WorldWideScience

Sample records for hidden dangers guide

  1. EMPLOYING SENSOR NETWORK TO GUIDE FIREFIGHTERS IN DANGEROUS AREA

    DEFF Research Database (Denmark)

    Koohi, Hamidreza; Nadernejad, Ehsan; Fathi, Mahmoud

    2010-01-01

    In this paper, we intend to focus on the sensor network applications in firefighting. A distributed algorithm is developed for the sensor network to guide firefighters through a burning area. The sensor network models the danger of the area under coverage as obstacles, and has the property to adapt...... itself against possible changes. The protocol developed, will integrate the artificial potential field of the sensors with the information of the intended place of moving firefighter so that it guides the firefighter step by step through the sensor network by choosing the safest path in dangerous zones....... This protocol is simulated by Visual-Sense and the simulation results are available. Keyword: Firefighter, Sensor Network, Potential Field, Area’s Danger, Navigation...

  2. Stroke: a Hidden Danger of Margin Trading in Stock Markets.

    Science.gov (United States)

    Lin, Shu-Hui; Wang, Chien-Ho; Liu, Tsai-Ching; Chen, Chin-Shyan

    2015-10-01

    Using 10-year population data from 2000 through 2009 in Taiwan, this is the first paper to analyze the relationship between margin trading in stock markets and stroke hospitalizations. The results show that 3 and 6 days after an increase of margin trading in the Taiwan stock markets are associated with greater stoke hospitalizations. In general, a 1 % increase in total margin trading positions is associated with an increment of 2.5 in the total number of stroke hospitalizations, where the mean number of hospital admissions is 233 cases a day. We further examine the effects of margin trading by gender and age groups and find that the effects of margin trading are significant for males and those who are 45-74 years old only. In summary, buying stocks with money you do not have is quite risky, especially if the prices of those stocks fall past a certain level or if there is a sudden and severe drop in the stock market. There is also a hidden danger to one's health from margin trading. A person should be cautious before conducting margin trading, because while it can be quite profitable, danger always lurks just around the corner.

  3. Waste dumps in local communities in developing countries and hidden danger to health.

    Science.gov (United States)

    Anetor, Gloria O

    2016-07-01

    The rapid industrialisation and urbanisation fuelled by a fast-growing population has led to the generation of a huge amount of waste in most communities in developing countries. The hidden disorders and health dangers in waste dumps are often ignored. The waste generated in local communities is usually of a mixed type consisting of domestic waste and waste from small-scale industrial activities. Among these wastes are toxic metals, lead (Pb), cadmium (Cd), arsenic (As), mercury (Hg), halogenated organic compounds, plastics, remnants of paints that are themselves mixtures of hazardous substances, hydrocarbons and petroleum product-contaminated devices. Therefore, there is the urgent need to create an awareness of the harmful health effect of toxic wastes in developing countries, especially Nigeria. This is a review aimed at creating awareness on the hidden dangers of waste dumps to health in local communities in developing countries. Many publications in standard outlets use the following keywords: cancer, chemical toxicity, modern environmental health hazards, waste management and waste speciation in PubMed, ISI, Toxbase environmental digest, related base journals, and some standard textbooks, as well as the observation of the researcher between 1959 and 2014. Studies revealed the preponderance of toxic chemicals such as Pb, Cd, As and Hg in dump sites that have the risk of entering food chain and groundwater supplies, and these can give rise to endemic malnutrition and may also increase susceptibility to mutagenic substances, thereby increasing the incidence of cancer in developing countries. Industrialisation and urbanisation have brought about a change in the waste that is generated in contemporary communities in developing countries. Therefore, there is the need to embrace speciation and sound management of waste, probably including bioremediation. The populations in the local communities need regulatory agencies who are health educators as positive change

  4. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Ophthalmology/Strabismus Ocular Pathology/Oncology Oculoplastics/Orbit Refractive Management/Intervention Retina/Vitreous Uveitis Focus ... Halloween Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without ...

  5. Colored Contact Lens Dangers

    Science.gov (United States)

    ... Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without a Prescription Leer en Español: Peligros asociados ... truth." Real People, Real Problems with Colored Contact Lenses Julian: Teenager Blinded In One Eye By Non- ...

  6. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without a Prescription Leer en Español: Peligros asociados ... truth." Real People, Real Problems with Colored Contact Lenses Julian: Teenager Blinded In One Eye By Non- ...

  7. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Español Eye Health / News Halloween Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without a Prescription ... be purchased over-the-counter or on the Internet," says Thomas Steinemann, MD, professor of ophthalmology at ...

  8. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Tips & Prevention News Ask an Ophthalmologist Patient Stories Español Eye Health / News Halloween Hazard: The Hidden Dangers ... Decorative Contact Lenses Without a Prescription Leer en Español: Peligros asociados con los lentes de contacto de ...

  9. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Health / News Halloween Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without a Prescription Leer en Español: Peligros asociados con los lentes de contacto de color Sep. 26, 2013 It started as an impulsive buy from a souvenir shop, but 10 hours ...

  10. Damage evaluation by a guided wave-hidden Markov model based method

    Science.gov (United States)

    Mei, Hanfei; Yuan, Shenfang; Qiu, Lei; Zhang, Jinjin

    2016-02-01

    Guided wave based structural health monitoring has shown great potential in aerospace applications. However, one of the key challenges of practical engineering applications is the accurate interpretation of the guided wave signals under time-varying environmental and operational conditions. This paper presents a guided wave-hidden Markov model based method to improve the damage evaluation reliability of real aircraft structures under time-varying conditions. In the proposed approach, an HMM based unweighted moving average trend estimation method, which can capture the trend of damage propagation from the posterior probability obtained by HMM modeling is used to achieve a probabilistic evaluation of the structural damage. To validate the developed method, experiments are performed on a hole-edge crack specimen under fatigue loading condition and a real aircraft wing spar under changing structural boundary conditions. Experimental results show the advantage of the proposed method.

  11. Locating Hidden Servers

    National Research Council Canada - National Science Library

    Oeverlier, Lasse; Syverson, Paul F

    2006-01-01

    .... Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Without Borders have issued guides that describe using hidden services via Tor to protect the safety of dissidents as well as to resist censorship...

  12. Child Abuse: The Hidden Bruises

    Science.gov (United States)

    ... for Families - Vietnamese Spanish Facts for Families Guide Child Abuse - The Hidden Bruises No. 5; Updated November 2014 The statistics on physical child abuse are alarming. It is estimated hundreds of thousands ...

  13. Experimental and Computational Studies on the Scattering of an Edge-Guided Wave by a Hidden Crack on a Racecourse Shaped Hole.

    Science.gov (United States)

    Vien, Benjamin Steven; Rose, Louis Raymond Francis; Chiu, Wing Kong

    2017-07-01

    Reliable and quantitative non-destructive evaluation for small fatigue cracks, in particular those in hard-to-inspect locations, is a challenging problem. Guided waves are advantageous for structural health monitoring due to their slow geometrical decay of amplitude with propagating distance, which is ideal for rapid wide-area inspection. This paper presents a 3D laser vibrometry experimental and finite element analysis of the interaction between an edge-guided wave and a small through-thickness hidden edge crack on a racecourse shaped hole that occurs, in practice, as a fuel vent hole. A piezoelectric transducer is bonded on the straight edge of the hole to generate the incident wave. The excitation signal consists of a 5.5 cycle Hann-windowed tone burst of centre frequency 220 kHz, which is below the cut-off frequency for the first order Lamb wave modes (SH1). Two-dimensional fast Fourier transformation (2D FFT) is applied to the incident and scattered wave field along radial lines emanating from the crack mouth, so as to identify the wave modes and determine their angular variation and amplitude. It is shown experimentally and computationally that mid-plane symmetric edge waves can travel around the hole's edge to detect a hidden crack. Furthermore, the scattered wave field due to a small crack length, a , (compared to the wavelength λ of the incident wave) is shown to be equivalent to a point source consisting of a particular combination of body-force doublets. It is found that the amplitude of the scattered field increases quadratically as a function of a/λ , whereas the scattered wave pattern is independent of crack length for small cracks a < λ . This study of the forward scattering problem from a known crack size provides a useful guide for the inverse problem of hidden crack detection and sizing.

  14. The Hidden Dimensions of Databases.

    Science.gov (United States)

    Jacso, Peter

    1994-01-01

    Discusses methods of evaluating commercial online databases and provides examples that illustrate their hidden dimensions. Topics addressed include size, including the number of records or the number of titles; the number of years covered; and the frequency of updates. Comparisons of Readers' Guide Abstracts and Magazine Article Summaries are…

  15. Prediction of super-heavy N⁎ and Λ⁎ resonances with hidden beauty

    International Nuclear Information System (INIS)

    Wu Jiajun; Zhao Lu; Zou, B.S.

    2012-01-01

    The meson-baryon coupled channel unitary approach with the local hidden gauge formalism is extended to the hidden beauty sector. A few narrow N ⁎ and Λ ⁎ resonances around 11 GeV are predicted as dynamically generated states from the interactions of heavy beauty mesons and baryons. Production cross sections of these predicted resonances in pp and ep collisions are estimated as a guide for the possible experimental search at relevant facilities.

  16. Hidden treasures - 50 km points of interests

    Science.gov (United States)

    Lommi, Matias; Kortelainen, Jaana

    2015-04-01

    Tampere is third largest city in Finland and a regional centre. During 70's there occurred several communal mergers. Nowadays this local area has both strong and diversed identity - from wilderness and agricultural fields to high density city living. Outside the city center there are interesting geological points unknown for modern city settlers. There is even a local proverb, "Go abroad to Teisko!". That is the area the Hidden Treasures -student project is focused on. Our school Tammerkoski Upper Secondary School (or Gymnasium) has emphasis on visual arts. We are going to offer our art students scientific and artistic experiences and knowledge about the hidden treasures of Teisko area and involve the Teisko inhabitants into this project. Hidden treasures - Precambrian subduction zone and a volcanism belt with dense bed of gold (Au) and arsenic (As), operating goldmines and quarries of minerals and metamorphic slates. - North of subduction zone a homogenic precambrian magmastone area with quarries, products known as Kuru Grey. - Former ashores of post-glasial Lake Näsijärvi and it's sediments enabled the developing agriculture and sustained settlement. Nowadays these ashores have both scenery and biodiversity values. - Old cattle sheds and dairy buildings made of local granite stones related to cultural stonebuilding inheritance. - Local active community of Kapee, about 100 inhabitants. Students will discover information of these "hidden" phenomena, and rendering this information trough Enviromental Art Method. Final form of this project will be published in several artistic and informative geocaches. These caches are achieved by a GPS-based special Hidden Treasures Cycling Route and by a website guiding people to find these hidden points of interests.

  17. Danger Zones Dead Ahead For The U.S. And China: Prospects And Challenges

    OpenAIRE

    Linnea B. McCord; Terry Young; Peggy J. Crawford

    2013-01-01

    To be successful and remain independent, every country must create a prosperous economy, keep peace among its people, maintain political stability, and ensure the security of the people and the country from internal and external threats. Doing all four at the same time is never easy and in a time of economic volatility, change, and uncertainty juggling all four becomes more difficult. This is when countries enter the danger zone where hidden cracks and fissures in a countrys organization an...

  18. Hidden Liquidity

    OpenAIRE

    Cebiroglu, Gökhan; Horst, Ulrich

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, hi...

  19. Sociology of Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Alireza Moradi

    2017-06-01

    Full Text Available This paper reviews the concept of hidden curriculum in the sociological theories and wants to explain sociological aspects of formation of hidden curriculum. The main question concentrates on the theoretical approaches in which hidden curriculum is explained sociologically.For this purpose it was applied qualitative research methodology. The relevant data include various sociological concepts and theories of hidden curriculum collected by the documentary method. The study showed a set of rules, procedures, relationships and social structure of education have decisive role in the formation of hidden curriculum. A hidden curriculum reinforces by existed inequalities among learners (based on their social classes or statues. There is, in fact, a balance between the learner's "knowledge receptions" with their "inequality proportion".The hidden curriculum studies from different major sociological theories such as Functionalism, Marxism and critical theory, Symbolic internationalism and Feminism. According to the functionalist perspective a hidden curriculum has a social function because it transmits social values. Marxists and critical thinkers correlate between hidden curriculum and the totality of social structure. They depicts that curriculum prepares learners for the exploitation in the work markets. Symbolic internationalism rejects absolute hegemony of hidden curriculum on education and looks to the socialization as a result of interaction between learner and instructor. Feminism theory also considers hidden curriculum as a vehicle which legitimates gender stereotypes.

  20. Headaches - danger signs

    Science.gov (United States)

    Migraine headache - danger signs; Tension headache - danger signs; Cluster headache - danger signs; Vascular headache - danger signs ... and other head pain. In: Goldman L, Schafer AI, eds. Goldman-Cecil Medicine . 25th ed. Philadelphia, PA: ...

  1. Hidden measurements, hidden variables and the volume representation of transition probabilities

    OpenAIRE

    Oliynyk, Todd A.

    2005-01-01

    We construct, for any finite dimension $n$, a new hidden measurement model for quantum mechanics based on representing quantum transition probabilities by the volume of regions in projective Hilbert space. For $n=2$ our model is equivalent to the Aerts sphere model and serves as a generalization of it for dimensions $n \\geq 3$. We also show how to construct a hidden variables scheme based on hidden measurements and we discuss how joint distributions arise in our hidden variables scheme and th...

  2. Contesting danger

    DEFF Research Database (Denmark)

    Heathershaw, John; Megoran, Nick

    2011-01-01

    and subsequent considerations of the region in terms of the war on terror. It considers several examples of this discourse of danger including the popular US TV drama about presidential politics, The West Wing, the policy texts of ‘Washingtonian security analysis’ and accounts of danger, insecurity and urban...... of danger is contested within the region. The example of urban violence in Osh, Kyrgyzstan and Jalalabad, Afghanistan in 2010 demonstrates how opportunities to mitigate conflict may have been lost due to the distortions of this discourse of danger. It concludes by raising the challenge to policy...

  3. Toxic or dangerous substances present construction materials

    International Nuclear Information System (INIS)

    Campos Alvarado, A.

    2003-01-01

    The purpose of this investigation is the elaboration of a guide which could be used as a support and consultation concerning the topic of safety in the construction, specifically in the area of the use and managing of material and dangerous substances; considering the possible dangers to medium and long term that some of the common construction materials represent for the health. The gathered information is the result of the review of bibliographical material, the visits to public institutions at national level and to international offices which representation in our country, this way as a work of field and of study of the national market, among others. Besides important consult through the Internet checking many sites of interest with the finality of getting more updated information as possible, like that as the consultation to professionals and workers related to the construction area. (Author) [es

  4. NFDRSPC: The National Fire-Danger Rating System on a Personal Computer

    Science.gov (United States)

    Bryan G. Donaldson; James T. Paul

    1990-01-01

    This user's guide is an introductory manual for using the 1988 version (Burgan 1988) of the National Fire-Danger Rating System on an IBM PC or compatible computer. NFDRSPC is a window-oriented, interactive computer program that processes observed and forecast weather with fuels data to produce NFDRS indices. Other program features include user-designed display...

  5. Hidden gauge symmetry

    International Nuclear Information System (INIS)

    O'Raifeartaigh, L.

    1979-01-01

    This review describes the principles of hidden gauge symmetry and of its application to the fundamental interactions. The emphasis is on the structure of the theory rather than on the technical details and, in order to emphasise the structure, gauge symmetry and hidden symmetry are first treated as independent phenomena before being combined into a single (hidden gauge symmetric) theory. The main application of the theory is to the weak and electromagnetic interactions of the elementary particles, and although models are used for comparison with experiment and for illustration, emphasis is placed on those features of the application which are model-independent. (author)

  6. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  7. Keep away from danger: Dangerous objects in dynamic and static situations

    Directory of Open Access Journals (Sweden)

    Filomena eAnelli

    2013-07-01

    Full Text Available Behavioral and neuroscience studies have shown that objects observation evokes specific affordances (i.e., action possibilities and motor responses. Recent findings provide evidence that even dangerous objects can modulate the motor system evoking aversive affordances. This sounds intriguing since so far the majority of behavioral, brain imaging, and transcranial magnetic stimulation studies with painful and dangerous stimuli strictly concerned the domain of pain, excepted for evidence suggesting sensitivity to objects’ affordances when neutral objects are located in participants’ peripersonal space. This study investigates whether the observation of a neutral or dangerous object in a static or dynamic situation differently influences motor responses, and the time-course of the dangerous objects’ processing. In three experiments we manipulated: object dangerousness (neutral vs. dangerous; object category (artifact vs. natural; manual response typology (press vs. release a key; object presentation (Experiment 1: dynamic, Experiments 2 and 3: static; object movement direction (Experiment 1: away vs. toward the participant or size (Experiments 2 and 3: big vs. normal vs. small. The task required participants to decide whether the object was an artifact or a natural object, by pressing or releasing one key. Results showed a facilitation for neutral over dangerous objects in the static situation, probably due to an affordance effect. Instead, in the dynamic condition responses were modulated by the object movement direction, with a dynamic affordance effect of neutral objects and an escape-avoidance effect of dangerous objects (neutral objects were processed faster when they moved toward-approached the participant, whereas dangerous objects were processed faster when they moved away from the participant. Moreover, static stimuli influenced the manual response typology. These data indicate the emergence of dynamic affordance and escaping

  8. Hidden charged dark matter

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Kaplinghat, Manoj; Tu, Huitzu; Yu, Hai-Bo

    2009-01-01

    Can dark matter be stabilized by charge conservation, just as the electron is in the standard model? We examine the possibility that dark matter is hidden, that is, neutral under all standard model gauge interactions, but charged under an exact (\\rm U)(1) gauge symmetry of the hidden sector. Such candidates are predicted in WIMPless models, supersymmetric models in which hidden dark matter has the desired thermal relic density for a wide range of masses. Hidden charged dark matter has many novel properties not shared by neutral dark matter: (1) bound state formation and Sommerfeld-enhanced annihilation after chemical freeze out may reduce its relic density, (2) similar effects greatly enhance dark matter annihilation in protohalos at redshifts of z ∼ 30, (3) Compton scattering off hidden photons delays kinetic decoupling, suppressing small scale structure, and (4) Rutherford scattering makes such dark matter self-interacting and collisional, potentially impacting properties of the Bullet Cluster and the observed morphology of galactic halos. We analyze all of these effects in a WIMPless model in which the hidden sector is a simplified version of the minimal supersymmetric standard model and the dark matter is a hidden sector stau. We find that charged hidden dark matter is viable and consistent with the correct relic density for reasonable model parameters and dark matter masses in the range 1 GeV ∼ X ∼< 10 TeV. At the same time, in the preferred range of parameters, this model predicts cores in the dark matter halos of small galaxies and other halo properties that may be within the reach of future observations. These models therefore provide a viable and well-motivated framework for collisional dark matter with Sommerfeld enhancement, with novel implications for astrophysics and dark matter searches

  9. Localization of hidden Chua's attractors

    International Nuclear Information System (INIS)

    Leonov, G.A.; Kuznetsov, N.V.; Vagaitsev, V.I.

    2011-01-01

    The classical attractors of Lorenz, Rossler, Chua, Chen, and other widely-known attractors are those excited from unstable equilibria. From computational point of view this allows one to use numerical method, in which after transient process a trajectory, started from a point of unstable manifold in the neighborhood of equilibrium, reaches an attractor and identifies it. However there are attractors of another type: hidden attractors, a basin of attraction of which does not contain neighborhoods of equilibria. In the present Letter for localization of hidden attractors of Chua's circuit it is suggested to use a special analytical-numerical algorithm. -- Highlights: → There are hidden attractors: basin doesn't contain neighborhoods of equilibria. → Hidden attractors cannot be reached by trajectory from neighborhoods of equilibria. → We suggested special procedure for localization of hidden attractors. → We discovered hidden attractor in Chua's system, L. Chua in his work didn't expect this.

  10. Hidden Liquidity: Determinants and Impact

    OpenAIRE

    Gökhan Cebiroglu; Ulrich Horst

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, ...

  11. Toxic substances or dangerous presents in the construction materials

    International Nuclear Information System (INIS)

    Campos Alvarado, A.

    2003-01-01

    The purpose of this work of investigation is the elaboration of a guide who serves as support and consults in the referring thing to the subject of the security in the construction, specifically in and area of the use and handling of materials and dangerous substances; Considering the possible dangers to medium and long term that some of but the common construction equipments represent for the health. The obtained data is a bibliographical review, the visits to public institutions and international offices with representation in our country, as well as a work of field and study of the national market, among others. In addition it made an important consultation through network Internet reviewing many sites of with the purpose of obtaining the data but updated interest possible, as well as the consultation to professionals and workers with the area of the construction. (Author) [es

  12. Hidden Curriculum: An Analytical Definition

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Andarvazh

    2018-03-01

    Full Text Available Background: The concept of hidden curriculum was first used by Philip Jackson in 1968, and Hafferty brought this concept to the medical education. Many of the subjects that medical students learn are attributed to this curriculum. So far several definitions have been presented for the hidden curriculum, which on the one hand made this concept richer, and on the other hand, led to confusion and ambiguity.This paper tries to provide a clear and comprehensive definition of it.Methods: In this study, concept analysis of McKenna method was used. Using keywords and searching in the databases, 561 English and 26 Persian references related to the concept was found, then by limitingthe research scope, 125 abstracts and by finding more relevant references, 55 articles were fully studied.Results: After analyzing the definitions by McKenna method, the hidden curriculum is defined as follows: The hidden curriculum is a hidden, powerful, intrinsic in organizational structure and culture and sometimes contradictory message, conveyed implicitly and tacitly in the learning environment by structural and human factors and its contents includes cultural habits and customs, norms, values, belief systems, attitudes, skills, desires and behavioral and social expectations can have a positive or negative effect, unplanned, neither planners nor teachers, nor learners are aware of it. The ultimate consequence of the hidden curriculum includes reproducing the existing class structure, socialization, and familiarizing learners for transmission and joining the professional world.Conclusion: Based on the concept analysis, we arrived at an analytical definition of the hidden curriculum that could be useful for further studies in this area.Keywords: CONCEPT ANALYSIS, HIDDEN CURRICULUM, MCKENNA’S METHOD

  13. Hidden particle production at the ILC

    International Nuclear Information System (INIS)

    Fujii, Keisuke; Itoh, Hideo; Okada, Nobuchika; Hano, Hitoshi; Yoshioka, Tamaki

    2008-01-01

    In a class of new physics models, the new physics sector is completely or partly hidden, namely, a singlet under the standard model (SM) gauge group. Hidden fields included in such new physics models communicate with the standard model sector through higher-dimensional operators. If a cutoff lies in the TeV range, such hidden fields can be produced at future colliders. We consider a scalar field as an example of the hidden fields. Collider phenomenology on this hidden scalar is similar to that of the SM Higgs boson, but there are several features quite different from those of the Higgs boson. We investigate productions of the hidden scalar at the International Linear Collider (ILC) and study the feasibility of its measurements, in particular, how well the ILC distinguishes the scalar from the Higgs boson, through realistic Monte Carlo simulations.

  14. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, M.

    2008-07-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  15. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, Markus; Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the standard model Higgs via a renormalizable quartic term - sometimes called the Higgs portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs, we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone.

  16. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  17. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  18. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression where...

  19. Everyday calculus discovering the hidden math all around us

    CERN Document Server

    Fernandez, Oscar E

    2014-01-01

    Calculus. For some of us, the word conjures up memories of ten-pound textbooks and visions of tedious abstract equations. And yet, in reality, calculus is fun, accessible, and surrounds us everywhere we go. In Everyday Calculus, Oscar Fernandez shows us how to see the math in our coffee, on the highway, and even in the night sky. Fernandez uses our everyday experiences to skillfully reveal the hidden calculus behind a typical day's events. He guides us through how math naturally emerges from simple observations-how hot coffee cools down, for example-and in discussions of over fifty familia

  20. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  1. Hidden photons in connection to dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah; Ringwald, Andreas; Goodsell, Mark D.

    2013-06-01

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  2. POVMs and hidden variables

    International Nuclear Information System (INIS)

    Stairs, Allen

    2007-01-01

    Recent results by Paul Busch and Adan Cabello claim to show that by appealing to POVMs, non-contextual hidden variables can be ruled out in two dimensions. While the results of Busch and Cabello are mathematically correct, interpretive problems render them problematic as no hidden variable proofs

  3. 46 CFR 154.1435 - Medical first aid guide.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Medical first aid guide. 154.1435 Section 154.1435 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY... Equipment § 154.1435 Medical first aid guide. Each vessel must have a copy of the IMO Medical First Aid...

  4. Windows 7 Tweaks A Comprehensive Guide on Customizing, Increasing Performance, and Securing Microsoft Windows 7

    CERN Document Server

    Sinchak, Steve

    2009-01-01

    The definitive guide to unlocking the hidden potential of the Windows 7 OS. Written by bestselling author and the creator of tweaks.com Steve Sinchak, this unique guide provides you with the ultimate collection of hidden gems that will enable you to get the most out of Windows 7. Packed with more than 400 pages of insider tips, the book delves beneath the surface to reveal little-known ways to tweak, modify, and customize Windows 7 so you can get every ounce of performance from your operating system. Regardless of your experience with tweaking your system, you'll find fascinating and fun tips

  5. Helioscope bounds on hidden sector photons

    International Nuclear Information System (INIS)

    Redondo, J.

    2008-01-01

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to χ -14 , depending on the hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter χ at low masses (m γ' <1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  6. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group....

  7. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...

  8. 616 Nonradioactive Dangerous Waste Storage Facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1991-10-01

    The 616 Nonradioactive Dangerous Waste Storage Facility Dangerous Waste Permit Application consists of both a Part A and a Part B permit application. An explanation of the Part A revisions associated with this storage unit, including the Part A included with this document, is provided at the beginning of the Part A Section. The Part B consists of 15 chapters addressing the organization and content of the Part B Checklist prepared by the Washington State Department of Ecology (Ecology 1987). For ease of reference, the checklist section numbers, in brackets, follow chapter headings and subheadings. The 616 Nonradioactive Dangerous Waste Storage Facility Dangerous Waste Permit Application (Revision 0) was submitted to the Washington State Department of Ecology and the US Environmental Protection Agency on July 31, 1989. Revision 1, addressing Washington State Department of Ecology review comments made on Revision 0 dated November 21, 1989, and March 23, 1990, was submitted on June 22, 1990. This submittal, Revision 2, addresses Washington State Department of Ecology review comments made on Revision 1, dated June 22, 1990, August 30, 1990, December 18, 1990, and July 8, 1991

  9. PFP dangerous waste training plan

    International Nuclear Information System (INIS)

    Khojandi, J.

    1996-01-01

    This document establishes the minimum training requirements for the Plutonium Finishing Plant (PFP) personnel who are responsible for management of dangerous waste. The training plan outlines training requirements for handling of solid dangerous waste during generator accumulation and liquid dangerous waste during treatment and storage operations. The implementation of this training plan will ensure the PFP facility compliance with the training plan requirements of Dangerous Waste Regulation. Chapter 173-303-330. Washington Administrative Code (WAC). The requirements for such compliance is described in Section 11.0 of WHC-CM-7-5 Environmental Compliance Manual

  10. Hidden Risk Factors for Women

    Science.gov (United States)

    ... A.S.T. Quiz Hidden Stroke Risk Factors for Women Updated:Nov 22,2016 Excerpted from "What Women Need To Know About The Hidden Risk Factors ... 2012) This year, more than 100,000 U.S. women under 65 will have a stroke. Stroke is ...

  11. Hidden-Sector Dynamics and the Supersymmetric Seesaw

    CERN Document Server

    Campbell, Bruce A; Maybury, David W

    2008-01-01

    In light of recent analyses that have shown that nontrivial hidden-sector dynamics in models of supersymmetry breaking can lead to a significant impact on the predicted low-energy supersymmetric spectrum, we extend these studies to consider hidden-sector effects in extensions of the MSSM to include a seesaw model for neutrino masses. A dynamical hidden sector in an interval of mass scales below the seesaw scale would yield renormalization-group running involving both the anomalous dimension from the hidden sector and the seesaw-extended MSSM renormalization group equations (RGEs). These effects interfere in general, altering the generational mixing of the sleptons, and allowing for a substantial change to the expected level of charged-lepton flavour violation in seesaw-extended MSSM models. These results provide further support for recent theoretical observations that knowledge of the hidden sector is required in order to make concrete low-energy predictions, if the hidden sector is strongly coupled. In parti...

  12. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index.

    Directory of Open Access Journals (Sweden)

    Julie C Ruel-Bergeron

    Full Text Available Deficiencies in essential vitamins and minerals-also termed hidden hunger-are pervasive and hold negative consequences for the cognitive and physical development of children.This analysis evaluates the change in hidden hunger over time in the form of one composite indicator-the Hidden Hunger Index (HHI-using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency. Net changes from 1995-2011 and population weighted regional means for various time periods are measured.Globally, hidden hunger improved (-6.7 net change in HHI from 1995-2011. Africa was the only region to see a deterioration in hidden hunger (+1.9 over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0, while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased.This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs. However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda.Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish.

  13. Recent Ultrasonic Guided Wave Inspection Development Efforts

    International Nuclear Information System (INIS)

    Rose, Joseph L.; Tittmann, Bernhard R.

    2001-01-01

    The recognition of such natural wave guides as plates, rods, hollow cylinders, multi-layer structures or simply an interface between two materials combined with an increased understanding of the physics and wave mechanics of guided wave propagation has led to a significant increase in the number of guided wave inspection applications being developed each year. Of primary attention Is the ability to inspect partially hidden structures, hard to access areas, and treated or insulated structures. An introduction to some physical consideration of guided waves followed by some sample problem descriptions in pipe, ice detection, fouling detection in the foods industry, aircraft, tar coated structures and acoustic microscopy is presented in this paper. A sample problem in Boundary Element Modeling is also presented to illustrate the move in guided wave analysis beyond detection and location analysis to quantification

  14. Hidden variables and locality in quantum theory

    International Nuclear Information System (INIS)

    Shiva, Vandana.

    1978-12-01

    The status of hidden variables in quantum theory has been debated since the 1920s. The author examines the no-hidden-variable theories of von Neumann, Kochen, Specker and Bell, and finds that they all share one basic assumption: averaging over the hidden variables should reproduce the quantum mechanical probabilities. Von Neumann also makes a linearity assumption, Kochen and Specker require the preservation of certain functional relations between magnitudes, and Bell proposes a locality condition. It has been assumed that the extrastatistical requirements are needed to serve as criteria of success for the introduction of hidden variables because the statistical condition is trivially satisfied, and that Bell's result is based on a locality condition that is physically motivated. The author shows that the requirement of weak locality, which is not physically motivated, is enough to give Bell's result. The proof of Bell's inequality works equally well for any pair of commuting magnitudes satisfying a condition called the degeneracy principle. None of the no-hidden-variable proofs apply to a class of hidden variable theories that are not phase-space reconstructions of quantum mechanics. The author discusses one of these theories, the Bohm-Bub theory, and finds that hidden variable theories that re all the quantum statistics, for single and sequential measurements, must introduce a randomization process for the hidden variables after each measurement. The philosophical significance of this theory lies in the role it can play in solving the conceptual puzzles posed by quantum theory

  15. The Art of the Hidden: Magical and Esoteric Practices in Rinconete y Cortadillo

    Directory of Open Access Journals (Sweden)

    Frederick A. de Armas

    2013-12-01

    Full Text Available One of the most frequently studied motifs in Rinconete y Cortadillo has been its relation to the picaresque as well as the new elements that it brings to this genre. It has also been asserted that, since chronologically it is one of the first novellas included in the collection of Novelas ejemplares, it eschews the structures of romance, which are prevalent in later novellas. This study foregrounds a series of elements of romance which can be found in Rinconete y Cortadillo and that reveal a series of hidden mysteries in the novella. The essay analyzes, among others, the motif of descent and the infernal geography of the novella; the presence of Mercury as a guide to the infernal regions; the final ascent promised by Rinconete and the onomastic secrets hidden in his name; the significance of perfect friendship; the desire for freedom and its implications; and the meaning of joy as found among the rogues and the followers of the barbarous Monipodio.

  16. The Clinical Prediction of Dangerousness.

    Science.gov (United States)

    1985-05-01

    8217 8 ings. Szasz (1963) has argued persuasively that clinical predictions of future dangerous behavior are unfairly focused on the mentally ill...Persons labeled paranoid, Szasz states, are readily commitable, while highly dangerous drunken drivers are not. Indeed, dangerousness such as that...Psychology, 31, 492-494. Szasz , T. (1963). Law, liberty and psychiatry. New York: Macmillan. Taft, R. (1955). The ability to judge people. Psychological

  17. … To be hidden does not mean to be merely revealed – Part 1 Artistic research on hidden curriculum

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-09-01

    Full Text Available This text revisits the long-term project Hidden Curriculum, initiated by Annette Krauss. The project addresses unquestioned routines, hierarchies of knowledge (part 1, and the role of the body in learning processes (part 2 from the perspective of secondary/high school education (in the research on a hidden curriculum. A deeper analysis of educational studies on the phenomenon of ‘hidden curriculum’ in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire, and Jacques Rancière brings forward important insights generated through the artistic research within hidden curriculum. The aim of this text is to address academic canons, corporeality, and investigate everyday norms through revisiting the framework, results, and processes of the collaborative research into hidden curriculum with secondary high school students.

  18. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index

    Science.gov (United States)

    Stevens, Gretchen A.; Ezzati, Majid; Black, Robert E.; Kraemer, Klaus

    2015-01-01

    Background Deficiencies in essential vitamins and minerals–also termed hidden hunger–are pervasive and hold negative consequences for the cognitive and physical development of children. Methods This analysis evaluates the change in hidden hunger over time in the form of one composite indicator–the Hidden Hunger Index (HHI)–using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency). Net changes from 1995–2011 and population weighted regional means for various time periods are measured. Findings Globally, hidden hunger improved (-6.7 net change in HHI) from 1995–2011. Africa was the only region to see a deterioration in hidden hunger (+1.9) over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0), while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased. Interpretation This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs). However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda. Funding Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish. PMID:26673631

  19. Dangerous quantities of radioactive material (D-values)

    International Nuclear Information System (INIS)

    2010-01-01

    Radioactive material is widely used in industry, medicine, education and agriculture. In addition, it occurs naturally. The health risk posed by these materials vary widely depending on many factors, the most important of which are the amount of the material involved and its physical and chemical form. Therefore, there is a need to identify the quantity and type of radioactive material for which emergency preparedness and other arrangements (e.g. security) are warrant due to the health risk they pose. The aim of this publication is to provide practical guidance for Member States on that quantity of radioactive material that may be considered dangerous. A dangerous quantity is that, which if uncontrolled, could be involved in a reasonable scenario resulting in the death of an exposed individual or a permanent injury, which decreases that person's quality of life. This publication is published as part of the IAEA Emergency Preparedness and Response Series. It supports several publications including: the IAEA Safety Requirements 'Preparedness and Response for a Nuclear or Radiological Emergency', IAEA Safety Standards Series No. GS-R-2. IAEA, Vienna (2002). IAEA Safety Guide 'Categorization of Radioactive Sources', IAEA Safety Standards Series No RS-G-1.9, IAEA, Vienna (2005) and IAEA Safety Guide 'Arrangements for Preparedness for a Nuclear or Radiological Emergency' IAEA Safety Standards Series No. GS-G-2.1, IAEA, Vienna (2006). The procedures and data in this publication have been prepared with due attention to accuracy. However, as part of the review process, they undergo ongoing quality assurance checks. Comments are welcome and, following a period that will allow for a more extensive review, the IAEA may revise this publication as part of the process of continuous improvement. The publication uses a number of exposure scenarios, risk models and dosimetric data, which could be used during the response to nuclear or radiological emergency or other purposes

  20. Compressing the hidden variable space of a qubit

    OpenAIRE

    Montina, Alberto

    2010-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of a single realization is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with the quantum states satisfy reasonable criteria ...

  1. Search for Hidden Particles

    CERN Multimedia

    Solovev, V

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  2. The perception of the hidden curriculum on medical education: an exploratory study

    Directory of Open Access Journals (Sweden)

    Murakami Manabu

    2009-12-01

    Full Text Available Abstract Background Major curriculum reform of undergraduate medical education occurred during the past decades in the United Kingdom (UK; however, the effects of the hidden curriculum, which influence the choice of primary care as a career, have not been sufficiently recognized. While Japan, where traditionally few institutions systematically foster primary care physicians and very few have truly embraced family medicine as their guiding discipline, has also experienced meaningful curriculum reform, the effect of the hidden curriculum is not well known. The aim of this study is to identify themes pertaining to the students' perceptions of the hidden curriculum affecting undergraduate medical education in bedside learning in Japan. Methods Semi-structured interviews with thematic content analysis were implemented. Undergraduate year-5 students from a Japanese medical school at a Japanese teaching hospital were recruited. Interview were planned to last between 30 to 60 minutes each, over an 8-month period in 2007. The interviewees' perceptions concerning the quality of teaching in their bedside learning and related experiences were collected and analysed thematically. Results Twenty five medical students (18 males and 7 females, mean age 25 years old consented to participate in the interviews, and seven main themes emerged: "the perception of education as having a low priority," "the prevalence of positive/negative role models," "the persistence of hierarchy and exclusivity," "the existence of gender issues," "an overburdened medical knowledge," "human relationships with colleagues and medical team members," and "first experience from the practical wards and their patients." Conclusions Both similarities and differences were found when comparing the results to those of previous studies in the UK. Some effects of the hidden curriculum in medical education likely exist in common between the UK and Japan, despite the differences in their demographic

  3. Higgs Portal into Hidden Sectors

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    Several attractive theoretical ideas suggest the existence of one or more 'hidden sectors' consisting of standard model singlet fields, some of which may not be too heavy. There is a profound reason to think that the Higgs sector might provide the first access to these hidden sectors. This scenario could affect Higgs phenomenology in drastic ways.

  4. Hidden in plain sight: the formal, informal, and hidden curricula of a psychiatry clerkship.

    Science.gov (United States)

    Wear, Delese; Skillicorn, Jodie

    2009-04-01

    To examine perceptions of the formal, informal, and hidden curricula in psychiatry as they are observed and experienced by (1) attending physicians who have teaching responsibilities for residents and medical students, (2) residents who are taught by those same physicians and who have teaching responsibilities for medical students, and (3) medical students who are taught by attendings and residents during their psychiatry rotation. From June to November 2007, the authors conducted focus groups with attendings, residents, and students in one midwestern academic setting. The sessions were audiotaped, transcribed, and analyzed for themes surrounding the formal, informal, and hidden curricula. All three groups offered a similar belief that the knowledge, skills, and values of the formal curriculum focused on building relationships. Similarly, all three suggested that elements of the informal and hidden curricula were expressed primarily as the values arising from attendings' role modeling, as the nature and amount of time attendings spend with patients, and as attendings' advice arising from experience and intuition versus "textbook learning." Whereas students and residents offered negative values arising from the informal and hidden curricula, attendings did not, offering instead the more positive values they intended to encourage through the informal and hidden curricula. The process described here has great potential in local settings across all disciplines. Asking teachers and learners in any setting to think about how they experience the educational environment and what sense they make of all curricular efforts can provide a reality check for educators and a values check for learners as they critically reflect on the meanings of what they are learning.

  5. A Novel Method for Decoding Any High-Order Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Fei Ye

    2014-01-01

    Full Text Available This paper proposes a novel method for decoding any high-order hidden Markov model. First, the high-order hidden Markov model is transformed into an equivalent first-order hidden Markov model by Hadar’s transformation. Next, the optimal state sequence of the equivalent first-order hidden Markov model is recognized by the existing Viterbi algorithm of the first-order hidden Markov model. Finally, the optimal state sequence of the high-order hidden Markov model is inferred from the optimal state sequence of the equivalent first-order hidden Markov model. This method provides a unified algorithm framework for decoding hidden Markov models including the first-order hidden Markov model and any high-order hidden Markov model.

  6. Abelian hidden sectors at a GeV

    International Nuclear Information System (INIS)

    Morrissey, David E.; Poland, David; Zurek, Kathryn M.

    2009-01-01

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1) x gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  7. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  8. Guiding young adults at risk

    DEFF Research Database (Denmark)

    Andreasen, Karen Egedal; Rasmussen, Palle Damkjær; Ydesen, Christian

    2016-01-01

    Karen Egedal Andreasen, Palle Rasmussen and Christian Ydesen question in their article, how to guide youth in danger of being marginalised or excluded from society in general and the labour market in particular. They analyse the guidance dimension in the youth in development project as described ...... significant persons and guidance about educational system and possible jobs....

  9. Negativity Bias in Dangerous Drivers.

    Directory of Open Access Journals (Sweden)

    Jing Chai

    Full Text Available The behavioral and cognitive characteristics of dangerous drivers differ significantly from those of safe drivers. However, differences in emotional information processing have seldom been investigated. Previous studies have revealed that drivers with higher anger/anxiety trait scores are more likely to be involved in crashes and that individuals with higher anger traits exhibit stronger negativity biases when processing emotions compared with control groups. However, researchers have not explored the relationship between emotional information processing and driving behavior. In this study, we examined the emotional information processing differences between dangerous drivers and safe drivers. Thirty-eight non-professional drivers were divided into two groups according to the penalty points that they had accrued for traffic violations: 15 drivers with 6 or more points were included in the dangerous driver group, and 23 drivers with 3 or fewer points were included in the safe driver group. The emotional Stroop task was used to measure negativity biases, and both behavioral and electroencephalograph data were recorded. The behavioral results revealed stronger negativity biases in the dangerous drivers than in the safe drivers. The bias score was correlated with self-reported dangerous driving behavior. Drivers with strong negativity biases reported having been involved in mores crashes compared with the less-biased drivers. The event-related potentials (ERPs revealed that the dangerous drivers exhibited reduced P3 components when responding to negative stimuli, suggesting decreased inhibitory control of information that is task-irrelevant but emotionally salient. The influence of negativity bias provides one possible explanation of the effects of individual differences on dangerous driving behavior and traffic crashes.

  10. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  11. Compressing the hidden variable space of a qubit

    International Nuclear Information System (INIS)

    Montina, Alberto

    2011-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of single realizations is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with quantum states satisfy reasonable criteria of regularity. Possible generalizations of this shrinking to an N-dimensional Hilbert space are discussed.

  12. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  13. A classification of hidden-variable properties

    International Nuclear Information System (INIS)

    Brandenburger, Adam; Yanofsky, Noson

    2008-01-01

    Hidden variables are extra components added to try to banish counterintuitive features of quantum mechanics. We start with a quantum-mechanical model and describe various properties that can be asked of a hidden-variable model. We present six such properties and a Venn diagram of how they are related. With two existence theorems and three no-go theorems (EPR, Bell and Kochen-Specker), we show which properties of empirically equivalent hidden-variable models are possible and which are not. Formally, our treatment relies only on classical probability models, and physical phenomena are used only to motivate which models to choose

  14. 46 CFR 5.35 - Conviction for a dangerous drug law violation, use of, or addiction to the use of dangerous drugs.

    Science.gov (United States)

    2010-10-01

    ..., or addiction to the use of dangerous drugs. 5.35 Section 5.35 Shipping COAST GUARD, DEPARTMENT OF... Definitions § 5.35 Conviction for a dangerous drug law violation, use of, or addiction to the use of dangerous... complaint will allege conviction for a dangerous drug law violation or use of dangerous drugs or addiction...

  15. Perspective: Disclosing hidden sources of funding.

    Science.gov (United States)

    Resnik, David B

    2009-09-01

    In this article, the author discusses ethical and policy issues related to the disclosure of hidden sources of funding in research. The author argues that authors have an ethical obligation to disclose hidden sources of funding and that journals should adopt policies to enforce this obligation. Journal policies should require disclosure of hidden sources of funding that authors know about and that have a direct relation to their research. To stimulate this discussion, the author describes a recent case: investigators who conducted a lung cancer screening study had received funding from a private foundation that was supported by a tobacco company, but they did not disclose this relationship to the journal. Investigators and journal editors must be prepared to deal with these issues in a manner that promotes honesty, transparency, fairness, and accountability in research. The development of well-defined, reasonable policies pertaining to hidden sources of funding can be a step in this direction.

  16. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  17. Hidden supersymmetry and Fermion number fractionalization

    International Nuclear Information System (INIS)

    Akhoury, R.

    1985-01-01

    This paper discusses how a hidden supersymmetry of the underlying field theories can be used to interpret and to calculate fermion number fractionalization in different dimensions. This is made possible by relating it to a corresponding Witten index of the hidden supersymmetry. The closely related anomalies in odd dimensions are also discussed

  18. The Hidden Reason Behind Children's Misbehavior.

    Science.gov (United States)

    Nystul, Michael S.

    1986-01-01

    Discusses hidden reason theory based on the assumptions that: (1) the nature of people is positive; (2) a child's most basic psychological need is involvement; and (3) a child has four possible choices in life (good somebody, good nobody, bad somebody, or severely mentally ill.) A three step approach for implementing hidden reason theory is…

  19. The relationship of dangerous driving with traffic offenses: A study on an adapted measure of dangerous driving.

    Science.gov (United States)

    Iliescu, Dragoş; Sârbescu, Paul

    2013-03-01

    Using data from three different samples and more than 1000 participants, the current study examines differences in dangerous driving in terms of age, gender, professional driving, as well as the relationship of dangerous driving with behavioral indicators (mileage) and criteria (traffic offenses). The study uses an adapted (Romanian) version of the Dula Dangerous Driving Index (DDDI, Dula and Ballard, 2003) and also reports data on the psychometric characteristics of this measure. Findings suggest that the Romanian version of the DDDI has sound psychometric properties. Dangerous driving is higher in males and occasional drivers, is not correlated with mileage and is significantly related with speeding as a traffic offense, both self-reported and objectively measured. The utility of predictive models including dangerous driving is not very large: logistic regression models have a significant fit to the data, but their misclassification rate (especially in terms of sensitivity) is unacceptable high. Copyright © 2012 Elsevier Ltd. All rights reserved.

  20. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  1. Dangerous animals capture and maintain attention in humans.

    Science.gov (United States)

    Yorzinski, Jessica L; Penkunas, Michael J; Platt, Michael L; Coss, Richard G

    2014-05-28

    Predation is a major source of natural selection on primates and may have shaped attentional processes that allow primates to rapidly detect dangerous animals. Because ancestral humans were subjected to predation, a process that continues at very low frequencies, we examined the visual processes by which men and women detect dangerous animals (snakes and lions). We recorded the eye movements of participants as they detected images of a dangerous animal (target) among arrays of nondangerous animals (distractors) as well as detected images of a nondangerous animal (target) among arrays of dangerous animals (distractors). We found that participants were quicker to locate targets when the targets were dangerous animals compared with nondangerous animals, even when spatial frequency and luminance were controlled. The participants were slower to locate nondangerous targets because they spent more time looking at dangerous distractors, a process known as delayed disengagement, and looked at a larger number of dangerous distractors. These results indicate that dangerous animals capture and maintain attention in humans, suggesting that historical predation has shaped some facets of visual orienting and its underlying neural architecture in modern humans.

  2. Hidden charged dark matter and chiral dark radiation

    Science.gov (United States)

    Ko, P.; Nagata, Natsumi; Tang, Yong

    2017-10-01

    In the light of recent possible tensions in the Hubble constant H0 and the structure growth rate σ8 between the Planck and other measurements, we investigate a hidden-charged dark matter (DM) model where DM interacts with hidden chiral fermions, which are charged under the hidden SU(N) and U(1) gauge interactions. The symmetries in this model assure these fermions to be massless. The DM in this model, which is a Dirac fermion and singlet under the hidden SU(N), is also assumed to be charged under the U(1) gauge symmetry, through which it can interact with the chiral fermions. Below the confinement scale of SU(N), the hidden quark condensate spontaneously breaks the U(1) gauge symmetry such that there remains a discrete symmetry, which accounts for the stability of DM. This condensate also breaks a flavor symmetry in this model and Nambu-Goldstone bosons associated with this flavor symmetry appear below the confinement scale. The hidden U(1) gauge boson and hidden quarks/Nambu-Goldstone bosons are components of dark radiation (DR) above/below the confinement scale. These light fields increase the effective number of neutrinos by δNeff ≃ 0.59 above the confinement scale for N = 2, resolving the tension in the measurements of the Hubble constant by Planck and Hubble Space Telescope if the confinement scale is ≲1 eV. DM and DR continuously scatter with each other via the hidden U(1) gauge interaction, which suppresses the matter power spectrum and results in a smaller structure growth rate. The DM sector couples to the Standard Model sector through the exchange of a real singlet scalar mixing with the Higgs boson, which makes it possible to probe our model in DM direct detection experiments. Variants of this model are also discussed, which may offer alternative ways to investigate this scenario.

  3. Adaptive filtering for hidden node detection and tracking in networks.

    Science.gov (United States)

    Hamilton, Franz; Setzer, Beverly; Chavez, Sergio; Tran, Hien; Lloyd, Alun L

    2017-07-01

    The identification of network connectivity from noisy time series is of great interest in the study of network dynamics. This connectivity estimation problem becomes more complicated when we consider the possibility of hidden nodes within the network. These hidden nodes act as unknown drivers on our network and their presence can lead to the identification of false connections, resulting in incorrect network inference. Detecting the parts of the network they are acting on is thus critical. Here, we propose a novel method for hidden node detection based on an adaptive filtering framework with specific application to neuronal networks. We consider the hidden node as a problem of missing variables when model fitting and show that the estimated system noise covariance provided by the adaptive filter can be used to localize the influence of the hidden nodes and distinguish the effects of different hidden nodes. Additionally, we show that the sequential nature of our algorithm allows for tracking changes in the hidden node influence over time.

  4. The plutonium danger

    International Nuclear Information System (INIS)

    Ruiter, W. de

    1983-01-01

    Nobody can ignore the fact that plutonium is potentially very dangerous and the greatest danger concerning it lies in the spreading of nuclear weapons via nuclear energy programmes. The following seven different attitudes towards this problem are presented and discussed: 1) There is no connection between peaceful and military applications; 2) The problem cannot be prevented; 3) A technical solution must be found; 4) plutonium must be totally inaccessible to countries involved in acquiring nuclear weapons; 5) The use of plutonium for energy production should only occur in one multinational centre; 6) Dogmas in the nuclear industry must be enfeebled; 7) All developments in this area should stop. (C.F.)

  5. The hidden universe

    International Nuclear Information System (INIS)

    Disney, M.

    1985-01-01

    Astronomer Disney has followed a somewhat different tack than that of most popular books on cosmology by concentrating on the notion of hidden (as in not directly observable by its own radiation) matter in the universe

  6. Incremental discovery of hidden structure: Applications in theory of elementary particles

    International Nuclear Information System (INIS)

    Zytkow, J.M.; Fischer, P.J.

    1996-01-01

    Discovering hidden structure is a challenging, universal research task in Physics, Chemistry, Biology, and other disciplines. Not only must the elements of hidden structure be postulated by the discoverer, but they can only be verified by indirect evidence, at the level of observable objects. In this paper we describe a framework for hidden structure discovery, built on a constructive definition of hidden structure. This definition leads to operators that build models of hidden structure step by step, postulating hidden objects, their combinations and properties, reactions described in terms of hidden objects, and mapping between the hidden and the observed structure. We introduce the operator dependency diagram, which shows the order of operator application and model evaluation. Different observational knowledge supports different evaluation criteria, which lead to different search systems with verifiable sequences of operator applications. Isomorph-free structure generation is another issue critical for efficiency of search. We apply our framework in the system GELL-MANN, that hypothesizes hidden structure for elementary particles and we present the results of a large scale search for quark models

  7. Religious Tolerance in the Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Kevin Nobel Kurniawan

    2018-03-01

    Full Text Available Religious intolerance is spreading within the Indonesian institution of education. Previous studies have shown that the growth of intolerance is due to the state’s regulation and pedagogical apparatus. In contrast to the previous studies, I argue that the intolerance is related to hidden curriculum applied by the institution of education.  Normatively, the hidden curriculum contains the value of religious tolerance. However, factually, the author found that there are practices of intolerance, through the formal and informal spheres in the school’s structure, within the hidden curriculum. This article applies a qualitative approach with a mixed method research strategy to analyze data collected from students, teachers, and alumnis through field observation, in-depth interview, and survey.

  8. Hidden gauge structure of supersymmetric free differential algebras

    Energy Technology Data Exchange (ETDEWEB)

    Andrianopoli, Laura [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy); D’Auria, Riccardo [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); Ravera, Lucrezia [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy)

    2016-08-16

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q{sup ′} introduced in http://dx.doi.org/10.1016/0550-3213(82)90376-5 and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B{sup (2)} and B{sup (3)} in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of two nilpotent fermionic generators in the hidden algebra. We propose that our approach, where all the invariances of the FDA are expressed as Lie derivatives of the p-forms in the hidden supergroup manifold, could be an appropriate framework to discuss theories defined in enlarged versions of superspace recently considered in the literature, such us double field theory and its generalizations.

  9. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  10. Geometric phases and hidden local gauge symmetry

    International Nuclear Information System (INIS)

    Fujikawa, Kazuo

    2005-01-01

    The analysis of geometric phases associated with level crossing is reduced to the familiar diagonalization of the Hamiltonian in the second quantized formulation. A hidden local gauge symmetry, which is associated with the arbitrariness of the phase choice of a complete orthonormal basis set, becomes explicit in this formulation (in particular, in the adiabatic approximation) and specifies physical observables. The choice of a basis set which specifies the coordinate in the functional space is arbitrary in the second quantization, and a subclass of coordinate transformations, which keeps the form of the action invariant, is recognized as the gauge symmetry. We discuss the implications of this hidden local gauge symmetry in detail by analyzing geometric phases for cyclic and noncyclic evolutions. It is shown that the hidden local symmetry provides a basic concept alternative to the notion of holonomy to analyze geometric phases and that the analysis based on the hidden local gauge symmetry leads to results consistent with the general prescription of Pancharatnam. We however note an important difference between the geometric phases for cyclic and noncyclic evolutions. We also explain a basic difference between our hidden local gauge symmetry and a gauge symmetry (or equivalence class) used by Aharonov and Anandan in their definition of generalized geometric phases

  11. Dangerous Animals Capture and Maintain Attention in Humans

    Directory of Open Access Journals (Sweden)

    Jessica L. Yorzinski

    2014-07-01

    Full Text Available Predation is a major source of natural selection on primates and may have shaped attentional processes that allow primates to rapidly detect dangerous animals. Because ancestral humans were subjected to predation, a process that continues at very low frequencies, we examined the visual processes by which men and women detect dangerous animals (snakes and lions. We recorded the eye movements of participants as they detected images of a dangerous animal (target among arrays of nondangerous animals (distractors as well as detected images of a nondangerous animal (target among arrays of dangerous animals (distractors. We found that participants were quicker to locate targets when the targets were dangerous animals compared with nondangerous animals, even when spatial frequency and luminance were controlled. The participants were slower to locate nondangerous targets because they spent more time looking at dangerous distractors, a process known as delayed disengagement, and looked at a larger number of dangerous distractors. These results indicate that dangerous animals capture and maintain attention in humans, suggesting that historical predation has shaped some facets of visual orienting and its underlying neural architecture in modern humans.

  12. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  13. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...

  14. Microwave background constraints on mixing of photons with hidden photons

    International Nuclear Information System (INIS)

    Mirizzi, Alessandro; Redondo, Javier; Sigl, Guenter

    2008-12-01

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle χ 0 -7 - 10 -5 for hidden photon masses between 10 -14 eV and 10 -7 eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  15. Expressing Anger Is More Dangerous than Feeling Angry when Driving.

    Directory of Open Access Journals (Sweden)

    Weina Qu

    Full Text Available Anger is an emotion that drivers often feel and express while driving, and it is believed by researchers to be an important cause of dangerous driving behavior. In this study, the relationships between driving trait anger, driving anger expression, and dangerous driving behaviors were analyzed. The Driving Anger Scale (DAS was used to measure driving trait anger, whereas the Driving Anger Expression (DAX Inventory was used to measure expressions of driving anger. A sample of 38 drivers completed the DAS, DAX, and a driving simulation session on a simulator where their driving behaviors were recorded. Correlation analysis showed that the higher scores on the DAS were associated with longer durations of speeding in the simulator. The more participants expressed their anger in verbal and physical ways, the more likely they were to crash the virtual vehicle during the simulation. Regression analyses illustrated the same pattern. The findings suggest that, although trait anger is related to speeding, the passive expression of anger is the real factor underling traffic accidents. This study extends findings about the predictive effects of self-report scales of driving behaviors to behaviors recorded on a simulator. Thus, if in traffic safety propaganda, guiding drivers to use positive ways to cope with driving anger is recommended by our findings.

  16. Expressing Anger Is More Dangerous than Feeling Angry when Driving.

    Science.gov (United States)

    Qu, Weina; Dai, Mengnuo; Zhao, Wenguo; Zhang, Kan; Ge, Yan

    2016-01-01

    Anger is an emotion that drivers often feel and express while driving, and it is believed by researchers to be an important cause of dangerous driving behavior. In this study, the relationships between driving trait anger, driving anger expression, and dangerous driving behaviors were analyzed. The Driving Anger Scale (DAS) was used to measure driving trait anger, whereas the Driving Anger Expression (DAX) Inventory was used to measure expressions of driving anger. A sample of 38 drivers completed the DAS, DAX, and a driving simulation session on a simulator where their driving behaviors were recorded. Correlation analysis showed that the higher scores on the DAS were associated with longer durations of speeding in the simulator. The more participants expressed their anger in verbal and physical ways, the more likely they were to crash the virtual vehicle during the simulation. Regression analyses illustrated the same pattern. The findings suggest that, although trait anger is related to speeding, the passive expression of anger is the real factor underling traffic accidents. This study extends findings about the predictive effects of self-report scales of driving behaviors to behaviors recorded on a simulator. Thus, if in traffic safety propaganda, guiding drivers to use positive ways to cope with driving anger is recommended by our findings.

  17. Hidden Crises and Communication: An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  18. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  19. Dangers of the vagina.

    Science.gov (United States)

    Beit-Hallahmi, B

    1985-12-01

    Beliefs, myths, and literary expressions of men's fear of female genitals are reviewed. Both clinical evidence and folklore provide evidence that men imagine female genitals not only as a source of pleasure and attraction, but also as a source of danger in a very physical sense. The vagina dentata myth has many versions, including some modern ones, and its message is always the same: an awesome danger emanating from a woman's body. The prevalence of such feelings in folklore and in literature is noted.

  20. Hidden Markov Model Application to Transfer The Trader Online Forex Brokers

    Directory of Open Access Journals (Sweden)

    Farida Suharleni

    2012-05-01

    Full Text Available Hidden Markov Model is elaboration of Markov chain, which is applicable to cases that can’t directly observe. In this research, Hidden Markov Model is used to know trader’s transition to broker forex online. In Hidden Markov Model, observed state is observable part and hidden state is hidden part. Hidden Markov Model allows modeling system that contains interrelated observed state and hidden state. As observed state in trader’s transition to broker forex online is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online, whereas as hidden state is broker forex online Marketiva, Masterforex, Instaforex, FBS and Others. First step on application of Hidden Markov Model in this research is making construction model by making a probability of transition matrix (A from every broker forex online. Next step is making a probability of observation matrix (B by making conditional probability of five categories, that is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online and also need to determine an initial state probability (π from every broker forex online. The last step is using Viterbi algorithm to find hidden state sequences that is broker forex online sequences which is the most possible based on model and observed state that is the five categories. Application of Hidden Markov Model is done by making program with Viterbi algorithm using Delphi 7.0 software with observed state based on simulation data. Example: By the number of observation T = 5 and observed state sequences O = (2,4,3,5,1 is found hidden state sequences which the most possible with observed state O as following : where X1 = FBS, X2 = Masterforex, X3 = Marketiva, X4 = Others, and X5 = Instaforex.

  1. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  2. Hidden symmetries in minimal five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, Markus; Silva, Sebastian

    2004-01-01

    We study the hidden symmetries arising in the dimensional reduction of d=5, N=2 supergravity to three dimensions. Extending previous partial results for the bosonic part, we give a derivation that includes fermionic terms, shedding light on the appearance of the local hidden symmetry SO(4) in the reduction

  3. Local models and hidden nonlocality in Quantum Theory

    OpenAIRE

    Guerini, Leonardo

    2014-01-01

    This Master's thesis has two central subjects: the simulation of correlations generated by local measurements on entangled quantum states by local hidden-variables models and the revelation of hidden nonlocality. We present and detail the Werner's local model and the hidden nonlocality of some Werner states of dimension $d\\geq5$, the Gisin-Degorre's local model for a Werner state of dimension $d=2$ and the local model of Hirsch et al. for mixtures of the singlet state and noise, all of them f...

  4. Searching for hidden-charm baryonium signals in QCD sum rules

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Zhou, Dan [Beihang University, School of Physics, Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, SK (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University, Research Center for Hadron and CSR Physics, Institute of Modern Physics of CAS, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics, State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-11-15

    We give an explicit QCD sum rule investigation for hidden-charm baryonium states with the quark content u anti ud anti dc anti c, spin J = 0/1/2/3, and of both positive and negative parities. We systematically construct the relevant local hidden-charm baryonium interpolating currents, which can actually couple to various structures, including hidden-charm baryonium states, charmonium states plus two pions, and hidden-charm tetraquark states plus one pion, etc. We do not know which structure these currents couple to at the beginning, but after sum rule analyses we can obtain some information. We find some of them can couple to hidden-charm baryonium states, using which we evaluate the masses of the lowest-lying hidden-charm baryonium states with quantum numbers J{sup P} = 2{sup -}/3{sup -}/0{sup +}/1{sup +}/2{sup +} to be around 5.0 GeV. We suggest to search for hidden-charm baryonium states, especially the one of J = 3{sup -}, in the D-wave J/ψππ and P-wave J/ψρ and J/ψω channels in this energy region. (orig.)

  5. Hidden symmetries in five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, M.

    2003-05-01

    This thesis is concerned with the study of hidden symmetries in supergravity, which play an important role in the present picture of supergravity and string theory. Concretely, the appearance of a hidden G 2(+2) /SO(4) symmetry is studied in the dimensional reduction of d=5, N=2 supergravity to three dimensions - a parallel model to the more famous E 8(+8) /SO(16) case in eleven-dimensional supergravity. Extending previous partial results for the bosonic part, I give a derivation that includes fermionic terms. This sheds new light on the appearance of the local hidden symmetry SO(4) in the reduction, and shows up an unusual feature which follows from an analysis of the R-symmetry associated with N=4 supergravity and of the supersymmetry variations, and which has no parallel in the eleven-dimensional case: The emergence of an additional SO(3) as part of the enhanced local symmetry, invisible in the dimensional reduction of the gravitino, and corresponding to the fact that, of the SO(4) used in the coset model, only the diagonal SO(3) is visible immediately upon dimensional reduction. The uncovering of the hidden symmetries proceeds via the construction of the proper coset gravity in three dimensions, and matching it with the Lagrangian obtained from the reduction. (orig.)

  6. DANGEROUS AND HYPNOTIC DRUG ACT

    Science.gov (United States)

    Whelan, William M.

    1961-01-01

    It is unprofessional conduct within the meaning of the Medical Practice Act to prescribe a dangerous drug without either a medical examination by a physician or other medical indications. Dangerous and hypnotic drugs are specifically defined by both state and federal law and distribution is strictly regulated. A physician may administer to his own patients such amounts of dangerous drugs as are necessary for the immediate needs of the patient. The physician may obtain such needed amounts of these drugs by an order placed with a pharmacist marked “for administration to immediate needs of patients.” A licensed physician may also prescribe dangerous and hypnotic drugs for patients and such prescriptions may be refilled on the specific authorization of the physician. A physician who dispenses dangerous and hypnotic drugs to patients must obtain a hypnotic drug license; he must use specific purchase orders when purchasing; the drugs must be labeled in the manner provided by law; and all records of sale shall be open to inspection by authorized officers of the law and kept for three years. By the Principles of Medical Ethics physicians are bound to limit the source of their professional income to medical services actually rendered. Recent decisions of the Judicial Council answer questions concerning a physician's interest in a corporation which purchases, packages and sells medicines under a corporate name. Also answered are questions as to the measures that exist to prevent physicians from abusing the privilege of owning a pharmacy, and whether a physician can ethically rent space in a building owned by him to a pharmacist with a percentage of the income of the pharmacy as rental. The public welfare of California and the nation as determined by legislation strictly regulates the distribution of dangerous drugs. It is in the best interest of the medical profession and its patients that these laws be understood and carefully observed. PMID:13784776

  7. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  8. Radiation danger of exclusion zone objects

    International Nuclear Information System (INIS)

    Kholosha, V.I.; Proskura, N.I.; Ivanov, Yu.A.; Kazakov, S.V.; Arkhipov, A.N.

    2001-01-01

    The analysis of radiation danger of the Exclusion Zone objects was made. Here, the Zone is defined as the territory from which the population has been evacuated in 1986 owing to the Chernobyl accident and possible outflow of the contaminated substances out of the borders is potentially dangerous to the Ukraine. In the present work were analyzed such problems as sources of radiation danger in the Zone, ways of radionuclide migration out of the borders of the Zone in normal and emergency situations, the non-radiation (ecological) danger factors of the Zone objects, doses (individual and collective) from various sources and on separate ways of their formation, and the characteristics of radiation danger of the Zone objects. The conclusions are: (1) Radionuclide flows both from technologic and natural sources exceed those from Shelter objects, (2) Under emergency conditions, radionuclide flows and doze loading remain comparable with those from emergency sources, (3) To solve some management tasks in radiation situation, the basic works on the Shelter objects should be oriented to decrease probability of emergency occurrence and to reduce radiation influence (prevention wash-outs during high waters, fire-prevention measures in forests and strengthening of the control behind non-authorized use of objects in the Zone). (S. Ohno)

  9. Sociocultural Dimension of Hidden Content in a Professional Language Curriculum

    Directory of Open Access Journals (Sweden)

    Ekaterina E. Shishlova

    2017-12-01

    Full Text Available Introduction: studying curriculum as a pedagogical problem has traditionally been reduced to the analysis of its explicit content, set in official educational documents. However, a much less studied hidden content plays a significant role in education. So, what is the role of the hidden curriculum during professional language training? The purpose of the article is to determine the potential impact of hidden curriculum on students’ conceptual worldview. Comparing the worldview presented in textbooks with students’ one has allowed us to estimate the rate of influence of hidden curr iculum. Materials and Methods: the methodological basis of the work is the cultural concept of personalityoriented education. The methodology for studying the role of hidden curriculum includes four stages: at the first stage, the authors set the criteria for selecting textbooks for analysis and do the selection; at the second stage, the authors select sociocultural concepts for analysis; at the third stage, the scheme of analysis is designed and the analysis of textbooks is done; at the fourth stage, the authors identify the potential influence of hidden curriculum on students’ conceptual worldview. Results: the structure of hidden curriculum has been determined and the scheme for analysing its subject component has been developed. The authors have identified a significant influence of hidden curriculum on students’ worldview, which represents the scientific novelty of the article. Discussion and Conclusions: the article gives the definition of a hidden curriculum which is new for Russian pedagogy and presents a methodology for its analysis in EFL textbooks. That analysis is recommended to be conducted when selecting teaching materials both i n languages and other humanities.

  10. Infinite hidden conditional random fields for human behavior analysis.

    Science.gov (United States)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja

    2013-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF), which is a nonparametric model based on hierarchical Dirichlet processes and is capable of automatically learning the optimal number of hidden states for a classification task. We show how we learn the model hyperparameters with an effective Markov-chain Monte Carlo sampling technique, and we explain the process that underlines our iHCRF model with the Restaurant Franchise Rating Agencies analogy. We show that the iHCRF is able to converge to a correct number of represented hidden states, and outperforms the best finite HCRFs--chosen via cross-validation--for the difficult tasks of recognizing instances of agreement, disagreement, and pain. Moreover, the iHCRF manages to achieve this performance in significantly less total training, validation, and testing time.

  11. 46 CFR 154.1015 - Lighting in gas-dangerous space.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Lighting in gas-dangerous space. 154.1015 Section 154... Equipment Electrical § 154.1015 Lighting in gas-dangerous space. (a) Each gas-dangerous space that has... protective device for any lighting circuit that is in a gas-dangerous space must open each conductor of the...

  12. Detecting hidden particles with MATHUSLA

    Science.gov (United States)

    Evans, Jared A.

    2018-03-01

    A hidden sector containing light long-lived particles provides a well-motivated place to find new physics. The recently proposed MATHUSLA experiment has the potential to be extremely sensitive to light particles originating from rare meson decays in the very long lifetime region. In this work, we illustrate this strength with the specific example of a light scalar mixed with the standard model-like Higgs boson, a model where MATHUSLA can further probe unexplored parameter space from exotic Higgs decays. Design augmentations should be considered in order to maximize the ability of MATHUSLA to discover very light hidden sector particles.

  13. Zipf exponent of trajectory distribution in the hidden Markov model

    Science.gov (United States)

    Bochkarev, V. V.; Lerner, E. Yu

    2014-03-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.

  14. Zipf exponent of trajectory distribution in the hidden Markov model

    International Nuclear Information System (INIS)

    Bochkarev, V V; Lerner, E Yu

    2014-01-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different

  15. SHIFT: server for hidden stops analysis in frame-shifted translation.

    Science.gov (United States)

    Gupta, Arun; Singh, Tiratha Raj

    2013-02-23

    Frameshift is one of the three classes of recoding. Frame-shifts lead to waste of energy, resources and activity of the biosynthetic machinery. In addition, some peptides synthesized after frame-shifts are probably cytotoxic which serve as plausible cause for innumerable number of diseases and disorders such as muscular dystrophies, lysosomal storage disorders, and cancer. Hidden stop codons occur naturally in coding sequences among all organisms. These codons are associated with the early termination of translation for incorrect reading frame selection and help to reduce the metabolic cost related to the frameshift events. Researchers have identified several consequences of hidden stop codons and their association with myriad disorders. However the wealth of information available is speckled and not effortlessly acquiescent to data-mining. To reduce this gap, this work describes an algorithmic web based tool to study hidden stops in frameshifted translation for all the lineages through respective genetic code systems. This paper describes SHIFT, an algorithmic web application tool that provides a user-friendly interface for identifying and analyzing hidden stops in frameshifted translation of genomic sequences for all available genetic code systems. We have calculated the correlation between codon usage frequencies and the plausible contribution of codons towards hidden stops in an off-frame context. Markovian chains of various order have been used to model hidden stops in frameshifted peptides and their evolutionary association with naturally occurring hidden stops. In order to obtain reliable and persuasive estimates for the naturally occurring and predicted hidden stops statistical measures have been implemented. This paper presented SHIFT, an algorithmic tool that allows user-friendly exploration, analysis, and visualization of hidden stop codons in frameshifted translations. It is expected that this web based tool would serve as a useful complement for

  16. Asymptotics for Estimating Equations in Hidden Markov Models

    DEFF Research Database (Denmark)

    Hansen, Jørgen Vinsløv; Jensen, Jens Ledet

    Results on asymptotic normality for the maximum likelihood estimate in hidden Markov models are extended in two directions. The stationarity assumption is relaxed, which allows for a covariate process influencing the hidden Markov process. Furthermore a class of estimating equations is considered...

  17. Dangerous arachnids-Fake news or reality?

    Science.gov (United States)

    Hauke, Tobias J; Herzig, Volker

    2017-11-01

    The public perception of spiders and scorpions is skewed towards the potential harm they can inflict in humans, despite recent scientific evidence that arachnid venom components might be useful as bioinsecticides or even human therapeutics. Nevertheless, arachnids are becoming more popular as pets in Europe, America and Asia, raising the question for regulatory agencies in these regions as to whether they need to take measurements to protect their citizens. In order to decide upon the necessary regulatory steps, they first need to determine which arachnids are actually dangerous to humans. This review therefore provides an overview of the current literature on verified bites and stings from spiders and scorpions with the aim of assessing their potential danger for human health. As a guideline, we also provide a list of those arachnid genera that we consider as potentially dangerous, which includes 10 spider and 11 scorpion genera. The arachnid genera classified as dangerous comprise less than a quarter of all extant scorpion species and only 0.5% of all spiders species, with the actual number most likely being much lower than that, as not all species in those genera might turn out to pose an actual threat for humans. In conclusion, we found that only a small percentage of scorpions and a minute percentage of all spiders can be considered as potentially dangerous to humans. While in some countries of origin the high incidence of envenomations by dangerous arachnids can result in a serious problem to the health system, we assessed the risk that the same species pose when kept as pets under controlled maintenance conditions as significantly lower. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. A hidden service model based on HS-HS anonymous network

    Science.gov (United States)

    Meng, Yitong; Zhao, Xing; Fei, Jinlong; Zhu, Yuefei

    2017-10-01

    The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today's anonymous service.

  19. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  20. The hidden values

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Jensen, Karsten Klint

    “The Hidden Values - Transparency in Decision-Making Processes Dealing with Hazardous Activities”. The report seeks to shed light on what is needed to create a transparent framework for political and administrative decisions on the use of GMOs and chemical products. It is our hope that the report...

  1. Suppressing the QCD axion abundance by hidden monopoles

    International Nuclear Information System (INIS)

    Kawasaki, Masahiro

    2015-11-01

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10 12 GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  2. Xylitol and Your Dog: Danger, Paws Off

    Science.gov (United States)

    ... Home For Consumers Consumer Updates Xylitol and Your Dog: Danger, Paws Off Share Tweet Linkedin Pin it ... vitamins mouthwash toothpaste Why is Xylitol Dangerous to Dogs, but Not People? In both people and dogs, ...

  3. knowledge about obstetric danger signs among preg

    African Journals Online (AJOL)

    user

    about knowledge level of pregnant women on obstetric danger signs. The objective of this .... ple size formula for estimating a single population proportion with the ..... subjects mentioned vaginal bleeding as danger sign during pregnancy ...

  4. Context Tree Estimation in Variable Length Hidden Markov Models

    OpenAIRE

    Dumont, Thierry

    2011-01-01

    We address the issue of context tree estimation in variable length hidden Markov models. We propose an estimator of the context tree of the hidden Markov process which needs no prior upper bound on the depth of the context tree. We prove that the estimator is strongly consistent. This uses information-theoretic mixture inequalities in the spirit of Finesso and Lorenzo(Consistent estimation of the order for Markov and hidden Markov chains(1990)) and E.Gassiat and S.Boucheron (Optimal error exp...

  5. Extracting hidden-photon dark matter from an LC-circuit

    International Nuclear Information System (INIS)

    Arias, Paola; Arza, Ariel; Gamboa, Jorge; Mendez, Fernando

    2014-11-01

    We point out that a cold dark matter condensate made of gauge bosons from an extra hidden U(1) sector - dubbed hidden-photons - can create a small, oscillating electric density current. Thus, they could also be searched for in the recently proposed LC-circuit setup conceived for axion cold dark matter search by Sikivie, Sullivan and Tanner. We estimate the sensitivity of this setup for hidden-photon cold dark matter and we find it could cover a sizable, so far unexplored parameter space.

  6. Extracting Hidden-Photon Dark Matter From an LC-Circuit

    CERN Document Server

    Arias, Paola; Döbrich, Babette; Gamboa, Jorge; Méndez, Fernando

    2015-01-01

    We point out that a cold dark matter condensate made of gauge bosons from an extra hidden U(1) sector - dubbed hidden- photons - can create a small, oscillating electric density current. Thus, they could also be searched for in the recently proposed LC-circuit setup conceived for axion cold dark matter search by Sikivie, Sullivan and Tanner. We estimate the sensitivity of this setup for hidden-photon cold dark matter and we find it could cover a sizable, so far unexplored parameter space.

  7. Hidden photons in beam dump experiments and in connection with dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-12-15

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  8. Hidden photons in beam dump experiments and in connection with dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah

    2012-12-01

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  9. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  10. Choice Behavior Guided by Learned, But Not Innate, Taste Aversion Recruits the Orbitofrontal Cortex.

    Science.gov (United States)

    Ramírez-Lugo, Leticia; Peñas-Rincón, Ana; Ángeles-Durán, Sandybel; Sotres-Bayon, Francisco

    2016-10-12

    The ability to select an appropriate behavioral response guided by previous emotional experiences is critical for survival. Although much is known about brain mechanisms underlying emotional associations, little is known about how these associations guide behavior when several choices are available. To address this, we performed local pharmacological inactivations of several cortical regions before retrieval of an aversive memory in choice-based versus no-choice-based conditioned taste aversion (CTA) tasks in rats. Interestingly, we found that inactivation of the orbitofrontal cortex (OFC), but not the dorsal or ventral medial prefrontal cortices, blocked retrieval of choice CTA. However, OFC inactivation left retrieval of no-choice CTA intact, suggesting its role in guiding choice, but not in retrieval of CTA memory. Consistently, OFC activity increased in the choice condition compared with no-choice, as measured with c-Fos immunolabeling. Notably, OFC inactivation did not affect choice behavior when it was guided by innate taste aversion. Consistent with an anterior insular cortex (AIC) involvement in storing taste memories, we found that AIC inactivation impaired retrieval of both choice and no-choice CTA. Therefore, this study provides evidence for OFC's role in guiding choice behavior and shows that this is dissociable from AIC-dependent taste aversion memory. Together, our results suggest that OFC is required and recruited to guide choice selection between options of taste associations relayed from AIC. Survival and mental health depend on being able to choose stimuli not associated with danger. This is particularly important when danger is associated with stimuli that we ingest. Although much is known about the brain mechanisms that underlie associations with dangerous taste stimuli, very little is known about how these stored emotional associations guide behavior when it involves choice. By combining pharmacological and immunohistochemistry tools with taste-guided

  11. Multilayer Neural Networks with Extensively Many Hidden Units

    International Nuclear Information System (INIS)

    Rosen-Zvi, Michal; Engel, Andreas; Kanter, Ido

    2001-01-01

    The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions, whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an overlap in the space of Boolean functions as order parameter, the storage capacity is found to scale with the logarithm of the number of implementable Boolean functions. The generalization behavior is smooth for continuous couplings and shows a discontinuous transition to perfect generalization for discrete ones

  12. Hidden Area and Mechanical Nonlinearities in Freestanding Graphene

    Science.gov (United States)

    Nicholl, Ryan J. T.; Lavrik, Nickolay V.; Vlassiouk, Ivan; Srijanto, Bernadeta R.; Bolotin, Kirill I.

    2017-06-01

    We investigated the effect of out-of-plane crumpling on the mechanical response of graphene membranes. In our experiments, stress was applied to graphene membranes using pressurized gas while the strain state was monitored through two complementary techniques: interferometric profilometry and Raman spectroscopy. By comparing the data obtained through these two techniques, we determined the geometric hidden area which quantifies the crumpling strength. While the devices with hidden area ˜0 % obeyed linear mechanics with biaxial stiffness 428 ±10 N /m , specimens with hidden area in the range 0.5%-1.0% were found to obey an anomalous nonlinear Hooke's law with an exponent ˜0.1 .

  13. [Dangerous states and mental health disorders: perceptions and reality].

    Science.gov (United States)

    Tassone-Monchicourt, C; Daumerie, N; Caria, A; Benradia, I; Roelandt, J-L

    2010-01-01

    Image of Madness was always strongly linked with the notion of "dangerousness", provoking fear and social exclusion, despite the evolution of psychiatric practices and organisation, and the emphasis on user's rights respect. Mediatization and politicization of this issue through news item combining crime and mental illness, reinforce and spread out this perception. This paper presents a review of the litterature on social perceptions associating "dangerousness", "Insanity" and "mental illness", available data about the link between "dangerous states" and "psychiatric disorders", as well as the notion of "dangerousness" and the assessment of "dangerous state" of people suffering or not from psychiatric disorders. MAPPING OF SOCIAL REPRESENTATIONS: The French Survey "Mental Health in General Population: Images and Realities (MHGP)" was carried out between 1999 and 2003, on a representative sample of 36.000 individuals over 18 years old. It aims at describing the social representations of the population about "insanity/insane" and "mental illness/mentally ill". The results show that about 75% of the people interviewed link "insanity" or "mental illness" with "criminal or violent acts". Young people and those with a high level of education more frequently categorize violent and dangerous behaviours in the field of Mental illness rather than in that of madness. CORRELATION BETWEEN DANGEROUS STATE AND PSYCHIATRIC DISORDERS: in the scientific literature, all experts reject the hypothesis of a direct link between violence and mental disorder. Besides, 2 tendencies appear in their conclusions: on one hand, some studies establish a significative link between violence and severe mental illness, compared with the general population. On the other hand, results show that 87 to 97% of des aggressors are not mentally ills. Therefore, the absence of scientific consensus feeds the confusion and reinforce the link of causality between psychiatric disorders and violence. OFFICIAL

  14. Extracting hidden-photon dark matter from an LC-circuit

    International Nuclear Information System (INIS)

    Arias, Paola; Arza, Ariel; Gamboa, Jorge; Mendez, Fernando; Doebrich, Babette

    2015-01-01

    We point out that a cold dark matter condensate made of gauge bosons from an extra hidden U(1) sector - dubbed hidden photons - can create a small, oscillating electric density current. Thus, they could also be searched for in the recently proposed LC-circuit setup conceived for axion cold dark matter search by Sikivie, Sullivan and Tanner. We estimate the sensitivity of this setup for hidden-photon cold dark matter and we find it could cover a sizable, so far unexplored parameter space. (orig.)

  15. Petro Rents, Political Institutions, and Hidden Wealth

    DEFF Research Database (Denmark)

    Andersen, Jørgen Juel; Johannesen, Niels; Lassen, David Dreyer

    2017-01-01

    Do political institutions limit rent seeking by politicians? We study the transformation of petroleum rents, almost universally under direct government control, into hidden wealth using unique data on bank deposits in offshore financial centers that specialize in secrecy and asset protection. Our...... rulers is diverted to secret accounts. We find very limited evidence that shocks to other types of income not directly controlled by governments affect hidden wealth....

  16. Hidden charm molecules in a finite volume

    International Nuclear Information System (INIS)

    Albaladejo, M.; Hidalgo-Duque, C.; Nieves, J.; Oset, E.

    2014-01-01

    In the present paper we address the interaction of charmed mesons in hidden charm channels in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and several methods for the analysis of these levels ("inverse problem") are investigated. (author)

  17. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  18. Hidden Agendas in Marriage: Affective and Longitudinal Dimensions.

    Science.gov (United States)

    Krokoff, Lowell J.

    1990-01-01

    Examines how couples' discussions of troublesome problems reveal hidden agendas (issues not directly discussed or explored). Finds disgust and contempt are at the core of both love and respect agendas for husbands and wives. Finds that wives' more than husbands' hidden agendas are directly predictive of how negatively they argue at home. (SR)

  19. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  20. On the LHC sensitivity for non-thermalised hidden sectors

    Science.gov (United States)

    Kahlhoefer, Felix

    2018-04-01

    We show under rather general assumptions that hidden sectors that never reach thermal equilibrium in the early Universe are also inaccessible for the LHC. In other words, any particle that can be produced at the LHC must either have been in thermal equilibrium with the Standard Model at some point or must be produced via the decays of another hidden sector particle that has been in thermal equilibrium. To reach this conclusion, we parametrise the cross section connecting the Standard Model to the hidden sector in a very general way and use methods from linear programming to calculate the largest possible number of LHC events compatible with the requirement of non-thermalisation. We find that even the HL-LHC cannot possibly produce more than a few events with energy above 10 GeV involving states from a non-thermalised hidden sector.

  1. Evaluation of non radiation dangerous in multipurpose reactor GAS

    International Nuclear Information System (INIS)

    Suwarto, S.

    1998-01-01

    Evaluation of the potential non irradiation dangerous in RSG-GAS included of : the fire dangerous, the chemical hazard and gas dangerous have been performed to evaluate its potential on causing the accident and evaluate the performance of the equipment to protect the accident. Evaluate the performance of the equipment to protect to accident . Evaluate to the fire dangerous performed by identified the potential dangerous of fire at each rooms and evaluate the performance of each equipment included of dry powder fire extinguishing system, hydrant system, fire detectors and alarm system. Evaluation to the chemical hazard and gas dangerous performed by identified the number and it's the management of chemical hazard in the chemical storage and laboratory. The result of evaluation included of data of the fire dangerous potential class and the performance of its equipment in each room in RSG-GAS and the data of the number and the management system of the chemical hazard and gas in chemical storage and chemical laboratory. From this evaluation it is concluded that the equipment of fire system are available to protect against the accident and the chemical hazard and gas potential are relating small, and has been managed properly

  2. Massive hidden photons as lukewarm dark matter

    International Nuclear Information System (INIS)

    Redondo, Javier; Postma, Marieke

    2008-11-01

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  3. Massive hidden photons as lukewarm dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Postma, Marieke [Nationaal Inst. voor Kernfysica en Hoge-Energiefysica (NIKHEF), Amsterdam (Netherlands)

    2008-11-15

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  4. New limits on hidden photons from past electron beam dumps

    International Nuclear Information System (INIS)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-01

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  5. New limits on hidden photons from past electron beam dumps

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-15

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  6. La mesure du danger

    CERN Document Server

    Manceron, Vanessa; Revet, Sandrine

    2014-01-01

    La mesure du danger permet d’explorer des dangers de nature aussi diverse que la délinquance, la pollution, l’écueil maritime, la maladie ou l’attaque sorcellaire, l’extinction d’espèces animales ou végétales, voire de la Planète tout entière. Au croisement de la sociologie, de l’anthropologie et de l’histoire, les différents articles analysent les pratiques concrètes de mesure pour tenter de comprendre ce qui se produit au cours de l’opération d’évaluation du danger sans préjuger de la nature de celui-ci. L’anthropologie a contribué à la réflexion sur l’infortune en s’intéressant aux temporalités de l’après : maladies, catastrophes, pandémies, etc. et en cherchant à rendre compte de l’expérience des victimes, de leur vie ordinaire bouleversée, de la recomposition du quotidien. Elle s’intéresse aussi aux autres types de mesures, les savoirs incorporés, qui reposent sur l’odorat, la vue ou le toucher et ceux qui ressortent d’une épistémologie « non ...

  7. Reducing Future International Chemical and Biological Dangers.

    Energy Technology Data Exchange (ETDEWEB)

    Haddal, Chad [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bull, Diana L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hernandez, Patricia Marie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Foley, John T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-12-01

    The International Biological and Chemical Threat Reduction Program at Sandia National Laboratories is developing a 15 - year technology road map in support the United States Government efforts to reduce international chemical and biological dangers . In 2017, the program leadership chartered an analysis team to explore dangers in the future international chemical and biological landscape through engagements with national security experts within and beyond Sandia to gain a multidisciplinary perspective on the future . This report offers a hi gh level landscape of future chemical and biological dangers based upon analysis of those engagements and provides support for further technology road map development.

  8. The heterosexual singles scene: putting danger into pleasure.

    Science.gov (United States)

    Peart, R; Rosenthal, D; Moore, S

    1996-06-01

    The juxtaposition of pleasure and danger has engaged many feminist theorists and researchers in the field of sexuality. This article presents a theoretical analysis of the ambiguous and complex relationship between 'pleasure', 'danger' and contemporary feminist theory. In doing so, it offers an understanding of the ways in which the categories of pleasure and danger operate within the discourses of heterosexuality to construct perceptions of risk in the context of HIV/AIDS. Data were collected from a study of the sexual attitudes and practices of 112 sexually-active, single, heterosexual adults (58 men and 54 women), aged 20 to 40 years (mean = 27 years) who agreed to be interviewed when approached at night-clubs and public "singles' bars around Melbourne, Australia. The qualitative analysis presented here is consistent with a poststructuralist feminism. First, we discuss how sexuality cannot be cast solely as pleasurable or dangerous. Second, we demonstrate how heterosexualized notions of pleasure and danger operate to provide misperceptions of risk from HIV/AIDS transmission. Third, we identify the ways in which the logic of identity functions to obscure risk within the discourse of heterosexuality, and finally we attempt to forge new ways of practising pleasure which disrupt heterosexist discourses and allow for pleasures which incorporate danger.

  9. DANGERS AND SAFETY MEASURES IN A MOUNTAIN

    Directory of Open Access Journals (Sweden)

    Jovica Petković

    2013-07-01

    Full Text Available Mountaineering and everything that is connected with it is a sport with con¬tro¬lled risk. Mountaineers, alpinists, climbers, cavers and all the others who visit and sojourn in mountains are faced with many risks and dangers, which are caused by na¬ture and also by their own mistakes. The dangers in the mountains, like dangers in any other environment, are mainly predictable, so it is best to deal with them with good esti¬mation, knowledge and skill. One has to be aware of his surroundings – the moun¬tain, to respect it and to know what is dangerous and how much it is dangerous at any moment. The organization of the mountaineering expeditions and leadership per¬haps re¬present the highest level of security control. To develop skills for organizing and lead¬ing a group means to ensure the safety of the entire group – to work pre¬ven¬ti¬ve¬ly at the level of the entire group, not only at the level of an individual. The success of the enti¬re group as well as safety depends on the organization and leadership.

  10. Transport and handling of dangerous goods. Training of persons in charge of vehicles or vessels carrying dangerous goods by road or by inland waterways (Dangerous Goods 1979 No.1)

    International Nuclear Information System (INIS)

    1979-01-01

    This Order supplements the Regulations of 15 April 1945 on the transport of dangerous goods by rail, land and inland waterways. It deals with the training of persons in charge of vehicles or boats carrying dangerous goods by road or by inland waterways. It refers in particular to transport of radioactive materials. (NEA) [fr

  11. Invisible axion in the hidden sector of no-scale supergravity

    International Nuclear Information System (INIS)

    Sato, Hikaru

    1987-01-01

    We propose a new axion model which incorporates the U(1) PQ symmetry into a hidden sector, as well as an observable sector, of no-scale supergravity models. The axion is a spin-zero field in the hidden sector. The U(1) PQ symmetry is naturally embedded in the family symmetry of the no-scale models. Invisible axions live in the gravity hidden sector without conflict with the cosmological and astrophysical constraints. (orig.)

  12. Are low radiation doses Dangerous?

    International Nuclear Information System (INIS)

    Garcia Lima, O.; Cornejo, N.

    1996-01-01

    In the last few years the answers to this questions has been affirmative as well as negative from a radiation protection point of view low doses of ionizing radiation potentially constitute an agent causing stochasting effects. A lineal relation without threshold is assumed between dose and probability of occurrence of these effects . Arguments against the danger of probability of occurrence of these effects. Arguments again the danger of low dose radiation are reflected in concepts such as Hormesis and adaptive response, which are phenomena that being studied at present

  13. Increased taxon sampling reveals thousands of hidden orthologs in flatworms

    Science.gov (United States)

    2017-01-01

    Gains and losses shape the gene complement of animal lineages and are a fundamental aspect of genomic evolution. Acquiring a comprehensive view of the evolution of gene repertoires is limited by the intrinsic limitations of common sequence similarity searches and available databases. Thus, a subset of the gene complement of an organism consists of hidden orthologs, i.e., those with no apparent homology to sequenced animal lineages—mistakenly considered new genes—but actually representing rapidly evolving orthologs or undetected paralogs. Here, we describe Leapfrog, a simple automated BLAST pipeline that leverages increased taxon sampling to overcome long evolutionary distances and identify putative hidden orthologs in large transcriptomic databases by transitive homology. As a case study, we used 35 transcriptomes of 29 flatworm lineages to recover 3427 putative hidden orthologs, some unidentified by OrthoFinder and HaMStR, two common orthogroup inference algorithms. Unexpectedly, we do not observe a correlation between the number of putative hidden orthologs in a lineage and its “average” evolutionary rate. Hidden orthologs do not show unusual sequence composition biases that might account for systematic errors in sequence similarity searches. Instead, gene duplication with divergence of one paralog and weak positive selection appear to underlie hidden orthology in Platyhelminthes. By using Leapfrog, we identify key centrosome-related genes and homeodomain classes previously reported as absent in free-living flatworms, e.g., planarians. Altogether, our findings demonstrate that hidden orthologs comprise a significant proportion of the gene repertoire in flatworms, qualifying the impact of gene losses and gains in gene complement evolution. PMID:28400424

  14. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  15. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  16. Dangerous Raw Oysters

    Centers for Disease Control (CDC) Podcasts

    2013-08-05

    Dr. Duc Vugia, chief of the Infectious Diseases Branch at the California Department of Public Health, discusses the dangers of eating raw oysters.  Created: 8/5/2013 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 8/7/2013.

  17. The origin of the hidden supersymmetry

    International Nuclear Information System (INIS)

    Jakubsky, Vit; Nieto, Luis-Miguel; Plyushchay, Mikhail S.

    2010-01-01

    The hidden supersymmetry and related tri-supersymmetric structure of the free particle system, the Dirac delta potential problem and the Aharonov-Bohm effect (planar, bound state, and tubule models) are explained by a special nonlocal unitary transformation, which for the usual N=2 supercharges has a nature of Foldy-Wouthuysen transformation. We show that in general case, the bosonized supersymmetry of nonlocal, parity even systems emerges in the same construction, and explain the origin of the unusual N=2 supersymmetry of electron in three-dimensional parity even magnetic field. The observation extends to include the hidden superconformal symmetry.

  18. The dangers of irradiate uranium in nuclear reactors; Les dangers de l'uranium irradie dans les reacteurs nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    Jammet, H; Joffre, H [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1955-07-01

    The danger of the uranium cans sur-activated by the use in the nuclear reactors is triple: - Irradiation from afar, during manipulations of the cans. - Contamination of air when decladding. - Contamination of air by fire of uranium in a reactor in function The first two dangers are usual and can be treated thanks to the rules of security in use in the atomic industry. The third has an accidental character and claimed for the use of special and exceptional rules, overflowing the industrial setting, to reach the surrounding populations. (authors) [French] Le danger des cartouches d'uranium suractive par utilisation dans les reacteurs nucleaires est triple: - Irradiation a distance, lors des manipulations des cartouches. - Contamination de l'air au moment de leur degainage. - Contamination de l'air par incendie d'uranium dans un reacteur en fonctionnement. Les deux premiers dangers sont habituels et peuvent etre traites grace aux regles de securite en usage dans l'industrie atomique. Le troisieme revet un caractere accidentel et reclame l'emploi de regles speciales et exceptionnelles, debordant le cadre industriel, pour atteindre celui des populations environnantes. (auteurs)

  19. Naturally light hidden photons in LARGE volume string compactifications

    International Nuclear Information System (INIS)

    Goodsell, M.; Jaeckel, J.; Redondo, J.; Ringwald, A.

    2009-09-01

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  20. Hidden photon dark matter search with large metallic mirror

    International Nuclear Information System (INIS)

    Doebrich, Babette; Lindner, Axel; Daumiller, Kai; Engel, Ralph; Roth, Markus; Kowalski, Marek

    2014-10-01

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  1. Ways out of danger. Wege aus der Gefahr

    Energy Technology Data Exchange (ETDEWEB)

    Eppler, E

    1981-01-01

    The volume divides into five sections: ways out of danger; pressure leading into danger; what might save us, and will it grow to become effective; tedious paths out of danger; companions out of danger. The author puts the question whether the true art of politics will be restored. He shows that by reducing politics to mere crisis management we shall not be enabled to overcome the serious problems of the eighties. He points out future possibilities by making clear the chances and misdevelopments of energy policy, of foreign, development and defence policy. The political experience of recent years, the new approach showing different needs and ways of life should be taken seriously as hopeful signs and ought to be reflected in politics again.

  2. SU-E-J-191: Motion Prediction Using Extreme Learning Machine in Image Guided Radiotherapy

    International Nuclear Information System (INIS)

    Jia, J; Cao, R; Pei, X; Wang, H; Hu, L

    2015-01-01

    Purpose: Real-time motion tracking is a critical issue in image guided radiotherapy due to the time latency caused by image processing and system response. It is of great necessity to fast and accurately predict the future position of the respiratory motion and the tumor location. Methods: The prediction of respiratory position was done based on the positioning and tracking module in ARTS-IGRT system which was developed by FDS Team (www.fds.org.cn). An approach involving with the extreme learning machine (ELM) was adopted to predict the future respiratory position as well as the tumor’s location by training the past trajectories. For the training process, a feed-forward neural network with one single hidden layer was used for the learning. First, the number of hidden nodes was figured out for the single layered feed forward network (SLFN). Then the input weights and hidden layer biases of the SLFN were randomly assigned to calculate the hidden neuron output matrix. Finally, the predicted movement were obtained by applying the output weights and compared with the actual movement. Breathing movement acquired from the external infrared markers was used to test the prediction accuracy. And the implanted marker movement for the prostate cancer was used to test the implementation of the tumor motion prediction. Results: The accuracy of the predicted motion and the actual motion was tested. Five volunteers with different breathing patterns were tested. The average prediction time was 0.281s. And the standard deviation of prediction accuracy was 0.002 for the respiratory motion and 0.001 for the tumor motion. Conclusion: The extreme learning machine method can provide an accurate and fast prediction of the respiratory motion and the tumor location and therefore can meet the requirements of real-time tumor-tracking in image guided radiotherapy

  3. SU-E-J-191: Motion Prediction Using Extreme Learning Machine in Image Guided Radiotherapy

    Energy Technology Data Exchange (ETDEWEB)

    Jia, J; Cao, R; Pei, X; Wang, H; Hu, L [Key Laboratory of Neutronics and Radiation Safety, Institute of Nuclear Energy Safety Technology, Chinese Academy of Sciences, Hefei, Anhui, 230031 (China); Engineering Technology Research Center of Accurate Radiotherapy of Anhui Province, Hefei 230031 (China); Collaborative Innovation Center of Radiation Medicine of Jiangsu Higher Education Institutions, SuZhou (China)

    2015-06-15

    Purpose: Real-time motion tracking is a critical issue in image guided radiotherapy due to the time latency caused by image processing and system response. It is of great necessity to fast and accurately predict the future position of the respiratory motion and the tumor location. Methods: The prediction of respiratory position was done based on the positioning and tracking module in ARTS-IGRT system which was developed by FDS Team (www.fds.org.cn). An approach involving with the extreme learning machine (ELM) was adopted to predict the future respiratory position as well as the tumor’s location by training the past trajectories. For the training process, a feed-forward neural network with one single hidden layer was used for the learning. First, the number of hidden nodes was figured out for the single layered feed forward network (SLFN). Then the input weights and hidden layer biases of the SLFN were randomly assigned to calculate the hidden neuron output matrix. Finally, the predicted movement were obtained by applying the output weights and compared with the actual movement. Breathing movement acquired from the external infrared markers was used to test the prediction accuracy. And the implanted marker movement for the prostate cancer was used to test the implementation of the tumor motion prediction. Results: The accuracy of the predicted motion and the actual motion was tested. Five volunteers with different breathing patterns were tested. The average prediction time was 0.281s. And the standard deviation of prediction accuracy was 0.002 for the respiratory motion and 0.001 for the tumor motion. Conclusion: The extreme learning machine method can provide an accurate and fast prediction of the respiratory motion and the tumor location and therefore can meet the requirements of real-time tumor-tracking in image guided radiotherapy.

  4. Dangerous Animals Capture and Maintain Attention in Humans

    OpenAIRE

    Jessica L. Yorzinski; Michael J. Penkunas; Michael L. Platt; Richard G. Coss

    2014-01-01

    Predation is a major source of natural selection on primates and may have shaped attentional processes that allow primates to rapidly detect dangerous animals. Because ancestral humans were subjected to predation, a process that continues at very low frequencies, we examined the visual processes by which men and women detect dangerous animals (snakes and lions). We recorded the eye movements of participants as they detected images of a dangerous animal (target) among arrays of nondangerous an...

  5. Supersymmetry, p-brane duality, and hidden spacetime dimensions

    International Nuclear Information System (INIS)

    Bars, I.

    1996-01-01

    A global superalgebra with 32 supercharges and all possible central extensions is studied in order to extract some general properties of duality and hidden dimensions in a theory that treats p-branes democratically. The maximal number of dimensions is 12, with signature (10,2), containing one space and one time dimension that are hidden from the point of view of perturbative ten-dimensional string theory or its compactifications. When the theory is compactified on R d-1,1 circle-times T c+1,1 with d+c+2=12, there are isometry groups that relate to the hidden dimensions as well as to duality. Their combined intersecting classification schemes provide some properties of nonperturbative states and their couplings. copyright 1996 The American Physical Society

  6. A single hidden layer feedforward network with only one neuron in the hidden layer can approximate any univariate function

    OpenAIRE

    Guliyev , Namig; Ismailov , Vugar

    2016-01-01

    The possibility of approximating a continuous function on a compact subset of the real line by a feedforward single hidden layer neural network with a sigmoidal activation function has been studied in many papers. Such networks can approximate an arbitrary continuous function provided that an unlimited number of neurons in a hidden layer is permitted. In this paper, we consider constructive approximation on any finite interval of $\\mathbb{R}$ by neural networks with only one neuron in the hid...

  7. Discovering hidden sectors with monophoton Z' searches

    International Nuclear Information System (INIS)

    Gershtein, Yuri; Petriello, Frank; Quackenbush, Seth; Zurek, Kathryn M.

    2008-01-01

    In many theories of physics beyond the standard model, from extra dimensions to Hidden Valleys and models of dark matter, Z ' bosons mediate between standard model particles and hidden sector states. We study the feasibility of observing such hidden states through an invisibly decaying Z ' at the LHC. We focus on the process pp→γZ ' →γXX † , where X is any neutral, (quasi-) stable particle, whether a standard model neutrino or a new state. This complements a previous study using pp→ZZ ' →l + l - XX † . Only the Z ' mass and two effective charges are needed to describe this process. If the Z ' decays invisibly only to standard model neutrinos, then these charges are predicted by observation of the Z ' through the Drell-Yan process, allowing discrimination between Z ' decays to standard model ν's and invisible decays to new states. We carefully discuss all backgrounds and systematic errors that affect this search. We find that hidden sector decays of a 1 TeV Z ' can be observed at 5σ significance with 50 fb -1 at the LHC. Observation of a 1.5 TeV state requires super-LHC statistics of 1 ab -1 . Control of the systematic errors, in particular, the parton distribution function uncertainty of the dominant Zγ background, is crucial to maximize the LHC search reach.

  8. Carbon dioxide dangers demonstration model

    Science.gov (United States)

    Venezky, Dina; Wessells, Stephen

    2010-01-01

    Carbon dioxide is a dangerous volcanic gas. When carbon dioxide seeps from the ground, it normally mixes with the air and dissipates rapidly. However, because carbon dioxide gas is heavier than air, it can collect in snowbanks, depressions, and poorly ventilated enclosures posing a potential danger to people and other living things. In this experiment we show how carbon dioxide gas displaces oxygen as it collects in low-lying areas. When carbon dioxide, created by mixing vinegar and baking soda, is added to a bowl with candles of different heights, the flames are extinguished as if by magic.

  9. Alcohol Overdose: The Dangers of Drinking Too Much

    Science.gov (United States)

    ... The Dangers of Drinking Too Much Print version Alcohol Overdose: The Dangers of Drinking Too Much Celebrating ... excess. And the results can be deadly. Identifying Alcohol Poisoning Critical Signs and Symptoms of Alcohol Poisoning ...

  10. Learning and inference in a nonequilibrium Ising model with hidden nodes.

    Science.gov (United States)

    Dunn, Benjamin; Roudi, Yasser

    2013-02-01

    We study inference and reconstruction of couplings in a partially observed kinetic Ising model. With hidden spins, calculating the likelihood of a sequence of observed spin configurations requires performing a trace over the configurations of the hidden ones. This, as we show, can be represented as a path integral. Using this representation, we demonstrate that systematic approximate inference and learning rules can be derived using dynamical mean-field theory. Although naive mean-field theory leads to an unstable learning rule, taking into account Gaussian corrections allows learning the couplings involving hidden nodes. It also improves learning of the couplings between the observed nodes compared to when hidden nodes are ignored.

  11. The Dangers of Educated Girls and Women

    Science.gov (United States)

    John, Vaughn M.

    2016-01-01

    Why do educated girls and women constitute a danger in some societies and for this face extreme danger in their educational endeavours? This article argues that historical and contemporary educational discrimination of girls and women is the hallmark of a violently patriarchal society, and this stubborn injustice is exacerbated under conditions of…

  12. Analysing the hidden curriculum: use of a cultural web.

    Science.gov (United States)

    Mossop, Liz; Dennick, Reg; Hammond, Richard; Robbé, Iain

    2013-02-01

    Major influences on learning about medical professionalism come from the hidden curriculum. These influences can contribute positively or negatively towards the professional enculturation of clinical students. The fact that there is no validated method for identifying the components of the hidden curriculum poses problems for educators considering professionalism. The aim of this study was to analyse whether a cultural web, adapted from a business context, might assist in the identification of elements of the hidden curriculum at a UK veterinary school. A qualitative approach was used. Seven focus groups consisting of three staff groups and four student groups were organised. Questioning was framed using the cultural web, which is a model used by business owners to assess their environment and consider how it affects their employees and customers. The focus group discussions were recorded, transcribed and analysed thematically using a combination of a priori and emergent themes. The cultural web identified elements of the hidden curriculum for both students and staff. These included: core assumptions; routines; rituals; control systems; organisational factors; power structures, and symbols. Discussions occurred about how and where these issues may affect students' professional identity development. The cultural web framework functioned well to help participants identify elements of the hidden curriculum. These aspects aligned broadly with previously described factors such as role models and institutional slang. The influence of these issues on a student's development of a professional identity requires discussion amongst faculty staff, and could be used to develop learning opportunities for students. The framework is promising for the analysis of the hidden curriculum and could be developed as an instrument for implementation in other clinical teaching environments. © Blackwell Publishing Ltd 2013.

  13. Anticipating hidden text salting in emails (extended abstract)

    OpenAIRE

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  14. Complicated basins and the phenomenon of amplitude death in coupled hidden attractors

    Energy Technology Data Exchange (ETDEWEB)

    Chaudhuri, Ushnish [Department of Physics, Sri Venkateswara College, University of Delhi, New Delhi 110021 (India); Department of Physics, National University of Singapore, Singapore 117551 (Singapore); Prasad, Awadhesh, E-mail: awadhesh@physics.du.ac.in [Department of Physics and Astrophysics, University of Delhi, Delhi 110007 (India)

    2014-02-07

    Understanding hidden attractors, whose basins of attraction do not contain the neighborhood of equilibrium of the system, are important in many physical applications. We observe riddled-like complicated basins of coexisting hidden attractors both in coupled and uncoupled systems. Amplitude death is observed in coupled hidden attractors with no fixed point using nonlinear interaction. A new route to amplitude death is observed in time-delay coupled hidden attractors. Numerical results are presented for systems with no or one stable fixed point. The applications are highlighted.

  15. Gauge mediation scenario with hidden sector renormalization in MSSM

    International Nuclear Information System (INIS)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-01-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5 minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  16. Gauge mediation scenario with hidden sector renormalization in MSSM

    Science.gov (United States)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-02-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5¯ minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  17. Quantum mechanics and hidden superconformal symmetry

    Science.gov (United States)

    Bonezzi, R.; Corradini, O.; Latini, E.; Waldron, A.

    2017-12-01

    Solvability of the ubiquitous quantum harmonic oscillator relies on a spectrum generating osp (1 |2 ) superconformal symmetry. We study the problem of constructing all quantum mechanical models with a hidden osp (1 |2 ) symmetry on a given space of states. This problem stems from interacting higher spin models coupled to gravity. In one dimension, we show that the solution to this problem is the Vasiliev-Plyushchay family of quantum mechanical models with hidden superconformal symmetry obtained by viewing the harmonic oscillator as a one dimensional Dirac system, so that Grassmann parity equals wave function parity. These models—both oscillator and particlelike—realize all possible unitary irreducible representations of osp (1 |2 ).

  18. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  19. Ontario hydro radioactive material transportation field guide

    International Nuclear Information System (INIS)

    Howe, W.

    1987-01-01

    The recent introduction of both the AECB Transport Packaging of Radioactive Material Regulations and Transport Canada's Transportation of Dangerous Goods Regulations have significantly altered the requirements for transporting radioactive material in Canada. Extensive additional training as well as certification of several hundred Ontario Hydro employees has been necessary to ensure compliance with the additional and revised regulatory requirements. To assist in the training of personnel, an 'active' corporate Ontario Hydro Field Guide for Radioactive Material Transport document has been developed and published. The contents of this Field Guide identify current Ontario Hydro equipment and procedures as well as the updated relevant regulatory requirements within Canada. In addition, to satisfying Ontario Hydro requirements for this type of information over two thousand of these Field Guides have been provided to key emergency response personnel throughout the province of Ontario to assist in their transportation accident response training

  20. Dangerous and severe personality disorder: an ethical concept?

    Science.gov (United States)

    Glen, Sally

    2005-04-01

    Most clinicians and mental health practitioners are reluctant to work with people with dangerous and severe personality disorders because they believe there is nothing that mental health services can offer. Dangerous and severe personality disorder also signals a diagnosis which is problematic morally. Moral philosophy has not found an adequate way of dealing with personality disorders. This paper explores the question: What makes a person morally responsible for his actions and what is a legitimate mitigating factor? How do psychiatric nurses working with this client group understand the awful things some clients do? What concepts do they need, if they are to know how to explain and how to react? It is suggested that dangerous and severe personality disorder is best regarded as a moral category, framed in terms of goodness, badness, obligation and other ethical concepts. It seems plausible that in important ways the dangerous and severe personality disordered client does not understand morality or understands it differently. The peculiar position of the dangerous and severe personality disordered individual in our system of moral responsibility stems from his apparent inability to see the importance of the interests of others. It might be more helpful to regard personality disordered clients as we do children: partially but not fully reasonable for their actions. We might regard the dangerous and severe personality disordered client responsible for those actions which he most clearly understands, such as causing others physical pain, but not for those with which he is only superficially engaged, such as causing emotional pain. The paper concludes by suggesting that the dangerous and severe personality disordered individual does not fit easily into any conventional moral category, be it criminal, patient, animal or child, and thus an assessment of his moral accountability must take into consideration his special circumstances.

  1. Danger Signals Activating the Immune Response after Trauma

    Directory of Open Access Journals (Sweden)

    Stefanie Hirsiger

    2012-01-01

    Full Text Available Sterile injury can cause a systemic inflammatory response syndrome (SIRS that resembles the host response during sepsis. The inflammatory response following trauma comprises various systems of the human body which are cross-linked with each other within a highly complex network of inflammation. Endogenous danger signals (danger-associated molecular patterns; DAMPs; alarmins as well as exogenous pathogen-associated molecular patterns (PAMPs play a crucial role in the initiation of the immune response. With popularization of the “danger theory,” numerous DAMPs and PAMPs and their corresponding pathogen-recognition receptors have been identified. In this paper, we highlight the role of the DAMPs high-mobility group box protein 1 (HMGB1, interleukin-1α (IL-1α, and interleukin-33 (IL-33 as unique dual-function mediators as well as mitochondrial danger signals released upon cellular trauma and necrosis.

  2. Update on hidden sectors with dark forces and dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-11-15

    Recently there has been much interest in hidden sectors, especially in the context of dark matter and ''dark forces'', since they are a common feature of beyond standard model scenarios like string theory and SUSY and additionally exhibit interesting phenomenological aspects. Various laboratory experiments place limits on the so-called hidden photon and continuously further probe and constrain the parameter space; an updated overview is presented here. Furthermore, for several hidden sector models with light dark matter we study the viability with respect to the relic abundance and direct detection experiments.

  3. Neuroscience in forensic psychiatry: From responsibility to dangerousness. Ethical and legal implications of using neuroscience for dangerousness assessments.

    Science.gov (United States)

    Gkotsi, Georgia Martha; Gasser, Jacques

    2016-01-01

    Neuroscientific evidence is increasingly being used in criminal trials as part of psychiatric testimony. Up to now, "neurolaw" literature remained focused on the use of neuroscience for assessments of criminal responsibility. However, in the field of forensic psychiatry, responsibility assessments are progressively being weakened, whereas dangerousness and risk assessment gain increasing importance. In this paper, we argue that the introduction of neuroscientific data by forensic experts in criminal trials will be mostly be used in the future as a means to evaluate or as an indication of an offender's dangerousness, rather than their responsibility. Judges confronted with the pressure to ensure public security may tend to interpret neuroscientific knowledge and data as an objective and reliable way of evaluating one's risk of reoffending. First, we aim to show how the current socio-legal context has reshaped the task of the forensic psychiatrist, with dangerousness assessments prevailing. In the second part, we examine from a critical point of view the promise of neuroscience to serve a better criminal justice system by offering new tools for risk assessment. Then we aim to explain why neuroscientific evidence is likely to be used as evidence of dangerousness of the defendants. On a theoretical level, the current tendency in criminal policies to focus on prognostics of dangerousness seems to be "justified" by a utilitarian approach to punishment, supposedly revealed by new neuroscientific discoveries that challenge the notions of free will and responsibility. Although often promoted as progressive and humane, we believe that this approach could lead to an instrumentalization of neuroscience in the interest of public safety and give rise to interventions which could entail ethical caveats and run counter to the interests of the offenders. The last part of this paper deals with some of these issues-the danger of stigmatization for brain damaged offenders because of

  4. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2016-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  5. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  6. Dissecting a hidden gene duplication: the Arabidopsis thaliana SEC10 locus.

    Directory of Open Access Journals (Sweden)

    Nemanja Vukašinović

    Full Text Available Repetitive sequences present a challenge for genome sequence assembly, and highly similar segmental duplications may disappear from assembled genome sequences. Having found a surprising lack of observable phenotypic deviations and non-Mendelian segregation in Arabidopsis thaliana mutants in SEC10, a gene encoding a core subunit of the exocyst tethering complex, we examined whether this could be explained by a hidden gene duplication. Re-sequencing and manual assembly of the Arabidopsis thaliana SEC10 (At5g12370 locus revealed that this locus, comprising a single gene in the reference genome assembly, indeed contains two paralogous genes in tandem, SEC10a and SEC10b, and that a sequence segment of 7 kb in length is missing from the reference genome sequence. Differences between the two paralogs are concentrated in non-coding regions, while the predicted protein sequences exhibit 99% identity, differing only by substitution of five amino acid residues and an indel of four residues. Both SEC10 genes are expressed, although varying transcript levels suggest differential regulation. Homozygous T-DNA insertion mutants in either paralog exhibit a wild-type phenotype, consistent with proposed extensive functional redundancy of the two genes. By these observations we demonstrate that recently duplicated genes may remain hidden even in well-characterized genomes, such as that of A. thaliana. Moreover, we show that the use of the existing A. thaliana reference genome sequence as a guide for sequence assembly of new Arabidopsis accessions or related species has at least in some cases led to error propagation.

  7. State-space dimensionality in short-memory hidden-variable theories

    International Nuclear Information System (INIS)

    Montina, Alberto

    2011-01-01

    Recently we have presented a hidden-variable model of measurements for a qubit where the hidden-variable state-space dimension is one-half the quantum-state manifold dimension. The absence of a short memory (Markov) dynamics is the price paid for this dimensional reduction. The conflict between having the Markov property and achieving the dimensional reduction was proved by Montina [A. Montina, Phys. Rev. A 77, 022104 (2008)] using an additional hypothesis of trajectory relaxation. Here we analyze in more detail this hypothesis introducing the concept of invertible process and report a proof that makes clearer the role played by the topology of the hidden-variable space. This is accomplished by requiring suitable properties of regularity of the conditional probability governing the dynamics. In the case of minimal dimension the set of continuous hidden variables is identified with an object living an N-dimensional Hilbert space whose dynamics is described by the Schroedinger equation. A method for generating the economical non-Markovian model for the qubit is also presented.

  8. Public Danger of Ecological Crime: Criminological Aspect​

    Directory of Open Access Journals (Sweden)

    Kuznetsova Natalya I.

    2018-03-01

    Full Text Available This article describes the characteristics of public danger of ecological crime. Specific features that distinguish it from other types of criminality are analyzed. Identified and justified are such features of environmental crime as an increased level of public danger, a wider range of victims, the continuing and deferred nature of the negative consequences, their transboundary nature, the irreversibility of the consequences, causing significant harm to the economic interests of the state, expressed in the withdrawal from the legal turnover of huge amounts of valuable natural resources. On the basis of the conducted research the author suggests wide use of the integrated criminological approach to studying the public danger of environmental crime taking into account its quantitative and qualitative characteristics.

  9. Protocol for the Control of Emergencies with Dangerous Materials

    International Nuclear Information System (INIS)

    Rodriguez Acosta, F.

    2000-01-01

    This document is required to serve as a guide for plant engineers, in charge of the security and industrial hygiene or those people that for its work, have relationship with the use, storage and distribution of chemical substances, which represent a diversity of risks as the toxicity, the inflammability and the risk of explosion. The information that the specific protocol contains is precise and a series of sections that summarize the general information of the substance are developed, like its use, the risk of explosion, the inflammability and the physical-chemical properties. Additionally, some sections are included like the answer mechanisms before the fire presence, the personnel's decontamination and of the equipment, the gathering of the waste and the procedures of first aids. The chemical substances that cause bigger quantity of events for dangerous materials in Costa Rica are the acids, the bases, the chlorine, the liquate petroleum gas (LPG), the ammonia and the agro-chemicals. Due to the intrinsic risk that it possesses these substances, a protocol to act efficiently in front of an emergency related with some of the substances are developed. Due to the increment in the incidence of events with dangerous materials in different population's sectors, for example spills in the roads, emergencies in industries and educational centers, a law with the purpose of stopping the use and the indiscriminate manipulation of these substances in non-capable locations is necessary. Additionally, it is necessary the upgrade in the equipment and in the containers that don't fulfill the minimum requirements of security, as well as to offer the maximum security to people that have contact with such chemical substances. (Author) [es

  10. Dopamine reward prediction errors reflect hidden state inference across time

    Science.gov (United States)

    Starkweather, Clara Kwon; Babayan, Benedicte M.; Uchida, Naoshige; Gershman, Samuel J.

    2017-01-01

    Midbrain dopamine neurons signal reward prediction error (RPE), or actual minus expected reward. The temporal difference (TD) learning model has been a cornerstone in understanding how dopamine RPEs could drive associative learning. Classically, TD learning imparts value to features that serially track elapsed time relative to observable stimuli. In the real world, however, sensory stimuli provide ambiguous information about the hidden state of the environment, leading to the proposal that TD learning might instead compute a value signal based on an inferred distribution of hidden states (a ‘belief state’). In this work, we asked whether dopaminergic signaling supports a TD learning framework that operates over hidden states. We found that dopamine signaling exhibited a striking difference between two tasks that differed only with respect to whether reward was delivered deterministically. Our results favor an associative learning rule that combines cached values with hidden state inference. PMID:28263301

  11. Higher-dimensional black holes: hidden symmetries and separation of variables

    International Nuclear Information System (INIS)

    Frolov, Valeri P; Kubiznak, David

    2008-01-01

    In this paper, we discuss hidden symmetries in rotating black hole spacetimes. We start with an extended introduction which mainly summarizes results on hidden symmetries in four dimensions and introduces Killing and Killing-Yano tensors, objects responsible for hidden symmetries. We also demonstrate how starting with a principal CKY tensor (that is a closed non-degenerate conformal Killing-Yano 2-form) in 4D flat spacetime one can 'generate' the 4D Kerr-NUT-(A)dS solution and its hidden symmetries. After this we consider higher-dimensional Kerr-NUT-(A)dS metrics and demonstrate that they possess a principal CKY tensor which allows one to generate the whole tower of Killing-Yano and Killing tensors. These symmetries imply complete integrability of geodesic equations and complete separation of variables for the Hamilton-Jacobi, Klein-Gordon and Dirac equations in the general Kerr-NUT-(A)dS metrics

  12. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  13. The merchant shipping (dangerous goods) (amendment) rules 1980 No. 789

    International Nuclear Information System (INIS)

    1980-01-01

    These Rules amend the Merchant Shipping Rules 1978 and revoke the Merchant Shipping (Dangerous Goods) (Amendment) Rules 1979. The purpose of this amendment is to update the references to the 1978 Report of the Department of Trade's Standing Advisory Committee on the Carriage of Dangerous Goods in Ships (the Blue Book) and the 1977 Edition of the International Maritime Dangerous Goods Code of IMCO (the IMDG Code), referred to in the 1978 Rules. The amendments concern, inter alia, marking of packages on board ship which contain dangerous goods, including radioactive materials (NEA) [fr

  14. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  15. A hidden history

    OpenAIRE

    Peppers, Emily

    2008-01-01

    The Cultural Collections Audit project began at the University of Edinburgh in 2004, searching for hidden treasures in its 'distributed heritage collections' across the university. The objects and collections recorded in the Audit ranged widely from fine art and furniture to historical scientific and teaching equipment and personalia relating to key figures in the university's long tradition of academic excellence. This information was gathered in order to create a central database of informa...

  16. Life imitating art: depictions of the hidden curriculum in medical television programs.

    Science.gov (United States)

    Stanek, Agatha; Clarkin, Chantalle; Bould, M Dylan; Writer, Hilary; Doja, Asif

    2015-09-26

    The hidden curriculum represents influences occurring within the culture of medicine that indirectly alter medical professionals' interactions, beliefs and clinical practices throughout their training. One approach to increase medical student awareness of the hidden curriculum is to provide them with readily available examples of how it is enacted in medicine; as such the purpose of this study was to examine depictions of the hidden curriculum in popular medical television programs. One full season of ER, Grey's Anatomy and Scrubs were selected for review. A summative content analysis was performed to ascertain the presence of depictions of the hidden curriculum, as well as to record the type, frequency and quality of examples. A second reviewer also viewed a random selection of episodes from each series to establish coding reliability. The most prevalent themes across all television programs were: the hierarchical nature of medicine; challenges during transitional stages in medicine; the importance of role modeling; patient dehumanization; faking or overstating one's capabilities; unprofessionalism; the loss of idealism; and difficulties with work-life balance. The hidden curriculum is frequently depicted in popular medical television shows. These examples of the hidden curriculum could serve as a valuable teaching resource in undergraduate medical programs.

  17. Rare Z boson decays to a hidden sector

    Science.gov (United States)

    Blinov, Nikita; Izaguirre, Eder; Shuve, Brian

    2018-01-01

    We demonstrate that rare decays of the Standard Model Z boson can be used to discover and characterize the nature of new hidden-sector particles. We propose new searches for these particles in soft, high-multiplicity leptonic final states at the Large Hadron Collider. The proposed searches are sensitive to low-mass particles produced in Z decays, and we argue that these striking signatures can shed light on the hidden-sector couplings and mechanism for mass generation.

  18. The Consensus String Problem and the Complexity of Comparing Hidden Markov Models

    DEFF Research Database (Denmark)

    Lyngsø, Rune Bang; Pedersen, Christian Nørgaard Storm

    2002-01-01

    The basic theory of hidden Markov models was developed and applied to problems in speech recognition in the late 1960s, and has since then been applied to numerous problems, e.g. biological sequence analysis. Most applications of hidden Markov models are based on efficient algorithms for computing...... the probability of generating a given string, or computing the most likely path generating a given string. In this paper we consider the problem of computing the most likely string, or consensus string, generated by a given model, and its implications on the complexity of comparing hidden Markov models. We show...... that computing the consensus string, and approximating its probability within any constant factor, is NP-hard, and that the same holds for the closely related labeling problem for class hidden Markov models. Furthermore, we establish the NP-hardness of comparing two hidden Markov models under the L∞- and L1...

  19. Cosmological abundance of the QCD axion coupled to hidden photons

    Science.gov (United States)

    Kitajima, Naoya; Sekiguchi, Toyokazu; Takahashi, Fuminobu

    2018-06-01

    We study the cosmological evolution of the QCD axion coupled to hidden photons. For a moderately strong coupling, the motion of the axion field leads to an explosive production of hidden photons by tachyonic instability. We use lattice simulations to evaluate the cosmological abundance of the QCD axion. In doing so, we incorporate the backreaction of the produced hidden photons on the axion dynamics, which becomes significant in the non-linear regime. We find that the axion abundance is suppressed by at most O (102) for the decay constant fa =1016GeV, compared to the case without the coupling. For a sufficiently large coupling, the motion of the QCD axion becomes strongly damped, and as a result, the axion abundance is enhanced. Our results show that the cosmological upper bound on the axion decay constant can be relaxed by a few hundred for a certain range of the coupling to hidden photons.

  20. The application of dangerous goods regulations to the transport of radioactive wastes

    International Nuclear Information System (INIS)

    Blenkin, J.J.; Darby, W.P.; Heywood, J.D.; Wikinson, H.L.; Carrington, C.K.; Murray, M.A.

    1998-01-01

    Some radioactive materials to be transported, including certain radioactive wastes, contain materials that qualify as dangerous goods as defined by the United Nations Recommendations on the Transport of Dangerous Goods (United Nations 1997). The regulations governing the transport of radioactive and dangerous goods in the UK are largely based on the IAEA Regulations for the Safe Transport of Radioactive Material (IAEA 1990) and the UN Recommendations (United Nations 1993). Additional legislation will also apply including the Carriage of Dangerous Goods by Road (Driver Training) Regulations 1996 (UK 1996). The IAEA Transport Regulations are clear that where radioactive materials have other dangerous properties the requirements of other relevant transport regulations for dangerous goods must also be met. They require that consignments are appropriately segregated from other dangerous goods, in accordance with relevant legislation, and that dangerous properties such as explosiveness, flammability etc. are taken into account in packing, labelling, marking, placarding, storage and transport. In practice, however, it requires a clear understanding of the relationship between the IAEA Transport Regulations and other dangerous goods legislation in order to avoid a number of problems in the approval of package design. This paper discusses the regulations applying to the transport of dangerous goods and explores practical problems associated with implementing them. It highlights a number of opportunities for developing the regulations, to make them easier to apply to radioactive materials that also have other potentially dangerous properties. (authors)

  1. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    International Nuclear Information System (INIS)

    Itoh, H.; Okada, N.; Yamashita, T.

    2007-01-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden. (author)

  2. An impossibility theorem for parameter independent hidden variable theories

    Science.gov (United States)

    Leegwater, Gijs

    2016-05-01

    Recently, Roger Colbeck and Renato Renner (C&R) have claimed that '[n]o extension of quantum theory can have improved predictive power' (Colbeck & Renner, 2011, 2012b). If correct, this is a spectacular impossibility theorem for hidden variable theories, which is more general than the theorems of Bell (1964) and Leggett (2003). Also, C&R have used their claim in attempt to prove that a system's quantum-mechanical wave function is in a one-to-one correspondence with its 'ontic' state (Colbeck & Renner, 2012a). C&R's claim essentially means that in any hidden variable theory that is compatible with quantum-mechanical predictions, probabilities of measurement outcomes are independent of these hidden variables. This makes such variables otiose. On closer inspection, however, the generality and validity of the claim can be contested. First, it is based on an assumption called 'Freedom of Choice'. As the name suggests, this assumption involves the independence of an experimenter's choice of measurement settings. But in the way C&R define this assumption, a no-signalling condition is surreptitiously presupposed, making the assumption less innocent than it sounds. When using this definition, any hidden variable theory violating parameter independence, such as Bohmian Mechanics, is immediately shown to be incompatible with quantum-mechanical predictions. Also, the argument of C&R is hard to follow and their mathematical derivation contains several gaps, some of which cannot be closed in the way they suggest. We shall show that these gaps can be filled. The issue with the 'Freedom of Choice' assumption can be circumvented by explicitly assuming parameter independence. This makes the result less general, but better founded. We then obtain an impossibility theorem for hidden variable theories satisfying parameter independence only. As stated above, such hidden variable theories are impossible in the sense that any supplemental variables have no bearing on outcome probabilities

  3. Entry deterrence and hidden competition

    NARCIS (Netherlands)

    Lavrutich, Maria; Huisman, Kuno; Kort, Peter

    This paper studies strategic investment behavior of firms facing an uncertain demand in a duopoly setting. Firms choose both investment timing and the capacity level while facing additional uncertainty about market participants, which is introduced via the concept of hidden competition. We focus on

  4. Adaptive Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rasmussen, Tage

    1996-01-01

    Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding....

  5. Applications of hidden symmetries to black hole physics

    International Nuclear Information System (INIS)

    Frolov, Valeri

    2011-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  6. Study on coal mine macro, meso and micro safety management system

    Directory of Open Access Journals (Sweden)

    Longkang Wang

    2016-03-01

    Full Text Available In recent years, the coal mine safety production situation in our country improved year by year, but severe accidents still occurred; the accidents caused great economic loss to the national economy. According to statistical analysis, almost all of the coal mine accidents will expose the hidden danger in before, most of the accidents caused due to safety management not reaching the designated position and the hidden danger management does not take any decision in time. Based on the coal mine safety management holes in our country, the coal mine macro, meso and micro safety management system was established in this paper, which includes meaning and conception of the theories of the macro, meso and micro safety management, and also includes the matching hardware equipment, in order to achieve the hidden danger's closed-loop control and dynamic early warning in the process of coal mine production.

  7. The Merchant Shipping (Dangerous Goods) Rules 1978 (Statutory Instrument 1543, 25 October 1978)

    International Nuclear Information System (INIS)

    1978-01-01

    These Rules supersede the Merchant Shipping (Dangerous Goods) Rule of 1965 as amended by the Merchant Shipping (Dangerous Goods) (Amendment) Rules of 1968 and 1972. The Rules now define 'dangerous goods' by reference to goods classified as dangerous for carriage by sea as well as any other goods whose properties might be dangerous it they were carried by sea. This classification is based on that of the 1978 Report of the Standing Advisory Committee on the Carriage of Dangerous Goods of the Department of Trade, and the 1977 Edition of the International Maritime Dangerous Goods Code published by the Intergovernmental Maritime consultative Organisation. (NEA) [fr

  8. Decree 2211: Standards to control the generation and handling of dangerous wastes

    International Nuclear Information System (INIS)

    1992-01-01

    This Decree has for object to establish the conditions under which should be carried out the activities of generation and handling of dangerous waste, in order to prevent damages to health and to the atmosphere. It includes: definitions; a list of sources of waste; a list of constituent of dangerous waste; the characteristics of danger; a lists of maximum permissible concentrations in leachates, handling of dangerous waste, criterion for transport, monitoring form, storage areas, treatment and final disposition, storage, elimination, incineration, recycling, reuse and recovery, installation and operation of security backfilling, book of waste record, control of activities, obligations in charge of those who manage dangerous waste, and trans border movements of dangerous waste [es

  9. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  10. Rural Tanzanian women's awareness of danger signs of obstetric complications

    Directory of Open Access Journals (Sweden)

    Lindmark Gunilla

    2009-03-01

    Full Text Available Abstract Background Awareness of the danger signs of obstetric complications is the essential first step in accepting appropriate and timely referral to obstetric and newborn care. The objectives of this study were to assess women's awareness of danger signs of obstetric complications and to identify associated factors in a rural district in Tanzania. Methods A total of 1118 women who had been pregnant in the past two years were interviewed. A list of medically recognized potentially life threatening obstetric signs was obtained from the responses given. Chi- square test was used to determine associations between categorical variables and multivariate logistic regression analysis was used to identify factors associated with awareness of obstetric danger signs. Results More than 98% of the women attended antenatal care at least once. Half of the women knew at least one obstetric danger sign. The percentage of women who knew at least one danger sign during pregnancy was 26%, during delivery 23% and after delivery 40%. Few women knew three or more danger signs. According to multivariate logistic regression analysis having secondary education or more increased the likelihood of awareness of obstetric danger signs six-fold (OR = 5.8; 95% CI: 1.8–19 in comparison with no education at all. The likelihood to have more awareness increased significantly by increasing age of the mother, number of deliveries, number of antenatal visits, whether the delivery took place at a health institution and whether the mother was informed of having a risks/complications during antenatal care. Conclusion Women had low awareness of danger signs of obstetric complications. We recommend the following in order to increase awareness of danger signs of obstetrical complications: to improve quality of counseling and involving other family members in antenatal and postnatal care, to use radio messages and educational sessions targeting the whole community and to intensify

  11. Signatures of a hidden cosmic microwave background.

    Science.gov (United States)

    Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-09-26

    If there is a light Abelian gauge boson gamma' in the hidden sector its kinetic mixing with the photon can produce a hidden cosmic microwave background (HCMB). For meV masses, resonant oscillations gammagamma' happen after big bang nucleosynthesis (BBN) but before CMB decoupling, increasing the effective number of neutrinos Nnu(eff) and the baryon to photon ratio, and distorting the CMB blackbody spectrum. The agreement between BBN and CMB data provides new constraints. However, including Lyman-alpha data, Nnu(eff) > 3 is preferred. It is tempting to attribute this effect to the HCMB. The interesting parameter range will be tested in upcoming laboratory experiments.

  12. Hidden inventory and safety considerations

    International Nuclear Information System (INIS)

    Anderson, A.R.; James, R.H.; Morgan, F.

    1976-01-01

    Preliminary results are described of the evaluation of residual plutonium in a process line used for the production of experimental fast reactor fuel. Initial attention has been focussed on a selection of work boxes used for processing powders and solutions. Amounts of material measured as ''hidden inventory'' are generally less than 0.1 percent of throughput but in one box containing very complex equipment the amount was exceptionally about 0.5 percent. The total surface area of the box and the installed equipment appears to be the most significant factor in determining the amount of plutonium held-up as ''hidden inventory,'' representing an average of about 4 x 10 -4 g cm -2 . Present results are based on gamma spectrometer measurements but neutron techniques are being developed to overcome some of the inherent uncertainties in the gamma method. It is suggested that the routine use of sample plates of known surface area would be valuable in monitoring the deposition of plutonium in work boxes

  13. Hidden School Dropout among Immigrant Students: A Cross-Sectional Study

    Science.gov (United States)

    Makarova, Elena; Herzog, Walter

    2013-01-01

    Actual school dropout among immigrant youth has been addressed in a number of studies, but research on hidden school dropout among immigrant students is rare. Thus, the objective of this paper is to analyze hidden school dropout among primary school students with an immigrant background. The analyses were performed using survey data of 1186…

  14. Investigator's guide to steganography

    CERN Document Server

    Kipper, Gregory

    2003-01-01

    The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future

  15. WIMPless dark matter from non-Abelian hidden sectors with anomaly-mediated supersymmetry breaking

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Shadmi, Yael

    2011-01-01

    In anomaly-mediated supersymmetry breaking models, superpartner masses are proportional to couplings squared. Their hidden sectors therefore naturally contain WIMPless dark matter, particles whose thermal relic abundance is guaranteed to be of the correct size, even though they are not weakly interacting massive particles. We study viable dark matter candidates in WIMPless anomaly-mediated supersymmetry breaking models with non-Abelian hidden sectors and highlight unusual possibilities that emerge in even the simplest models. In one example with a pure SU(N) hidden sector, stable hidden gluinos freeze out with the correct relic density, but have an extremely low, but natural, confinement scale, providing a framework for self-interacting dark matter. In another simple scenario, hidden gluinos freeze out and decay to visible Winos with the correct relic density, and hidden glueballs may either be stable, providing a natural framework for mixed cold-hot dark matter, or may decay, yielding astrophysical signals. Last, we present a model with light hidden pions that may be tested with improved constraints on the number of nonrelativistic degrees of freedom. All of these scenarios are defined by a small number of parameters, are consistent with gauge coupling unification, preserve the beautiful connection between the weak scale and the observed dark matter relic density, and are natural, with relatively light visible superpartners. We conclude with comments on interesting future directions.

  16. On the hidden maxwell superalgebra underlying D = 4 supergravity

    Energy Technology Data Exchange (ETDEWEB)

    Penafiel, D.M. [Departamento de Fisica, Universidad de Concepcion (Chile); DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy); Ravera, L. [DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy)

    2017-09-15

    In this work, we expand the hidden AdS-Lorentz superalgebra underlying D = 4 supergravity, reaching a (hidden) Maxwell superalgebra. The latter can be viewed as an extension involving cosmological constant of the superalgebra underlying D = 4 supergravity in flat spacetime. We write the Maurer-Cartan equations in this context and we find some interesting extensions of the antisymmetric 3-form A{sup (3)} appearing in the Free Differential Algebra in Minkowski space. The structure of Free Differential Algebras is obtained by considering the zero curvature equations. We write the parametrization of A{sup (3)} in terms of 1-forms and we rend the topological features of its extensions manifest. We interestingly find out that the structure of these extensions, and consequently the structure of the corresponding boundary contribution dA{sup (3)}, strongly depends on the form of the extra fermionic generator appearing in the hidden Maxwell superalgebra. The model we develop in this work is defined in an enlarged superspace with respect to the ordinary one, and the extra bosonic and fermionic 1-forms required for the closure of the hidden Maxwell superalgebra must be considered as physical fields in this enlarged superspace. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  17. Low-intensity interference effects and hidden-variable theories

    Energy Technology Data Exchange (ETDEWEB)

    Buonomano, V [Universidade Estadual de Campinas (Brazil). Inst. de Matematica

    1978-05-11

    The double-slit interference experiment and other similar experiments in the low-intensity limit (that is, one photon in the apparatus at a time) are examined in the spirit of Bell's work from the point of view of hidden-variable theories. It is found that there exists a class of hidden-variable theories which disagrees with quantum mechanics for a certain type of interference experiment. A manufactured conceptualization of this class, which is a particle view of interference, is described. An experiment, which appears to be feasible, is proposed to examine this disagreement.

  18. Application of Hidden Markov Models in Biomolecular Simulations.

    Science.gov (United States)

    Shukla, Saurabh; Shamsi, Zahra; Moffett, Alexander S; Selvam, Balaji; Shukla, Diwakar

    2017-01-01

    Hidden Markov models (HMMs) provide a framework to analyze large trajectories of biomolecular simulation datasets. HMMs decompose the conformational space of a biological molecule into finite number of states that interconvert among each other with certain rates. HMMs simplify long timescale trajectories for human comprehension, and allow comparison of simulations with experimental data. In this chapter, we provide an overview of building HMMs for analyzing bimolecular simulation datasets. We demonstrate the procedure for building a Hidden Markov model for Met-enkephalin peptide simulation dataset and compare the timescales of the process.

  19. Detecting Faults By Use Of Hidden Markov Models

    Science.gov (United States)

    Smyth, Padhraic J.

    1995-01-01

    Frequency of false alarms reduced. Faults in complicated dynamic system (e.g., antenna-aiming system, telecommunication network, or human heart) detected automatically by method of automated, continuous monitoring. Obtains time-series data by sampling multiple sensor outputs at discrete intervals of t and processes data via algorithm determining whether system in normal or faulty state. Algorithm implements, among other things, hidden first-order temporal Markov model of states of system. Mathematical model of dynamics of system not needed. Present method is "prior" method mentioned in "Improved Hidden-Markov-Model Method of Detecting Faults" (NPO-18982).

  20. From the solar system fo hidden cosmic structures

    Energy Technology Data Exchange (ETDEWEB)

    Benes, K

    1987-01-01

    The development of experimental astrophysics showed that in the evolution of planets, natural processes of a common nature take place. They include, e.g., radiogenic heat, the production of magmas, volcanic activity, degassing, etc. The solar system is a cosmic formation in an advanced stage of development and it is a realistic assumption that in the Galaxy other hidden planetary systems in various stages of development exist. The views on the possibility of the origination of life in other systems differ; life, however, is seen as a hidden property of cosmic matter. (M.D.).

  1. Search for hidden Higgs decay in ATLAS detector

    International Nuclear Information System (INIS)

    Gabrielli, A.

    2013-01-01

    In this paper, a brief overview of the search for the Higgs boson in Hidden Valley models is given. Hidden Valley models predict Higgs decays to neutral particles, which can be also long lived with decay paths comparable to the LHC detectors dimensions. Decay final states consist of collimated leptons (Lepton Jets). Results are presented of a search for Higgs decays to long lived particles in the ATLAS detector at the LHC, based on 1.92 fb −1 data collected during 2011 at a 7TeV center-of-mass energy.

  2. Dissipative hidden sector dark matter

    Science.gov (United States)

    Foot, R.; Vagnozzi, S.

    2015-01-01

    A simple way of explaining dark matter without modifying known Standard Model physics is to require the existence of a hidden (dark) sector, which interacts with the visible one predominantly via gravity. We consider a hidden sector containing two stable particles charged under an unbroken U (1 )' gauge symmetry, hence featuring dissipative interactions. The massless gauge field associated with this symmetry, the dark photon, can interact via kinetic mixing with the ordinary photon. In fact, such an interaction of strength ε ˜10-9 appears to be necessary in order to explain galactic structure. We calculate the effect of this new physics on big bang nucleosynthesis and its contribution to the relativistic energy density at hydrogen recombination. We then examine the process of dark recombination, during which neutral dark states are formed, which is important for large-scale structure formation. Galactic structure is considered next, focusing on spiral and irregular galaxies. For these galaxies we modeled the dark matter halo (at the current epoch) as a dissipative plasma of dark matter particles, where the energy lost due to dissipation is compensated by the energy produced from ordinary supernovae (the core-collapse energy is transferred to the hidden sector via kinetic mixing induced processes in the supernova core). We find that such a dynamical halo model can reproduce several observed features of disk galaxies, including the cored density profile and the Tully-Fisher relation. We also discuss how elliptical and dwarf spheroidal galaxies could fit into this picture. Finally, these analyses are combined to set bounds on the parameter space of our model, which can serve as a guideline for future experimental searches.

  3. Grout treatment facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1988-01-01

    This section briefly describes the Hanford Site, provides a general description of the site operations and administration, provides an overview of the contents of this Grout Treatment Facility (GTF) Permit Application, and gives a list of acronyms and abbreviations used in the document. The decision was made to use the checklist as a locator reference instead of using the checklist section numbers as paragraph section numbers because several different types of waste management units, some of which are not addressed in the checklists, are part of the GTF. The GTF is a waste management unit within the Hanford Site facility. In May 1988, permit application was filed that identified the GTF as an existing facility. The GTF mixes dry cementitious solids with liquid mixed wastes (containing both dangerous and radioactive constituents) produced by Hanford Site operations. In addition to the design and operating features of the GTF that are intended to meet the requirements of dangerous waste regulations, many additional design and operating features are necessary to comply with radioactive waste management practices. The GTF design features and practices are intended to keep operational exposure to radionuclides and dangerous substances ''as low as reasonably achievable'' (ALARA) and to provide a disposal system that protects the environment for at least 10,000 yr. In some instances, ALARA practices present difficulties when complying with requirements of dangerous waste regulations

  4. Hidden twelve-dimensional super Poincare symmetry in eleven dimensions

    International Nuclear Information System (INIS)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2004-01-01

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional super Poincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven-dimensional superparticle, taken off-shell, we discover a hidden twelve-dimensional super Poincare symmetry that governs the theory

  5. Electroweak-charged bound states as LHC probes of hidden forces

    Science.gov (United States)

    Li, Lingfeng; Salvioni, Ennio; Tsai, Yuhsin; Zheng, Rui

    2018-01-01

    We explore the LHC reach on beyond-the-standard model (BSM) particles X associated with a new strong force in a hidden sector. We focus on the motivated scenario where the SM and hidden sectors are connected by fermionic mediators ψ+,0 that carry SM electroweak charges. The most promising signal is the Drell-Yan production of a ψ±ψ¯ 0 pair, which forms an electrically charged vector bound state ϒ± due to the hidden force and later undergoes resonant annihilation into W±X . We analyze this final state in detail in the cases where X is a real scalar ϕ that decays to b b ¯, or a dark photon γd that decays to dileptons. For prompt X decays, we show that the corresponding signatures can be efficiently probed by extending the existing ATLAS and CMS diboson searches to include heavy resonance decays into BSM particles. For long-lived X , we propose new searches where the requirement of a prompt hard lepton originating from the W boson ensures triggering and essentially removes any SM backgrounds. To illustrate the potential of our results, we interpret them within two explicit models that contain strong hidden forces and electroweak-charged mediators, namely λ -supersymmetry (SUSY) and non-SUSY ultraviolet extensions of the twin Higgs model. The resonant nature of the signals allows for the reconstruction of the mass of both ϒ± and X , thus providing a wealth of information about the hidden sector.

  6. Application of ANNS in tube CHF prediction: effect on neuron number in hidden layer

    International Nuclear Information System (INIS)

    Han, L.; Shan, J.; Zhang, B.

    2004-01-01

    Prediction of the Critical Heat Flux (CHF) for upward flow of water in uniformly heated vertical round tube is studied with Artificial Neuron Networks (ANNs) method utilizing different neuron number in hidden layers. This study is based on thermal equilibrium conditions. The neuron number in hidden layers is chosen to vary from 5 to 30 with the step of 5. The effect due to the variety of the neuron number in hidden layers is analyzed. The analysis shows that the neuron number in hidden layers should be appropriate, too less will affect the prediction accuracy and too much may result in abnormal parametric trends. It is concluded that the appropriate neuron number in two hidden layers should be [15 15]. (authors)

  7. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  8. Evaluation of Image-Guided Positioning for Frameless Intracranial Radiosurgery

    International Nuclear Information System (INIS)

    Lamba, Michael; Breneman, John C.; Warnick, Ronald E.

    2009-01-01

    Purpose: The standard for target alignment and immobilization in intracranial radiosurgery is frame-based alignment and rigid immobilization using a stereotactic head ring. Recent improvements in image-guidance systems have introduced the possibility of image-guided radiosurgery with nonrigid immobilization. We present data on the alignment accuracy and patient stability of a frameless image-guided system. Methods and Materials: Isocenter alignment errors were measured for in vitro studies in an anthropomorphic phantom for both frame-based stereotactic and frameless image-guided alignment. Subsequently, in vivo studies assessed differences between frame-based and image-guided alignment in patients who underwent frame-based intracranial radiosurgery. Finally, intratreatment target stability was determined by image-guided alignment performed before and after image-guided mask immobilized radiosurgery. Results: In vitro hidden target localization errors were comparable for the framed (0.7 ± 0.5 mm) and image-guided (0.6 ± 0.2 mm) techniques. The in vivo differences in alignment were 0.9 ± 0.5 mm (anteroposterior), -0.2 ± 0.4 mm (superoinferior), and 0.3 ± 0.5 mm (lateral). For in vivo stability tests, the mean distance differed between the pre- and post-treatment positions with mask-immobilized radiosurgery by 0.5 ± 0.3 mm. Conclusion: Frame-based and image-guided alignment accuracy in vitro was comparable for the system tested. In vivo tests showed a consistent trend in the difference of alignment in the anteroposterior direction, possibly due to torque to the ring and mounting system with frame-based localization. The mask system as used appeared adequate for patient immobilization.

  9. Anomalies of hidden local chiral symmetries in sigma-models and extended supergravities

    International Nuclear Information System (INIS)

    Vecchia, P. di; Ferrara, S.; Girardello, L.

    1985-01-01

    Non-linear sigma-models with hidden gauge symmetries are anomalous, at the quantum level, when coupled to chiral fermions in not anomaly free representations of the hidden chiral symmetry. These considerations generally apply to supersymmetric kaehlerian sigma-models on coset spaces with hidden chiral symmetries as well as to extended supergravities in four dimensions with local SU(N) symmetry. The presence of the anomaly implies that the scenario of dynamical generation of gauge vector bosons has to be reconsidered in these theories. (orig.)

  10. Hanford Facility Dangerous Waste Permit Application, 200 Area Effluent Treatment Facility

    International Nuclear Information System (INIS)

    1993-08-01

    The 200 Area Effluent Treatment Facility Dangerous Waste Permit Application documentation consists of both Part A and a Part B permit application documentation. An explanation of the Part A revisions associated with this treatment and storage unit, including the current revision, is provided at the beginning of the Part A section. Once the initial Hanford Facility Dangerous Waste Permit is issued, the following process will be used. As final, certified treatment, storage, and/or disposal unit-specific documents are developed, and completeness notifications are made by the US Environmental Protection Agency and the Washington State Department of Ecology, additional unit-specific permit conditions will be incorporated into the Hanford Facility Dangerous Waste Permit through the permit modification process. All treatment, storage, and/or disposal units that are included in the Hanford Facility Dangerous Waste Permit Application will operate under interim status until final status conditions for these units are incorporated into the Hanford Facility Dangerous Waste Permit. The Hanford Facility Dangerous Waste Permit Application, 200 Area Effluent Treatment Facility contains information current as of May 1, 1993

  11. Hanford Facility Dangerous Waste Permit Application, 200 Area Effluent Treatment Facility

    Energy Technology Data Exchange (ETDEWEB)

    1993-08-01

    The 200 Area Effluent Treatment Facility Dangerous Waste Permit Application documentation consists of both Part A and a Part B permit application documentation. An explanation of the Part A revisions associated with this treatment and storage unit, including the current revision, is provided at the beginning of the Part A section. Once the initial Hanford Facility Dangerous Waste Permit is issued, the following process will be used. As final, certified treatment, storage, and/or disposal unit-specific documents are developed, and completeness notifications are made by the US Environmental Protection Agency and the Washington State Department of Ecology, additional unit-specific permit conditions will be incorporated into the Hanford Facility Dangerous Waste Permit through the permit modification process. All treatment, storage, and/or disposal units that are included in the Hanford Facility Dangerous Waste Permit Application will operate under interim status until final status conditions for these units are incorporated into the Hanford Facility Dangerous Waste Permit. The Hanford Facility Dangerous Waste Permit Application, 200 Area Effluent Treatment Facility contains information current as of May 1, 1993.

  12. Review of hidden carbon emissions, trade, and labor income share in China, 2001–2011

    International Nuclear Information System (INIS)

    Wang, Shu-Hong; Song, Ma-Lin

    2014-01-01

    Coordinated development between the economy and the environment is currently one of the most important issues in China. By establishing models concerning labor income share and hidden carbon emissions, and taking trade as the link in their relationship, this study puts forward the scale effects, technological effects, and structural effects that relate to labor income share under the function of trade. We then establish multi-index and multi-indicator constitutive (MIMIC) equation to measure the ratio of hidden carbon emissions to total emissions, which is further considered the basis of the measurement model. Results of regression analysis carried out on labor income share show that hidden carbon emissions do have a positive effect on labor income share. In the meantime, we also prove that under scale effects, technological effects, and the structural effects of trade, hidden carbon emissions affect labor income shares in different directions. Our conclusions and policy implications are obtained from the calculated results. - Highlights: • This study establishes models concerning labor income share and hidden carbon emissions. • MIMIC is established to measure the ratio of hidden carbon emissions to total discharge. • Hidden carbon emissions have a positive effect on labor income share. • Hidden carbon emissions have various effects on the labor income share

  13. The selection and implementation of hidden line algorithms

    International Nuclear Information System (INIS)

    Schneider, A.

    1983-06-01

    One of the most challenging problems in the field of computer graphics is the elimination of hidden lines in images of nontransparent bodies. In the real world the nontransparent material hinders the light ray coming from hidden regions to the observer. In the computer based image formation process there is no automatic visibility regulation of this kind. So many lines are created which result in a poor quality of the spacial representation. Therefore a three-dimensional representation on the screen is only meaningfull if the hidden lines are eliminated. For this process many algorithms have been developed in the past. A common feature of these codes is the large amount of computer time needed. In the first generation of algorithms, which are commonly used today, the bodies are modeled by plane polygons. More recently, however, also algorithms are in use, which are able to treat curved surfaces without discretisation by plane surfaces. In this paper the first group of algorithms is reviewed, and the most important codes are described. The experience obtained during the implementation of two algorithms is presented. (orig.) [de

  14. Hidden sector behind the CKM matrix

    Science.gov (United States)

    Okawa, Shohei; Omura, Yuji

    2017-08-01

    The small quark mixing, described by the Cabibbo-Kobayashi-Maskawa (CKM) matrix in the standard model, may be a clue to reveal new physics around the TeV scale. We consider a simple scenario that extra particles in a hidden sector radiatively mediate the flavor violation to the quark sector around the TeV scale and effectively realize the observed CKM matrix. The lightest particle in the hidden sector, whose contribution to the CKM matrix is expected to be dominant, is a good dark matter (DM) candidate. There are many possible setups to describe this scenario, so that we investigate some universal predictions of this kind of model, focusing on the contribution of DM to the quark mixing and flavor physics. In this scenario, there is an explicit relation between the CKM matrix and flavor violating couplings, such as four-quark couplings, because both are radiatively induced by the particles in the hidden sector. Then, we can explicitly find the DM mass region and the size of Yukawa couplings between the DM and quarks, based on the study of flavor physics and DM physics. In conclusion, we show that DM mass in our scenario is around the TeV scale, and the Yukawa couplings are between O (0.01 ) and O (1 ). The spin-independent DM scattering cross section is estimated as O (10-9) [pb]. An extra colored particle is also predicted at the O (10 ) TeV scale.

  15. The term of danger in the surveillance procedure under atomic energy law

    International Nuclear Information System (INIS)

    Roller, G.

    1993-01-01

    Article 19 Section 3 of the Atomic Energy Law is gaining more and more practical significance. This can be seen from the dispute about the reach of the term of danger under atomic energy law, among other issues. The article examines the prerequisites for an offence pursuant to Article 19 Section 3 of the Atomic Energy Law - danger, suspected danger, 'acute' danger - and then goes on to deal with the term of danger as concretized by sublegislative rulings - concept of predefined accidents as an interpretative aid, their significance in the context of taking precautions against damage, consequences of the uncontrollability of such accidents. The legal consequences of this include the authorities' discretion when and how to act, exept for cases of grave danger where this discretion is reduced 'to zero', i.e. the authority is compelled to act. (orig./HSCH) [de

  16. Laser experiments explore the hidden sector

    International Nuclear Information System (INIS)

    Ahlers, M.

    2007-11-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses -7 times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background. (orig.)

  17. 438 Optimal Number of States in Hidden Markov Models and its ...

    African Journals Online (AJOL)

    In this paper, Hidden Markov Model is applied to model human movements as to .... emit either discrete information or a continuous data derived from a Probability .... For each hidden state in the test set, the probability = ... by applying the Kullback-Leibler distance (Juang & Rabiner, 1985) which ..... One Size Does Not Fit.

  18. Grout treatment facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1988-01-01

    This section briefly describes the Hanford Site, provides a general description of the site operations and administration, provides an overview of the contents of this Grout Treatment Facility (GTF) Permit Application, and gives a list of acronyms and abbreviations used in the document. The decision was made to use the checklist as a locator reference instead of using the checklist section numbers as paragraph section numbers because several different types of waste management units, some of which are not addressed in the checklists, are part of the GTF. The GTF is a waste management unit within the Hanford Site facility. In May 1988, a permit application was filed that identified the GTF as an existing facility. The GTF mixes dry cementitious solids with liquid mixed wastes (containing both dangerous and radioactive constituents) produced by Hanford Site operations. In addition to the design and operating features of the GTF that are intended to meet the requirements of dangerous waste regulations, many additional design and operating features are necessary to comply with radioactive waste management practices. The GTF design features and practices are intended to keep operational exposure to radionuclides and dangerous substances ''as low as reasonably achievable'' (ALARA) and to provide a disposal system that protects the environment for at least 10,000 yr. In some instances, ALARA practices present difficulties when complying with requirements of dangerous waste regulations. This volume contains 2 appendices covering engineering drawings and operating procedures

  19. Grout treatment facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1988-01-01

    This section briefly describes the Hanford Site, provides a general description of the site operations and administration, provides an overview of the contents of this Grout Treatment Facility (GTF) Permit Application, and gives a list of acronyms and abbreviations used in the document. The decision was made to use the checklist as a locator reference instead of using the checklist section numbers as paragraph section numbers because several different types of waste management units, some of which are not addressed in the checklists, are part of the GTF. The GTF is a waste management unit within the Hanford Site facility. In May 1988, a permit application was filed that identified the GTF as an existing facility. The GTF mixes dry cementitious solids with liquid mixed wastes (containing both dangerous and radioactive constitutents) produced by Hanford Site operations. In addition to the design and operating features of the GTF that are intended to meet the requirements of dangerous waste regulations, many additional design and operating features are necessary to comply with radioactive waste management practices. The GTF design features and practices are intended to keep operational exposure to radionuclides and dangerous substances ''as low as reasonably achievable'' (ALARA) and to provide a disposal system that protects the environment for at least 10,000 yr. In some instances, ALARA practices present difficulties when complying with requirements of dangerous waste regulations. This volume contains 2 Appendices covering engineering drawings and operating procedures

  20. Grout Treatment Facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1988-01-01

    This section briefly describes the Hanford Site, provides a general description of the site operations and administration, provides an overview of the contents of this Grout Treatment Facility (GTF) Permit Application, and gives a list of acronyms and abbreviations used in the document. The decision was made to use the checklist as a locator reference instead of using the checklist section numbers as paragraph section numbers because several different types of waste management units, some of which are not addressed in the checklists, are part of the GTF. The GTF is a waste management unit within the Hanford Site facility. In May 1988, a permit application was filed that identified the GTF as an existing facility. The GTF mixes dry cementitious solids with liquid wastes (containing both dangerous and radioactive constituents) produced by Hanford Site operations. In addition to the design and operating features of the GTF that are intended to meet the requirements of dangerous waste regulations, many additional design and operating features are necessary to comply with radioactive waste management practices. The GTF design features and practices are intended to keep operational exposure to radionuclides and dangerous substances ''as low as reasonably achievable'' (ALARA) and to provide a disposal system that protects the environment for at least 10,000 yr. In some instances, ALARA practices present difficulties when complying with requirements of dangerous waste regulations. This volume contains 14 Appendices. Topics include Engineering Drawings, Maps, Roads, Toxicity Testing, and Pilot-Scale Testing

  1. Practices in the danger culture of late industrial society

    NARCIS (Netherlands)

    Rip, Arie; Motet, Gilles; Bieder, Corinne

    2017-01-01

    The chapter replaces the question of risk control by one about how we handle danger in our societies and realize a measure of safety. Ongoing practices in a framework of ‘danger cultures’ are the key. The case of environmental and health inspection and the intersecting ‘social worlds’ involved, are

  2. Hanford facility dangerous waste permit application, 616 Nonradioactive Dangerous Waste Storage Facility. Revision 2A

    International Nuclear Information System (INIS)

    Bowman, R.C.

    1994-04-01

    This permit application for the 616 Nonradioactive Dangerous Waste Storage Facility consists for 15 chapters. Topics of discussion include the following: facility description and general provisions; waste characteristics; process information; personnel training; reporting and record keeping; and certification

  3. Modelling human behaviours and reactions under dangerous environment

    OpenAIRE

    Kang, J; Wright, D K; Qin, S F; Zhao, Y

    2005-01-01

    This paper describes the framework of a real-time simulation system to model human behavior and reactions in dangerous environments. The system utilizes the latest 3D computer animation techniques, combined with artificial intelligence, robotics and psychology, to model human behavior, reactions and decision making under expected/unexpected dangers in real-time in virtual environments. The development of the system includes: classification on the conscious/subconscious behaviors and reactions...

  4. Differing types of cellular phone conversations and dangerous driving.

    Science.gov (United States)

    Dula, Chris S; Martin, Benjamin A; Fox, Russell T; Leonard, Robin L

    2011-01-01

    This study sought to investigate the relationship between cell phone conversation type and dangerous driving behaviors. It was hypothesized that more emotional phone conversations engaged in while driving would produce greater frequencies of dangerous driving behaviors in a simulated environment than more mundane conversation or no phone conversation at all. Participants were semi-randomly assigned to one of three conditions: (1) no call, (2) mundane call, and, (3) emotional call. While driving in a simulated environment, participants in the experimental groups received a phone call from a research confederate who either engaged them in innocuous conversation (mundane call) or arguing the opposite position of a deeply held belief of the participant (emotional call). Participants in the no call and mundane call groups differed significantly only on percent time spent speeding and center line crossings, though the mundane call group consistently engaged in more of all dangerous driving behaviors than did the no call participants. Participants in the emotional call group engaged in significantly more dangerous driving behaviors than participants in both the no call and mundane call groups, with the exception of traffic light infractions, where there were no significant group differences. Though there is need for replication, the authors concluded that whereas talking on a cell phone while driving is risky to begin with, having emotionally intense conversations is considerably more dangerous. Copyright © 2010 Elsevier Ltd. All rights reserved.

  5. The hidden and informal curriculum across the continuum of training: A cross-sectional qualitative study.

    Science.gov (United States)

    Doja, Asif; Bould, M Dylan; Clarkin, Chantalle; Eady, Kaylee; Sutherland, Stephanie; Writer, Hilary

    2016-04-01

    The hidden and informal curricula refer to learning in response to unarticulated processes and constraints, falling outside the formal medical curriculum. The hidden curriculum has been identified as requiring attention across all levels of learning. We sought to assess the knowledge and perceptions of the hidden and informal curricula across the continuum of learning at a single institution. Focus groups were held with undergraduate and postgraduate learners and faculty to explore knowledge and perceptions relating to the hidden and informal curricula. Thematic analysis was conducted both inductively by research team members and deductively using questions structured by the existing literature. Participants highlighted several themes related to the presence of the hidden and informal curricula in medical training and practice, including: the privileging of some specialties over others; the reinforcement of hierarchies within medicine; and a culture of tolerance towards unprofessional behaviors. Participants acknowledged the importance of role modeling in the development of professional identities and discussed the deterioration in idealism that occurs. Common issues pertaining to the hidden curriculum exist across all levels of learners, including faculty. Increased awareness of these issues could allow for the further development of methods to address learning within the hidden curriculum.

  6. Low scale gravity mediation with warped extra dimension and collider phenomenology on the hidden sector

    International Nuclear Information System (INIS)

    Itoh, Hideo; Okada, Nobuchika; Yamashita, Toshifumi

    2006-01-01

    We propose a scenario of gravity mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model. In our setup, both the visible sector and the hidden sector coexist on the infrared (IR) brane. We introduce the Polonyi model as a simple hidden sector. Because of the warped metric, the effective cutoff scale on the IR brane is 'warped down', so that the gravity mediation occurs at a low scale. As a result, the gravitino is naturally the lightest superpartner (LSP) and contact interactions between the hidden and the visible sector fields become stronger. We address phenomenologies for various IR cutoff scales. In particular, we investigate collider phenomenology involving a scalar field (Polonyi field) in the hidden sector for the case with the IR cutoff around 10 TeV. We find a possibility that the hidden sector scalar can be produced at the LHC and the international linear collider (ILC). Interestingly, the scalar behaves like the Higgs boson of the standard model in the production process, while its decay process is quite different and, once produced, it will provide us with a very clean signature. The hidden sector may be no longer hidden

  7. Waste Encapsulation and Storage Facility (WESF) Dangerous Waste Training Plan (DWTP)

    International Nuclear Information System (INIS)

    SIMMONS, F.M.

    2000-01-01

    This Waste Encapsulation Storage Facility (WESF) Dangerous Waste Training Plan (DWTP) applies to personnel who perform work at, or in support of WESF. The plan, along with the names of personnel, may be given to a regulatory agency inspector upon request. General workers, subcontractors, or visiting personnel who have not been trained in the management of dangerous wastes must be accompanied by an individual who meets the requirements of this training plan. Dangerous waste management includes handling, treatment, storage, and/or disposal of dangerous and/or mixed waste. Dangerous waste management units covered by this plan include: less-than-90-day accumulation area(s); pool cells 1-8 and 12 storage units; and process cells A-G storage units. This training plan describes general requirements, worker categories, and provides course descriptions for operation of the WESF permitted miscellaneous storage units and the Less-than-90-Day Accumulation Areas

  8. In Brief: Hidden environment and health costs of energy

    Science.gov (United States)

    Showstack, Randy

    2009-10-01

    The hidden costs of energy production and use in the United States amounted to an estimated $120 billion in 2005, according to a 19 October report by the U.S. National Research Council. The report, “Hidden Costs of Energy: Unpriced Consequences of Energy Production and Use,” examines hidden costs, including the cost of air pollution damage to human health, which are not reflected in market prices of energy sources, electricity, or gasoline. The report found that in 2005, the total annual external damages from sulfur dioxide, nitrogen oxides, and particulate matter created by coal-burning power plants that produced 95% of the nation's coal-generated electricity were about $62 billion, with nonclimate damages averaging about 3.2 cents for every kilowatt-hour of energy produced. It is estimated that by 2030, nonclimate damages will fall to 1.7 cents per kilowatt-hour. The 2030 figure assumes that new policies already slated for implementation are put in place.

  9. Distinguishing Hidden Markov Chains

    OpenAIRE

    Kiefer, Stefan; Sistla, A. Prasad

    2015-01-01

    Hidden Markov Chains (HMCs) are commonly used mathematical models of probabilistic systems. They are employed in various fields such as speech recognition, signal processing, and biological sequence analysis. We consider the problem of distinguishing two given HMCs based on an observation sequence that one of the HMCs generates. More precisely, given two HMCs and an observation sequence, a distinguishing algorithm is expected to identify the HMC that generates the observation sequence. Two HM...

  10. Coupling of Hidden Sector

    OpenAIRE

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fer\\-mions (``sterinos'') and sterile mediating bosons (``sterons'') of mass dimension 1 (not 2!) --- the last described by an antisymmetric tensor field --- requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, sugge...

  11. Contrast Enhancement in Poor Visibility Conditions Using Guided Filtering

    Directory of Open Access Journals (Sweden)

    D

    2013-06-01

    Full Text Available In this paper, extraction of atmospheric veil is proposed to enhance the contrast of the images captured under poor visibility conditions. The method based on guided filtering can accurately recover hidden edges, maintain structural similarity (SSIM to input image and it is effective for both color and gray level images. The proposed algorithm works without prior information about the scene and its complexity is linear function of the input image size. Experimental comparisons with state of the art algorithms demonstrate that our approach can significantly enhance the contrast and restore the visibility in fine details.

  12. Herbal medications and plastic surgery: a hidden danger.

    Science.gov (United States)

    Mohan, Arvind; Lahiri, Anindya

    2014-04-01

    Herbal medicine is a multibillion-pound industry, and surveys suggest that ~10% of the UK population uses herbal supplements concurrently with prescription medications. Patients and health care practitioners are often unaware of the adverse side effects of herbal medicines. In addition, because many of these herbal supplements are available over the counter, many patients do not disclose these when listing medications to health care providers. A 39-year-old nurse underwent an abdominoplasty with rectus sheath plication after weight loss surgery. Postoperatively, she experienced persistent drain output, and after discharge, a seroma developed requiring repeated drainage in the clinic. After scar revision 10 months later, the woman bled postoperatively, requiring suturing. Again, a seroma developed, requiring repeated drainage. It was discovered that the patient had been taking a herbal menopause supplement containing ingredients known to have anticoagulant effects. Complementary medicine is rarely taught in UK medical schools and generally not practiced in UK hospitals. Many supplements are known to have anticoagulant, cardiovascular, and sedative effects. Worryingly, questions about herbal medicines are not routinely asked in clinics, and patients do not often volunteer such information. With the number and awareness of complementary medications increasing, their usage among the population is likely to increase. The authors recommend specific questioning about the use of complementary medications and consideration of ceasing such medications before surgery. Level of Evidence V This journal requires that authors assign a level of evidence to each article. For a full description of these Evidence-Based Medicine ratings, please refer to the Table of Contents or the online Instructions to Authors www.springer.com/00266 .

  13. The hidden dangers of experimenting in distributed AI

    NARCIS (Netherlands)

    Meyer, A.P.; Smit, A.; Kempen, M.; Wijngaards, N.

    2006-01-01

    Research on multi-agent systems often involves experiments, also in situations where humans interact with agents. Consequently, the field of experimental (human) sciences becomes more and more relevant. This paper clarifies how things can and often do go wrong in distributed AI experiments. We show

  14. Constructing mental illness as dangerous: a pilot study.

    Science.gov (United States)

    Wilson, C; Nairn, R; Coverdale, J; Panapa, A

    1999-04-01

    There is a dearth of studies examining how dangerousness is constructed in media depictions of mentally ill individuals who are frequently portrayed as acting violently. The aim of the present study was to identify the contribution of diverse technical, semiotic and discursive resources utilised in portraying a character with a mental illness in a prime-time drama as dangerous. Discourse analytic techniques, involving systematic, repeated, critical viewings, were applied to a single program drawn from a sample of prime-time television drama episodes touching on mental illness. Nine devices (appearance, music and sound effects, lighting, language, intercutting, jump-cutting, point of view shots, horror conventions and intertextuality) were identified as contributing to the signified dangerousness of person receiving care in the community for a mental illness. These techniques combine in signifying mental illness and a person suffering from it as dangerous. The findings suggest that mental health professionals working to reduce the stigma of mental illness need to have a reasonably sophisticated understanding of the practices and priorities of television production if they are to collaborate effectively with producers to create dramas that convey more human and sympathetic understandings of mental illness or to combat the negative effects of such portrayals.

  15. The sounds of safety: stress and danger in music perception.

    Science.gov (United States)

    Schäfer, Thomas; Huron, David; Shanahan, Daniel; Sedlmeier, Peter

    2015-01-01

    As with any sensory input, music might be expected to incorporate the processing of information about the safety of the environment. Little research has been done on how such processing has evolved and how different kinds of sounds may affect the experience of certain environments. In this article, we investigate if music, as a form of auditory information, can trigger the experience of safety. We hypothesized that (1) there should be an optimal, subjectively preferred degree of information density of musical sounds, at which safety-related information can be processed optimally; (2) any deviation from the optimum, that is, both higher and lower levels of information density, should elicit experiences of higher stress and danger; and (3) in general, sonic scenarios with music should reduce experiences of stress and danger more than other scenarios. In Experiment 1, the information density of short music-like rhythmic stimuli was manipulated via their tempo. In an initial session, listeners adjusted the tempo of the stimuli to what they deemed an appropriate tempo. In an ensuing session, the same listeners judged their experienced stress and danger in response to the same stimuli, as well as stimuli exhibiting tempo variants. Results are consistent with the existence of an optimum information density for a given rhythm; the preferred tempo decreased for increasingly complex rhythms. The hypothesis that any deviation from the optimum would lead to experiences of higher stress and danger was only partly fit by the data. In Experiment 2, listeners should indicate their experience of stress and danger in response to different sonic scenarios: music, natural sounds, and silence. As expected, the music scenarios were associated with lowest stress and danger whereas both natural sounds and silence resulted in higher stress and danger. Overall, the results largely fit the hypothesis that music seemingly carries safety-related information about the environment.

  16. Co-existing hidden attractors in a radio-physical oscillator system

    DEFF Research Database (Denmark)

    Kuznetsov, A. P.; Kuznetsov, S. P.; Mosekilde, Erik

    2015-01-01

    The term `hidden attractor' relates to a stable periodic, quasiperiodic or chaotic state whose basin of attraction does not overlap with the neighborhood of an unstable equilibrium point. Considering a three-dimensional oscillator system that does not allow for the existence of an equilibrium point...... frequency, describe the bifurcations through which hidden attractors of different type arise and disappear, and illustrate the form of the basins of attraction....

  17. A two particle hidden sector and the oscillations with photons

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Pedro D. [Universidad de Antofagasta, Departamento de Fisica, Antofagasta (Chile); Arias, Paola; Maldonado, Carlos [Universidad de Santiago de Chile, Departmento de Fisica, Santiago (Chile)

    2018-01-15

    We present a detailed study of the oscillations and optical properties for vacuum, in a model for the dark sector that contains axion-like particles and hidden photons. We provide bounds for the couplings versus the mass, using current results from ALPS-I and PVLAS. We also discuss the challenges for the detection of models with more than one hidden particle in light shining trough wall-like experiments. (orig.)

  18. DMPD: Macrophage activation by endogenous danger signals. [Dynamic Macrophage Pathway CSML Database

    Lifescience Database Archive (English)

    Full Text Available 18161744 Macrophage activation by endogenous danger signals. Zhang X, Mosser DM. J ...Pathol. 2008 Jan;214(2):161-78. (.png) (.svg) (.html) (.csml) Show Macrophage activation by endogenous dange...r signals. PubmedID 18161744 Title Macrophage activation by endogenous danger signals. Authors Zhang X, Moss

  19. Optimal no-go theorem on hidden-variable predictions of effect expectations

    Science.gov (United States)

    Blass, Andreas; Gurevich, Yuri

    2018-03-01

    No-go theorems prove that, under reasonable assumptions, classical hidden-variable theories cannot reproduce the predictions of quantum mechanics. Traditional no-go theorems proved that hidden-variable theories cannot predict correctly the values of observables. Recent expectation no-go theorems prove that hidden-variable theories cannot predict the expectations of observables. We prove the strongest expectation-focused no-go theorem to date. It is optimal in the sense that the natural weakenings of the assumptions and the natural strengthenings of the conclusion make the theorem fail. The literature on expectation no-go theorems strongly suggests that the expectation-focused approach is more general than the value-focused one. We establish that the expectation approach is not more general.

  20. Knots and surfaces a guide to discovering mathematics

    CERN Document Server

    Farmer, David W

    1995-01-01

    In most mathematics textbooks, the most exciting part of mathematics-the process of invention and discovery-is completely hidden from the reader. The aim of Knots and Surfaces is to change all that. By means of a series of carefully selected tasks, this book leads readers to discover some real mathematics. There are no formulas to memorize; no procedures to follow. The book is a guide: its job is to start you in the right direction and to bring you back if you stray too far. Discovery is left to you. Suitable for a one-semester course at the beginning undergraduate level, there are no prerequi

  1. Raising awareness of the hidden curriculum in veterinary medical education: a review and call for research.

    Science.gov (United States)

    Whitcomb, Tiffany L

    2014-01-01

    The hidden curriculum is characterized by information that is tacitly conveyed to and among students about the cultural and moral environment in which they find themselves. Although the hidden curriculum is often defined as a distinct entity, tacit information is conveyed to students throughout all aspects of formal and informal curricula. This unconsciously communicated knowledge has been identified across a wide spectrum of educational environments and is known to have lasting and powerful impacts, both positive and negative. Recently, medical education research on the hidden curriculum of becoming a doctor has come to the forefront as institutions struggle with inconsistencies between formal and hidden curricula that hinder the practice of patient-centered medicine. Similarly, the complex ethical questions that arise during the practice and teaching of veterinary medicine have the potential to cause disagreement between what the institution sets out to teach and what is actually learned. However, the hidden curriculum remains largely unexplored for this field. Because the hidden curriculum is retained effectively by students, elucidating its underlying messages can be a key component of program refinement. A review of recent literature about the hidden curriculum in a variety of fields, including medical education, will be used to explore potential hidden curricula in veterinary medicine and draw attention to the need for further investigation.

  2. Nonparametric model validations for hidden Markov models with applications in financial econometrics.

    Science.gov (United States)

    Zhao, Zhibiao

    2011-06-01

    We address the nonparametric model validation problem for hidden Markov models with partially observable variables and hidden states. We achieve this goal by constructing a nonparametric simultaneous confidence envelope for transition density function of the observable variables and checking whether the parametric density estimate is contained within such an envelope. Our specification test procedure is motivated by a functional connection between the transition density of the observable variables and the Markov transition kernel of the hidden states. Our approach is applicable for continuous time diffusion models, stochastic volatility models, nonlinear time series models, and models with market microstructure noise.

  3. The Consensus String Problem and the Complexity of Comparing Hidden Markov Models

    DEFF Research Database (Denmark)

    Lyngsø, Rune Bang; Pedersen, Christian Nørgaard Storm

    2002-01-01

    The basic theory of hidden Markov models was developed and applied to problems in speech recognition in the late 1960s, and has since then been applied to numerous problems, e.g. biological sequence analysis. Most applications of hidden Markov models are based on efficient algorithms for computing......-norms. We discuss the applicability of the technique used for proving the hardness of comparing two hidden Markov models under the L1-norm to other measures of distance between probability distributions. In particular, we show that it cannot be used for proving NP-hardness of determining the Kullback...

  4. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De......_different are integrated. We experimentally validate our approach on the biologically motivated problem of global pairwise alignment.......A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference...

  5. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  6. Hidden and generalized conformal symmetry of Kerr–Sen spacetimes

    International Nuclear Information System (INIS)

    Ghezelbash, A M; Siahaan, H M

    2013-01-01

    It is recently conjectured that generic non-extremal Kerr black hole could be holographically dual to a hidden conformal field theory (CFT) in two dimensions. Moreover, it is known that there are two CFT duals (pictures) to describe the charged rotating black holes which correspond to angular momentum J and electric charge Q of the black hole. Furthermore these two pictures can be incorporated by the CFT duals (general picture) that are generated by SL(2,Z) modular group. The general conformal structure can be revealed by looking at charged scalar wave equation in some appropriate values of frequency and charge. In this regard, we consider the wave equation of a charged massless scalar field in the background of Kerr–Sen black hole and show that in the ‘near region’, the wave equation can be reproduced by the Casimir operator of a local SL(2,R) L ×SL(2,R) R hidden conformal symmetry. We find the exact agreement between macroscopic and microscopic physical quantities like entropy and absorption cross section of scalars for Kerr–Sen black hole. We then find an extension of vector fields that in turn yields an extended local family of SL(2,R) L ×SL(2,R) R hidden conformal symmetry, parameterized by one parameter. For some special values of the parameter, we find a copy of SL(2,R) hidden conformal algebra for the charged Gibbons–Maeda–Garfinkle–Horowitz–Strominger black hole in the strong deflection limit. (paper)

  7. Hidden solution to the μ/Bμ problem in gauge mediation

    International Nuclear Information System (INIS)

    Roy, Tuhin S.; Schmaltz, Martin

    2008-01-01

    We propose a solution to the μ/B μ problem in gauge mediation. The novel feature of our solution is that it uses dynamics of the hidden sector, which is often present in models with dynamical supersymmetry breaking. We give an explicit example model of gauge mediation where a very simple messenger sector generates both μ and B μ at one loop. The usual problem, that B μ is then too large, is solved by strong renormalization effects from the hidden sector which suppress B μ relative to μ. Our mechanism relies on an assumption about the signs of certain incalculable anomalous dimensions in the hidden sector. Making these assumptions not only allows us to solve the μ/B μ problem but also leads to a characteristic superpartner spectrum which would be a smoking gun signal for our mechanism.

  8. Multitask TSK fuzzy system modeling by mining intertask common hidden structure.

    Science.gov (United States)

    Jiang, Yizhang; Chung, Fu-Lai; Ishibuchi, Hisao; Deng, Zhaohong; Wang, Shitong

    2015-03-01

    The classical fuzzy system modeling methods implicitly assume data generated from a single task, which is essentially not in accordance with many practical scenarios where data can be acquired from the perspective of multiple tasks. Although one can build an individual fuzzy system model for each task, the result indeed tells us that the individual modeling approach will get poor generalization ability due to ignoring the intertask hidden correlation. In order to circumvent this shortcoming, we consider a general framework for preserving the independent information among different tasks and mining hidden correlation information among all tasks in multitask fuzzy modeling. In this framework, a low-dimensional subspace (structure) is assumed to be shared among all tasks and hence be the hidden correlation information among all tasks. Under this framework, a multitask Takagi-Sugeno-Kang (TSK) fuzzy system model called MTCS-TSK-FS (TSK-FS for multiple tasks with common hidden structure), based on the classical L2-norm TSK fuzzy system, is proposed in this paper. The proposed model can not only take advantage of independent sample information from the original space for each task, but also effectively use the intertask common hidden structure among multiple tasks to enhance the generalization performance of the built fuzzy systems. Experiments on synthetic and real-world datasets demonstrate the applicability and distinctive performance of the proposed multitask fuzzy system model in multitask regression learning scenarios.

  9. Hidden Costs of Hospital Based Delivery from Two Tertiary Hospitals in Western Nepal.

    Directory of Open Access Journals (Sweden)

    Jeevan Acharya

    Full Text Available Hospital based delivery has been an expensive experience for poor households because of hidden costs which are usually unaccounted in hospital costs. The main aim of this study was to estimate the hidden costs of hospital based delivery and determine the factors associated with the hidden costs.A hospital based cross-sectional study was conducted among 384 post-partum mothers with their husbands/house heads during the discharge time in Manipal Teaching Hospital and Western Regional Hospital, Pokhara, Nepal. A face to face interview with each respondent was conducted using a structured questionnaire. Hidden costs were calculated based on the price rate of the market during the time of the study.The total hidden costs for normal delivery and C-section delivery were 243.4 USD (US Dollar and 321.6 USD respectively. Of the total maternity care expenditures; higher mean expenditures were found for food & drinking (53.07%, clothes (9.8% and transport (7.3%. For postpartum women with their husband or house head, the total mean opportunity cost of "days of work loss" were 84.1 USD and 81.9 USD for normal delivery and C-section respectively. Factors such as literate mother (p = 0.007, employed house head (p = 0.011, monthly family income more than 25,000 NRs (Nepalese Rupees (p = 0.014, private hospital as a place of delivery (p = 0.0001, C-section as a mode of delivery (p = 0.0001, longer duration (>5days of stay in hospital (p = 0.0001, longer distance (>15km from house to hospital (p = 0.0001 and longer travel time (>240 minutes from house to hospital (p = 0.007 showed a significant association with the higher hidden costs (>25000 NRs.Experiences of hidden costs on hospital based delivery and opportunity costs of days of work loss were found high. Several socio-demographic factors, delivery related factors (place and mode of delivery, length of stay, distance from hospital and travel time were associated with hidden costs. Hidden costs can be a

  10. Hidden Costs of Hospital Based Delivery from Two Tertiary Hospitals in Western Nepal.

    Science.gov (United States)

    Acharya, Jeevan; Kaehler, Nils; Marahatta, Sujan Babu; Mishra, Shiva Raj; Subedi, Sudarshan; Adhikari, Bipin

    2016-01-01

    Hospital based delivery has been an expensive experience for poor households because of hidden costs which are usually unaccounted in hospital costs. The main aim of this study was to estimate the hidden costs of hospital based delivery and determine the factors associated with the hidden costs. A hospital based cross-sectional study was conducted among 384 post-partum mothers with their husbands/house heads during the discharge time in Manipal Teaching Hospital and Western Regional Hospital, Pokhara, Nepal. A face to face interview with each respondent was conducted using a structured questionnaire. Hidden costs were calculated based on the price rate of the market during the time of the study. The total hidden costs for normal delivery and C-section delivery were 243.4 USD (US Dollar) and 321.6 USD respectively. Of the total maternity care expenditures; higher mean expenditures were found for food & drinking (53.07%), clothes (9.8%) and transport (7.3%). For postpartum women with their husband or house head, the total mean opportunity cost of "days of work loss" were 84.1 USD and 81.9 USD for normal delivery and C-section respectively. Factors such as literate mother (p = 0.007), employed house head (p = 0.011), monthly family income more than 25,000 NRs (Nepalese Rupees) (p = 0.014), private hospital as a place of delivery (p = 0.0001), C-section as a mode of delivery (p = 0.0001), longer duration (>5days) of stay in hospital (p = 0.0001), longer distance (>15km) from house to hospital (p = 0.0001) and longer travel time (>240 minutes) from house to hospital (p = 0.007) showed a significant association with the higher hidden costs (>25000 NRs). Experiences of hidden costs on hospital based delivery and opportunity costs of days of work loss were found high. Several socio-demographic factors, delivery related factors (place and mode of delivery, length of stay, distance from hospital and travel time) were associated with hidden costs. Hidden costs can be a

  11. Hidden-sector Spectroscopy with Gravitational Waves from Binary Neutron Stars

    Science.gov (United States)

    Croon, Djuna; Nelson, Ann E.; Sun, Chen; Walker, Devin G. E.; Xianyu, Zhong-Zhi

    2018-05-01

    We show that neutron star (NS) binaries can be ideal laboratories to probe hidden sectors with a long-range force. In particular, it is possible for gravitational wave (GW) detectors such as LIGO and Virgo to resolve the correction of waveforms from ultralight dark gauge bosons coupled to NSs. We observe that the interaction of the hidden sector affects both the GW frequency and amplitude in a way that cannot be fitted by pure gravity.

  12. A Hidden Twelve-Dimensional SuperPoincare Symmetry In Eleven Dimensions

    Energy Technology Data Exchange (ETDEWEB)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2003-12-13

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional superPoincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven dimensional superparticle, taken off-shell, we discover a hidden twelve dimensional superPoincare symmetry that governs the theory.

  13. Hidden Neural Networks: A Framework for HMM/NN Hybrids

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric; Krogh, Anders Stærmose

    1997-01-01

    This paper presents a general framework for hybrids of hidden Markov models (HMM) and neural networks (NN). In the new framework called hidden neural networks (HNN) the usual HMM probability parameters are replaced by neural network outputs. To ensure a probabilistic interpretation the HNN is nor...... HMMs on TIMIT continuous speech recognition benchmarks. On the task of recognizing five broad phoneme classes an accuracy of 84% is obtained compared to 76% for a standard HMM. Additionally, we report a preliminary result of 69% accuracy on the TIMIT 39 phoneme task...

  14. The Economic Side Effects of Dangerous Drug Announcements.

    OpenAIRE

    Dranove, David; Olsen, Chris

    1994-01-01

    Immediately prior to the passage of the 1962 Food and Drug Administration Amendments, there were a number of drugs recalled from markets worldwide. Announcements about the dangerous side effects of these drugs were associated with lower-share prices for their manufacturers and the industry as a whole. We perform several analyses to sort out alternative explanations for the observed declines. We find that dangerous drug announcements had no effect on the sales of other drugs and didn't affect ...

  15. Hidden costs, value lost: uninsurance in America

    National Research Council Canada - National Science Library

    Committee on the Consequences of Uninsurance

    2003-01-01

    Hidden Cost, Value Lost , the fifth of a series of six books on the consequences of uninsurance in the United States, illustrates some of the economic and social losses to the country of maintaining...

  16. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover com...

  17. IMPROVING METHODOLOGY OF RISK IDENTIFICATION OF OCCUPATIONAL DANGEROUS

    Directory of Open Access Journals (Sweden)

    A. P. BOCHKOVSKYI

    2018-04-01

    Full Text Available In the paper, according to the analysis of statistical data, correlation between the amount of occupational injuries and occupationaldiseases in Ukraine within last 5 years is defined. Also, using methodology of the International Labor Organizationcorrelcation between the amount of accident fatalities and general number of accidents in Ukraine and EU countries (Austria, GreatBritain, Germany, Denmark, Norway, Poland, Hungry, Finland, France is defined. It is shown that in spite of the positive dynamicsof decreasing amount of occupational injuries, the number of occupational diseases in Ukraine always increases. The comparativeanalysis of the ratio of the number of accident fatalities to the total number of registered accidents showed that, on average, Ukraineexceeds the EU countries by this indicator by 100 times.It is noted, that such negative indicators (in particular, increasing amount of occupational diseases, may occure because ofimperfect methodology for identifying the risks of professional dangerous.Also, it is ascertained that basing on the existed methodology, the identefication process of occupational dangerous isquite subjective, which reduces objectivity of conducting quantitative assessment. In order to eliminate defined drawnbacks it is firsttime proposed to use corresponding integral criterion to conduct the process of quantitative risk assessmentTo solve this problem authors formulate and propose an algorithm of improving methodology of a process of analysing dangerousand harmful production effects (DHPE which are the mainest reasons of occupational dangerous.The proposed algorithm includes implementation of four following successive steps: DHPE identification, indication of theirmaximum allowed threshold of concentrations (levels, identification of the sources of identified DHPE, esimation of consequencesof manifestation.The improved proposed methodology allows indentify risks of occurrence occupational dangerous in systems

  18. Personal security a guide for international travelers

    CERN Document Server

    Spencer, Tanya

    2013-01-01

    Personal Security: A Guide for International Travelers provides the perfect mix of lessons-learned, tools, and recommendations from experts so that readers can personalize their own approach to managing travel risks. If followed, the information provided will allow readers to get out and experience the local culture while still traveling safely.-Bernie Sullivan, Director Global Security, Hanesbrands Inc....a must-have for any traveler. Having worked in South and Southeast Asia, I know the advice provided in the book holds the key to keeping safe, avoiding dangerous situations, and managing threats when they occur. The book's methodological framework, combined with the author's extensive experience and hands-on knowledge, provide very practical and useful advice.-Kathrine Alexandrowiz, Independent consultant at Kathalyst, former coordinator for the "Regional Risk Management Project for NGOs in Asia Pacific" (ECHO)... a go-to guide for all travelers irrespective of mission or purpose. An excellent piece of work...

  19. The hidden costs of self-management services in the accounting activity of a company

    Directory of Open Access Journals (Sweden)

    Dan Ioan TOPOR

    2017-05-01

    Full Text Available This article addresses relevant aspects regarding the hidden costs of self-management services in the accounting area, within the accounting department of a company. With this aim, the authors conducted a study using a questionnaire, whose results were analyzed and interpreted. The hidden costs of the self-management of business accounting services observed in the accounting department of the company have been assessed and the causes of their generating sources were identified and analyzed. The debate of these hidden costs involved the treating of notions that exist in the accounting language, but are still not sufficiently explored by the specialists in the area. We also presented and analyzed the causes of the hidden costs of self-management in the accounting activity, as well as a reporting document for failures, arising from the case study. The article ends with the authors' conclusions regarding the hidden costs of self-management services in the accounting area.

  20. The dangers of sports journalism

    DEFF Research Database (Denmark)

    Sparre, Kirsten

    2017-01-01

    According to The Committee to Protect Journalists, 2 per cent of all journalists killed since 1992 worked on the sports beat. However, at present there is little understanding of the specific dangers faced by sports journalists. This chapter presents findings from exploratory research on 78 repor...

  1. Hidden Costs and the Role of Modularity

    DEFF Research Database (Denmark)

    Larsen, Marcus M.

    2013-01-01

    that the inability to effectively estimate the costs of implementing an activity in a foreign location has a negative impact on the process performance of that activity. Performance is deterred as operations are likely to be disrupted by opportunity costs and managerial responses. However, this relationship......This paper addresses estimation errors in strategic decision-making processes due to hidden costs. While previous research has investigated the antecedents of hidden costs, this paper investigates performance consequences. Using unique data on 221 offshoring implementations, it is argued...... is mitigated by the degree of modularity in the activity as it reduces the need for costly coordination in offshoring. This paper contributes to research on offshoring and strategic decision-making by emphasizing the importance of organizational design and of estimating the costs of internal organizational...

  2. Feeding-Danger Trade-Offs Underlie Stopover Site Selection by Migrants

    Directory of Open Access Journals (Sweden)

    Andrea C. Pomeroy

    2008-06-01

    Full Text Available To migrate successfully, birds need to store adequate fat reserves to fuel each leg of the journey. Migrants acquire their fuel reserves at stopover sites; this often entails exposure to predators. Therefore, the safety attributes of sites may be as important as the feeding opportunities. Furthermore, site choice might depend on fuel load, with lean birds more willing to accept danger to obtain good feeding. Here, we evaluate the factors underlying stopover-site usage by migrant Western Sandpipers (Calidris mauri on a landscape scale. We measured the food and danger attributes of 17 potential stopover sites in the Strait of Georgia and Puget Sound region. We used logistic regression models to test whether food, safety, or both were best able to predict usage of these sites by Western Sandpipers. Eight of the 17 sites were used by sandpipers on migration. Generally, sites that were high in food and safety were used, whereas sites that were low in food and safety were not. However, dangerous sites were used if there was ample food abundance, and sites with low food abundance were used if they were safe. The model including both food and safety best-predicted site usage by sandpipers. Furthermore, lean sandpipers used the most dangerous sites, whereas heavier birds (which do not need to risk feeding in dangerous locations used safer sites. This study demonstrates that both food and danger attributes are considered by migrant birds when selecting stopover sites, thus both these attributes should be considered to prioritize and manage stopover sites for conservation.

  3. 33 CFR 334.720 - Gulf of Mexico, south from Choctawhatchee Bay; guided missiles test operations area, Headquarters...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Gulf of Mexico, south from..., DEPARTMENT OF THE ARMY, DEPARTMENT OF DEFENSE DANGER ZONE AND RESTRICTED AREA REGULATIONS § 334.720 Gulf of Mexico, south from Choctawhatchee Bay; guided missiles test operations area, Headquarters Air Proving...

  4. Segmentation of laser range radar images using hidden Markov field models

    International Nuclear Information System (INIS)

    Pucar, P.

    1993-01-01

    Segmentation of images in the context of model based stochastic techniques is connected with high, very often unpracticle computational complexity. The objective with this thesis is to take the models used in model based image processing, simplify and use them in suboptimal, but not computationally demanding algorithms. Algorithms that are essentially one-dimensional, and their extensions to two dimensions are given. The model used in this thesis is the well known hidden Markov model. Estimation of the number of hidden states from observed data is a problem that is addressed. The state order estimation problem is of general interest and is not specifically connected to image processing. An investigation of three state order estimation techniques for hidden Markov models is given. 76 refs

  5. Regulations concerning marine transport and storage of dangerous things (abridged)

    International Nuclear Information System (INIS)

    1981-01-01

    When the dangerous things of different classes or items are loaded on a same ship, they shall be separated mutually according to the specified standards. Containers shall be cleaned well before loading dangerous things. When there is the danger of heating, gasification, corrosion and other critical physical or chemical processes by the mutual action of the dangerous things of different items or dangerous things and other goods, they must not be loaded in a same container. Basic terms are defined, such as radioactive transported goods, fissile transported goods and exclusive loading. Radioactive transported goods are classified into types of L, A, BM and BU, and fissile transported goods into 3 kinds. Each type of these goods is defined in size and radioactivity. When the makers of radioactive transported goods pack radioactive materials into the transported goods of type BM or BU, they shall get before shipment the confirmation of the Minister of Transport concerning the standard to which these goods conform. The maximum radiation dose rate must not exceed 200 milli-rem an hour on the surface and 10 milli-rem an hour at the distance of 1 meter from the surfaces of containers loaded with radioactive transported goods. Signs, the limit of shipment and other related matters are prescribed in detail. (Okada, K.)

  6. Regulations concerning marine transport and storage of dangerous things (abridged)

    International Nuclear Information System (INIS)

    1985-01-01

    When the dangerous things of different classes or items are loaded on a same ship, they shall be separated mutually according to the specified standards. Containers shall be cleaned well before loading dangerous things. When there is the danger of heating, gasification, corrosion and other critical physical or chemical processes by the mutual action of the dangerous things of different items or dangerous things and other goods, they must not be loaded in a same container. Basic terms are defined, such as radioactive transported goods, fissile transported goods and exclusive loading. Radioactive transported goods are classified into types of L, A, BM and BU, and fissile transported goods into 3 kinds. Each type of these goods is defined in size and radioactivity. When the makers of radioactive transported goods pack radioactive materials into the transported goods of type BM or BU, they shall get before shipment the confirmation of the Minister of Transport concerning the standard to which these goods conform. The maximum radiation dose rate must not exceed 200 milli-rem an hour on the surface and 10 milli-rem an hour at the distance of 1 meter from the surfaces of containers loaded with radioactive transported goods. Signs, the limit of shipment and other related matters are prescribed in detail. (Kubozono, M.)

  7. Hidden Markov models for labeled sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1994-01-01

    A hidden Markov model for labeled observations, called a class HMM, is introduced and a maximum likelihood method is developed for estimating the parameters of the model. Instead of training it to model the statistics of the training sequences it is trained to optimize recognition. It resembles MMI...

  8. Hidden costs of nuclear power

    International Nuclear Information System (INIS)

    England, R.W.

    1979-01-01

    Mr. England contends that these hidden costs add up to a figure much higher than those that appear in the electric utilities' profit and loss account - costs that are borne by Federal taxpayers, by nuclear industry workers, and by all those people who must share their environment with nuclear facilities. Costs he details are additional deaths and illnesses resulting from exposure to radiation, and the use of tax dollars to clean up the lethal garbage produced by those activities. He asserts that careless handling of uranium ore and mill tailings in past years has apparently resulted in serious public health problems in those mining communities. In another example, Mr. England states that the failure to isolate uranium tailings physically from their environment has probably contributed to an acute leukemia rate in Mesa County, Colorado. He mentions much of the technology development for power reactors being done by the Federal government, not by private reactor manufacturers - thus, again, hidden costs that do not show up in electric bills of customers. The back end of the nuclear fuel cycle as a place for Federally subsidized research and development is discussed briefly. 1 figure, 2 tables

  9. Multivariate longitudinal data analysis with mixed effects hidden Markov models.

    Science.gov (United States)

    Raffa, Jesse D; Dubin, Joel A

    2015-09-01

    Multiple longitudinal responses are often collected as a means to capture relevant features of the true outcome of interest, which is often hidden and not directly measurable. We outline an approach which models these multivariate longitudinal responses as generated from a hidden disease process. We propose a class of models which uses a hidden Markov model with separate but correlated random effects between multiple longitudinal responses. This approach was motivated by a smoking cessation clinical trial, where a bivariate longitudinal response involving both a continuous and a binomial response was collected for each participant to monitor smoking behavior. A Bayesian method using Markov chain Monte Carlo is used. Comparison of separate univariate response models to the bivariate response models was undertaken. Our methods are demonstrated on the smoking cessation clinical trial dataset, and properties of our approach are examined through extensive simulation studies. © 2015, The International Biometric Society.

  10. Limits of performance for the model reduction problem of hidden Markov models

    KAUST Repository

    Kotsalis, Georgios

    2015-12-15

    We introduce system theoretic notions of a Hankel operator, and Hankel norm for hidden Markov models. We show how the related Hankel singular values provide lower bounds on the norm of the difference between a hidden Markov model of order n and any lower order approximant of order n̂ < n.

  11. Limits of performance for the model reduction problem of hidden Markov models

    KAUST Repository

    Kotsalis, Georgios; Shamma, Jeff S.

    2015-01-01

    We introduce system theoretic notions of a Hankel operator, and Hankel norm for hidden Markov models. We show how the related Hankel singular values provide lower bounds on the norm of the difference between a hidden Markov model of order n and any lower order approximant of order n̂ < n.

  12. Regulations concerning marine transport and storage of dangerous things (abridged)

    International Nuclear Information System (INIS)

    1987-01-01

    This report shows the Ordinances No.84 (1967) and No.30 (1957) of the Ministry of transport. The Ordinance No.84 has been published in detail elsewhere. The provisions concerning shipping transport and storage of dangerous substances deal with isolation of each dangerous substance, method for loading (cleaning of container, etc.), certificate for ship for transporting dangerous substances, renewal of certificate for ship for transporting dangerous substances, return of certificate, fee (for renewal and reissue of certificate), definition of terms, type of radioactive cargo (L-type cargo, A-type cargo, BM-type cargo, BU type cargo), transport of radioactive substances, type of fissionable cargo (Type I, Type II and Type III), confirmation of safety concerning radioactive cargo (conformity to standards, inspection, approval, etc.), limit of cargo volume, transport index, marking (type of cargo), confirmation of safety of transport, inspection of contamination, notice of transport, special measures, inspection of cargo (radioactive substances), requirements for container and package, etc. (Nogami, K.)

  13. Top-down contextual knowledge guides visual attention in infancy.

    Science.gov (United States)

    Tummeltshammer, Kristen; Amso, Dima

    2017-10-26

    The visual context in which an object or face resides can provide useful top-down information for guiding attention orienting, object recognition, and visual search. Although infants have demonstrated sensitivity to covariation in spatial arrays, it is presently unclear whether they can use rapidly acquired contextual knowledge to guide attention during visual search. In this eye-tracking experiment, 6- and 10-month-old infants searched for a target face hidden among colorful distracter shapes. Targets appeared in Old or New visual contexts, depending on whether the visual search arrays (defined by the spatial configuration, shape and color of component items in the search display) were repeated or newly generated throughout the experiment. Targets in Old contexts appeared in the same location within the same configuration, such that context covaried with target location. Both 6- and 10-month-olds successfully distinguished between Old and New contexts, exhibiting faster search times, fewer looks at distracters, and more anticipation of targets when contexts repeated. This initial demonstration of contextual cueing effects in infants indicates that they can use top-down information to facilitate orienting during memory-guided visual search. © 2017 John Wiley & Sons Ltd.

  14. Co-Evolution of Social Learning and Evolutionary Preparedness in Dangerous Environments.

    Science.gov (United States)

    Lindström, Björn; Selbing, Ida; Olsson, Andreas

    2016-01-01

    Danger is a fundamental aspect of the lives of most animals. Adaptive behavior therefore requires avoiding actions, objects, and environments associated with danger. Previous research has shown that humans and non-human animals can avoid such dangers through two types of behavioral adaptions, (i) genetic preparedness to avoid certain stimuli or actions, and (ii) social learning. These adaptive mechanisms reduce the fitness costs associated with danger but still allow flexible behavior. Despite the empirical prevalence and importance of both these mechanisms, it is unclear when they evolve and how they interact. We used evolutionary agent-based simulations, incorporating empirically based learning mechanisms, to clarify if preparedness and social learning typically both evolve in dangerous environments, and if these mechanisms generally interact synergistically or antagonistically. Our simulations showed that preparedness and social learning often co-evolve because they provide complimentary benefits: genetic preparedness reduced foraging efficiency, but resulted in a higher rate of survival in dangerous environments, while social learning generally came to dominate the population, especially when the environment was stochastic. However, even in this case, genetic preparedness reliably evolved. Broadly, our results indicate that the relationship between preparedness and social learning is important as it can result in trade-offs between behavioral flexibility and safety, which can lead to seemingly suboptimal behavior if the evolutionary environment of the organism is not taken into account.

  15. Hidden Valley Higgs Decays in the ATLAS detector

    CERN Document Server

    Ciapetti, G

    2009-01-01

    A number of extensions of the Standard Model result in particles that are neutral, weakly-coupled and have macroscopic decay lengths that can be comparable with LHC detector dimensions. These particles represent, from an experimental point of view, a challenge both for the trigger and for the reconstruction capabilities of the ATLAS apparatus. For the purpose of exploring the challenges to the trigger posed by long-lived particles, the Hidden Valley scenario serves as an excellent setting. In this note we present the results of a first study of ATLAS detector performance for some Hidden Valley processes with long-lived, neutral states that decay throughout the detector volume to multi heavy-flavor jets, mainly b-bbar.

  16. The hidden epidemic: confronting sexually transmitted diseases

    National Research Council Canada - National Science Library

    Eng, Thomas R; Butler, William T

    .... In addition, STDs increase the risk of HIV transmission. The Hidden Epidemic examines the scope of sexually transmitted infections in the United States and provides a critical assessment of the nation's response to this public health crisis...

  17. Dimensional reduction in field theory and hidden symmetries in extended supergravity

    International Nuclear Information System (INIS)

    Kremmer, E.

    1985-01-01

    Dimensional reduction in field theories is discussed both in theories which do not include gravity and in gravity theories. In particular, 11-dimensional supergravity and its reduction to 4 dimensions is considered. Hidden symmetries of supergravity with N=8 in 4 dimensions, global E 7 and local SU(8)-invariances in particular are detected. The hidden symmmetries permit to interpret geometrically the scalar fields

  18. Regional scales of fire danger rating in the forest: improved technique

    Directory of Open Access Journals (Sweden)

    A. V. Volokitina

    2017-04-01

    Full Text Available Wildland fires distribute unevenly in time and over area under the influence of weather and other factors. It is unfeasible to air patrol the whole forest area daily during a fire season as well as to keep all fire suppression forces constantly alert. Daily work and preparedness of forest fire protection services is regulated by the level of fire danger according to weather conditions (Nesterov’s index. PV-1 index, fire hazard class (Melekhov’s scale, regional scales (earlier called local scales. Unfortunately, there is still no unified comparable technique of making regional scales. As a result, it is difficult to maneuver forest fire protection resources, since the techniques currently used are not approved and not tested for their performance. They give fire danger rating incomparable even for neighboring regions. The paper analyzes the state-of-the-art in Russia and abroad. It is stated the irony is that with factors of fire danger measured quantitatively, the fire danger itself as a function has no quantitative expression. Thus, selection of an absolute criteria is of high importance for improvement of daily fire danger rating. On the example of the Chunsky forest ranger station (Krasnoyarsk Krai, an improved technique is suggested of making comparable local scales of forest fire danger rating based on an absolute criterion of fire danger rating – a probable density of active fires per million ha. A method and an algorithm are described of automatized local scales of fire danger that should facilitate effective creation of similar scales for any forest ranger station or aviation regional office using a database on forest fires and weather conditions. The information system of distant monitoring by Federal Forestry Agency of Russia is analyzed for its application in making local scales. To supplement the existing weather station net it is suggested that automatic compact weather stations or, if the latter is not possible, simple

  19. [Responsibilities of enterprises introducing new dangerous chemical substances and preparations].

    Science.gov (United States)

    Cieśla, Jacek; Majka, Jerzy

    2004-01-01

    The paper reviews the responsibilities of producers, importers and distributors set in a new Act of January 2001 on chemical substances and preparations (Off. J. 2001, No. 11, item 84, with subsequent amendments). This Act together with executive provisions is aimed at harmonizing Polish legislation with EU requirements. The Act sets conditions, restriction and bans of production placing on the market and use of chemical substances and preparations in order to protect human health and environment against their harmful effects. The Act together with a number of executive provisions render those who introduce dangerous chemicals and chemical preparations, including distributors responsible for: classification and labelling of dangerous chemical substances and preparations; possessing, making available and up-dating safety data sheets; supplying packages containing certain dangerous substances with child-proof fastenings; notifying the Inspector for Chemical Substances and Preparations about placing a dangerous preparation on the market; notifying the Inspector about a new substance and conducting required studies; being properly qualified to handle dangerous substances. The Act strictly defines the term "placing a substance or a preparation on the market"--it means making a substance or a preparation available to third parties on the territory of The Republic of Poland, territories of the Member States of the European Union or the territory of Iceland, Liechtenstein and Norway, unless the Act provides otherwise; it also means introduction of a substance or a preparation from outside of the territory referred to above on the customs territory of The Republic of Poland, or that of the member states of the European Union and other states listed above. In addition, some of the responsibilities defined by the provisions of the law on chemical substances and preparations are also applicable to handling of biocidals, which are classified as dangerous substances. The Act

  20. Danger and usefulness: an alternative framework for understanding rapid evaluation effects in perception?

    Science.gov (United States)

    Wurm, Lee H

    2007-12-01

    Previous studies have shown effects of rated danger and usefulness on lexical access. All of them have used stimuli selected for connotations of danger and/or usefulness. Stimuli for the present lexical decision study were all of the nouns, verbs, and adjectives from the Balota et al. (2002) English Lexicon Project (subject to constraints relating to experimental control; none had anything to do with danger or usefulness). The interaction between danger and usefulness ratings previously demonstrated (Wurm & Vakoch, 2000; Wurm, Vakoch, Seaman, & Buchanan, 2004; Wurm, Whitman, Seaman, Hill, & Ulstad, 2007) was found for nouns, even when age of acquisition was controlled. It was also found for verbs and adjectives. The interaction is believed to reflect competing pressures to (1) avoid dangerous objects/events and (2) approach valuable resources. It may be a manifestation of the rapid evaluation effects pervasive in the literature. Post hoc analyses showed that danger and usefulness explain as much variance as valence and arousal, or evaluation, potency, and activity.

  1. Experimental search for solar hidden photons in the eV energy range using kinetic mixing with photons

    International Nuclear Information System (INIS)

    Mizumoto, T.; Ohta, R.; Horie, T.; Suzuki, J.; Minowa, M.; Inoue, Y.

    2013-01-01

    We have searched for solar hidden photons in the eV energy range using a dedicated hidden photon detector. The detector consisted of a parabolic mirror with a diameter of 500 mm and a focal length of 1007 mm installed in a vacuum chamber, and a photomultiplier tube at its focal point. The detector was attached to the Tokyo axion helioscope, Sumico which has a mechanism to track the sun. From the result of the measurement, we found no evidence for the existence of hidden photons and set a limit on the photon-hidden photon mixing parameter χ depending on the hidden photon mass m γ'

  2. Dangerous quantities of radioactive material (D-values). Emergency preparedness and response. Publication date: August 2006

    International Nuclear Information System (INIS)

    2006-08-01

    Radioactive material is widely used in industry, medicine, education and agriculture. In addition, it occurs naturally. The health risk posed by these materials vary widely depending on many factors, the most important of which are the amount of the material involved and its physical and chemical form. Therefore, there is a need to identify the quantity and type of radioactive material for which emergency preparedness and other arrangements (e.g. security) are warrant due to the health risk they pose. The aim of this publication is to provide practical guidance for Member States on that quantity of radioactive material that may be considered dangerous. A dangerous quantity is that, which if uncontrolled, could be involved in a reasonable scenario resulting in the death of an exposed individual or a permanent injury, which decreases that person's quality of life. This publication is published as part of the IAEA Emergency Preparedness and Response Series. It supports several publications including: the IAEA Safety Requirements 'Preparedness and Response for a Nuclear or Radiological Emergency', IAEA Safety Standards Series No. GS-R-2. IAEA, Vienna (2002); IAEA Safety Guide 'Categorization of Radioactive Sources', IAEA Safety Standards Series No RS-G-1.9, IAEA, Vienna (2005) and IAEA Safety Guide 'Arrangements for Preparedness for a Nuclear or Radiological Emergency' IAEA Safety Standards Series No. GS-G-2.1, IAEA, Vienna (2006). The procedures and data in this publication have been prepared with due attention to accuracy. However, as part of the review process, they undergo ongoing quality assurance checks. Comments are welcome and, following a period that will allow for a more extensive review, the IAEA may revise this publication as part of the process of continuous improvement. The publication uses a number of exposure scenarios, risk models and dosimetric data, which could be used during the response to nuclear or radiological emergency or other purposes

  3. Sharp Contradiction for Local-Hidden-State Model in Quantum Steering

    Science.gov (United States)

    Chen, Jing-Ling; Su, Hong-Yi; Xu, Zhen-Peng; Pati, Arun Kumar

    2016-08-01

    In quantum theory, no-go theorems are important as they rule out the existence of a particular physical model under consideration. For instance, the Greenberger-Horne-Zeilinger (GHZ) theorem serves as a no-go theorem for the nonexistence of local hidden variable models by presenting a full contradiction for the multipartite GHZ states. However, the elegant GHZ argument for Bell’s nonlocality does not go through for bipartite Einstein-Podolsky-Rosen (EPR) state. Recent study on quantum nonlocality has shown that the more precise description of EPR’s original scenario is “steering”, i.e., the nonexistence of local hidden state models. Here, we present a simple GHZ-like contradiction for any bipartite pure entangled state, thus proving a no-go theorem for the nonexistence of local hidden state models in the EPR paradox. This also indicates that the very simple steering paradox presented here is indeed the closest form to the original spirit of the EPR paradox.

  4. Discovering Hidden Controlling Parameters using Data Analytics and Dimensional Analysis

    Science.gov (United States)

    Del Rosario, Zachary; Lee, Minyong; Iaccarino, Gianluca

    2017-11-01

    Dimensional Analysis is a powerful tool, one which takes a priori information and produces important simplifications. However, if this a priori information - the list of relevant parameters - is missing a relevant quantity, then the conclusions from Dimensional Analysis will be incorrect. In this work, we present novel conclusions in Dimensional Analysis, which provide a means to detect this failure mode of missing or hidden parameters. These results are based on a restated form of the Buckingham Pi theorem that reveals a ridge function structure underlying all dimensionless physical laws. We leverage this structure by constructing a hypothesis test based on sufficient dimension reduction, allowing for an experimental data-driven detection of hidden parameters. Both theory and examples will be presented, using classical turbulent pipe flow as the working example. Keywords: experimental techniques, dimensional analysis, lurking variables, hidden parameters, buckingham pi, data analysis. First author supported by the NSF GRFP under Grant Number DGE-114747.

  5. Searching for confining hidden valleys at LHCb, ATLAS, and CMS

    Science.gov (United States)

    Pierce, Aaron; Shakya, Bibhushan; Tsai, Yuhsin; Zhao, Yue

    2018-05-01

    We explore strategies for probing hidden valley scenarios exhibiting confinement. Such scenarios lead to a moderate multiplicity of light hidden hadrons for generic showering and hadronization similar to QCD. Their decays are typically soft and displaced, making them challenging to probe with traditional LHC searches. We show that the low trigger requirements and excellent track and vertex reconstruction at LHCb provide a favorable environment to search for such signals. We propose novel search strategies in both muonic and hadronic channels. We also study existing ATLAS and CMS searches and compare them with our proposals at LHCb. We find that the reach at LHCb is generically better in the parameter space we consider here, even with optimistic background estimations for ATLAS and CMS searches. We discuss potential modifications at ATLAS and CMS that might make these experiments competitive with the LHCb reach. Our proposed searches can be applied to general hidden valley models as well as exotic Higgs boson decays, such as in twin Higgs models.

  6. (Neuro)predictions, Dangerousness, and Retributivism

    DEFF Research Database (Denmark)

    Petersen, Thomas Søbirk

    2014-01-01

    Through the criminal justice system so-called dangerous offenders are, besides the offence that they are being convicted of and sentenced to, also punished for acts that they have not done but that they are believe to be likely to commit in the future. The aim of this paper is to critically discu...

  7. Single-hidden-layer feed-forward quantum neural network based on Grover learning.

    Science.gov (United States)

    Liu, Cheng-Yi; Chen, Chein; Chang, Ching-Ter; Shih, Lun-Min

    2013-09-01

    In this paper, a novel single-hidden-layer feed-forward quantum neural network model is proposed based on some concepts and principles in the quantum theory. By combining the quantum mechanism with the feed-forward neural network, we defined quantum hidden neurons and connected quantum weights, and used them as the fundamental information processing unit in a single-hidden-layer feed-forward neural network. The quantum neurons make a wide range of nonlinear functions serve as the activation functions in the hidden layer of the network, and the Grover searching algorithm outstands the optimal parameter setting iteratively and thus makes very efficient neural network learning possible. The quantum neuron and weights, along with a Grover searching algorithm based learning, result in a novel and efficient neural network characteristic of reduced network, high efficient training and prospect application in future. Some simulations are taken to investigate the performance of the proposed quantum network and the result show that it can achieve accurate learning. Copyright © 2013 Elsevier Ltd. All rights reserved.

  8. Multivariate calibration in Laser-Induced Breakdown Spectroscopy quantitative analysis: The dangers of a 'black box' approach and how to avoid them

    Science.gov (United States)

    Safi, A.; Campanella, B.; Grifoni, E.; Legnaioli, S.; Lorenzetti, G.; Pagnotta, S.; Poggialini, F.; Ripoll-Seguer, L.; Hidalgo, M.; Palleschi, V.

    2018-06-01

    The introduction of multivariate calibration curve approach in Laser-Induced Breakdown Spectroscopy (LIBS) quantitative analysis has led to a general improvement of the LIBS analytical performances, since a multivariate approach allows to exploit the redundancy of elemental information that are typically present in a LIBS spectrum. Software packages implementing multivariate methods are available in the most diffused commercial and open source analytical programs; in most of the cases, the multivariate algorithms are robust against noise and operate in unsupervised mode. The reverse of the coin of the availability and ease of use of such packages is the (perceived) difficulty in assessing the reliability of the results obtained which often leads to the consideration of the multivariate algorithms as 'black boxes' whose inner mechanism is supposed to remain hidden to the user. In this paper, we will discuss the dangers of a 'black box' approach in LIBS multivariate analysis, and will discuss how to overcome them using the chemical-physical knowledge that is at the base of any LIBS quantitative analysis.

  9. Children's recognition of dangerous household products: child development and poisoning risk.

    Science.gov (United States)

    Schwebel, David C; Wells, Hayley; Johnston, Anna

    2015-03-01

    Preliterate children may be poisoned because they fail to distinguish safe versus hazardous household products. Study 1: A total of 228 children aged 18-54 months completed four tasks assessing ability to recognize product safety. Study 2: A total of 68 children aged 17-31 months chose products to drink from pairs of dangerous versus beverage bottles. Study 3: A total of 119 children aged 18-42 months sorted 12 objects into toys, things you can drink, and things that are bad/dangerous. Left alone, children frequently touched dangerous household products. Children frequently misidentified poisonous products as safe. Some developmental trends emerged. The following packaging features apparently helped children recognize danger: black bottle color; opaque packaging; salient symbols like insects; lack of pointy spouts; squared, not round, bottles; and metal, not plastic, containers. Developing cognition helps preliterate children distinguish safe from dangerous household products. Multiple aspects of product packaging may reduce child poisoning risk if implemented by industry or policy. © The Author 2014. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  10. Nurture Hidden Talents: Transform School Culture into One That Values Teacher Expertise

    Science.gov (United States)

    Zimmerman, Diane P.

    2014-01-01

    This article looks into the school culture where teacher expertise is often hidden and underused. While the media-rich culture places a high value on talent, the irony is that talent is underrated in most schools, and educators often remain silent about their hidden talents. Many school cultures are not conducive to dialogue that supports displays…

  11. Long memory of financial time series and hidden Markov models with time-varying parameters

    DEFF Research Database (Denmark)

    Nystrup, Peter; Madsen, Henrik; Lindström, Erik

    Hidden Markov models are often used to capture stylized facts of daily returns and to infer the hidden state of financial markets. Previous studies have found that the estimated models change over time, but the implications of the time-varying behavior for the ability to reproduce the stylized...... facts have not been thoroughly examined. This paper presents an adaptive estimation approach that allows for the parameters of the estimated models to be time-varying. It is shown that a two-state Gaussian hidden Markov model with time-varying parameters is able to reproduce the long memory of squared...... daily returns that was previously believed to be the most difficult fact to reproduce with a hidden Markov model. Capturing the time-varying behavior of the parameters also leads to improved one-step predictions....

  12. Photoacoustic imaging of hidden dental caries by using a bundle of hollow optical fibers

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2018-02-01

    Photoacoustic imaging system using a bundle of hollow-optical fibers to detect hidden dental caries is proposed. Firstly, we fabricated a hidden caries model with a brown pigment simulating a common color of caries lesion. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating Nd:YAG laser light with a 532 nm wavelength to occlusal surface of model tooth. We calculated by Fourier transform and found that the waveform from the carious part provides frequency components of approximately from 0.5 to 1.2 MHz. Then a photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for clinical applications. From intensity map of frequency components in 0.5-1.2 MHz, photoacoustic images of hidden caries in the simulated samples were successfully obtained.

  13. Container for shipping dangerous material

    International Nuclear Information System (INIS)

    Blum, P.T.

    1987-01-01

    This container for shipping dangerous material is made by a cylindrical casing of austenitic stainless steel with rounded ends and walls of uniform thickness with welded joins, a tubular metal shock absorber fixed over each end of the casing, removable lugs fixed to the casing, optionally retainers for the material within the casing [fr

  14. The potential predictability of fire danger provided by ECMWF forecast

    Science.gov (United States)

    Di Giuseppe, Francesca

    2017-04-01

    The European Forest Fire Information System (EFFIS), is currently being developed in the framework of the Copernicus Emergency Management Services to monitor and forecast fire danger in Europe. The system provides timely information to civil protection authorities in 38 nations across Europe and mostly concentrates on flagging regions which might be at high danger of spontaneous ignition due to persistent drought. The daily predictions of fire danger conditions are based on the US Forest Service National Fire Danger Rating System (NFDRS), the Canadian forest service Fire Weather Index Rating System (FWI) and the Australian McArthur (MARK-5) rating systems. Weather forcings are provided in real time by the European Centre for Medium range Weather Forecasts (ECMWF) forecasting system. The global system's potential predictability is assessed using re-analysis fields as weather forcings. The Global Fire Emissions Database (GFED4) provides 11 years of observed burned areas from satellite measurements and is used as a validation dataset. The fire indices implemented are good predictors to highlight dangerous conditions. High values are correlated with observed fire and low values correspond to non observed events. A more quantitative skill evaluation was performed using the Extremal Dependency Index which is a skill score specifically designed for rare events. It revealed that the three indices were more skilful on a global scale than the random forecast to detect large fires. The performance peaks in the boreal forests, in the Mediterranean, the Amazon rain-forests and southeast Asia. The skill-scores were then aggregated at country level to reveal which nations could potentiallty benefit from the system information in aid of decision making and fire control support. Overall we found that fire danger modelling based on weather forecasts, can provide reasonable predictability over large parts of the global landmass.

  15. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main......PRIMARY OBJECTIVE: The purpose of this study was to listen to and learn from children showing high levels of post-traumatic stress symptoms after parental acquired brain injury (ABI), in order to achieve an in-depth understanding of the difficulties the children face in their everyday lives...... finding indicates that the children experienced numerous losses, many of which were often suppressed or neglected by the children to protect the ill parents. CONCLUSIONS: The findings indicated that the children seemed to make a special effort to hide their feelings of loss and grief in order to protect...

  16. Hidden Markov models: the best models for forager movements?

    Science.gov (United States)

    Joo, Rocio; Bertrand, Sophie; Tam, Jorge; Fablet, Ronan

    2013-01-01

    One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs). We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs). They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour), while their behavioural modes (fishing, searching and cruising) were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines) for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%), significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  17. Hidden Markov models: the best models for forager movements?

    Directory of Open Access Journals (Sweden)

    Rocio Joo

    Full Text Available One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs. We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs. They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour, while their behavioural modes (fishing, searching and cruising were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%, significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  18. Chimpanzees (Pan troglodytes) use markers to monitor the movement of a hidden item.

    Science.gov (United States)

    Beran, Michael J; Beran, Mary M; Menzel, Charles R

    2005-10-01

    Four chimpanzees (Pan troglodytes) monitored the movement of hidden items in arrays of opaque cups. A chocolate candy was hidden in an array of four cups and temporarily presented paper markers indicated the location of the candy (which otherwise was not visible). These markers were either non-symbolic or symbolic (lexigram) stimuli that in other contexts acted as a label for the hidden candy, and the array was either rotated 180 degrees after the marker was removed or the array remained in the same location. For three of four chimpanzees, performance was better than chance in all conditions and there was no effect of the type of marker. These experiments indicate that chimpanzees can track the movement of a hidden item in an array of identical cups even when they never see the item itself, but only see a temporarily presented marker for the location of that item. However, there was no benefit to the use of symbolic as opposed to non-symbolic stimuli in this performance.

  19. Grout Treatment Facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1992-07-01

    The Grout Treatment Facility (GTF) is an existing treatment, storage, and/or disposal (TSD) unit located in the 200 East Area and the adjacent 600 Area of the Hanford Site. The GTF mixes dry cementitious solids with liquid mixed waste (containing both dangerous and radioactive constituents) produced by Hanford Site operations. The GTF consists of the following: The 241-AP-02D and 241-AP-04D waste pump pits and transfer piping; Dry Materials Facility (DMF); Grout Disposal Facility (GDF), consisting of the disposal vault and support and monitoring equipment; and Grout Processing Facility (GPF) and Westinghouse Hanford Company on the draft Hanford Facility Dangerous Waste Permit and may not be read to conflict with those comments. The Grout Treatment Facility Dangerous Waste Permit Application consists of both a Part A and a Part B permit application. An explanation of the Part A revisions associated with this TSD unit, including the current revision, is provided at the beginning of the Part A section. The Part B consists of 15 chapters addressing the organization and content of the Part B checklist prepared by the Washington State Department of Ecology (Ecology 1987). For ease of reference, the checklist section numbers, in brackets, follow chapter headings and subheadings

  20. Significance of hidden advertising of the media business models in Latvia

    OpenAIRE

    Rožukalne, Anda

    2012-01-01

    Since 2002 parliamentary and municipal elections in Latvia, media content researches have shown a considerable amount of hidden advertising: media publish information that is paid-for, yet not identified as advertising, assigning this information with the qualities of independent content, therefore misleading its audience. In order to analyze this practice, a research was commissioned to find out why Latvian media publish hidden advertising, what is the force behind this practice, who are com...

  1. Double-shell tank system dangerous waste permit application

    International Nuclear Information System (INIS)

    1991-06-01

    This Double-Shell Tank System Dangerous Waste Permit Application should be read in conjunction with the 242-A Evaporator Dangerous Waste Permit Application and the Liquid Effluent Retention Facility Dangerous Waste Permit Application, also submitted on June 28, 1991. Information contained in the Double-Shell Tank System permit application is referenced in the other two permit applications. The Double-Shell Tank System stores and treats mixed waste received from a variety of sources on the Hanford Site. The 242-A Evaporator treats liquid mixed waste received from the double-shell tanks. The 242-A Evaporator returns a mixed-waste slurry to the double-shell tanks and generates the dilute mixed-waste stream stored in the Liquid Effluent Retention Facility. This report contains information on the following topics: Facility Description and General Provisions; Waste Characteristics; Process Information; Groundwater Monitoring; Procedures to Prevent Hazards; Contingency Plan; Personnel Training; Exposure Information Report; Waste Minimization Plan; Closure and Postclosure Requirements; Reporting and Recordkeeping; other Relevant Laws; and Certification. 150 refs., 141 figs., 118 tabs

  2. Enhanced axion-photon coupling in GUT with hidden photon

    Science.gov (United States)

    Daido, Ryuji; Takahashi, Fuminobu; Yokozaki, Norimi

    2018-05-01

    We show that the axion coupling to photons can be enhanced in simple models with a single Peccei-Quinn field, if the gauge coupling unification is realized by a large kinetic mixing χ = O (0.1) between hypercharge and unbroken hidden U(1)H. The key observation is that the U(1)H gauge coupling should be rather strong to induce such large kinetic mixing, leading to enhanced contributions of hidden matter fields to the electromagnetic anomaly. We find that the axion-photon coupling is enhanced by about a factor of 10-100 with respect to the GUT-axion models with E / N = 8 / 3.

  3. 33 CFR 95.020 - Standard for under the influence of alcohol or a dangerous drug.

    Science.gov (United States)

    2010-07-01

    ... of alcohol or a dangerous drug. 95.020 Section 95.020 Navigation and Navigable Waters COAST GUARD... ALCOHOL OR A DANGEROUS DRUG § 95.020 Standard for under the influence of alcohol or a dangerous drug. An individual is under the influence of alcohol or a dangerous drug when: (a) The individual is operating a...

  4. 33 CFR 95.030 - Evidence of under the influence of alcohol or a dangerous drug.

    Science.gov (United States)

    2010-07-01

    ... of alcohol or a dangerous drug. 95.030 Section 95.030 Navigation and Navigable Waters COAST GUARD... ALCOHOL OR A DANGEROUS DRUG § 95.030 Evidence of under the influence of alcohol or a dangerous drug. Acceptable evidence of when a vessel operator is under the influence of alcohol or a dangerous drug includes...

  5. 77 FR 17569 - United States-Canada Regulatory Cooperation Council (RCC)-Transportation-Dangerous Goods Working...

    Science.gov (United States)

    2012-03-26

    ... identified in the Joint Action Plan, the Transportation--Dangerous Goods Working Group led by senior...)-- Transportation--Dangerous Goods Working Group AGENCY: Pipeline and Hazardous Materials Safety Administration...--Dangerous Goods Working Group, of the United States-Canada Regulatory Cooperation Council (RCC). Comments...

  6. Multistability and hidden attractors in a multilevel DC/DC converter

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik

    2015-01-01

    An attracting periodic, quasiperiodic or chaotic set of a smooth, autonomous system may be referred to as a "hidden attractor" if its basin of attraction does not overlap with the neighborhood of an unstable equilibrium point. Historically, this condition has implied that the basin of attraction...... produce complicated structures of attracting and repelling states organized around the basic switching cycle. This leads us to suggest the existence of hidden attractors in such systems as well. In this case, the condition will be that the basin of attraction does not overlap with the fixed point...

  7. Exploring inequality violations by classical hidden variables numerically

    International Nuclear Information System (INIS)

    Vongehr, Sascha

    2013-01-01

    There are increasingly suggestions for computer simulations of quantum statistics which try to violate Bell type inequalities via classical, common cause correlations. The Clauser–Horne–Shimony–Holt (CHSH) inequality is very robust. However, we argue that with the Einstein–Podolsky–Rosen setup, the CHSH is inferior to the Bell inequality, although and because the latter must assume anti-correlation of entangled photon singlet states. We simulate how often quantum behavior violates both inequalities, depending on the number of photons. Violating Bell 99% of the time is argued to be an ideal benchmark. We present hidden variables that violate the Bell and CHSH inequalities with 50% probability, and ones which violate Bell 85% of the time when missing 13% anti-correlation. We discuss how to present the quantum correlations to a wide audience and conclude that, when defending against claims of hidden classicality, one should demand numerical simulations and insist on anti-correlation and the full amount of Bell violation. -- Highlights: •The widely assumed superiority of the CHSH fails in the EPR problem. •We simulate Bell type inequalities behavior depending on the number of photons. •The core of Bell’s theorem in the EPR setup is introduced in a simple way understandable to a wide audience. •We present hidden variables that violate both inequalities with 50% probability. •Algorithms have been supplied in form of Mathematica programs

  8. Mass spectra of hidden-charm molecular pentaquarks states

    International Nuclear Information System (INIS)

    Patel, Smruti; Vinodkumar, P.C.

    2016-01-01

    Very recently, the LHCb Collaboration has reported two hidden-charmed resonances P_c(4380) and P_c(4450) consistent with pentaquark states in the Λ_b"0 → K"-J/Ψp process with masses (widths) (4380 ±8 ± 29) MeV ((205 ±18 ± 86) MeV) and (4449.8 ±1.7 ± 2.5) MeV ((39 ±5 ±19) MeV), respectively. The observation of the P_c states has aroused the theorist's strong interest in the hidden-charm pentaquark states. They have been studied in various frameworks, such as the molecule-like pentaquark states, the diquark-diquark-antiquark type pentaquark states, the diquark-triquark type pentaquark states, re-scattering effects, etc. An identification of pentaquark states as exotic hadron has been one of the long standing problems in the physics of strong interaction and quantum chromodynamics (QCD). A decade ago lots of discussion were made about pentaquarks states but due to lack of further experimental evidences the study of pentaquarks have been almost gone in the darkness. But, recent remarkable observation of two resonances i.e. P_c(4380) and P_c(4450) with hidden charm and the minimal quark content cc-baruud provided new impact for studies of pentaquark states and opens a new window to study the exotic hadronic matter

  9. A dangerous movie? Hollywood does psychoanalysis.

    Science.gov (United States)

    Ferrell, Donald R; Silverman, Martin A

    2014-12-01

    After the appearance of David Cronenberg's film A Dangerous Method in 2011, dealing with the relationships of Sigmund Freud, C. G. Jung and Sabina Spielrein, Dr. Donald Ferrell published: A Dangerous Method, A Film Directed by David Cronenberg: An Extended Review (Ferrell 2012) in the Journal of Religion and Health. Upon its publication, Dr. Ferrell's article was nominated for a Gradiva Award by the National Association for the Advancement of Psychoanalysis. On November 1, 2013, the Association for the Psychoanalysis of Culture and Society held its annual conference at Rutgers University, New Brunswick, NJ. Dr. Billie Pivnick, a member at large of the Board of Directors of the APCS and also on the Editorial Board of the Journal of Religion and Health, persuaded the 2013 Conference Program Committee that Cronenberg's film would make an interesting subject for discussion for conference participants. To that end, Dr. Pivnick invited Dr. Ferrell, C. G. Jung Institute of New York, Dr. Steven Reisner, Coalition for an Ethical Psychology, and Dr. Martin Silverman, Training and Supervising Analyst and Supervising Child Analyst at the Institute for Psychoanalytic Education, NYU College of Medicine, Training and Supervising Analyst at the Center for Psychotherapy and Psychoanalysis of New Jersey, and Associate Editor of The Psychoanalytic Quarterly to serve as panel members to discuss: A Dangerous Movie? Hollywood does Psychoanalysis. Presentations on Cronenberg's film and the early history of psychoanalysis were given by Drs. Ferrell and Reisner, followed by a response to their presentations by Dr. Silverman. Dr. Pivnick chaired the session. The articles presented here were given originally at the APCS conference by Dr. Ferrell and Dr. Silverman. Dr. Reisner declined the invitation to submit his presentation for publication. Dr. Silverman's remarks were based not only on the presentation given by Dr. Ferrell at the session on A Dangerous Movie?, but also on his close and

  10. [Accidents on Iceland's most dangerous roads].

    Science.gov (United States)

    Bjarnason, Thóroddur; Arnarsson, Sveinn

    2012-02-01

    The objective of this paper was to identify the most dangerous segments of the Icelandic road system in terms of the number of accidents pr km and the rate of accidents pr million km travelled. First to identify the segments where the number of accidents is highest and where the risk of the individual traveller is the greatest. Second to evaluate if the association between the number and the rate of accidents is positive or negative. Third to identify the road segments that are the most dangerous in the sense of many accidents and great risk to individual travellers. Main roads outside urban centers were divided into 45 segments that were on average 78 km in length. Infrequently travelled roads and roads within urban centers were omitted. Information on the length of roads, traffic density and number of accidents was used to calculate the number of accidents per km and the rate of accidents per million km travelled. The correlation between the number and rate of accidents was calculated and the most dangerous road segments were identified by the average rank order on both dimensions. Most accidents pr km occurred on the main roads to and from the capital region, but also east towards Hvolsvöllur, north towards Akureyri and in the Mideast region of the country. The rate of accidents pr million km travelled was highest in the northeast region, in northern Snæfellsnes and in the Westfjords. The most dangerous roads on both dimensions were in Mideast, northern Westfjords, in the north between Blönduós and Akureyri and in northern Snæfellsnes. Most accidents pr km occurred on roads with a low accident rate pr million km travelled. It is therefore possible to reduce accidents the most by increasing road safety where it is already the greatest but that would however increase inequalities in road safety. Policy development in transportation is therefore in part a question of priorities in healthcare. Individual equality in safety and health are not always fully

  11. Hidden supersymmetry and large N

    International Nuclear Information System (INIS)

    Alfaro, J.

    1988-01-01

    In this paper we present a new method to deal with the leading order in the large-N expansion of a quantum field theory. The method uses explicitly the hidden supersymmetry that is present in the path-integral formulation of a stochastic process. In addition to this we derive a new relation that is valid in the leading order of the large-N expansion of the hermitian-matrix model for any spacetime dimension. (orig.)

  12. Long Memory of Financial Time Series and Hidden Markov Models with Time-Varying Parameters

    DEFF Research Database (Denmark)

    Nystrup, Peter; Madsen, Henrik; Lindström, Erik

    2016-01-01

    Hidden Markov models are often used to model daily returns and to infer the hidden state of financial markets. Previous studies have found that the estimated models change over time, but the implications of the time-varying behavior have not been thoroughly examined. This paper presents an adaptive...... to reproduce with a hidden Markov model. Capturing the time-varying behavior of the parameters also leads to improved one-step density forecasts. Finally, it is shown that the forecasting performance of the estimated models can be further improved using local smoothing to forecast the parameter variations....

  13. Hidden corrosion detection in aircraft aluminum structures using laser ultrasonics and wavelet transform signal analysis.

    Science.gov (United States)

    Silva, M Z; Gouyon, R; Lepoutre, F

    2003-06-01

    Preliminary results of hidden corrosion detection in aircraft aluminum structures using a noncontact laser based ultrasonic technique are presented. A short laser pulse focused to a line spot is used as a broadband source of ultrasonic guided waves in an aluminum 2024 sample cut from an aircraft structure and prepared with artificially corroded circular areas on its back surface. The out of plane surface displacements produced by the propagating ultrasonic waves were detected with a heterodyne Mach-Zehnder interferometer. Time-frequency analysis of the signals using a continuous wavelet transform allowed the identification of the generated Lamb modes by comparison with the calculated dispersion curves. The presence of back surface corrosion was detected by noting the loss of the S(1) mode near its cutoff frequency. This method is applicable to fast scanning inspection techniques and it is particularly suited for early corrosion detection.

  14. Hidden Broad-line Regions in Seyfert 2 Galaxies: From the Spectropolarimetric Perspective

    International Nuclear Information System (INIS)

    Du, Pu; Wang, Jian-Min; Zhang, Zhi-Xiang

    2017-01-01

    The hidden broad-line regions (BLRs) in Seyfert 2 galaxies, which display broad emission lines (BELs) in their polarized spectra, are a key piece of evidence in support of the unified model for active galactic nuclei (AGNs). However, the detailed kinematics and geometry of hidden BLRs are still not fully understood. The virial factor obtained from reverberation mapping of type 1 AGNs may be a useful diagnostic of the nature of hidden BLRs in type 2 objects. In order to understand the hidden BLRs, we compile six type 2 objects from the literature with polarized BELs and dynamical measurements of black hole masses. All of them contain pseudobulges. We estimate their virial factors, and find the average value is 0.60 and the standard deviation is 0.69, which agree well with the value of type 1 AGNs with pseudobulges. This study demonstrates that (1) the geometry and kinematics of BLR are similar in type 1 and type 2 AGNs of the same bulge type (pseudobulges), and (2) the small values of virial factors in Seyfert 2 galaxies suggest that, similar to type 1 AGNs, BLRs tend to be very thick disks in type 2 objects.

  15. Neighborhood Danger, Parental Monitoring, Harsh Parenting, and Child Aggression in Nine Countries

    Directory of Open Access Journals (Sweden)

    Ann T. Skinner

    2014-01-01

    Full Text Available Exposure to neighborhood danger during childhood has negative effects that permeate multiple dimensions of childhood. The current study examined whether mothers’, fathers’, and children’s perceptions of neighborhood danger are related to child aggression, whether parental monitoring moderates this relation, and whether harsh parenting mediates this relation. Interviews were conducted with a sample of 1293 children (age M = 10.68, SD = 0.66; 51% girls and their mothers (n = 1282 and fathers (n = 1075 in nine countries (China, Colombia, Italy, Jordan, Kenya, the Philippines, Sweden, Thailand, and the United States. Perceptions of greater neighborhood danger were associated with more child aggression in all nine countries according to mothers’ and fathers’ reports and in five of the nine countries according to children’s reports. Parental monitoring did not moderate the relation between perception of neighborhood danger and child aggression. The mediating role of harsh parenting was inconsistent across countries and reporters. Implications for further research are discussed, and include examination of more specific aspects of parental monitoring as well as more objective measures of neighborhood danger.

  16. Legislation on carriage of dangerous goods. Acts - directives - exemptions. 2. rev. ed.

    International Nuclear Information System (INIS)

    Vogt, H.W.

    1993-01-01

    This compact paperback edition presents the essential chapters of volume 3 'Acts, directives, exemptions' of the publication ''A handbook for dangerous goods officers''. Contents: (1) Act on the Carriage of Dangerous Goods. (2) Ordinance concerning Dangerous Goods Officers (GbV). (3) Legislative intent pursued with the GbV. (4) Instructions for implementation of the GbV. (5) Ordinance on Road Transport of Dangerous Goods (GGVS). (6) Annex A and B of the GGVS. The updating and amendment of the ADR provisions for harmonisation with the international classification schemes and hence the complete revision of categories 4.1, 4.2, 4.3, 5.1, 5.2, and 9, as well as the harmonisation of GGVS provisions with ADR provisions fall both under the 4th Amending Ordinance. This 4th Ordinance Amending the GGVS, passed by the Bundesrat on March 5, 1993 and announced on April 23, 1993, is, of course, part of this edition. Professional subscribers to the publication will prefer the loose-leaf edition of the Handbook for Dangerous Goods Officers, for easy updating of their reference source. (orig./HP) [de

  17. Neighborhood Danger, Parental Monitoring, Harsh Parenting, and Child Aggression in Nine Countries.

    Science.gov (United States)

    Skinner, Ann T; Bacchini, Dario; Lansford, Jennifer E; Godwin, Jennifer; Sorbring, Emma; Tapanya, Sombat; Tirado, Liliana Maria Uribe; Zelli, Arnaldo; Alampay, Liane Peña; Al-Hassan, Suha M; Bombi, Anna Silvia; Bornstein, Marc H; Chang, Lei; Deater-Deckard, Kirby; Giunta, Laura Di; Dodge, Kenneth A; Malone, Patrick S; Miranda, Maria Concetta; Oburu, Paul; Pastorelli, Concetta

    2014-01-20

    Exposure to neighborhood danger during childhood has negative effects that permeate multiple dimensions of childhood. The current study examined whether mothers', fathers', and children's perceptions of neighborhood danger are related to child aggression, whether parental monitoring moderates this relation, and whether harsh parenting mediates this relation. Interviews were conducted with a sample of 1,293 children (age M = 10.68, SD = .66; 51% girls) and their mothers ( n = 1,282) and fathers ( n = 1,075) in nine countries (China, Colombia, Italy, Jordan, Kenya, the Philippines, Sweden, Thailand, and the United States). Perceptions of greater neighborhood danger were associated with more child aggression in all nine countries according to mothers' and fathers' reports and in five of the nine countries according to children's reports. Parental monitoring did not moderate the relation between perception of neighborhood danger and child aggression. The mediating role of harsh parenting was inconsistent across countries and reporters. Implications for further research are discussed, and include examination of more specific aspects of parental monitoring as well as more objective measures of neighborhood danger.

  18. Finite-time Lyapunov dimension and hidden attractor of the Rabinovich system

    OpenAIRE

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Prasad, A.; Shrimali, M. D.

    2015-01-01

    The Rabinovich system, describing the process of interaction between waves in plasma, is considered. It is shown that the Rabinovich system can exhibit a hidden attractor in the case of multistability as well as a classical self-excited attractor. The hidden attractor in this system can be localized by analytical/numerical methods based on the continuation and perpetual points. The concept of finite-time Lyapunov dimension is developed for numerical study of the dimension of attractors. A con...

  19. Intense gamma-ray lines from hidden vector dark matter decay

    International Nuclear Information System (INIS)

    Arina, Chiara; Hambye, Thomas

    2009-12-01

    Scenarios with hidden, spontaneously broken, non-abelian gauge groups contain a natural dark matter candidate, the hidden vector, whose longevity is due to an accidental custodial symmetry in the renormalizable Lagrangian. Nevertheless, non-renormalizable dimension six operators break the custodial symmetry and induce the decay of the dark matter particle at cosmological times. We discuss in this paper the cosmic ray signatures of this scenario and we show that the decay of hidden vector dark matter particles generically produce an intense gamma ray line which could be observed by the Fermi-LAT experiment, if the scale of custodial symmetry breaking is close to the Grand Unification scale. This gamma line proceeds directly from a tree level dark matter 2-body decay in association with a Higgs boson. Within this model we also perform a determination of the relic density constraints taking into account the dark matter annihilation processes with one dark matter particle in the final state. The corresponding direct detection rates can be easily of order the current experimental sensitivities. (orig.)

  20. Intense gamma-ray lines from hidden vector dark matter decay

    Energy Technology Data Exchange (ETDEWEB)

    Arina, Chiara; Hambye, Thomas [Universite Libre de Bruxelles (Belgium). Service de Physique Theorique; Ibarra, Alejandro [Technische Univ. Muenchen, Garching (Germany). Physik-Department; Weniger, Christoph [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-12-15

    Scenarios with hidden, spontaneously broken, non-abelian gauge groups contain a natural dark matter candidate, the hidden vector, whose longevity is due to an accidental custodial symmetry in the renormalizable Lagrangian. Nevertheless, non-renormalizable dimension six operators break the custodial symmetry and induce the decay of the dark matter particle at cosmological times. We discuss in this paper the cosmic ray signatures of this scenario and we show that the decay of hidden vector dark matter particles generically produce an intense gamma ray line which could be observed by the Fermi-LAT experiment, if the scale of custodial symmetry breaking is close to the Grand Unification scale. This gamma line proceeds directly from a tree level dark matter 2-body decay in association with a Higgs boson. Within this model we also perform a determination of the relic density constraints taking into account the dark matter annihilation processes with one dark matter particle in the final state. The corresponding direct detection rates can be easily of order the current experimental sensitivities. (orig.)

  1. Intense gamma-ray lines from hidden vector dark matter decay

    International Nuclear Information System (INIS)

    Arina, Chiara; Hambye, Thomas; Ibarra, Alejandro; Weniger, Christoph

    2010-01-01

    Scenarios with hidden, spontaneously broken, non-abelian gauge groups contain a natural dark matter candidate, the hidden vector, whose longevity is due to an accidental custodial symmetry in the renormalizable Lagrangian. Nevertheless, non-renormalizable dimension six operators break the custodial symmetry and induce the decay of the dark matter particle at cosmological times. We discuss in this paper the cosmic ray signatures of this scenario and we show that the decay of hidden vector dark matter particles generically produce an intense gamma ray line which could be observed by the Fermi-LAT experiment, if the scale of custodial symmetry breaking is close to the Grand Unification scale. This gamma line proceeds directly from a tree level dark matter 2-body decay in association with a Higgs boson. Within this model we also perform a determination of the relic density constraints taking into account the dark matter annihilation processes with one dark matter particle in the final state. The corresponding direct detection rates can be easily of order the current experimental sensitivities

  2. The Hidden Cost of Buying a Computer.

    Science.gov (United States)

    Johnson, Michael

    1983-01-01

    In order to process data in a computer, application software must be either developed or purchased. Costs for modifications of the software package and maintenance are often hidden. The decision to buy or develop software packages should be based upon factors of time and maintenance. (MLF)

  3. Theoretical analysis of hidden photon searches in high-precision experiments

    International Nuclear Information System (INIS)

    Beranek, Tobias

    2014-01-01

    Although the Standard Model of particle physics (SM) provides an extremely successful description of the ordinary matter, one knows from astronomical observations that it accounts only for around 5% of the total energy density of the Universe, whereas around 30% are contributed by the dark matter. Motivated by anomalies in cosmic ray observations and by attempts to solve questions of the SM like the (g-2) μ discrepancy, proposed U(1) extensions of the Standard Model gauge group SU(3) x SU(2) x U(1) have raised attention in recent years. In the considered U(1) extensions a new, light messenger particle γ', the hidden photon, couples to the hidden sector as well as to the electromagnetic current of the SM by kinetic mixing. This allows for a search for this particle in laboratory experiments exploring the electromagnetic interaction. Various experimental programs have been started to search for the γ' boson, such as in electron-scattering experiments, which are a versatile tool to explore various physics phenomena. One approach is the dedicated search in fixed-target experiments at modest energies as performed at MAMI or at JLAB. In these experiments the scattering of an electron beam off a hadronic target e→e(A,Z)l + l - is investigated and a search for a very narrow resonance in the invariant mass distribution of the l + l - pair is performed. This requires an accurate understanding of the theoretical basis of the underlying processes. For this purpose it is demonstrated in the first part of this work, in which way the hidden photon can be motivated from existing puzzles encountered at the precision frontier of the SM. The main part of this thesis deals with the analysis of the theoretical framework for electron scattering fixed-target experiments searching for hidden photons. As a first step, the cross section for the bremsstrahlung emission of hidden photons in such experiments is studied. Based on these results, the applicability of the Weizsaecker

  4. Sterile neutrino, hidden dark matter and their cosmological signatures

    International Nuclear Information System (INIS)

    Das, Subinoy

    2012-01-01

    Though thermal dark matter has been the central idea behind the dark matter candidates, it is highly possible that dark matter of the universe is non-thermal in origin or it might be in thermal contact with some hidden or dark sector but not with standard model. Here we explore the cosmological bounds as well as the signatures on two types of non-thermal dark matter candidates. First we discuss a hidden dark matter with almost no interaction (or very feeble) with standard model particles so that it is not in thermal contact with visible sector but we assume it is thermalized with in a hidden sector due to some interaction. While encompassing the standard cold WIMP scenario, we do not require the freeze-out process to be non-relativistic. Rather, freeze-out may also occur when dark matter particles are semi-relativistic or relativistic. Especially we focus on the warm dark matter scenario in this set up and find the constraints on the warm dark matter mass, cross-section and hidden to visible sector temperature ratio which accounts for the observed dark-matter density, satisfies the Tremaine-Gunn bound on dark-matter phase space density and has a free-streaming length consistent with cosmological constraints on the matter power spectrum. Our method can also be applied to keV sterile neutrino dark matter which is not thermalized with standard model but is thermalized with in a dark sector. The second part of this proceeding focuses on an exotic dark matter candidate which arises from the existence of eV mass sterile neutrino through a late phase transition. Due to existence of a strong scalar force the light sterile states get trapped into stable degenerate micro nuggets. We find that its signature in matter power spectra is close to a warm dark matter candidate.

  5. A fire danger rating system for Hawaii

    Science.gov (United States)

    Robert E. Burgan; Francis M. Fujioka; George H. Hirata

    1974-01-01

    Extremes in rainfall on the Hawaiian Islands make it difficult to judge forest fire danger conditions. The use of an automatic data collection and computer processing system helps to monitor the problem.

  6. Cross-sectional survey of knowledge of obstetric danger signs among women in rural Madagascar.

    Science.gov (United States)

    Salem, Ania; Lacour, Oriane; Scaringella, Stefano; Herinianasolo, Josea; Benski, Anne Caroline; Stancanelli, Giovanna; Vassilakos, Pierre; Petignat, Patrick; Schmidt, Nicole Christine

    2018-02-05

    Antenatal care (ANC) has the potential to identify and manage obstetric complications, educate women about risks during pregnancy and promote skilled birth attendance during childbirth. The aim of this study was to assess women's knowledge of obstetric danger signs and factors associated with this knowledge in Ambanja, Madagascar. It also sought to evaluate whether the participation in a mobile health (mHealth) project that aimed to provide comprehensive ANC to pregnant women in remote areas influenced women's knowledge of obstetric danger signs. From April to October 2015, a non-random, convenience sample of 372 women in their first year postpartum were recruited, including 161 who had participated in the mHealth project. Data were analyzed using bivariate and multivariate logistic regression. Knowledge of at least one danger sign varied from 80.9% of women knowing danger sign(s) in pregnancy, to 51.9%, 50.8% and 53.2% at delivery, postpartum and in the newborn, respectively. Participation in the mHealth intervention, higher household income, and receipt of information about danger signs during pregnancy were associated with knowledge of danger signs during delivery, in bivariate analysis; only higher household income and mHealth project participation were independently associated. Higher educational attainment and receipt of information about danger signs in antenatal care were associated with significantly higher odds of knowing danger sign(s) for the newborn in both bivariate and multivariate analysis. Knowledge of obstetric danger signs is low. Information provision during pregnancy and with mHealth is promising. This trial was retrospectively registered at the International Standard Randomized Controlled Trial Register (identifier ISRCTN15798183 ; August 22, 2015).

  7. Rift-drift transition in the Dangerous Grounds, South China Sea

    Science.gov (United States)

    Peng, Xi; Shen, Chuanbo; Mei, Lianfu; Zhao, Zhigang; Xie, Xiaojun

    2018-04-01

    The South China Sea (SCS) has a long record of rifting before and after subsequent seafloor spreading, affecting the wide continent of the Dangerous Grounds, and its scissor-shape opening manner results in the rifting structures that vary along this margin. Some 2000 km of regional multichannel seismic data combined with borehole and dredge data are interpreted to analyze the multistage rifting process, structural architecture and dynamic evolution across the entire Dangerous Grounds. Key sequence boundaries above the Cenozoic basement are identified and classified into the breakup unconformity and the rift end unconformity, which consist of the rift-related unconformities. Reflector T70 in the east of the Dangerous Grounds represents the breakup unconformity, which is likely corresponding to the spreading of the East Subbasin. T60 formed on the top of carbonate platform is time equivalent to the spreading of the Southwest Subbasin, marking the breakup unconformity of the central Dangerous Grounds. The termination of the spreading of the SCS is manifested by the rift end unconformity of T50 in the southwest and the final rift occurring in the northwest of the Dangerous Grounds is postponed to the rift end unconformity of T40. On the basis of the stratigraphic and structural analysis, distinct segments in the structural architecture of the syn-rift units and the ages of rift-drift transition show obvious change from the proximal zone to the distal zone. Three domains, which are the Reed Bank-Palawan Rift domain, the Dangerous Grounds Central Detachment domain and Nam Con Son Exhumation domain, reflect the propagation of the margin rifting developed initially by grabens formed by high angle faults, then large half-grabens controlled by listric faults and detachments and finally rotated fault blocks in the hyper-extended upper crust associated with missing lower crust or exhumed mantle revealing a migration and stepwise rifting process in the south margin of the SCS.

  8. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a

  9. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  10. Algorithms for a parallel implementation of Hidden Markov Models with a small state space

    DEFF Research Database (Denmark)

    Nielsen, Jesper; Sand, Andreas

    2011-01-01

    Two of the most important algorithms for Hidden Markov Models are the forward and the Viterbi algorithms. We show how formulating these using linear algebra naturally lends itself to parallelization. Although the obtained algorithms are slow for Hidden Markov Models with large state spaces...

  11. Dangerousness and mental health policy.

    Science.gov (United States)

    Hewitt, J L

    2008-04-01

    Mental health policy development in the UK has become increasingly dominated by the assumed need to prevent violence and alleviate public concerns about the dangers of the mentally ill living in the community. Risk management has become the expected focus of contemporary mental health services, and responsibility has increasingly been devolved to individual service professionals when systems fail to prevent violence. This paper analyses the development of mental health legislation and its impact on services users and mental health professionals at the micro level of service delivery. Historical precedence, media influence and public opinion are explored, and the reification of risk is questioned in practical and ethical terms. The government's newest proposals for compulsory treatment in the community are discussed in terms of practical efficacy and therapeutic impact. Dangerousness is far from being an objectively observable phenomenon arising from clinical pathology, but is a formulation of what is partially knowable through social analysis and unknowable by virtue of its situation in individual psychic motivation. Risk assessment can therefore never be completely accurate, and the solution of a 'better safe than sorry' approach to mental health policy is ethically and pragmatically flawed.

  12. Testing string vacua in the lab. From a hidden CMB to dark forces in flux compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Cicoli, Michele; Goodsell, Mark; Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Hamburg (Germany). Theory Group; Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenolgy

    2011-03-15

    We perform a detailed analysis of the phenomenological properties of hidden Abelian gauge bosons with a kinetic mixing with the ordinary photon within type IIB flux compactifications. We study the interplay between moduli stabilisation and the Green-Schwarz mechanism that gives mass to the hidden photon paying particular attention to the role of D-terms. We present two generic classes of explicit Calabi-Yau examples with an isotropic and an anisotropic shape of the extra dimensions showing how the last case turns out to be very promising to make contact with current experiments. In fact, anisotropic compactifications lead naturally to a GeV-scale hidden photon (''dark forces'' that can be searched for in beam dump experiments) for an intermediate string scale; or even to an meV-scale hidden photon (which could lead to a ''hidden CMB'' and can be tested by light-shining-through-a-wall experiments) in the case of TeV-scale strings. (orig.)

  13. Has Bell's inequality a general meaning for hidden-variable theories

    International Nuclear Information System (INIS)

    Lochak, G.

    1976-01-01

    The proof given by J. S. Bell of an inequality between mean values of measurement results which, according to him, would be characteristic of any local hidden-parameter theory, is analyzed. It is shown that Bell's proof is based upon a hypothesis already contained in von Neumann's famous theorem: It consists in the admission that hidden values of parameters must obey the same statistical laws as observed values. This hypothesis contradicts in advance well known and certainly correct statistical relations in measurement results: one must therefore reject the type of theory considered by Bell, and his inequality has no general meaning

  14. HeadsUp: Keeping Pedestrian Phone Addicts from Dangers Using Mobile Phone Sensors

    OpenAIRE

    Zhou, Zhengjuan

    2015-01-01

    Walking while staring at the mobile phone is dangerous, and the danger mainly arises from distraction. While watching the mobile phone, one could fall into a deep well without noticing the manhole cover was missing, one could be hit by a rushing car without observing the traffic light, and so forth. Some mobile phone users are already aware of the crisis, and they keep looking up and down to allocate some focus to danger spying; however, the statistics data revealed by US government make such...

  15. FIRES: Fire Information Retrieval and Evaluation System - A program for fire danger rating analysis

    Science.gov (United States)

    Patricia L. Andrews; Larry S. Bradshaw

    1997-01-01

    A computer program, FIRES: Fire Information Retrieval and Evaluation System, provides methods for evaluating the performance of fire danger rating indexes. The relationship between fire danger indexes and historical fire occurrence and size is examined through logistic regression and percentiles. Historical seasonal trends of fire danger and fire occurrence can be...

  16. Swallowing sound detection using hidden markov modeling of recurrence plot features

    International Nuclear Information System (INIS)

    Aboofazeli, Mohammad; Moussavi, Zahra

    2009-01-01

    Automated detection of swallowing sounds in swallowing and breath sound recordings is of importance for monitoring purposes in which the recording durations are long. This paper presents a novel method for swallowing sound detection using hidden Markov modeling of recurrence plot features. Tracheal sound recordings of 15 healthy and nine dysphagic subjects were studied. The multidimensional state space trajectory of each signal was reconstructed using the Taken method of delays. The sequences of three recurrence plot features of the reconstructed trajectories (which have shown discriminating capability between swallowing and breath sounds) were modeled by three hidden Markov models. The Viterbi algorithm was used for swallowing sound detection. The results were validated manually by inspection of the simultaneously recorded airflow signal and spectrogram of the sounds, and also by auditory means. The experimental results suggested that the performance of the proposed method using hidden Markov modeling of recurrence plot features was superior to the previous swallowing sound detection methods.

  17. Swallowing sound detection using hidden markov modeling of recurrence plot features

    Energy Technology Data Exchange (ETDEWEB)

    Aboofazeli, Mohammad [Faculty of Engineering, Department of Electrical and Computer Engineering, University of Manitoba, Winnipeg, Manitoba, R3T 5V6 (Canada)], E-mail: umaboofa@cc.umanitoba.ca; Moussavi, Zahra [Faculty of Engineering, Department of Electrical and Computer Engineering, University of Manitoba, Winnipeg, Manitoba, R3T 5V6 (Canada)], E-mail: mousavi@ee.umanitoba.ca

    2009-01-30

    Automated detection of swallowing sounds in swallowing and breath sound recordings is of importance for monitoring purposes in which the recording durations are long. This paper presents a novel method for swallowing sound detection using hidden Markov modeling of recurrence plot features. Tracheal sound recordings of 15 healthy and nine dysphagic subjects were studied. The multidimensional state space trajectory of each signal was reconstructed using the Taken method of delays. The sequences of three recurrence plot features of the reconstructed trajectories (which have shown discriminating capability between swallowing and breath sounds) were modeled by three hidden Markov models. The Viterbi algorithm was used for swallowing sound detection. The results were validated manually by inspection of the simultaneously recorded airflow signal and spectrogram of the sounds, and also by auditory means. The experimental results suggested that the performance of the proposed method using hidden Markov modeling of recurrence plot features was superior to the previous swallowing sound detection methods.

  18. Hidden conformal symmetry of a rotating black hole with four charges

    International Nuclear Information System (INIS)

    Shao Kainan; Zhang Zhibai

    2011-01-01

    Kerr/CFT correspondence exhibits many remarkable connections between the near-horizon Kerr black hole and a conformal field theory (CFT). Recently, Castro, Maloney, and Strominger showed that a hidden conformal symmetry exists in the solution space of a Kerr black hole. In this paper we investigate a rotating black hole with four independent U(1) charges derived from string theory which is known as the four-dimensional Cvetic-Youm solution, and we prove that the same hidden conformal symmetry also holds. We obtain the exact black hole entropy using the temperatures derived. The entropy and absorption cross section agree with the previous results [M. Cvetic and F. Larsen, Nucl. Phys. B506, 107 (1997).] and [M. Cvetic and F. Larsen, J. High Energy Phys. 09 (2009) 088.]. In addition, we clarify a previous explanation on the temperatures of the Cvetic-Youm solution's dual CFT. This work provides more robust derivation of the hidden conformal symmetry of Kerr-like black holes and as well as Kerr/CFT correspondence.

  19. Implications of the measured angular anisotropy at the hidden order transition of URu2Si2

    Science.gov (United States)

    Chandra, P.; Coleman, P.; Flint, R.; Trinh, J.; Ramirez, A. P.

    2018-05-01

    The heavy fermion compound URu2Si2 continues to attract great interest due to the long-unidentified nature of the hidden order that develops below 17.5 K. Here we discuss the implications of an angular survey of the linear and nonlinear susceptibility of URu2Si2 in the vicinity of the hidden order transition [1]. While the anisotropic nature of spin fluctuations and low-temperature quasiparticles was previously established, our recent results suggest that the order parameter itself has intrinsic Ising anisotropy, and that moreover this anisotropy extends far above the hidden order transition. Consistency checks and subsequent questions for future experimental and theoretical studies of hidden order are discussed.

  20. 2012 drug packaging review: many dangerous, reportable flaws.

    Science.gov (United States)

    2013-05-01

    Drug packaging plays an important role in protecting and providing information to patients. The packaging examined by Prescrire in 2012, on the whole, still fails to perform all of these functions effectively. Two issues are especially worrisome. First, packaging too often poses a danger to children. In addition, too many patient leaflets provide incomplete information about adverse effects, thus failing to properly protect the most vulnerable patients. Yet, the method Prescrire used to analyse drug packaging shows that it is not difficult to detect and anticipate risks. It is up to healthcare professionals to take advantage of the method, to protect patients from, and report, dangerous packaging.

  1. The Dangers of Aestheticism in Schooling.

    Science.gov (United States)

    Meager, Ruby

    1981-01-01

    Prompted by Immanuel Kant's analysis of the nature and operations of the imagination in his "Critique of the Aesthetical Judgment," this article points out the danger of encouraging imagination-borne aesthetical judgments and explanatory hypotheses. Concludes that understanding requires submission to more stringent standards of objectivity and to…

  2. Dangers of peace journalism

    Directory of Open Access Journals (Sweden)

    Wilhelm Kempf

    2016-10-01

    Full Text Available The sense of mission shared by some peace journalists is a dangerous attitude. All journalists can do to give peace a chance is to serve as mediators, helping conflict parties overcome the competitive misperceptions and societal beliefs that fuel conflict. If peace journalists try to promote and impose their own solutions, however, frustration is inevitable and will finally result in the search for an evildoer who can be made responsible. Thus by involving themselves in conflicts, journalists can become unintentional agents of conflict escalation.

  3. Hidden sector dark matter and the Galactic Center gamma-ray excess: a closer look

    Science.gov (United States)

    Escudero, Miguel; Witte, Samuel J.; Hooper, Dan

    2017-11-01

    Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case, we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. We also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.

  4. Hidden Sector Dark Matter and the Galactic Center Gamma-Ray Excess: A Closer Look

    Energy Technology Data Exchange (ETDEWEB)

    Escudero, Miguel; Witte, Samuel J.; Hooper, Dan

    2017-09-20

    Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case, we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. We also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.

  5. Regulations on handling dangerous objects in Japan (with particular reference to sodium)

    International Nuclear Information System (INIS)

    Nagai, M.

    1971-01-01

    Sodium is designated as a kind of dangerous object, so that special care has to be taken in handling or storing large amounts of sodium. Formal regulations on sodium handling in Japan are prescribed in Fire Service Law, which is supplemented by Rules on Handling Dangerous Objects. Since these regulations are not intended to be applied to large sodium circuits, some defects and inappropriate expressions might be found in them. An attempt is made here to pick up these problems and important points from Japanese regulations on handling dangerous objects with particular reference to sodium

  6. SystemVerilog assertions and functional coverage guide to language, methodology and applications

    CERN Document Server

    Mehta, Ashok B

    2013-01-01

    This book provides a hands-on, application-oriented guide to the language and methodology of both SystemVerilog Assertions and SytemVerilog Functional Coverage.  Readers will benefit from the step-by-step approach to functional hardware verification, which will enable them to uncover hidden and hard to find bugs, point directly to the source of the bug, provide for a clean and easy way to model complex timing checks and objectively answer the question 'have we functionally verified everything'.  Written by a professional end-user of both SystemVerilog Assertions and SystemVerilog Functional Co

  7. Cultural competence in medical education: aligning the formal, informal and hidden curricula.

    Science.gov (United States)

    Paul, David; Ewen, Shaun C; Jones, Rhys

    2014-12-01

    The concept of cultural competence has become reified by inclusion as an accreditation standard in the US and Canada, in New Zealand it is demanded through an Act of Parliament, and it pervades discussion in Australian medical education discourse. However, there is evidence that medical graduates feel poorly prepared to deliver cross-cultural care (Weissman et al. in J Am Med Assoc 294(9):1058-1067, 2005) and many commentators have questioned the effectiveness of cultural competence curricula. In this paper we apply Hafferty's taxonomy of curricula, the formal, informal and hidden curriculum (Hafferty in Acad Med 73(4):403-407, 1998), to cultural competence. Using an example across each of these curricular domains, we highlight the need for curricular congruence to support cultural competence development among learners. We argue that much of the focus on cultural competence has been in the realm of formal curricula, with existing informal and hidden curricula which may be at odds with the formal curriculum. The focus of the formal, informal and hidden curriculum, we contend, should be to address disparities in health care outcomes. In conclusion, we suggest that without congruence between formal, informal and hidden curricula, approaches to addressing disparity in health care outcomes in medical education may continue to represent reform without change.

  8. The Hidden Curriculum of Veterinary Education: Mediators and Moderators of Its Effects.

    Science.gov (United States)

    Roder, Carrie A; May, Stephen A

    The "hidden curriculum" has long been supposed to have an effect on students' learning during their clinical education, and in particular in shaping their ideas of what it means to be a professional. Despite this, there has been little evidence linking specific changes in professional attitudes to the individual components of the hidden curriculum. This study aimed to recognize those components that led to a change in students' professional attitudes at a UK veterinary school, as well as to identify the attitudes most affected. Observations were made of 11 student groups across five clinical rotations, followed by semi-structured interviews with 23 students at the end of their rotation experience. Data were combined and analyzed thematically, taking both an inductive and deductive approach. Views about the importance of technical competence and communication skills were promoted as a result of students' interaction with the hidden curriculum, and tensions were revealed in relation to their attitudes toward compassion and empathy, autonomy and responsibility, and lifestyle ethic. The assessment processes of rotations and the clinical service organization served to communicate the messages of the hidden curriculum, bringing about changes in student professional attitudes, while student-selected role models and the student rotation groups moderated the effects of these influences.

  9. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced Search Annual Meeting Clinical Education Practice Management Member ... Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced ... Subspecialties Cataract/Anterior Segment Comprehensive Ophthalmology Cornea/ ...

  10. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Center Global Ophthalmology Guide Find an Ophthalmologist Advanced Search Annual Meeting Clinical Education Practice Management Member Services ... Center Global Ophthalmology Guide Find an Ophthalmologist Advanced ... Subspecialties Cataract/Anterior Segment Comprehensive Ophthalmology Cornea/External ...

  11. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  12. A Rose By Other Names: Some General Musings on Lawrence and Colleagues' Hidden Curriculum Scoping Review.

    Science.gov (United States)

    Hafferty, Frederic W; Martimianakis, Maria Athina

    2017-11-07

    In this Commentary, the authors explore the scoping review by Lawrence and colleagues by challenging their conclusion that with over 25 years' worth of "ambiguous and seemingly ubiquitous use" of the hidden curriculum construct in health professions education scholarship, it is time to either move to a more uniform definitional foundation or abandon the term altogether. The commentary authors counter these remedial propositions by foregrounding the importance of theoretical diversity and the conceptual richness afforded when the hidden curriculum construct is used as an entry point for studying the interstitial space between the formal and a range of other-than-formal domains of learning. Further, they document how tightly-delimited scoping strategies fail to capture the wealth of educational scholarship that operates within a hidden curriculum framework, including "hidden" hidden curriculum articles, studies that employ alternative constructs, and investigations that target important tacit socio-cultural influences on learners and faculty without formally deploying the term. They offer examples of how the hidden curriculum construct, while undergoing significant transformation in its application within the field of health professions education, has created the conceptual foundation for the application of a number of critical perspectives that make visible the field's political investments in particular forms of knowing and associated practices. Finally, the commentary authors invite readers to consider the methodological promise afforded by conceptual heterogeneity, particularly strands of scholarship that resituate the hidden curriculum concept within the magically expansive dance of social relationships, social learning, and social life that form the learning environments of health professions education.

  13. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Education Center Redmond Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced Search Annual Meeting Clinical Education ... Education Center Redmond Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced Search Subspecialties Cataract/Anterior Segment ...

  14. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Academy Publications EyeNet Ophthalmology ... Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced ...

  15. Locality or non-locality in quantum mechanics: hidden variables without ''spooky action-at-a-distance''

    International Nuclear Information System (INIS)

    Aharonov, Y.; Scully, M.

    2001-01-01

    The folklore notion of the ''Non-Locality of Quantum Mechanics'' is examined from the point of view of hidden-variables theories according to Belinfante's classification in his Survey of Hidden Variables Theories. It is here shown that in the case of EPR, there exist hidden variables theories that successfully reproduce quantum-mechanical predictions, but which are explicitly local. Since such theories do not fall into Belinfante's classification, we propose an expanded classification which includes similar theories, which we term as theories of the ''third'' kind. Causal implications of such theories are explored. (orig.)

  16. Hidden magnetism in periodically modulated one dimensional dipolar fermions

    Science.gov (United States)

    Fazzini, S.; Montorsi, A.; Roncaglia, M.; Barbiero, L.

    2017-12-01

    The experimental realization of time-dependent ultracold lattice systems has paved the way towards the implementation of new Hubbard-like Hamiltonians. We show that in a one-dimensional two-components lattice dipolar Fermi gas the competition between long range repulsion and correlated hopping induced by periodically modulated on-site interaction allows for the formation of hidden magnetic phases, with degenerate protected edge modes. The magnetism, characterized solely by string-like nonlocal order parameters, manifests in the charge and/or in the spin degrees of freedom. Such behavior is enlighten by employing Luttinger liquid theory and numerical methods. The range of parameters for which hidden magnetism is present can be reached by means of the currently available experimental setups and probes.

  17. Dangers of environmental pollution

    International Nuclear Information System (INIS)

    Schaer, M.

    1978-01-01

    Environmental pollution is ever increasing. Protection of the environment must not be neglected for economic reasons. Damage to health due to environmental effects is hard to determine epidemiologically as there are nearly always several causes to consider at the same time. Still, the increase in environmental pollution results in increased damage to humans, animals, and plants. The many dangers to health can be illustrated by the example of energy demand and the different ways to meet it. It is highly necessary to create environmental laws which aim at a reduction of environmental pollution. (orig.) [de

  18. Identification of hidden failures in control systems: a functional modelling approach

    International Nuclear Information System (INIS)

    Jalashgar, A.; Modarres, M.

    1996-01-01

    This paper presents a model which encompasses knowledge about a process control system's functionalities in a function-oriented failure analysis task. The technique called Hybrid MFM-GTST, mainly utilizes two different function - oriented methods (MFM and GTST) to identify all functions of the system components, and hence possible sources of hidden failures in process control systems. Hidden failures are referred to incipient failures within the system that in long term may lead to loss of major functions. The features of the method are described and demonstrated by using an example of a process control system

  19. Heisenberg (and Schrödinger, and Pauli) on hidden variables

    Science.gov (United States)

    Bacciagaluppi, Guido; Crull, Elise

    In this paper, we discuss various aspects of Heisenberg's thought on hidden variables in the period 1927-1935. We also compare Heisenberg's approach to others current at the time, specifically that embodied by von Neumann's impossibility proof, but also views expressed mainly in correspondence by Pauli and by Schrödinger. We shall base ourselves mostly on published and unpublished materials that are known but little-studied, among others Heisenberg's own draft response to the EPR paper. Our aim will be not only to clarify Heisenberg's thought on the hidden-variables question, but in part also to clarify how this question was understood more generally at the time.

  20. Augustine on the Dangers of Friendship

    NARCIS (Netherlands)

    Nawar, Tamer

    2015-01-01

    The philosophers of antiquity had much to say about the place of friendship in the good life and its role in helping us live virtuously. Augustine is unusual in giving substantial attention to the dangers of friendship and its potential to serve as an obstacle (rather than an aid) to virtue. Despite

  1. Anti-pairing in learning of a neural network with redundant hidden units

    International Nuclear Information System (INIS)

    Kwon, Chulan; Kim, Hyong Kyun

    2005-01-01

    We study the statistical mechanics of learning from examples between the two-layered committee machines with different numbers of hidden units using the replica theory. The number M of hidden units of the student network is larger than the number M T of those of the target network called the teacher. We choose the networks to have binary synaptic weights, ±1, which makes it possible to compare the calculation with the Monte Carlo simulation. We propose an effective teacher as a virtual target network which has the same M hidden units as the student and gives identical outputs with those of the original teacher. This is a way of making a conjecture for a ground state of a thermodynamic system, given by the weights of the effective teacher in our study. We suppose that the weights on M T hidden units of the effective teacher are the same as those of the original teacher while those on M - M T redundant hidden units are composed of anti-pairs, {1, - 1}, with probability 1 - p in the limit p → 0. For p = 0 exact, there are no terms related to the effective teacher in the calculation, for the contributions of anti-pairs to outputs are exactly cancelled. In the limit p → 0, however, we find that the learnt weights of the student are actually equivalent to those of the suggested effective teacher, which is not possible from the calculation for p = 0. p plays the role of a symmetry breaking parameter for anti-pairing ordering, which is analogous to the magnetic field for the Ising model. A first-order phase transition is found to be signalled by breaking of symmetry in permuting hidden units. Above a critical number of examples, the student is shown to learn perfectly the effective teacher. Anti-pairing can be measured by a set of order parameters; zero in the permutation-symmetric phase and nonzero in the permutation symmetry breaking phase. Results from the Monte Carlo simulation are shown to be in good agreement with those from the replica calculation

  2. Liability in maritime transport of dangerous goods

    International Nuclear Information System (INIS)

    Feldhaus, H.

    1985-01-01

    The first part contains a description of national liability standards for maritime transport in the French, English, US-American and West German legislation. This is followed up by a detailed review of the existing international agreements. The book is rounded off by a critical evaluation of the presently held discussion and suggested solutions on the problems of liability in the maritime transport of dangerous goods other than mineral oil. The author takes a close look at the 'Entwurf eines Internationalen Uebereinkommens ueber die Haftung und den Schadenersatz bei der Befoerderung schaedlicher und gefaehrlicher Stoffe auf See' ('draft of an international agreement on liability and compensation for damage in maritime transport of noxious and dangerous goods') in the version of May 23, 1983, which was discussed on an international diplomat's conference in London without however, yielding any concrete results. (orig./HP) [de

  3. Nonradioactive Dangerous Waste Landfill supplemental information to the Hanford Facility Contingency Plan (DOE/RL-93-75)

    International Nuclear Information System (INIS)

    Ingle, S.J.

    1996-05-01

    This document is a unit-specific contingency plan for the Nonradioactive Dangerous Waste Landfill and is intended to be used as a supplement to DOE/RL-93-75, 'Hanford Facility Contingency Plan.' This unit-specific plan is to be used to demonstrate compliance with the contingency plan requirements of the Washington Administrative Code, Chapter 173-303 for certain Resource, Conservation and Recovery Act of 1976 waste management units. The Nonradioactive Dangerous Waste Landfill (located approximately 3.5 miles southeast of the 200 East Area at the Hanford Site) was used for disposal of nonradioactive dangerous waste from January 1975 to May 1985. Currently, there are no dangerous waste streams disposed in the Nonradioactive Dangerous Waste Landfill. Dangerous waste management activities are no longer required at the landfill. The landfill does not present a significant hazard to adjacent units, personnel, or the environment. It is unlikely that incidents presenting hazards to public health or the environment would occur at the Nonradioactive Dangerous Waste Landfill

  4. Hidden acoustic information revealed by intentional nonlinearity

    Science.gov (United States)

    Dowling, David R.

    2017-11-01

    Acoustic waves are omnipresent in modern life and are well described by the linearized equations of fluid dynamics. Once generated, acoustic waves carry and collect information about their source and the environment through which they propagate, respectively, and this information may be retrieved by analyzing recordings of these waves. Because of this, acoustics is the primary means for observation, surveillance, reconnaissance, and remote sensing in otherwise opaque environments, such as the Earth's oceans and crust, and the interior of the human body. For such information-retrieval tasks, acoustic fields are nearly always interrogated within their recorded frequency range or bandwidth. However, this frequency-range restriction is not general; acoustic fields may also carry (hidden) information at frequencies outside their bandwidth. Although such a claim may seem counter intuitive, hidden acoustic-field information can be revealed by re-introducing a marquee trait of fluid dynamics: nonlinearity. In particular, an intentional quadratic nonlinearity - a form of intra-signal heterodyning - can be used to obtain acoustic field information at frequencies outside a recorded acoustic field's bandwidth. This quadratic nonlinearity enables a variety of acoustic remote sensing applications that were long thought to be impossible. In particular, it allows the detrimental effects of sparse recordings and random scattering to be suppressed when the original acoustic field has sufficient bandwidth. In this presentation, the topic is developed heuristically, with a just brief exposition of the relevant mathematics. Hidden acoustic field information is then revealed from simulated and measured acoustic fields in simple and complicated acoustic environments involving frequencies from a few Hertz to more than 100 kHz, and propagation distances from tens of centimeters to hundreds of kilometers. Sponsored by ONR, NAVSEA, and NSF.

  5. 224-T Transuranic Waste Storage and Assay Facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1992-01-01

    Westinghouse Hanford Company is a major contractor to the US Department of Energy Richland Field Office and serves as cooperator of the 224-T Transuranic Waste Storage and Assay Facility, the storage unit addressed in this permit application. At the time of submission of this portion of the Hanford Facility. Dangerous Waste Permit Application covering the 224-T Transuranic Waste Storage and Assay Facility, many issues identified in comments to the draft Hanford Facility Dangerous Waste Permit remain unresolved. This permit application reflects the positions taken by the US Department of Energy, Company on the draft Hanford Facility Dangerous Waste Permit and may not be read to conflict with those comments. The 224-T Transuranic Waste Storage and Assay Facility Dangerous Waste Permit Application (Revision 0) consists of both a Part A and Part B permit application. An explanation of the Part A revisions associated with this unit, including the Part A revision currently in effect, is provided at the beginning of the Part A section. The Part B consists of 15 chapters addressing the organization and content of the Part B Checklist prepared by the Washington State Department of Ecology (Ecology 1987). The 224-T Transuranic Waste Storage and Assay Facility Dangerous Waste Permit Application contains information current as of March 1, 1992

  6. Hidden neuronal correlations in cultured networks

    International Nuclear Information System (INIS)

    Segev, Ronen; Baruchi, Itay; Hulata, Eyal; Ben-Jacob, Eshel

    2004-01-01

    Utilization of a clustering algorithm on neuronal spatiotemporal correlation matrices recorded during a spontaneous activity of in vitro networks revealed the existence of hidden correlations: the sequence of synchronized bursting events (SBEs) is composed of statistically distinguishable subgroups each with its own distinct pattern of interneuron spatiotemporal correlations. These findings hint that each of the SBE subgroups can serve as a template for coding, storage, and retrieval of a specific information

  7. Liquid effluent retention facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1991-06-01

    This appendix to the Liquid Effluent Retention Facility Dangerous Waste Permit Application contains pumps, piping, leak detection systems, geomembranes, leachate collection systems, earthworks and floating cover systems

  8. Hanford facility dangerous waste permit application, general information portion. Revision 3

    International Nuclear Information System (INIS)

    Sonnichsen, J.C.

    1997-01-01

    For purposes of the Hanford facility dangerous waste permit application, the US Department of Energy's contractors are identified as ''co-operators'' and sign in that capacity (refer to Condition I.A.2. of the Dangerous Waste Portion of the Hanford Facility Resource Conservation and Recovery Act Permit). Any identification of these contractors as an ''operator'' elsewhere in the application is not meant to conflict with the contractors' designation as co-operators but rather is based on the contractors' contractual status with the U.S. Department of Energy, Richland Operations Office. The Dangerous Waste Portion of the initial Hanford Facility Resource Conservation and Recovery Act Permit, which incorporated five treatment, storage, and/or disposal units, was based on information submitted in the Hanford Facility Dangerous Waste Permit Application and in closure plan and closure/postclosure plan documentation. During 1995, the Dangerous Waste Portion was modified twice to incorporate another eight treatment, storage, and/or disposal units; during 1996, the Dangerous Waste Portion was modified once to incorporate another five treatment, storage, and/or disposal units. The permit modification process will be used at least annually to incorporate additional treatment, storage, and/or disposal units as permitting documentation for these units is finalized. The units to be included in annual modifications are specified in a schedule contained in the Dangerous Waste Portion of the Hanford Facility Resource Conservation and Recovery Act Permit. Treatment, storage, and/or disposal units will remain in interim status until incorporated into the Permit. The Hanford Facility Dangerous Waste Permit Application is considered to be a single application organized into a General Information Portion (this document, DOE/RL-91-28) and a Unit-Specific Portion. The scope of the Unit-Specific Portion is limited to individual operating treatment, storage, and/or disposal units for which

  9. Hanford facility dangerous waste permit application, general information portion. Revision 3

    Energy Technology Data Exchange (ETDEWEB)

    Sonnichsen, J.C.

    1997-08-21

    For purposes of the Hanford facility dangerous waste permit application, the US Department of Energy`s contractors are identified as ``co-operators`` and sign in that capacity (refer to Condition I.A.2. of the Dangerous Waste Portion of the Hanford Facility Resource Conservation and Recovery Act Permit). Any identification of these contractors as an ``operator`` elsewhere in the application is not meant to conflict with the contractors` designation as co-operators but rather is based on the contractors` contractual status with the U.S. Department of Energy, Richland Operations Office. The Dangerous Waste Portion of the initial Hanford Facility Resource Conservation and Recovery Act Permit, which incorporated five treatment, storage, and/or disposal units, was based on information submitted in the Hanford Facility Dangerous Waste Permit Application and in closure plan and closure/postclosure plan documentation. During 1995, the Dangerous Waste Portion was modified twice to incorporate another eight treatment, storage, and/or disposal units; during 1996, the Dangerous Waste Portion was modified once to incorporate another five treatment, storage, and/or disposal units. The permit modification process will be used at least annually to incorporate additional treatment, storage, and/or disposal units as permitting documentation for these units is finalized. The units to be included in annual modifications are specified in a schedule contained in the Dangerous Waste Portion of the Hanford Facility Resource Conservation and Recovery Act Permit. Treatment, storage, and/or disposal units will remain in interim status until incorporated into the Permit. The Hanford Facility Dangerous Waste Permit Application is considered to be a single application organized into a General Information Portion (this document, DOE/RL-91-28) and a Unit-Specific Portion. The scope of the Unit-Specific Portion is limited to individual operating treatment, storage, and/or disposal units for which

  10. Low energy theorems of hidden local symmetries

    International Nuclear Information System (INIS)

    Harada, Masayasu; Kugo, Taichiro; Yamawaki, Koichi.

    1994-01-01

    We prove to all orders of the loop expansion the low energy theorems of hidden local symmetries in four-dimensional nonlinear sigma models based on the coset space G/H, with G and H being arbitrary compact groups. Although the models are non-renormalizable, the proof is done in an analogous manner to the renormalization proof of gauge theories and two-dimensional nonlinear sigma models by restricting ourselves to the operators with two derivatives (counting a hidden gauge boson field as one derivative), i.e., with dimension 2, which are the only operators relevant to the low energy limit. Through loop-wise mathematical induction based on the Ward-Takahashi identity for the BRS symmetry, we solve renormalization equation for the effective action up to dimension-2 terms plus terms with the relevant BRS sources. We then show that all the quantum corrections to the dimension-2 operators, including the finite parts as well as the divergent ones, can be entirely absorbed into a re-definition (renormalization) of the parameters and the fields in the dimension-2 part of the tree-level Lagrangian. (author)

  11. Adult-acquired hidden penis in obese patients: a critical survey of the literature.

    Science.gov (United States)

    Cavayero, Chase T; Cooper, Meghan A; Harlin, Stephen L

    2015-03-01

    Hidden penis is anatomically defined by a lack of firm attachments of the skin and dartos fascia to the underlying Buck fascia. To critically appraise the research evidence that could support the most effective surgical techniques for adult-acquired hidden penis in obese patients. Studies investigating patients with a diagnosis of hidden penis were identified. Of these studies, only those with adult patients classified as overweight or obese (body mass index >25) were included in the review. Three reviewers examined the abstracts of the studies identified in the initial Medline search, and abstracts considered potentially relevant underwent full-text review. Studies that included patients with congenital, iatrogenic (eg, circumcision issues or aesthetic genital surgery), or traumatic causes of hidden penis were excluded. Studies that did not define the diagnostic criteria for hidden penis were excluded to minimize the risk of definition bias. The quality of evidence for each study was determined after considering the following sources of bias: method of allocation to study groups, data analysis, presence of baseline differences between groups, objectivity of outcome, and completeness of follow-up. Using these criteria, studies were then graded as high, moderate, or low in quality. Seven studies with a total of 119 patients met the inclusion criteria. All but 1 of the studies were nonrandomized. One study provided a clear presentation of results and appropriate statistical analysis. Six studies accounted for individual-based differences, and 1 study failed to account for baseline differences altogether. Four studies addressed follow-up. One study was of high quality, 2 were of moderate quality, and 4 were of low quality. Building a clinical practice guideline for the surgical management of hidden penis has proven difficult because of a lack of high-quality, statistically significant data in the research synthesis. The authors elucidate the challenges and epitomize

  12. Teens and Steroids: A Dangerous Combo

    Science.gov (United States)

    ... Endocrinology Products, warns teens and parents about the dangers of steroid use. Q: What are anabolic steroids ... لعربية | Kreyòl Ayisyen | Français | Polski | Português | Italiano | Deutsch | 日本語 | ف ...

  13. Overcoming negative tendencies concerning public attitude to potentially dangerous technologies

    International Nuclear Information System (INIS)

    Barinov, A.; Shmelev, S.

    1995-01-01

    The Moscow Scientific industrial Association RADON is an enterprise with potentially dangerous technology. RADON fulfils the collection, transportation, treatment and disposal of radioactive waste from Moscow region. The inhabitants of this region consider it, and that is true, to be essentially dangerous. We understood, that it is necessary to change the situation and give the public the true information about RADON's activity. For this purpose 4 years ago we developed a new Department, the Department or External Relations

  14. Mental Health and Teens: Watch for Danger Signs

    Science.gov (United States)

    ... Gradeschool Teen Dating & Sex Fitness Nutrition Driving Safety School Substance Use Young Adult Healthy Children > Ages & Stages > Teen > Mental Health and Teens: Watch for Danger Signs Ages & Stages ...

  15. Constraints on hidden photons from current and future observations of CMB spectral distortions

    International Nuclear Information System (INIS)

    Kunze, Kerstin E.; Vázquez-Mozo, Miguel Á.

    2015-01-01

    A variety of beyond the standard model scenarios contain very light hidden sector U(1) gauge bosons undergoing kinetic mixing with the photon. The resulting oscillation between ordinary and hidden photons leads to spectral distortions of the cosmic microwave background. We update the bounds on the mixing parameter χ 0 and the mass of the hidden photon m γ' for future experiments measuring CMB spectral distortions, such as PIXIE and PRISM/COrE. For 10 −14  eV∼< m γ' ∼< 10 −13  eV, we find the kinetic mixing angle χ 0 has to be less than 10 −8 at 95% CL. These bounds are more than an order of magnitude stronger than those derived from the COBE/FIRAS data

  16. Home-Explorer: Ontology-Based Physical Artifact Search and Hidden Object Detection System

    Directory of Open Access Journals (Sweden)

    Bin Guo

    2008-01-01

    Full Text Available A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses sensors attached to the everyday artifacts (called smart objects in the real world. This paper makes two main contributions: First, it addresses, the robustness of the embedded sensors, which is seldom discussed in previous smart artifact research. Because sensors may sometimes be broken or fail to work under certain conditions, smart objects become hidden ones. However, current systems provide no mechanism to detect and manage objects when this problem occurs. Second, there is no common context infrastructure for building smart artifact systems, which makes it difficult for separately developed applications to interact with each other and uneasy for them to share and reuse knowledge. Unlike previous systems, Home-Explorer builds on an ontology-based knowledge infrastructure named Sixth-Sense, which makes it easy for the system to interact with other applications or agents also based on this ontology. The hidden object problem is also reflected in our ontology, which enables Home-Explorer to deal with both smart objects and hidden objects. A set of rules for deducing an object's status or location information and for locating hidden objects are described and evaluated.

  17. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...... functions are also discussed....

  18. Hidden hyperchaos and electronic circuit application in a 5D self-exciting homopolar disc dynamo

    Science.gov (United States)

    Wei, Zhouchao; Moroz, Irene; Sprott, J. C.; Akgul, Akif; Zhang, Wei

    2017-03-01

    We report on the finding of hidden hyperchaos in a 5D extension to a known 3D self-exciting homopolar disc dynamo. The hidden hyperchaos is identified through three positive Lyapunov exponents under the condition that the proposed model has just two stable equilibrium states in certain regions of parameter space. The new 5D hyperchaotic self-exciting homopolar disc dynamo has multiple attractors including point attractors, limit cycles, quasi-periodic dynamics, hidden chaos or hyperchaos, as well as coexisting attractors. We use numerical integrations to create the phase plane trajectories, produce bifurcation diagram, and compute Lyapunov exponents to verify the hidden attractors. Because no unstable equilibria exist in two parameter regions, the system has a multistability and six kinds of complex dynamic behaviors. To the best of our knowledge, this feature has not been previously reported in any other high-dimensional system. Moreover, the 5D hyperchaotic system has been simulated using a specially designed electronic circuit and viewed on an oscilloscope, thereby confirming the results of the numerical integrations. Both Matlab and the oscilloscope outputs produce similar phase portraits. Such implementations in real time represent a new type of hidden attractor with important consequences for engineering applications.

  19. PERBANDINGAN ALGORITMA HIDDEN SPACE REMOVAL: Z-UFFER DAN SCANLINE DILIHAT DARI PENGGUNAAN MEMORI DAN KECEPATAN

    Directory of Open Access Journals (Sweden)

    Djoni Haryadi Setiabudi

    2001-01-01

    Full Text Available Hidden surface removal is an algorithm used to hide part of the object which is blocked by the object in front of it. If there are two plane crossed each other displayed without Hidden surface removal algorithm, the crossing section is invisible, because one object will block another object without crossing. The crossing sections can be displayed using Hidden surface removal algorithm. Z buffer algorithm implements Hidden Surface Removal by entering color and depth of the visible plane into the buffer, then displays the result on the screen. Scan Line algorithm will scanning the screen row by row of each object surface in three dimension and then displays on the screen after each row scanning. Both of the algorithms will be compared based on the memory usage dan time needed to execute. The experiment shows that Scanline algorithm uses less memory compared with Z-Buffer algoritm. Furthermore, based on the speed, the Scanline is better than the Z-Buffer if the object is collected on the y row, but the Z-Buffer is better than the Scanline if the object scattered and used all rows on the drawing plane and has more surface do displayed. Abstract in Bahasa Indonesia : Hidden surface removal adalah suatu algoritma yang digunakan untuk menghilangkan penampilan bagian yang tertutup oleh objek yang didepannya. Apabila ada dua bidang yang berpotongan, apabila ditampilkan biasa tanpa menggunakan algoritma Hidden surface removal maka bagian yang berpotongan itu akan tidak kelihatan, oleh karena bidang yang satu ditutupi oleh bagian yang lain tanpa memotong. Oleh karena itu untuk menampilkan bidang perpotongan, diperlukan Algoritma Hidden surface removal. Algoritma Z buffer melaksanakan proses Hidden Surface Removal dengan memasukkan warna dan kedalaman bidang permukaan yang tampak ke dalam buffer, dan kemudian setelah selesai hasilnya ditampilkan ke layar. Algoritma Scan Line melakukan scanning untuk setiap baris dari layar bidang gambar untuk setiap

  20. Search for dark matter in the hidden-photon sector with a large spherical mirror

    CERN Document Server

    Veberic, Darko; Doebrich, Babette; Engel, Ralph; Jaeckel, Joerg; Kowalski, Marek; Lindner, Axel; Mathes, Hermann-Josef; Redondo, Javier; Roth, Markus; Schaefer, Christoph; Ulrich, Ralf

    2015-01-01

    If dark matter consists of hidden-sector photons which kinetically mix with regular photons, a tiny oscillating electric-field component is present wherever we have dark matter. In the surface of conducting materials this induces a small probability to emit single photons almost perpendicular to the surface, with the corresponding photon frequency matching the mass of the hidden photons. We report on a construction of an experimental setup with a large ~14 m2 spherical metallic mirror that will allow for searches of hidden-photon dark matter in the eV and sub-eV range by application of different electromagnetic radiation detectors. We discuss sensitivity and accessible regions in the dark matter parameter space.

  1. Bayesian structural inference for hidden processes

    Science.gov (United States)

    Strelioff, Christopher C.; Crutchfield, James P.

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ɛ-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ɛ-machines, irrespective of estimated transition probabilities. Properties of ɛ-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  2. Hidden ion population of the magnetosphere

    International Nuclear Information System (INIS)

    Olsen, R.C.

    1982-01-01

    Particle data from two geosynchronous satellites (Applied Technology Satellite 6 and SCATHA) show a normally hidden ion population appearing when the satellites are in the earth's shadow. Ion and electron data show the spacecraft potential dropping from +10 V in sunlight to +4 and +5 V in eclipse at local midnight, in low-energy (T/sub e/ -2 ), isotropic ion population appears which was invisible in sunlight because of the larger positive spacecraft potential. Higher-energy populations generally cover the tails of the hidden ion populations, so they cannot be inferred from daylight data. The isotropic populations appears only in a few percent of the spacecraft eclipse events, appearing only at times of low Kp (2 or less, preceded by a day with Σ Kp< or =20). A low-energy (T = 1--2 eV) field-aligned population often appears with and without the isotropic population, at slightly higher flux levels. These fluxes are visible in sunlight, but again the distribution functions obtained in eclipse differ from those that would be inferred from daylight data. Measurement of the thermal plasma population on a consistent basis, particularly in the plasma sheet, will require some method of controlling the detector potential with respect to the ambient plamsa

  3. Danger, hazard, risk

    International Nuclear Information System (INIS)

    Kafka, P.

    1992-01-01

    The real conditions covered by technical safety studies are described better by the term 'risk' instead of such qualitative terms as 'danger' or 'hazard'. 'Risk' incorporates not only the type of damage, the onset of damage, the probability of damage occurring, but also the extent of damage. In reliability and safety engineering, a probabilistic safety analysis is able to describe a plant most comprehensively by these three elements: What can happen? How frequently will it occur? What are the impacts to be taken into account? PSA is meaningful not only when applied to such technical areas in which there is a risk potential; the holistic analytical process optimizes any kind of system and plant in terms of availability and technical safety. (orig.) [de

  4. Prediction of Annual Rainfall Pattern Using Hidden Markov Model ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Hidden Markov model is very influential in stochastic world because of its ... the earth from the clouds. The usual ... Rainfall modelling and ... Markov Models have become popular tools ... environment sciences, University of Jos, plateau state,.

  5. On the approximation by single hidden layer feedforward neural networks with fixed weights

    OpenAIRE

    Guliyev, Namig J.; Ismailov, Vugar E.

    2017-01-01

    International audience; Feedforward neural networks have wide applicability in various disciplines of science due to their universal approximation property. Some authors have shown that single hidden layer feedforward neural networks (SLFNs) with fixed weights still possess the universal approximation property provided that approximated functions are univariate. But this phenomenon does not lay any restrictions on the number of neurons in the hidden layer. The more this number, the more the p...

  6. Danger Signs of Childhood Pneumonia: Caregiver Awareness and Care Seeking Behavior in a Developing Country

    Directory of Open Access Journals (Sweden)

    Ikenna K. Ndu

    2015-01-01

    Full Text Available Background. Efforts to reduce child mortality especially in Africa must as a necessity aim to decrease mortality due to pneumonia. To achieve this, preventive strategies such as expanding vaccination coverage are key. However once a child develops pneumonia prompt treatment which is essential to survival is dependent on mothers and caregiver recognition of the symptoms and danger signs of pneumonia. Methods. This community based cross-sectional study enrolled four hundred and sixty-six caregivers in Enugu state. It aimed to determine knowledge of caregivers about danger signs of pneumonia and the sociodemographic factors that influence knowledge and care seeking behaviour of caregivers. Results. There is poor knowledge of the aetiology and danger signs of pneumonia among caregivers. Higher maternal educational attainment and residence in semiurban area were significantly associated with knowledge of aetiology, danger signs, and vaccination of their children against pneumonia. Fast breathing and difficulty in breathing were the commonest known and experienced WHO recognized danger signs while fever was the commonest perceived danger sign among caregivers. Conclusion. Knowledge of danger signs and health seeking behaviour among caregivers is inadequate. There is need for intensified public and hospital based interventions targeted at mothers to improve their knowledge about pneumonia.

  7. On E(11) of M-theory: 1. Hidden Symmetries of Maximal Supergravities and Lego of Dynkin Diagrams

    International Nuclear Information System (INIS)

    Nurmagambetov, A.J.

    2007-01-01

    We review a graphical way of classifying hidden symmetry algebras and groups of D=11, 10 maximal supergravities in terms of Dynkin diagrams, the shapes of which are determined by the bosonic field content of supergravities supermultiplets. The approach we follow is tightly related to the West's conjecture on a hidden symmetry of M-theory, and we discuss benefits of the approach in compare to other ways of searching for hidden symmetries of String Theory

  8. Web-GIS platform for forest fire danger prediction in Ukraine: prospects of RS technologies

    Science.gov (United States)

    Baranovskiy, N. V.; Zharikova, M. V.

    2016-10-01

    There are many different statistical and empirical methods of forest fire danger use at present time. All systems have not physical basis. Last decade deterministic-probabilistic method is rapidly developed in Tomsk Polytechnic University. Forest sites classification is one way to estimate forest fire danger. We used this method in present work. Forest fire danger estimation depends on forest vegetation condition, forest fire retrospective, precipitation and air temperature. In fact, we use modified Nesterov Criterion. Lightning activity is under consideration as a high temperature source in present work. We use Web-GIS platform for program realization of this method. The program realization of the fire danger assessment system is the Web-oriented geoinformation system developed by the Django platform in the programming language Python. The GeoDjango framework was used for realization of cartographic functions. We suggest using of Terra/Aqua MODIS products for hot spot monitoring. Typical territory for forest fire danger estimation is Proletarskoe forestry of Kherson region (Ukraine).

  9. The Moral Challenge of Dangerous Climate Change: Values, Poverty, and Policy

    DEFF Research Database (Denmark)

    Crabtree, Andrew

    2016-01-01

    Book review of: The Moral Challenge of Dangerous Climate Change: Values, Poverty, and Policy by Darrel Moellendorf. New York: Cambridge University Press, 2014, pp. 263 (paperback), ISBN 978-1-107-67850-7......Book review of: The Moral Challenge of Dangerous Climate Change: Values, Poverty, and Policy by Darrel Moellendorf. New York: Cambridge University Press, 2014, pp. 263 (paperback), ISBN 978-1-107-67850-7...

  10. Generalized inequalities for quantum correlations with hidden variables

    International Nuclear Information System (INIS)

    Vinduska, M.

    1991-01-01

    Renowned inequalities for quantum correlations are generalized for the case when quantum system cannot be described with an absolute independent measure of the probability. Such a formulation appears to be suitable for the formulation of the hidden variables theory in terms of non-Euclidean geometry. 10 refs

  11. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving ...

  12. Securing Localization With Hidden and Mobile Base Stations

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Srivastava, Mani; Cagalj, Mario

    2006-01-01

    localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure nodecentric...

  13. Dangerous goods emergency response

    International Nuclear Information System (INIS)

    Price, K.

    1991-01-01

    This paper reports on a general overview of the State of Western Australia including: the legal framework of the Dangerous Goods and Emergency response management scenarios (which consist mainly of fuel products such as LP gas); particular problems unique to the Western Australian environment; what has been done to overcome those problems. Western Australia has an area of about two and a half million square kilometers. The demography of the State is such that the population is concentrated in the south-west corner of the State with isolated pockets, mainly associated with mineral development but also associated with agriculture, scattered throughout the State

  14. Parametric study of guided waves dispersion curves for composite plates

    Science.gov (United States)

    Predoi, Mihai Valentin; Petre, Cristian Cǎtǎlin; Kettani, Mounsif Ech Cherif El; Leduc, Damien

    2018-02-01

    Nondestructive testing of composite panels benefit from the relatively long range propagation of guided waves in sandwich structures. The guided waves are sensitive to delamination, air bubbles inclusions and cracks and can thus bring information about hidden defects in the composite panel. The preliminary data in all such inspections is represented by the dispersion curves, representing the dependency of the phase/group velocity on the frequency for the propagating modes. In fact, all modes are more or less attenuated, so it is even more important to compute the dispersion curves, which provide also the modal attenuation as function of frequency. Another important aspect is the sensitivity of the dispersion curves on each of the elastic constant of the composite, which are orthotropic in most cases. All these aspects are investigated in the present work, based on our specially developed finite element numerical model implemented in Comsol, which has several advantages over existing methods. The dispersion curves and modal displacements are computed for an example of composite plate. Comparison with literature data validates the accuracy of our results.

  15. Hanford facility dangerous waste permit application, 325 hazardous waste treatment units. Revision 1

    International Nuclear Information System (INIS)

    1997-07-01

    This report contains the Hanford Facility Dangerous Waste Permit Application for the 325 Hazardous Waste Treatment Units (325 HWTUs) which consist of the Shielded Analytical Laboratory, the 325 Building, and the 325 Collection/Loadout Station Tank. The 325 HWTUs receive, store, and treat dangerous waste generated by Hanford Facility programs. Routine dangerous and/or mixed waste treatment that will be conducted in the 325 HWTUs will include pH adjustment, ion exchange, carbon absorption, oxidation, reduction, waste concentration by evaporation, precipitation, filtration, solvent extraction, solids washing, phase separation, catalytic destruction, and solidification/stabilization

  16. Hanford facility dangerous waste permit application, 325 hazardous waste treatment units. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-07-01

    This report contains the Hanford Facility Dangerous Waste Permit Application for the 325 Hazardous Waste Treatment Units (325 HWTUs) which consist of the Shielded Analytical Laboratory, the 325 Building, and the 325 Collection/Loadout Station Tank. The 325 HWTUs receive, store, and treat dangerous waste generated by Hanford Facility programs. Routine dangerous and/or mixed waste treatment that will be conducted in the 325 HWTUs will include pH adjustment, ion exchange, carbon absorption, oxidation, reduction, waste concentration by evaporation, precipitation, filtration, solvent extraction, solids washing, phase separation, catalytic destruction, and solidification/stabilization.

  17. The wind energy in danger in France

    International Nuclear Information System (INIS)

    2005-03-01

    The law project of march 2005, concerning the energy policy in France is dangerous for the wind power development. The new regulation favor the big installations in order to protect the environment. In fact this decision will limit the wind turbines installations. (A.L.B.)

  18. Awareness of eSafety and Potential Online Dangers among Children and Teenagers

    Science.gov (United States)

    Zilka, Gila Cohen

    2017-01-01

    Aim/Purpose: Awareness of eSafety and potential online dangers for children and teenagers. Background: The study examined eSafety among children and teenagers from their own perspectives, through evaluations of their awareness level of eSafety and of potential online dangers. Methodology: This is a mixed-method study with both quantitative and…

  19. Optimisation of Hidden Markov Model using Baum–Welch algorithm ...

    Indian Academy of Sciences (India)

    The present work is a part of development of Hidden Markov Model. (HMM) based ... the Himalaya. In this work, HMMs have been developed for forecasting of maximum and minimum ..... data collection teams of Snow and Avalanche Study.

  20. Duality and hidden symmetries in interacting particle systems

    NARCIS (Netherlands)

    Giardinà, C.; Kurchan, J.; Redig, F.H.J.; Vafayi, K.

    2009-01-01

    In the context of Markov processes, both in discrete and continuous setting, we show a general relation between duality functions and symmetries of the generator. If the generator can be written in the form of a Hamiltonian of a quantum spin system, then the "hidden" symmetries are easily derived.

  1. River Protection Project (RPP) Dangerous Waste Training Plan

    Energy Technology Data Exchange (ETDEWEB)

    POHTO, R.E.

    2000-03-09

    This supporting document contains the training plan for dangerous waste management at River Protection Project TSD Units. This document outlines the dangerous waste training program developed and implemented for all Treatment, Storage, and Disposal (TSD) Units operated by River Protection Project (RPP) in the Hanford 200 East, 200 West and 600 Areas and the <90 Day Accumulation Area at 209E. Operating TSD Units managed by RPP are: the Double-Shell Tank (DST) System, 204-AR Waste Unloading Facility, Grout, and the Single-Shell Tank (SST) System. The program is designed in compliance with the requirements of Washington Administrative Code (WAC) 173-303-330 and Title 40 Code of Federal Regulations (CFR) 265.16 for the development of a written dangerous waste training program and the Hanford Facility Permit. Training requirements were determined by an assessment of employee duties and responsibilities. The RPP training program is designed to prepare employees to operate and maintain the Tank Farms in a safe, effective, efficient, and environmentally sound manner. In addition to preparing employees to operate and maintain the Tank Farms under normal conditions, the training program ensures that employees are prepared to respond in a prompt and effective manner should abnormal or emergency conditions occur. Emergency response training is consistent with emergency responses outlined in the following Building Emergency Plans: HNF-IP-0263-TF and HNF-=IP-0263-209E.

  2. River Protection Project (RPP) Dangerous Waste Training Plan

    International Nuclear Information System (INIS)

    POHTO, R.E.

    2000-01-01

    This supporting document contains the training plan for dangerous waste management at River Protection Project TSD Units. This document outlines the dangerous waste training program developed and implemented for all Treatment, Storage, and Disposal (TSD) Units operated by River Protection Project (RPP) in the Hanford 200 East, 200 West and 600 Areas and the <90 Day Accumulation Area at 209E. Operating TSD Units managed by RPP are: the Double-Shell Tank (DST) System, 204-AR Waste Unloading Facility, Grout, and the Single-Shell Tank (SST) System. The program is designed in compliance with the requirements of Washington Administrative Code (WAC) 173-303-330 and Title 40 Code of Federal Regulations (CFR) 265.16 for the development of a written dangerous waste training program and the Hanford Facility Permit. Training requirements were determined by an assessment of employee duties and responsibilities. The RPP training program is designed to prepare employees to operate and maintain the Tank Farms in a safe, effective, efficient, and environmentally sound manner. In addition to preparing employees to operate and maintain the Tank Farms under normal conditions, the training program ensures that employees are prepared to respond in a prompt and effective manner should abnormal or emergency conditions occur. Emergency response training is consistent with emergency responses outlined in the following Building Emergency Plans: HNF-IP-0263-TF and HNF-=IP-0263-209E

  3. The chemical industry - a danger to nuclear power plants

    International Nuclear Information System (INIS)

    Voigtsberger, P.

    1976-01-01

    Nuclear power stations could contaminate large areas with radioactivity when destroyed by strong external influences. In Germany, authorities try to cope with this danger firstly by making certain demands on the strength of the reactor shell and secondly by imposing strict safety regulations on dangerous industrial plants in the surroundings of the reactor. In the case of chemical industry, this means: If a chemical plant and a nuclear reactor lie closely together, special stress is given to explosion pretection measures in the form of primary explosion protection, e.g. strong sealing of inflammable gases and liquids handled in the immediate neighbourhood of the reactor. (orig.) [de

  4. Statistical identification with hidden Markov models of large order splitting strategies in an equity market

    Science.gov (United States)

    Vaglica, Gabriella; Lillo, Fabrizio; Mantegna, Rosario N.

    2010-07-01

    Large trades in a financial market are usually split into smaller parts and traded incrementally over extended periods of time. We address these large trades as hidden orders. In order to identify and characterize hidden orders, we fit hidden Markov models to the time series of the sign of the tick-by-tick inventory variation of market members of the Spanish Stock Exchange. Our methodology probabilistically detects trading sequences, which are characterized by a significant majority of buy or sell transactions. We interpret these patches of sequential buying or selling transactions as proxies of the traded hidden orders. We find that the time, volume and number of transaction size distributions of these patches are fat tailed. Long patches are characterized by a large fraction of market orders and a low participation rate, while short patches have a large fraction of limit orders and a high participation rate. We observe the existence of a buy-sell asymmetry in the number, average length, average fraction of market orders and average participation rate of the detected patches. The detected asymmetry is clearly dependent on the local market trend. We also compare the hidden Markov model patches with those obtained with the segmentation method used in Vaglica et al (2008 Phys. Rev. E 77 036110), and we conclude that the former ones can be interpreted as a partition of the latter ones.

  5. Inherent Dangers in Orogenital Sex During Pregnancy

    African Journals Online (AJOL)

    Coitus and cunnilingus during pregnancy are generally safe; whereas orogenital sex involving vaginal air insufflations can be very dangerous, causing even the death of the women. We carried out a search of case reports and reviews concerning air embolism during pregnancy due to orogenital sex. Physicians ...

  6. 77 FR 8253 - Notice of Proposed Settlement Agreement and Opportunity for Public Comment: Hidden Lane Landfill...

    Science.gov (United States)

    2012-02-14

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9631-3] Notice of Proposed Settlement Agreement and Opportunity for Public Comment: Hidden Lane Landfill Superfund Site ACTION: Notice. SUMMARY: In accordance... (``DOJ'') on behalf of EPA, in connection with the Hidden Lane Landfill Superfund Site, Sterling, Loudoun...

  7. The dangers of long-term catheter drainage.

    Science.gov (United States)

    Lowthian, P

    There are many dangers associated with long-term urinary bladder drainage by catheter. For various reasons, the choice of catheter is important, and its initial insertion can be particularly hazardous. All catheterizations should, however, be safer when there is some urine (or other fluid) in the bladder. The appropriate choice of drainage system attached to the catheter can delay bacterial invasion of the bladder. Great care is needed to prevent blockage of the system, particularly when bacteriuria is present. Recent evidence indicates that some bacteria encourage the development of encrustations, so that, in some circumstances, catheters may become blocked within 24 hours. This, together with other considerations, strongly suggests that indwelling catheters should be changed at intervals of not more than 5 days. The practical implications of this are considered, as are the benefits that may accrue. Accidental catheter traction is another danger, and some possible methods of avoiding this are discussed. Finally, the need for a new kind of drainage-bag support is highlighted.

  8. Belief propagation and replicas for inference and learning in a kinetic Ising model with hidden spins

    International Nuclear Information System (INIS)

    Battistin, C; Roudi, Y; Hertz, J; Tyrcha, J

    2015-01-01

    We propose a new algorithm for inferring the state of hidden spins and reconstructing the connections in a synchronous kinetic Ising model, given the observed history. Focusing on the case in which the hidden spins are conditionally independent of each other given the state of observable spins, we show that calculating the likelihood of the data can be simplified by introducing a set of replicated auxiliary spins. Belief propagation (BP) and susceptibility propagation (SusP) can then be used to infer the states of hidden variables and to learn the couplings. We study the convergence and performance of this algorithm for networks with both Gaussian-distributed and binary bonds. We also study how the algorithm behaves as the fraction of hidden nodes and the amount of data are changed, showing that it outperforms the Thouless–Anderson–Palmer (TAP) equations for reconstructing the connections. (paper)

  9. Recommendations on the transport of dangerous goods. Model regulations. 11. revised ed.

    International Nuclear Information System (INIS)

    1999-01-01

    The Recommendations on the Transport of Dangerous Goods are addressed to governments and to the international organizations concerned with the regulation of the transport of dangerous goods. They have been prepared by the United Nations Economic and Social Council's Committee of Experts on the Transport of Dangerous Goods, and they were first published in 1956 (ST/ECA/43-E/CN.2/170). Pursuant to Resolution 645 G (XXIII) of 26 April 1957 of the Economic and Social Council and subsequent resolutions, they have been regularly amended and updated at succeeding sessions of the Committee of Experts. At its eighteenth session (28 November-7 December 1994), the Committee of Experts considered that reformatting the Recommendations on the Transport of Dangerous Goods into Model Regulations that could be directly integrated into all modal national and international regulations would enhance harmonization, facilitate regular up-dating of all legal instruments concerned, and result in overall considerable resource savings for the Governments of the Member States, the United Nations, the specialized agencies and other international organizations. At its nineteenth session (2-10 December 1996), the Committee adopted a first version of the Model Regulations on the Transport of Dangerous Goods, which was annexed to the tenth revised edition of the Recommendations on the Transport of Dangerous Goods. At its twentieth session (7-16 December 1998), the Committee adopted various amendments to the Model Regulations and new provisions including, in particular, packing instructions for individual substances and articles and additional provisions for the transport of radioactive material. The additional provisions concerning the transport of radioactive material were developed in close cooperation with the International Atomic Energy Agency (IAEA) and are based on the 1996 Edition of the IAEA Regulations for the Safe Transport of Radioactive Material which have been reformatted so as to be

  10. Black holes, hidden symmetries, and complete integrability.

    Science.gov (United States)

    Frolov, Valeri P; Krtouš, Pavel; Kubizňák, David

    2017-01-01

    The study of higher-dimensional black holes is a subject which has recently attracted vast interest. Perhaps one of the most surprising discoveries is a realization that the properties of higher-dimensional black holes with the spherical horizon topology and described by the Kerr-NUT-(A)dS metrics are very similar to the properties of the well known four-dimensional Kerr metric. This remarkable result stems from the existence of a single object called the principal tensor. In our review we discuss explicit and hidden symmetries of higher-dimensional Kerr-NUT-(A)dS black hole spacetimes. We start with discussion of the Killing and Killing-Yano objects representing explicit and hidden symmetries. We demonstrate that the principal tensor can be used as a "seed object" which generates all these symmetries. It determines the form of the geometry, as well as guarantees its remarkable properties, such as special algebraic type of the spacetime, complete integrability of geodesic motion, and separability of the Hamilton-Jacobi, Klein-Gordon, and Dirac equations. The review also contains a discussion of different applications of the developed formalism and its possible generalizations.

  11. Hidden Markov Model for quantitative prediction of snowfall

    Indian Academy of Sciences (India)

    A Hidden Markov Model (HMM) has been developed for prediction of quantitative snowfall in Pir-Panjal and Great Himalayan mountain ranges of Indian Himalaya. The model predicts snowfall for two days in advance using daily recorded nine meteorological variables of past 20 winters from 1992–2012. There are six ...

  12. Hidden Markov models applied to a subsequence of the Xylella fastidiosa genome

    Directory of Open Access Journals (Sweden)

    Silva Cibele Q. da

    2003-01-01

    Full Text Available Dependencies in DNA sequences are frequently modeled using Markov models. However, Markov chains cannot account for heterogeneity that may be present in different regions of the same DNA sequence. Hidden Markov models are more realistic than Markov models since they allow for the identification of heterogeneous regions of a DNA sequence. In this study we present an application of hidden Markov models to a subsequence of the Xylella fastidiosa DNA data. We found that a three-state model provides a good description for the data considered.

  13. Monitoring Dangerous Goods in Container Yard Using the Internet of Things

    Directory of Open Access Journals (Sweden)

    Lianhong Ding

    2016-01-01

    Full Text Available The Internet of Things (IoT, a network of objects, has been regarded as the next revolution for the global information industry after the Internet. With IoT, many intelligent applications can be accomplished or improved. This paper presents a framework for dangerous goods management in container yard using IoT technology. The framework consists of three layers: perceptual layer, transport layer, and application layer. It offers an infrastructure for management and data analysis and utilization. According to the features of dangerous goods, the framework can be enhanced for container information forecast, container gate-in and gate-out management, environment parameters monitoring, and fire control as well. In order to verify our method, a prototype system is developed, which shows good performance. With our method, safe operation of dangerous goods in container yard can be accomplished.

  14. A Multilayer Hidden Markov Models-Based Method for Human-Robot Interaction

    Directory of Open Access Journals (Sweden)

    Chongben Tao

    2013-01-01

    Full Text Available To achieve Human-Robot Interaction (HRI by using gestures, a continuous gesture recognition approach based on Multilayer Hidden Markov Models (MHMMs is proposed, which consists of two parts. One part is gesture spotting and segment module, the other part is continuous gesture recognition module. Firstly, a Kinect sensor is used to capture 3D acceleration and 3D angular velocity data of hand gestures. And then, a Feed-forward Neural Networks (FNNs and a threshold criterion are used for gesture spotting and segment, respectively. Afterwards, the segmented gesture signals are respectively preprocessed and vector symbolized by a sliding window and a K-means clustering method. Finally, symbolized data are sent into Lower Hidden Markov Models (LHMMs to identify individual gestures, and then, a Bayesian filter with sequential constraints among gestures in Upper Hidden Markov Models (UHMMs is used to correct recognition errors created in LHMMs. Five predefined gestures are used to interact with a Kinect mobile robot in experiments. The experimental results show that the proposed method not only has good effectiveness and accuracy, but also has favorable real-time performance.

  15. [Insight and psychiatric dangerousness: A review of the literature].

    Science.gov (United States)

    Bonnet, S; Lacambre, M; Schandrin, A; Capdevielle, D; Courtet, P

    2017-04-01

    Violence committed by individuals with severe mental illness has become an increasing focus of concern among clinicians, policy makers, and the general public, often as the result of tragic events. Research has shown in the past two decades an increased risk of violence among patients with mental disorder. Nevertheless, of those suffering from mental illness, perpetrators of other directed violence form a minority subgroup. The means by which there is this association between mental illness and violence has remained controversial. Factors such as positive psychotic symptoms, medication non-adherence, alcohol or psychoactive substance abuse and antisocial personality were found to be predictive of violence. Overall, literature provides support to the assertion that violent behavior of mentally ill patients is a heterogeneous phenomenon that is driven by multiple inter-related and independent factors. Furthermore, psychiatrists are often asked to predict an individual's future dangerousness, in a medical or a legal context. In the process of risk assessment of dangerousness, more focus has been placed on dynamic risk factor. In this context, lack of insight has established itself both as a part of violence risk models and as a clinical item in structured approaches to measure dangerousness. However, few studies have tested these associations. The main purpose of this paper is to review the literature concerning the relationship between insight and dangerousness and discuss the contributions of the insight in the assessment of dangerousness in patients with mental illness. We included twenty studies that evaluated the association between insight and variable such as physical or verbal violence, aggressiveness, hostility or sexual aggression. According to the findings of this review, the strength and specific nature of this relationship remain unclear due to considerable methodological and conceptual shortcomings, including heterogeneity in the definition and

  16. TRACKING AND TRACING SOLUTION FOR DANGEROUS GOODS CARRIED BY INTERMODAL TRANSPORT

    Directory of Open Access Journals (Sweden)

    Marek Kvet

    2014-03-01

    Full Text Available This paper deals with the problem of designing a complex tracking and tracing solution for dangerous goods transportation with the support of modern information technologies. This research activity presents a part of the “ChemLogTT” [2] project solved at the University of Žilina. The main goal of our contribution is to present basic conception of a complex developed software tool for monitoring and analyzing mentioned dangerous goods transportation.

  17. How to Find a Hidden World at the Large Hadron Collider

    CERN Document Server

    Wells, James D.

    2008-01-01

    I discuss how the Large Hadron Collider era should broaden our view of particle physics research, and apply this thinking to the case of Hidden Worlds. I focus on one of the simplest representative cases of a Hidden World, and detail the rich implications it has for LHC physics, including universal suppression of Higgs boson production, trans-TeV heavy Higgs boson signatures, heavy-to-light Higgs boson decays, weakly coupled exotic gauge bosons, and Higgs boson decays to four fermions via light exotic gauge bosons. Some signatures may be accessible in the very early stages of collider operation, whereas others motivate a later high-lumonosity upgrade.

  18. Selection of hidden layer nodes in neural networks by statistical tests

    International Nuclear Information System (INIS)

    Ciftcioglu, Ozer

    1992-05-01

    A statistical methodology for selection of the number of hidden layer nodes in feedforward neural networks is described. The method considers the network as an empirical model for the experimental data set subject to pattern classification so that the selection process becomes a model estimation through parameter identification. The solution is performed for an overdetermined estimation problem for identification using nonlinear least squares minimization technique. The number of the hidden layer nodes is determined as result of hypothesis testing. Accordingly the redundant network structure with respect to the number of parameters is avoided and the classification error being kept to a minimum. (author). 11 refs.; 4 figs.; 1 tab

  19. On the production of hidden-flavored hadronic states at high energy

    Science.gov (United States)

    Wang, Wei

    2018-04-01

    I discuss the production mechanism of hidden-flavored hadrons at high energy. Using e+e‑ collisions and light-meson pair production in high energy exclusive processes, I demonstrate that hidden quark pairs do not necessarily participate in short-distance hard scattering. Implications are then explored in a few examples. Finally, I discuss the production mechanism of X(3872) in hadron collisions, where some misunderstandings have arisen in the literature. Supported by the Thousand Talents Plan for Young Professionals, National Natural Science Foundation of China (11575110, 11655002, 11735010, 11747611), Natural Science Foundation of Shanghai (15DZ2272100) and Scientific Research Foundation for Re- turned Overseas Chinese Scholars, Ministry of Education

  20. Transport of dangerous goods through road tunnels

    DEFF Research Database (Denmark)

    Jørgensen, N O; Lacroix, Didier; Amundsen, F.H.

    1999-01-01

    A paper which describes the work of an OECD research group. The group has suggested a grouping of dangerous materials, a quantitative risk assessment model and a decision support model which should allow tunnel operators to determine if a given material should be allowed throug a given tunnel...

  1. Minimal spontaneously broken hidden sector and its impact on Higgs boson physics at the CERN Large Hadron Collider

    International Nuclear Information System (INIS)

    Schabinger, Robert; Wells, James D.

    2005-01-01

    Little experimental data bears on the question of whether there is a spontaneously broken hidden sector that has no Standard Model quantum numbers. Here we discuss the prospects of finding evidence for such a hidden sector through renormalizable interactions of the Standard Model Higgs boson with a Higgs boson of the hidden sector. We find that the lightest Higgs boson in this scenario has smaller rates in standard detection channels, and it can have a sizeable invisible final state branching fraction. Details of the hidden sector determine whether the overall width of the lightest state is smaller or larger than the Standard Model width. We compute observable rates, total widths and invisible decay branching fractions within the general framework. We also introduce the 'A-Higgs Model', which corresponds to the limit of a hidden sector Higgs boson weakly mixing with the Standard Model Higgs boson. This model has only one free parameter in addition to the mass of the light Higgs state and it illustrates most of the generic phenomenology issues, thereby enabling it to be a good benchmark theory for collider searches. We end by presenting an analogous supersymmetry model with similar phenomenology, which involves hidden sector Higgs bosons interacting with MSSM Higgs bosons through D-terms

  2. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  3. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier, E-mail: redondo@mpp.mpg.de [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza, España (Spain)

    2015-07-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  4. Pentaquarks with hidden charm as hadroquarkonia

    Energy Technology Data Exchange (ETDEWEB)

    Eides, Michael I. [University of Kentucky, Department of Physics and Astronomy, Lexington, KY (United States); Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Petrov, Victor Yu. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Polyakov, Maxim V. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Ruhr-Universitaet Bochum, Institut fuer Theoretische Physik II, Bochum (Germany)

    2018-01-15

    We consider hidden charm pentaquarks as hadroquarkonium states in a QCD inspired approach. Pentaquarks arise naturally as bound states of quarkonia excitations and ordinary baryons. The LHCb P{sub c}(4450) pentaquark is interpreted as a ψ{sup '}-nucleon bound state with spin-parity J{sup P} = 3/2{sup -}. The partial decay width Γ(P{sub c}(4450) → J/ψ + N) ∼ 11 MeV is calculated and turned out to be in agreement with the experimental data for P{sub c}(4450). The P{sub c}(4450) pentaquark is predicted to be a member of one of the two almost degenerate hidden-charm baryon octets with spin-parities J{sup P} = 1/2{sup -}, 3/2{sup -}. The masses and decay widths of the octet pentaquarks are calculated. The widths are small and comparable with the width of the P{sub c}(4450) pentaquark, and the masses of the octet pentaquarks satisfy the Gell-Mann-Okubo relation. Interpretation of pentaquarks as loosely bound Σ{sub c} anti D* and Σ{sub c}{sup *} anti D* deuteronlike states is also considered. We determine quantum numbers of these bound states and calculate their masses in the one-pion exchange scenario. The hadroquarkonium and molecular approaches to exotic hadrons are compared and the relative advantages and drawbacks of each approach are discussed. (orig.)

  5. Well-Being Impacts of Human-Elephant Conflict in Khumaga, Botswana: Exploring Visible and Hidden Dimensions

    Directory of Open Access Journals (Sweden)

    Allison L Mayberry

    2017-01-01

    Full Text Available High densities of wild African savannah elephants (Loxodonta africana combined with widespread human land-use have increased human-elephant conflict in northern Botswana. Visible impacts (e.g. crop/property damage, injury/fatality of elephants on human well-being are well documented in scholarly literature while hidden impacts (e.g. emotional stress, restricted mobility are less so. This research uses qualitative methods to explore human experiences with elephants and perceived impacts of elephants on human well-being. Findings reveal participants are concerned about food insecurity and associated visible impacts of elephant crop raids. Findings also reveal participants are concerned about reduced safety and restricted mobility as hidden impacts threatening livelihoods and everyday life. Both visible and hidden impacts of elephants contribute to people's negative feelings towards elephants, as does the broader political context. This research emphasises the importance of investigating both visible and hidden impacts of elephants on human well-being to foster holistic understanding of human-elephant conflict scenarios and to inform future mitigation strategies.

  6. Aero Engine Component Fault Diagnosis Using Multi-Hidden-Layer Extreme Learning Machine with Optimized Structure

    Directory of Open Access Journals (Sweden)

    Shan Pang

    2016-01-01

    Full Text Available A new aero gas turbine engine gas path component fault diagnosis method based on multi-hidden-layer extreme learning machine with optimized structure (OM-ELM was proposed. OM-ELM employs quantum-behaved particle swarm optimization to automatically obtain the optimal network structure according to both the root mean square error on training data set and the norm of output weights. The proposed method is applied to handwritten recognition data set and a gas turbine engine diagnostic application and is compared with basic ELM, multi-hidden-layer ELM, and two state-of-the-art deep learning algorithms: deep belief network and the stacked denoising autoencoder. Results show that, with optimized network structure, OM-ELM obtains better test accuracy in both applications and is more robust to sensor noise. Meanwhile it controls the model complexity and needs far less hidden nodes than multi-hidden-layer ELM, thus saving computer memory and making it more efficient to implement. All these advantages make our method an effective and reliable tool for engine component fault diagnosis tool.

  7. … To be hidden does not mean to be merely revealed – Part 2

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-12-01

    Full Text Available This text revisits the long-term project Hidden Curriculum (HC, initiated by Annette Krauss, that addresses unquestioned routines, hierarchies of knowledge and the role of the body in learning processes from the perspective of secondary/high school education (in the research on a hidden curriculum. The first part of this text (www.medienimpulse.at/articles/view/848 entailed a deeper analysis of educational studies on the phenomenon of hidden curriculum in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire and Jacques Rancière. The aim of the second part is to address academic canons and corporeality within educational settings and to investigate the physicality of everyday norms through revisiting the framework, results and processes of the collaborative research of the HC project with secondary/high school students.

  8. Job Clubs: Getting into the Hidden Labor Market.

    Science.gov (United States)

    Kimeldorf, Martin; Tornow, Janice A.

    1984-01-01

    A job club approach for secondary disabled youth focuses on mastering job seeking skills by behaviorally sequenced steps learned in situational experiences within a self-help group process framework. Students learn to penetrate the hidden job market, to use social networking via the telephone, and to participate successfully in job interviews. (CL)

  9. Relations of Parenting to Adolescent Externalizing and Internalizing Distress Moderated by Perception of Neighborhood Danger.

    Science.gov (United States)

    Goldner, Jonathan S; Quimby, Dakari; Richards, Maryse H; Zakaryan, Arie; Miller, Steve; Dickson, Daniel; Chilson, Jessica

    2016-01-01

    Parental monitoring and warmth have traditionally been studied in the context of White, middle-class families. This article explores optimal levels of these parenting behaviors in preventing adolescent psychopathology in impoverished, urban high-crime areas while accounting for child perceptions of neighborhood danger. In this study, data were collected longitudinally at 2 time points 1 year apart from a sample of 254 African American young adolescents (T1: M age = 12.6 years, 41% male) and their parents. Parental monitoring and warmth, child perception of neighborhood danger, and child internalizing and externalizing behaviors were measured using questionnaires. Child internalizing behaviors were also measured using a time sampling technique capturing in vivo accounts of daily distress. Findings indicated associations between parental monitoring and children's externalizing behaviors along with linear and quadratic associations between parental monitoring and internalizing behaviors. Monitoring and warmth were differentially related to symptoms depending on neighborhood danger level. When children perceived less danger, more monitoring related to less externalizing. When children perceived more danger, more warmth related to less internalizing. In addition, adolescents' perceptions of neighborhood danger emerged as equally strong as monitoring and warmth in predicting symptoms. This study underscores the influence of carefully considering parenting approaches and which techniques optimally prevent adolescents' externalizing, as well as prevent internalizing difficulties. It also highlights how context affects mental health, specifically how perceptions of danger negatively influence adolescents' psychopathology, emphasizing the importance of initiatives to reduce violence in communities.

  10. Hierarchy of controls applied to dangerous substances

    NARCIS (Netherlands)

    Terwoert, J.

    2014-01-01

    Too often, measures to control workers’ exposure to dangerous substances are taken on an ‘ad-hoc’ basis. Existing processes, procedures and routines are taken for granted, and ‘end-of-pipe’ solutions are installed. In many cases, one relies on the use of personal protective equipment. This may lead

  11. Securing the dangerous UN convoys in Mali

    DEFF Research Database (Denmark)

    Haugegaard, Rikke; Albrecht, Peter; Ravnkilde, Signe Cold

    2017-01-01

    It has proven particularly challenging for the UN stabilization mission in Mali (MINUSMA) to transport fuel, food and water to military camps in Sector North on the frontline of the mission. Convoy escorts drain the UN mission of resources and is one of its most dangerous tasks, mainly carried ou...

  12. Hidden Markov models and other machine learning approaches in computational molecular biology

    Energy Technology Data Exchange (ETDEWEB)

    Baldi, P. [California Inst. of Tech., Pasadena, CA (United States)

    1995-12-31

    This tutorial was one of eight tutorials selected to be presented at the Third International Conference on Intelligent Systems for Molecular Biology which was held in the United Kingdom from July 16 to 19, 1995. Computational tools are increasingly needed to process the massive amounts of data, to organize and classify sequences, to detect weak similarities, to separate coding from non-coding regions, and reconstruct the underlying evolutionary history. The fundamental problem in machine learning is the same as in scientific reasoning in general, as well as statistical modeling: to come up with a good model for the data. In this tutorial four classes of models are reviewed. They are: Hidden Markov models; artificial Neural Networks; Belief Networks; and Stochastic Grammars. When dealing with DNA and protein primary sequences, Hidden Markov models are one of the most flexible and powerful alignments and data base searches. In this tutorial, attention is focused on the theory of Hidden Markov Models, and how to apply them to problems in molecular biology.

  13. Quasiparticle scattering image in hidden order phases and chiral superconductors

    Energy Technology Data Exchange (ETDEWEB)

    Thalmeier, Peter [Max Planck Institute for Chemical Physics of Solids, 01187 Dresden (Germany); Akbari, Alireza, E-mail: alireza@apctp.org [Asia Pacific Center for Theoretical Physics, Pohang, Gyeongbuk 790-784 (Korea, Republic of); Department of Physics, and Max Planck POSTECH Center for Complex Phase Materials, POSTECH, Pohang 790-784 (Korea, Republic of)

    2016-02-15

    The technique of Bogoliubov quasiparticle interference (QPI) has been successfully used to investigate the symmetry of unconventional superconducting gaps, also in heavy fermion compounds. It was demonstrated that QPI can distinguish between the d-wave singlet candidates in CeCoIn{sub 5}. In URu{sub 2}Si{sub 2} presumably a chiral d-wave singlet superconducting (SC) state exists inside a multipolar hidden order (HO) phase. We show that hidden order leaves an imprint on the symmetry of QPI pattern that may be used to determine the essential question whether HO in URu{sub 2}Si{sub 2} breaks the in-plane rotational symmetry or not. We also demonstrate that the chiral d-wave SC gap leads to a crossover to a quasi-2D QPI spectrum below T{sub c} which sharpens the HO features. Furthermore we investigate the QPI image of chiral p-wave multigap superconductor Sr{sub 2}RuO{sub 4}. - Highlights: • The chiral multigap structure of Sr{sub 2}RuO{sub 4} leads to rotation of QPI spectrum with bias voltage. • 5f band reconstruction in hidden order phase of URu{sub 2}Si{sub 2} is obtained from two orbital model. • The chiral superconductivity in URu{sub 2}Si{sub 2} leads to quasi-2D quasiparticle interference (QPI).

  14. 2727-S Nonradioactive Dangerous Waste Storage Facility Closure Plan

    International Nuclear Information System (INIS)

    Wilczek, T.A.; Laws, J.R.; Izatt, R.D.

    1992-01-01

    This closure plan describes the activities for final closure of the 2727-S Nonradioactive Dangerous Waste Storage (NRDWS) Facility at the Hanford Site. The 2727-S NRDWS Facility provided container storage for nonradioactive dangerous and extremely hazardous wastes generated in the research and development laboratories, process operations, and maintenance and transportation functions throughout the Hanford Site. Storage operations began at the 2727-S NRDWS Facility March 14, 1983, and continued until December 30, 1986, when the last shipment of materials from the facility took place. These storage operations have been moved to the new 616 NRDWS Facility, which is an interim status unit located between the 200 East and 200 West Areas of the Hanford Site

  15. Heavy superpartners with less tuning from hidden sector renormalisation

    International Nuclear Information System (INIS)

    Hardy, Edward

    2014-01-01

    In supersymmetric extensions of the Standard Model, superpartner masses consistent with collider bounds typically introduce significant tuning of the electroweak scale. We show that hidden sector renormalisation can greatly reduce such a tuning if the supersymmetry breaking, or mediating, sector runs through a region of strong coupling not far from the weak scale. In the simplest models, only the tuning due to the gaugino masses is improved, and a weak scale gluino mass in the region of 5 TeV may be obtained with an associated tuning of only one part in ten. In models with more complex couplings between the visible and hidden sectors, the tuning with respect to sfermions can also be reduced. We give an example of a model, with low scale gauge mediation and superpartner masses allowed by current LHC bounds, that has an overall tuning of one part in twenty

  16. Danger defence and risk provision in nuclear law

    International Nuclear Information System (INIS)

    Breuer, R.

    1978-01-01

    Starting from the atomic-law term of danger, which is defined as a product of likeliness and volume of damage, the author comments upon the decisive and, as to date, unsolved question of which degree of likeliness a possible course of events must have in order to be taken into consideration as a danger that must be averted. In doing this, it is stressed that the most important point is to find a rationally practicable standard of likeliness or unlikeliness. This standard is then developed from the deterministical point of view. It corresponds with the postulate that effective precautions must be taken against all known causes for incidents and accidents. A standard of practical ratio results from this: damage does not have to be taken into consideration any longer if, due to the precautions taken and the knowledge level of the leading scientists and technicians, if it is not likely to occur. In addition to this preventive protection from danger, paragraph 7, Sec.2 No.3 Atomic Energy Act stipulates another risk under the reservation of precaution, however the technical possibility of realization and the relativity of expenditure and benefit. With regard to these criteria, the author gives his opinion on the judgements of the administrative courts in Wuerzburg and Freiburg which, starting from the same principles, have different points of view on the question of the so-called rupture safety in nuclear power plants. (UN) [de

  17. Kidney sales and the analogy with dangerous employment.

    Science.gov (United States)

    Malmqvist, Erik

    2015-06-01

    Proponents of permitting living kidney sales often argue as follows. Many jobs involve significant risks; people are and should be free to take these risks in exchange for money; the risks involved in giving up a kidney are no greater than the risks involved in acceptable hazardous jobs; so people should be free to give up a kidney for money, too. This paper examines this frequently invoked but rarely analysed analogy. Two objections are raised. First, it is far from clear that kidney sales and dangerous jobs involve comparable risks on an appropriately broad comparison. Second, and more importantly, even if they do involve comparable risks it does not follow that kidney sales must be permitted because dangerous jobs are. The analogy assumes that kidney sales are banned for paternalistic reasons. But there may be other, non-paternalistic reasons for the ban. And paternalists, too, can consistently defend the ban even if kidney sales are no riskier than occupations that they find acceptable. Soft paternalists may want to protect would-be vendors from harms that they have not voluntarily chosen. Egalitarian hard paternalists may want to protect already badly off vendors from further worsening their situation. For neither species of paternalist is the size of the risk prevented decisive. I conclude that the analogy with dangerous jobs, while rhetorically powerful, pulls little real argumentative weight. Future debates on living kidney sales should therefore proceed without it.

  18. male knowledge of danger signs of obstetric complications

    African Journals Online (AJOL)

    Maternal mortality in sub-Saharan Africa has been unacceptably high over the ... In addition to this, the autonomy of pregnant women to access health care is ... practices concerning antenatal care, knowledge of danger signs in pregnancy and ...

  19. High-resolution mass spectrometry driven discovery of peptidic danger signals in insect immunity.

    Directory of Open Access Journals (Sweden)

    Arton Berisha

    Full Text Available The 'danger model' is an alternative concept for immune response postulating that the immune system reacts to entities that do damage (danger associated molecular patterns, DAMP and not only to entities that are foreign (pathogen-associated molecular patterns, PAMP as proposed by classical immunology concepts. In this study we used Galleria mellonella to validate the danger model in insects. Hemolymph of G. mellonella was digested with thermolysin (as a representative for virulence-associated metalloproteinases produced by humanpathogens followed by chromatographic fractionation. Immune-stimulatory activity was tested by measuring lysozyme activity with the lytic zone assays against Micrococcus luteus cell wall components. Peptides were analyzed by nano-scale liquid chromatography coupled to high-resolution Fourier transform mass spectrometers. Addressing the lack of a genome sequence we complemented the rudimentary NCBI protein database with a recently established transcriptome and de novo sequencing methods for peptide identification. This approach led to identification of 127 peptides, 9 of which were identified in bioactive fractions. Detailed MS/MS experiments in comparison with synthetic analogues confirmed the amino acid sequence of all 9 peptides. To test the potential of these putative danger signals to induce immune responses we injected the synthetic analogues into G. mellonella and monitored the anti-bacterial activity against living Micrococcus luteus. Six out of 9 peptides identified in the bioactive fractions exhibited immune-stimulatory activity when injected. Hence, we provide evidence that small peptides resulting from thermolysin-mediated digestion of hemolymph proteins function as endogenous danger signals which can set the immune system into alarm. Consequently, our study indicates that the danger model also plays a role in insect immunity.

  20. Using hidden Markov models to align multiple sequences.

    Science.gov (United States)

    Mount, David W

    2009-07-01

    A hidden Markov model (HMM) is a probabilistic model of a multiple sequence alignment (msa) of proteins. In the model, each column of symbols in the alignment is represented by a frequency distribution of the symbols (called a "state"), and insertions and deletions are represented by other states. One moves through the model along a particular path from state to state in a Markov chain (i.e., random choice of next move), trying to match a given sequence. The next matching symbol is chosen from each state, recording its probability (frequency) and also the probability of going to that state from a previous one (the transition probability). State and transition probabilities are multiplied to obtain a probability of the given sequence. The hidden nature of the HMM is due to the lack of information about the value of a specific state, which is instead represented by a probability distribution over all possible values. This article discusses the advantages and disadvantages of HMMs in msa and presents algorithms for calculating an HMM and the conditions for producing the best HMM.

  1. Dangers and Pleasures

    DEFF Research Database (Denmark)

    Järvinen, Margaretha Maria; Østergaard, Jeanette

    2011-01-01

    to ‘hard’ illegal drugs; and, finally, the pro-drug position, characteristic of drug users with low risk perceptions and high pleasure-orientation. We use the focus group interviews to demonstrate how youths occupying these differing positions argue for and against drugs and which risks and pleasures......This is a study of young people’s conceptions of illegal drug use as dangerous and/or pleasurable and an analysis of the relationship between attitudes to drugs, drinking, friends’ reported drug use and own experience with drug use and drinking. The article applies a mixed methods approach using...... both survey data and focus group interviews. The main statistical method is Multiple Correspondence Analysis (MCA), which constructs a social space of young people’s attitudes to drugs and drug experiences relationally. We identify four interrelated positions on illegal drug use among 17 to 19-year...

  2. Religion, Spirituality, and the Hidden Curriculum: Medical Student and Faculty Reflections.

    Science.gov (United States)

    Balboni, Michael J; Bandini, Julia; Mitchell, Christine; Epstein-Peterson, Zachary D; Amobi, Ada; Cahill, Jonathan; Enzinger, Andrea C; Peteet, John; Balboni, Tracy

    2015-10-01

    Religion and spirituality play an important role in physicians' medical practice, but little research has examined their influence within the socialization of medical trainees and the hidden curriculum. The objective is to explore the role of religion and spirituality as they intersect with aspects of medicine's hidden curriculum. Semiscripted, one-on-one interviews and focus groups (n = 33 respondents) were conducted to assess Harvard Medical School student and faculty experiences of religion/spirituality and the professionalization process during medical training. Using grounded theory, theme extraction was performed with interdisciplinary input (medicine, sociology, and theology), yielding a high inter-rater reliability score (kappa = 0.75). Three domains emerged where religion and spirituality appear as a factor in medical training. First, religion/spirituality may present unique challenges and benefits in relation to the hidden curriculum. Religious/spiritual respondents more often reported to struggle with issues of personal identity, increased self-doubt, and perceived medical knowledge inadequacy. However, religious/spiritual participants less often described relationship conflicts within the medical team, work-life imbalance, and emotional stress arising from patient suffering. Second, religion/spirituality may influence coping strategies during encounters with patient suffering. Religious/spiritual trainees described using prayer, faith, and compassion as means for coping whereas nonreligious/nonspiritual trainees discussed compartmentalization and emotional repression. Third, levels of religion/spirituality appear to fluctuate in relation to medical training, with many trainees experiencing an increase in religiousness/spirituality during training. Religion/spirituality has a largely unstudied but possibly influential role in medical student socialization. Future study is needed to characterize its function within the hidden curriculum. Copyright

  3. 75 FR 63534 - International Standards on the Transport of Dangerous Goods; Public Meeting

    Science.gov (United States)

    2010-10-15

    ...: Any person wishing to participate in the public meeting should send an e-mail to [email protected] Standards on the Transport of Dangerous Goods; Public Meeting AGENCY: Pipeline and Hazardous Materials... the 38th session of the United Nations Sub-Committee of Experts on the Transport of Dangerous Goods...

  4. A Fast SVD-Hidden-nodes based Extreme Learning Machine for Large-Scale Data Analytics.

    Science.gov (United States)

    Deng, Wan-Yu; Bai, Zuo; Huang, Guang-Bin; Zheng, Qing-Hua

    2016-05-01

    Big dimensional data is a growing trend that is emerging in many real world contexts, extending from web mining, gene expression analysis, protein-protein interaction to high-frequency financial data. Nowadays, there is a growing consensus that the increasing dimensionality poses impeding effects on the performances of classifiers, which is termed as the "peaking phenomenon" in the field of machine intelligence. To address the issue, dimensionality reduction is commonly employed as a preprocessing step on the Big dimensional data before building the classifiers. In this paper, we propose an Extreme Learning Machine (ELM) approach for large-scale data analytic. In contrast to existing approaches, we embed hidden nodes that are designed using singular value decomposition (SVD) into the classical ELM. These SVD nodes in the hidden layer are shown to capture the underlying characteristics of the Big dimensional data well, exhibiting excellent generalization performances. The drawback of using SVD on the entire dataset, however, is the high computational complexity involved. To address this, a fast divide and conquer approximation scheme is introduced to maintain computational tractability on high volume data. The resultant algorithm proposed is labeled here as Fast Singular Value Decomposition-Hidden-nodes based Extreme Learning Machine or FSVD-H-ELM in short. In FSVD-H-ELM, instead of identifying the SVD hidden nodes directly from the entire dataset, SVD hidden nodes are derived from multiple random subsets of data sampled from the original dataset. Comprehensive experiments and comparisons are conducted to assess the FSVD-H-ELM against other state-of-the-art algorithms. The results obtained demonstrated the superior generalization performance and efficiency of the FSVD-H-ELM. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. TeraHertz imaging of hidden paint layers on canvas

    NARCIS (Netherlands)

    Adam, A.J.L.; Planken, P.C.M.; Meloni, S.; Dik, J.

    2009-01-01

    We show terahertz reflection images of hidden paint layers in a painting on canvas and compare the results with X-ray Radiography and Infrared Reflectography. Our terahertz measurements show strong reflections from both the canvas/paint interface and from the raw umber/lead white interface,

  6. Book review: Troubling possibility, hidden fires and secret drawers ...

    African Journals Online (AJOL)

    Book review: Troubling possibility, hidden fires and secret drawers: Tiyambe Zeleza's smouldering charcoal. H.F. Ross. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL.

  7. Hidden flows and waste processing--an analysis of illustrative futures.

    Science.gov (United States)

    Schiller, F; Raffield, T; Angus, A; Herben, M; Young, P J; Longhurst, P J; Pollard, S J T

    2010-12-14

    An existing materials flow model is adapted (using Excel and AMBER model platforms) to account for waste and hidden material flows within a domestic environment. Supported by national waste data, the implications of legislative change, domestic resource depletion and waste technology advances are explored. The revised methodology offers additional functionality for economic parameters that influence waste generation and disposal. We explore this accounting system under hypothetical future waste and resource management scenarios, illustrating the utility of the model. A sensitivity analysis confirms that imports, domestic extraction and their associated hidden flows impact mostly on waste generation. The model offers enhanced utility for policy and decision makers with regard to economic mass balance and strategic waste flows, and may promote further discussion about waste technology choice in the context of reducing carbon budgets.

  8. Hidden histories: challenges for pedagogy and participation

    OpenAIRE

    Morrice, Linda

    2013-01-01

    Higher Education has become and an increasingly diverse and globalised system in which the binaries between ‘traditional’ and ‘non-traditional’ students, exclusion and inclusion have less resonance and analytical purchase. Drawing on research with refugees Linda will suggest that higher education can be marked simultaneously by belonging and recognition, deficit and exclusion. Complex differences and inequalities remain hidden and unspoken, raising new questions and challenges for pedagogy an...

  9. Costs of Quality: Exploratory Analysis of Hidden Elements and Prioritization using Analytic Hierarchy Process

    Directory of Open Access Journals (Sweden)

    Sailaja A

    2015-02-01

    Full Text Available Cost of Quality analysis is emerged as an effective tool for the industrial managers for pinpointing the deficiencies in the system as well as for identifying the improvement areas by highlighting the cost reduction opportunities. However , this analysis will be fully effective only if it is further extended to identify the cost incurred in ensuring quality in all areas of the supply chain including the hidden costs and costs of missed out opportunities. Most of the hidden elements of quality costs are difficult to track and not accounted by the traditional accounting tools. An exploratory analysis is made in this research to identify the hidden elements of quality costs in manufacturing industry. Further, the identified cost elements are classified into various groups for better analysis and, finally, prioritized to identify the vital few among them. Analytic Hierarchy Process (AHP technique which is one of the most popular Multi Criteria Decision Method (MCDM and Pareto analysis were used in this study for prioritizing the hidden quality cost elements based on their degree of impact on overall cost of quality. By this analysis, the key cost elements which are to be addressed to reduce the overall cost of quality are identified.

  10. A scheme of hidden-structure attribute-based encryption with multiple authorities

    Science.gov (United States)

    Ling, J.; Weng, A. X.

    2018-05-01

    In the most of the CP-ABE schemes with hidden access structure, both all the user attributes and the key generation are managed by only one authority. The key generation efficiency will decrease as the number of user increases, and the data will encounter security issues as the only authority is attacked. We proposed a scheme of hidden-structure attribute-based encryption with multiple authorities, which introduces multiple semi-trusted attribute authorities, avoiding the threat even though one or more authorities are attacked. We also realized user revocation by managing a revocation list. Based on DBDH assumption, we proved that our scheme is of IND-CMA security. The analysis shows that our scheme improves the key generation efficiency.

  11. A Stochastic Flows Approach for Asset Allocation with Hidden Economic Environment

    Directory of Open Access Journals (Sweden)

    Tak Kuen Siu

    2015-01-01

    Full Text Available An optimal asset allocation problem for a quite general class of utility functions is discussed in a simple two-state Markovian regime-switching model, where the appreciation rate of a risky share changes over time according to the state of a hidden economy. As usual, standard filtering theory is used to transform a financial model with hidden information into one with complete information, where a martingale approach is applied to discuss the optimal asset allocation problem. Using a martingale representation coupled with stochastic flows of diffeomorphisms for the filtering equation, the integrand in the martingale representation is identified which gives rise to an optimal portfolio strategy under some differentiability conditions.

  12. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  13. The hidden costs of nuclear power

    International Nuclear Information System (INIS)

    Keough, C.

    1981-01-01

    The two basic hidden costs of nuclear power are public money and public health. Nuclear power appears to be economical because many of the costs of producins electricity in these plants are paid by the federal government. So, like it or not, the citizens are footing the bill with their taxes. Design and development of plants have been paid for with public money, and disposal and cleanup costs will also be paid in this manner. The economic and health costs associated with nuclear accidents are staggering

  14. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  15. Einstein-Bohr controversy and theory of hidden variables

    Czech Academy of Sciences Publication Activity Database

    Lokajíček, Miloš V.

    2010-01-01

    Roč. 8, č. 4 (2010), s. 638-645 ISSN 1303-5150 R&D Projects: GA MŠk LA08015 Institutional research plan: CEZ:AV0Z10100502 Keywords : Schroedinger equation * EPR paradox * hidden variables Subject RIV: BF - Elementary Particles and High Energy Physics Impact factor: 0.697, year: 2010 http://arxiv.org/abs/1004.3005

  16. Hidden symmetries of the Principal Chiral Model unveiled

    International Nuclear Information System (INIS)

    Devchand, C.; Schiff, J.

    1996-12-01

    By relating the two-dimensional U(N) Principal Chiral Model to a Simple linear system we obtain a free-field parametrization of solutions. Obvious symmetry transformations on the free-field data give symmetries of the model. In this way all known 'hidden symmetries' and Baecklund transformations, as well as a host of new symmetries, arise. (author). 21 refs

  17. Safety assessment of dangerous goods transport enterprise based on the relative entropy aggregation in group decision making model.

    Science.gov (United States)

    Wu, Jun; Li, Chengbing; Huo, Yueying

    2014-01-01

    Safety of dangerous goods transport is directly related to the operation safety of dangerous goods transport enterprise. Aiming at the problem of the high accident rate and large harm in dangerous goods logistics transportation, this paper took the group decision making problem based on integration and coordination thought into a multiagent multiobjective group decision making problem; a secondary decision model was established and applied to the safety assessment of dangerous goods transport enterprise. First of all, we used dynamic multivalue background and entropy theory building the first level multiobjective decision model. Secondly, experts were to empower according to the principle of clustering analysis, and combining with the relative entropy theory to establish a secondary rally optimization model based on relative entropy in group decision making, and discuss the solution of the model. Then, after investigation and analysis, we establish the dangerous goods transport enterprise safety evaluation index system. Finally, case analysis to five dangerous goods transport enterprises in the Inner Mongolia Autonomous Region validates the feasibility and effectiveness of this model for dangerous goods transport enterprise recognition, which provides vital decision making basis for recognizing the dangerous goods transport enterprises.

  18. PERSONAL NETWORK SAMPLING, OUTDEGREE ANALYSIS AND MULTILEVEL ANALYSIS - INTRODUCING THE NETWORK CONCEPT IN STUDIES OF HIDDEN POPULATIONS

    NARCIS (Netherlands)

    SPREEN, M; ZWAAGSTRA, R

    1994-01-01

    Populations, such as heroin and cocaine users, the homeless and the like (hidden populations), are among the most difficult populations to which to apply classic random sampling procedures. A frequently used data collection method for these hidden populations is the snowball procedure. The

  19. Optimisation of Hidden Markov Model using Baum–Welch algorithm

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 126; Issue 1. Optimisation of Hidden Markov Model using Baum–Welch algorithm for prediction of maximum and minimum temperature over Indian Himalaya. J C Joshi Tankeshwar Kumar Sunita Srivastava Divya Sachdeva. Volume 126 Issue 1 February 2017 ...

  20. Addressing the hidden curriculum in the clinical workplace: A practical tool for trainees and faculty.

    Science.gov (United States)

    Mulder, Hanneke; Ter Braak, Edith; Chen, H Carrie; Ten Cate, Olle

    2018-02-28

    The hidden curriculum, commonly described in negative terms, is considered highly influential in medical education, especially in the clinical workplace. Structured approaches to address it are limited in number and scope. This paper presents a practical, value-neutral method called REVIEW (Reflecting & Evaluating Values Implicit in Education in the Workplace), to facilitate reflection and discussion on the hidden curriculum by faculty members and trainees. REVIEW approaches the hidden curriculum as a reflection of the professional microculture of a clinical team. This microculture results from collective problem solving and mutual negotiation when facing different, often conflicting, demands and interests, and their underlying values in daily clinical practice. Using this nonjudgmental conceptual framework, REVIEW employs a series of 50 culture statements that must be prioritized using Q-sort methodology, reflecting how the culture in a particular clinical context (e.g. ward or department) is perceived by faculty members and trainees. This procedure can be done individually or in groups. Most important is the resulting team discussion after the exercise - a discussion about perceptions of actual team culture and the culture desired by the team. Our early experiences suggest that REVIEW can be a useful tool for addressing the hidden curriculum.

  1. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  2. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  3. Focused sunlight factor of forest fire danger assessment using Web-GIS and RS technologies

    Science.gov (United States)

    Baranovskiy, Nikolay V.; Sherstnyov, Vladislav S.; Yankovich, Elena P.; Engel, Marina V.; Belov, Vladimir V.

    2016-08-01

    Timiryazevskiy forestry of Tomsk region (Siberia, Russia) is a study area elaborated in current research. Forest fire danger assessment is based on unique technology using probabilistic criterion, statistical data on forest fires, meteorological conditions, forest sites classification and remote sensing data. MODIS products are used for estimating some meteorological conditions and current forest fire situation. Geonformation technologies are used for geospatial analysis of forest fire danger situation on controlled forested territories. GIS-engine provides opportunities to construct electronic maps with different levels of forest fire probability and support raster layer for satellite remote sensing data on current forest fires. Web-interface is used for data loading on specific web-site and for forest fire danger data representation via World Wide Web. Special web-forms provide interface for choosing of relevant input data in order to process the forest fire danger data and assess the forest fire probability.

  4. On the significance of bell's inequality for hidden-variable theories

    International Nuclear Information System (INIS)

    De Baere, W.

    1984-01-01

    It is explicitly shown that Bell's derivation of the generalized Bell inequality and its subsequent interpretation depend on an implicit hypothesis concerning the reproducibility of some set of hidden variables in different runs of the same experiment

  5. Risk from the frontlines of a hidden epidemic sexuality, masculinities ...

    African Journals Online (AJOL)

    Risk from the frontlines of a hidden epidemic sexuality, masculinities and social pressures ... It frames risk in the context of the dynamics governing sexuality, underlined ... MSM risk and practice, in these contexts, are consequently shaped by ...

  6. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  7. The principles of measuring forest fire danger

    Science.gov (United States)

    H. T. Gisborne

    1936-01-01

    Research in fire danger measurement was commenced in 1922 at the Northern Rocky Mountain Forest and Range Experiment Station of the U. S. Forest Service, with headquarters at Missoula, Mont. Since then investigations have been made concerning ( 1) what to measure, (2) how to measure, and ( 3) field use of these measurements. In all cases the laboratory or restricted...

  8. Well below 2 °C: Mitigation strategies for avoiding dangerous to catastrophic climate changes

    Science.gov (United States)

    Xu, Yangyang; Ramanathan, Veerabhadran

    2017-09-01

    The historic Paris Agreement calls for limiting global temperature rise to “well below 2 °C.” Because of uncertainties in emission scenarios, climate, and carbon cycle feedback, we interpret the Paris Agreement in terms of three climate risk categories and bring in considerations of low-probability (5%) high-impact (LPHI) warming in addition to the central (˜50% probability) value. The current risk category of dangerous warming is extended to more categories, which are defined by us here as follows: >1.5 °C as dangerous; >3 °C as catastrophic; and >5 °C as unknown, implying beyond catastrophic, including existential threats. With unchecked emissions, the central warming can reach the dangerous level within three decades, with the LPHI warming becoming catastrophic by 2050. We outline a three-lever strategy to limit the central warming below the dangerous level and the LPHI below the catastrophic level, both in the near term (pollutant (SP) lever to mitigate short-lived climate pollutants, and the carbon extraction and sequestration (CES) lever to thin the atmospheric CO2 blanket. Pulling on both CN and SP levers and bending the emissions curve by 2020 can keep the central warming below dangerous levels. To limit the LPHI warming below dangerous levels, the CES lever must be pulled as well to extract as much as 1 trillion tons of CO2 before 2100 to both limit the preindustrial to 2100 cumulative net CO2 emissions to 2.2 trillion tons and bend the warming curve to a cooling trend.

  9. The safety of Ignalina NPP and ecological danger in public opinion of inhabitants of Daugavpils region

    International Nuclear Information System (INIS)

    Peipinia, O.

    1998-01-01

    Inquest of Daugavpils' region pointed to a big anxiety for ecological danger of Ignalina NPP by inhabitants and experts. Absolute majority of respondents (73-78% inhabitants and 68-82% experts) apprehend the NPP as very dangerous and dangerous. More than half of respondents apprehend the dangerous increased during last two-three years. It is because no one has a good reference about situation, because tragic al Chernobyl NPP burst was on. The anxiety increases if the respondent lives nearer of NPP. Inhabitants of Daugavpils and it's region wants the better reference about situation, about future of Ignalina NPP after 2010 year, about securities means in case of NPP burst. (author)

  10. Modeling human behaviors and reactions under dangerous environment.

    Science.gov (United States)

    Kang, J; Wright, D K; Qin, S F; Zhao, Y

    2005-01-01

    This paper describes the framework of a real-time simulation system to model human behavior and reactions in dangerous environments. The system utilizes the latest 3D computer animation techniques, combined with artificial intelligence, robotics and psychology, to model human behavior, reactions and decision making under expected/unexpected dangers in real-time in virtual environments. The development of the system includes: classification on the conscious/subconscious behaviors and reactions of different people; capturing different motion postures by the Eagle Digital System; establishing 3D character animation models; establishing 3D models for the scene; planning the scenario and the contents; and programming within Virtools Dev. Programming within Virtools Dev is subdivided into modeling dangerous events, modeling character's perceptions, modeling character's decision making, modeling character's movements, modeling character's interaction with environment and setting up the virtual cameras. The real-time simulation of human reactions in hazardous environments is invaluable in military defense, fire escape, rescue operation planning, traffic safety studies, and safety planning in chemical factories, the design of buildings, airplanes, ships and trains. Currently, human motion modeling can be realized through established technology, whereas to integrate perception and intelligence into virtual human's motion is still a huge undertaking. The challenges here are the synchronization of motion and intelligence, the accurate modeling of human's vision, smell, touch and hearing, the diversity and effects of emotion and personality in decision making. There are three types of software platforms which could be employed to realize the motion and intelligence within one system, and their advantages and disadvantages are discussed.

  11. Tipping Point

    Medline Plus

    Full Text Available ... injuries than from exposed electrical outlets. Unfortunately, many parents are unaware of the deadly danger of this hidden hazard. Parents should include securing TVs, furniture, and appliances in ...

  12. The Global Hidden Hunger Indices and Maps: An Advocacy Tool for Action

    Science.gov (United States)

    Muthayya, Sumithra; Rah, Jee Hyun; Sugimoto, Jonathan D.; Roos, Franz F.; Kraemer, Klaus; Black, Robert E.

    2013-01-01

    The unified global efforts to mitigate the high burden of vitamin and mineral deficiency, known as hidden hunger, in populations around the world are crucial to the achievement of most of the Millennium Development Goals (MDGs). We developed indices and maps of global hidden hunger to help prioritize program assistance, and to serve as an evidence-based global advocacy tool. Two types of hidden hunger indices and maps were created based on i) national prevalence data on stunting, anemia due to iron deficiency, and low serum retinol levels among preschool-aged children in 149 countries; and ii) estimates of Disability Adjusted Life Years (DALYs) attributed to micronutrient deficiencies in 136 countries. A number of countries in sub-Saharan Africa, as well as India and Afghanistan, had an alarmingly high level of hidden hunger, with stunting, iron deficiency anemia, and vitamin A deficiency all being highly prevalent. The total DALY rates per 100,000 population, attributed to micronutrient deficiencies, were generally the highest in sub-Saharan African countries. In 36 countries, home to 90% of the world’s stunted children, deficiencies of micronutrients were responsible for 1.5-12% of the total DALYs. The pattern and magnitude of iodine deficiency did not conform to that of other micronutrients. The greatest proportions of children with iodine deficiency were in the Eastern Mediterranean (46.6%), European (44.2%), and African (40.4%) regions. The current indices and maps provide crucial data to optimize the prioritization of program assistance addressing global multiple micronutrient deficiencies. Moreover, the indices and maps serve as a useful advocacy tool in the call for increased commitments to scale up effective nutrition interventions. PMID:23776712

  13. The global hidden hunger indices and maps: an advocacy tool for action.

    Science.gov (United States)

    Muthayya, Sumithra; Rah, Jee Hyun; Sugimoto, Jonathan D; Roos, Franz F; Kraemer, Klaus; Black, Robert E

    2013-01-01

    The unified global efforts to mitigate the high burden of vitamin and mineral deficiency, known as hidden hunger, in populations around the world are crucial to the achievement of most of the Millennium Development Goals (MDGs). We developed indices and maps of global hidden hunger to help prioritize program assistance, and to serve as an evidence-based global advocacy tool. Two types of hidden hunger indices and maps were created based on i) national prevalence data on stunting, anemia due to iron deficiency, and low serum retinol levels among preschool-aged children in 149 countries; and ii) estimates of Disability Adjusted Life Years (DALYs) attributed to micronutrient deficiencies in 136 countries. A number of countries in sub-Saharan Africa, as well as India and Afghanistan, had an alarmingly high level of hidden hunger, with stunting, iron deficiency anemia, and vitamin A deficiency all being highly prevalent. The total DALY rates per 100,000 population, attributed to micronutrient deficiencies, were generally the highest in sub-Saharan African countries. In 36 countries, home to 90% of the world's stunted children, deficiencies of micronutrients were responsible for 1.5-12% of the total DALYs. The pattern and magnitude of iodine deficiency did not conform to that of other micronutrients. The greatest proportions of children with iodine deficiency were in the Eastern Mediterranean (46.6%), European (44.2%), and African (40.4%) regions. The current indices and maps provide crucial data to optimize the prioritization of program assistance addressing global multiple micronutrient deficiencies. Moreover, the indices and maps serve as a useful advocacy tool in the call for increased commitments to scale up effective nutrition interventions.

  14. First Direct-Detection Constraints on eV-Scale Hidden-Photon Dark Matter with DAMIC at SNOLAB

    Energy Technology Data Exchange (ETDEWEB)

    Aguilar-Arevalo, A.; Amidei, D.; Bertou, X.; Butner, M.; Cancelo, G.; Castañeda Vázquez, A.; Cervantes Vergara, B. A.; Chavarria, A. E.; Chavez, C. R.; de Mello Neto, J. R. T.; D’Olivo, J. C.; Estrada, J.; Fernandez Moroni, G.; Gaïor, R.; Guardincerri, Y.; Hernández Torres, K. P.; Izraelevitch, F.; Kavner, A.; Kilminster, B.; Lawson, I.; Letessier-Selvon, A.; Liao, J.; Matalon, A.; Mello, V. B. B.; Molina, J.; Privitera, P.; Ramanathan, K.; Sarkis, Y.; Schwarz, T.; Settimo, M.; Sofo Haro, M.; Thomas, R.; Tiffenberg, J.; Tiouchichine, E.; Torres Machado, D.; Trillaud, F.; You, X.; Zhou, J.

    2017-04-05

    We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30 eV$c^{-2}$ with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter $\\kappa$ is competitive with constraints from solar emission, reaching a minimum value of 2.2$\\times$$10^{-14}$ at 17 eV$c^{-2}$. These results are the most stringent direct detection constraints on hidden-photon dark matter with masses 3-12 eV$c^{-2}$ and the first demonstration of direct experimental sensitivity to ionization signals $<$12 eV from dark matter interactions.

  15. Crisis Entrepreneurs and Hidden Crises : Illustrative Examples of Interactional

    NARCIS (Netherlands)

    Prof. Cees van Woerkum; dr. Annette Klarenbeek

    2012-01-01

    We examine the ways in which a hidden crisis can be exposed from a communication point of view. In which way can organisations create general awareness of a crisis and try to understand the dynamic nature of interactions? With the help of discourse analysis, we have examined the interactional

  16. Hidden Markov model for improved ultrasound-based presence detection

    NARCIS (Netherlands)

    Jaramillo Garcia, P.A.; Linnartz, J.P.M.G.

    2015-01-01

    Adaptive lighting systems typically use a presence detector to save energy by switching off lights in unoccupied rooms. However, it is highly annoying when lights are erroneously turned off while a user is present (false negative, FN). This paper focuses on the estimation of presence, using a Hidden

  17. Proof-testing strategies induced by dangerous detected failures of safety-instrumented systems

    International Nuclear Information System (INIS)

    Liu, Yiliu; Rausand, Marvin

    2016-01-01

    Some dangerous failures of safety-instrumented systems (SISs) are detected almost immediately by diagnostic self-testing as dangerous detected (DD) failures, whereas other dangerous failures can only be detected by proof-testing, and are therefore called dangerous undetected (DU) failures. Some items may have a DU- and a DD-failure at the same time. After the repair of a DD-failure is completed, the maintenance team has two options: to perform an insert proof test for DU-failure or not. If an insert proof test is performed, it is necessary to decide whether the next scheduled proof test should be postponed or performed at the scheduled time. This paper analyzes the effects of different testing strategies on the safety performance of a single channel of a SIS. The safety performance is analyzed by Petri nets and by approximation formulas and the results obtained by the two approaches are compared. It is shown that insert testing improves the safety performance of the channel, but the feasibility and cost of the strategy may be a hindrance to recommend insert testing. - Highlights: • Identify the tests induced by detected failures. • Model the testing strategies following DD-failures. • Propose analytical formulas for effects of strategies. • Simulate and verify the proposed models.

  18. Ferromagnetic Objects Magnetovision Detection System.

    Science.gov (United States)

    Nowicki, Michał; Szewczyk, Roman

    2013-12-02

    This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth's field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  19. Ecological model of the interprise danger of gas

    International Nuclear Information System (INIS)

    Sadygov, A.B.

    2009-01-01

    It has been looked into the basic problems for establishment of ecological model of the enterprise danger of gas. There have been established mathematical model in the base of equation of Novye-Stoks which consists of private reproductive second row differential equation system of three

  20. Removable butterfly valve, especially for polluting and/or dangerous fluids

    International Nuclear Information System (INIS)

    Garrigues, J.C.

    1984-01-01

    This invention relates to a valve for use in systems carrying polluting, corrosive or dangerous fluids requiring the use of biological protection. The facilities concerned are those in which fluids, mainly polluting, corrosive or dangerous liquids requiring the use of various types of biological protection, are handled. This is particularly so for nuclear installations in which the equipment is surrounded by protective shields which stop the radiation and prevent radioactive gases and aerosols from spreading. The invention proposes for the present valve a high-safety leaktightness system which respects the most specifications and standards and which suppresses any dead volume inside the valve [fr