Douglas J Mcrae; Den Boychuk; Jin Ji-zhong; Gao Cheng-da; Shu Li-fu; Wang Ming-yu

    2005-01-01

    The paper gives a brief description about the current main forest fire danger rating systems in the world, which include forest fire danger rating system used in Canada, USA, Australia, and other countries. It shows the composition, structure and development of the main fire danger rating systems. The limitations of those systems are also discussed. Through a comparison of the three main forest fire danger rating systems the paper describes their differences on development, fuel complex descriptions, inputs and outputs, and their applications and finds that the technologies of the Canadian forest fire danger rating system can be adopted for China to develop a national forest fire danger rating system. Two steps are needed to develop our own national forest fire danger rating system. Firstly, we apply the CFFDRS directly. Then some studies should be done to calibrate the FDRS to local weather and fuel characteristics.

  17. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  18. The acquisition of dangerous biological materials :

    Energy Technology Data Exchange (ETDEWEB)

    Aceto, Donato Gonzalo; Astuto-Gribble, Lisa M.; Gaudioso, Jennifer M.

    2007-11-01

    Numerous terrorist organizations have openly expressed interest in producing and deploying biological weapons. However, a limiting factor for many terrorists has been the acquisition of dangerous biological agents, as evidenced by the very few successful instances of biological weapons use compared to the number of documented hoaxes. Biological agents vary greatly in their ability to cause loss of life and economic damage. Some agents, if released properly, can kill many people and cause an extensive number of secondary infections; other agents will sicken only a small number of people for a short period of time. Consequently, several biological agents can potentially be used to perpetrate a bioterrorism attack but few are likely capable of causing a high consequence event. It is crucial, from a US national security perspective, to more deeply understand the likelihood that terrorist organizations can acquire the range of these agents. Few studies have attempted to comprehensively compile the technical information directly relevant to the acquisition of dangerous bacteria, viruses and toxins. In this report, technical fact sheets were assembled for 46 potentially dangerous biological agents. Much of the information was taken from various research sources which could ultimately and significantly expedite and improve bioterrorism threat assessments. By systematically examining a number of specific agent characteristics included in these fact sheets, it may be possible to detect, target, and implement measures to thwart future terrorist acquisition attempts. In addition, the information in these fact sheets may be used as a tool to help laboratories gain a rudimentary understanding of how attractive a method laboratory theft is relative to other potential acquisition modes.

  19. Dangerous situations in a synchronized flow model

    Science.gov (United States)

    Jiang, Rui; Wu, Qing-Song

    2007-04-01

    This paper studies the dangerous situation (DS) in a synchronized flow model. The DS on the two branches of the fundamental diagram are investigated, respectively. It is shown that different relationship between DS probability and the density exists in the synchronized flow and in the jams. Moreover, we prove that there is no DS caused by non-stopped car although the model itself is a non-exclusion process. We classify the DS into four sub-types and study the probability of these four sub-types. The simulation result is consistent with the real traffic.

  20. Russian vaccines against especially dangerous bacterial pathogens

    Science.gov (United States)

    Feodorova, Valentina A; Sayapina, Lidiya V; Corbel, Michael J; Motin, Vladimir L

    2014-01-01

    In response to the epidemiological situation, live attenuated or killed vaccines against anthrax, brucellosis, cholera, glanders, plague and tularemia were developed and used for immunization of at-risk populations in the Former Soviet Union. Certain of these vaccines have been updated and currently they are used on a selective basis, mainly for high risk occupations, in the Russian Federation. Except for anthrax and cholera these vaccines currently are the only licensed products available for protection against the most dangerous bacterial pathogens. Development of improved formulations and new products is ongoing. PMID:26038506

  1. A dangerous movie? Hollywood does psychoanalysis.

    Science.gov (United States)

    Ferrell, Donald R; Silverman, Martin A

    2014-12-01

    After the appearance of David Cronenberg's film A Dangerous Method in 2011, dealing with the relationships of Sigmund Freud, C. G. Jung and Sabina Spielrein, Dr. Donald Ferrell published: A Dangerous Method, A Film Directed by David Cronenberg: An Extended Review (Ferrell 2012) in the Journal of Religion and Health. Upon its publication, Dr. Ferrell's article was nominated for a Gradiva Award by the National Association for the Advancement of Psychoanalysis. On November 1, 2013, the Association for the Psychoanalysis of Culture and Society held its annual conference at Rutgers University, New Brunswick, NJ. Dr. Billie Pivnick, a member at large of the Board of Directors of the APCS and also on the Editorial Board of the Journal of Religion and Health, persuaded the 2013 Conference Program Committee that Cronenberg's film would make an interesting subject for discussion for conference participants. To that end, Dr. Pivnick invited Dr. Ferrell, C. G. Jung Institute of New York, Dr. Steven Reisner, Coalition for an Ethical Psychology, and Dr. Martin Silverman, Training and Supervising Analyst and Supervising Child Analyst at the Institute for Psychoanalytic Education, NYU College of Medicine, Training and Supervising Analyst at the Center for Psychotherapy and Psychoanalysis of New Jersey, and Associate Editor of The Psychoanalytic Quarterly to serve as panel members to discuss: A Dangerous Movie? Hollywood does Psychoanalysis. Presentations on Cronenberg's film and the early history of psychoanalysis were given by Drs. Ferrell and Reisner, followed by a response to their presentations by Dr. Silverman. Dr. Pivnick chaired the session. The articles presented here were given originally at the APCS conference by Dr. Ferrell and Dr. Silverman. Dr. Reisner declined the invitation to submit his presentation for publication. Dr. Silverman's remarks were based not only on the presentation given by Dr. Ferrell at the session on A Dangerous Movie?, but also on his close and

  2. Oil pollution dangers on the German coast

    Energy Technology Data Exchange (ETDEWEB)

    Vauk, G.

    1984-03-01

    Helgoland waters in the German Bight are a vital wintering area for seabirds. As long as the discharge of waste oil and oily water is not completely avoided, large amounts of oil will continuously get into the sea. Therefore, the danger to the marine life, especially seabirds, increases. Helgoland presents the possibility of determining the extent and the effect of the oil pollution of the North Sea, since it is placed in the point of intersection of important steamship routes and also oil slicks drifted by the north-west winds along the German Bight. Seabirds are indicators for the quantity, the type and the temporal distribution of oil.

  3. [Mental disorders and dangerous acting out].

    Science.gov (United States)

    Bouchard, Jean-Pierre

    2015-01-01

    The major mental disorders which are most likely to lead to dangerous acting out are adult psychoses (schizophrenia and paranoia) and severe mood disorders (major depressive episodes and mania). Good knowledge of the symptomatology of these pathologies and their identification can help to anticipate and prevent much of the violence which people with these disorders may inflict on others or themselves. After mental assessment, those who commit wrongful and criminal acts may be ruled to be criminally irresponsible. They are then handed over to the relevant health care authorities for treatment for their mental disorders.

  4. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  5. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  6. Probing Hidden Sector Photons through the Higgs Window.

    OpenAIRE

    Ahlers, M.; Jaeckel, J; Redondo, J.; Ringwald, A.

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light...

  7. [The dangers of blue light: True story!].

    Science.gov (United States)

    Renard, G; Leid, J

    2016-05-01

    The dangers of the blue light are the object of numerous publications, for both the scientific community and the general public. The new prolific development of light sources emitting potentially toxic blue light (415-455nm) ranges from LED (Light Emitting Diodes) lamps for interior lighting to television screens, computers, digital tablets and smartphones using OLED (Organic Light Emitting Diode) or AMOLED (Active-Matrix Organic Light Emitting Diode) technology. First we will review some technical terms and the main characteristics of light perceived by the human eye. Then we will discuss scientific proof of the toxicity of blue light to the eye, which may cause cataract or macular degeneration. Analysis of the light spectra of several light sources, from natural light to LED lamps, will allow us to specify even better the dangers related to each light source. LED lamps, whether used as components for interior lighting or screens, are of concern if they are used for extended viewing times and at short distance. While we can protect ourselves from natural blue light by wearing colored glasses which filter out, on both front and back surfaces, the toxic wavelengths, it is more difficult to protect oneself from LED lamps in internal lighting, the use of which should be restricted to "white warmth" lamps (2700K). As far as OLED or AMOLED screens are concerned, the only effective protection consists of using them occasionally and only for a short period of time. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  8. Boys Live Dangerously in the Womb

    Science.gov (United States)

    ERIKSSON, JOHAN G.; KAJANTIE, EERO; OSMOND, CLIVE; THORNBURG, KENT; BARKER, DAVID J.P.

    2012-01-01

    The growth of every human fetus is constrained by the limited capacity of the mother and placenta to deliver nutrients to it. At birth, boys tend to be longer than girls at any placental weight. Boy’s placentas may therefore be more efficient than girls, but may have less reserve capacity. In the womb boys grow faster than girls and are therefore at greater risk of becoming undernourished. Fetal undernutrition leads to small size at birth and cardiovascular disorders, including hypertension, in later life. We studied 2003 men and women aged around 62 years who were born in Helsinki, Finland, of whom 644 had hypertension: we examined their body and placental size at birth. In both sexes, hypertension was associated with low birth weight. In men, hypertension was also associated with a long minor diameter of the placental surface. The dangerous growth strategy of boys may be compounded by the costs of compensatory placental enlargement in late gestation. In women, hypertension was associated with a small placental area, which may reduce nutrient delivery to the fetus. In men, hypertension was linked to the mothers’ socioeconomic status, an indicator of their diets: in women it was linked to the mothers’ heights, an indicator of their protein metabolism. Boys’ greater dependence on their mothers’ diets may enable them to capitalize on an improving food supply, but it makes them vulnerable to food shortages. The ultimate manifestation of their dangerous strategies may be that men have higher blood pressures and shorter lives than women. PMID:19844898

  9. [Dangerous comics--only a fantasy?].

    Science.gov (United States)

    Hammon, C P

    1992-01-01

    Both superhero comics and fairy tales are equally popular with children: they create fantasy worlds full of violence and dangers which the hero must overcome. The question is raised whether the criticism of prevailing violence and a lack of realism can be rejected not only when considering fairy tales but also in the case of comics. The comparison of the two genres leads to the following results: Comics with their regressive pull and their independent superhuman heroes represent the archaic world of narcissism unconscious, unwilling to develop and conservative. Violence serves to maintain the original state or regain a harmonious "paradise". However, the rich world of symbols is also the creative source of our existence to which we keep returning--whether in dreams or in other fields of imagination. As works of literature, fairy tales seem to be more progressive and concerned with solutions. In the main, they support the development of the self. Violence is used to overthrow the old order and usher in the new. The aggression results in overcoming the unconscious. The image of the fairy tale hero corresponds to the child's view of the world. He does not seek narcissistic solitude and greatness but the companionship of prince or princess. A progressive and optimistic view of the future as well as a more conservative and retrospective tendency are part of human nature. For children, however, problems of development take precedence. Thus superhero comics are only dangerous for severely disturbed children, but fairy tales are certainly more beneficial.

  10. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  11. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  12. Hidden simplicity of gauge theory amplitudes

    Science.gov (United States)

    Drummond, J. M.

    2010-11-01

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in \\ {N}=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  13. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...

  14. Dark Radiation from a hidden U(1)

    CERN Document Server

    Vogel, Hendrik

    2015-01-01

    We discuss the impact of a hidden sector consisting of Minicharged Particles (MCPs) and massless hidden photons on the expansion history of our Universe. We present parameter scans for the amount of extra relativistic particles (Neff) and the abundance of light nuclei for fermionic MCPs with masses between ~100 keV and 10 GeV and minicharges in the range 10^(-11)-1. Current CMB and BBN data significantly constrain the available parameter space of MCPs. The shown results are a valuable indicator for future experimental searches and are presented in a flexible way so that more accurate results on Neff can be easily interpreted.

  15. Hidden Symmetries, Central Charges and All That

    CERN Document Server

    de Wit, Bernard; Wit, Bernard de; Nicolai, Hermann

    2001-01-01

    In this review we discuss hidden symmetries of toroidal compactifications of eleven-dimensional supergravity. We recall alternative versions of this theory which exhibit traces of the hidden symmetries when still retaining the massive Kaluza-Klein states. We reconsider them in the broader perspective of M-theory which incorporates a more extended variety of BPS states. We also argue for a new geometry that may underly these theories. All our arguments point towards an extension of the number of space-time coordinates beyond eleven.

  16. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  17. Metabolic features of the cell danger response.

    Science.gov (United States)

    Naviaux, Robert K

    2014-05-01

    The cell danger response (CDR) is the evolutionarily conserved metabolic response that protects cells and hosts from harm. It is triggered by encounters with chemical, physical, or biological threats that exceed the cellular capacity for homeostasis. The resulting metabolic mismatch between available resources and functional capacity produces a cascade of changes in cellular electron flow, oxygen consumption, redox, membrane fluidity, lipid dynamics, bioenergetics, carbon and sulfur resource allocation, protein folding and aggregation, vitamin availability, metal homeostasis, indole, pterin, 1-carbon and polyamine metabolism, and polymer formation. The first wave of danger signals consists of the release of metabolic intermediates like ATP and ADP, Krebs cycle intermediates, oxygen, and reactive oxygen species (ROS), and is sustained by purinergic signaling. After the danger has been eliminated or neutralized, a choreographed sequence of anti-inflammatory and regenerative pathways is activated to reverse the CDR and to heal. When the CDR persists abnormally, whole body metabolism and the gut microbiome are disturbed, the collective performance of multiple organ systems is impaired, behavior is changed, and chronic disease results. Metabolic memory of past stress encounters is stored in the form of altered mitochondrial and cellular macromolecule content, resulting in an increase in functional reserve capacity through a process known as mitocellular hormesis. The systemic form of the CDR, and its magnified form, the purinergic life-threat response (PLTR), are under direct control by ancient pathways in the brain that are ultimately coordinated by centers in the brainstem. Chemosensory integration of whole body metabolism occurs in the brainstem and is a prerequisite for normal brain, motor, vestibular, sensory, social, and speech development. An understanding of the CDR permits us to reframe old concepts of pathogenesis for a broad array of chronic, developmental

  18. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2015-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  19. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  20. The Corporate Illiterates: The Hidden Illiterates of Silicon Valley.

    Science.gov (United States)

    Chase, Sharon

    1991-01-01

    Describes the writing and business communication problems of college-educated workers in Silicon Valley. Discusses hidden illiterates in the universities and in the workplace. Offers solutions for professors and managers faced with the problem of hidden illiterates. (PRA)

  1. Modelling avalanche danger and understanding snow depth variability

    OpenAIRE

    2010-01-01

    This thesis addresses the causes of avalanche danger at a regional scale. Modelled snow stratigraphy variables were linked to [1] forecasted avalanche danger and [2] observed snowpack stability. Spatial variability of snowpack parameters in a region is an additional important factor that influences the avalanche danger. Snow depth and its change during individual snow fall periods are snowpack parameters which can be measured at a high spatial resolution. Hence, the spatial distribution of sn...

  2. The danger of misunderstanding ‘culture’

    Directory of Open Access Journals (Sweden)

    Keller, E.

    2009-12-01

    Full Text Available Most conservationists working in Madagascar recognise thatif conservation goals are to be achieved, conservation bodieshave to work together with, rather than against, local people.One important aspect of this is taking local ‘culture’ into account.However, what is understood by ‘culture’ in such contexts tendsto be extremely partial as ‘culture’ is almost always limited totaboos (fady. The article discusses the danger of such a narrowview suggesting that ‘culture’ is infinitely more complex andsubtle than its immediately apparent surface. I argue that if conservationists’ commitment to take ‘culture’ seriously is genuine, it must also apply to those cultural phenomena that are in conflict with conservation programmes. This applies in particular to rural Malagasy people’s desire to have many descendants; a desire which is linked to their fundamental understanding of what represents a meaningful life.

  3. Prions: the danger of biochemical weapons

    Directory of Open Access Journals (Sweden)

    Eric Almeida Xavier

    2014-09-01

    Full Text Available The knowledge of biotechnology increases the risk of using biochemical weapons for mass destruction. Prions are unprecedented infectious pathogens that cause a group of fatal neurodegenerative diseases by a novel mechanism. They are transmissible particles that are devoid of nucleic acid. Due to their singular characteristics, Prions emerge as potential danger since they can be used in the development of such weapons. Prions cause fatal infectious diseases, and to date there is no therapeutic or prophylactic approach against these diseases. Furthermore, Prions are resistant to food-preparation treatments such as high heat and can find their way from the digestive system into the nervous system; recombinant Prions are infectious either bound to soil particles or in aerosols. Therefore, lethal Prions can be developed by malicious researchers who could use it to attack political enemies since such weapons cause diseases that could be above suspicion.

  4. Ethics consultation: a dangerous, antidemocratic charlatanry?

    Science.gov (United States)

    Lilje, Christian

    1993-01-01

    Giles Scofield's argument indicates ethics consultants may need to better clarify what in fact they are and what they are not doing, claiming, and striving for. But we must not step back too far. We must neither engage in putting in envious professional claims for exclusive rights in the area of difficult and momentous decisions in healthcare nor get stuck in discussing normative ethics at the level of metaphysics, ontology, and dogmatics (as has happened in Germany for decades). We must not do so especially in view of the achievements of ethics consultation and the growing demand for it by all parties involved, conceded even by sceptics. Ethics consultation, according to Scofield, appears to be dangerous....Let us look more closely at the logic of the argument by discussing the presumed "antidemocratic" nature. The "new tyranny" of thoughts, and the "proper" role of bioethics consultation. Some considerations about the possibility of ethics expertise shall be left for the end.

  5. Hanford facility dangerous waste permit application

    Energy Technology Data Exchange (ETDEWEB)

    None

    1991-09-18

    This document, Set 2, the Hanford Facility Dangerous Waste Part B Permit Application, consists of 15 chapters that address the content of the Part B checklists prepared by the Washington State Department of Ecology (Ecology 1987) and the US Environmental Protection Agency (40 CFR 270), with additional information requirements mandated by the Hazardous and Solid Waste Amendments of 1984 and revisions of WAC 173-303. For ease of reference, the Washington State Department of Ecology checklist section numbers, in brackets, follow the chapter headings and subheadings. This permit application contains umbrella- type'' documentation with overall application to the Hanford Facility. This documentation is broad in nature and applies to all TSD units that have final status under the Hanford Facility Permit.

  6. Design and Implementation of Domain based Semantic Hidden Web Crawler

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Web is a wide term which mainly consists of surface web and hidden web. One can easily access the surface web using traditional web crawlers, but they are not able to crawl the hidden portion of the web. These traditional crawlers retrieve contents from web pages, which are linked by hyperlinks ignoring the information hidden behind form pages, which cannot be extracted using simple hyperlink structure. Thus, they ignore large amount of data hidden behind search forms. This paper emphasizes o...

  7. The identification of dangerously coking coals

    Energy Technology Data Exchange (ETDEWEB)

    Barriocanal, C.; Patrick, J.W.; Walker, P.A. [Loughborough Univ. of Technology, Leicestershire (United Kingdom)] [and others

    1995-12-31

    When coals are carbonised in slot-type ovens, layers of plastic coal are formed parallel to the oven walls and move progressively inwards eventually meeting at the oven centre. It is within these plastic layers that the principal processes which result in particulate coal being converted into porous, fused coke take place. For some coals, usually having volatile matter contents between 17 and 25wt% (dry, ash-free basis), these processes are accompanied by the generation of measurable gas pressures within the plastic layers which attain maximum levels when the two layers meet at the oven centre. These pressures are transmitted through the coke to the oven walls, causing damage if sufficiently high. Other coals, similar in chemical analysis and swelling properties, can be carbonised with impunity. The technical aspects of the coking pressure phenomenon are well known. However, the fundamental processes involved in the generation of internal gas pressures are not fully understood. Thus, before being used in blends for commercial coke production, potentially dangerous coals are tested by carbonising upwards of 180kg charges in moveable-wall ovens and measuring directly the pressures exerted on the walls. Clearly, it would be helpful if dangerously coking coals could be identified from laboratory tests. Preliminary findings of a laboratory study designed to gain further insight into coking pressure development are presented in this paper. Internal gas pressures have been ascribed to volatiles trapped within either the plastic envelope or the plastic layer implying an overlap of the temperature ranges of volatile release and fluidity. An attempts to assess this view using, initially, thermogravimetric analysis and Gieseler plastometry and, later, a coking bomb are described, the results being related to internal gas pressures measured in a 1.5kg double-wall oven.

  8. Radiological Weapons: How Great Is The Danger?

    Energy Technology Data Exchange (ETDEWEB)

    Moore, G M

    2003-06-01

    One of the underlying purposes of this paper is to provoke thinking about the interplay between the regulation of radioactive materials and the risk of their use in an radiological weapon (RW). Also considered in this paper are the types of RWs that a terrorist might use, the nature of the threat and danger posed by the various types of RWs, the essential elements that must be considered in responding to the terrorist use of an RW, and what steps may need to be taken a priori to minimize the consequences of the inevitable use of an RW. Because radiological dispersal devices (RDDs) have been the focus of so much recent concern and because RDDs are arguably the most likely of RWs to be used by a terrorist group, a major focus of this paper will be on RDDs. Radiological weapons are going to be used by some individual or group, if not this year then next year, or at some time in the foreseeable future. A policy of focusing resources solely on prevention of their use would leave any government open to significant economic disruption when the inevitable use occurs. Preplanning can limit the injuries, property damage, and economic losses that might result from the use of an RW. Moreover, a combination of efforts to prevent and to minimize the impact of RWs may significantly discourage potential users. The dangers from RWs can be dealt with while society continues to enjoy the benefits of nuclear technology that were promised under Atoms for Peace. However, some restructuring of our use of radioactive materials is necessary to ensure that the current and future uses of radioactive materials outweigh the potential disruption caused by misuse of the materials in RWs.

  9. Variational Hidden Conditional Random Fields with Coupled Dirichlet Process Mixtures

    NARCIS (Netherlands)

    Bousmalis, K.; Zafeiriou, S.; Morency, L.P.; Pantic, Maja; Ghahramani, Z.

    2013-01-01

    Hidden Conditional Random Fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An infinite HCRF is an HCRF with a countably infinite number of hidden states, which rids us not only of the necessit

  10. Perceptual consequences of "hidden" hearing loss.

    Science.gov (United States)

    Plack, Christopher J; Barker, Daphne; Prendergast, Garreth

    2014-09-09

    Dramatic results from recent animal experiments show that noise exposure can cause a selective loss of high-threshold auditory nerve fibers without affecting absolute sensitivity permanently. This cochlear neuropathy has been described as hidden hearing loss, as it is not thought to be detectable using standard measures of audiometric threshold. It is possible that hidden hearing loss is a common condition in humans and may underlie some of the perceptual deficits experienced by people with clinically normal hearing. There is some evidence that a history of noise exposure is associated with difficulties in speech discrimination and temporal processing, even in the absence of any audiometric loss. There is also evidence that the tinnitus experienced by listeners with clinically normal hearing is associated with cochlear neuropathy, as measured using Wave I of the auditory brainstem response. To date, however, there has been no direct link made between noise exposure, cochlear neuropathy, and perceptual difficulties. Animal experiments also reveal that the aging process itself, in the absence of significant noise exposure, is associated with loss of auditory nerve fibers. Evidence from human temporal bone studies and auditory brainstem response measures suggests that this form of hidden loss is common in humans and may have perceptual consequences, in particular, regarding the coding of the temporal aspects of sounds. Hidden hearing loss is potentially a major health issue, and investigations are ongoing to identify the causes and consequences of this troubling condition.

  11. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements

  12. Discovering Hidden Treasures with GPS Technology

    Science.gov (United States)

    Nagel, Paul; Palmer, Roger

    2014-01-01

    "I found it!" Addison proudly proclaimed, as she used an iPhone and Global Positioning System (GPS) software to find the hidden geocache along the riverbank. Others in Lisa Bostick's fourth grade class were jealous, but there would be other geocaches to find. With the excitement of movies like "Pirates of the Caribbean" and…

  13. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover...

  14. Dermatologic hazards from hidden contacts with penicillin

    Energy Technology Data Exchange (ETDEWEB)

    Boonk, W.J.

    1981-01-01

    The unbridled use of penicillin after its discovery by Fleming has resulted in possible hazards to human health due to traces of the drug being present in food and other hidden sources. These hazards may include toxic effects, hypersensitivity reactions and possibly a raising of the frequency and duration of allergy to penicillin.

  15. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements incr

  16. Computerized Testing: The Hidden Figures Test.

    Science.gov (United States)

    Jacobs, Ronald L.; And Others

    1985-01-01

    This study adapted the Hidden Figures Test for use on PLATO and determined the reliability of the computerized version compared to the paper and pencil version. Results indicate the test was successfully adapted with some modifications, and it was judged reliable although it may be measuring additional constructs. (MBR)

  17. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  18. Hidden Costs and Challenges of Servitization

    DEFF Research Database (Denmark)

    Yang, Yifan; Slepniov, Dmitrij

    of these labels, the potential benefits of servitization are often overshadowed by costs associated with it. By using the cases of Chinese and Danish manufacturing firms, this study takes a closer look at possible hidden costs of servitization and contributes to our understanding of servitization performance...

  19. Hidden Danger and Countermeasures of Fertilizer Abuse%化肥滥用隐患及对策研究

    Institute of Scientific and Technical Information of China (English)

    林建材; 李艳红; 曲日涛

    2013-01-01

    Based on agricultural production,the writer wants to start with the manifestation of fertilizer abuse to re-veal the abuse harmful and explore the argument about the fertilizer rational utilization strategy.%从化肥滥用的种种表现入手,结合农业生产实际,揭示化肥滥用的危害后果,提出控制化肥滥用及科学合理施用肥料的对策。

  20. Hidden Dangers within Our Schools: What Are These Safety Problems and How Can We Fix Them? Safety in the Schools

    Science.gov (United States)

    Gunzelmann, Betsy

    2005-01-01

    Safety in the schools involves much more than metal detectors and disaster plans. Although such catastrophe preparation is necessary, we often overlook less obvious beliefs and practices that put children's everyday safety at risk. According to the well-known pediatrician T. Berry Brazelton and the child psychiatrist Stanley Greenspan (2000), all…

  1. Surgical management of cutaneous infection caused by atypical mycobacteria after penetrating injury: the hidden dangers of horticulture.

    Science.gov (United States)

    Holland, J; Smith, C; Childs, P A; Holland, A J

    1997-02-01

    We identified two patients in a 12-month period who presented with cutaneous infection and secondary lymph node involvement from atypical mycobacterial infection after minor gardening injuries. One patient had a coinfection with Nocardia asteroides. Both patients required multiple surgical interventions, despite appropriate antibiotic therapy, before resolution of the disease. The course of the infection was characterized by chronic relapses with complete healing at 12 to 18 months after the original injury. The identification and management of this clinical problem are reviewed.

  2. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  3. 46 CFR 154.1435 - Medical first aid guide.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Medical first aid guide. 154.1435 Section 154.1435 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY... Equipment § 154.1435 Medical first aid guide. Each vessel must have a copy of the IMO Medical First...

  4. [The potential dangers of endocrinal disorders].

    Science.gov (United States)

    Kaufman, E; Garfunkel, A; Findler, M; Malamed, S F; Zusman, S P; Elad, S; Galili, D

    2002-01-01

    The symptoms of most endocrine system diseases are usually clearly recognizable and most of the times are accompanied by a rich medical history. Many general practitioners are reluctant to treat such cases and prefer to refer these patients to specialists who are trained in management of the medically compromised thus increasing the chances of dental treatment without complications. However, sometimes endocrinal diseases develop slowly and their clinical manifestations are hidden or subclinical in nature. In these cases, neither the patient nor the dentist are aware of the condition and there is the potential of life threatening, emergency situations in what at first seem as simple, straightforward dental procedures. Therefore, the dentist must be able to recognize the clinical problem, differentiate between the different symptoms and initiate the proper management protocol. The most unstable endocrinal disorders that should be treated with great care are diabetes mellitus, mainly hypoglycemia, hyperthyroidism and adrenal insufficiency. The general practitioner dentist can treat patients suffering from these disorders providing the disease is well controlled and balanced and that the dental treatment is not very traumatic.

  5. Artificial intelligence techniques for monitoring dangerous infections.

    Science.gov (United States)

    Lamma, Evelina; Mello, Paola; Nanetti, Anna; Riguzzi, Fabrizio; Storari, Sergio; Valastro, Gianfranco

    2006-01-01

    The monitoring and detection of nosocomial infections is a very important problem arising in hospitals. A hospital-acquired or nosocomial infection is a disease that develops after admission into the hospital and it is the consequence of a treatment, not necessarily a surgical one, performed by the medical staff. Nosocomial infections are dangerous because they are caused by bacteria which have dangerous (critical) resistance to antibiotics. This problem is very serious all over the world. In Italy, almost 5-8% of the patients admitted into hospitals develop this kind of infection. In order to reduce this figure, policies for controlling infections should be adopted by medical practitioners. In order to support them in this complex task, we have developed a system, called MERCURIO, capable of managing different aspects of the problem. The objectives of this system are the validation of microbiological data and the creation of a real time epidemiological information system. The system is useful for laboratory physicians, because it supports them in the execution of the microbiological analyses; for clinicians, because it supports them in the definition of the prophylaxis, of the most suitable antibi-otic therapy and in monitoring patients' infections; and for epidemiologists, because it allows them to identify outbreaks and to study infection dynamics. In order to achieve these objectives, we have adopted expert system and data mining techniques. We have also integrated a statistical module that monitors the diffusion of nosocomial infections over time in the hospital, and that strictly interacts with the knowledge based module. Data mining techniques have been used for improving the system knowledge base. The knowledge discovery process is not antithetic, but complementary to the one based on manual knowledge elicitation. In order to verify the reliability of the tasks performed by MERCURIO and the usefulness of the knowledge discovery approach, we performed a test

  6. 43 CFR 15.11 - Explosives and dangerous weapons.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Explosives and dangerous weapons. 15.11... § 15.11 Explosives and dangerous weapons. No person shall carry, use or possess within the Preserve... other kind of weapon potentially harmful to the reef structure. The use of such weapons from beyond the...

  7. 48 CFR 245.7310-4 - Dangerous property.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Dangerous property. 245..., DEPARTMENT OF DEFENSE CONTRACT MANAGEMENT GOVERNMENT PROPERTY Sale of Surplus Contractor Inventory 245.7310-4 Dangerous property. The following warning shall be included when it cannot be certified that the property...

  8. Dangerousness and risk assessment: the state of the art.

    Science.gov (United States)

    Bauer, Arie; Rosca, Paula; Khawalled, Razak; Gruzniewski, Adrian; Grinshpoon, Alex

    2003-01-01

    Risk or dangerousness is an issue which burdens the minds of all mental health and law enforcement professionals. Researchers have attempted to define its extent and constituent elements and to predict and assess it. Risk assessment is a complex task, influenced by the interaction of many variables, such as previous pattern of violence, biological, sociological and psychological factors, divided into facilitating and inhibiting factors. In our paper we discuss the theoretical concepts linked with dangerousness prediction and assessment, and then review the "first" and "second" generations of literature on dangerousness and risk assessment, including the actuarial instruments. We then present the current trends in the field, concentrating on the correlation between dangerousness and mental disorders, dangerousness analysis and risk management, a wider concept including prevention, treatment and communication of risk. Although great progress has been made in this field, there are still many unresolved issues, among them the development of valid instruments for the assessment of risk.

  9. How to review a surgical paper: a guide for junior referees.

    Science.gov (United States)

    Stahel, Philip F; Moore, Ernest E

    2016-02-14

    Reviewing a surgical manuscript is not an easy task, and there is no formal training available for young referees in the early stage of their careers. Accepting a peer review assignment represents a personal honor for the invited referee and a fundamental ethical responsibility towards the scientific community. Designated reviewers must be accomplished and knowledgeable in the area of the respective topic of investigation. More importantly, they must be aware and cognizant about the cardinal ethical responsibility and stewardship for ensuring the preservation of scientific knowledge of unbiased and unquestionable accuracy in the published literature. Accepting a review assignment should never be taken lightly or considered a simple task, regardless of the reviewer's level of seniority and expertise. Indeed, there are multiple challenges, difficulties, and 'hidden dangers' that jeopardize the completion of a high-quality review, particularly in the hands of less experienced or novice reviewers. The present article was designed to provide a brief, concise, and practical guide on how to review manuscripts for the 'junior referee' in the field of surgery.

  10. The generic danger and the idiosyncratic support

    Science.gov (United States)

    Temme, Arnaud; Nijp, Jelmer; van der Meij, Marijn; Samia, Jalal; Masselink, Rens

    2016-04-01

    This contribution argues two main points. First, that generic landscapes used in some modelling studies sometimes have properties or cause simulation results that are unrealistic. Such initially flat or straight-sloped landscapes, sometimes with minor random perturbations, e.g. form the backdrop for ecological simulations of vegetation growth and competition that predict catastrophic shifts. Exploratory results for semi-arid systems suggest that the results based on these generic landscapes are end-members from a distribution of results, rather than an unbiased, typical outcome. Apparently, the desire to avoid idiosyncrasy has unintended consequences. Second, we argue and illustrate that in fact new insights often come from close inspection of idiosyncratic case studies. Our examples from landslide systems, connectivity and soil formation show how a central role for the case study - either in empirical work or to provide model targets - has advanced our understanding. Both points contribute to the conclusion that it is dangerous to forget about annoying, small-scale, idiosyncratic and, indeed, perhaps bad-ass case studies in Earth Sciences.

  11. How Can We Avert Dangerous Climate Change?

    CERN Document Server

    Hansen, J

    2007-01-01

    Recent analyses indicate that the amount of atmospheric CO2 required to cause dangerous climate change is at most 450 ppm, and likely less than that. Reductions of non-CO2 climate forcings can provide only moderate, albeit important, adjustments to the CO2 limit. Realization of how close the planet is to "tipping points" with unacceptable consequences, especially ice sheet disintegration with sea level rise out of humanity's control, has a bright side. It implies an imperative: we must find a way to keep the CO2 amount so low that it will also avert other detrimental effects that had begun to seem inevitable, e.g., ocean acidification, loss of most alpine glaciers and thus the water supply for millions of people, and shifting of climatic zones with consequent extermination of species. Here I outline from a scientific perspective actions needed to achieve low limits on CO2 and global warming. These changes are technically feasible and have ancillary benefits. Achievement of needed changes requires overcoming t...

  12. Euthanasia--definition, dangers and alternatives.

    Science.gov (United States)

    Saunders, C

    1994-03-01

    There is as yet (1992) no law specifically allowing euthanasia, the active intervention to end a patient's life. The discussion has so far been restricted to such action as taking place at a patient's request, but evidence from the Netherlands appears to show that the move to involuntary euthanasia is a real danger. Palliative medicine offers appropriate treatment for relief and support where limits are set on interventions that would no longer be in a patient's best interests. It is possible to relieve distress by using the increasing knowledge in this field. It is important to distinguish this from euthanasia and the term "passive euthanasia" is confusing and unfortunate. Those with extensive experience in the treatment of advanced cancer have much to share with practitioners in other specialties, not least in the possible achievements of both patient and family at the end of life. Society has the responsibility for including them in its concern to the end of life and for supporting those who find it difficult to believe in any meaning in their existence.

  13. Steam vaporizers: A danger for paediatric burns.

    Science.gov (United States)

    Lonie, Sarah; Baker, Paul; Teixeira, Rodrigo

    2016-12-01

    Steam vaporizers are used to humidify air in dry environments. They are marketed to moisten children's airway secretions and thus to help relieve symptoms associated with upper respiratory tract infections. Unfortunately the steam emitted from the unit can also pose a significant risk of burns to children. Our study aimed to ascertain patterns of injury and treatment outcomes from steam burns resulting from these devices. Potential preventative measures are discussed. Children who had sustained vaporizer scald burns were identified at the outpatient burns clinic over a 10-month period (November 2014-August 2015). Medical records were reviewed retrospectively and data collected on pattern of injury, management and outcomes. Ten children were treated for vaporizer steam burns over the study period. The mean age was 1.6 years and 8 (80%) patients were male. Operative intervention was undergone in 5 (50%) cases; four acutely and one as a secondary reconstructive procedure. Hand burns accounted for 8 (80%) of cases. Steam vaporizers can cause significant burns in the paediatric population. Toddlers were most at risk, frequently sustaining hand burns that underwent skin grafting. Greater public awareness of the danger is indicated and measures to prevent such injuries should be addressed by appropriate authorities. Copyright © 2016 Elsevier Ltd and ISBI. All rights reserved.

  14. Can Asteroid Airbursts Cause Dangerous Tsunami?.

    Energy Technology Data Exchange (ETDEWEB)

    Boslough, Mark B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    I have performed a series of high-resolution hydrocode simulations to generate “source functions” for tsunami simulations as part of a proof-of-principle effort to determine whether or not the downward momentum from an asteroid airburst can couple energy into a dangerous tsunami in deep water. My new CTH simulations show enhanced momentum multiplication relative to a nuclear explosion of the same yield. Extensive sensitivity and convergence analyses demonstrate that results are robust and repeatable for simulations with sufficiently high resolution using adaptive mesh refinement. I have provided surface overpressure and wind velocity fields to tsunami modelers to use as time-dependent boundary conditions and to test the hypothesis that this mechanism can enhance the strength of the resulting shallow-water wave. The enhanced momentum result suggests that coupling from an over-water plume-forming airburst could be a more efficient tsunami source mechanism than a collapsing impact cavity or direct air blast alone, but not necessarily due to the originally-proposed mechanism. This result has significant implications for asteroid impact risk assessment and airburst-generated tsunami will be the focus of a NASA-sponsored workshop at the Ames Research Center next summer, with follow-on funding expected.

  15. Hidden penis release: adjunctive suprapubic lipectomy.

    Science.gov (United States)

    Horton, C E; Vorstman, B; Teasley, D; Winslow, B

    1987-08-01

    We believe the hidden penis may be caused and concealed by a prominent suprapubic fat pad in addition to the restrictive fibrous bands of the dartos fascia fixing the shaft of the penis proximally while loose skin folds prolapse distally over the phallus. A penis of inadequate length or appearance may affect body image. Patients with this problem often require psychological support. Hidden penis may be distinguished from micropenis by palpating adequate corpora and showing a stretched penile length within 2 SD of normal. Excision of suprapubic fat with sectioning of the tethering dartos bands will release and increase the length of the penis. Suprapubic fat pad resection may also be helpful to elongate a short penis in cases of adult microphallus, or after partial penectomy because of trauma or cancer. Circumcision is contraindicated.

  16. Laser experiments explore the hidden sector

    CERN Document Server

    Ahlers, M; Jaeckel, J; Redondo, J; Ringwald, A

    2007-01-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses <~0.05 eV, the charge is now restricted to be less than (3-4)x10^(-7) times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background.

  17. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  18. Hidden geometric correlations in real multiplex networks

    Science.gov (United States)

    Kleineberg, Kaj-Kolja; Boguñá, Marián; Ángeles Serrano, M.; Papadopoulos, Fragkiskos

    2016-11-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.

  19. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  20. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  1. Finite State Transducers Approximating Hidden Markov Models

    CERN Document Server

    Kempe, A

    1999-01-01

    This paper describes the conversion of a Hidden Markov Model into a sequential transducer that closely approximates the behavior of the stochastic model. This transformation is especially advantageous for part-of-speech tagging because the resulting transducer can be composed with other transducers that encode correction rules for the most frequent tagging errors. The speed of tagging is also improved. The described methods have been implemented and successfully tested on six languages.

  2. Hidden symmetries in dilaton-axion gravity

    CERN Document Server

    Kechkin, O V

    1996-01-01

    Four--dimensional Einstein--Maxwell--dilaton--axion system restricted to space--times with one non--null Killing symmetry is formulated as the three--dimensional gravity coupled sigma--model. Several alternative representations are discussed and the associated hidden symmetries are revealed. The action of target space isometries on the initial set of (non--dualized ) variables is found. New mulicenter solutions are obtained via generating technique based on the formulation in terms of the non--dualized variables.

  3. Caldera rim collapse: A hidden volcanic hazard

    OpenAIRE

    Merle, Olivier; Michon, Laurent; Bachèlery, Patrick

    2008-01-01

    International audience; Following the emblematic flank collapse of Mount St Helens in 1981, numerous models of flank sliding have been proposed. These models have allowed to largely improve the understanding of mechanisms involved in such landslides, which represent a tremendous risk for populations living around volcanoes. In this article, a new mode of landslide formation, related to buried calderas, is described. The model emphasizes the paramount importance of the hidden ring fault that, ...

  4. Online Learning in Discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2007-01-01

    We present and analyse three online algorithms for learning in discrete Hidden Markov Models (HMMs) and compare them with the Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalisation error we draw learning curves in simplified situations. The performance for learning drifting concepts of one of the presented algorithms is analysed and compared with the Baldi-Chauvin algorithm in the same situations. A brief discussion about learning and symmetry breaking b...

  5. Common Defects of Tank Vehicle Transport of Liquid Dangerous Goods%道路运输液体危险货物罐式车辆常见缺陷

    Institute of Scientific and Technical Information of China (English)

    殷如生

    2012-01-01

    危险化学品货物常压罐车承载着大量的危险化学品奔走在全国各条公路上,为经济建设服务,然而也带来了安全隐患。本文就检验方面、制造方面及使用方面一些常见缺陷进行分析,加强这些方面的管理工作,消除事故隐患,提高危险化学品罐车的本质安全,减少事故的发生。%The dangerous chemical goods atmospheric tank car carrying a large number of dangerous chemicals in the country to run every highway brought economic construction services,but also with safety hidden troubles.The inspection,manufacture and use some common defects were analyzed,and through strengthening the management work,eliminating the hidden danger of accidents,and improving the dangerous chemical tanker of intrinsic safety,the accidents were reduced.

  6. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  7. Otoendoscopic treatment of hidden lesions in otomastoiditis

    Institute of Scientific and Technical Information of China (English)

    LIU Yang; SUN Jian-jun; LIN Yong-sheng; ZHAO Dan-heng; ZHAO Jing; LEI Fei

    2010-01-01

    Background Surgical treatments for chronic suppurative and cholesteatoma otitis media have been discussed for several decades, but recurrences still occur because of the complex dissection required and hidden lesions associated with otomastoiditis. This study investigated the technology and strategy behind the use of otoendoscopic-assisted otosurgery.Methods We reported on hidden lesions in 32 ears of patients with otomastoiditis between November 2006 and January 2009. All the patients were treated with the aid of an otoendoscope. The advantages of otoendoscopy, including multi-angle light scattering, aperture illumination, and magnification of the local operative field, were utilized in otologic microsurgery, and otoendoscopic operative techniques were introduced for operative sites such as the epitympanum, aditus of the antrum, facial recess, sinus tympani and the mastoid tip.Results All patients were followed up from 3 months to 2 years after surgery. All patients recovered well within 3 months following surgery, except for one case of epithelialization of the mastoid cavity occurring 6 months after surgery for cholesteatoma on the cerebellar surface and another case with Bezold's abscess, hyperplastic granulation tissue developed at the antrum.Conclusions Otoendoscopy can overcome the technical deficiency of rectilinearity of the visual axis associated with otomicroscopic illumination, which presents a problem when dealing with otomastoiditis lesions in hidden areas. This technique allows such lesions within the complex three-dimensional structure to be visualized and cleaned. Otoendoscopy thus has significant potential for improving the quality of surgery and reducing the risk of postoperative recurrence.

  8. Dark matter in the hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2014-01-01

    The cosmological scenario of the dark matter generated in the hidden gauge theory based on the grand unification is discussed. It is found that the stability of the dark matter halo of our Galaxy and the cosmic ray observation constrain, respectively, the dark matter mass and the unification scale between the standard model and the hidden gauge theory sectors. To obtain a phenomenologically consistent thermal evolution, the entropy of the standard model sector needs to be increased. We therefore propose a scenario where the mini-inflation is induced from the potential coupled to the Standard model sector, in particular the Higgs sector. This scenario makes consistent the current dark matter density as well as the baryon-to-photon ratio for the case of pion dark matter. For the glueball or heavy pion of hidden gauge theory, an additional mini-inflation in the standard model sector before the leptogenesis is required. We also propose the possibility to confirm this scenario by known prospective experimental app...

  9. Dangerous Spaces, Dangerous Liaisons: Performance Arts on and of the U.S./Mexico Border

    Directory of Open Access Journals (Sweden)

    Kirsten F. Nigro

    2008-06-01

    Full Text Available This essay will consider the performative arts on the border, ranging from script-based plays to performance pieces in urban spaces and public installation pieces. These will be analyzed according to their focus on 1 the plight of the illegal immigrant; 2 the violence that has become a daily factor in the lives of border citizens; and 3 the symbolic efforts to make a sacred space out of one as seemingly unsacred as the border; and if not a sacred space, one that is more transparent and hopefully, less dangerous and threatening.

  10. [Dangerous states and mental health disorders: perceptions and reality].

    Science.gov (United States)

    Tassone-Monchicourt, C; Daumerie, N; Caria, A; Benradia, I; Roelandt, J-L

    2010-01-01

    Image of Madness was always strongly linked with the notion of "dangerousness", provoking fear and social exclusion, despite the evolution of psychiatric practices and organisation, and the emphasis on user's rights respect. Mediatization and politicization of this issue through news item combining crime and mental illness, reinforce and spread out this perception. This paper presents a review of the litterature on social perceptions associating "dangerousness", "Insanity" and "mental illness", available data about the link between "dangerous states" and "psychiatric disorders", as well as the notion of "dangerousness" and the assessment of "dangerous state" of people suffering or not from psychiatric disorders. MAPPING OF SOCIAL REPRESENTATIONS: The French Survey "Mental Health in General Population: Images and Realities (MHGP)" was carried out between 1999 and 2003, on a representative sample of 36.000 individuals over 18 years old. It aims at describing the social representations of the population about "insanity/insane" and "mental illness/mentally ill". The results show that about 75% of the people interviewed link "insanity" or "mental illness" with "criminal or violent acts". Young people and those with a high level of education more frequently categorize violent and dangerous behaviours in the field of Mental illness rather than in that of madness. CORRELATION BETWEEN DANGEROUS STATE AND PSYCHIATRIC DISORDERS: in the scientific literature, all experts reject the hypothesis of a direct link between violence and mental disorder. Besides, 2 tendencies appear in their conclusions: on one hand, some studies establish a significative link between violence and severe mental illness, compared with the general population. On the other hand, results show that 87 to 97% of des aggressors are not mentally ills. Therefore, the absence of scientific consensus feeds the confusion and reinforce the link of causality between psychiatric disorders and violence. OFFICIAL

  11. Reinforcing a Dangerous Rock Mass Using the Flexible Network Method

    Institute of Scientific and Technical Information of China (English)

    Yang Wendong; Xie Quanmin; Xia Yuanyou; Li Xinping

    2005-01-01

    Because the main failure type of a dangerous rock mass is collapse, the treatment of such a mass should focus on controlling collapse failure. When treating dangerous rock masses, disturbing the mass (e.g. by blasting) needs to be avoided, as this new damage could cause collapse. So the self-bearing capacity of the mountain mass must be used to treat the dangerous rock mass. This article is based on a practical example of the control of a dangerous rock mass at Banyan Mountain, Huangshi, Hubei Province. On the basis of an analysis of damage mechanism and the stability of the dangerous rock mass, a flexible network reinforcement method was designed to prevent the collapse of the rock mass. The deformations of section Ⅱw of the dangerous rock mass before and after the flexible network reinforcement were calculated using the two-dimensional finite element method. The results show that the maximum deformation reduced by 55 % after the application of the flexible network reinforcement, from 45.99 to 20.75 mm, which demonstrates that the flexible network method is effective, and can provide some scientific basis for the treatment of dangerous rock masses.

  12. Normal Science Education and its Dangers: The Case of School Chemistry

    Science.gov (United States)

    Van Berkel, Berry; De Vos, Wobbe; Verdonk, Adri H.; Pilot, Albert

    We started the Conceptual Structure of School Chemistry research project, a part of which is reported on here, with an attempt to solve the problem of the hidden structure in school chemistry. In order to solve that problem, and informed by previous research, we performed a content analysis of school chemistry textbooks and syllabi. This led us to the hypothesis that school chemistry curricula are based on an underlying, coherent structure of chemical concepts that students are supposed to learn for the purpose of explaining and predicting chemical phenomena. The elicited comments and criticisms of an International Forum of twenty-eight researchers of chemical education, though, refuted the central claims of this hypothesis. This led to a descriptive theory of the currently dominant school chemistry curriculum in terms of a rigid combination of a specific substantive structure, based on corpuscular theory, a specific philosophical structure, educational positivism, and a specific pedagogical structure, involving initiatory and preparatory training of future chemists. Secondly, it led to an explanatory theory of the structure of school chemistry - based on Kuhn's theory of normal science and scientific training - in which dominant school chemistry is interpreted as a form of normal science education. Since the former has almost all characteristics in common with the latter, dominant school chemistry must be regarded as normal chemistry education. Forum members also formulated a number of normative criticisms on dominant school chemistry, which we interpret as specific dangers of normal chemistry education, complementing Popper's discussion of the general dangers of normal science and its teaching. On the basis of these criticisms, it is argued that normal chemistry education is isolated from common sense, everyday life and society, history and philosophy of science, technology, school physics, and from chemical research.

  13. Software Security - The Dangers of Abstraction

    Science.gov (United States)

    Gollmann, Dieter

    Software insecurity can be explained as a potpourri of hacking methods, ranging from the familiar, e.g. buffer overruns, to the exotic, e.g. code insertion with Chinese characters. From such an angle software security would just be a collection of specific countermeasures. We will observe a common principle that can guide a structured presentation of software security and give guidance for future research directions: There exists a discrepancy between the abstract programming concepts used by software developers and their concrete implementation on the given execution platform. In support of this thesis, five case studies will be discussed, viz characters, integers, variables, atomic transactions, and double linked lists.

  14. Traffic danger detection by visual attention model of sparse sampling

    Institute of Scientific and Technical Information of China (English)

    夏利民; 刘涛; 谭论正

    2015-01-01

    A method to detect traffic dangers based on visual attention model of sparse sampling was proposed. The hemispherical sparse sampling model was used to decrease the amount of calculation which increases the detection speed. Bayesian probability model and Gaussian kernel function were applied to calculate the saliency of traffic videos. The method of multiscale saliency was used and the final saliency was the average of all scales, which increased the detection rates extraordinarily. The detection results of several typical traffic dangers show that the proposed method has higher detection rates and speed, which meets the requirement of real-time detection of traffic dangers.

  15. Investigator's guide to steganography

    CERN Document Server

    Kipper, Gregory

    2003-01-01

    The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future

  16. A Hidden Markov Model for avalanche forecasting on Chowkibal–Tangdhar road axis in Indian Himalayas

    Indian Academy of Sciences (India)

    Jagdish Chandra Joshi; Sunita Srivastava

    2014-12-01

    A numerical avalanche prediction scheme using Hidden Markov Model (HMM) has been developed for Chowkibal–Tangdhar road axis in J&K, India. The model forecast is in the form of different levels of avalanche danger (no, low, medium, and high) with a lead time of two days. Snow and meteorological data (maximum temperature, minimum temperature, fresh snow, fresh snow duration, standing snow) of past 12 winters (1992–2008) have been used to derive the model input variables (average temperature, fresh snow in 24 hrs, snow fall intensity, standing snow, Snow Temperature Index (STI) of the top layer, and STI of buried layer). As in HMMs, there are two sequences: a state sequence and a state dependent observation sequence; in the present model, different levels of avalanche danger are considered as different states of the model and Avalanche Activity Index (AAI) of a day, derived from the model input variables, as an observation. Validation of the model with independent data of two winters (2008–2009, 2009–2010) gives 80% accuracy for both day-1 and day-2. Comparison of various forecasting quality measures and Heidke Skill Score of the HMM and the NN model indicate better forecasting skill of the HMM.

  17. Regional cerebral glucose metabolism differentiates danger- and non-danger-based traumas in post-traumatic stress disorder.

    Science.gov (United States)

    Ramage, Amy E; Litz, Brett T; Resick, Patricia A; Woolsey, Mary D; Dondanville, Katherine A; Young-McCaughan, Stacey; Borah, Adam M; Borah, Elisa V; Peterson, Alan L; Fox, Peter T

    2016-02-01

    Post-traumatic stress disorder (PTSD) is presumably the result of life threats and conditioned fear. However, the neurobiology of fear fails to explain the impact of traumas that do not entail threats. Neuronal function, assessed as glucose metabolism with (18)fluoro-deoxyglucose positron emission tomography, was contrasted in active duty, treatment-seeking US Army Soldiers with PTSD endorsing either danger- (n = 19) or non-danger-based (n = 26) traumas, and was compared with soldiers without PTSD (Combat Controls, n = 26) and Civilian Controls (n = 24). Prior meta-analyses of regions associated with fear or trauma script imagery in PTSD were used to compare glucose metabolism across groups. Danger-based traumas were associated with higher metabolism in the right amygdala than the control groups, while non-danger-based traumas associated with heightened precuneus metabolism relative to the danger group. In the danger group, PTSD severity was associated with higher metabolism in precuneus and dorsal anterior cingulate and lower metabolism in left amygdala (R(2 )= 0.61). In the non-danger group, PTSD symptom severity was associated with higher precuneus metabolism and lower right amygdala metabolism (R(2 )= 0.64). These findings suggest a biological basis to consider subtyping PTSD according to the nature of the traumatic context.

  18. 78 FR 59413 - International Civil Aviation Organization's (ICAO) Dangerous Goods Panel; Notice of Public Meeting

    Science.gov (United States)

    2013-09-26

    ... Federal Aviation Administration International Civil Aviation Organization's (ICAO) Dangerous Goods Panel... meeting. SUMMARY: In preparation for the International Civil Aviation Organization's (ICAO) Dangerous... Organization's Dangerous Goods Panel's (ICAO DGP's) 24th Panel Meeting. The agenda for the Working Group is...

  19. 77 FR 53250 - International Civil Aviation Organization's (ICAO) Dangerous Goods Panel; Notice of Public Meeting

    Science.gov (United States)

    2012-08-31

    ... Federal Aviation Administration International Civil Aviation Organization's (ICAO) Dangerous Goods Panel... meeting. SUMMARY: In preparation for the International Civil Aviation Organization's (ICAO) Dangerous... International Civil Aviation Organization's Dangerous Goods Panel's (ICAO DGP's) Working Group of the Whole...

  20. 78 FR 16756 - International Civil Aviation Organization's (ICAO) Dangerous Goods Panel; Notice of Public Meeting

    Science.gov (United States)

    2013-03-18

    ... Federal Aviation Administration International Civil Aviation Organization's (ICAO) Dangerous Goods Panel... meeting. SUMMARY: In preparation for the International Civil Aviation Organization's (ICAO) Dangerous... prepares for the International Civil Aviation Organization's Dangerous Goods Panel's (ICAO DGP's)...

  1. Hidden laser communications through matter. An application of meV-scale hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-04-15

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  2. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  3. Top of the Most Dangerous Food Parasites

    Directory of Open Access Journals (Sweden)

    A.A. Zaslavskaya

    2016-11-01

    Full Text Available According to the rating of the risk of infection by food parasites, which was published the World Health Organization (WHO and the Food Agriculture Organisation in 2014, cryptosporidiosis is on the 5th place. It is a parasitic protozoan disease, belongs to the genus Cryptosporidium type Apicomplexa. About 20 species of Cryptosporidium are revealed and known now. The incubation period of cryptosporidiosis lasts from 4 to 14 days. The main and most typical clinical manifestation of the disease — a profuse watery diarrhea, as well as clinically possible cryptosporidiosis of the biliary tract and broncho-pulmonary (respiratory cryptosporidiosis. Cryptosporidiosis diagnosis is based on laboratory studies of faeces (in vivo and pathological material (posthumously, taking into account epizootic, clinical and postmortem data. Causal treatment is not developed. But it is possible to control the diarrhea caused by this infection. Specific preventive management of cryptosporidiosis is not developed. Personal hygiene measures are necessary. The 6th most dangerous food parasitosis is Entamoeba histolytica. This intestinal protozoa disease is characterized by ulcerative lesions of the colon, chronic protracted course with the risk of the formation of abscesses in the liver and various organs. The causative agent of ame­biasis — Entamoeba histolytica — belongs to the genus Entamoeba, family Entamoebidae, the simplest type — Protozoa. According to the recommendations of the WHO Expert Committee (1970, there are three clinical forms of amebiasis: intestinal, extra-intestinal and skin. Diagnostic microscopy of the native smears of fresh feces in saline solution and smears stained with Lugol’s solution is carried out. In the presence of clinical signs of intestinal amebiasis and negative results of parasitological studies, serological tests are used based on the detection of specific antibodies against Entamoeba. There are several groups of drugs for

  4. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  5. Hidden History: A Mobile Application for Discovering Surrounding Landscapes

    OpenAIRE

    2016-01-01

    This thesis work describes the design, development and evaluation of a mobile application called Hidden History. This application lets users discover and explore three types of landscapes (Historic, Scenic and Cultural) using three different modes of discovery (Route, Explore and Tour). Before designing Hidden History, the feature set of other applications that help users explore surrounding landscapes were identified and analyzed. Hidden History was then designed to implement the best fea...

  6. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  7. ADAPTIVE LEARNING OF HIDDEN MARKOV MODELS FOR EMOTIONAL SPEECH

    Directory of Open Access Journals (Sweden)

    A. V. Tkachenia

    2014-01-01

    Full Text Available An on-line unsupervised algorithm for estimating the hidden Markov models (HMM parame-ters is presented. The problem of hidden Markov models adaptation to emotional speech is solved. To increase the reliability of estimated HMM parameters, a mechanism of forgetting and updating is proposed. A functional block diagram of the hidden Markov models adaptation algorithm is also provided with obtained results, which improve the efficiency of emotional speech recognition.

  8. Hidden Photons in Aharonov-Bohm-Type Experiments

    OpenAIRE

    Arias, Paola; Diaz, Christian; Diaz, Marco Aurelio; Jaeckel, Joerg; Koch, Benjamin; Redondo, Javier

    2016-01-01

    We discuss the Aharonov-Bohm effect in the presence of hidden photons kinetically mixed with the ordinary electromagnetic photons. The hidden photon field causes a slight phase shift in the observable interference pattern. It is then shown how the limited sensitivity of this experiment can be largely improved. The key observation is that the hidden photon field causes a leakage of the ordinary magnetic field into the supposedly field-free region. The direct measurement of this magnetic field ...

  9. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  10. The Climate Policy Narrative for a Dangerously Warming World

    Energy Technology Data Exchange (ETDEWEB)

    Sanford, Todd [Union of Concerned Scientists; Frumhoff, Peter [Union of Concerned Scientists; Luers, Amy [Skoll Global Threats Fund; Gulledge, Jay [ORNL

    2014-01-01

    It is time to acknowledge that global average temperatures will likely rise above the 2 C policy target and consider how that deeply troubling prospect should affect priorities for communicating and managing the risks of a dangerously warming climate.

  11. Dangerous Goods Transport Problems in the European Union and Poland

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2016-04-01

    Full Text Available The paper refers to threat assessment of dangerous goods (DG in transportation of the European Union and the Republic of Poland. Dangerous goods in the European Union are carried by inland waterways, rail and road. In Poland 87.5% of DG have been carried by road and 12.5% by rail in 2014. DG can cause an accident and lead to fires, explosions and chemical poisoning or burning with considerable harm to people and the environment. There is not monitoring system in Poland to control in real time road transportation of dangerous goods. Proposition of National System of Monitoring Dangerous Goods in Poland was presented. Realization of mentioned kind of system may significantly contribute to improving safety of people and environment.

  12. Too Few Women, Docs Understand Dangers of Heart Disease

    Science.gov (United States)

    ... html Too Few Women, Docs Understand Dangers of Heart Disease It kills more than all cancers combined, but ... 22, 2017 THURSDAY, June 22, 2017 (HealthDay News) -- Heart disease is the leading killer of U.S. women, but ...

  13. Drinking Peroxide as 'Natural' Cure Leads to Dangerous Blood Clots

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_163513.html Drinking Peroxide as 'Natural' Cure Leads to Dangerous Blood Clots ... 9, 2017 (HealthDay News) -- Ingesting high-concentration hydrogen peroxide as a "natural cure" or cleansing agent may ...

  14. How Older People Can Head Off Dangerous Drug Interactions

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_161150.html How Older People Can Head Off Dangerous Drug Interactions Taking multiple ... serious drug interactions are a daily threat to older people who take multiple medications and supplements, according to ...

  15. FDA to Weigh Dangers of Exploding E-Cigarettes

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_162849.html FDA to Weigh Dangers of Exploding E-Cigarettes Agency ... The Associated Press reported last month that the FDA had identified 66 instances of e-cigarette explosions ...

  16. male knowledge of danger signs of obstetric complications

    African Journals Online (AJOL)

    and cultural status in society. In addition to ... Keywords: Danger Signs in Pregnancy, Obstetric Complications, Male Knowledge ... documentation of this would be useful in designing ... Package for the Social Sciences version 16 with analysis.

  17. Danger Signals Activating the Immune Response after Trauma

    Directory of Open Access Journals (Sweden)

    Stefanie Hirsiger

    2012-01-01

    Full Text Available Sterile injury can cause a systemic inflammatory response syndrome (SIRS that resembles the host response during sepsis. The inflammatory response following trauma comprises various systems of the human body which are cross-linked with each other within a highly complex network of inflammation. Endogenous danger signals (danger-associated molecular patterns; DAMPs; alarmins as well as exogenous pathogen-associated molecular patterns (PAMPs play a crucial role in the initiation of the immune response. With popularization of the “danger theory,” numerous DAMPs and PAMPs and their corresponding pathogen-recognition receptors have been identified. In this paper, we highlight the role of the DAMPs high-mobility group box protein 1 (HMGB1, interleukin-1α (IL-1α, and interleukin-33 (IL-33 as unique dual-function mediators as well as mitochondrial danger signals released upon cellular trauma and necrosis.

  18. A critical investigation of dangerous goods procedures in logistics operations.

    OpenAIRE

    Wojtczuk, Kamil

    2012-01-01

    University of Nottingham “A critical investigation of dangerous goods procedures in logistics operations.” Kamil Wojtczuk MSc Logistics and Supply Chain Management   “A critical investigation of dangerous goods procedures in logistics operations.” by Kamil Wojtczuk 2011   Summary of dissertation This dissertation comprises five chapters and three appendixes. The dissertation starts with an introduction where all research objectives are placed. In the first...

  19. Thermal instability and runaway criteria: the dangers of disregarding dynamics

    CERN Document Server

    Ball, Rowena

    2012-01-01

    Two exemplary exothermic processes, synthesis of nitroglycerine in a continuous stirred tank reactor (CSTR) and synthesis of the explosive RDX in a CSTR, are used to demonstrate the dangers of ignoring the system dynamics when defining criteria for thermal criticality or runaway. Stability analyses are necessary to prescribe such criteria, and for these systems prove the presence of dangerous oscillatory thermal instability which cannot be detected using the steady state thermal balances.

  20. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  1. Critical scaling in hidden state inference for linear Langevin dynamics

    OpenAIRE

    Bravi, Barbara; Sollich, Peter

    2016-01-01

    We consider the problem of inferring the dynamics of unknown (i.e. hidden) nodes from a set of observed trajectories and we study analytically the average prediction error given by the Extended Plefka Expansion applied to it, as presented in [1]. We focus on a stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings in the infinite network size limit. The expected error on the hidden time courses can be found as the equal-time hidden-to-hidden cova...

  2. The semantic distinction between "risk" and "danger": a linguistic analysis.

    Science.gov (United States)

    Boholm, Max

    2012-02-01

    The analysis combines frame semantic and corpus linguistic approaches in analyzing the role of agency and decision making in the semantics of the words "risk" and "danger" (both nominal and verbal uses). In frame semantics, the meanings of "risk" and of related words, such as "danger," are analyzed against the background of a specific cognitive-semantic structure (a frame) comprising frame elements such as Protagonist, Bad Outcome, Decision, Possession, and Source. Empirical data derive from the British National Corpus (100 million words). Results indicate both similarities and differences in use. First, both "risk" and "danger" are commonly used to represent situations having potential negative consequences as the result of agency. Second, "risk" and "danger," especially their verbal uses (to risk, to endanger), differ in agent-victim structure, i.e., "risk" is used to express that a person affected by an action is also the agent of the action, while "endanger" is used to express that the one affected is not the agent. Third, "risk," but not "danger," tends to be used to represent rational and goal-directed action. The results therefore to some extent confirm the analysis of "risk" and "danger" suggested by German sociologist Niklas Luhmann. As a point of discussion, the present findings arguably have implications for risk communication.

  3. Social learning spreads knowledge about dangerous humans among American crows.

    Science.gov (United States)

    Cornell, Heather N; Marzluff, John M; Pecoraro, Shannon

    2012-02-07

    Individuals face evolutionary trade-offs between the acquisition of costly but accurate information gained firsthand and the use of inexpensive but possibly less reliable social information. American crows (Corvus brachyrhynchos) use both sources of information to learn the facial features of a dangerous person. We exposed wild crows to a novel 'dangerous face' by wearing a unique mask as we trapped, banded and released 7-15 birds at five study sites near Seattle, WA, USA. An immediate scolding response to the dangerous mask after trapping by previously captured crows demonstrates individual learning, while an immediate response by crows that were not captured probably represents conditioning to the trapping scene by the mob of birds that assembled during the capture. Later recognition of dangerous masks by lone crows that were never captured is consistent with horizontal social learning. Independent scolding by young crows, whose parents had conditioned them to scold the dangerous mask, demonstrates vertical social learning. Crows that directly experienced trapping later discriminated among dangerous and neutral masks more precisely than did crows that learned through social means. Learning enabled scolding to double in frequency and spread at least 1.2 km from the place of origin over a 5 year period at one site.

  4. Classification of dangers for personnel in underground mine operations

    Energy Technology Data Exchange (ETDEWEB)

    Ryncarz, T.

    1983-01-01

    As noted by the author, in Polish literature on mining, the dangers for personnel in underground operations are classified into natural and others; this separation is very approximate. It does not promote strict scientific analysis of the production dangers in mines. The concept ''danger in underground mining operations'' posed by the author is based on physical process of human interaction with the environment, where this process can have a harmful influence on the human body. A classification is proposed of dangers in underground mining operations depending on the three groups of factors: factors of the environment (lithosphere, atmosphere, technosphere); factors of the type of process (mechanical, thermal, substantial and other processes); factors determined by the nature of occurrence of the process (slow flow, sharp flow). A ''matrix of dangers'' is presented based on the indicated approach to the classification. Use of the matrix makes it possible to evaluate on a strictly scientific basis the factors of production danger in underground conditions and to develop effective measures to guarantee safety of personnel in the mines.

  5. Ancient origin of the new developmental superfamily DANGER.

    Directory of Open Access Journals (Sweden)

    Nikolas Nikolaidis

    Full Text Available Developmental proteins play a pivotal role in the origin of animal complexity and diversity. We report here the identification of a highly divergent developmental protein superfamily (DANGER, which originated before the emergence of animals (approximately 850 million years ago and experienced major expansion-contraction events during metazoan evolution. Sequence analysis demonstrates that DANGER proteins diverged via multiple mechanisms, including amino acid substitution, intron gain and/or loss, and recombination. Divergence for DANGER proteins is substantially greater than for the prototypic member of the superfamily (Mab-21 family and other developmental protein families (e.g., WNT proteins. DANGER proteins are widely expressed and display species-dependent tissue expression patterns, with many members having roles in development. DANGER1A, which regulates the inositol trisphosphate receptor, promotes the differentiation and outgrowth of neuronal processes. Regulation of development may be a universal function of DANGER family members. This family provides a model system to investigate how rapid protein divergence contributes to morphological complexity.

  6. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  7. Error statistics of hidden Markov model and hidden Boltzmann model results

    Science.gov (United States)

    Newberg, Lee A

    2009-01-01

    Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results. PMID:19589158

  8. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  9. OFDM System Channel Estimation with Hidden Pilot

    Institute of Scientific and Technical Information of China (English)

    YANG Feng; LIN Cheng-yu; ZHANG Wen-jun

    2007-01-01

    Channel estimation using pilot is common used in OFDM system. The pilot is usually time division multiplexed with the informative sequence. One of the main drawbacks is bandwidth losing. In this paper, a new method was proposed to perform channel estimation in OFDM system. The pilot is arithmetically added to the output of OFDM modulator. Receiver uses the hidden pilot to get an accurate estimation of the channel. Then pilot is removed after channel estimation. The Cramer-Rao lower bound for this method was deprived. The performance of the algorithm is then shown. Compared with traditional methods, the proposed algorithm increases the bandwidth efficiency dramatically.

  10. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  11. Hidden photon CDM search at Tokyo

    CERN Document Server

    Suzuki, Jun'ya; Horie, Tomoki; Minowa, Makoto

    2015-01-01

    We report on a search for hidden photon cold dark matter (HP CDM) using a novel technique with a dish antenna. We constructed two independent apparatus: one is aiming at the detection of the HP with a mass of $\\sim\\,\\rm{eV}$ which employs optical instruments, and the other is for a mass of $\\sim5\\times10^{-5}\\, \\rm{eV}$ utilizing a commercially available parabolic antenna facing on a plane reflector. From the result of the measurements, we found no evidence for the existence of HP CDM and set upper limits on the photon-HP mixing parameter $\\chi$.

  12. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  13. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  14. Scaling dimensions in hidden Kerr/CFT

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2011-01-01

    It has been proposed that a hidden conformal field theory (CFT) governs the dynamics of low frequency scattering in a general Kerr black hole background. We further investigate this correspondence by mapping higher order corrections to the massless wave equations in a Kerr background to an expansion within the CFT in terms of higher dimension operators. This implies the presence of infinite towers of CFT primary operators with positive conformal dimensions compatible with unitarity. The exact Kerr background softly breaks the conformal symmetry and the scaling dimensions of these operators run with frequency. The scale-invariant fixed point is dual to a degenerate case of flat spacetime.

  15. Hidden Kerr/CFT at finite frequencies

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2013-01-01

    Massless fields propagating in a generic Kerr black hole background enjoy a hidden SL(2,R)xSL(2,R) symmetry. We determine how the exact mode functions decompose into representations of this symmetry group. This extends earlier results on the low frequency limit of the massless scalar case to finite frequencies and general spin. As an application, we numerically determine the parameters of the representations that appear in quasinormal modes. These results represent a first step to formulating a more precise mapping to a holographic dual conformal field theory for generic black holes.

  16. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  17. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  18. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  19. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The locations of the breaks are subsequently obtained by assigning states to data points according to the Maximum Posterior Mode (MPM) algorithm. The Integrated Classification Likelihood-Bayesian Information Criterion (ICL-BIC) allows for the determination of the number of regimes by taking into account...... in the monetary policy of United States, the dierent functional form being variants of the Taylor (1993) rule....

  20. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  1. The perception of the hidden curriculum on medical education: an exploratory study

    Directory of Open Access Journals (Sweden)

    Murakami Manabu

    2009-12-01

    Full Text Available Abstract Background Major curriculum reform of undergraduate medical education occurred during the past decades in the United Kingdom (UK; however, the effects of the hidden curriculum, which influence the choice of primary care as a career, have not been sufficiently recognized. While Japan, where traditionally few institutions systematically foster primary care physicians and very few have truly embraced family medicine as their guiding discipline, has also experienced meaningful curriculum reform, the effect of the hidden curriculum is not well known. The aim of this study is to identify themes pertaining to the students' perceptions of the hidden curriculum affecting undergraduate medical education in bedside learning in Japan. Methods Semi-structured interviews with thematic content analysis were implemented. Undergraduate year-5 students from a Japanese medical school at a Japanese teaching hospital were recruited. Interview were planned to last between 30 to 60 minutes each, over an 8-month period in 2007. The interviewees' perceptions concerning the quality of teaching in their bedside learning and related experiences were collected and analysed thematically. Results Twenty five medical students (18 males and 7 females, mean age 25 years old consented to participate in the interviews, and seven main themes emerged: "the perception of education as having a low priority," "the prevalence of positive/negative role models," "the persistence of hierarchy and exclusivity," "the existence of gender issues," "an overburdened medical knowledge," "human relationships with colleagues and medical team members," and "first experience from the practical wards and their patients." Conclusions Both similarities and differences were found when comparing the results to those of previous studies in the UK. Some effects of the hidden curriculum in medical education likely exist in common between the UK and Japan, despite the differences in their demographic

  2. Danger-associated molecular patterns and danger signals in idiopathic pulmonary fibrosis.

    Science.gov (United States)

    Ellson, Christian D; Dunmore, Rebecca; Hogaboam, Cory M; Sleeman, Matthew A; Murray, Lynne A

    2014-08-01

    The chronic debilitating lung disease, idiopathic pulmonary fibrosis (IPF), is characterized by a progressive decline in lung function, with a median mortality rate of 2-3 years after diagnosis. IPF is a disease of unknown cause and progression, and multiple pathways have been demonstrated to be activated in the lungs of these patients. A recent genome-wide association study of more than 1,000 patients with IPF identified genes linked to host defense, cell-cell adhesion, and DNA repair being altered due to fibrosis (Fingerlin, et al. Nat Genet 2013;45:613-620). Further emerging data suggest that the respiratory system may not be a truly sterile environment, and it exhibits an altered microbiome during fibrotic disease (Molyneaux and Maher. Eur Respir Rev 2013;22:376-381). These altered host defense mechanisms might explain the increased susceptibility of patients with IPF to microbial- and viral-induced exacerbations. Moreover, chronic epithelial injury and apoptosis are key features in IPF, which might be mediated, in part, by both pathogen-associated (PA) and danger-associated molecular patterns (MPs). Emerging data indicate that both PAMPs and danger-associated MPs contribute to apoptosis, but not necessarily in a manner that allows for the removal of dying cells, without further exacerbating inflammation. In contrast, both types of MPs drive cellular necrosis, leading to an exacerbation of lung injury and/or infection as the debris promotes a proinflammatory response. Thus, this Review focuses on the impact of MPs resulting from infection-driven apoptosis and necrosis during chronic fibrotic lung disease.

  3. Women's hidden transcripts about abortion in Brazil.

    Science.gov (United States)

    Nations, M K; Misago, C; Fonseca, W; Correia, L L; Campbell, O M

    1997-06-01

    Two folk medical conditions, "delayed" (atrasada) and "suspended" (suspendida) menstruation, are described as perceived by poor Brazilian women in Northeast Brazil. Culturally prescribed methods to "regulate" these conditions and provoke menstrual bleeding are also described, including ingesting herbal remedies, patent drugs, and modern pharmaceuticals. The ingestion of such self-administered remedies is facilitated by the cognitive ambiguity, euphemisms, folklore, etc., which surround conception and gestation. The authors argue that the ethnomedical conditions of "delayed" and "suspended" menstruation and subsequent menstrual regulation are part of the "hidden reproductive transcript" of poor and powerless Brazilian women. Through popular culture, they voice their collective dissent to the official, public opinion about the illegality and immorality of induced abortion and the chronic lack of family planning services in Northeast Brazil. While many health professionals consider women's explanations of menstrual regulation as a "cover-up" for self-induced abortions, such popular justifications may represent either an unconscious or artful manipulation of hegemonic, anti-abortion ideology expressed in prudent, unobtrusive and veiled ways. The development of safer abortion alternatives should consider women's hidden reproductive transcripts.

  4. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  5. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  6. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  7. Quantum Hidden Subgroup Problems A Mathematical Perspective

    CERN Document Server

    Lomonaco, S J; Lomonaco, Samuel J.; Kauffman, Louis H.

    2002-01-01

    The ultimate objective of this paper is to create a stepping stone to the development of new quantum algorithms. The strategy chosen is to begin by focusing on the class of abelian quantum hidden subgroup algorithms, i.e., the class of abelian algorithms of the Shor/Simon genre. Our strategy is to make this class of algorithms as mathematically transparent as possible. By the phrase "mathematically transparent" we mean to expose, to bring to the surface, and to make explicit the concealed mathematical structures that are inherently and fundamentally a part of such algorithms. In so doing, we create symbolic abelian quantum hidden subgroup algorithms that are analogous to the those symbolic algorithms found within such software packages as Axiom, Cayley, Maple, Mathematica, and Magma. As a spin-off of this effort, we create three different generalizations of Shor's quantum factoring algorithm to free abelian groups of finite rank. We refer to these algorithms as wandering (or vintage Z_Q) Shor algorithms. They...

  8. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  9. Hidden charm molecules in finite volume

    CERN Document Server

    Albaladejo, Miguel; Nieves, Juan; Oset, Eulogio

    2013-01-01

    In the present paper we address the interaction of pairs of charmed mesons with hidden charm in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and from them some synthetic data are generated. These data are then employed to study the inverse problem of getting the energies of the bound states and phase shifts for $D \\bar D$ or $D^* {\\bar D}^*$. Different strategies are investigated using the lowest two levels for different values of the box size, carrying a study of the errors produced. Starting from the upper level, fits to the synthetic data are carried out to determine the scattering length and effective range plus the binding energy of the ground state. A similar strategy using the effective range formula is considered with a simultaneous fit to the two levels, one above and the other one below threshold. This method turns out to be more...

  10. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  11. Bayesian structural inference for hidden processes.

    Science.gov (United States)

    Strelioff, Christopher C; Crutchfield, James P

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ε-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ε-machines, irrespective of estimated transition probabilities. Properties of ε-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  12. The sounds of safety: Stress and danger in music perception

    Directory of Open Access Journals (Sweden)

    Thomas eSchäfer

    2015-08-01

    Full Text Available As with any sensory input, music might be expected to incorporate the processing of information about the safety of the environment. Little research has been done on how such processing has evolved and how different kinds of sounds may affect the experience of certain environments. In this article, we investigate if music, as a form of auditory information, can trigger the experience of safety. We hypothesized that (1 there should be an optimal, subjectively preferred degree of information density of musical sounds, at which safety-related information can be processed optimally; (2 any deviation from the optimum, that is, both higher and lower levels of information density, should elicit experiences of higher stress and danger; and (3 in general, sonic scenarios with music should reduce experiences of stress and danger more than other scenarios. In Experiment 1, the information density of short music-like rhythmic stimuli was manipulated via their tempo. In an initial session, listeners adjusted the tempo of the stimuli to what they deemed an appropriate tempo. In an ensuing session, the same listeners judged their experienced stress and danger in response to the same stimuli, as well as stimuli exhibiting tempo variants. Results are consistent with the existence of an optimum information density for a given rhythm; the preferred tempo decreased for increasingly complex rhythms. The hypothesis that any deviation from the optimum would lead to experiences of higher stress and danger was only partly fit by the data. In Experiment 2, listeners should indicate their experience of stress and danger in response to different sonic scenarios: music, natural sounds, and silence. As expected, the music scenarios were associated with lowest stress and danger whereas both natural sounds and silence resulted in higher stress and danger. Overall, the results largely fit the hypothesis that music seemingly carries safety-related information about the

  13. The sounds of safety: stress and danger in music perception.

    Science.gov (United States)

    Schäfer, Thomas; Huron, David; Shanahan, Daniel; Sedlmeier, Peter

    2015-01-01

    As with any sensory input, music might be expected to incorporate the processing of information about the safety of the environment. Little research has been done on how such processing has evolved and how different kinds of sounds may affect the experience of certain environments. In this article, we investigate if music, as a form of auditory information, can trigger the experience of safety. We hypothesized that (1) there should be an optimal, subjectively preferred degree of information density of musical sounds, at which safety-related information can be processed optimally; (2) any deviation from the optimum, that is, both higher and lower levels of information density, should elicit experiences of higher stress and danger; and (3) in general, sonic scenarios with music should reduce experiences of stress and danger more than other scenarios. In Experiment 1, the information density of short music-like rhythmic stimuli was manipulated via their tempo. In an initial session, listeners adjusted the tempo of the stimuli to what they deemed an appropriate tempo. In an ensuing session, the same listeners judged their experienced stress and danger in response to the same stimuli, as well as stimuli exhibiting tempo variants. Results are consistent with the existence of an optimum information density for a given rhythm; the preferred tempo decreased for increasingly complex rhythms. The hypothesis that any deviation from the optimum would lead to experiences of higher stress and danger was only partly fit by the data. In Experiment 2, listeners should indicate their experience of stress and danger in response to different sonic scenarios: music, natural sounds, and silence. As expected, the music scenarios were associated with lowest stress and danger whereas both natural sounds and silence resulted in higher stress and danger. Overall, the results largely fit the hypothesis that music seemingly carries safety-related information about the environment.

  14. Hidden disbond detection in spent nuclear fuel storage systems using air-coupled ultrasonics

    Science.gov (United States)

    Song, Homin; Popovics, John S.

    2016-04-01

    This paper studies an air-coupled ultrasonic scanning approach for damage assessment in steel-clad concrete structures. An air-coupled ultrasonic sender generates guided plate waves in the steel cladding and a small contact-type receiver measures the corresponding wave responses. A frequency-wavenumber (f-k) domain signal filtering technique is used to isolate the behavior of the fundamental symmetric (S0) mode of the guided plate waves. The behavior of the S0 mode is sensitive to interface bonding conditions. The proposed inspection approach is verified by a series of experiments performed on laboratory-scale specimens. The experimental results demonstrate that hidden disbond between steel cladding and underlying concrete substrate can be successfully detected with the ultrasonic test setup and the f-k domain signal filtering technique.

  15. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    Decker, T.; Draisma, J.; Wocjan, P.

    2009-01-01

    We consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be m-variate po

  16. Hidden attractor in the Rabinovich system, Chua circuits and PLL

    Science.gov (United States)

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Seledzhi, S. M.

    2016-06-01

    In this report the existence of hidden attractors in Rabinovich system, phase-locked loop and coupled Chua circuits is considered. It is shown that the existence of hidden attractors may complicate the analysis of the systems and significantly affect the synchronization.

  17. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  18. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  19. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  20. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  1. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in Seuss's…

  2. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  3. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  4. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  5. Secluded Dark Matter Coupled to a Hidden CFT

    CERN Document Server

    von Harling, Benedict

    2012-01-01

    Models of secluded dark matter offer a variant on the standard WIMP picture and can modify our expectations for hidden sector phenomenology and detection. In this work we extend a minimal model of secluded dark matter, comprised of a U(1)'-charged dark matter candidate, to include a confining hidden-sector CFT. This provides a technically natural explanation for the hierarchically small mediator-scale, with hidden-sector confinement generating m_{gamma'}>0. Furthermore, the thermal history of the universe can differ markedly from the WIMP picture due to (i) new annihilation channels, (ii) a (potentially) large number of hidden-sector degrees of freedom, and (iii) a hidden-sector phase transition at temperatures T << M_{dm} after freeze out. The mediator allows both the dark matter and the Standard Model to communicate with the CFT, thus modifying the low-energy phenomenology and cosmic-ray signals from the secluded sector.

  6. Abelian Hidden Sectors at a GeV

    Energy Technology Data Exchange (ETDEWEB)

    Morrissey, David E.; Poland, David; /Harvard U.; Zurek, Kathryn; /Fermilab /Michigan U.

    2009-04-16

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1){sub x} gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  7. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  8. Gauge Coupling Unification with Hidden Photon, and Minicharged Dark Matter

    CERN Document Server

    Daido, Ryuji; Yokozaki, Norimi

    2016-01-01

    We show that gauge coupling unification is realized with a greater accuracy in the presence of a massless hidden photon which has a large kinetic mixing with hypercharge. We solve the renormalization group equations at two-loop level and find that the GUT unification scale is around $10^{16.5}$ GeV which sufficiently suppresses the proton decay rate, and that the unification depends only on the kinetic mixing, but not on the hidden gauge coupling nor the presence of vector-like matter fields charged under U(1)$_H$ and/or SU(5). Matter fields charged under the unbroken hidden U(1)$_H$ are stable and they contribute to dark matter. Interestingly, they become minicharged dark matter which carries a small but non-zero electric charge, if the hidden gauge coupling is tiny. The minicharged dark matter is a natural outcome of the gauge coupling unification with a hidden photon.

  9. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  10. Traffic crash liability determination: Danger and Dodge model.

    Science.gov (United States)

    Xu, Sikui; Huang, Helai

    2016-10-01

    By proposing a systematic set of rules for traffic crash liability determination, this paper attempts to prove the feasibility and practicability of legal liability in handling traffic crashes. Two sequential elements are identified for crash occurrence, i.e., the occurrence of a dangerous situation and failure in dodging the dangerous situation. A Danger and Dodge model is subsequently established for liability determination in a traffic crash. By investigating the basic mechanism of a crash occurrence, the specific contents of causalties and the effect of the parties' acts in traffic crashes are specified. Based on the theories of social adequancy, the principle of reliance and the duty of care, the study further proposes to use the "peril" of a dangerous situation and the "possibility" of dodging the dangerous situation to appraise the effect of the parties' acts upon a crash occurrence, with the rule of the "pattern deciding effect". The proposed approach would be very helpful to the concreteness of the determination of liability in a traffic crash. Two case studies are presented for demonstration.

  11. Differing types of cellular phone conversations and dangerous driving.

    Science.gov (United States)

    Dula, Chris S; Martin, Benjamin A; Fox, Russell T; Leonard, Robin L

    2011-01-01

    This study sought to investigate the relationship between cell phone conversation type and dangerous driving behaviors. It was hypothesized that more emotional phone conversations engaged in while driving would produce greater frequencies of dangerous driving behaviors in a simulated environment than more mundane conversation or no phone conversation at all. Participants were semi-randomly assigned to one of three conditions: (1) no call, (2) mundane call, and, (3) emotional call. While driving in a simulated environment, participants in the experimental groups received a phone call from a research confederate who either engaged them in innocuous conversation (mundane call) or arguing the opposite position of a deeply held belief of the participant (emotional call). Participants in the no call and mundane call groups differed significantly only on percent time spent speeding and center line crossings, though the mundane call group consistently engaged in more of all dangerous driving behaviors than did the no call participants. Participants in the emotional call group engaged in significantly more dangerous driving behaviors than participants in both the no call and mundane call groups, with the exception of traffic light infractions, where there were no significant group differences. Though there is need for replication, the authors concluded that whereas talking on a cell phone while driving is risky to begin with, having emotionally intense conversations is considerably more dangerous.

  12. 33 CFR 334.350 - Chesapeake Bay off Fort Monroe, Va.; firing range danger zone.

    Science.gov (United States)

    2010-07-01

    ..., Va.; firing range danger zone. 334.350 Section 334.350 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA REGULATIONS § 334.350 Chesapeake Bay off Fort Monroe, Va.; firing range danger zone. (a) The danger zone. All of...

  13. 33 CFR 334.1360 - Pacific Ocean at Barber's Point, Island of Oahu, Hawaii; danger zone.

    Science.gov (United States)

    2010-07-01

    ..., Island of Oahu, Hawaii; danger zone. 334.1360 Section 334.1360 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA REGULATIONS § 334.1360 Pacific Ocean at Barber's Point, Island of Oahu, Hawaii; danger zone. (a) The danger zone....

  14. 33 CFR 334.1350 - Pacific Ocean, Island of Oahu, Hawaii; danger zone.

    Science.gov (United States)

    2010-07-01

    ..., Hawaii; danger zone. 334.1350 Section 334.1350 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA REGULATIONS § 334.1350 Pacific Ocean, Island of Oahu, Hawaii; danger zone. (a) The danger zone. Beginning at point of origin at...

  15. 33 CFR 334.1370 - Pacific Ocean at Keahi Point, Island of Oahu, Hawaii; danger zone.

    Science.gov (United States)

    2010-07-01

    ..., Island of Oahu, Hawaii; danger zone. 334.1370 Section 334.1370 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA REGULATIONS § 334.1370 Pacific Ocean at Keahi Point, Island of Oahu, Hawaii; danger zone. (a) The danger zone. The...

  16. 10 CFR 1048.4 - Unauthorized introduction of weapons or dangerous materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Unauthorized introduction of weapons or dangerous... PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.4 Unauthorized introduction of weapons or dangerous... facility or real property subject to this part, of a dangerous weapon, explosive or other dangerous...

  17. 46 CFR 154.1015 - Lighting in gas-dangerous space.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Lighting in gas-dangerous space. 154.1015 Section 154... Equipment Electrical § 154.1015 Lighting in gas-dangerous space. (a) Each gas-dangerous space that has... protective device for any lighting circuit that is in a gas-dangerous space must open each conductor of...

  18. Deployment Guide

    Science.gov (United States)

    1994-02-01

    family/unit briefings (to include POA/wills/ consumer law /insurance war clauses) - Provide fill-in-blank sheets to send coordinators of pre- deployment...services. 2. SGLI designations and "By Law" implications. 3. Wills for both spouses. 4. Powers of Attorney. 5. Consumer law issues. 1-7 B. Typically...Relief Act JA 261 Real Property Guide JA 262 Wills Guide JA 263 Family Law Guide JA 265 Consumer Law Guide JA 267 Legal Assistance Office Directory

  19. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  20. The return of the dangerous man. Reflections on the idea of dangerousness and its uses

    Directory of Open Access Journals (Sweden)

    Martine Kaluszynski

    2010-02-01

    Full Text Available In France, the re-emergence of the notion of dangerousness in the process of law making has rendered it necessary to elaborate on the objectives of political actors. (Act on the Retention of Safety and the Declaration of Criminal Irresponsibility Due to Mental Disorder, 25 February 2008., Act of August 10, 2007 Strengthening the Fight Against Recidivism in Adults and Minors  The aim of this article is to analyse the social construction of this notion through the criminological discourse prevalent at the end of the XIXth century. The Third Republic was preoccupied with the question of recidivism, fearing degeneration and a declining birth rate, and was seduced by another notion emerging at this time: eugenism. Contemporary law making has reactivated a historical heritage based on extreme measures that have derived from these concepts. Based on a socio-historical approach, this article attempts to understand the mechanisms of governance in a republican society, as well as the influence of these mechanisms in the production of legal, political, moral and societal norms.

  1. Threats and Dangers in Activity of the Tourism Sector Enterprises

    Directory of Open Access Journals (Sweden)

    Markina Iryna А.

    2015-03-01

    Full Text Available The aim of the article is to investigate the threats and dangers that affect not only the management system of the tourism sector enterprises, but their safety as well. By analyzing, systematizing and summarizing the scientific works of many scientists, the essence of the concepts of “danger” and “threat” has been considered, and the classification of dangers and threats faced by tourism enterprises in an unstable environment has been carried out. As a result of the research there have been identified the main threats and dangers peculiar for subjects of tourist activity that occur in the process of operation of tourism enterprises and deficiencies in the management of material, information, human, financial and other resources of tourism enterprises. The main prospect for further research in this area is to identify the potential directions for minimizing the risks and threats that ensure not only the appropriate level of the tourism enterprise competitiveness, but its development as well.

  2. Warning against the dangers of wildfires in the Czech Republic

    Science.gov (United States)

    Mozny, M.; Bares, D.; Virag, M.; Stalmacher, J.

    2009-04-01

    Many fire risk models have been developed for various temporal and spatial scales and application purposes. The integrated warning service in the Czech Republic is used for wildfire risk assessment model of FDI (Fire Danger Index). The FDI model is being developed in the Doksany observatory based on evaluation of weather conditions. FDI model describes danger of wildfire for vegetation covered countryside. There are five levels of danger: 1 - very low risk, 2 - low risk, 3 - moderate risk, 4 - high risk, 5 - very high risk. Simply say higher index value, reflects to higher risk of wildfire. As input data, the model uses measured values from the Czech Hydrometeorological Institute stations network as well as ALADIN's model predicted conditions. The modelling process computes upper soil profile moisture, surface moistening and the spreading speed of fire. Early warning system for wildfires prevention in the Czech Republic is used since 2006.

  3. Assessing Danger Degree of Soil Erosion in Rikaze Prefecture, Tibet

    Institute of Scientific and Technical Information of China (English)

    CHEN Xuehua; ZHOU Jianzhong; ZHOU Hongyi

    2007-01-01

    Ten indicators were selected in the present paper concerns current status of soil erosion and its driving forces. Synthesized evaluation model on danger degree of soil erosion (DDSE) was built and estimation on DDSE in Rikaze was carried out by analytical hierarchy process (AHP). This evaluation model selected indicators scientifically and reasonably, which are easy to be caught, and played well in application. Results showed that a light erosion danger degree exists in Nanmulin, Xietongmen and Angren; Dingri, Sajia, Saga, Zhongba; Nielamu, Gangba, Kangma and Rikaze County share a moderate danger degree, while other counties own severe erosion, especially Dingjie and Lazi County. Ecological environment in Rikaze is frangible. Therefore, eco-restoration and corresponding countermeasures are urgently needed in this region to guarantee a regional eco-environment healthy.

  4. The potential predictability of fire danger provided by ECMWF forecast

    Science.gov (United States)

    Di Giuseppe, Francesca

    2017-04-01

    The European Forest Fire Information System (EFFIS), is currently being developed in the framework of the Copernicus Emergency Management Services to monitor and forecast fire danger in Europe. The system provides timely information to civil protection authorities in 38 nations across Europe and mostly concentrates on flagging regions which might be at high danger of spontaneous ignition due to persistent drought. The daily predictions of fire danger conditions are based on the US Forest Service National Fire Danger Rating System (NFDRS), the Canadian forest service Fire Weather Index Rating System (FWI) and the Australian McArthur (MARK-5) rating systems. Weather forcings are provided in real time by the European Centre for Medium range Weather Forecasts (ECMWF) forecasting system. The global system's potential predictability is assessed using re-analysis fields as weather forcings. The Global Fire Emissions Database (GFED4) provides 11 years of observed burned areas from satellite measurements and is used as a validation dataset. The fire indices implemented are good predictors to highlight dangerous conditions. High values are correlated with observed fire and low values correspond to non observed events. A more quantitative skill evaluation was performed using the Extremal Dependency Index which is a skill score specifically designed for rare events. It revealed that the three indices were more skilful on a global scale than the random forecast to detect large fires. The performance peaks in the boreal forests, in the Mediterranean, the Amazon rain-forests and southeast Asia. The skill-scores were then aggregated at country level to reveal which nations could potentiallty benefit from the system information in aid of decision making and fire control support. Overall we found that fire danger modelling based on weather forecasts, can provide reasonable predictability over large parts of the global landmass.

  5. Exposing the hidden curriculum influencing medical education on the health of Indigenous people in Australia and New Zealand: the role of the Critical Reflection Tool.

    Science.gov (United States)

    Ewen, Shaun; Mazel, Odette; Knoche, Debra

    2012-02-01

    The disparity in health status between Indigenous and non-Indigenous people in Australia and New Zealand is widely known, and efforts to address this through medical education are evidenced by initiatives such as the Committee of Deans of Australian Medical Schools' Indigenous Health Curriculum Framework. These efforts have focused primarily on formal curriculum reform. In this article, the authors discuss the role of the hidden curriculum in influencing the teaching and learning of Indigenous health (i.e., the health of Indigenous people) during medical training and suggest that in order to achieve significant changes in learning outcomes, there needs to be better alignment of the formal and hidden curriculum. They describe the Critical Reflection Tool as a potential resource through which educators might begin to identify the dimensions of their institution's hidden curricula. If used effectively, the process may guide institutions to better equip medical school graduates with the training necessary to advance changes in Indigenous health.

  6. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  7. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  8. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  9. Grand unified hidden-sector dark matter

    Science.gov (United States)

    Lonsdale, Stephen J.; Volkas, Raymond R.

    2014-10-01

    We explore G×G unified theories with the visible and the hidden or dark sectors paired under a Z2 symmetry. Developing a system of "asymmetric symmetry breaking" we motivate such models on the basis of their ability to generate dark baryons that are confined with a mass scale just above that of the proton, as motivated by asymmetric dark matter. This difference is achieved from the distinct but related confinement scales that develop in unified theories that have the two factors of G spontaneously breaking in an asymmetric manner. We show how Higgs potentials that admit different gauge group breaking chains in each sector can be constructed, and demonstrate the capacity for generating different fermion mass scales. Lastly we discuss supersymmetric extensions of such schemes.

  10. Hidden caries’ challenge diagnosis: case report

    Directory of Open Access Journals (Sweden)

    Fernanda Mara de Paiva Bertoli

    2013-06-01

    Full Text Available Introduction: Hidden caries is a term used to describe occlusal dentine caries that is missed on a visual examination, but is large and demineralised enough to be detected by another exam for example, radiographs. Case report: This article reports a case of large dentine caries, which presented as to be a small pit-and-fissure carious lesion on the occlusal surface of the right mandibular permanent first molar in a 10-year-old girl. The treatment included root canal treatment and the sealing of the cavity with composite resin. Conclusion: Careful visual examination, with cleaning and drying of teeth, associated to bitewing radiographs may improve occlusal caries detection. Dentists should examine bitewing radiographs carefully for proximal caries and occlusal demineralization. Radiographs are an effective method of caries diagnosis that can avoid large destruction and allows less invasive treatment.

  11. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  12. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  13. Nuclear scissors modes and hidden angular momenta

    CERN Document Server

    Balbutsev, E B; Schuck, P

    2016-01-01

    The coupled dynamics of low lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time Dependent Hartree-Fock-Bogoliubov equations. The model of the harmonic oscillator including spin-orbit potential plus quadrupole-quadrupole and spin-spin interactions is considered. New low lying spin dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  14. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school......Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...

  15. Hidden baryons: The physics of Compton composites

    Science.gov (United States)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  16. Hidden realities inside PBL design processes

    DEFF Research Database (Denmark)

    Pihl, Ole Verner

    2015-01-01

    Design Process, but is a group-based architecture and design education better than that which is individually based? How does PBL affect space, form, and creative processes? Hans Kiib, professor and one of the founders of the Department of Architecture and Design in Aalborg, describes his intentions...... within the group work, as it is closer related to the actual PBL process”. Is the Integrated Design Process (Knudstrup 2004) and is Colb (1975) still current and valid? Can we still use these methodologies when we must create “learning for an unknown future,” as Ronald Barnett (2004) claims that we...... investigates the creative processes of the collective and the individual and clarifies some of the hidden realities behind the PBL-based creative processes, both through an inquiry with the students and a more methodological and theoretical approach. The paper also explores how to integrate artistic...

  17. Aluminium Diphosphamethanides: Hidden Frustrated Lewis Pairs.

    Science.gov (United States)

    Styra, Steffen; Radius, Michael; Moos, Eric; Bihlmeier, Angela; Breher, Frank

    2016-07-04

    The synthesis and characterisation of two aluminium diphosphamethanide complexes, [Al(tBu)2 {κ(2) P,P'-Mes*PCHPMes*}] (3) and [Al(C6 F5 )2 {κ(2) P,P'-Mes*PCHPMes*}] (4), and the silylated analogue, Mes*PCHP(SiMe3 )Mes* (5), are reported. The aluminium complexes feature four-membered PCPAl core structures consisting of diphosphaallyl ligands. The silylated phosphine 5 was found to be a valuable precursor for the synthesis of 4 as it cleanly reacts with the diaryl aluminium chloride [(C6 F5 )2 AlCl]2 . The aluminium complex 3 reacts with molecular dihydrogen at room temperature under formation of the acyclic σ(2) λ(3) ,σ(3) λ(3) -diphosphine Mes*PCHP(H)Mes* and the corresponding dialkyl aluminium hydride [tBu2 AlH]3 . Thus, 3 belongs to the family of so-called hidden frustrated Lewis pairs.

  18. Wavelet domain hidden markovian bayesian document segmentation

    Institute of Scientific and Technical Information of China (English)

    Sun Junxi; Xiao Changyan; Zhang Su; Chen Yazhu

    2005-01-01

    A novel algorithm for Bayesian document segmentation is proposed based on the wavelet domain hidden Markov tree (HMT) model. Once the parameters of model are known, according to the sequential maximum a posterior probability (SMAP) rule, firstly, the likelihood probability of HMT model for each pattern is computed from fine to coarse procedure. Then, the interscale state transition probability is solved using Expectation Maximum (EM) algorithm based on hybrid-quadtree and multiscale context information is fused from coarse to fine procedure. In order to get pixellevel segmentation, the redundant wavelet domain Gaussian mixture model (GMM) is employed to formulate pixel-level statistical property. The experiment results show that the proposed scheme is feasible and robust.

  19. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  20. Hidden fungi, emergent properties: endophytes and microbiomes.

    Science.gov (United States)

    Porras-Alfaro, Andrea; Bayman, Paul

    2011-01-01

    Endophytes are microorganisms that live within plant tissues without causing symptoms of disease. They are important components of plant microbiomes. Endophytes interact with, and overlap in function with, other core microbial groups that colonize plant tissues, e.g., mycorrhizal fungi, pathogens, epiphytes, and saprotrophs. Some fungal endophytes affect plant growth and plant responses to pathogens, herbivores, and environmental change; others produce useful or interesting secondary metabolites. Here, we focus on new techniques and approaches that can provide an integrative understanding of the role of fungal endophytes in the plant microbiome. Clavicipitaceous endophytes of grasses are not considered because they have unique properties distinct from other endophytes. Hidden from view and often overlooked, endophytes are emerging as their diversity, importance for plant growth and survival, and interactions with other organisms are revealed.

  1. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  2. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  3. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments.

  4. 2012 drug packaging review: many dangerous, reportable flaws.

    Science.gov (United States)

    2013-05-01

    Drug packaging plays an important role in protecting and providing information to patients. The packaging examined by Prescrire in 2012, on the whole, still fails to perform all of these functions effectively. Two issues are especially worrisome. First, packaging too often poses a danger to children. In addition, too many patient leaflets provide incomplete information about adverse effects, thus failing to properly protect the most vulnerable patients. Yet, the method Prescrire used to analyse drug packaging shows that it is not difficult to detect and anticipate risks. It is up to healthcare professionals to take advantage of the method, to protect patients from, and report, dangerous packaging.

  5. [Responsibilities of enterprises introducing new dangerous chemical substances and preparations].

    Science.gov (United States)

    Cieśla, Jacek; Majka, Jerzy

    2004-01-01

    The paper reviews the responsibilities of producers, importers and distributors set in a new Act of January 2001 on chemical substances and preparations (Off. J. 2001, No. 11, item 84, with subsequent amendments). This Act together with executive provisions is aimed at harmonizing Polish legislation with EU requirements. The Act sets conditions, restriction and bans of production placing on the market and use of chemical substances and preparations in order to protect human health and environment against their harmful effects. The Act together with a number of executive provisions render those who introduce dangerous chemicals and chemical preparations, including distributors responsible for: classification and labelling of dangerous chemical substances and preparations; possessing, making available and up-dating safety data sheets; supplying packages containing certain dangerous substances with child-proof fastenings; notifying the Inspector for Chemical Substances and Preparations about placing a dangerous preparation on the market; notifying the Inspector about a new substance and conducting required studies; being properly qualified to handle dangerous substances. The Act strictly defines the term "placing a substance or a preparation on the market"--it means making a substance or a preparation available to third parties on the territory of The Republic of Poland, territories of the Member States of the European Union or the territory of Iceland, Liechtenstein and Norway, unless the Act provides otherwise; it also means introduction of a substance or a preparation from outside of the territory referred to above on the customs territory of The Republic of Poland, or that of the member states of the European Union and other states listed above. In addition, some of the responsibilities defined by the provisions of the law on chemical substances and preparations are also applicable to handling of biocidals, which are classified as dangerous substances. The Act

  6. Using HPGe detector for a solar hidden-photons search

    CERN Document Server

    Horvat, R; Krcmar, M; Krecak, Z; Ljubicic, A

    2012-01-01

    In this paper we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory, by observing the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, leads to both photon into hidden states oscillations and to a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in the Sun's interior. We exclude hidden photons with kinetic couplings chi > (1.5x10^{-6}-2.6x10^{-11}) for the mass region 1.7x10^{-4} eV < m_\\gamma' < 3.4 eV. Our constraints on the mixing parameter chi at sub-eV hidden-photon masses p...

  7. Neuroscience in forensic psychiatry: From responsibility to dangerousness. Ethical and legal implications of using neuroscience for dangerousness assessments.

    Science.gov (United States)

    Gkotsi, Georgia Martha; Gasser, Jacques

    2016-01-01

    Neuroscientific evidence is increasingly being used in criminal trials as part of psychiatric testimony. Up to now, "neurolaw" literature remained focused on the use of neuroscience for assessments of criminal responsibility. However, in the field of forensic psychiatry, responsibility assessments are progressively being weakened, whereas dangerousness and risk assessment gain increasing importance. In this paper, we argue that the introduction of neuroscientific data by forensic experts in criminal trials will be mostly be used in the future as a means to evaluate or as an indication of an offender's dangerousness, rather than their responsibility. Judges confronted with the pressure to ensure public security may tend to interpret neuroscientific knowledge and data as an objective and reliable way of evaluating one's risk of reoffending. First, we aim to show how the current socio-legal context has reshaped the task of the forensic psychiatrist, with dangerousness assessments prevailing. In the second part, we examine from a critical point of view the promise of neuroscience to serve a better criminal justice system by offering new tools for risk assessment. Then we aim to explain why neuroscientific evidence is likely to be used as evidence of dangerousness of the defendants. On a theoretical level, the current tendency in criminal policies to focus on prognostics of dangerousness seems to be "justified" by a utilitarian approach to punishment, supposedly revealed by new neuroscientific discoveries that challenge the notions of free will and responsibility. Although often promoted as progressive and humane, we believe that this approach could lead to an instrumentalization of neuroscience in the interest of public safety and give rise to interventions which could entail ethical caveats and run counter to the interests of the offenders. The last part of this paper deals with some of these issues-the danger of stigmatization for brain damaged offenders because of

  8. Hidden photon dark matter search with large metallic mirror

    Energy Technology Data Exchange (ETDEWEB)

    Doebrich, Babette; Lindner, Axel [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Daumiller, Kai; Engel, Ralph; Roth, Markus [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany); Kowalski, Marek [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Redondo, Javier [Zaragoza Univ. (Spain)

    2014-10-15

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  9. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  10. Suppressing the QCD axion abundance by hidden monopoles

    Directory of Open Access Journals (Sweden)

    Masahiro Kawasaki

    2016-02-01

    Full Text Available We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 1012GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei–Quinn symmetry is spontaneously broken after inflation.

  11. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  12. Dangerous Events, Risk Communications and Evolutionary Governance Theory

    NARCIS (Netherlands)

    Duineveld, M.

    2016-01-01

    This presentation conceptualizes and categorizes the various relationships between dangerous events, the emergence of risk communications and the effects on governance (the taking of collectively binding decisions in a community by a diversity of actors, inside and outside government) from Evolution

  13. Mental Health and Teens: Watch for Danger Signs

    Science.gov (United States)

    ... Stages Listen Español Text Size Email Print Share Mental Health and Teens: Watch for Danger Signs Page Content ... be strong indicators of serious mental health issues. Mental Health “Red Flags” Parents Should Be Alert For: Excessive ...

  14. Cancer immunogenicity, danger signals, and DAMPs: what, when, and how?

    Science.gov (United States)

    Garg, Abhishek D; Dudek, Aleksandra M; Agostinis, Patrizia

    2013-01-01

    Cancer immunosurvelliance usually leads to formation of cancer cells that have been "immunoedited" to resist anti-tumor immunity. One of the consequences of immunoediting that is, reduced immunogenicity, is an important roadblock in revival of stable and long-lasting anti-tumor immune responses. Research done during the last decade has shown that emission by the dying cancer cells of immunomodulatory factors or damage-associated molecular patterns (DAMPs), which can act as danger signals, is a critical event in accentuating the immunogenicity of cancer cells, in response to a subset of anticancer treatments. Recent evidence has defined that an apoptotic cell death subroutine and its underlying biochemistry, which has been termed as "immunogenic cell death (ICD)" or "immunogenic apoptosis," is required for the efficient emission of DAMPs and inciting anti-tumor immunity. Here, we review the basic concepts of ICD, like cancer immunogenicity, danger signals, and DAMPs. Moreover, we discuss the emerging molecular links between endoplasmic reticulum (ER) stress, induction of a viral response-like gene expression, danger signals, and anti-tumor immunity. We envisage that along with ER stress-based trafficking of DAMPs (which is a "short-range communicator" of danger), the accompanying induction of a viral response-like gene expression and the secretion of anti-tumorigenic cytokines may become a crucial signature of ICD induction by anticancer therapy.

  15. Innate danger signals in acute injury: From bench to bedside.

    Science.gov (United States)

    Fontaine, Mathieu; Lepape, Alain; Piriou, Vincent; Venet, Fabienne; Friggeri, Arnaud

    2016-08-01

    The description of the systemic inflammatory response syndrome (SIRS) as a reaction to numerous insults marked a turning point in the understanding of acute critical states, which are intensive care basic cases. This concept highlighted the final inflammatory response features whichever the injury mechanism is: infectious, or non-infectious such as extensive burns, traumas, major surgery or acute pancreatitis. In these cases of severe non-infectious insult, many endogenous mediators are released. Like infectious agents components, they can activate the immune system (via common signaling pathways) and initiate an inflammatory response. They are danger signals or alarmins. These molecules generally play an intracellular physiological role and acquire new functions when released in extracellular space. Many progresses brought new information on these molecules and on their function in infectious and non-infectious inflammation. These danger signals can be used as biomarkers and provide new pathophysiological and therapeutic approaches, particularly for immune dysfunctions occurring after an acute injury. We present herein the danger model, the main danger signals and the clinical consequences.

  16. Teens Share Sexually Explicit Messages: Simple Rebellion or Dangerous Behavior?

    Science.gov (United States)

    Curriculum Review, 2009

    2009-01-01

    An increasingly popular form of communication among teenagers is "sexting," sending nude photos via text messaging, reported The Orange County Register (3/20/09). This "flirtation" technique has sparked quite a bit of debate: is this simply a form of rebellion or is it dangerous behavior that could have adverse penalties? Although many teens say…

  17. Stop-loss order, unequal means, and more dangerous distributions

    NARCIS (Netherlands)

    Kaas, R.; van Heerwaarden, A.E.

    1992-01-01

    Using a sequence of transformations of subsequent cumulative distribution functions, the connections between the following three relations between risks are established: stop-loss order, stop-loss order with equal means, and being more dangerous. By a related technique, stop-loss order is verified b

  18. Asbestos: A Lingering Danger. AIO Red Paper #20.

    Science.gov (United States)

    Malcolm, Stuart

    Its unique qualities makes asbestos extremely useful in industry, yet it is termed one of the most dangerous and insidious substances in the work place. Composed of mostly fibers, asbestos is readily freed into the atmosphere during handling, constituting a real health risk. There are two ways asbestos can enter the human body: by inhalation or…

  19. Detecting danger labels with RAM-based neural networks

    DEFF Research Database (Denmark)

    Jørgensen, T.M.; Christensen, S.S.; Andersen, A.W.

    1996-01-01

    An image processing system for the automatic location of danger labels on the back of containers is presented. The system uses RAM-based neural networks to locate and classify labels after a pre-processing step involving specially designed non-linear edge filters and RGB-to-HSV conversion. Results...

  20. Danger-signaler og inflammasomer ved autoinflammatoriske og autoimmune sygdomme

    DEFF Research Database (Denmark)

    Bendtzen, Klaus

    2011-01-01

    Cytoplasmic inflammasomes are formed through activation of pattern recognition receptors (PRR) of the innate immune system. Endogenous and exogenous danger signals, e.g. DNA- and RNA-fragments, urate- and cholesterol crystals, silica and asbestos, ß-amyloid, UV-light and skin irritants, may induce...

  1. Asbestos: A Lingering Danger. AIO Red Paper #20.

    Science.gov (United States)

    Malcolm, Stuart

    Its unique qualities makes asbestos extremely useful in industry, yet it is termed one of the most dangerous and insidious substances in the work place. Composed of mostly fibers, asbestos is readily freed into the atmosphere during handling, constituting a real health risk. There are two ways asbestos can enter the human body: by inhalation or…

  2. Isovector and hidden-beauty partners of the X(3872)

    Energy Technology Data Exchange (ETDEWEB)

    Høgaasen, Hallstein, E-mail: hallstein.hogasen@fys.uio.no [Department of Physics, University of Oslo, Box 1048, NO-0316 Oslo (Norway); Kou, Emi, E-mail: kou@lal.in2p3.fr [Laboratoire de l' Accélérateur Linéaire, Université Paris-Sud, IN2P3-CNRS, Centre Scientifique d' Orsay, 91898 Orsay Cedex (France); Richard, Jean-Marc, E-mail: j-m.richard@ipnl.in2p3.fr [Université de Lyon, Institut de Physique Nucléaire de Lyon, UCBL–IN2P3-CNRS, 4, rue Enrico Fermi, 69622 Villeurbanne Cedex (France); Sorba, Paul, E-mail: paul.sorba@lapth.cnrs.fr [LAPTh, Laboratoire d' Annecy-le-Vieux de Physique Théorique, CNRS, Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France)

    2014-05-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  3. Local clustering in scale-free networks with hidden variables.

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A J E M; van Leeuwaarden, Johan S H; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ∈(2,3), so that the degrees have infinite variance. The natural cutoff h_{c} characterizes the largest degrees in the hidden variable models, and a structural cutoff h_{s} introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N, as a function of h_{s} and h_{c}. For scale-free networks with exponent 2vanish only for networks as large as N=10^{9}.

  4. A Bell-type Theorem Without Hidden Variables

    CERN Document Server

    Stapp, Henry P

    2002-01-01

    Bell's theorem rules out local hidden-variable theories. The locality condition is the demand that what an experimenter freely chooses to measure in one space-time region has no influence in a second space-time region that is spacelike separated from the first. The hidden-variable stipulation means that this demand is implemented through requirements on an assumed-to-exist substructure involving hidden variables. The question thus arises whether the locality condition itself fails, or only its implementation by means of the assumed hidden-variable structure. This paper shows that any theory that satisfies two generally accepted features of orthodox quantum theory and that yields certain predictions of quantum theory cannot satisfy the afore-mentioned locality condition. These two features are that the choices made by the experimenters can be treated as localized free variables and that such free choices do not affect outcomes that have already occurred.

  5. Modelling proteins' hidden conformations to predict antibiotic resistance

    Science.gov (United States)

    Hart, Kathryn M.; Ho, Chris M. W.; Dutta, Supratik; Gross, Michael L.; Bowman, Gregory R.

    2016-10-01

    TEM β-lactamase confers bacteria with resistance to many antibiotics and rapidly evolves activity against new drugs. However, functional changes are not easily explained by differences in crystal structures. We employ Markov state models to identify hidden conformations and explore their role in determining TEM's specificity. We integrate these models with existing drug-design tools to create a new technique, called Boltzmann docking, which better predicts TEM specificity by accounting for conformational heterogeneity. Using our MSMs, we identify hidden states whose populations correlate with activity against cefotaxime. To experimentally detect our predicted hidden states, we use rapid mass spectrometric footprinting and confirm our models' prediction that increased cefotaxime activity correlates with reduced Ω-loop flexibility. Finally, we design novel variants to stabilize the hidden cefotaximase states, and find their populations predict activity against cefotaxime in vitro and in vivo. Therefore, we expect this framework to have numerous applications in drug and protein design.

  6. Recent Applications of Hidden Markov Models in Computational Biology

    Institute of Scientific and Technical Information of China (English)

    Khar Heng Choo; Joo Chuan Tong; Louxin Zhang

    2004-01-01

    This paper examines recent developments and applications of Hidden Markov Models (HMMs) to various problems in computational biology, including multiple sequence alignment, homology detection, protein sequences classification, and genomic annotation.

  7. Self-similarity of complex networks and hidden metric spaces

    CERN Document Server

    Serrano, M Angeles; Boguna, Marian

    2007-01-01

    We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.

  8. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  9. Dark matter in the nonabelian hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2015-01-01

    We discuss the dark matter in the hidden gauge theory. We propose a scenario where the mini-inflation dilutes the dark matter density. This scenario is consistent with the current baryon number asymmetry.

  10. “危险物品型”危险驾驶罪的准抽象危险犯定位%Orientation on Quasi Abstract Dangerous Criminal of the Dangerous Articles Type Crime of Dangerous Driving

    Institute of Scientific and Technical Information of China (English)

    陈文昊

    2016-01-01

    《刑法修正案(九)》新设“危险物品型”危险驾驶罪,系准抽象危险犯。抽象危险犯与具体危险犯不能仅凭语词做形式判断,应当参照德日刑法理论,根据危险的程度,从实质上区分抽象危险犯与具体危险犯,而准抽象危险犯是介于两者中间的形态。“危险物品型”危险驾驶罪不能理解为具体危险犯,否则会违反罪刑均衡的原则。将“危险物品型”危险驾驶罪视为准抽象危险犯,是风险社会提前规制危险行为的必然要求。危险驾驶罪的解释应当考察可罚性,运用目的解释,将其认定为准抽象危险犯。%A new "dangerous articles type"dangerous driving crime is set up in the Criminal Law Amendment (9), namely quasi abstract dangerous criminal .Abstract dangerous crime and concrete dangerous crime cannot be judged only by words , but by the reference of theory of criminal law in Germany and Japan , and according to de-gree of danger , they can be judged essentially .While the quasi abstract dangerous crime is just a form in the mid-dle of these two crimes .The "dangerous articles type"dangerous driving crime cannot be simply understood as concrete dangerous crime;otherwise it will violate the principle of balance between crime and punishment .Regard-ing the "dangerous articles type"dangerous driving crime as quasi abstract dangerous crime is an inevitable re-quirement for the risk society to regulate the dangerous behavior in advance .The interpretation of the dangerous driving crime shall be subject to the investigation of the penalty , and by the use of teleological interpretation , the dangerous driving crime can be identified as quasi abstract dangerous crime .

  11. Hidden Symmetry from Supersymmetry in One-Dimensional Quantum Mechanics

    Directory of Open Access Journals (Sweden)

    Alexander A. Andrianov

    2009-06-01

    Full Text Available When several inequivalent supercharges form a closed superalgebra in Quantum Mechanics it entails the appearance of hidden symmetries of a Super-Hamiltonian. We examine this problem in one-dimensional QM for the case of periodic potentials and potentials with finite number of bound states. After the survey of the results existing in the subject the algebraic and analytic properties of hidden-symmetry differential operators are rigorously elaborated in the Theorems and illuminated by several examples.

  12. Stabilization of stochastic systems with hidden Markovian jumps

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper considers the adaptive control of discrete-time hybrid stochastic systems with unknown randomly jumping parameters described by a finite-state hidden Markov chain. An intuitive yet longstanding conjecture in this area is that such hybrid systems can be adaptively stabilized whenever the rate of transition of the hidden Markov chain is small enough. This paper provides a rigorous positive answer to this conjecture by establishing the global stability of a gradient-algorithm-based adaptive linear-quadratic control.

  13. Extracting hidden trails and roads under canopy using LIDAR

    OpenAIRE

    Krougios, Prokopios

    2008-01-01

    The field of Remote Sensing has been greatly benefited by the development of LIDAR. The extraction of bare earth under tree canopies and especially the identification of hidden trails are important tools for military and civilian operations in dense forests. LIDAR data from Sequoia National Park in California (2008) and Fort Belvoir Military Base in Virginia (2007) were two areas that were selected for analysis. Quick Terrain Modeler software was used in order to recognize hidden trails....

  14. Physical nature of a hidden mass in the Universe

    Energy Technology Data Exchange (ETDEWEB)

    Doroshkevich, A.G.; Khlopov, M.Yu. (AN SSSR, Moscow. Inst. Prikladnoj Matematiki)

    1984-04-01

    The problem of an origin of the hidden mass of the Universe is discussed. Observation astronomic data on large-scale Universe structure and hidden mass distribution within the framework of the adiabatic theory of galaxies formation point out the dominance in nowadays Universe of weakly-interacting particles with 15-60 eV mass. Restrictions are obtained for a possible admixture of other relict particles.

  15. Hidden Markov Models with Factored Gaussian Mixtures Densities

    Institute of Scientific and Technical Information of China (English)

    LI Hao-zheng; LIU Zhi-qiang; ZHU Xiang-hua

    2004-01-01

    We present a factorial representation of Gaussian mixture models for observation densities in Hidden Markov Models(HMMs), which uses the factorial learning in the HMM framework. We derive the reestimation formulas for estimating the factorized parameters by the Expectation Maximization (EM) algorithm. We conduct several experiments to compare the performance of this model structure with Factorial Hidden Markov Models(FHMMs) and HMMs, some conclusions and promising empirical results are presented.

  16. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...

  17. When Dieting Becomes Dangerous: A Guide to Understanding and Treating Anorexia and Bulimia.

    Science.gov (United States)

    Michel, Deborah Marcontell; Willard, Susan G.

    This book about anorexia and bulimia is written for patients and the people who care about them. It describes the symptoms and warning signs of eating disorders, explains their presumed causes and complexities, and suggests effective treatments. The book emphasizes the critical role of psychotherapy and family therapy in recovery, explains how…

  18. When Dieting Becomes Dangerous: A Guide to Understanding and Treating Anorexia and Bulimia.

    Science.gov (United States)

    Michel, Deborah Marcontell; Willard, Susan G.

    This book about anorexia and bulimia is written for patients and the people who care about them. It describes the symptoms and warning signs of eating disorders, explains their presumed causes and complexities, and suggests effective treatments. The book emphasizes the critical role of psychotherapy and family therapy in recovery, explains how…

  19. How to Fight Teenage Suicide: A Parents' Guide to the Danger Signals.

    Science.gov (United States)

    Friedo, David A.

    Physicians have developed and tested a profile to be used by parents and professionals to help identify potential teenage suicide victims. The profile was developed using a study of 27 male and 37 female teenagers hospitalized in the Children's Psychiatric Hospital at the University of Michigan Medical Center. Adolescents were shown to be reliable…

  20. Reduced-Rank Hidden Markov Models

    CERN Document Server

    Siddiqi, Sajid M; Gordon, Geoffrey J

    2009-01-01

    We introduce the Reduced-Rank Hidden Markov Model (RR-HMM), a generalization of HMMs that can model smooth state evolution as in Linear Dynamical Systems (LDSs) as well as non-log-concave predictive distributions as in continuous-observation HMMs. RR-HMMs assume an m-dimensional latent state and n discrete observations, with a transition matrix of rank k <= m. This implies the dynamics evolve in a k-dimensional subspace, while the shape of the set of predictive distributions is determined by m. Latent state belief is represented with a k-dimensional state vector and inference is carried out entirely in R^k, making RR-HMMs as computationally efficient as k-state HMMs yet more expressive. To learn RR-HMMs, we relax the assumptions of a recently proposed spectral learning algorithm for HMMs (Hsu, Kakade and Zhang 2009) and apply it to learn k-dimensional observable representations of rank-k RR-HMMs. The algorithm is consistent and free of local optima, and we extend its performance guarantees to cover the RR-...

  1. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  2. A hidden classical symmetry of QCD

    CERN Document Server

    Glozman, L Ya

    2016-01-01

    The classical part of the QCD partition function (the integrand) has, ignoring irrelevant exact zero modes of the Dirac operator, a local SU(2N_F) \\supset SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A symmetry which is absent at the Lagrangian level. This symmetry is broken anomalously and spontaneously. Effects of spontaneous breaking of chiral symmetry are contained in the near-zero modes of the Dirac operator. If physics of anomaly is also encoded in the same near-zero modes, then their truncation on the lattice should recover a hidden classical SU(2N_F) symmetry in correlators and spectra. This naturally explains observation on the lattice of a large degeneracy of hadrons, that is higher than the SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A chiral symmetry, upon elimination by hands of the lowest-lying modes of the Dirac operator. We also discuss an implication of this symmetry for the high temperature QCD.

  3. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  4. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  5. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  6. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  7. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  8. Stochastic precipitation generator with hidden state covariates

    Science.gov (United States)

    Kim, Yongku; Lee, GyuWon

    2017-08-01

    Time series of daily weather such as precipitation, minimum temperature and maximum temperature are commonly required for various fields. Stochastic weather generators constitute one of the techniques to produce synthetic daily weather. The recently introduced approach for stochastic weather generators is based on generalized linear modeling (GLM) with covariates to account for seasonality and teleconnections (e.g., with the El Niño). In general, stochastic weather generators tend to underestimate the observed interannual variance of seasonally aggregated variables. To reduce this overdispersion, we incorporated time series of seasonal dry/wet indicators in the GLM weather generator as covariates. These seasonal time series were local (or global) decodings obtained by a hidden Markov model of seasonal total precipitation and implemented in the weather generator. The proposed method is applied to time series of daily weather from Seoul, Korea and Pergamino, Argentina. This method provides a straightforward translation of the uncertainty of the seasonal forecast to the corresponding conditional daily weather statistics.

  9. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  10. Coulomb gauge model for hidden charm tetraquarks

    Science.gov (United States)

    Xie, W.; Mo, L. Q.; Wang, Ping; Cotanch, Stephen R.

    2013-08-01

    The spectrum of tetraquark states with hidden charm is studied within an effective Coulomb gauge Hamiltonian approach. Of the four independent color schemes, two are investigated, the (qcbar)1(cqbar)1 singlet-singlet (molecule) and the (qc)3(qbarcbar)3 triplet-triplet (diquark), for selected JPC states using a variational method. The predicted masses of triplet-triplet tetraquarks are roughly a GeV heavier than the singlet-singlet states. There is also an interesting flavor dependence with (qqbar)1 (ccbar1) states about half a GeV lighter than (qcbar)1(qbarc)1. The lightest 1++ and 1-- predictions are in agreement with the observed X (3872) and Y (4008) masses suggesting they are molecules with ωJ / ψ and ηhc, rather than D*Dbar* and DDbar, type structure, respectively. Similarly, the lightest isovector 1++ molecule, having a ρJ / ψ flavor composition, has mass near the recently observed charged Zc (3900) value. These flavor configurations are consistent with observed X, Y and Zc decays to ππJ / ψ.

  11. Hidden topological angles and Lefschetz thimbles

    CERN Document Server

    Behtash, Alireza; Schaefer, Thomas; Unsal, Mithat

    2015-01-01

    We demonstrate the existence of hidden topological angles (HTAs) in a large class of quantum field theories and quantum mechanical systems. HTAs are distinct from theta-parameters in the lagrangian. They arise as invariant angle associated with saddle points of the complexified path integral and their descent manifolds (Lefschetz thimbles). Physical effects of HTAs become most transparent upon analytic continuation in $n_f$ to non-integer number of flavors, reducing in the integer $n_f$ limit to a $\\mathbb Z_2$ valued phase difference between dominant saddles. In ${\\cal N}=1$ super Yang-Mills theory we demonstrate the microscopic mechanism for the vanishing of the gluon condensate. The same effect leads to an anomalously small condensate in a QCD-like $SU(N)$ gauge theory with fermions in the two-index representation. The basic phenomenon is that, contrary to folklore, the gluon condensate can receive both positive and negative contributions in a semi-classical expansion. In quantum mechanics, a HTA leads to ...

  12. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  13. Hidden Web Data Extraction Using Dynamic Rule Generation

    Directory of Open Access Journals (Sweden)

    Anuradha

    2011-08-01

    Full Text Available World Wide Web is a global information medium of interlinked hypertext documents accessed via computers connected to the internet. Most of the users rely on traditional search engines to search theinformation on the web. These search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called Hidden Web which is hidden to present-day search engines. It lies behind search forms and this part of the web containing an almost endless amount of sources providing high quality information stored in specialized databases can be found in the depths of the WWW. A large amount of this Hidden web is structured i.e Hidden websites contain the information in the form of lists and tables. However visiting dozens of these sites and analyzing the results is very much time consuming task for user. Hence, it is desirable to build a prototype which will minimize user’s effort and give him high quality information in integrated form. This paper proposes a novel method that extracts the data records from the lists and tables of various hidden web sites of same domain using dynamic rule generation and forms a repository which is used for later searching. By searching the data from this repository, user will find the desired data at one place. It reduces the user’s effort to look at various result pages of different hidden websites.

  14. QCD sum rule study of hidden-charm pentaquarks

    CERN Document Server

    Chen, Hua-Xing; Chen, Wei; Steele, T G; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    We study the mass spectra of hidden-charm pentaquarks having spin $J = {1\\over2},{3\\over2},{5\\over2}$ and quark contents $uud c \\bar c$. We systematically construct all the relevant local hidden-charm pentaquark currents, and select some of them to perform QCD sum rule analyses. We find that the $P_c(4380)$ and $P_c(4450)$ can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. We also find the lowest-lying hidden-charm $J^P = 1/2^-$ pentaquark state of mass $4.33^{+0.17}_{-0.13}$ GeV, while the $J^P = 1/2^+$ mass prediction of 4.7--4.9 GeV is significantly higher. Similarly, the lowest-lying hidden-charm $J^P = 3/2^-$ pentaquark state mass is $4.37^{+0.18}_{-0.13}$ GeV, consistent with the $J^P = 3/2^-$ $P_c(4380)$, while the $J^P = 3/2^+$ is also significantly higher with a mass above 4.6 GeV. The hidden-charm $J^P = 5/2^-$ pentaquark state mass is 4.5--4.6 GeV, slightly larger than the $J^P = 5/2^+$ $P_c(4450)$.

  15. 谈广西崇左市宁明县弄阳水库除险加固工程%Danger Control and Reinforcement Project of Nongyang Reservoir in Ningming County, Chongzuo City, Guangxi

    Institute of Scientific and Technical Information of China (English)

    施华超

    2012-01-01

      通过对弄阳水库的除险加固,能有效解决水库坝体、坝基、溢洪道的渗漏问题,解除了水库的安全隐患,解决了当地农民生产用水问题,对促进当地经济的发展起到了积极的作用。%  The danger control and reinforcement project of Nongyang Reservoir can effectively solve the leakage problem of reservoir's dam body, dam foundation and spill way. It plays a positive role in eliminating hidden dangers of the reservoir and solving the water consumption of local farmers for production and promoting the development of local economics.

  16. Windows 7 Tweaks A Comprehensive Guide on Customizing, Increasing Performance, and Securing Microsoft Windows 7

    CERN Document Server

    Sinchak, Steve

    2009-01-01

    The definitive guide to unlocking the hidden potential of the Windows 7 OS. Written by bestselling author and the creator of tweaks.com Steve Sinchak, this unique guide provides you with the ultimate collection of hidden gems that will enable you to get the most out of Windows 7. Packed with more than 400 pages of insider tips, the book delves beneath the surface to reveal little-known ways to tweak, modify, and customize Windows 7 so you can get every ounce of performance from your operating system. Regardless of your experience with tweaking your system, you'll find fascinating and fun tips

  17. Guided labworks

    DEFF Research Database (Denmark)

    Jacobsen, Lærke Bang

    For the last 40 years physics education research has shown poor learning outcomes of guided labs. Still this is found to be a very used teaching method in the upper secodary schools. This study explains the teacher's choice of guided labs throught the concept of redesign as obstacle dislodgement...

  18. Was ist das Hidden Web? Die Entstehung, Eigenschaften und gesellschaftliche Bedeutung von anonymer Kommunikation im Hidden Web.

    OpenAIRE

    Papsdorf, Christian

    2016-01-01

    More than two-and-a-half million people currently use the Tor network to communicate anonymously via the Internet and gain access to online media that are not accessible using standard Internet technology. This sphere of communication can be described as the hidden web. In part because this phenomenon is very recent, the subject has scarcely been studied in the social sciences. It is therefore the purpose of this paper to answer four fundamental questions: What is the hidden web? What charact...

  19. The Art of the Hidden: Magical and Esoteric Practices in Rinconete y Cortadillo

    Directory of Open Access Journals (Sweden)

    Frederick A. de Armas

    2013-12-01

    Full Text Available One of the most frequently studied motifs in Rinconete y Cortadillo has been its relation to the picaresque as well as the new elements that it brings to this genre. It has also been asserted that, since chronologically it is one of the first novellas included in the collection of Novelas ejemplares, it eschews the structures of romance, which are prevalent in later novellas. This study foregrounds a series of elements of romance which can be found in Rinconete y Cortadillo and that reveal a series of hidden mysteries in the novella. The essay analyzes, among others, the motif of descent and the infernal geography of the novella; the presence of Mercury as a guide to the infernal regions; the final ascent promised by Rinconete and the onomastic secrets hidden in his name; the significance of perfect friendship; the desire for freedom and its implications; and the meaning of joy as found among the rogues and the followers of the barbarous Monipodio.

  20. Hanford facility dangerous waste permit application, general information portion

    Energy Technology Data Exchange (ETDEWEB)

    Hays, C.B.

    1998-05-19

    The Hanford Facility Dangerous Waste Permit Application is considered to be a single application organized into a General Information Portion (document number DOE/RL-91-28) and a Unit-Specific Portion. Both the General Information and Unit-Specific portions of the Hanford Facility Dangerous Waste Permit Application address the content of the Part B permit application guidance prepared by the Washington State Department of Ecology (Ecology 1996) and the U.S. Environmental Protection Agency (40 Code of Federal Regulations 270), with additional information needed by the Hazardous and Solid Waste Amendments and revisions of Washington Administrative Code 173-303. Documentation contained in the General Information Portion is broader in nature and could be used by multiple treatment, storage, and/or disposal units (e.g., the glossary provided in this report).

  1. Substitution of dangerous substances and Materials to improve the Working Environment

    DEFF Research Database (Denmark)

    Jacobsen, Thomas

    2000-01-01

    Substitution of dangerous substances and Materials as a method to improve the Working Environment - 25 years of Danish experience......Substitution of dangerous substances and Materials as a method to improve the Working Environment - 25 years of Danish experience...

  2. Lupine, a source of new as well as hidden food allergens.

    Science.gov (United States)

    Jappe, Uta; Vieths, Stefan

    2010-01-01

    The present review summarizes current knowledge about lupine allergy, potential sensitization routes, cross-reactions between lupine and other legumes, and the respective IgE-binding proteins. Since the 1990 s, lupine flour is used as a substitute for or additive to other flours, mostly wheat flour, in several countries of the EU. In 1994, the first case of an immediate-type allergy after ingestion of lupine flour-containing pasta was reported. Since then, the number of published incidents following ingestion or inhalation of lupine flour is rising. So far, the Lupinus angustifolius beta-conglutin has been designated as the allergen Lup an 1 by the International Union of Immunological Societies Allergen Nomenclature Subcommittee. Initially, publications focussed on the fact that peanut-allergic patients were at risk to develop anaphylaxis to lupine due to cross-reactivity between peanut and lupine. At present, however, the ratio between cases of pre-existing legume allergy (mostly peanut allergy) to de novo sensitization to lupine seed is nearly 1:1. Although in December 2006, lupine and products thereof were included in the EU foodstuff allergen list according to the Commission Directive 2006/142/EC amending Annex IIIA of Directive 2000/13/EC in order to prevent severe reactions caused by "hidden food allergens", the majority of patients and medical personnel are still not aware of raw lupine seed as potentially dangerous food allergen.

  3. A Protection plan of wildlife in a danger of extinction

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sang Don; Park, Yong Ha; Suh, Jung Soo [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    This report collected data on the present situation of mammals, birds, amphibians, reptiles, fishes, insects, invertebrates, and 43 kinds of plants, which is in a danger of extinction, and their habitat, by the article 2 of 1998 Natural Environmental Conservation Act, as a part of 'Establishment of Biological diversity strategy'. This will utilize as a basic data for protection management to establish the recovery plan for each species. 358 refs., 43 figs., 3 tabs.

  4. Geothermal heat. Potential, danger, efficiency; Erdwaerme. Potential, Gefahr, Nutzen

    Energy Technology Data Exchange (ETDEWEB)

    Reichel, Wolfgang [Ingenieurbuero Timmer Reichel GmbH, Haan (Germany)

    2010-07-01

    The author of the contribution under consideration reports on the potential, danger and utilization of geothermal heat. Geothermal heat promises the solution of numerous energy problems. From the use of near-surface layers which substantially are affected by enviromental impacts such as solar radiation up to the depth use of the heat flow from the interior of the earth, there exist very different energy sources which are to be considered separately for each application.

  5. Hanford facility dangerous waste permit application, PUREX storage tunnels

    Energy Technology Data Exchange (ETDEWEB)

    Haas, C. R.

    1997-09-08

    The Hanford Facility Dangerous Waste Permit Application is considered to be a single application organized into a General Information Portion (document number DOE/RL-91-28) and a Unit-Specific Portion. The scope of the Unit-Specific Portion is limited to Part B permit application documentation submitted for individual, `operating` treatment, storage, and/or disposal units, such as the PUREX Storage Tunnels (this document, DOE/RL-90-24).

  6. Dangerous snakes, deadly snakes and medically important snakes

    OpenAIRE

    Silva, Anjana

    2013-01-01

    This correspondence argues that the dangerousness of a venomous snake species is not solely determined by the venom characteristics or the lethality of the snake, and recognizes that medical importance comprises a key variable as well. The medical importance of a snake is determined by several factors – including frequency of medical attention after a bite, local or systemic envenomation provoked by the bite, fatal bites, long term consequences, availability of antivenom therapy as well as th...

  7. FEATURES FOR TRANSPORT AND AIR MECHANICAL SYSTEMS OF DANGEROUS GOODS

    Directory of Open Access Journals (Sweden)

    Eugen Dumitru BUSA

    2012-05-01

    Full Text Available Transport of dangerous goods are regulated activities, they take place under the direction and control of the authorities and specialized bodies in an institutional framework determined by national and international law. Of economic, transport infrastructure is the crucial element without which both production and trade would become meaningless, it is an essential element of a civilization, is also a necessary accessory of other economic activities.

  8. HBR guides

    CERN Document Server

    Duarte, Nancy; Dillon, Karen

    2015-01-01

    Master your most pressing professional challenges with this seven-volume set that collects the smartest best practices from leading experts all in one place. "HBR Guide to Better Business Writing" and "HBR Guide to Persuasive Presentations" help you perfect your communication skills; "HBR Guide to Managing Up and Across" and "HBR Guide to Office Politics" show you how to build the best professional relationships; "HBR Guide to Finance Basics for Managers" is the one book you'll ever need to teach you about the numbers; "HBR Guide to Project Management" addresses tough questions such as how to manage stakeholder expectations and how to manage uncertainty in a complex project; and "HBR Guide to Getting the Right Work Done" goes beyond basic productivity tips to teach you how to prioritize and focus on your work. This specially priced set of the most popular books in the series makes a perfect gift for aspiring leaders looking for trusted advice. Arm yourself with the advice you need to succeed on the job, from ...

  9. Disease surveillance using a hidden Markov model

    Directory of Open Access Journals (Sweden)

    Wright Graeme

    2009-08-01

    Full Text Available Abstract Background Routine surveillance of disease notification data can enable the early detection of localised disease outbreaks. Although hidden Markov models (HMMs have been recognised as an appropriate method to model disease surveillance data, they have been rarely applied in public health practice. We aimed to develop and evaluate a simple flexible HMM for disease surveillance which is suitable for use with sparse small area count data and requires little baseline data. Methods A Bayesian HMM was designed to monitor routinely collected notifiable disease data that are aggregated by residential postcode. Semi-synthetic data were used to evaluate the algorithm and compare outbreak detection performance with the established Early Aberration Reporting System (EARS algorithms and a negative binomial cusum. Results Algorithm performance varied according to the desired false alarm rate for surveillance. At false alarm rates around 0.05, the cusum-based algorithms provided the best overall outbreak detection performance, having similar sensitivity to the HMMs and a shorter average time to detection. At false alarm rates around 0.01, the HMM algorithms provided the best overall outbreak detection performance, having higher sensitivity than the cusum-based Methods and a generally shorter time to detection for larger outbreaks. Overall, the 14-day HMM had a significantly greater area under the receiver operator characteristic curve than the EARS C3 and 7-day negative binomial cusum algorithms. Conclusion Our findings suggest that the HMM provides an effective method for the surveillance of sparse small area notifiable disease data at low false alarm rates. Further investigations are required to evaluation algorithm performance across other diseases and surveillance contexts.

  10. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  11. Subtotal lesions of the visual cortex impair discrimination of hidden figures by cats.

    Science.gov (United States)

    Cornwell, P; Overman, W; Campbell, A

    1980-04-01

    Cats with partial or nearly total ablation of areas 17, 18, and 19 were assessed on the discrimination of hidden figures and other visually guided behaviors to determine whether such insults produce deficits like those that follow lateral striate lesions in monkeys. Cats with destruction limited to the representation of central vision (Group M) were impaired at discriminating patterns complicated by extraneous cues, but they were less impaired than cats with more complete lesions (Group MS). The deficit was not a general one in visual learning since animals in both Groups M and MS learned simple pattern discriminations as rapidly as controls. It is suggested that the loss of geniculocortical functions representing central vision produces similar deficits in cats and monkeys but that to have this effect in cats, damage must extend beyond area 17.

  12. Future impacts of climate change on forest fire danger in northeastern China

    Institute of Scientific and Technical Information of China (English)

    TIAN Xiao-rui; SHU Li-fu; ZHAO Feng-jun; WANG Ming-yu; Douglas J. McRae

    2011-01-01

    Climate warming has a rapid and far-reaching impact on forest fire management in the boreal forests of China. Regional climate model outputs and the Canadian Forest Fire Weather Index (FWI) Sys- tern were used to analyze changes to fire danger and the fire season for future periods under IPCC Special Report on Emission Scenarios (SRES) A2 and B2, and the data will guide future fire management planning. We used regional climate in China (1961-1990) as our validation data, and the period (1991-2100) was modeled under SRES A2 and B2 through the weather simulated by the regional climate model system (PRECIS). Meteorological data and fire danger were interpolated to 1 km by using ANUSPLIN software. The average FWI value for future spring fire sea-sons under Scenarios A2 and B2 shows an increase over most of the region. Compared with the baseline, FWI averages of spring fire season will increase by -0.40, 0.26 and 1.32 under Scenario A2, and increase by 0.60, 1.54 and 2.56 under Scenario B2 in 2020s, 2050s and 2080s, re-spectively. FWI averages of autumn fire season also show an increase over most of the region. FWI values increase more for Scenario B2 than for Scenario A2 in the same periods, particularly during the 2050s and 2080s. Average future FWI values will increase under both scenarios for autumn fire season. The potential burned areas are expected to increase by 10% and 18% in spring for 2080s under Scenario A2 and B2, respec- tively. Fire season will be prolonged by 21 and 26 days under Scenarios A2 and B2 in 2080s respectively.

  13. 75 FR 65278 - Pamlico Sound and Adjacent Waters, NC; Danger Zones for Marine Corps Operations

    Science.gov (United States)

    2010-10-22

    ... of Engineers, Department of the Army 33 CFR Part 334 Pamlico Sound and Adjacent Waters, NC; Danger... its regulations to establish one new danger zone in Pamlico Sound near Marine Corps Air Station Cherry Point, North Carolina. Establishment of this danger zone will enable the Marine Corps to control...

  14. 76 FR 30023 - Pamlico Sound and Adjacent Waters, NC; Danger Zones for Marine Corps Operations

    Science.gov (United States)

    2011-05-24

    ... of Engineers, Department of the Army 33 CFR Part 334 Pamlico Sound and Adjacent Waters, NC; Danger.... SUMMARY: The U.S. Army Corps of Engineers is amending its regulations to establish a new danger zone. This danger zone will enable the Marine Corps to control access and movement of persons, vessels and...

  15. 33 CFR 334.70 - Buzzards Bay, and adjacent waters, Mass.; danger zones for naval operations.

    Science.gov (United States)

    2010-07-01

    ..., Mass.; danger zones for naval operations. 334.70 Section 334.70 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA REGULATIONS § 334.70 Buzzards Bay, and adjacent waters, Mass.; danger zones for naval operations. (a)...

  16. 75 FR 69032 - Naval Surface Warfare Center, Potomac River, Dahlgren, VA; Danger Zone

    Science.gov (United States)

    2010-11-10

    ..., Dahlgren, VA; Danger Zone AGENCY: United States Army Corps of Engineers, Department of Defense. ACTION... amend an existing permanent danger zone in the waters of the Upper Machodoc Creek and the Potomac River... River Test Range. Many of the tests are hazardous operations presenting a danger to persons or...

  17. 33 CFR 334.130 - Atlantic Ocean off Wallops Island and Chincoteague Inlet, Va.; danger zone.

    Science.gov (United States)

    2010-07-01

    ... and Chincoteague Inlet, Va.; danger zone. 334.130 Section 334.130 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA REGULATIONS § 334.130 Atlantic Ocean off Wallops Island and Chincoteague Inlet, Va.; danger zone. (a) The...

  18. 32 CFR 644.531 - Warning to public of danger in handling explosive missiles.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Warning to public of danger in handling explosive... Contamination from Proposed Excess Land and Improvements § 644.531 Warning to public of danger in handling... of contaminants remaining on the land and the inherent danger of handling explosives or...

  19. 33 CFR 334.1140 - Pacific Ocean at San Miguel Island, Calif.; naval danger zone.

    Science.gov (United States)

    2010-07-01

    ... Island, Calif.; naval danger zone. 334.1140 Section 334.1140 Navigation and Navigable Waters CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA REGULATIONS § 334.1140 Pacific Ocean at San Miguel Island, Calif.; naval danger zone. (a) The area. The waters around...

  20. 10 CFR 860.4 - Unauthorized introduction of weapons or dangerous materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Unauthorized introduction of weapons or dangerous... § 860.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying, transporting, or otherwise introducing or causing to be introduced any dangerous weapon, explosive, or other...

  1. 10 CFR 160.4 - Unauthorized introduction of weapons or dangerous materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Unauthorized introduction of weapons or dangerous... PROPERTY § 160.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying, transporting, or otherwise introducing or causing to be introduced any dangerous weapon, explosive, or other...

  2. FIRES: Fire Information Retrieval and Evaluation System - A program for fire danger rating analysis

    Science.gov (United States)

    Patricia L. Andrews; Larry S. Bradshaw

    1997-01-01

    A computer program, FIRES: Fire Information Retrieval and Evaluation System, provides methods for evaluating the performance of fire danger rating indexes. The relationship between fire danger indexes and historical fire occurrence and size is examined through logistic regression and percentiles. Historical seasonal trends of fire danger and fire occurrence can be...

  3. 9 CFR 105.3 - Notices re: worthless, contaminated, dangerous, or harmful biological products.

    Science.gov (United States)

    2010-01-01

    ..., dangerous, or harmful biological products. 105.3 Section 105.3 Animals and Animal Products ANIMAL AND PLANT... Notices re: worthless, contaminated, dangerous, or harmful biological products. (a) If at any time it...-Serum-Toxin Act, of any biological product by any person holding a license or permit may be dangerous...

  4. 76 FR 46351 - International Civil Aviation Organization's (ICAO) Dangerous Goods Panel; Notice of Public Meeting

    Science.gov (United States)

    2011-08-02

    ... Federal Aviation Administration International Civil Aviation Organization's (ICAO) Dangerous Goods Panel... Organization's (ICAO) Dangerous Goods Panel (DGP) to be held October 11-21, 2011, in Montreal, Quebec, Canada... Aviation Organization's Dangerous Goods Panel (ICAO DGP) Meeting. Proposals that are approved by the...

  5. DMPD: Macrophage activation by endogenous danger signals. [Dynamic Macrophage Pathway CSML Database

    Lifescience Database Archive (English)

    Full Text Available 18161744 Macrophage activation by endogenous danger signals. Zhang X, Mosser DM. J ...Pathol. 2008 Jan;214(2):161-78. (.png) (.svg) (.html) (.csml) Show Macrophage activation by endogenous dange...r signals. PubmedID 18161744 Title Macrophage activation by endogenous danger signals. Authors Zhang X, Moss

  6. Colostomy Guide

    Science.gov (United States)

    ... Side Effects Managing Cancer-related Side Effects Ostomies Colostomy Guide Colostomy surgery is done for many different diseases and problems. Some colostomies are done because of cancer; others are not. ...

  7. Hidden Gauge Structure of Supersymmetric Free Differential Algebras

    CERN Document Server

    Andrianopoli, L; Ravera, L

    2016-01-01

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q' introduced in Ref. [3] and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B^(2) and B^(3) in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of t...

  8. Evidence Feed Forward Hidden Markov Model: A New Type of Hidden Markov Model

    CERN Document Server

    DelRose, Michael; Frederick, Philip; 10.5121/ijaia.2011.2101

    2011-01-01

    The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM), and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important...

  9. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  10. Riboswitch Detection Using Profile Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Krishnamachari A

    2009-10-01

    Full Text Available Abstract Background Riboswitches are a type of noncoding RNA that regulate gene expression by switching from one structural conformation to another on ligand binding. The various classes of riboswitches discovered so far are differentiated by the ligand, which on binding induces a conformational switch. Every class of riboswitch is characterized by an aptamer domain, which provides the site for ligand binding, and an expression platform that undergoes conformational change on ligand binding. The sequence and structure of the aptamer domain is highly conserved in riboswitches belonging to the same class. We propose a method for fast and accurate identification of riboswitches using profile Hidden Markov Models (pHMM. Our method exploits the high degree of sequence conservation that characterizes the aptamer domain. Results Our method can detect riboswitches in genomic databases rapidly and accurately. Its sensitivity is comparable to the method based on the Covariance Model (CM. For six out of ten riboswitch classes, our method detects more than 99.5% of the candidates identified by the much slower CM method while being several hundred times faster. For three riboswitch classes, our method detects 97-99% of the candidates relative to the CM method. Our method works very well for those classes of riboswitches that are characterized by distinct and conserved sequence motifs. Conclusion Riboswitches play a crucial role in controlling the expression of several prokaryotic genes involved in metabolism and transport processes. As more and more new classes of riboswitches are being discovered, it is important to understand the patterns of their intra and inter genomic distribution. Understanding such patterns will enable us to better understand the evolutionary history of these genetic regulatory elements. However, a complete picture of the distribution pattern of riboswitches will emerge only after accurate identification of riboswitches across genomes

  11. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  12. Evidence Feed Forward Hidden Markov Model: A New Type Of Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Michael Del Rose

    2011-01-01

    Full Text Available The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM, and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important in creating intelligent algorithms for determining human actions based on visual observations. The Evidence Feed Forward Hidden Markov Model is a newly developed algorithm which provides observation to observation linkages. The following research addresses the theory behind Evidence Feed Forward HMMs, provides mathematical proofs of their learning of these parameters to optimize the likelihood of observations with a Evidence Feed Forwards HMM, which is important in all computational intelligence algorithm, and gives comparative examples with standard HMMs in classification of both visual action data and measurement data; thus providing a strong base for Evidence Feed Forward HMMs in classification of many types of problems.

  13. Recent Progress in Search for Hidden/Dark Photon

    CERN Document Server

    Deliyergiyev, M A

    2015-01-01

    We will try to communicate the many difficulties that we encounter when attempting to pinpoint a common origin for the several observed anomalies, or assessing their tension with existing exclusion limits. These include systematics affecting the operation of the detectors, our knowledge of their response, astrophysical uncertainties, and the broad range of particle couplings that can mediate the interaction with a detector target. The interesting astrophysical evidence that motivates a search for dark-photon and focuses our attention on a Hidden Valleys model with a GeV-scale dark sector that produces the exciting signatures, which may include the possible constituent of dark matter, the possible existence of extra gauge groups. Results from the recent underground experiments are also considered. Many models of new physics beyond the Standard Model contain a 'light' hidden sector (dark sector) with a colorful spectrum of new particles. Recently, it has been shown that the hidden sector can give rise to unique...

  14. Applications of hidden symmetries to black hole physics

    Energy Technology Data Exchange (ETDEWEB)

    Frolov, Valeri, E-mail: vfrolov@ualberta.ca [Institute of Theoretical Physics, Department of Physics University of Alberta, Edmonton, Alberta, T6G 2G7 (Canada)

    2011-02-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  15. The hidden-charm pentaquark and tetraquark states

    CERN Document Server

    Chen, Hua-Xing; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    In the past decade many charmonium-like states were observed experimentally. Especially those charged charmonium-like $Z_c$ states and bottomonium-like $Z_b$ states can not be accommodated within the naive quark model. These charged $Z_c$ states are good candidates of either the hidden-charm tetraquark states or molecules composed of a pair of charmed mesons. Recently, the LHCb Collaboration discovered two hidden-charm pentaquark states, which are also beyond the quark model. In this work, we review the current experimental progress and investigate various theoretical interpretations of these candidates of the multiquark states. We list the puzzles and theoretical challenges of these models when confronted with the experimental data. We also discuss possible future measurements which may distinguish the theoretical schemes on the underlying structures of the hidden-charm multiquark states.

  16. Ontology-based Knowledge Extraction from Hidden Web

    Institute of Scientific and Technical Information of China (English)

    SONG Hui; MA Fan-yuan; LIU Xiao-qiang

    2004-01-01

    Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not refer how to make extracted information available for knowledge system. This paper describes a novel approach to build a domain-specific knowledge service with the data retrieved from Hidden Web. Ontology serves to model the domain knowledge. Queries forms of different Web sites are translated into machine-understandable format, defined knowledge concepts, so that they can be accessed automatically. Also knowledge data are extracted from Web pages and organized in ontology format knowledge. The experiment proves the algorithm achieves high accuracy and the system facilitates constructing knowledge services greatly.

  17. Applications of hidden symmetries to black hole physics

    CERN Document Server

    Frolov, Valeri

    2010-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set (`tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  18. Using the hidden curriculum to teach professionalism in nursing students.

    Science.gov (United States)

    Karimi, Zohreh; Ashktorab, Tahereh; Mohammadi, Easa; Abedi, Heidar Ali

    2014-03-01

    Professionalism in nursing is critical for creating credibility and a positive image. This study was carried out to explain the use of hidden curriculum in teaching professionalism in nursing students. This qualitative study was conducted through purposeful sampling strategy by the participation of 32 nursing students. The data were collected by using semi-structured interviews, and this process was continued until achieving data saturation and themes' emergence. Content analysis method was used for data analysis. DATA ANALYSIS REVEALED THREE MAIN THEMES: Development of understanding the professionalism elements, Variety of influenceability strategies, and Influenceability to various resources. Each theme consisted of some subthemes. The nursing students learnt the professionalism elements by different methods from different resources through the hidden curriculum. Therefore, exploration of the currently administered hidden curricula is suggested.

  19. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  20. Detect and exploit hidden structure in fatty acid signature data

    Science.gov (United States)

    Budge, Suzanne; Bromaghin, Jeffrey; Thiemann, Gregory

    2017-01-01

    Estimates of predator diet composition are essential to our understanding of their ecology. Although several methods of estimating diet are practiced, methods based on biomarkers have become increasingly common. Quantitative fatty acid signature analysis (QFASA) is a popular method that continues to be refined and extended. Quantitative fatty acid signature analysis is based on differences in the signatures of prey types, often species, which are recognized and designated by investigators. Similarly, predator signatures may be structured by known factors such as sex or age class, and the season or region of sample collection. The recognized structure in signature data inherently influences QFASA results in important and typically beneficial ways. However, predator and prey signatures may contain additional, hidden structure that investigators either choose not to incorporate into an analysis or of which they are unaware, being caused by unknown ecological mechanisms. Hidden structure also influences QFASA results, most often negatively. We developed a new method to explore signature data for hidden structure, called divisive magnetic clustering (DIMAC). Our DIMAC approach is based on the same distance measure used in diet estimation, closely linking methods of data exploration and parameter estimation, and it does not require data transformation or distributional assumptions, as do many multivariate ordination methods in common use. We investigated the potential benefits of the DIMAC method to detect and subsequently exploit hidden structure in signature data using two prey signature libraries with quite different characteristics. We found that the existence of hidden structure in prey signatures can increase the confusion between prey types and thereby reduce the accuracy and precision of QFASA diet estimates. Conversely, the detection and exploitation of hidden structure represent a potential opportunity to improve predator diet estimates and may lead to new

  1. Performance based analysis of hidden beams in reinforced concrete structures

    Directory of Open Access Journals (Sweden)

    Helou Samir H.

    2014-01-01

    Full Text Available Local and perhaps regional vernacular reinforced concrete building construction leans heavily against designing slabs with imbedded hidden beams for flooring systems in most structures including major edifices. The practice is distinctive in both framed and in shear wall structures. Hidden beams are favoured structural elements due to their many inherent features that characterize them; they save on floor height clearance; they also save on formwork, labour and material cost. Moreover, hidden beams form an acceptable aesthetic appearance that does not hinder efficient interior space partitioning. Such beams have the added advantage of clearing the way for horizontal electromechanical ductwork. However, seismic considerations, in all likelihood, are seldom seriously addressed. The mentioned structural system of shallow beams is adopted in ribbed slabs, waffle slabs and at times with solid slabs. Ribbed slabs and waffle slabs are more prone to hidden beam inclusion due to the added effective height of the concrete section. Due to the presence of a relatively high reinforcement ratio at the joints the sections at such location tend to become less ductile with unreliable contribution to spandrel force resistance. In the following study the structural influence of hidden beams within slabs is investigated. With the primary focus on a performance based analysis of such elements within a structure. This is investigated with due attention to shear wall contribution to the overall behaviour of such structures. Numerical results point in the direction that the function of hidden beams is not as adequate as desired. Therefore it is strongly believed that they are generally superfluous and maybe eliminated altogether. Conversely, shallow beams seem to render the overall seismic capacity of the structure unreliable. Since such an argument is rarely manifested within the linear analysis domain; a pushover analysis exercise is thus mandatory for behaviour

  2. Energy-Efficient Systems Eliminate Icing Danger for UAVs

    Science.gov (United States)

    2010-01-01

    Ames Research Center engineer Leonard Haslim invented an anti-icing t echnology called an electroexpulsive separation system, which uses m echanical force to shatter potentially dangerous ice buildup on an ai rcraft surface. Temecula, California-based Ice Management Systems (no w known as IMS-ESS) licensed the technology from Ames and has discov ered a niche market for the lightweight, energy-efficient technology: unmanned aerial vehicles (UAVs). IMS-ESS systems now prevent damagi ng ice accumulation on military UAVs, allowing the vehicles to carry out crucial missions year round.

  3. USGS Fire Science: Fire Danger Monitoring and Forecasting

    Science.gov (United States)

    Eidenshink, Jeff

    2007-01-01

    The U.S. Geological Survey (USGS) has advanced the use of moderate-resolution satellite data in a decision support system for assessing national fire potential. Weekly updated digital images of the Normalized Difference Vegetation Index (NDVI), based on data acquired at 1-kilometer (km) resolution (about 0.6 mi), have been used for the past 19 years as a means to assess live vegetation conditions for the purpose of rating fire danger. These images, produced and monitored through the growing season, portray the approximate time of greenup and senescence, as well as the relative amount and condition of growing plants.

  4. Evaluating fire danger in Brazilian biomes: present and future patterns

    Science.gov (United States)

    Silva, Patrícia; Bastos, Ana; DaCamara, Carlos; Libonati, Renata

    2017-04-01

    Climate change is expected to have a significant impact on fire occurrence and activity, particularly in Brazil, a region known to be fire-prone [1]. The Brazilian savanna, commonly referred to as cerrado, is a fire-adapted biome covering more than 20% of the country's total area. It presents the highest numbers of fire events, making it particularly susceptible to changes in climate. It is thus essential to understand the present fire regimes in Brazilian biomes, in order to better evaluate future patterns. The CPTEC/INPE, the Brazilian Center for Weather Forecasting and Climate Research at the Brazilian National Institute of Space Research developed a fire danger index based on the occurrence of hundreds of thousands of fire events in the main Brazilian biomes [2]: the Meteorological Fire Danger Index (MFDI). This index indicates the predisposition of vegetation to be burned on a given day, for given climate conditions preceding that day. It relies on daily values of air temperature, relative humidity, accumulated precipitation and vegetation cover. In this study we aim to access the capability of the MFDI to accurately replicate present fire conditions for different biomes, with a special focus on cerrado. To this end, we assess the link between the MFDI as calculated by three different reanalysis (ERA-Interim, NCEP/DOE Reanalysis 2 and MERRA-2) and the observed burned area. We further calculate the validated MFDI using a regional climate model, the RCA4 as forced by EC-Earth from CORDEX, to understand the ability of the model to characterize present fire danger. Finally, the need to calibrate the model to better characterize future fire danger was also evaluated. This work was developed within the framework of the Brazilian Fire-Land-Atmosphere System (BrFLAS) Project financed by the Portuguese and Brazilian science foundations, FCT and FAPESP (project references FAPESP/1389/2014 and 2014/20042-2). [1] KRAWCHUK, M.A.; MORITZ, M.A.; PARISIEN, M.A.; VAN DORN, J

  5. Dangerous snakes, deadly snakes and medically important snakes

    Science.gov (United States)

    2013-01-01

    This correspondence argues that the dangerousness of a venomous snake species is not solely determined by the venom characteristics or the lethality of the snake, and recognizes that medical importance comprises a key variable as well. The medical importance of a snake is determined by several factors – including frequency of medical attention after a bite, local or systemic envenomation provoked by the bite, fatal bites, long term consequences, availability of antivenom therapy as well as the size of the population at risk – that may vary from one region to another. PMID:24099013

  6. Technological Dangers and the Potential of Human-Robot Interaction

    DEFF Research Database (Denmark)

    2016-01-01

    watching a soccer game in which our child is one of the players. The question of which team we should cheer for never occurs to the parent. By changing the vantage point to a radical phenomenological perspective, informed by Eastern as well as Western thought, this chapter tests the basis for this type...... technological dangers and opportunities. Finally, aiming for the very limits of the theory, I discuss the contours of a praxis facilitating being-with-robots beyond conceptualization. Basically, this mode of being, pertaining to non-technological HRI, bypasses Heidegger’s warnings, and potentially facilitates...

  7. Reheating the Standard Model from a hidden sector

    Science.gov (United States)

    Tenkanen, Tommi; Vaskonen, Ville

    2016-10-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before big bang nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful big bang nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  8. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-01-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  9. Backward causation, hidden variables and the meaning of completeness

    Indian Academy of Sciences (India)

    Huw Price

    2001-02-01

    Bell’s theorem requires the assumption that hidden variables are independent of future measurement settings. This independence assumption rests on surprisingly shaky ground. In particular, it is puzzlingly time-asymmetric. The paper begins with a summary of the case for considering hidden variable models which, in abandoning this independence assumption, allow a degree of ‘backward causation’. The remainder of the paper clarifies the physical significance of such models, in relation to the issue as to whether quantum mechanics provides a complete description of physical reality.

  10. Dynamically Generated Open and Hidden Charm Meson Systems

    CERN Document Server

    Gamermann, D; Strottman, D D; Vacas, M J V

    2006-01-01

    The lowest order chiral Lagrangian successfully applied to study the interaction of the SU(3) octet of pseudo-scalar mesons is generalized to include all mesons from the SU(4) 15-plet of pseudo-scalar mesons. Exchanges of heavy vector mesons, which are indirectly taken into account via this approach, are suppressed. Unitarization in coupled channels leads to dynamical generation of resonances in the open and hidden charm sectors. In particular, for reasonable values of the input, a new narrow scalar resonance in the hidden charm sector appears with a mass of 3.7 GeV.

  11. Reheating the Standard Model from a Hidden Sector

    CERN Document Server

    Tenkanen, Tommi

    2016-01-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before Big Bang Nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful Big Bang Nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  12. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-02-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  13. Image Coding using Markov Models with Hidden States

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto

    1999-01-01

    The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same.......The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same....

  14. How to Find a Hidden World at the LHC

    CERN Document Server

    Wells, James D

    2008-01-01

    I discuss how the Large Hadron Collider era should broaden our view of particle physics research, and apply this thinking to the case of Hidden Worlds. I focus on one of the simplest representative cases of a Hidden World, and detail the rich implications it has for LHC physics, including universal suppression of Higgs boson production, trans-TeV heavy Higgs boson signatures, heavy-to-light Higgs boson decays, weakly coupled exotic gauge bosons, and Higgs boson decays to four fermions via light exotic gauge bosons. Some signatures may be accessible in the very early stages of collider operation, whereas others motivate a later high-lumonosity upgrade.

  15. 78 FR 17744 - Culturally Significant Objects Imported for Exhibition Determinations: “Maya: Hidden Worlds...

    Science.gov (United States)

    2013-03-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Culturally Significant Objects Imported for Exhibition Determinations: ``Maya: Hidden Worlds Revealed... determine that the objects to be included in the exhibition ``Maya: Hidden Worlds Revealed,'' imported...

  16. The Function and the Utilization of Hidden Curriculum in College English Teaching

    Institute of Scientific and Technical Information of China (English)

    张英

    2013-01-01

    Explore the nature of the hidden curriculum, and utilize the positive functions of hidden curriculum with theory on English teaching and psychological linguistics to obtain desirable effects in College English teaching.

  17. Expert Guide

    DEFF Research Database (Denmark)

    Heiselberg, Per

    This guide summarizes the work of Subtask B of IEA-ECBCS Annex 44 “Integrating Environmentally Responsive Elements in Buildings” and is based on the contributions from the participating countries. The publication is an official Annex report. With a focus on innovative building concepts...... that dynamically respond to changes in climate and user demands, the report describes building concepts, design methods and tools that have been tested in theory and practice in buildings around the world. This guide is aimed at designers and consultants and describes the principles of responsive building concepts...

  18. Guiding young adults at risk

    DEFF Research Database (Denmark)

    Andreasen, Karen Egedal; Rasmussen, Palle Damkjær; Ydesen, Christian

    2016-01-01

    Karen Egedal Andreasen, Palle Rasmussen and Christian Ydesen question in their article, how to guide youth in danger of being marginalised or excluded from society in general and the labour market in particular. They analyse the guidance dimension in the youth in development project as described...... in the project and by the youths participating in the project. The project was designed to facilitate and support transition to an adult life by giving participants social support, feedback, experiences, room for reflection and feeling of acceptance and inclusion. In Denmark all social work with young people...... at risk involves guidance to “the right path”, since individual guidance seems to be the key asset in mobilizing young person’s needs and experiences. The article indicates important elements in the guidance of youth at risk, such as psychological intervention and personal support, support from...

  19. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    Indian Academy of Sciences (India)

    H Itoh; N Okada; T Yamashita

    2007-11-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden.

  20. Coarse-grained hidden entropy production in partially inaccessible quantum jump trajectories

    OpenAIRE

    Frenzel, Max F.; Sagawa, Takahiro

    2016-01-01

    We consider an open quantum system for which only a subset of all possible transitions are accessible, while the remaining ones are hidden from direct observation. Using a modification of the notion of quantum jump trajectories we introduce the coarse-grained hidden entropy, which quantifies the entropy production in the hidden subsystem conditioned on our observations of the visible part. The entropy production consisting of the sum of visible and coarse-grained hidden entropy is shown to sa...