WorldWideScience

Sample records for hidden dangers guide

  1. Stroke: a Hidden Danger of Margin Trading in Stock Markets.

    Science.gov (United States)

    Lin, Shu-Hui; Wang, Chien-Ho; Liu, Tsai-Ching; Chen, Chin-Shyan

    2015-10-01

    Using 10-year population data from 2000 through 2009 in Taiwan, this is the first paper to analyze the relationship between margin trading in stock markets and stroke hospitalizations. The results show that 3 and 6 days after an increase of margin trading in the Taiwan stock markets are associated with greater stoke hospitalizations. In general, a 1 % increase in total margin trading positions is associated with an increment of 2.5 in the total number of stroke hospitalizations, where the mean number of hospital admissions is 233 cases a day. We further examine the effects of margin trading by gender and age groups and find that the effects of margin trading are significant for males and those who are 45-74 years old only. In summary, buying stocks with money you do not have is quite risky, especially if the prices of those stocks fall past a certain level or if there is a sudden and severe drop in the stock market. There is also a hidden danger to one's health from margin trading. A person should be cautious before conducting margin trading, because while it can be quite profitable, danger always lurks just around the corner.

  2. EMPLOYING SENSOR NETWORK TO GUIDE FIREFIGHTERS IN DANGEROUS AREA

    DEFF Research Database (Denmark)

    Koohi, Hamidreza; Nadernejad, Ehsan; Fathi, Mahmoud

    2010-01-01

    In this paper, we intend to focus on the sensor network applications in firefighting. A distributed algorithm is developed for the sensor network to guide firefighters through a burning area. The sensor network models the danger of the area under coverage as obstacles, and has the property to adapt...... itself against possible changes. The protocol developed, will integrate the artificial potential field of the sensors with the information of the intended place of moving firefighter so that it guides the firefighter step by step through the sensor network by choosing the safest path in dangerous zones....... This protocol is simulated by Visual-Sense and the simulation results are available. Keyword: Firefighter, Sensor Network, Potential Field, Area’s Danger, Navigation...

  3. Waste dumps in local communities in developing countries and hidden danger to health.

    Science.gov (United States)

    Anetor, Gloria O

    2016-07-01

    The rapid industrialisation and urbanisation fuelled by a fast-growing population has led to the generation of a huge amount of waste in most communities in developing countries. The hidden disorders and health dangers in waste dumps are often ignored. The waste generated in local communities is usually of a mixed type consisting of domestic waste and waste from small-scale industrial activities. Among these wastes are toxic metals, lead (Pb), cadmium (Cd), arsenic (As), mercury (Hg), halogenated organic compounds, plastics, remnants of paints that are themselves mixtures of hazardous substances, hydrocarbons and petroleum product-contaminated devices. Therefore, there is the urgent need to create an awareness of the harmful health effect of toxic wastes in developing countries, especially Nigeria. This is a review aimed at creating awareness on the hidden dangers of waste dumps to health in local communities in developing countries. Many publications in standard outlets use the following keywords: cancer, chemical toxicity, modern environmental health hazards, waste management and waste speciation in PubMed, ISI, Toxbase environmental digest, related base journals, and some standard textbooks, as well as the observation of the researcher between 1959 and 2014. Studies revealed the preponderance of toxic chemicals such as Pb, Cd, As and Hg in dump sites that have the risk of entering food chain and groundwater supplies, and these can give rise to endemic malnutrition and may also increase susceptibility to mutagenic substances, thereby increasing the incidence of cancer in developing countries. Industrialisation and urbanisation have brought about a change in the waste that is generated in contemporary communities in developing countries. Therefore, there is the need to embrace speciation and sound management of waste, probably including bioremediation. The populations in the local communities need regulatory agencies who are health educators as positive change

  4. Damage evaluation by a guided wave-hidden Markov model based method

    Science.gov (United States)

    Mei, Hanfei; Yuan, Shenfang; Qiu, Lei; Zhang, Jinjin

    2016-02-01

    Guided wave based structural health monitoring has shown great potential in aerospace applications. However, one of the key challenges of practical engineering applications is the accurate interpretation of the guided wave signals under time-varying environmental and operational conditions. This paper presents a guided wave-hidden Markov model based method to improve the damage evaluation reliability of real aircraft structures under time-varying conditions. In the proposed approach, an HMM based unweighted moving average trend estimation method, which can capture the trend of damage propagation from the posterior probability obtained by HMM modeling is used to achieve a probabilistic evaluation of the structural damage. To validate the developed method, experiments are performed on a hole-edge crack specimen under fatigue loading condition and a real aircraft wing spar under changing structural boundary conditions. Experimental results show the advantage of the proposed method.

  5. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without a Prescription Leer en Español: Peligros asociados ... truth." Real People, Real Problems with Colored Contact Lenses Julian: Teenager Blinded In One Eye By Non- ...

  6. Colored Contact Lens Dangers

    Science.gov (United States)

    ... Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without a Prescription Leer en Español: Peligros asociados ... truth." Real People, Real Problems with Colored Contact Lenses Julian: Teenager Blinded In One Eye By Non- ...

  7. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Ophthalmology/Strabismus Ocular Pathology/Oncology Oculoplastics/Orbit Refractive Management/Intervention Retina/Vitreous Uveitis Focus ... Halloween Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without ...

  8. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Tips & Prevention News Ask an Ophthalmologist Patient Stories Español Eye Health / News Halloween Hazard: The Hidden Dangers ... Decorative Contact Lenses Without a Prescription Leer en Español: Peligros asociados con los lentes de contacto de ...

  9. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Español Eye Health / News Halloween Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without a Prescription ... be purchased over-the-counter or on the Internet," says Thomas Steinemann, MD, professor of ophthalmology at ...

  10. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Health / News Halloween Hazard: The Hidden Dangers of Buying Decorative Contact Lenses Without a Prescription Leer en Español: Peligros asociados con los lentes de contacto de color Sep. 26, 2013 It started as an impulsive buy from a souvenir shop, but 10 hours ...

  11. Locating Hidden Servers

    National Research Council Canada - National Science Library

    Oeverlier, Lasse; Syverson, Paul F

    2006-01-01

    .... Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Without Borders have issued guides that describe using hidden services via Tor to protect the safety of dissidents as well as to resist censorship...

  12. Experimental and Computational Studies on the Scattering of an Edge-Guided Wave by a Hidden Crack on a Racecourse Shaped Hole.

    Science.gov (United States)

    Vien, Benjamin Steven; Rose, Louis Raymond Francis; Chiu, Wing Kong

    2017-07-01

    Reliable and quantitative non-destructive evaluation for small fatigue cracks, in particular those in hard-to-inspect locations, is a challenging problem. Guided waves are advantageous for structural health monitoring due to their slow geometrical decay of amplitude with propagating distance, which is ideal for rapid wide-area inspection. This paper presents a 3D laser vibrometry experimental and finite element analysis of the interaction between an edge-guided wave and a small through-thickness hidden edge crack on a racecourse shaped hole that occurs, in practice, as a fuel vent hole. A piezoelectric transducer is bonded on the straight edge of the hole to generate the incident wave. The excitation signal consists of a 5.5 cycle Hann-windowed tone burst of centre frequency 220 kHz, which is below the cut-off frequency for the first order Lamb wave modes (SH1). Two-dimensional fast Fourier transformation (2D FFT) is applied to the incident and scattered wave field along radial lines emanating from the crack mouth, so as to identify the wave modes and determine their angular variation and amplitude. It is shown experimentally and computationally that mid-plane symmetric edge waves can travel around the hole's edge to detect a hidden crack. Furthermore, the scattered wave field due to a small crack length, a , (compared to the wavelength λ of the incident wave) is shown to be equivalent to a point source consisting of a particular combination of body-force doublets. It is found that the amplitude of the scattered field increases quadratically as a function of a/λ , whereas the scattered wave pattern is independent of crack length for small cracks a < λ . This study of the forward scattering problem from a known crack size provides a useful guide for the inverse problem of hidden crack detection and sizing.

  13. Contesting danger

    DEFF Research Database (Denmark)

    Heathershaw, John; Megoran, Nick

    2011-01-01

    and subsequent considerations of the region in terms of the war on terror. It considers several examples of this discourse of danger including the popular US TV drama about presidential politics, The West Wing, the policy texts of ‘Washingtonian security analysis’ and accounts of danger, insecurity and urban...... of danger is contested within the region. The example of urban violence in Osh, Kyrgyzstan and Jalalabad, Afghanistan in 2010 demonstrates how opportunities to mitigate conflict may have been lost due to the distortions of this discourse of danger. It concludes by raising the challenge to policy...

  14. Child Abuse: The Hidden Bruises

    Science.gov (United States)

    ... for Families - Vietnamese Spanish Facts for Families Guide Child Abuse - The Hidden Bruises No. 5; Updated November 2014 The statistics on physical child abuse are alarming. It is estimated hundreds of thousands ...

  15. Hidden Liquidity

    OpenAIRE

    Cebiroglu, Gökhan; Horst, Ulrich

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, hi...

  16. Headaches - danger signs

    Science.gov (United States)

    Migraine headache - danger signs; Tension headache - danger signs; Cluster headache - danger signs; Vascular headache - danger signs ... and other head pain. In: Goldman L, Schafer AI, eds. Goldman-Cecil Medicine . 25th ed. Philadelphia, PA: ...

  17. The Hidden Dimensions of Databases.

    Science.gov (United States)

    Jacso, Peter

    1994-01-01

    Discusses methods of evaluating commercial online databases and provides examples that illustrate their hidden dimensions. Topics addressed include size, including the number of records or the number of titles; the number of years covered; and the frequency of updates. Comparisons of Readers' Guide Abstracts and Magazine Article Summaries are…

  18. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main......PRIMARY OBJECTIVE: The purpose of this study was to listen to and learn from children showing high levels of post-traumatic stress symptoms after parental acquired brain injury (ABI), in order to achieve an in-depth understanding of the difficulties the children face in their everyday lives...... finding indicates that the children experienced numerous losses, many of which were often suppressed or neglected by the children to protect the ill parents. CONCLUSIONS: The findings indicated that the children seemed to make a special effort to hide their feelings of loss and grief in order to protect...

  19. Herbal medications and plastic surgery: a hidden danger.

    Science.gov (United States)

    Mohan, Arvind; Lahiri, Anindya

    2014-04-01

    Herbal medicine is a multibillion-pound industry, and surveys suggest that ~10% of the UK population uses herbal supplements concurrently with prescription medications. Patients and health care practitioners are often unaware of the adverse side effects of herbal medicines. In addition, because many of these herbal supplements are available over the counter, many patients do not disclose these when listing medications to health care providers. A 39-year-old nurse underwent an abdominoplasty with rectus sheath plication after weight loss surgery. Postoperatively, she experienced persistent drain output, and after discharge, a seroma developed requiring repeated drainage in the clinic. After scar revision 10 months later, the woman bled postoperatively, requiring suturing. Again, a seroma developed, requiring repeated drainage. It was discovered that the patient had been taking a herbal menopause supplement containing ingredients known to have anticoagulant effects. Complementary medicine is rarely taught in UK medical schools and generally not practiced in UK hospitals. Many supplements are known to have anticoagulant, cardiovascular, and sedative effects. Worryingly, questions about herbal medicines are not routinely asked in clinics, and patients do not often volunteer such information. With the number and awareness of complementary medications increasing, their usage among the population is likely to increase. The authors recommend specific questioning about the use of complementary medications and consideration of ceasing such medications before surgery. Level of Evidence V This journal requires that authors assign a level of evidence to each article. For a full description of these Evidence-Based Medicine ratings, please refer to the Table of Contents or the online Instructions to Authors www.springer.com/00266 .

  20. Oxygen Toxicity and Special Operations Forces Diving: Hidden and Dangerous

    NARCIS (Netherlands)

    Wingelaar, Thijs T.; van Ooij, Pieter-Jan A. M.; van Hulst, Rob A.

    2017-01-01

    In Special Operations Forces (SOF) closed-circuit rebreathers with 100% oxygen are commonly utilized for covert diving operations. Exposure to high partial pressures of oxygen (PO2) could cause damage to the central nervous system (CNS) and pulmonary system. Longer exposure time and higher PO2 leads

  1. Oxygen Toxicity and Special Operations Forces Diving: Hidden and Dangerous

    Directory of Open Access Journals (Sweden)

    Thijs T. Wingelaar

    2017-07-01

    Full Text Available In Special Operations Forces (SOF closed-circuit rebreathers with 100% oxygen are commonly utilized for covert diving operations. Exposure to high partial pressures of oxygen (PO2 could cause damage to the central nervous system (CNS and pulmonary system. Longer exposure time and higher PO2 leads to faster development of more serious pathology. Exposure to a PO2 above 1.4 ATA can cause CNS toxicity, leading to a wide range of neurologic complaints including convulsions. Pulmonary oxygen toxicity develops over time when exposed to a PO2 above 0.5 ATA and can lead to inflammation and fibrosis of lung tissue. Oxygen can also be toxic for the ocular system and may have systemic effects on the inflammatory system. Moreover, some of the effects of oxygen toxicity are irreversible. This paper describes the pathophysiology, epidemiology, signs and symptoms, risk factors and prediction models of oxygen toxicity, and their limitations on SOF diving.

  2. The hidden dangers of experimenting in distributed AI

    NARCIS (Netherlands)

    Meyer, A.P.; Smit, A.; Kempen, M.; Wijngaards, N.

    2006-01-01

    Research on multi-agent systems often involves experiments, also in situations where humans interact with agents. Consequently, the field of experimental (human) sciences becomes more and more relevant. This paper clarifies how things can and often do go wrong in distributed AI experiments. We show

  3. Sociology of Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Alireza Moradi

    2017-06-01

    Full Text Available This paper reviews the concept of hidden curriculum in the sociological theories and wants to explain sociological aspects of formation of hidden curriculum. The main question concentrates on the theoretical approaches in which hidden curriculum is explained sociologically.For this purpose it was applied qualitative research methodology. The relevant data include various sociological concepts and theories of hidden curriculum collected by the documentary method. The study showed a set of rules, procedures, relationships and social structure of education have decisive role in the formation of hidden curriculum. A hidden curriculum reinforces by existed inequalities among learners (based on their social classes or statues. There is, in fact, a balance between the learner's "knowledge receptions" with their "inequality proportion".The hidden curriculum studies from different major sociological theories such as Functionalism, Marxism and critical theory, Symbolic internationalism and Feminism. According to the functionalist perspective a hidden curriculum has a social function because it transmits social values. Marxists and critical thinkers correlate between hidden curriculum and the totality of social structure. They depicts that curriculum prepares learners for the exploitation in the work markets. Symbolic internationalism rejects absolute hegemony of hidden curriculum on education and looks to the socialization as a result of interaction between learner and instructor. Feminism theory also considers hidden curriculum as a vehicle which legitimates gender stereotypes.

  4. POVMs and hidden variables

    International Nuclear Information System (INIS)

    Stairs, Allen

    2007-01-01

    Recent results by Paul Busch and Adan Cabello claim to show that by appealing to POVMs, non-contextual hidden variables can be ruled out in two dimensions. While the results of Busch and Cabello are mathematically correct, interpretive problems render them problematic as no hidden variable proofs

  5. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression where...

  6. Hidden gauge symmetry

    International Nuclear Information System (INIS)

    O'Raifeartaigh, L.

    1979-01-01

    This review describes the principles of hidden gauge symmetry and of its application to the fundamental interactions. The emphasis is on the structure of the theory rather than on the technical details and, in order to emphasise the structure, gauge symmetry and hidden symmetry are first treated as independent phenomena before being combined into a single (hidden gauge symmetric) theory. The main application of the theory is to the weak and electromagnetic interactions of the elementary particles, and although models are used for comparison with experiment and for illustration, emphasis is placed on those features of the application which are model-independent. (author)

  7. The plutonium danger

    International Nuclear Information System (INIS)

    Ruiter, W. de

    1983-01-01

    Nobody can ignore the fact that plutonium is potentially very dangerous and the greatest danger concerning it lies in the spreading of nuclear weapons via nuclear energy programmes. The following seven different attitudes towards this problem are presented and discussed: 1) There is no connection between peaceful and military applications; 2) The problem cannot be prevented; 3) A technical solution must be found; 4) plutonium must be totally inaccessible to countries involved in acquiring nuclear weapons; 5) The use of plutonium for energy production should only occur in one multinational centre; 6) Dogmas in the nuclear industry must be enfeebled; 7) All developments in this area should stop. (C.F.)

  8. Dangers of the vagina.

    Science.gov (United States)

    Beit-Hallahmi, B

    1985-12-01

    Beliefs, myths, and literary expressions of men's fear of female genitals are reviewed. Both clinical evidence and folklore provide evidence that men imagine female genitals not only as a source of pleasure and attraction, but also as a source of danger in a very physical sense. The vagina dentata myth has many versions, including some modern ones, and its message is always the same: an awesome danger emanating from a woman's body. The prevalence of such feelings in folklore and in literature is noted.

  9. The hidden universe

    International Nuclear Information System (INIS)

    Disney, M.

    1985-01-01

    Astronomer Disney has followed a somewhat different tack than that of most popular books on cosmology by concentrating on the notion of hidden (as in not directly observable by its own radiation) matter in the universe

  10. Hidden charged dark matter

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Kaplinghat, Manoj; Tu, Huitzu; Yu, Hai-Bo

    2009-01-01

    Can dark matter be stabilized by charge conservation, just as the electron is in the standard model? We examine the possibility that dark matter is hidden, that is, neutral under all standard model gauge interactions, but charged under an exact (\\rm U)(1) gauge symmetry of the hidden sector. Such candidates are predicted in WIMPless models, supersymmetric models in which hidden dark matter has the desired thermal relic density for a wide range of masses. Hidden charged dark matter has many novel properties not shared by neutral dark matter: (1) bound state formation and Sommerfeld-enhanced annihilation after chemical freeze out may reduce its relic density, (2) similar effects greatly enhance dark matter annihilation in protohalos at redshifts of z ∼ 30, (3) Compton scattering off hidden photons delays kinetic decoupling, suppressing small scale structure, and (4) Rutherford scattering makes such dark matter self-interacting and collisional, potentially impacting properties of the Bullet Cluster and the observed morphology of galactic halos. We analyze all of these effects in a WIMPless model in which the hidden sector is a simplified version of the minimal supersymmetric standard model and the dark matter is a hidden sector stau. We find that charged hidden dark matter is viable and consistent with the correct relic density for reasonable model parameters and dark matter masses in the range 1 GeV ∼ X ∼< 10 TeV. At the same time, in the preferred range of parameters, this model predicts cores in the dark matter halos of small galaxies and other halo properties that may be within the reach of future observations. These models therefore provide a viable and well-motivated framework for collisional dark matter with Sommerfeld enhancement, with novel implications for astrophysics and dark matter searches

  11. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Center Global Ophthalmology Guide Find an Ophthalmologist Advanced Search Annual Meeting Clinical Education Practice Management Member Services ... Center Global Ophthalmology Guide Find an Ophthalmologist Advanced ... Subspecialties Cataract/Anterior Segment Comprehensive Ophthalmology Cornea/External ...

  12. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Academy Publications EyeNet Ophthalmology ... Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced ...

  13. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Education Center Redmond Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced Search Annual Meeting Clinical Education ... Education Center Redmond Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced Search Subspecialties Cataract/Anterior Segment ...

  14. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced Search Annual Meeting Clinical Education Practice Management Member ... Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced ... Subspecialties Cataract/Anterior Segment Comprehensive Ophthalmology Cornea/ ...

  15. Dangerous Raw Oysters

    Centers for Disease Control (CDC) Podcasts

    2013-08-05

    Dr. Duc Vugia, chief of the Infectious Diseases Branch at the California Department of Public Health, discusses the dangers of eating raw oysters.  Created: 8/5/2013 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 8/7/2013.

  16. Hidden treasures - 50 km points of interests

    Science.gov (United States)

    Lommi, Matias; Kortelainen, Jaana

    2015-04-01

    Tampere is third largest city in Finland and a regional centre. During 70's there occurred several communal mergers. Nowadays this local area has both strong and diversed identity - from wilderness and agricultural fields to high density city living. Outside the city center there are interesting geological points unknown for modern city settlers. There is even a local proverb, "Go abroad to Teisko!". That is the area the Hidden Treasures -student project is focused on. Our school Tammerkoski Upper Secondary School (or Gymnasium) has emphasis on visual arts. We are going to offer our art students scientific and artistic experiences and knowledge about the hidden treasures of Teisko area and involve the Teisko inhabitants into this project. Hidden treasures - Precambrian subduction zone and a volcanism belt with dense bed of gold (Au) and arsenic (As), operating goldmines and quarries of minerals and metamorphic slates. - North of subduction zone a homogenic precambrian magmastone area with quarries, products known as Kuru Grey. - Former ashores of post-glasial Lake Näsijärvi and it's sediments enabled the developing agriculture and sustained settlement. Nowadays these ashores have both scenery and biodiversity values. - Old cattle sheds and dairy buildings made of local granite stones related to cultural stonebuilding inheritance. - Local active community of Kapee, about 100 inhabitants. Students will discover information of these "hidden" phenomena, and rendering this information trough Enviromental Art Method. Final form of this project will be published in several artistic and informative geocaches. These caches are achieved by a GPS-based special Hidden Treasures Cycling Route and by a website guiding people to find these hidden points of interests.

  17. La mesure du danger

    CERN Document Server

    Manceron, Vanessa; Revet, Sandrine

    2014-01-01

    La mesure du danger permet d’explorer des dangers de nature aussi diverse que la délinquance, la pollution, l’écueil maritime, la maladie ou l’attaque sorcellaire, l’extinction d’espèces animales ou végétales, voire de la Planète tout entière. Au croisement de la sociologie, de l’anthropologie et de l’histoire, les différents articles analysent les pratiques concrètes de mesure pour tenter de comprendre ce qui se produit au cours de l’opération d’évaluation du danger sans préjuger de la nature de celui-ci. L’anthropologie a contribué à la réflexion sur l’infortune en s’intéressant aux temporalités de l’après : maladies, catastrophes, pandémies, etc. et en cherchant à rendre compte de l’expérience des victimes, de leur vie ordinaire bouleversée, de la recomposition du quotidien. Elle s’intéresse aussi aux autres types de mesures, les savoirs incorporés, qui reposent sur l’odorat, la vue ou le toucher et ceux qui ressortent d’une épistémologie « non ...

  18. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced Search Annual Meeting Clinical Education Practice Management Member ...

  19. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Education Center Oculofacial Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Academy Publications EyeNet Ophthalmology ...

  20. Search for Hidden Particles

    CERN Multimedia

    Solovev, V

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  1. The hidden values

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Jensen, Karsten Klint

    “The Hidden Values - Transparency in Decision-Making Processes Dealing with Hazardous Activities”. The report seeks to shed light on what is needed to create a transparent framework for political and administrative decisions on the use of GMOs and chemical products. It is our hope that the report...

  2. Dangers of peace journalism

    Directory of Open Access Journals (Sweden)

    Wilhelm Kempf

    2016-10-01

    Full Text Available The sense of mission shared by some peace journalists is a dangerous attitude. All journalists can do to give peace a chance is to serve as mediators, helping conflict parties overcome the competitive misperceptions and societal beliefs that fuel conflict. If peace journalists try to promote and impose their own solutions, however, frustration is inevitable and will finally result in the search for an evildoer who can be made responsible. Thus by involving themselves in conflicts, journalists can become unintentional agents of conflict escalation.

  3. Dangerous goods emergency response

    International Nuclear Information System (INIS)

    Price, K.

    1991-01-01

    This paper reports on a general overview of the State of Western Australia including: the legal framework of the Dangerous Goods and Emergency response management scenarios (which consist mainly of fuel products such as LP gas); particular problems unique to the Western Australian environment; what has been done to overcome those problems. Western Australia has an area of about two and a half million square kilometers. The demography of the State is such that the population is concentrated in the south-west corner of the State with isolated pockets, mainly associated with mineral development but also associated with agriculture, scattered throughout the State

  4. Dangers of environmental pollution

    International Nuclear Information System (INIS)

    Schaer, M.

    1978-01-01

    Environmental pollution is ever increasing. Protection of the environment must not be neglected for economic reasons. Damage to health due to environmental effects is hard to determine epidemiologically as there are nearly always several causes to consider at the same time. Still, the increase in environmental pollution results in increased damage to humans, animals, and plants. The many dangers to health can be illustrated by the example of energy demand and the different ways to meet it. It is highly necessary to create environmental laws which aim at a reduction of environmental pollution. (orig.) [de

  5. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Education Center Oculofacial Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Eye Health ... Leer en Español: Peligros asociados con los lentes de contacto de color Sep. 26, ...

  6. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Management Member Services Advocacy Foundation About Subspecialties & More Eye Health Home Annual Meeting Clinical Education Practice Management ... Education Center Redmond Ethics Center Global Ophthalmology Guide Eye Health Find an Ophthalmologist Academy Store Eye Health ...

  7. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... EyeCare America Help IRIS Registry Medicare Physician Payment Meetings and Deadlines Museum of Vision Ophthalmology Job Center ... Ophthalmology Guide Find an Ophthalmologist Advanced Search Annual Meeting Clinical Education Practice Management Member Services Advocacy Foundation ...

  8. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Education Center Oculofacial Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Academy Publications EyeNet Ophthalmology Ophthalmology Retina Information for: International Ophthalmologists Media Medical Students Patients and ...

  9. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Member Services Advocacy Foundation About Subspecialties & More Eye Health Home Annual Meeting Clinical Education Practice Management Member ... Center Redmond Ethics Center Global Ophthalmology Guide Eye Health Find an Ophthalmologist Academy Store Eye Health A- ...

  10. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Intervention Retina/Vitreous Uveitis Focus On Pediatric Ophthalmology Education Center Oculofacial Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Academy ...

  11. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Education Center Oculofacial Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Academy Publications EyeNet Ophthalmology Ophthalmology Retina Information for: International Ophthalmologists ...

  12. Colored Contact Lens Dangers

    Medline Plus

    Full Text Available ... Plastic Surgery Center Laser Surgery Education Center Redmond Ethics Center Global Ophthalmology Guide Find an Ophthalmologist Advanced Search Annual Meeting Clinical Education Practice Management Member Services Advocacy Foundation About Subspecialties & More Eye ...

  13. Toxic or dangerous substances present construction materials

    International Nuclear Information System (INIS)

    Campos Alvarado, A.

    2003-01-01

    The purpose of this investigation is the elaboration of a guide which could be used as a support and consultation concerning the topic of safety in the construction, specifically in the area of the use and managing of material and dangerous substances; considering the possible dangers to medium and long term that some of the common construction materials represent for the health. The gathered information is the result of the review of bibliographical material, the visits to public institutions at national level and to international offices which representation in our country, this way as a work of field and of study of the national market, among others. Besides important consult through the Internet checking many sites of interest with the finality of getting more updated information as possible, like that as the consultation to professionals and workers related to the construction area. (Author) [es

  14. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  15. Dangers and Pleasures

    DEFF Research Database (Denmark)

    Järvinen, Margaretha Maria; Østergaard, Jeanette

    2011-01-01

    to ‘hard’ illegal drugs; and, finally, the pro-drug position, characteristic of drug users with low risk perceptions and high pleasure-orientation. We use the focus group interviews to demonstrate how youths occupying these differing positions argue for and against drugs and which risks and pleasures......This is a study of young people’s conceptions of illegal drug use as dangerous and/or pleasurable and an analysis of the relationship between attitudes to drugs, drinking, friends’ reported drug use and own experience with drug use and drinking. The article applies a mixed methods approach using...... both survey data and focus group interviews. The main statistical method is Multiple Correspondence Analysis (MCA), which constructs a social space of young people’s attitudes to drugs and drug experiences relationally. We identify four interrelated positions on illegal drug use among 17 to 19-year...

  16. Danger, hazard, risk

    International Nuclear Information System (INIS)

    Kafka, P.

    1992-01-01

    The real conditions covered by technical safety studies are described better by the term 'risk' instead of such qualitative terms as 'danger' or 'hazard'. 'Risk' incorporates not only the type of damage, the onset of damage, the probability of damage occurring, but also the extent of damage. In reliability and safety engineering, a probabilistic safety analysis is able to describe a plant most comprehensively by these three elements: What can happen? How frequently will it occur? What are the impacts to be taken into account? PSA is meaningful not only when applied to such technical areas in which there is a risk potential; the holistic analytical process optimizes any kind of system and plant in terms of availability and technical safety. (orig.) [de

  17. Is moral bioenhancement dangerous?

    Science.gov (United States)

    Drake, Nicholas

    2016-01-01

    In a recent response to Persson and Savulescu's Unfit for the Future, Nicholas Agar argues that moral bioenhancement is dangerous. His grounds for this are that normal moral judgement should be privileged because it involves a balance of moral subcapacities; moral bioenhancement, Agar argues, involves the enhancement of only particular moral subcapacities, and thus upsets the balance inherent in normal moral judgement. Mistaken moral judgements, he says, are likely to result. I argue that Agar's argument fails for two reasons. First, having strength in a particular moral subcapacity does not necessarily entail a worsening of moral judgement; it can involve strength in a particular aspect of morality. Second, normal moral judgement is not sufficiently likely to be correct to be the standard by which moral judgements are measured. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  18. A hidden history

    OpenAIRE

    Peppers, Emily

    2008-01-01

    The Cultural Collections Audit project began at the University of Edinburgh in 2004, searching for hidden treasures in its 'distributed heritage collections' across the university. The objects and collections recorded in the Audit ranged widely from fine art and furniture to historical scientific and teaching equipment and personalia relating to key figures in the university's long tradition of academic excellence. This information was gathered in order to create a central database of informa...

  19. Distinguishing Hidden Markov Chains

    OpenAIRE

    Kiefer, Stefan; Sistla, A. Prasad

    2015-01-01

    Hidden Markov Chains (HMCs) are commonly used mathematical models of probabilistic systems. They are employed in various fields such as speech recognition, signal processing, and biological sequence analysis. We consider the problem of distinguishing two given HMCs based on an observation sequence that one of the HMCs generates. More precisely, given two HMCs and an observation sequence, a distinguishing algorithm is expected to identify the HMC that generates the observation sequence. Two HM...

  20. Coupling of Hidden Sector

    OpenAIRE

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fer\\-mions (``sterinos'') and sterile mediating bosons (``sterons'') of mass dimension 1 (not 2!) --- the last described by an antisymmetric tensor field --- requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, sugge...

  1. The Clinical Prediction of Dangerousness.

    Science.gov (United States)

    1985-05-01

    8217 8 ings. Szasz (1963) has argued persuasively that clinical predictions of future dangerous behavior are unfairly focused on the mentally ill...Persons labeled paranoid, Szasz states, are readily commitable, while highly dangerous drunken drivers are not. Indeed, dangerousness such as that...Psychology, 31, 492-494. Szasz , T. (1963). Law, liberty and psychiatry. New York: Macmillan. Taft, R. (1955). The ability to judge people. Psychological

  2. PFP dangerous waste training plan

    International Nuclear Information System (INIS)

    Khojandi, J.

    1996-01-01

    This document establishes the minimum training requirements for the Plutonium Finishing Plant (PFP) personnel who are responsible for management of dangerous waste. The training plan outlines training requirements for handling of solid dangerous waste during generator accumulation and liquid dangerous waste during treatment and storage operations. The implementation of this training plan will ensure the PFP facility compliance with the training plan requirements of Dangerous Waste Regulation. Chapter 173-303-330. Washington Administrative Code (WAC). The requirements for such compliance is described in Section 11.0 of WHC-CM-7-5 Environmental Compliance Manual

  3. Localization of hidden Chua's attractors

    International Nuclear Information System (INIS)

    Leonov, G.A.; Kuznetsov, N.V.; Vagaitsev, V.I.

    2011-01-01

    The classical attractors of Lorenz, Rossler, Chua, Chen, and other widely-known attractors are those excited from unstable equilibria. From computational point of view this allows one to use numerical method, in which after transient process a trajectory, started from a point of unstable manifold in the neighborhood of equilibrium, reaches an attractor and identifies it. However there are attractors of another type: hidden attractors, a basin of attraction of which does not contain neighborhoods of equilibria. In the present Letter for localization of hidden attractors of Chua's circuit it is suggested to use a special analytical-numerical algorithm. -- Highlights: → There are hidden attractors: basin doesn't contain neighborhoods of equilibria. → Hidden attractors cannot be reached by trajectory from neighborhoods of equilibria. → We suggested special procedure for localization of hidden attractors. → We discovered hidden attractor in Chua's system, L. Chua in his work didn't expect this.

  4. A dangerous mixture

    Directory of Open Access Journals (Sweden)

    Anna Piva

    2014-03-01

    Full Text Available A 59-year old woman was admitted for fatigue and arm paresthesias with Trousseau sign. Her medical history included thyroidectomy and hypercholesterolemia recently treated with simvastatin. Laboratory tests showed severe hypokalemia and hypocalcemia, severe increase in muscle enzymes, metabolic alkalosis; low plasma renin activity, increased thyroid-stimulating hormone, normal free thyroxine, increased parathyroid hormone, decreased vitamin D3; alterations in electrolyte urinary excretion, cortisol and aldosterone were excluded. Hypothesizing a statin-related myopathy, simvastatin was suspended; the patient reported use of laxatives containing licorice. Electrolytes normalized with intravenous supplementation. Among many biochemical alterations, none stands out as a major cause for muscular and electrolyte disorders. All co-factors are inter-connected, starting with statin-induced myopathy, worsened by hypothyroidism, secondary hyperaldosteronism and vitamin D deficiency, leading to hypocalcemia and hypokalemia, perpetrating muscular and electrolyte disorders. The importance of considering clinical conditions as a whole emerges with multiple co-factors involved. Another issue concerns herbal products and their potential dangerous effects.

  5. Hidden Liquidity: Determinants and Impact

    OpenAIRE

    Gökhan Cebiroglu; Ulrich Horst

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, ...

  6. Hidden Risk Factors for Women

    Science.gov (United States)

    ... A.S.T. Quiz Hidden Stroke Risk Factors for Women Updated:Nov 22,2016 Excerpted from "What Women Need To Know About The Hidden Risk Factors ... 2012) This year, more than 100,000 U.S. women under 65 will have a stroke. Stroke is ...

  7. Higgs Portal into Hidden Sectors

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    Several attractive theoretical ideas suggest the existence of one or more 'hidden sectors' consisting of standard model singlet fields, some of which may not be too heavy. There is a profound reason to think that the Higgs sector might provide the first access to these hidden sectors. This scenario could affect Higgs phenomenology in drastic ways.

  8. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  9. Negativity Bias in Dangerous Drivers.

    Directory of Open Access Journals (Sweden)

    Jing Chai

    Full Text Available The behavioral and cognitive characteristics of dangerous drivers differ significantly from those of safe drivers. However, differences in emotional information processing have seldom been investigated. Previous studies have revealed that drivers with higher anger/anxiety trait scores are more likely to be involved in crashes and that individuals with higher anger traits exhibit stronger negativity biases when processing emotions compared with control groups. However, researchers have not explored the relationship between emotional information processing and driving behavior. In this study, we examined the emotional information processing differences between dangerous drivers and safe drivers. Thirty-eight non-professional drivers were divided into two groups according to the penalty points that they had accrued for traffic violations: 15 drivers with 6 or more points were included in the dangerous driver group, and 23 drivers with 3 or fewer points were included in the safe driver group. The emotional Stroop task was used to measure negativity biases, and both behavioral and electroencephalograph data were recorded. The behavioral results revealed stronger negativity biases in the dangerous drivers than in the safe drivers. The bias score was correlated with self-reported dangerous driving behavior. Drivers with strong negativity biases reported having been involved in mores crashes compared with the less-biased drivers. The event-related potentials (ERPs revealed that the dangerous drivers exhibited reduced P3 components when responding to negative stimuli, suggesting decreased inhibitory control of information that is task-irrelevant but emotionally salient. The influence of negativity bias provides one possible explanation of the effects of individual differences on dangerous driving behavior and traffic crashes.

  10. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  11. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group....

  12. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...

  13. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  14. Hidden Curriculum: An Analytical Definition

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Andarvazh

    2018-03-01

    Full Text Available Background: The concept of hidden curriculum was first used by Philip Jackson in 1968, and Hafferty brought this concept to the medical education. Many of the subjects that medical students learn are attributed to this curriculum. So far several definitions have been presented for the hidden curriculum, which on the one hand made this concept richer, and on the other hand, led to confusion and ambiguity.This paper tries to provide a clear and comprehensive definition of it.Methods: In this study, concept analysis of McKenna method was used. Using keywords and searching in the databases, 561 English and 26 Persian references related to the concept was found, then by limitingthe research scope, 125 abstracts and by finding more relevant references, 55 articles were fully studied.Results: After analyzing the definitions by McKenna method, the hidden curriculum is defined as follows: The hidden curriculum is a hidden, powerful, intrinsic in organizational structure and culture and sometimes contradictory message, conveyed implicitly and tacitly in the learning environment by structural and human factors and its contents includes cultural habits and customs, norms, values, belief systems, attitudes, skills, desires and behavioral and social expectations can have a positive or negative effect, unplanned, neither planners nor teachers, nor learners are aware of it. The ultimate consequence of the hidden curriculum includes reproducing the existing class structure, socialization, and familiarizing learners for transmission and joining the professional world.Conclusion: Based on the concept analysis, we arrived at an analytical definition of the hidden curriculum that could be useful for further studies in this area.Keywords: CONCEPT ANALYSIS, HIDDEN CURRICULUM, MCKENNA’S METHOD

  15. Danger Zones Dead Ahead For The U.S. And China: Prospects And Challenges

    OpenAIRE

    Linnea B. McCord; Terry Young; Peggy J. Crawford

    2013-01-01

    To be successful and remain independent, every country must create a prosperous economy, keep peace among its people, maintain political stability, and ensure the security of the people and the country from internal and external threats. Doing all four at the same time is never easy and in a time of economic volatility, change, and uncertainty juggling all four becomes more difficult. This is when countries enter the danger zone where hidden cracks and fissures in a countrys organization an...

  16. DANGEROUS AND HYPNOTIC DRUG ACT

    Science.gov (United States)

    Whelan, William M.

    1961-01-01

    It is unprofessional conduct within the meaning of the Medical Practice Act to prescribe a dangerous drug without either a medical examination by a physician or other medical indications. Dangerous and hypnotic drugs are specifically defined by both state and federal law and distribution is strictly regulated. A physician may administer to his own patients such amounts of dangerous drugs as are necessary for the immediate needs of the patient. The physician may obtain such needed amounts of these drugs by an order placed with a pharmacist marked “for administration to immediate needs of patients.” A licensed physician may also prescribe dangerous and hypnotic drugs for patients and such prescriptions may be refilled on the specific authorization of the physician. A physician who dispenses dangerous and hypnotic drugs to patients must obtain a hypnotic drug license; he must use specific purchase orders when purchasing; the drugs must be labeled in the manner provided by law; and all records of sale shall be open to inspection by authorized officers of the law and kept for three years. By the Principles of Medical Ethics physicians are bound to limit the source of their professional income to medical services actually rendered. Recent decisions of the Judicial Council answer questions concerning a physician's interest in a corporation which purchases, packages and sells medicines under a corporate name. Also answered are questions as to the measures that exist to prevent physicians from abusing the privilege of owning a pharmacy, and whether a physician can ethically rent space in a building owned by him to a pharmacist with a percentage of the income of the pharmacy as rental. The public welfare of California and the nation as determined by legislation strictly regulates the distribution of dangerous drugs. It is in the best interest of the medical profession and its patients that these laws be understood and carefully observed. PMID:13784776

  17. 616 Nonradioactive Dangerous Waste Storage Facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1991-10-01

    The 616 Nonradioactive Dangerous Waste Storage Facility Dangerous Waste Permit Application consists of both a Part A and a Part B permit application. An explanation of the Part A revisions associated with this storage unit, including the Part A included with this document, is provided at the beginning of the Part A Section. The Part B consists of 15 chapters addressing the organization and content of the Part B Checklist prepared by the Washington State Department of Ecology (Ecology 1987). For ease of reference, the checklist section numbers, in brackets, follow chapter headings and subheadings. The 616 Nonradioactive Dangerous Waste Storage Facility Dangerous Waste Permit Application (Revision 0) was submitted to the Washington State Department of Ecology and the US Environmental Protection Agency on July 31, 1989. Revision 1, addressing Washington State Department of Ecology review comments made on Revision 0 dated November 21, 1989, and March 23, 1990, was submitted on June 22, 1990. This submittal, Revision 2, addresses Washington State Department of Ecology review comments made on Revision 1, dated June 22, 1990, August 30, 1990, December 18, 1990, and July 8, 1991

  18. Are low radiation doses Dangerous?

    International Nuclear Information System (INIS)

    Garcia Lima, O.; Cornejo, N.

    1996-01-01

    In the last few years the answers to this questions has been affirmative as well as negative from a radiation protection point of view low doses of ionizing radiation potentially constitute an agent causing stochasting effects. A lineal relation without threshold is assumed between dose and probability of occurrence of these effects . Arguments against the danger of probability of occurrence of these effects. Arguments again the danger of low dose radiation are reflected in concepts such as Hormesis and adaptive response, which are phenomena that being studied at present

  19. Carbon dioxide dangers demonstration model

    Science.gov (United States)

    Venezky, Dina; Wessells, Stephen

    2010-01-01

    Carbon dioxide is a dangerous volcanic gas. When carbon dioxide seeps from the ground, it normally mixes with the air and dissipates rapidly. However, because carbon dioxide gas is heavier than air, it can collect in snowbanks, depressions, and poorly ventilated enclosures posing a potential danger to people and other living things. In this experiment we show how carbon dioxide gas displaces oxygen as it collects in low-lying areas. When carbon dioxide, created by mixing vinegar and baking soda, is added to a bowl with candles of different heights, the flames are extinguished as if by magic.

  20. Hidden ion population: Revisited

    International Nuclear Information System (INIS)

    Olsen, R.C.; Chappell, C.R.; Gallagher, D.L.; Green, J.L.; Gurnett, D.A.

    1985-01-01

    Satellite potentials in the outer plasmasphere range from near zero to +5 to +10 V. Under such conditions ion measurements may not include the low energy core of the plasma population. In eclipse, the photoelectron current drops to zero, and the spacecraft potential can drop to near zero volts. In regions where the ambient plasma density is below 100 cm -3 , previously unobserved portions of the ambient plasma distribution function can become visible in eclipse. A survey of the data obtained from the retarding ion mass spectrometer (RIMS) on Dynamics Explorer 1 shows that the RIMS detector generally measured the isotropic background in both sunlight and eclipse in the plasma-sphere. Absolute density measurements for the ''hidden'' ion population are obtained for the first time using the plasma wave instrument observations of the upper hybrid resonance. Agreement in total density is found in sunlight and eclipse measurements at densities above 80 cm -3 . In eclipse, agreement is found at densities as low as 20 cm -3 . The isotropic plasma composition is primarily H + , with approx.10% He + , and 0.1 to 1.0% O + . A low energy field-aligned ion population appears in eclipse measurements outside the plasmasphere, which is obscured in sunlight. These field-aligned ions can be interpreted as field-aligned flows with densities of a few particles per cubic centimeter, flowing at 5-20 km/s. The problem in measuring these field-aligned flows in sunlight is the masking of the high energy tail of the field-aligned distribution by the isotropic background. Effective measurement of the core of the magnetospheric plasma distribution awaits satellites with active means of controlling the satellite potential

  1. Container for shipping dangerous material

    International Nuclear Information System (INIS)

    Blum, P.T.

    1987-01-01

    This container for shipping dangerous material is made by a cylindrical casing of austenitic stainless steel with rounded ends and walls of uniform thickness with welded joins, a tubular metal shock absorber fixed over each end of the casing, removable lugs fixed to the casing, optionally retainers for the material within the casing [fr

  2. The dangers of sports journalism

    DEFF Research Database (Denmark)

    Sparre, Kirsten

    2017-01-01

    According to The Committee to Protect Journalists, 2 per cent of all journalists killed since 1992 worked on the sports beat. However, at present there is little understanding of the specific dangers faced by sports journalists. This chapter presents findings from exploratory research on 78 repor...

  3. Prediction of super-heavy N⁎ and Λ⁎ resonances with hidden beauty

    International Nuclear Information System (INIS)

    Wu Jiajun; Zhao Lu; Zou, B.S.

    2012-01-01

    The meson-baryon coupled channel unitary approach with the local hidden gauge formalism is extended to the hidden beauty sector. A few narrow N ⁎ and Λ ⁎ resonances around 11 GeV are predicted as dynamically generated states from the interactions of heavy beauty mesons and baryons. Production cross sections of these predicted resonances in pp and ep collisions are estimated as a guide for the possible experimental search at relevant facilities.

  4. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  5. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  6. Hidden photons in connection to dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah; Ringwald, Andreas; Goodsell, Mark D.

    2013-06-01

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  7. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  8. Detecting hidden particles with MATHUSLA

    Science.gov (United States)

    Evans, Jared A.

    2018-03-01

    A hidden sector containing light long-lived particles provides a well-motivated place to find new physics. The recently proposed MATHUSLA experiment has the potential to be extremely sensitive to light particles originating from rare meson decays in the very long lifetime region. In this work, we illustrate this strength with the specific example of a light scalar mixed with the standard model-like Higgs boson, a model where MATHUSLA can further probe unexplored parameter space from exotic Higgs decays. Design augmentations should be considered in order to maximize the ability of MATHUSLA to discover very light hidden sector particles.

  9. Hidden Crises and Communication: An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  10. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  11. knowledge about obstetric danger signs among preg

    African Journals Online (AJOL)

    user

    about knowledge level of pregnant women on obstetric danger signs. The objective of this .... ple size formula for estimating a single population proportion with the ..... subjects mentioned vaginal bleeding as danger sign during pregnancy ...

  12. Xylitol and Your Dog: Danger, Paws Off

    Science.gov (United States)

    ... Home For Consumers Consumer Updates Xylitol and Your Dog: Danger, Paws Off Share Tweet Linkedin Pin it ... vitamins mouthwash toothpaste Why is Xylitol Dangerous to Dogs, but Not People? In both people and dogs, ...

  13. Entry deterrence and hidden competition

    NARCIS (Netherlands)

    Lavrutich, Maria; Huisman, Kuno; Kort, Peter

    This paper studies strategic investment behavior of firms facing an uncertain demand in a duopoly setting. Firms choose both investment timing and the capacity level while facing additional uncertainty about market participants, which is introduced via the concept of hidden competition. We focus on

  14. Adaptive Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rasmussen, Tage

    1996-01-01

    Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding....

  15. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  16. Dangerousness and mental health policy.

    Science.gov (United States)

    Hewitt, J L

    2008-04-01

    Mental health policy development in the UK has become increasingly dominated by the assumed need to prevent violence and alleviate public concerns about the dangers of the mentally ill living in the community. Risk management has become the expected focus of contemporary mental health services, and responsibility has increasingly been devolved to individual service professionals when systems fail to prevent violence. This paper analyses the development of mental health legislation and its impact on services users and mental health professionals at the micro level of service delivery. Historical precedence, media influence and public opinion are explored, and the reification of risk is questioned in practical and ethical terms. The government's newest proposals for compulsory treatment in the community are discussed in terms of practical efficacy and therapeutic impact. Dangerousness is far from being an objectively observable phenomenon arising from clinical pathology, but is a formulation of what is partially knowable through social analysis and unknowable by virtue of its situation in individual psychic motivation. Risk assessment can therefore never be completely accurate, and the solution of a 'better safe than sorry' approach to mental health policy is ethically and pragmatically flawed.

  17. Exploring knowledge transfer within manufacturing networks and codified information characteristics: the hidden dangers of inaccurate information

    NARCIS (Netherlands)

    Steenhuis, H.J.; de Bruijn, E.J.

    2004-01-01

    Technology transfer is an important aspect of, and takes frequently place in, international manufacturing networks. A key component of a specific technology is the knowledge and information that accompanies it. This study explores the difficulties with transferring technological knowledge and

  18. Hidden Dangers of Computer Modelling: Remarks on Sokolik and Smith's Connectionist Learning Model of French Gender.

    Science.gov (United States)

    Carroll, Susanne E.

    1995-01-01

    Criticizes the computer modelling experiments conducted by Sokolik and Smith (1992), which involved the learning of French gender attribution using connectionist architecture. The article argues that the experiments greatly oversimplified the complexity of gender learning, in that they were designed in such a way that knowledge that must be…

  19. Keeping track of hidden dangers - The short history of the Sabiá virus

    Directory of Open Access Journals (Sweden)

    Joel Henrique Ellwanger

    Full Text Available Abstract Emerging infectious diseases are a global threat. In countries like Brazil, where biodiversity is high and public health conditions in terms of infrastructure and medical care are often precarious, emerging diseases are particularly worrisome. The lack of monitoring strategies to identify pathogens with the potential to cause outbreaks or epidemics is another problem in Brazil and other developing countries. In this article, we present the history of the Sabiá virus (SABV, a pathogen that was described in the 1990s in Brazil. Several aspects of the biology and ecology of the SABV remain unknown. The SABV has the potential to cause hemorrhagic fever in humans. To date, four cases of human infections have been reported worldwide; two were naturally acquired (both in Brazil, whereas the other two were linked to occupational exposure in the laboratory environment (one in Brazil and one in the USA. In this review, we summarize the basic biological and ecological characteristics of the SABV. This is the first work to gather all available data on the historical aspects involving the cases of SABV infection along with an update on its characteristic features.

  20. The accessory papillary muscle with inferior J-waves - peculiarity or hidden danger?

    Directory of Open Access Journals (Sweden)

    du Toit Lorraine

    2009-10-01

    Full Text Available Abstract Originally described in 1953, today the so-called J-wave is the source of much controversy. As a marker of so-called "early repolarization", this variant has been regarded as a totally benign variant since the 1960's. However, since then a wealth of data have indicated that the J-wave may be a marker of a highly arrhythmogenic substrate with a resultant high risk of sudden cardiac death. In this case report a case of an accessory papillary muscle with a prominent J-wave is described. This may be the first of many possible cases where papillary muscle variants may be the cause of the J-wave.

  1. Toxic substances or dangerous presents in the construction materials

    International Nuclear Information System (INIS)

    Campos Alvarado, A.

    2003-01-01

    The purpose of this work of investigation is the elaboration of a guide who serves as support and consults in the referring thing to the subject of the security in the construction, specifically in and area of the use and handling of materials and dangerous substances; Considering the possible dangers to medium and long term that some of but the common construction equipments represent for the health. The obtained data is a bibliographical review, the visits to public institutions and international offices with representation in our country, as well as a work of field and study of the national market, among others. In addition it made an important consultation through network Internet reviewing many sites of with the purpose of obtaining the data but updated interest possible, as well as the consultation to professionals and workers with the area of the construction. (Author) [es

  2. Hidden supersymmetry and large N

    International Nuclear Information System (INIS)

    Alfaro, J.

    1988-01-01

    In this paper we present a new method to deal with the leading order in the large-N expansion of a quantum field theory. The method uses explicitly the hidden supersymmetry that is present in the path-integral formulation of a stochastic process. In addition to this we derive a new relation that is valid in the leading order of the large-N expansion of the hermitian-matrix model for any spacetime dimension. (orig.)

  3. Nuclear danger and nuclear history

    International Nuclear Information System (INIS)

    Howard, M.

    1988-01-01

    This article makes a review of the books Danger and Survival: Choices about the Bomb in the First Fifty Years written by McGeorge Bundy, and War and Peace in the Nuclear Age written by John Newhouse. A history of political decisions on weapon development is given, along with a what if analysis of other options. The lesson of these two books is that it has proved considerably easier to live with nuclear weapons and the Soviet Union than anyone expected forty years ago. It is all the easier if arms control issues, based on worst case analyses, are kept in their place, which is firmly in the background of the overall conduct of foreign policy

  4. Hidden particle production at the ILC

    International Nuclear Information System (INIS)

    Fujii, Keisuke; Itoh, Hideo; Okada, Nobuchika; Hano, Hitoshi; Yoshioka, Tamaki

    2008-01-01

    In a class of new physics models, the new physics sector is completely or partly hidden, namely, a singlet under the standard model (SM) gauge group. Hidden fields included in such new physics models communicate with the standard model sector through higher-dimensional operators. If a cutoff lies in the TeV range, such hidden fields can be produced at future colliders. We consider a scalar field as an example of the hidden fields. Collider phenomenology on this hidden scalar is similar to that of the SM Higgs boson, but there are several features quite different from those of the Higgs boson. We investigate productions of the hidden scalar at the International Linear Collider (ILC) and study the feasibility of its measurements, in particular, how well the ILC distinguishes the scalar from the Higgs boson, through realistic Monte Carlo simulations.

  5. Everyday calculus discovering the hidden math all around us

    CERN Document Server

    Fernandez, Oscar E

    2014-01-01

    Calculus. For some of us, the word conjures up memories of ten-pound textbooks and visions of tedious abstract equations. And yet, in reality, calculus is fun, accessible, and surrounds us everywhere we go. In Everyday Calculus, Oscar Fernandez shows us how to see the math in our coffee, on the highway, and even in the night sky. Fernandez uses our everyday experiences to skillfully reveal the hidden calculus behind a typical day's events. He guides us through how math naturally emerges from simple observations-how hot coffee cools down, for example-and in discussions of over fifty familia

  6. Hidden measurements, hidden variables and the volume representation of transition probabilities

    OpenAIRE

    Oliynyk, Todd A.

    2005-01-01

    We construct, for any finite dimension $n$, a new hidden measurement model for quantum mechanics based on representing quantum transition probabilities by the volume of regions in projective Hilbert space. For $n=2$ our model is equivalent to the Aerts sphere model and serves as a generalization of it for dimensions $n \\geq 3$. We also show how to construct a hidden variables scheme based on hidden measurements and we discuss how joint distributions arise in our hidden variables scheme and th...

  7. Dissipative hidden sector dark matter

    Science.gov (United States)

    Foot, R.; Vagnozzi, S.

    2015-01-01

    A simple way of explaining dark matter without modifying known Standard Model physics is to require the existence of a hidden (dark) sector, which interacts with the visible one predominantly via gravity. We consider a hidden sector containing two stable particles charged under an unbroken U (1 )' gauge symmetry, hence featuring dissipative interactions. The massless gauge field associated with this symmetry, the dark photon, can interact via kinetic mixing with the ordinary photon. In fact, such an interaction of strength ε ˜10-9 appears to be necessary in order to explain galactic structure. We calculate the effect of this new physics on big bang nucleosynthesis and its contribution to the relativistic energy density at hydrogen recombination. We then examine the process of dark recombination, during which neutral dark states are formed, which is important for large-scale structure formation. Galactic structure is considered next, focusing on spiral and irregular galaxies. For these galaxies we modeled the dark matter halo (at the current epoch) as a dissipative plasma of dark matter particles, where the energy lost due to dissipation is compensated by the energy produced from ordinary supernovae (the core-collapse energy is transferred to the hidden sector via kinetic mixing induced processes in the supernova core). We find that such a dynamical halo model can reproduce several observed features of disk galaxies, including the cored density profile and the Tully-Fisher relation. We also discuss how elliptical and dwarf spheroidal galaxies could fit into this picture. Finally, these analyses are combined to set bounds on the parameter space of our model, which can serve as a guideline for future experimental searches.

  8. The Dangers of Educated Girls and Women

    Science.gov (United States)

    John, Vaughn M.

    2016-01-01

    Why do educated girls and women constitute a danger in some societies and for this face extreme danger in their educational endeavours? This article argues that historical and contemporary educational discrimination of girls and women is the hallmark of a violently patriarchal society, and this stubborn injustice is exacerbated under conditions of…

  9. Hidden inventory and safety considerations

    International Nuclear Information System (INIS)

    Anderson, A.R.; James, R.H.; Morgan, F.

    1976-01-01

    Preliminary results are described of the evaluation of residual plutonium in a process line used for the production of experimental fast reactor fuel. Initial attention has been focussed on a selection of work boxes used for processing powders and solutions. Amounts of material measured as ''hidden inventory'' are generally less than 0.1 percent of throughput but in one box containing very complex equipment the amount was exceptionally about 0.5 percent. The total surface area of the box and the installed equipment appears to be the most significant factor in determining the amount of plutonium held-up as ''hidden inventory,'' representing an average of about 4 x 10 -4 g cm -2 . Present results are based on gamma spectrometer measurements but neutron techniques are being developed to overcome some of the inherent uncertainties in the gamma method. It is suggested that the routine use of sample plates of known surface area would be valuable in monitoring the deposition of plutonium in work boxes

  10. Hidden costs of nuclear power

    International Nuclear Information System (INIS)

    England, R.W.

    1979-01-01

    Mr. England contends that these hidden costs add up to a figure much higher than those that appear in the electric utilities' profit and loss account - costs that are borne by Federal taxpayers, by nuclear industry workers, and by all those people who must share their environment with nuclear facilities. Costs he details are additional deaths and illnesses resulting from exposure to radiation, and the use of tax dollars to clean up the lethal garbage produced by those activities. He asserts that careless handling of uranium ore and mill tailings in past years has apparently resulted in serious public health problems in those mining communities. In another example, Mr. England states that the failure to isolate uranium tailings physically from their environment has probably contributed to an acute leukemia rate in Mesa County, Colorado. He mentions much of the technology development for power reactors being done by the Federal government, not by private reactor manufacturers - thus, again, hidden costs that do not show up in electric bills of customers. The back end of the nuclear fuel cycle as a place for Federally subsidized research and development is discussed briefly. 1 figure, 2 tables

  11. NFDRSPC: The National Fire-Danger Rating System on a Personal Computer

    Science.gov (United States)

    Bryan G. Donaldson; James T. Paul

    1990-01-01

    This user's guide is an introductory manual for using the 1988 version (Burgan 1988) of the National Fire-Danger Rating System on an IBM PC or compatible computer. NFDRSPC is a window-oriented, interactive computer program that processes observed and forecast weather with fuels data to produce NFDRS indices. Other program features include user-designed display...

  12. The Hidden Reason Behind Children's Misbehavior.

    Science.gov (United States)

    Nystul, Michael S.

    1986-01-01

    Discusses hidden reason theory based on the assumptions that: (1) the nature of people is positive; (2) a child's most basic psychological need is involvement; and (3) a child has four possible choices in life (good somebody, good nobody, bad somebody, or severely mentally ill.) A three step approach for implementing hidden reason theory is…

  13. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...

  14. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  15. Hidden variables and locality in quantum theory

    International Nuclear Information System (INIS)

    Shiva, Vandana.

    1978-12-01

    The status of hidden variables in quantum theory has been debated since the 1920s. The author examines the no-hidden-variable theories of von Neumann, Kochen, Specker and Bell, and finds that they all share one basic assumption: averaging over the hidden variables should reproduce the quantum mechanical probabilities. Von Neumann also makes a linearity assumption, Kochen and Specker require the preservation of certain functional relations between magnitudes, and Bell proposes a locality condition. It has been assumed that the extrastatistical requirements are needed to serve as criteria of success for the introduction of hidden variables because the statistical condition is trivially satisfied, and that Bell's result is based on a locality condition that is physically motivated. The author shows that the requirement of weak locality, which is not physically motivated, is enough to give Bell's result. The proof of Bell's inequality works equally well for any pair of commuting magnitudes satisfying a condition called the degeneracy principle. None of the no-hidden-variable proofs apply to a class of hidden variable theories that are not phase-space reconstructions of quantum mechanics. The author discusses one of these theories, the Bohm-Bub theory, and finds that hidden variable theories that re all the quantum statistics, for single and sequential measurements, must introduce a randomization process for the hidden variables after each measurement. The philosophical significance of this theory lies in the role it can play in solving the conceptual puzzles posed by quantum theory

  16. Hidden supersymmetry and Fermion number fractionalization

    International Nuclear Information System (INIS)

    Akhoury, R.

    1985-01-01

    This paper discusses how a hidden supersymmetry of the underlying field theories can be used to interpret and to calculate fermion number fractionalization in different dimensions. This is made possible by relating it to a corresponding Witten index of the hidden supersymmetry. The closely related anomalies in odd dimensions are also discussed

  17. Helioscope bounds on hidden sector photons

    International Nuclear Information System (INIS)

    Redondo, J.

    2008-01-01

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to χ -14 , depending on the hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter χ at low masses (m γ' <1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  18. Reducing Future International Chemical and Biological Dangers.

    Energy Technology Data Exchange (ETDEWEB)

    Haddal, Chad [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bull, Diana L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hernandez, Patricia Marie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Foley, John T. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-12-01

    The International Biological and Chemical Threat Reduction Program at Sandia National Laboratories is developing a 15 - year technology road map in support the United States Government efforts to reduce international chemical and biological dangers . In 2017, the program leadership chartered an analysis team to explore dangers in the future international chemical and biological landscape through engagements with national security experts within and beyond Sandia to gain a multidisciplinary perspective on the future . This report offers a hi gh level landscape of future chemical and biological dangers based upon analysis of those engagements and provides support for further technology road map development.

  19. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were...... available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...

  20. Hidden Valley Search at ATLAS

    CERN Document Server

    Verducci, M

    2011-01-01

    A number of extensions of the Standard Model result in neutral and weakly-coupled particles that decay to multi hadrons or multi leptons with macroscopic decay lengths. These particles with decay paths that can be comparable with ATLAS detector dimensions represent, from an experimental point of view, a challenge both for the trigger and for the reconstruction capabilities of the ATLAS detector. We will present a set of signature driven triggers for the ATLAS detector that target such displaced decays and evaluate their performances for some benchmark models and describe analysis strategies and limits on the production of such long-lived particles. A first estimation of the Hidden Valley trigger rates has been evaluated with 6 pb-1 of data collected at ATLAS during the data taking of 2010.

  1. A fire danger rating system for Hawaii

    Science.gov (United States)

    Robert E. Burgan; Francis M. Fujioka; George H. Hirata

    1974-01-01

    Extremes in rainfall on the Hawaiian Islands make it difficult to judge forest fire danger conditions. The use of an automatic data collection and computer processing system helps to monitor the problem.

  2. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  3. A classification of hidden-variable properties

    International Nuclear Information System (INIS)

    Brandenburger, Adam; Yanofsky, Noson

    2008-01-01

    Hidden variables are extra components added to try to banish counterintuitive features of quantum mechanics. We start with a quantum-mechanical model and describe various properties that can be asked of a hidden-variable model. We present six such properties and a Venn diagram of how they are related. With two existence theorems and three no-go theorems (EPR, Bell and Kochen-Specker), we show which properties of empirically equivalent hidden-variable models are possible and which are not. Formally, our treatment relies only on classical probability models, and physical phenomena are used only to motivate which models to choose

  4. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  5. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  6. Hidden costs, value lost: uninsurance in America

    National Research Council Canada - National Science Library

    Committee on the Consequences of Uninsurance

    2003-01-01

    Hidden Cost, Value Lost , the fifth of a series of six books on the consequences of uninsurance in the United States, illustrates some of the economic and social losses to the country of maintaining...

  7. The hidden epidemic: confronting sexually transmitted diseases

    National Research Council Canada - National Science Library

    Eng, Thomas R; Butler, William T

    .... In addition, STDs increase the risk of HIV transmission. The Hidden Epidemic examines the scope of sexually transmitted infections in the United States and provides a critical assessment of the nation's response to this public health crisis...

  8. Perspective: Disclosing hidden sources of funding.

    Science.gov (United States)

    Resnik, David B

    2009-09-01

    In this article, the author discusses ethical and policy issues related to the disclosure of hidden sources of funding in research. The author argues that authors have an ethical obligation to disclose hidden sources of funding and that journals should adopt policies to enforce this obligation. Journal policies should require disclosure of hidden sources of funding that authors know about and that have a direct relation to their research. To stimulate this discussion, the author describes a recent case: investigators who conducted a lung cancer screening study had received funding from a private foundation that was supported by a tobacco company, but they did not disclose this relationship to the journal. Investigators and journal editors must be prepared to deal with these issues in a manner that promotes honesty, transparency, fairness, and accountability in research. The development of well-defined, reasonable policies pertaining to hidden sources of funding can be a step in this direction.

  9. Petro Rents, Political Institutions, and Hidden Wealth

    DEFF Research Database (Denmark)

    Andersen, Jørgen Juel; Johannesen, Niels; Lassen, David Dreyer

    2017-01-01

    Do political institutions limit rent seeking by politicians? We study the transformation of petroleum rents, almost universally under direct government control, into hidden wealth using unique data on bank deposits in offshore financial centers that specialize in secrecy and asset protection. Our...... rulers is diverted to secret accounts. We find very limited evidence that shocks to other types of income not directly controlled by governments affect hidden wealth....

  10. Hidden charm molecules in a finite volume

    International Nuclear Information System (INIS)

    Albaladejo, M.; Hidalgo-Duque, C.; Nieves, J.; Oset, E.

    2014-01-01

    In the present paper we address the interaction of charmed mesons in hidden charm channels in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and several methods for the analysis of these levels ("inverse problem") are investigated. (author)

  11. Workplace ageism: discovering hidden bias.

    Science.gov (United States)

    Malinen, Sanna; Johnston, Lucy

    2013-01-01

    BACKGROUND/STUDY CONTEXT: Research largely shows no performance differences between older and younger employees, or that older workers even outperform younger employees, yet negative attitudes towards older workers can underpin discrimination. Unfortunately, traditional "explicit" techniques for assessing attitudes (i.e., self-report measures) have serious drawbacks. Therefore, using an approach that is novel to organizational contexts, the authors supplemented explicit with implicit (indirect) measures of attitudes towards older workers, and examined the malleability of both. This research consists of two studies. The authors measured self-report (explicit) attitudes towards older and younger workers with a survey, and implicit attitudes with a reaction-time-based measure of implicit associations. In addition, to test whether attitudes were malleable, the authors measured attitudes before and after a mental imagery intervention, where the authors asked participants in the experimental group to imagine respected and valued older workers from their surroundings. Negative, stable implicit attitudes towards older workers emerged in two studies. Conversely, explicit attitudes showed no age bias and were more susceptible to change intervention, such that attitudes became more positive towards older workers following the experimental manipulation. This research demonstrates the unconscious nature of bias against older workers, and highlights the utility of implicit attitude measures in the context of the workplace. In the current era of aging workforce and skill shortages, implicit measures may be necessary to illuminate hidden workplace ageism.

  12. Hidden slow pulsars in binaries

    Science.gov (United States)

    Tavani, Marco; Brookshaw, Leigh

    1993-01-01

    The recent discovery of the binary containing the slow pulsar PSR 1718-19 orbiting around a low-mass companion star adds new light on the characteristics of binary pulsars. The properties of the radio eclipses of PSR 1718-19 are the most striking observational characteristics of this system. The surface of the companion star produces a mass outflow which leaves only a small 'window' in orbital phase for the detection of PSR 1718-19 around 400 MHz. At this observing frequency, PSR 1718-19 is clearly observable only for about 1 hr out of the total 6.2 hr orbital period. The aim of this Letter is twofold: (1) to model the hydrodynamical behavior of the eclipsing material from the companion star of PSR 1718-19 and (2) to argue that a population of binary slow pulsars might have escaped detection in pulsar surveys carried out at 400 MHz. The possible existence of a population of partially or totally hidden slow pulsars in binaries will have a strong impact on current theories of binary evolution of neutron stars.

  13. DANGERS AND SAFETY MEASURES IN A MOUNTAIN

    Directory of Open Access Journals (Sweden)

    Jovica Petković

    2013-07-01

    Full Text Available Mountaineering and everything that is connected with it is a sport with con¬tro¬lled risk. Mountaineers, alpinists, climbers, cavers and all the others who visit and sojourn in mountains are faced with many risks and dangers, which are caused by na¬ture and also by their own mistakes. The dangers in the mountains, like dangers in any other environment, are mainly predictable, so it is best to deal with them with good esti¬mation, knowledge and skill. One has to be aware of his surroundings – the moun¬tain, to respect it and to know what is dangerous and how much it is dangerous at any moment. The organization of the mountaineering expeditions and leadership per¬haps re¬present the highest level of security control. To develop skills for organizing and lead¬ing a group means to ensure the safety of the entire group – to work pre¬ven¬ti¬ve¬ly at the level of the entire group, not only at the level of an individual. The success of the enti¬re group as well as safety depends on the organization and leadership.

  14. Radiation danger of exclusion zone objects

    International Nuclear Information System (INIS)

    Kholosha, V.I.; Proskura, N.I.; Ivanov, Yu.A.; Kazakov, S.V.; Arkhipov, A.N.

    2001-01-01

    The analysis of radiation danger of the Exclusion Zone objects was made. Here, the Zone is defined as the territory from which the population has been evacuated in 1986 owing to the Chernobyl accident and possible outflow of the contaminated substances out of the borders is potentially dangerous to the Ukraine. In the present work were analyzed such problems as sources of radiation danger in the Zone, ways of radionuclide migration out of the borders of the Zone in normal and emergency situations, the non-radiation (ecological) danger factors of the Zone objects, doses (individual and collective) from various sources and on separate ways of their formation, and the characteristics of radiation danger of the Zone objects. The conclusions are: (1) Radionuclide flows both from technologic and natural sources exceed those from Shelter objects, (2) Under emergency conditions, radionuclide flows and doze loading remain comparable with those from emergency sources, (3) To solve some management tasks in radiation situation, the basic works on the Shelter objects should be oriented to decrease probability of emergency occurrence and to reduce radiation influence (prevention wash-outs during high waters, fire-prevention measures in forests and strengthening of the control behind non-authorized use of objects in the Zone). (S. Ohno)

  15. Expressing Anger Is More Dangerous than Feeling Angry when Driving.

    Directory of Open Access Journals (Sweden)

    Weina Qu

    Full Text Available Anger is an emotion that drivers often feel and express while driving, and it is believed by researchers to be an important cause of dangerous driving behavior. In this study, the relationships between driving trait anger, driving anger expression, and dangerous driving behaviors were analyzed. The Driving Anger Scale (DAS was used to measure driving trait anger, whereas the Driving Anger Expression (DAX Inventory was used to measure expressions of driving anger. A sample of 38 drivers completed the DAS, DAX, and a driving simulation session on a simulator where their driving behaviors were recorded. Correlation analysis showed that the higher scores on the DAS were associated with longer durations of speeding in the simulator. The more participants expressed their anger in verbal and physical ways, the more likely they were to crash the virtual vehicle during the simulation. Regression analyses illustrated the same pattern. The findings suggest that, although trait anger is related to speeding, the passive expression of anger is the real factor underling traffic accidents. This study extends findings about the predictive effects of self-report scales of driving behaviors to behaviors recorded on a simulator. Thus, if in traffic safety propaganda, guiding drivers to use positive ways to cope with driving anger is recommended by our findings.

  16. Expressing Anger Is More Dangerous than Feeling Angry when Driving.

    Science.gov (United States)

    Qu, Weina; Dai, Mengnuo; Zhao, Wenguo; Zhang, Kan; Ge, Yan

    2016-01-01

    Anger is an emotion that drivers often feel and express while driving, and it is believed by researchers to be an important cause of dangerous driving behavior. In this study, the relationships between driving trait anger, driving anger expression, and dangerous driving behaviors were analyzed. The Driving Anger Scale (DAS) was used to measure driving trait anger, whereas the Driving Anger Expression (DAX) Inventory was used to measure expressions of driving anger. A sample of 38 drivers completed the DAS, DAX, and a driving simulation session on a simulator where their driving behaviors were recorded. Correlation analysis showed that the higher scores on the DAS were associated with longer durations of speeding in the simulator. The more participants expressed their anger in verbal and physical ways, the more likely they were to crash the virtual vehicle during the simulation. Regression analyses illustrated the same pattern. The findings suggest that, although trait anger is related to speeding, the passive expression of anger is the real factor underling traffic accidents. This study extends findings about the predictive effects of self-report scales of driving behaviors to behaviors recorded on a simulator. Thus, if in traffic safety propaganda, guiding drivers to use positive ways to cope with driving anger is recommended by our findings.

  17. Public Danger of Ecological Crime: Criminological Aspect​

    Directory of Open Access Journals (Sweden)

    Kuznetsova Natalya I.

    2018-03-01

    Full Text Available This article describes the characteristics of public danger of ecological crime. Specific features that distinguish it from other types of criminality are analyzed. Identified and justified are such features of environmental crime as an increased level of public danger, a wider range of victims, the continuing and deferred nature of the negative consequences, their transboundary nature, the irreversibility of the consequences, causing significant harm to the economic interests of the state, expressed in the withdrawal from the legal turnover of huge amounts of valuable natural resources. On the basis of the conducted research the author suggests wide use of the integrated criminological approach to studying the public danger of environmental crime taking into account its quantitative and qualitative characteristics.

  18. Dangerous arachnids-Fake news or reality?

    Science.gov (United States)

    Hauke, Tobias J; Herzig, Volker

    2017-11-01

    The public perception of spiders and scorpions is skewed towards the potential harm they can inflict in humans, despite recent scientific evidence that arachnid venom components might be useful as bioinsecticides or even human therapeutics. Nevertheless, arachnids are becoming more popular as pets in Europe, America and Asia, raising the question for regulatory agencies in these regions as to whether they need to take measurements to protect their citizens. In order to decide upon the necessary regulatory steps, they first need to determine which arachnids are actually dangerous to humans. This review therefore provides an overview of the current literature on verified bites and stings from spiders and scorpions with the aim of assessing their potential danger for human health. As a guideline, we also provide a list of those arachnid genera that we consider as potentially dangerous, which includes 10 spider and 11 scorpion genera. The arachnid genera classified as dangerous comprise less than a quarter of all extant scorpion species and only 0.5% of all spiders species, with the actual number most likely being much lower than that, as not all species in those genera might turn out to pose an actual threat for humans. In conclusion, we found that only a small percentage of scorpions and a minute percentage of all spiders can be considered as potentially dangerous to humans. While in some countries of origin the high incidence of envenomations by dangerous arachnids can result in a serious problem to the health system, we assessed the risk that the same species pose when kept as pets under controlled maintenance conditions as significantly lower. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. The hidden crime: human trafficking.

    Science.gov (United States)

    Clause, Kristen J; Lawler, Kate Byrnes

    2013-01-01

    As the primary contact in the health care system, nurses can play a role in combating this crime and assisting the victims. Assessment for abuse, neglect, trauma, recurrent sexually transmitted infections (STIs) and fear of a controlling partner is critical. Following up on "red flags" and understanding methods of safe questioning can make the difference between slavery and recovery for victims. Nurses must also know the professional referrals in their areas once a potential victim has been identified. This may be a very dangerous undertaking and must be handled by experienced personnel. Referrals to forensic nurses or physicians, domestic violence professionals or law enforcement may be indicated. Initially, a nurse may want to consult with the agency social worker for guidance. Human trafficking is a human rights crime. Unfortunately, it is more prevalent in all types of communities than most people suspect. Nurses can be heroes to the victims through understanding of this crime and vigilance in the assessment and care of all people they encounter in their practices.

  20. Guiding young adults at risk

    DEFF Research Database (Denmark)

    Andreasen, Karen Egedal; Rasmussen, Palle Damkjær; Ydesen, Christian

    2016-01-01

    Karen Egedal Andreasen, Palle Rasmussen and Christian Ydesen question in their article, how to guide youth in danger of being marginalised or excluded from society in general and the labour market in particular. They analyse the guidance dimension in the youth in development project as described ...... significant persons and guidance about educational system and possible jobs....

  1. Dangerous quantities of radioactive material (D-values)

    International Nuclear Information System (INIS)

    2010-01-01

    Radioactive material is widely used in industry, medicine, education and agriculture. In addition, it occurs naturally. The health risk posed by these materials vary widely depending on many factors, the most important of which are the amount of the material involved and its physical and chemical form. Therefore, there is a need to identify the quantity and type of radioactive material for which emergency preparedness and other arrangements (e.g. security) are warrant due to the health risk they pose. The aim of this publication is to provide practical guidance for Member States on that quantity of radioactive material that may be considered dangerous. A dangerous quantity is that, which if uncontrolled, could be involved in a reasonable scenario resulting in the death of an exposed individual or a permanent injury, which decreases that person's quality of life. This publication is published as part of the IAEA Emergency Preparedness and Response Series. It supports several publications including: the IAEA Safety Requirements 'Preparedness and Response for a Nuclear or Radiological Emergency', IAEA Safety Standards Series No. GS-R-2. IAEA, Vienna (2002). IAEA Safety Guide 'Categorization of Radioactive Sources', IAEA Safety Standards Series No RS-G-1.9, IAEA, Vienna (2005) and IAEA Safety Guide 'Arrangements for Preparedness for a Nuclear or Radiological Emergency' IAEA Safety Standards Series No. GS-G-2.1, IAEA, Vienna (2006). The procedures and data in this publication have been prepared with due attention to accuracy. However, as part of the review process, they undergo ongoing quality assurance checks. Comments are welcome and, following a period that will allow for a more extensive review, the IAEA may revise this publication as part of the process of continuous improvement. The publication uses a number of exposure scenarios, risk models and dosimetric data, which could be used during the response to nuclear or radiological emergency or other purposes

  2. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, M.

    2008-07-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  3. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, Markus; Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the standard model Higgs via a renormalizable quartic term - sometimes called the Higgs portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs, we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone.

  4. Keep away from danger: Dangerous objects in dynamic and static situations

    Directory of Open Access Journals (Sweden)

    Filomena eAnelli

    2013-07-01

    Full Text Available Behavioral and neuroscience studies have shown that objects observation evokes specific affordances (i.e., action possibilities and motor responses. Recent findings provide evidence that even dangerous objects can modulate the motor system evoking aversive affordances. This sounds intriguing since so far the majority of behavioral, brain imaging, and transcranial magnetic stimulation studies with painful and dangerous stimuli strictly concerned the domain of pain, excepted for evidence suggesting sensitivity to objects’ affordances when neutral objects are located in participants’ peripersonal space. This study investigates whether the observation of a neutral or dangerous object in a static or dynamic situation differently influences motor responses, and the time-course of the dangerous objects’ processing. In three experiments we manipulated: object dangerousness (neutral vs. dangerous; object category (artifact vs. natural; manual response typology (press vs. release a key; object presentation (Experiment 1: dynamic, Experiments 2 and 3: static; object movement direction (Experiment 1: away vs. toward the participant or size (Experiments 2 and 3: big vs. normal vs. small. The task required participants to decide whether the object was an artifact or a natural object, by pressing or releasing one key. Results showed a facilitation for neutral over dangerous objects in the static situation, probably due to an affordance effect. Instead, in the dynamic condition responses were modulated by the object movement direction, with a dynamic affordance effect of neutral objects and an escape-avoidance effect of dangerous objects (neutral objects were processed faster when they moved toward-approached the participant, whereas dangerous objects were processed faster when they moved away from the participant. Moreover, static stimuli influenced the manual response typology. These data indicate the emergence of dynamic affordance and escaping

  5. Grout treatment facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1988-01-01

    This section briefly describes the Hanford Site, provides a general description of the site operations and administration, provides an overview of the contents of this Grout Treatment Facility (GTF) Permit Application, and gives a list of acronyms and abbreviations used in the document. The decision was made to use the checklist as a locator reference instead of using the checklist section numbers as paragraph section numbers because several different types of waste management units, some of which are not addressed in the checklists, are part of the GTF. The GTF is a waste management unit within the Hanford Site facility. In May 1988, permit application was filed that identified the GTF as an existing facility. The GTF mixes dry cementitious solids with liquid mixed wastes (containing both dangerous and radioactive constituents) produced by Hanford Site operations. In addition to the design and operating features of the GTF that are intended to meet the requirements of dangerous waste regulations, many additional design and operating features are necessary to comply with radioactive waste management practices. The GTF design features and practices are intended to keep operational exposure to radionuclides and dangerous substances ''as low as reasonably achievable'' (ALARA) and to provide a disposal system that protects the environment for at least 10,000 yr. In some instances, ALARA practices present difficulties when complying with requirements of dangerous waste regulations

  6. Grout treatment facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1988-01-01

    This section briefly describes the Hanford Site, provides a general description of the site operations and administration, provides an overview of the contents of this Grout Treatment Facility (GTF) Permit Application, and gives a list of acronyms and abbreviations used in the document. The decision was made to use the checklist as a locator reference instead of using the checklist section numbers as paragraph section numbers because several different types of waste management units, some of which are not addressed in the checklists, are part of the GTF. The GTF is a waste management unit within the Hanford Site facility. In May 1988, a permit application was filed that identified the GTF as an existing facility. The GTF mixes dry cementitious solids with liquid mixed wastes (containing both dangerous and radioactive constituents) produced by Hanford Site operations. In addition to the design and operating features of the GTF that are intended to meet the requirements of dangerous waste regulations, many additional design and operating features are necessary to comply with radioactive waste management practices. The GTF design features and practices are intended to keep operational exposure to radionuclides and dangerous substances ''as low as reasonably achievable'' (ALARA) and to provide a disposal system that protects the environment for at least 10,000 yr. In some instances, ALARA practices present difficulties when complying with requirements of dangerous waste regulations. This volume contains 2 appendices covering engineering drawings and operating procedures

  7. The principles of measuring forest fire danger

    Science.gov (United States)

    H. T. Gisborne

    1936-01-01

    Research in fire danger measurement was commenced in 1922 at the Northern Rocky Mountain Forest and Range Experiment Station of the U. S. Forest Service, with headquarters at Missoula, Mont. Since then investigations have been made concerning ( 1) what to measure, (2) how to measure, and ( 3) field use of these measurements. In all cases the laboratory or restricted...

  8. Securing the dangerous UN convoys in Mali

    DEFF Research Database (Denmark)

    Haugegaard, Rikke; Albrecht, Peter; Ravnkilde, Signe Cold

    2017-01-01

    It has proven particularly challenging for the UN stabilization mission in Mali (MINUSMA) to transport fuel, food and water to military camps in Sector North on the frontline of the mission. Convoy escorts drain the UN mission of resources and is one of its most dangerous tasks, mainly carried ou...

  9. Hierarchy of controls applied to dangerous substances

    NARCIS (Netherlands)

    Terwoert, J.

    2014-01-01

    Too often, measures to control workers’ exposure to dangerous substances are taken on an ‘ad-hoc’ basis. Existing processes, procedures and routines are taken for granted, and ‘end-of-pipe’ solutions are installed. In many cases, one relies on the use of personal protective equipment. This may lead

  10. Teens and Steroids: A Dangerous Combo

    Science.gov (United States)

    ... Endocrinology Products, warns teens and parents about the dangers of steroid use. Q: What are anabolic steroids ... لعربية | Kreyòl Ayisyen | Français | Polski | Português | Italiano | Deutsch | 日本語 | ف ...

  11. Transport of dangerous goods through road tunnels

    DEFF Research Database (Denmark)

    Jørgensen, N O; Lacroix, Didier; Amundsen, F.H.

    1999-01-01

    A paper which describes the work of an OECD research group. The group has suggested a grouping of dangerous materials, a quantitative risk assessment model and a decision support model which should allow tunnel operators to determine if a given material should be allowed throug a given tunnel...

  12. The Dangers of Aestheticism in Schooling.

    Science.gov (United States)

    Meager, Ruby

    1981-01-01

    Prompted by Immanuel Kant's analysis of the nature and operations of the imagination in his "Critique of the Aesthetical Judgment," this article points out the danger of encouraging imagination-borne aesthetical judgments and explanatory hypotheses. Concludes that understanding requires submission to more stringent standards of objectivity and to…

  13. Augustine on the Dangers of Friendship

    NARCIS (Netherlands)

    Nawar, Tamer

    2015-01-01

    The philosophers of antiquity had much to say about the place of friendship in the good life and its role in helping us live virtuously. Augustine is unusual in giving substantial attention to the dangers of friendship and its potential to serve as an obstacle (rather than an aid) to virtue. Despite

  14. Inherent Dangers in Orogenital Sex During Pregnancy

    African Journals Online (AJOL)

    Coitus and cunnilingus during pregnancy are generally safe; whereas orogenital sex involving vaginal air insufflations can be very dangerous, causing even the death of the women. We carried out a search of case reports and reviews concerning air embolism during pregnancy due to orogenital sex. Physicians ...

  15. Grout treatment facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1988-01-01

    This section briefly describes the Hanford Site, provides a general description of the site operations and administration, provides an overview of the contents of this Grout Treatment Facility (GTF) Permit Application, and gives a list of acronyms and abbreviations used in the document. The decision was made to use the checklist as a locator reference instead of using the checklist section numbers as paragraph section numbers because several different types of waste management units, some of which are not addressed in the checklists, are part of the GTF. The GTF is a waste management unit within the Hanford Site facility. In May 1988, a permit application was filed that identified the GTF as an existing facility. The GTF mixes dry cementitious solids with liquid mixed wastes (containing both dangerous and radioactive constitutents) produced by Hanford Site operations. In addition to the design and operating features of the GTF that are intended to meet the requirements of dangerous waste regulations, many additional design and operating features are necessary to comply with radioactive waste management practices. The GTF design features and practices are intended to keep operational exposure to radionuclides and dangerous substances ''as low as reasonably achievable'' (ALARA) and to provide a disposal system that protects the environment for at least 10,000 yr. In some instances, ALARA practices present difficulties when complying with requirements of dangerous waste regulations. This volume contains 2 Appendices covering engineering drawings and operating procedures

  16. The wind energy in danger in France

    International Nuclear Information System (INIS)

    2005-03-01

    The law project of march 2005, concerning the energy policy in France is dangerous for the wind power development. The new regulation favor the big installations in order to protect the environment. In fact this decision will limit the wind turbines installations. (A.L.B.)

  17. Grout Treatment Facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1988-01-01

    This section briefly describes the Hanford Site, provides a general description of the site operations and administration, provides an overview of the contents of this Grout Treatment Facility (GTF) Permit Application, and gives a list of acronyms and abbreviations used in the document. The decision was made to use the checklist as a locator reference instead of using the checklist section numbers as paragraph section numbers because several different types of waste management units, some of which are not addressed in the checklists, are part of the GTF. The GTF is a waste management unit within the Hanford Site facility. In May 1988, a permit application was filed that identified the GTF as an existing facility. The GTF mixes dry cementitious solids with liquid wastes (containing both dangerous and radioactive constituents) produced by Hanford Site operations. In addition to the design and operating features of the GTF that are intended to meet the requirements of dangerous waste regulations, many additional design and operating features are necessary to comply with radioactive waste management practices. The GTF design features and practices are intended to keep operational exposure to radionuclides and dangerous substances ''as low as reasonably achievable'' (ALARA) and to provide a disposal system that protects the environment for at least 10,000 yr. In some instances, ALARA practices present difficulties when complying with requirements of dangerous waste regulations. This volume contains 14 Appendices. Topics include Engineering Drawings, Maps, Roads, Toxicity Testing, and Pilot-Scale Testing

  18. (Neuro)predictions, Dangerousness, and Retributivism

    DEFF Research Database (Denmark)

    Petersen, Thomas Søbirk

    2014-01-01

    Through the criminal justice system so-called dangerous offenders are, besides the offence that they are being convicted of and sentenced to, also punished for acts that they have not done but that they are believe to be likely to commit in the future. The aim of this paper is to critically discu...

  19. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  20. Geometric phases and hidden local gauge symmetry

    International Nuclear Information System (INIS)

    Fujikawa, Kazuo

    2005-01-01

    The analysis of geometric phases associated with level crossing is reduced to the familiar diagonalization of the Hamiltonian in the second quantized formulation. A hidden local gauge symmetry, which is associated with the arbitrariness of the phase choice of a complete orthonormal basis set, becomes explicit in this formulation (in particular, in the adiabatic approximation) and specifies physical observables. The choice of a basis set which specifies the coordinate in the functional space is arbitrary in the second quantization, and a subclass of coordinate transformations, which keeps the form of the action invariant, is recognized as the gauge symmetry. We discuss the implications of this hidden local gauge symmetry in detail by analyzing geometric phases for cyclic and noncyclic evolutions. It is shown that the hidden local symmetry provides a basic concept alternative to the notion of holonomy to analyze geometric phases and that the analysis based on the hidden local gauge symmetry leads to results consistent with the general prescription of Pancharatnam. We however note an important difference between the geometric phases for cyclic and noncyclic evolutions. We also explain a basic difference between our hidden local gauge symmetry and a gauge symmetry (or equivalence class) used by Aharonov and Anandan in their definition of generalized geometric phases

  1. Massive hidden photons as lukewarm dark matter

    International Nuclear Information System (INIS)

    Redondo, Javier; Postma, Marieke

    2008-11-01

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  2. Massive hidden photons as lukewarm dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Postma, Marieke [Nationaal Inst. voor Kernfysica en Hoge-Energiefysica (NIKHEF), Amsterdam (Netherlands)

    2008-11-15

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  3. Religious Tolerance in the Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Kevin Nobel Kurniawan

    2018-03-01

    Full Text Available Religious intolerance is spreading within the Indonesian institution of education. Previous studies have shown that the growth of intolerance is due to the state’s regulation and pedagogical apparatus. In contrast to the previous studies, I argue that the intolerance is related to hidden curriculum applied by the institution of education.  Normatively, the hidden curriculum contains the value of religious tolerance. However, factually, the author found that there are practices of intolerance, through the formal and informal spheres in the school’s structure, within the hidden curriculum. This article applies a qualitative approach with a mixed method research strategy to analyze data collected from students, teachers, and alumnis through field observation, in-depth interview, and survey.

  4. Hanford facility dangerous waste permit application, 616 Nonradioactive Dangerous Waste Storage Facility. Revision 2A

    International Nuclear Information System (INIS)

    Bowman, R.C.

    1994-04-01

    This permit application for the 616 Nonradioactive Dangerous Waste Storage Facility consists for 15 chapters. Topics of discussion include the following: facility description and general provisions; waste characteristics; process information; personnel training; reporting and record keeping; and certification

  5. The origin of the hidden supersymmetry

    International Nuclear Information System (INIS)

    Jakubsky, Vit; Nieto, Luis-Miguel; Plyushchay, Mikhail S.

    2010-01-01

    The hidden supersymmetry and related tri-supersymmetric structure of the free particle system, the Dirac delta potential problem and the Aharonov-Bohm effect (planar, bound state, and tubule models) are explained by a special nonlocal unitary transformation, which for the usual N=2 supercharges has a nature of Foldy-Wouthuysen transformation. We show that in general case, the bosonized supersymmetry of nonlocal, parity even systems emerges in the same construction, and explain the origin of the unusual N=2 supersymmetry of electron in three-dimensional parity even magnetic field. The observation extends to include the hidden superconformal symmetry.

  6. Signatures of a hidden cosmic microwave background.

    Science.gov (United States)

    Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-09-26

    If there is a light Abelian gauge boson gamma' in the hidden sector its kinetic mixing with the photon can produce a hidden cosmic microwave background (HCMB). For meV masses, resonant oscillations gammagamma' happen after big bang nucleosynthesis (BBN) but before CMB decoupling, increasing the effective number of neutrinos Nnu(eff) and the baryon to photon ratio, and distorting the CMB blackbody spectrum. The agreement between BBN and CMB data provides new constraints. However, including Lyman-alpha data, Nnu(eff) > 3 is preferred. It is tempting to attribute this effect to the HCMB. The interesting parameter range will be tested in upcoming laboratory experiments.

  7. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  8. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2016-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  9. Liability in maritime transport of dangerous goods

    International Nuclear Information System (INIS)

    Feldhaus, H.

    1985-01-01

    The first part contains a description of national liability standards for maritime transport in the French, English, US-American and West German legislation. This is followed up by a detailed review of the existing international agreements. The book is rounded off by a critical evaluation of the presently held discussion and suggested solutions on the problems of liability in the maritime transport of dangerous goods other than mineral oil. The author takes a close look at the 'Entwurf eines Internationalen Uebereinkommens ueber die Haftung und den Schadenersatz bei der Befoerderung schaedlicher und gefaehrlicher Stoffe auf See' ('draft of an international agreement on liability and compensation for damage in maritime transport of noxious and dangerous goods') in the version of May 23, 1983, which was discussed on an international diplomat's conference in London without however, yielding any concrete results. (orig./HP) [de

  10. Compressing the hidden variable space of a qubit

    OpenAIRE

    Montina, Alberto

    2010-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of a single realization is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with the quantum states satisfy reasonable criteria ...

  11. PUREX Storage Tunnels dangerous waste permit application

    International Nuclear Information System (INIS)

    1991-12-01

    This report is part of a dangerous waste permit application for the storage of wastes from the Purex process at Hanford. Appendices are presented on the following: construction drawings; HSW-5638, specifications for disposal facility for failed equipment, Project CA-1513-A; HWS-8262, specification for Purex equipment disposal, Project CGC 964; storage tunnel checklist; classification of residual tank heels in Purex storage tunnels; emergency plan for Purex facility; training course descriptions; and the Purex storage tunnels engineering study

  12. Grout Treatment Facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1992-07-01

    The Grout Treatment Facility (GTF) is an existing treatment, storage, and/or disposal (TSD) unit located in the 200 East Area and the adjacent 600 Area of the Hanford Site. The GTF mixes dry cementitious solids with liquid mixed waste (containing both dangerous and radioactive constituents) produced by Hanford Site operations. The GTF consists of the following: The 241-AP-02D and 241-AP-04D waste pump pits and transfer piping; Dry Materials Facility (DMF); Grout Disposal Facility (GDF), consisting of the disposal vault and support and monitoring equipment; and Grout Processing Facility (GPF) and Westinghouse Hanford Company on the draft Hanford Facility Dangerous Waste Permit and may not be read to conflict with those comments. The Grout Treatment Facility Dangerous Waste Permit Application consists of both a Part A and a Part B permit application. An explanation of the Part A revisions associated with this TSD unit, including the current revision, is provided at the beginning of the Part A section. The Part B consists of 15 chapters addressing the organization and content of the Part B checklist prepared by the Washington State Department of Ecology (Ecology 1987). For ease of reference, the checklist section numbers, in brackets, follow chapter headings and subheadings

  13. Alcohol Overdose: The Dangers of Drinking Too Much

    Science.gov (United States)

    ... The Dangers of Drinking Too Much Print version Alcohol Overdose: The Dangers of Drinking Too Much Celebrating ... excess. And the results can be deadly. Identifying Alcohol Poisoning Critical Signs and Symptoms of Alcohol Poisoning ...

  14. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover com...

  15. The Hidden Cost of Buying a Computer.

    Science.gov (United States)

    Johnson, Michael

    1983-01-01

    In order to process data in a computer, application software must be either developed or purchased. Costs for modifications of the software package and maintenance are often hidden. The decision to buy or develop software packages should be based upon factors of time and maintenance. (MLF)

  16. Hidden symmetries in five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, M.

    2003-05-01

    This thesis is concerned with the study of hidden symmetries in supergravity, which play an important role in the present picture of supergravity and string theory. Concretely, the appearance of a hidden G 2(+2) /SO(4) symmetry is studied in the dimensional reduction of d=5, N=2 supergravity to three dimensions - a parallel model to the more famous E 8(+8) /SO(16) case in eleven-dimensional supergravity. Extending previous partial results for the bosonic part, I give a derivation that includes fermionic terms. This sheds new light on the appearance of the local hidden symmetry SO(4) in the reduction, and shows up an unusual feature which follows from an analysis of the R-symmetry associated with N=4 supergravity and of the supersymmetry variations, and which has no parallel in the eleven-dimensional case: The emergence of an additional SO(3) as part of the enhanced local symmetry, invisible in the dimensional reduction of the gravitino, and corresponding to the fact that, of the SO(4) used in the coset model, only the diagonal SO(3) is visible immediately upon dimensional reduction. The uncovering of the hidden symmetries proceeds via the construction of the proper coset gravity in three dimensions, and matching it with the Lagrangian obtained from the reduction. (orig.)

  17. Discovering hidden sectors with monophoton Z' searches

    International Nuclear Information System (INIS)

    Gershtein, Yuri; Petriello, Frank; Quackenbush, Seth; Zurek, Kathryn M.

    2008-01-01

    In many theories of physics beyond the standard model, from extra dimensions to Hidden Valleys and models of dark matter, Z ' bosons mediate between standard model particles and hidden sector states. We study the feasibility of observing such hidden states through an invisibly decaying Z ' at the LHC. We focus on the process pp→γZ ' →γXX † , where X is any neutral, (quasi-) stable particle, whether a standard model neutrino or a new state. This complements a previous study using pp→ZZ ' →l + l - XX † . Only the Z ' mass and two effective charges are needed to describe this process. If the Z ' decays invisibly only to standard model neutrinos, then these charges are predicted by observation of the Z ' through the Drell-Yan process, allowing discrimination between Z ' decays to standard model ν's and invisible decays to new states. We carefully discuss all backgrounds and systematic errors that affect this search. We find that hidden sector decays of a 1 TeV Z ' can be observed at 5σ significance with 50 fb -1 at the LHC. Observation of a 1.5 TeV state requires super-LHC statistics of 1 ab -1 . Control of the systematic errors, in particular, the parton distribution function uncertainty of the dominant Zγ background, is crucial to maximize the LHC search reach.

  18. Hidden Markov models for labeled sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1994-01-01

    A hidden Markov model for labeled observations, called a class HMM, is introduced and a maximum likelihood method is developed for estimating the parameters of the model. Instead of training it to model the statistics of the training sequences it is trained to optimize recognition. It resembles MMI...

  19. Protocol for the Control of Emergencies with Dangerous Materials

    International Nuclear Information System (INIS)

    Rodriguez Acosta, F.

    2000-01-01

    This document is required to serve as a guide for plant engineers, in charge of the security and industrial hygiene or those people that for its work, have relationship with the use, storage and distribution of chemical substances, which represent a diversity of risks as the toxicity, the inflammability and the risk of explosion. The information that the specific protocol contains is precise and a series of sections that summarize the general information of the substance are developed, like its use, the risk of explosion, the inflammability and the physical-chemical properties. Additionally, some sections are included like the answer mechanisms before the fire presence, the personnel's decontamination and of the equipment, the gathering of the waste and the procedures of first aids. The chemical substances that cause bigger quantity of events for dangerous materials in Costa Rica are the acids, the bases, the chlorine, the liquate petroleum gas (LPG), the ammonia and the agro-chemicals. Due to the intrinsic risk that it possesses these substances, a protocol to act efficiently in front of an emergency related with some of the substances are developed. Due to the increment in the incidence of events with dangerous materials in different population's sectors, for example spills in the roads, emergencies in industries and educational centers, a law with the purpose of stopping the use and the indiscriminate manipulation of these substances in non-capable locations is necessary. Additionally, it is necessary the upgrade in the equipment and in the containers that don't fulfill the minimum requirements of security, as well as to offer the maximum security to people that have contact with such chemical substances. (Author) [es

  20. Nuclear weapons, a danger for our world

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This report is about an exhibition about the danger of the increasing amount of nuclear-weapons and was presented in the occasion of the second special meeting of the UN General Assembly (1982). This report describes the causes of a nuclear-war and analyses the causes of the bomb-drop of Hiroshima and Nagasaki as well as possible causes of a bombing of New York City and long-term-consequences of nuclear radiation. Furthermore it lists problems with a higher priority than the armament of nuclear-arms. (kancsar)

  1. A dangerous movie? Hollywood does psychoanalysis.

    Science.gov (United States)

    Ferrell, Donald R; Silverman, Martin A

    2014-12-01

    After the appearance of David Cronenberg's film A Dangerous Method in 2011, dealing with the relationships of Sigmund Freud, C. G. Jung and Sabina Spielrein, Dr. Donald Ferrell published: A Dangerous Method, A Film Directed by David Cronenberg: An Extended Review (Ferrell 2012) in the Journal of Religion and Health. Upon its publication, Dr. Ferrell's article was nominated for a Gradiva Award by the National Association for the Advancement of Psychoanalysis. On November 1, 2013, the Association for the Psychoanalysis of Culture and Society held its annual conference at Rutgers University, New Brunswick, NJ. Dr. Billie Pivnick, a member at large of the Board of Directors of the APCS and also on the Editorial Board of the Journal of Religion and Health, persuaded the 2013 Conference Program Committee that Cronenberg's film would make an interesting subject for discussion for conference participants. To that end, Dr. Pivnick invited Dr. Ferrell, C. G. Jung Institute of New York, Dr. Steven Reisner, Coalition for an Ethical Psychology, and Dr. Martin Silverman, Training and Supervising Analyst and Supervising Child Analyst at the Institute for Psychoanalytic Education, NYU College of Medicine, Training and Supervising Analyst at the Center for Psychotherapy and Psychoanalysis of New Jersey, and Associate Editor of The Psychoanalytic Quarterly to serve as panel members to discuss: A Dangerous Movie? Hollywood does Psychoanalysis. Presentations on Cronenberg's film and the early history of psychoanalysis were given by Drs. Ferrell and Reisner, followed by a response to their presentations by Dr. Silverman. Dr. Pivnick chaired the session. The articles presented here were given originally at the APCS conference by Dr. Ferrell and Dr. Silverman. Dr. Reisner declined the invitation to submit his presentation for publication. Dr. Silverman's remarks were based not only on the presentation given by Dr. Ferrell at the session on A Dangerous Movie?, but also on his close and

  2. [Accidents on Iceland's most dangerous roads].

    Science.gov (United States)

    Bjarnason, Thóroddur; Arnarsson, Sveinn

    2012-02-01

    The objective of this paper was to identify the most dangerous segments of the Icelandic road system in terms of the number of accidents pr km and the rate of accidents pr million km travelled. First to identify the segments where the number of accidents is highest and where the risk of the individual traveller is the greatest. Second to evaluate if the association between the number and the rate of accidents is positive or negative. Third to identify the road segments that are the most dangerous in the sense of many accidents and great risk to individual travellers. Main roads outside urban centers were divided into 45 segments that were on average 78 km in length. Infrequently travelled roads and roads within urban centers were omitted. Information on the length of roads, traffic density and number of accidents was used to calculate the number of accidents per km and the rate of accidents per million km travelled. The correlation between the number and rate of accidents was calculated and the most dangerous road segments were identified by the average rank order on both dimensions. Most accidents pr km occurred on the main roads to and from the capital region, but also east towards Hvolsvöllur, north towards Akureyri and in the Mideast region of the country. The rate of accidents pr million km travelled was highest in the northeast region, in northern Snæfellsnes and in the Westfjords. The most dangerous roads on both dimensions were in Mideast, northern Westfjords, in the north between Blönduós and Akureyri and in northern Snæfellsnes. Most accidents pr km occurred on roads with a low accident rate pr million km travelled. It is therefore possible to reduce accidents the most by increasing road safety where it is already the greatest but that would however increase inequalities in road safety. Policy development in transportation is therefore in part a question of priorities in healthcare. Individual equality in safety and health are not always fully

  3. Surgical management of cutaneous infection caused by atypical mycobacteria after penetrating injury: the hidden dangers of horticulture.

    Science.gov (United States)

    Holland, J; Smith, C; Childs, P A; Holland, A J

    1997-02-01

    We identified two patients in a 12-month period who presented with cutaneous infection and secondary lymph node involvement from atypical mycobacterial infection after minor gardening injuries. One patient had a coinfection with Nocardia asteroides. Both patients required multiple surgical interventions, despite appropriate antibiotic therapy, before resolution of the disease. The course of the infection was characterized by chronic relapses with complete healing at 12 to 18 months after the original injury. The identification and management of this clinical problem are reviewed.

  4. Hidden Danger of Irrational Abusing Illegal Androgenic-anabolic Steroids in Recreational Athletes Age Under 35 in Bosnia & Herzegovina.

    Science.gov (United States)

    Solakovic, Sid; Totic, Dragan; Vukas, Haris; Djedovic, Muhamed

    2015-06-01

    Androgenic-anabolic steroids are rarely used by sportsmen who want to improve physical performance in competition sport. Despite that they are well aware of the side effects of anabolic steroids, many young athletes in Bosnia and Herzegovina without competition motivation come in temptation, trying to achieve better muscle proportion and physical performance unknowing consequence of side effects and what is hiding behind. Risk factors such as increasing of lipid levels and arterial hypertension are major factors which have important role in the Pathogenesis of atherosclerosis and are responsible for occurrence of cardiovascular disease even causing a sudden death in young athletes. The aim of the study was to estimate the frequency of misusing of androgenic anabolic steroid drugs in young recreational sportsmen without competition motivation. This study will try to estimate vascular and lipid status, analyzing the side effects of steroids in young recreational athletes under the age of 35, in Bosnia and Herzegovina. The study included 70 individuals in period of 2010 till 2015 on recreational exercising program; 35 individuals misusing androgenic anabolic steroids during the period of 5 years were compared with 35 individuals which do not use androgenic anabolic steroids. Non-invasive methods were used in all individual (clinical examination and vascular ultrasound examination of vein system). The routine of training units in both groups was approximately two hours 4-6 times per week. Final analysis has reveal that in androgenic anabolic steroids group in 18 individuals or 55.7% arterial hypertension with hyperlipidemia was more represented, compared with the group without using anabolic steroids, represented by 2 individuals or 5.7% and it was statistically considered significant by using p value less than 0.05. (panabolic steroids drugs are males (100%) or 35 individuals; we did not find females using anabolic steroids and that is why our research was limited to male population. Recreational male sportsmen are dominant androgenic anabolic steroids misusers, trying to achieve better muscle proportion and physical performance, they neglect the anabolic steroids side effects which have devastating consequence on vascular system. Benefits of misusing drugs in recreational exercising program in young sportsmen are mostly connected with development of arterial hypertension and hyperlipidemia and the variety of serious health disorders, progressing the pathogenesis of cardiovascular disease.

  5. Hidden Danger of Irrational Abusing Illegal Androgenic-anabolic Steroids in Recreational Athletes Age Under 35 in Bosnia & Herzegovina

    OpenAIRE

    Solakovic, Sid; Totic, Dragan; Vukas, Haris; Djedovic, Muhamed

    2015-01-01

    Introduction: Androgenic-anabolic steroids are rarely used by sportsmen who want to improve physical performance in competition sport. Despite that they are well aware of the side effects of anabolic steroids, many young athletes in Bosnia and Herzegovina without competition motivation come in temptation, trying to achieve better muscle proportion and physical performance unknowing consequence of side effects and what is hiding behind. Risk factors such as increasing of lipid levels and arter...

  6. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  7. Laser experiments explore the hidden sector

    International Nuclear Information System (INIS)

    Ahlers, M.

    2007-11-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses -7 times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background. (orig.)

  8. Quantum mechanics and hidden superconformal symmetry

    Science.gov (United States)

    Bonezzi, R.; Corradini, O.; Latini, E.; Waldron, A.

    2017-12-01

    Solvability of the ubiquitous quantum harmonic oscillator relies on a spectrum generating osp (1 |2 ) superconformal symmetry. We study the problem of constructing all quantum mechanical models with a hidden osp (1 |2 ) symmetry on a given space of states. This problem stems from interacting higher spin models coupled to gravity. In one dimension, we show that the solution to this problem is the Vasiliev-Plyushchay family of quantum mechanical models with hidden superconformal symmetry obtained by viewing the harmonic oscillator as a one dimensional Dirac system, so that Grassmann parity equals wave function parity. These models—both oscillator and particlelike—realize all possible unitary irreducible representations of osp (1 |2 ).

  9. Hidden Costs and the Role of Modularity

    DEFF Research Database (Denmark)

    Larsen, Marcus M.

    2013-01-01

    that the inability to effectively estimate the costs of implementing an activity in a foreign location has a negative impact on the process performance of that activity. Performance is deterred as operations are likely to be disrupted by opportunity costs and managerial responses. However, this relationship......This paper addresses estimation errors in strategic decision-making processes due to hidden costs. While previous research has investigated the antecedents of hidden costs, this paper investigates performance consequences. Using unique data on 221 offshoring implementations, it is argued...... is mitigated by the degree of modularity in the activity as it reduces the need for costly coordination in offshoring. This paper contributes to research on offshoring and strategic decision-making by emphasizing the importance of organizational design and of estimating the costs of internal organizational...

  10. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  11. Hidden neuronal correlations in cultured networks

    International Nuclear Information System (INIS)

    Segev, Ronen; Baruchi, Itay; Hulata, Eyal; Ben-Jacob, Eshel

    2004-01-01

    Utilization of a clustering algorithm on neuronal spatiotemporal correlation matrices recorded during a spontaneous activity of in vitro networks revealed the existence of hidden correlations: the sequence of synchronized bursting events (SBEs) is composed of statistically distinguishable subgroups each with its own distinct pattern of interneuron spatiotemporal correlations. These findings hint that each of the SBE subgroups can serve as a template for coding, storage, and retrieval of a specific information

  12. A masking index for quantifying hidden glitches

    OpenAIRE

    Berti-Equille, Laure; Loh, J. M.; Dasu, T.

    2015-01-01

    Data glitches are errors in a dataset. They are complex entities that often span multiple attributes and records. When they co-occur in data, the presence of one type of glitch can hinder the detection of another type of glitch. This phenomenon is called masking. In this paper, we define two important types of masking and propose a novel, statistically rigorous indicator called masking index for quantifying the hidden glitches. We outline four cases of masking: outliers masked by missing valu...

  13. Cold dark matter from the hidden sector

    International Nuclear Information System (INIS)

    Arias, Paola; Pontificia Univ. Catolica de Chile, Santiago

    2012-02-01

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  14. Completing Quantum Mechanics with Quantized Hidden Variables

    OpenAIRE

    van Enk, S. J.

    2015-01-01

    I explore the possibility that a quantum system S may be described completely by the combination of its standard quantum state $|\\psi\\rangle$ and a (hidden) quantum state $|\\phi\\rangle$ (that lives in the same Hilbert space), such that the outcome of any standard projective measurement on the system S is determined once the two quantum states are specified. I construct an algorithm that retrieves the standard quantum-mechanical probabilities, which depend only on $|\\psi\\rangle$, by assuming t...

  15. Cold dark matter from the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Arias, Paola [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Pontificia Univ. Catolica de Chile, Santiago (Chile). Facultad de Fisica

    2012-02-15

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  16. Hidden histories: challenges for pedagogy and participation

    OpenAIRE

    Morrice, Linda

    2013-01-01

    Higher Education has become and an increasingly diverse and globalised system in which the binaries between ‘traditional’ and ‘non-traditional’ students, exclusion and inclusion have less resonance and analytical purchase. Drawing on research with refugees Linda will suggest that higher education can be marked simultaneously by belonging and recognition, deficit and exclusion. Complex differences and inequalities remain hidden and unspoken, raising new questions and challenges for pedagogy an...

  17. Hidden sector behind the CKM matrix

    Science.gov (United States)

    Okawa, Shohei; Omura, Yuji

    2017-08-01

    The small quark mixing, described by the Cabibbo-Kobayashi-Maskawa (CKM) matrix in the standard model, may be a clue to reveal new physics around the TeV scale. We consider a simple scenario that extra particles in a hidden sector radiatively mediate the flavor violation to the quark sector around the TeV scale and effectively realize the observed CKM matrix. The lightest particle in the hidden sector, whose contribution to the CKM matrix is expected to be dominant, is a good dark matter (DM) candidate. There are many possible setups to describe this scenario, so that we investigate some universal predictions of this kind of model, focusing on the contribution of DM to the quark mixing and flavor physics. In this scenario, there is an explicit relation between the CKM matrix and flavor violating couplings, such as four-quark couplings, because both are radiatively induced by the particles in the hidden sector. Then, we can explicitly find the DM mass region and the size of Yukawa couplings between the DM and quarks, based on the study of flavor physics and DM physics. In conclusion, we show that DM mass in our scenario is around the TeV scale, and the Yukawa couplings are between O (0.01 ) and O (1 ). The spin-independent DM scattering cross section is estimated as O (10-9) [pb]. An extra colored particle is also predicted at the O (10 ) TeV scale.

  18. [The dangers of blue light: True story!].

    Science.gov (United States)

    Renard, G; Leid, J

    2016-05-01

    The dangers of the blue light are the object of numerous publications, for both the scientific community and the general public. The new prolific development of light sources emitting potentially toxic blue light (415-455nm) ranges from LED (Light Emitting Diodes) lamps for interior lighting to television screens, computers, digital tablets and smartphones using OLED (Organic Light Emitting Diode) or AMOLED (Active-Matrix Organic Light Emitting Diode) technology. First we will review some technical terms and the main characteristics of light perceived by the human eye. Then we will discuss scientific proof of the toxicity of blue light to the eye, which may cause cataract or macular degeneration. Analysis of the light spectra of several light sources, from natural light to LED lamps, will allow us to specify even better the dangers related to each light source. LED lamps, whether used as components for interior lighting or screens, are of concern if they are used for extended viewing times and at short distance. While we can protect ourselves from natural blue light by wearing colored glasses which filter out, on both front and back surfaces, the toxic wavelengths, it is more difficult to protect oneself from LED lamps in internal lighting, the use of which should be restricted to "white warmth" lamps (2700K). As far as OLED or AMOLED screens are concerned, the only effective protection consists of using them occasionally and only for a short period of time. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  19. [Dangerous comics--only a fantasy?].

    Science.gov (United States)

    Hammon, C P

    1992-01-01

    Both superhero comics and fairy tales are equally popular with children: they create fantasy worlds full of violence and dangers which the hero must overcome. The question is raised whether the criticism of prevailing violence and a lack of realism can be rejected not only when considering fairy tales but also in the case of comics. The comparison of the two genres leads to the following results: Comics with their regressive pull and their independent superhuman heroes represent the archaic world of narcissism unconscious, unwilling to develop and conservative. Violence serves to maintain the original state or regain a harmonious "paradise". However, the rich world of symbols is also the creative source of our existence to which we keep returning--whether in dreams or in other fields of imagination. As works of literature, fairy tales seem to be more progressive and concerned with solutions. In the main, they support the development of the self. Violence is used to overthrow the old order and usher in the new. The aggression results in overcoming the unconscious. The image of the fairy tale hero corresponds to the child's view of the world. He does not seek narcissistic solitude and greatness but the companionship of prince or princess. A progressive and optimistic view of the future as well as a more conservative and retrospective tendency are part of human nature. For children, however, problems of development take precedence. Thus superhero comics are only dangerous for severely disturbed children, but fairy tales are certainly more beneficial.

  20. Breeds in danger of extintion and biodiversity

    Directory of Open Access Journals (Sweden)

    A. Blasco

    2008-07-01

    Full Text Available Some arguments currently used to support breed conservation are examined. The central point is that we cannot conserve all breeds because we do not have financial resources enough to keep everything (mainly in developing countries and in many cases we do not have special reasons to conserve breeds. A breed is a human product and it should not be confused with specie. A breed can be generated or transformed. We can create synthetic breeds with the best characteristics of several breeds. Selection is not exhausting genetic variability (there are several experiments showing that, and genetic variability within breeds is large. We need reasons to keep breeds in danger in extinction. A breed is a tool, and we can decide to keep it when it is useful because it is specially adapted to some environments (although in this case it should not be in danger of extinction, it can be useful in crossbreeding to shorten the way of obtaining response to selection, or it has some extreme values for traits that may be useful in the future (in this case we have to define clearly which traits and how we expect the future to be. We can add cultural reasons when we have money enough to spend in culture.

  1. Metabolic features of the cell danger response.

    Science.gov (United States)

    Naviaux, Robert K

    2014-05-01

    The cell danger response (CDR) is the evolutionarily conserved metabolic response that protects cells and hosts from harm. It is triggered by encounters with chemical, physical, or biological threats that exceed the cellular capacity for homeostasis. The resulting metabolic mismatch between available resources and functional capacity produces a cascade of changes in cellular electron flow, oxygen consumption, redox, membrane fluidity, lipid dynamics, bioenergetics, carbon and sulfur resource allocation, protein folding and aggregation, vitamin availability, metal homeostasis, indole, pterin, 1-carbon and polyamine metabolism, and polymer formation. The first wave of danger signals consists of the release of metabolic intermediates like ATP and ADP, Krebs cycle intermediates, oxygen, and reactive oxygen species (ROS), and is sustained by purinergic signaling. After the danger has been eliminated or neutralized, a choreographed sequence of anti-inflammatory and regenerative pathways is activated to reverse the CDR and to heal. When the CDR persists abnormally, whole body metabolism and the gut microbiome are disturbed, the collective performance of multiple organ systems is impaired, behavior is changed, and chronic disease results. Metabolic memory of past stress encounters is stored in the form of altered mitochondrial and cellular macromolecule content, resulting in an increase in functional reserve capacity through a process known as mitocellular hormesis. The systemic form of the CDR, and its magnified form, the purinergic life-threat response (PLTR), are under direct control by ancient pathways in the brain that are ultimately coordinated by centers in the brainstem. Chemosensory integration of whole body metabolism occurs in the brainstem and is a prerequisite for normal brain, motor, vestibular, sensory, social, and speech development. An understanding of the CDR permits us to reframe old concepts of pathogenesis for a broad array of chronic, developmental

  2. 46 CFR 5.35 - Conviction for a dangerous drug law violation, use of, or addiction to the use of dangerous drugs.

    Science.gov (United States)

    2010-10-01

    ..., or addiction to the use of dangerous drugs. 5.35 Section 5.35 Shipping COAST GUARD, DEPARTMENT OF... Definitions § 5.35 Conviction for a dangerous drug law violation, use of, or addiction to the use of dangerous... complaint will allege conviction for a dangerous drug law violation or use of dangerous drugs or addiction...

  3. Microwave background constraints on mixing of photons with hidden photons

    International Nuclear Information System (INIS)

    Mirizzi, Alessandro; Redondo, Javier; Sigl, Guenter

    2008-12-01

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle χ 0 -7 - 10 -5 for hidden photon masses between 10 -14 eV and 10 -7 eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  4. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  5. Nuclear danger in the modern world

    International Nuclear Information System (INIS)

    Sulejmenov, O.O.

    2000-01-01

    It is noted, that nowadays a nuclear danger proceeds from nuclear depositions of countries having own nuclear weapons. Since Kazakhstan is one of the first country in the world which fulfilled regulations of Lisbon Protocol and liquidated own nuclear potential, author regards that Kazakhstan have moral right for initiating process of attachment to Comprehensive Nuclear Test Ban Treaty by countries having nuclear weapon. Now for Kazakhstan there are urgent problems: financing of post-conversion processes; re-cultivation of territory contaminated by residuals from nuclear weapons test; rehabilitation of population health, damaged from test of mass destruction weapon. Scientists of Kazakhstan estimated damage from nuclear test on Kazakstan territory in 10 billion dollars. It is necessary international efforts of all public organizations of the world for all world sites. One of the financing source could be means from reduction of nuclear arms production

  6. Interaction with the dirty, dangerous, and dull

    DEFF Research Database (Denmark)

    Heyer, Clint; Husøy, Kristoffer

    2012-01-01

    and the forms of prototyping and evaluation. For example, we might assume a stable and safe physical environment, or that if something doesn’t work, it is an annoyance rather than a life-or-death situation. In our work, we have explored quite a different context: that of an oil and gas facility, where work......The environments for which interaction designers design tend to be rather benign: the office, the home. The settings are familiar to us, identifiable and relatable, often places we’ve experienced firsthand. A host of assumptions are implicit in these settings that affect the style of design inquiry...... is at times dirty, dangerous, and dull. We describe how we approached design for this unfamiliar environment and outline some of our concepts. In our general program of research, we are exploring new, yet “close to market” artifacts and systems for use in oil and gas, potentially for productization....

  7. Hanford facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1991-01-01

    This document, Set 2, the Hanford Facility Dangerous Waste Part B Permit Application, consists of 15 chapters that address the content of the Part B checklists prepared by the Washington State Department of Ecology (Ecology 1987) and the US Environmental Protection Agency (40 CFR 270), with additional information requirements mandated by the Hazardous and Solid Waste Amendments of 1984 and revisions of WAC 173-303. For ease of reference, the Washington State Department of Ecology checklist section numbers, in brackets, follow the chapter headings and subheadings. This permit application contains ''umbrella- type'' documentation with overall application to the Hanford Facility. This documentation is broad in nature and applies to all TSD units that have final status under the Hanford Facility Permit

  8. Dangerous enemy in Estonian garden soil

    International Nuclear Information System (INIS)

    Petersell, V.; Mottus, V.; Taeht, K.

    2005-01-01

    Radon is thoroughly discussed in the article. Its generation and the heath risks it can cause. The distribution of radon in the soil is analysed (one soil lithotype at a time (kBq/m)). The measurements received on different surveyed sites are compared to the standards allowed for the construction works. There is also the link between lung cancer cases and radon's radiance and incense/smoking. The North of Estonia is the pearl of Estonia landscape. The sea being near, beautiful seaside views attract people and inspire them to build their houses in this kind of surroundings. However, these areas are natural danger sources, as the percentage of radon concentration in the soil is often high or very high. South Estonia also has a lot of spectacular places with high concentration of radon in the soil [et

  9. Prions: the danger of biochemical weapons

    Directory of Open Access Journals (Sweden)

    Eric Almeida Xavier

    2014-09-01

    Full Text Available The knowledge of biotechnology increases the risk of using biochemical weapons for mass destruction. Prions are unprecedented infectious pathogens that cause a group of fatal neurodegenerative diseases by a novel mechanism. They are transmissible particles that are devoid of nucleic acid. Due to their singular characteristics, Prions emerge as potential danger since they can be used in the development of such weapons. Prions cause fatal infectious diseases, and to date there is no therapeutic or prophylactic approach against these diseases. Furthermore, Prions are resistant to food-preparation treatments such as high heat and can find their way from the digestive system into the nervous system; recombinant Prions are infectious either bound to soil particles or in aerosols. Therefore, lethal Prions can be developed by malicious researchers who could use it to attack political enemies since such weapons cause diseases that could be above suspicion.

  10. Cold Climate Structural Fire Danger Rating System?

    Directory of Open Access Journals (Sweden)

    Maria-Monika Metallinou

    2018-03-01

    Full Text Available Worldwide, fires kill 300,000 people every year. The fire season is usually recognized to be in the warmer periods of the year. Recent research has, however, demonstrated that the colder season also has major challenges regarding severe fires, especially in inhabited (heated wood-based structures in cold-climate areas. Knowledge about the effect of dry cellulose-based materials on fire development, indoor and outdoor, is a motivation for monitoring possible changes in potential fire behavior and associated fire risk. The effect of wind in spreading fires to neighboring structures points towards using weather forecasts as information on potential fire spread behavior. As modern weather forecasts include temperature and relative humidity predictions, there may already be sufficient information available to develop a structural fire danger rating system. Such a system may include the following steps: (1 Record weather forecasts and actual temperature and relative humidity inside and outside selected structures; (2 Develop a meteorology-data-based model to predict indoor relative humidity levels; (3 Perform controlled drying chamber experiments involving typical hygroscopic fire fuel; (4 Compare the results to the recorded values in selected structures; and (5 Develop the risk model involving the results from drying chamber experiments, weather forecasts, and separation between structures. Knowledge about the structures at risk and their use is also important. The benefits of an automated fire danger rating system would be that the society can better plan for potentially severe cold-climate fires and thereby limit the negative impacts of such fires.

  11. Dangerous Animals Capture and Maintain Attention in Humans

    OpenAIRE

    Jessica L. Yorzinski; Michael J. Penkunas; Michael L. Platt; Richard G. Coss

    2014-01-01

    Predation is a major source of natural selection on primates and may have shaped attentional processes that allow primates to rapidly detect dangerous animals. Because ancestral humans were subjected to predation, a process that continues at very low frequencies, we examined the visual processes by which men and women detect dangerous animals (snakes and lions). We recorded the eye movements of participants as they detected images of a dangerous animal (target) among arrays of nondangerous an...

  12. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  13. Liquid effluent retention facility dangerous waste permit application

    International Nuclear Information System (INIS)

    1991-06-01

    This appendix to the Liquid Effluent Retention Facility Dangerous Waste Permit Application contains pumps, piping, leak detection systems, geomembranes, leachate collection systems, earthworks and floating cover systems

  14. Mental Health and Teens: Watch for Danger Signs

    Science.gov (United States)

    ... Gradeschool Teen Dating & Sex Fitness Nutrition Driving Safety School Substance Use Young Adult Healthy Children > Ages & Stages > Teen > Mental Health and Teens: Watch for Danger Signs Ages & Stages ...

  15. The merchant shipping (dangerous goods) (amendment) rules 1980 No. 789

    International Nuclear Information System (INIS)

    1980-01-01

    These Rules amend the Merchant Shipping Rules 1978 and revoke the Merchant Shipping (Dangerous Goods) (Amendment) Rules 1979. The purpose of this amendment is to update the references to the 1978 Report of the Department of Trade's Standing Advisory Committee on the Carriage of Dangerous Goods in Ships (the Blue Book) and the 1977 Edition of the International Maritime Dangerous Goods Code of IMCO (the IMDG Code), referred to in the 1978 Rules. The amendments concern, inter alia, marking of packages on board ship which contain dangerous goods, including radioactive materials (NEA) [fr

  16. Compressing the hidden variable space of a qubit

    International Nuclear Information System (INIS)

    Montina, Alberto

    2011-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of single realizations is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with quantum states satisfy reasonable criteria of regularity. Possible generalizations of this shrinking to an N-dimensional Hilbert space are discussed.

  17. Zipf exponent of trajectory distribution in the hidden Markov model

    Science.gov (United States)

    Bochkarev, V. V.; Lerner, E. Yu

    2014-03-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.

  18. Zipf exponent of trajectory distribution in the hidden Markov model

    International Nuclear Information System (INIS)

    Bochkarev, V V; Lerner, E Yu

    2014-01-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different

  19. Hidden acoustic information revealed by intentional nonlinearity

    Science.gov (United States)

    Dowling, David R.

    2017-11-01

    Acoustic waves are omnipresent in modern life and are well described by the linearized equations of fluid dynamics. Once generated, acoustic waves carry and collect information about their source and the environment through which they propagate, respectively, and this information may be retrieved by analyzing recordings of these waves. Because of this, acoustics is the primary means for observation, surveillance, reconnaissance, and remote sensing in otherwise opaque environments, such as the Earth's oceans and crust, and the interior of the human body. For such information-retrieval tasks, acoustic fields are nearly always interrogated within their recorded frequency range or bandwidth. However, this frequency-range restriction is not general; acoustic fields may also carry (hidden) information at frequencies outside their bandwidth. Although such a claim may seem counter intuitive, hidden acoustic-field information can be revealed by re-introducing a marquee trait of fluid dynamics: nonlinearity. In particular, an intentional quadratic nonlinearity - a form of intra-signal heterodyning - can be used to obtain acoustic field information at frequencies outside a recorded acoustic field's bandwidth. This quadratic nonlinearity enables a variety of acoustic remote sensing applications that were long thought to be impossible. In particular, it allows the detrimental effects of sparse recordings and random scattering to be suppressed when the original acoustic field has sufficient bandwidth. In this presentation, the topic is developed heuristically, with a just brief exposition of the relevant mathematics. Hidden acoustic field information is then revealed from simulated and measured acoustic fields in simple and complicated acoustic environments involving frequencies from a few Hertz to more than 100 kHz, and propagation distances from tens of centimeters to hundreds of kilometers. Sponsored by ONR, NAVSEA, and NSF.

  20. 46 CFR 154.1435 - Medical first aid guide.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Medical first aid guide. 154.1435 Section 154.1435 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY... Equipment § 154.1435 Medical first aid guide. Each vessel must have a copy of the IMO Medical First Aid...

  1. Recovering a hidden polarization by ghost polarimetry.

    Science.gov (United States)

    Janassek, Patrick; Blumenstein, Sébastien; Elsäßer, Wolfgang

    2018-02-15

    By exploiting polarization correlations of light from a broadband fiber-based amplified spontaneous emission source we succeed in reconstructing a hidden polarization in a ghost polarimetry experiment in close analogy to ghost imaging and ghost spectroscopy. Thereby, an original linear polarization state in the object arm of a Mach-Zehnder interferometer configuration which has been camouflaged by a subsequent depolarizer is recovered by correlating it with light from a reference beam. The variation of a linear polarizer placed inside the reference beam results in a Malus law type second-order intensity correlation with high contrast, thus measuring a ghost polarigram.

  2. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  3. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  4. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  5. The hidden face of the petroleum

    International Nuclear Information System (INIS)

    Laurent, E.

    2006-02-01

    For the first time, a book reveals what that was hidden to the public opinions: why the petroleum crisis of 1973 what only a manipulation, an arrangement between the OPEC and the petroleum companies, why the data concerning the petroleum reserves are wrong and increased by the producers countries, how Washington used the Saudi petroleum weapon to create the Soviet Union fall, and why from march 2001 maps of the Iraq (where were drawn the future petroleum explorations) were working documents for the vice President Cheney and petroleum managers for the ''secret society''. (A.L.B.)

  6. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  7. The hidden costs of nuclear power

    International Nuclear Information System (INIS)

    Keough, C.

    1981-01-01

    The two basic hidden costs of nuclear power are public money and public health. Nuclear power appears to be economical because many of the costs of producins electricity in these plants are paid by the federal government. So, like it or not, the citizens are footing the bill with their taxes. Design and development of plants have been paid for with public money, and disposal and cleanup costs will also be paid in this manner. The economic and health costs associated with nuclear accidents are staggering

  8. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  9. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The estimation of the HMM is conducted using a variant of the Iterative Conditional Expectation-Generalized Mixture (ICE-GEMI) algorithm proposed by Delignon et al. (1997), that permits analysis of the conditional distributions of economic data and allows for different functional forms across regimes...

  10. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index

    Science.gov (United States)

    Stevens, Gretchen A.; Ezzati, Majid; Black, Robert E.; Kraemer, Klaus

    2015-01-01

    Background Deficiencies in essential vitamins and minerals–also termed hidden hunger–are pervasive and hold negative consequences for the cognitive and physical development of children. Methods This analysis evaluates the change in hidden hunger over time in the form of one composite indicator–the Hidden Hunger Index (HHI)–using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency). Net changes from 1995–2011 and population weighted regional means for various time periods are measured. Findings Globally, hidden hunger improved (-6.7 net change in HHI) from 1995–2011. Africa was the only region to see a deterioration in hidden hunger (+1.9) over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0), while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased. Interpretation This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs). However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda. Funding Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish. PMID:26673631

  11. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index.

    Directory of Open Access Journals (Sweden)

    Julie C Ruel-Bergeron

    Full Text Available Deficiencies in essential vitamins and minerals-also termed hidden hunger-are pervasive and hold negative consequences for the cognitive and physical development of children.This analysis evaluates the change in hidden hunger over time in the form of one composite indicator-the Hidden Hunger Index (HHI-using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency. Net changes from 1995-2011 and population weighted regional means for various time periods are measured.Globally, hidden hunger improved (-6.7 net change in HHI from 1995-2011. Africa was the only region to see a deterioration in hidden hunger (+1.9 over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0, while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased.This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs. However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda.Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish.

  12. Hidden in plain sight: the formal, informal, and hidden curricula of a psychiatry clerkship.

    Science.gov (United States)

    Wear, Delese; Skillicorn, Jodie

    2009-04-01

    To examine perceptions of the formal, informal, and hidden curricula in psychiatry as they are observed and experienced by (1) attending physicians who have teaching responsibilities for residents and medical students, (2) residents who are taught by those same physicians and who have teaching responsibilities for medical students, and (3) medical students who are taught by attendings and residents during their psychiatry rotation. From June to November 2007, the authors conducted focus groups with attendings, residents, and students in one midwestern academic setting. The sessions were audiotaped, transcribed, and analyzed for themes surrounding the formal, informal, and hidden curricula. All three groups offered a similar belief that the knowledge, skills, and values of the formal curriculum focused on building relationships. Similarly, all three suggested that elements of the informal and hidden curricula were expressed primarily as the values arising from attendings' role modeling, as the nature and amount of time attendings spend with patients, and as attendings' advice arising from experience and intuition versus "textbook learning." Whereas students and residents offered negative values arising from the informal and hidden curricula, attendings did not, offering instead the more positive values they intended to encourage through the informal and hidden curricula. The process described here has great potential in local settings across all disciplines. Asking teachers and learners in any setting to think about how they experience the educational environment and what sense they make of all curricular efforts can provide a reality check for educators and a values check for learners as they critically reflect on the meanings of what they are learning.

  13. Investigator's guide to steganography

    CERN Document Server

    Kipper, Gregory

    2003-01-01

    The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future

  14. The perception of the hidden curriculum on medical education: an exploratory study

    Directory of Open Access Journals (Sweden)

    Murakami Manabu

    2009-12-01

    Full Text Available Abstract Background Major curriculum reform of undergraduate medical education occurred during the past decades in the United Kingdom (UK; however, the effects of the hidden curriculum, which influence the choice of primary care as a career, have not been sufficiently recognized. While Japan, where traditionally few institutions systematically foster primary care physicians and very few have truly embraced family medicine as their guiding discipline, has also experienced meaningful curriculum reform, the effect of the hidden curriculum is not well known. The aim of this study is to identify themes pertaining to the students' perceptions of the hidden curriculum affecting undergraduate medical education in bedside learning in Japan. Methods Semi-structured interviews with thematic content analysis were implemented. Undergraduate year-5 students from a Japanese medical school at a Japanese teaching hospital were recruited. Interview were planned to last between 30 to 60 minutes each, over an 8-month period in 2007. The interviewees' perceptions concerning the quality of teaching in their bedside learning and related experiences were collected and analysed thematically. Results Twenty five medical students (18 males and 7 females, mean age 25 years old consented to participate in the interviews, and seven main themes emerged: "the perception of education as having a low priority," "the prevalence of positive/negative role models," "the persistence of hierarchy and exclusivity," "the existence of gender issues," "an overburdened medical knowledge," "human relationships with colleagues and medical team members," and "first experience from the practical wards and their patients." Conclusions Both similarities and differences were found when comparing the results to those of previous studies in the UK. Some effects of the hidden curriculum in medical education likely exist in common between the UK and Japan, despite the differences in their demographic

  15. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  16. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier, E-mail: redondo@mpp.mpg.de [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza, España (Spain)

    2015-07-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  17. Bayesian structural inference for hidden processes

    Science.gov (United States)

    Strelioff, Christopher C.; Crutchfield, James P.

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ɛ-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ɛ-machines, irrespective of estimated transition probabilities. Properties of ɛ-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  18. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  19. Hidden ion population of the magnetosphere

    International Nuclear Information System (INIS)

    Olsen, R.C.

    1982-01-01

    Particle data from two geosynchronous satellites (Applied Technology Satellite 6 and SCATHA) show a normally hidden ion population appearing when the satellites are in the earth's shadow. Ion and electron data show the spacecraft potential dropping from +10 V in sunlight to +4 and +5 V in eclipse at local midnight, in low-energy (T/sub e/ -2 ), isotropic ion population appears which was invisible in sunlight because of the larger positive spacecraft potential. Higher-energy populations generally cover the tails of the hidden ion populations, so they cannot be inferred from daylight data. The isotropic populations appears only in a few percent of the spacecraft eclipse events, appearing only at times of low Kp (2 or less, preceded by a day with Σ Kp< or =20). A low-energy (T = 1--2 eV) field-aligned population often appears with and without the isotropic population, at slightly higher flux levels. These fluxes are visible in sunlight, but again the distribution functions obtained in eclipse differ from those that would be inferred from daylight data. Measurement of the thermal plasma population on a consistent basis, particularly in the plasma sheet, will require some method of controlling the detector potential with respect to the ambient plamsa

  20. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  1. Pentaquarks with hidden charm as hadroquarkonia

    Energy Technology Data Exchange (ETDEWEB)

    Eides, Michael I. [University of Kentucky, Department of Physics and Astronomy, Lexington, KY (United States); Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Petrov, Victor Yu. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Polyakov, Maxim V. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Ruhr-Universitaet Bochum, Institut fuer Theoretische Physik II, Bochum (Germany)

    2018-01-15

    We consider hidden charm pentaquarks as hadroquarkonium states in a QCD inspired approach. Pentaquarks arise naturally as bound states of quarkonia excitations and ordinary baryons. The LHCb P{sub c}(4450) pentaquark is interpreted as a ψ{sup '}-nucleon bound state with spin-parity J{sup P} = 3/2{sup -}. The partial decay width Γ(P{sub c}(4450) → J/ψ + N) ∼ 11 MeV is calculated and turned out to be in agreement with the experimental data for P{sub c}(4450). The P{sub c}(4450) pentaquark is predicted to be a member of one of the two almost degenerate hidden-charm baryon octets with spin-parities J{sup P} = 1/2{sup -}, 3/2{sup -}. The masses and decay widths of the octet pentaquarks are calculated. The widths are small and comparable with the width of the P{sub c}(4450) pentaquark, and the masses of the octet pentaquarks satisfy the Gell-Mann-Okubo relation. Interpretation of pentaquarks as loosely bound Σ{sub c} anti D* and Σ{sub c}{sup *} anti D* deuteronlike states is also considered. We determine quantum numbers of these bound states and calculate their masses in the one-pion exchange scenario. The hadroquarkonium and molecular approaches to exotic hadrons are compared and the relative advantages and drawbacks of each approach are discussed. (orig.)

  2. Low energy theorems of hidden local symmetries

    International Nuclear Information System (INIS)

    Harada, Masayasu; Kugo, Taichiro; Yamawaki, Koichi.

    1994-01-01

    We prove to all orders of the loop expansion the low energy theorems of hidden local symmetries in four-dimensional nonlinear sigma models based on the coset space G/H, with G and H being arbitrary compact groups. Although the models are non-renormalizable, the proof is done in an analogous manner to the renormalization proof of gauge theories and two-dimensional nonlinear sigma models by restricting ourselves to the operators with two derivatives (counting a hidden gauge boson field as one derivative), i.e., with dimension 2, which are the only operators relevant to the low energy limit. Through loop-wise mathematical induction based on the Ward-Takahashi identity for the BRS symmetry, we solve renormalization equation for the effective action up to dimension-2 terms plus terms with the relevant BRS sources. We then show that all the quantum corrections to the dimension-2 operators, including the finite parts as well as the divergent ones, can be entirely absorbed into a re-definition (renormalization) of the parameters and the fields in the dimension-2 part of the tree-level Lagrangian. (author)

  3. Black holes, hidden symmetries, and complete integrability.

    Science.gov (United States)

    Frolov, Valeri P; Krtouš, Pavel; Kubizňák, David

    2017-01-01

    The study of higher-dimensional black holes is a subject which has recently attracted vast interest. Perhaps one of the most surprising discoveries is a realization that the properties of higher-dimensional black holes with the spherical horizon topology and described by the Kerr-NUT-(A)dS metrics are very similar to the properties of the well known four-dimensional Kerr metric. This remarkable result stems from the existence of a single object called the principal tensor. In our review we discuss explicit and hidden symmetries of higher-dimensional Kerr-NUT-(A)dS black hole spacetimes. We start with discussion of the Killing and Killing-Yano objects representing explicit and hidden symmetries. We demonstrate that the principal tensor can be used as a "seed object" which generates all these symmetries. It determines the form of the geometry, as well as guarantees its remarkable properties, such as special algebraic type of the spacetime, complete integrability of geodesic motion, and separability of the Hamilton-Jacobi, Klein-Gordon, and Dirac equations. The review also contains a discussion of different applications of the developed formalism and its possible generalizations.

  4. Practices in the danger culture of late industrial society

    NARCIS (Netherlands)

    Rip, Arie; Motet, Gilles; Bieder, Corinne

    2017-01-01

    The chapter replaces the question of risk control by one about how we handle danger in our societies and realize a measure of safety. Ongoing practices in a framework of ‘danger cultures’ are the key. The case of environmental and health inspection and the intersecting ‘social worlds’ involved, are

  5. Dangerous Animals Capture and Maintain Attention in Humans

    Directory of Open Access Journals (Sweden)

    Jessica L. Yorzinski

    2014-07-01

    Full Text Available Predation is a major source of natural selection on primates and may have shaped attentional processes that allow primates to rapidly detect dangerous animals. Because ancestral humans were subjected to predation, a process that continues at very low frequencies, we examined the visual processes by which men and women detect dangerous animals (snakes and lions. We recorded the eye movements of participants as they detected images of a dangerous animal (target among arrays of nondangerous animals (distractors as well as detected images of a nondangerous animal (target among arrays of dangerous animals (distractors. We found that participants were quicker to locate targets when the targets were dangerous animals compared with nondangerous animals, even when spatial frequency and luminance were controlled. The participants were slower to locate nondangerous targets because they spent more time looking at dangerous distractors, a process known as delayed disengagement, and looked at a larger number of dangerous distractors. These results indicate that dangerous animals capture and maintain attention in humans, suggesting that historical predation has shaped some facets of visual orienting and its underlying neural architecture in modern humans.

  6. Dangerous animals capture and maintain attention in humans.

    Science.gov (United States)

    Yorzinski, Jessica L; Penkunas, Michael J; Platt, Michael L; Coss, Richard G

    2014-05-28

    Predation is a major source of natural selection on primates and may have shaped attentional processes that allow primates to rapidly detect dangerous animals. Because ancestral humans were subjected to predation, a process that continues at very low frequencies, we examined the visual processes by which men and women detect dangerous animals (snakes and lions). We recorded the eye movements of participants as they detected images of a dangerous animal (target) among arrays of nondangerous animals (distractors) as well as detected images of a nondangerous animal (target) among arrays of dangerous animals (distractors). We found that participants were quicker to locate targets when the targets were dangerous animals compared with nondangerous animals, even when spatial frequency and luminance were controlled. The participants were slower to locate nondangerous targets because they spent more time looking at dangerous distractors, a process known as delayed disengagement, and looked at a larger number of dangerous distractors. These results indicate that dangerous animals capture and maintain attention in humans, suggesting that historical predation has shaped some facets of visual orienting and its underlying neural architecture in modern humans.

  7. The dangers of the plutonium economy

    International Nuclear Information System (INIS)

    Altner, G.; Schmitz-Feuerhake, I.

    1979-01-01

    The fast breeder is a critical point in the energy discussion which is even more controversial than other points before: Will modern industrial society submit to the constraints of a plutonium economy or will it have the power and the courage required for the alternative of a more human technology. The fast breeder can produce tons and tons of plutonium, a new energy source; this is an argument frequently presented in view of the limited uranium reserves. At the same time, plutonium is one of the most dangerous poisons, and its radiation endangers lives even at amounts as small as one-millionth of one gramme. This means that technical and political safeguards must be intensified, which in turn will result in just the 'nuclear dictatorship' which is beginning to show up at the horizon already today. In this book, committed journalists and scientists present their arguments to show that the price to be paid for this kind of progress would be two high. (orig./HP) [de

  8. Can Asteroid Airbursts Cause Dangerous Tsunami?.

    Energy Technology Data Exchange (ETDEWEB)

    Boslough, Mark B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    I have performed a series of high-resolution hydrocode simulations to generate “source functions” for tsunami simulations as part of a proof-of-principle effort to determine whether or not the downward momentum from an asteroid airburst can couple energy into a dangerous tsunami in deep water. My new CTH simulations show enhanced momentum multiplication relative to a nuclear explosion of the same yield. Extensive sensitivity and convergence analyses demonstrate that results are robust and repeatable for simulations with sufficiently high resolution using adaptive mesh refinement. I have provided surface overpressure and wind velocity fields to tsunami modelers to use as time-dependent boundary conditions and to test the hypothesis that this mechanism can enhance the strength of the resulting shallow-water wave. The enhanced momentum result suggests that coupling from an over-water plume-forming airburst could be a more efficient tsunami source mechanism than a collapsing impact cavity or direct air blast alone, but not necessarily due to the originally-proposed mechanism. This result has significant implications for asteroid impact risk assessment and airburst-generated tsunami will be the focus of a NASA-sponsored workshop at the Ames Research Center next summer, with follow-on funding expected.

  9. Nuclear threat. A clear and present danger

    International Nuclear Information System (INIS)

    Kikuchi, Masahiro; Nakagome, Yoshihiro

    2005-01-01

    It was disappointed at the discussion in the review conference of the NPT held in 2005. The fact may be caused by the estrangement between the international urgent issues related to the non-proliferation and the effectiveness of archaic measures through the NPT. However, it should not be recognized that the international obligation and worth of NPT has been gone. The NPT referred the typical international situation under the cold war era. Although several permanent issues of the nuclear non-proliferation exist in current discussions, the activities relevant to the NPT may not be effect against newly unstable situations after the September 11th of 2001. Urgent challenges to be taken are that we must strictly analyze the interventions between 'the clear and present danger' of our world and the nuclear herms, and must take appropriate actions toward them without influences from previous international situations that might be subsisted in current international treaties and agreements. This paper identified the features of nuclear threats based on the four categories and examined the possibilities of nuclear terrorism from previous facts with the inductive inference. The results identified the possibility of nuclear facility attack and of radioactive materials theft by the Polico-Religious Groups and others are stood out. The authors would suggest the important of urgent recognition to establish the certain security system against nuclear terrorism. (author)

  10. The Medawar Lecture 1998 is science dangerous?

    Science.gov (United States)

    Wolpert, Lewis

    2005-06-29

    The idea that science is dangerous is deeply embedded in our culture, particularly in literature, yet science provides the best way of understanding the world. Science is not the same as technology. In contrast to technology, reliable scientific knowledge is value-free and has no moral or ethical value. Scientists are not responsible for the technological applications of science; the very nature of science is that it is not possible to predict what will be discovered or how these discoveries could be applied. The obligation of scientists is to make public both any social implications of their work and its technological applications. A rare case of immoral science was eugenics. The image of Frankenstein has been turned by the media into genetic pornography, but neither cloning nor stem cells or gene therapy raise new ethical issues. There are no areas of research that are so socially sensitive that research into them should be proscribed. We have to rely on the many institutions of a democratic society: parliament, a free and vigorous press, affected groups and the scientists themselves. That is why programmes for the public understanding of science are so important. Alas, we still do not know how best to do this.

  11. The cell phone : a dangerous driving distraction

    Energy Technology Data Exchange (ETDEWEB)

    Kutlay, J. [Alberta Motor Association, Calgary, AB (Canada); Ure, D. [Shell Canada Ltd., Calgary, AB (Canada)

    2005-07-01

    Shell Canada demands that workers do not operate telecommunication systems while operating a motor vehicle for company business, with the exception of short acknowledgment conversations. This power point presentation advised of the dangers of using cell phones while driving. Cell phone use while driving is considered to be mentally demanding as well as contributing to slower reaction times to hazards and reducing driving field of view. Research has indicated that drivers visualize an image of the person being spoken to, in addition to thinking about issues being discussed. Statistics from the United Kingdom reveal that drivers engaged in cell phone conversations are 4 times more likely to crash than other drivers, and take risks comparable to alcohol impaired driving, as well as showing significantly poorer driving performance. Various types of driver distractions were presented. A comparison between radio and cell phones was presented. It was suggested that drivers should not take a phone call while driving alone, and in an emergency, should pull off the road to receive or send phone calls. It was also suggested that callers should ask if a person is driving, and end a conversation if they suspect the person is driving. tabs, figs.

  12. 242-A evaporator dangerous waste permit application

    International Nuclear Information System (INIS)

    1991-01-01

    The 242-A Evaporator is a waste management unit within the Hanford Facility that consists of process vessels and support systems for heating, evaporating, and condensing double-shell tank (DST) waste generated by Hanford Site operations. Operation of the 242-A Evaporator serves to reduce the volume of waste solutions within the DSTs that do not self-boil, while separating inorganic and radionuclide constituents from organic constituents. This operation reduces the number of underground DSTs required for waste storage and also makes the mixed waste more suitable for future treatment and disposal (i.e., grouting and vitrification). The 242-A Evaporator receives mixed-waste streams from the DSTs that contain organic and inorganic constituents and radionuclides. The waste is a dangerous waste (DW) because of corrosivity, reactivity, and toxicity characteristics, and is an extremely hazardous waste (EHW) as a result of toxicity (state criteria only), carcinogenicity, and persistence under the state mixture rule. The waste also contains spent nonhalogenated solvents

  13. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  14. Asymptotics for Estimating Equations in Hidden Markov Models

    DEFF Research Database (Denmark)

    Hansen, Jørgen Vinsløv; Jensen, Jens Ledet

    Results on asymptotic normality for the maximum likelihood estimate in hidden Markov models are extended in two directions. The stationarity assumption is relaxed, which allows for a covariate process influencing the hidden Markov process. Furthermore a class of estimating equations is considered...

  15. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  16. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  17. Hidden Agendas in Marriage: Affective and Longitudinal Dimensions.

    Science.gov (United States)

    Krokoff, Lowell J.

    1990-01-01

    Examines how couples' discussions of troublesome problems reveal hidden agendas (issues not directly discussed or explored). Finds disgust and contempt are at the core of both love and respect agendas for husbands and wives. Finds that wives' more than husbands' hidden agendas are directly predictive of how negatively they argue at home. (SR)

  18. Hidden symmetries in minimal five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, Markus; Silva, Sebastian

    2004-01-01

    We study the hidden symmetries arising in the dimensional reduction of d=5, N=2 supergravity to three dimensions. Extending previous partial results for the bosonic part, we give a derivation that includes fermionic terms, shedding light on the appearance of the local hidden symmetry SO(4) in the reduction

  19. Recent Ultrasonic Guided Wave Inspection Development Efforts

    International Nuclear Information System (INIS)

    Rose, Joseph L.; Tittmann, Bernhard R.

    2001-01-01

    The recognition of such natural wave guides as plates, rods, hollow cylinders, multi-layer structures or simply an interface between two materials combined with an increased understanding of the physics and wave mechanics of guided wave propagation has led to a significant increase in the number of guided wave inspection applications being developed each year. Of primary attention Is the ability to inspect partially hidden structures, hard to access areas, and treated or insulated structures. An introduction to some physical consideration of guided waves followed by some sample problem descriptions in pipe, ice detection, fouling detection in the foods industry, aircraft, tar coated structures and acoustic microscopy is presented in this paper. A sample problem in Boundary Element Modeling is also presented to illustrate the move in guided wave analysis beyond detection and location analysis to quantification

  20. Abelian hidden sectors at a GeV

    International Nuclear Information System (INIS)

    Morrissey, David E.; Poland, David; Zurek, Kathryn M.

    2009-01-01

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1) x gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  1. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  2. The relationship of dangerous driving with traffic offenses: A study on an adapted measure of dangerous driving.

    Science.gov (United States)

    Iliescu, Dragoş; Sârbescu, Paul

    2013-03-01

    Using data from three different samples and more than 1000 participants, the current study examines differences in dangerous driving in terms of age, gender, professional driving, as well as the relationship of dangerous driving with behavioral indicators (mileage) and criteria (traffic offenses). The study uses an adapted (Romanian) version of the Dula Dangerous Driving Index (DDDI, Dula and Ballard, 2003) and also reports data on the psychometric characteristics of this measure. Findings suggest that the Romanian version of the DDDI has sound psychometric properties. Dangerous driving is higher in males and occasional drivers, is not correlated with mileage and is significantly related with speeding as a traffic offense, both self-reported and objectively measured. The utility of predictive models including dangerous driving is not very large: logistic regression models have a significant fit to the data, but their misclassification rate (especially in terms of sensitivity) is unacceptable high. Copyright © 2012 Elsevier Ltd. All rights reserved.

  3. THE REPUBLIC OF BELARUS RADON DANGER MAP

    Directory of Open Access Journals (Sweden)

    L. A. Chunikhin

    2016-01-01

    Full Text Available Radon is the major contributor to the background exposure of the population. In the world practice, the radon risk or radon potential mapping are used for the radon dose assessment.The aim of this work was a radon danger mapping of the Republic of Belarus to assess the radiation situation and determine the radon hazard critical areas.Materials and methods: The mapping is based on measured values of radon volume activity in the living rooms of different buildings on the territory of the six regions of the Republic of Belarus. We have performed more than 4000 measurements. Integral track radon radiometers based on the polymer Kodak LR-115 film were used to evaluate radon volume activity. Exposure time ranged from 90 to 120 days. The cartogram was built with using the MAPINFO software package.Results: The low levels of radon concentrations were determined in the Brest and Gomel regions, as well as in the southern districts of Minsk and south-western districts of the Mogilev region. The high levels radon concentrations were determined in some districts of the Vitebsk and Grodno regions, as well as in the north-eastern districts of the Mogilev region. About 2–5 times nonuniformity of radon distribution in settlements of the Republic was observed. The radon hazard critical areas with radon concentrations in the range of 200–400 Bq/m3 were found in some districts of the Vitebsk, Grodno and Mogilev regions.Conclusions: The radon risk map of the Republic of Belarus gives the possibility to estimate the existing radiation risk. Taking into account the low efficiency of countermeasures long after the Chernobyl accident, it is necessary to increase the level of radiation protection through the radon mitigation activities or to change the radon normative documents.

  4. … To be hidden does not mean to be merely revealed – Part 1 Artistic research on hidden curriculum

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-09-01

    Full Text Available This text revisits the long-term project Hidden Curriculum, initiated by Annette Krauss. The project addresses unquestioned routines, hierarchies of knowledge (part 1, and the role of the body in learning processes (part 2 from the perspective of secondary/high school education (in the research on a hidden curriculum. A deeper analysis of educational studies on the phenomenon of ‘hidden curriculum’ in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire, and Jacques Rancière brings forward important insights generated through the artistic research within hidden curriculum. The aim of this text is to address academic canons, corporeality, and investigate everyday norms through revisiting the framework, results, and processes of the collaborative research into hidden curriculum with secondary high school students.

  5. Dynamic portfolio optimization across hidden market regimes

    DEFF Research Database (Denmark)

    Nystrup, Peter; Madsen, Henrik; Lindström, Erik

    2017-01-01

    Regime-based asset allocation has been shown to add value over rebalancing to static weights and, in particular, reduce potential drawdowns by reacting to changes in market conditions. The predominant approach in previous studies has been to specify in advance a static decision rule for changing...... the allocation based on the state of financial markets or the economy. In this article, model predictive control (MPC) is used to dynamically optimize a portfolio based on forecasts of the mean and variance of financial returns from a hidden Markov model with time-varying parameters. There are computational...... than a buy-and-hold investment in various major stock market indices. This is after accounting for transaction costs, with a one-day delay in the implementation of allocation changes, and with zero-interest cash as the only alternative to the stock indices. Imposing a trading penalty that reduces...

  6. Supersymmetric leptogenesis with a light hidden sector

    International Nuclear Information System (INIS)

    De Simone, Andrea

    2010-04-01

    Supersymmetric scenarios incorporating thermal leptogenesis as the origin of the observed matter-antimatter asymmetry generically predict abundances of the primordial elements which are in conflict with observations. In this paper we pro- pose a simple way to circumvent this tension and accommodate naturally ther- mal leptogenesis and primordial nucleosynthesis. We postulate the existence of a light hidden sector, coupled very weakly to the Minimal Supersymmetric Standard Model, which opens up new decay channels for the next-to-lightest supersymmetric particle, thus diluting its abundance during nucleosynthesis. We present a general model-independent analysis of this mechanism as well as two concrete realizations, and describe the relevant cosmological and astrophysical bounds and implications for this dark matter scenario. Possible experimental signatures at colliders and in cosmic-ray observations are also discussed. (orig.)

  7. Nuclear scissors modes and hidden angular momenta

    Energy Technology Data Exchange (ETDEWEB)

    Balbutsev, E. B., E-mail: balbuts@theor.jinr.ru; Molodtsova, I. V. [Joint Institute for Nuclear Research (Russian Federation); Schuck, P. [Université Paris-Sud, Institut de Physique Nucléaire, IN2P3–CNRS (France)

    2017-01-15

    The coupled dynamics of low-lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time-Dependent Hartree–Fock–Bogoliubov equations. The model of the harmonic oscillator including spin–orbit potential plus quadrupole–quadrupole and spin–spin interactions is considered. New low-lying spin-dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  8. Neuroevolution Mechanism for Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-12-01

    Full Text Available Hidden Markov Model (HMM is a statistical model based on probabilities. HMM is becoming one of the major models involved in many applications such as natural language
    processing, handwritten recognition, image processing, prediction systems and many more. In this research we are concerned with finding out the best HMM for a certain application domain. We propose a neuroevolution process that is based first on converting the HMM to a neural network, then generating many neural networks at random where each represents a HMM. We proceed by
    applying genetic operators to obtain new set of neural networks where each represents HMMs, and updating the population. Finally select the best neural network based on a fitness function.

  9. Improved hidden Markov model for nosocomial infections.

    Science.gov (United States)

    Khader, Karim; Leecaster, Molly; Greene, Tom; Samore, Matthew; Thomas, Alun

    2014-12-01

    We propose a novel hidden Markov model (HMM) for parameter estimation in hospital transmission models, and show that commonly made simplifying assumptions can lead to severe model misspecification and poor parameter estimates. A standard HMM that embodies two commonly made simplifying assumptions, namely a fixed patient count and binomially distributed detections is compared with a new alternative HMM that does not require these simplifying assumptions. Using simulated data, we demonstrate how each of the simplifying assumptions used by the standard model leads to model misspecification, whereas the alternative model results in accurate parameter estimates. © The Authors 2013. Published by Oxford University Press on behalf of the Institute of Mathematics and its Applications. All rights reserved.

  10. The elliptic genus and Hidden symmetry

    International Nuclear Information System (INIS)

    Jaffe, A.

    2001-01-01

    We study the elliptic genus (a partition function) in certain interacting, twist quantum field theories. Without twists, these theories have N=2 supersymmetry. The twists provide a regularization, and also partially break the supersymmetry. In spite of the regularization, one can establish a homotopy of the elliptic genus in a coupling parameter. Our construction relies on a priori estimates and other methods from constructive quantum field theory; this mathematical underpinning allows us to justify evaluating the elliptic genus at one endpoint of the homotopy. We obtain a version of Witten's proposed formula for the elliptic genus in terms of classical theta functions. As a consequence, the elliptic genus has a hidden SL(2,Z) symmetry characteristic of conformal theory, even though the underlying theory is not conformal. (orig.)

  11. Hidden conformal symmetry of extremal black holes

    International Nuclear Information System (INIS)

    Chen Bin; Long Jiang; Zhang Jiaju

    2010-01-01

    We study the hidden conformal symmetry of extremal black holes. We introduce a new set of conformal coordinates to write the SL(2,R) generators. We find that the Laplacian of the scalar field in many extremal black holes, including Kerr(-Newman), Reissner-Nordstrom, warped AdS 3 , and null warped black holes, could be written in terms of the SL(2,R) quadratic Casimir. This suggests that there exist dual conformal field theory (CFT) descriptions of these black holes. From the conformal coordinates, the temperatures of the dual CFTs could be read directly. For the extremal black hole, the Hawking temperature is vanishing. Correspondingly, only the left (right) temperature of the dual CFT is nonvanishing, and the excitations of the other sector are suppressed. In the probe limit, we compute the scattering amplitudes of the scalar off the extremal black holes and find perfect agreement with the CFT prediction.

  12. Exact solution of the hidden Markov processes

    Science.gov (United States)

    Saakian, David B.

    2017-11-01

    We write a master equation for the distributions related to hidden Markov processes (HMPs) and solve it using a functional equation. Thus the solution of HMPs is mapped exactly to the solution of the functional equation. For a general case the latter can be solved only numerically. We derive an exact expression for the entropy of HMPs. Our expression for the entropy is an alternative to the ones given before by the solution of integral equations. The exact solution is possible because actually the model can be considered as a generalized random walk on a one-dimensional strip. While we give the solution for the two second-order matrices, our solution can be easily generalized for the L values of the Markov process and M values of observables: We should be able to solve a system of L functional equations in the space of dimension M -1 .

  13. [Dangerous states and mental health disorders: perceptions and reality].

    Science.gov (United States)

    Tassone-Monchicourt, C; Daumerie, N; Caria, A; Benradia, I; Roelandt, J-L

    2010-01-01

    Image of Madness was always strongly linked with the notion of "dangerousness", provoking fear and social exclusion, despite the evolution of psychiatric practices and organisation, and the emphasis on user's rights respect. Mediatization and politicization of this issue through news item combining crime and mental illness, reinforce and spread out this perception. This paper presents a review of the litterature on social perceptions associating "dangerousness", "Insanity" and "mental illness", available data about the link between "dangerous states" and "psychiatric disorders", as well as the notion of "dangerousness" and the assessment of "dangerous state" of people suffering or not from psychiatric disorders. MAPPING OF SOCIAL REPRESENTATIONS: The French Survey "Mental Health in General Population: Images and Realities (MHGP)" was carried out between 1999 and 2003, on a representative sample of 36.000 individuals over 18 years old. It aims at describing the social representations of the population about "insanity/insane" and "mental illness/mentally ill". The results show that about 75% of the people interviewed link "insanity" or "mental illness" with "criminal or violent acts". Young people and those with a high level of education more frequently categorize violent and dangerous behaviours in the field of Mental illness rather than in that of madness. CORRELATION BETWEEN DANGEROUS STATE AND PSYCHIATRIC DISORDERS: in the scientific literature, all experts reject the hypothesis of a direct link between violence and mental disorder. Besides, 2 tendencies appear in their conclusions: on one hand, some studies establish a significative link between violence and severe mental illness, compared with the general population. On the other hand, results show that 87 to 97% of des aggressors are not mentally ills. Therefore, the absence of scientific consensus feeds the confusion and reinforce the link of causality between psychiatric disorders and violence. OFFICIAL

  14. Evaluation of non radiation dangerous in multipurpose reactor GAS

    International Nuclear Information System (INIS)

    Suwarto, S.

    1998-01-01

    Evaluation of the potential non irradiation dangerous in RSG-GAS included of : the fire dangerous, the chemical hazard and gas dangerous have been performed to evaluate its potential on causing the accident and evaluate the performance of the equipment to protect the accident. Evaluate the performance of the equipment to protect to accident . Evaluate to the fire dangerous performed by identified the potential dangerous of fire at each rooms and evaluate the performance of each equipment included of dry powder fire extinguishing system, hydrant system, fire detectors and alarm system. Evaluation to the chemical hazard and gas dangerous performed by identified the number and it's the management of chemical hazard in the chemical storage and laboratory. The result of evaluation included of data of the fire dangerous potential class and the performance of its equipment in each room in RSG-GAS and the data of the number and the management system of the chemical hazard and gas in chemical storage and chemical laboratory. From this evaluation it is concluded that the equipment of fire system are available to protect against the accident and the chemical hazard and gas potential are relating small, and has been managed properly

  15. Social exclusion, health and hidden homelessness.

    Science.gov (United States)

    Watson, J; Crawley, J; Kane, D

    2016-10-01

    Homelessness and poverty are extreme forms of social exclusion which extend beyond the lack of physical or material needs. The purpose of this study was to explore and expand the concept of social exclusion within the social determinants of health perspective - to understand how the social environment, health behaviours and health status are associated with material and social deprivation. Fundamental qualitative description with tones of focused ethnography. Participants who identified as hidden homeless described their everyday living conditions and how these everyday conditions were impacted and influenced by their social environments, coping/health behaviours and current health status. Research Ethics Board approval was granted and informed consents were obtained from 21 participants prior to the completion of individual interviews. Qualitative content analysis examined the descriptions of men and women experiencing hidden homelessness. Participants described the 'lack of quality social interactions and supports' and their 'daily struggles of street life'. They also shared the 'pain of addiction' and how coping strategies influenced health. Participants were hopeful that their insights would 'better the health of homeless people' by helping shape public policy and funding of community resources that would reduce barriers and improve overall health. Health professionals who understand health behaviours as coping mechanisms for poor quality social environments can provide more comprehensive and holistic care. The findings of this study can be used to support the importance of housing as a key factor in the health and well-being of people experiencing poverty, homelessness and social exclusion; and consequently, reinforces the need for a national housing strategy. Copyright © 2016 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  16. Skyrmions with holography and hidden local symmetry

    International Nuclear Information System (INIS)

    Nawa, Kanabu; Hosaka, Atsushi; Suganuma, Hideo

    2009-01-01

    We study baryons as Skyrmions in holographic QCD with D4/D8/D8 multi-D brane system in type IIA superstring theory, and also in the nonlinear sigma model with hidden local symmetry. Comparing these two models, we find that the extra dimension and its nontrivial curvature can largely change the role of (axial) vector mesons for baryons in four-dimensional space-time. In the hidden local symmetry approach, the ρ-meson field as a massive Yang-Mills field has a singular configuration in Skyrmion, which gives a strong repulsion for the baryon as a stabilizer. When the a 1 meson is added in this approach, the stability of Skyrmion is lost by the cancellation of ρ and a 1 contributions. On the contrary, in holographic QCD, the ρ-meson field does not appear as a massive Yang-Mills field due to the extra dimension and its nontrivial curvature. We show that the ρ-meson field has a regular configuration in Skyrmion, which gives a weak attraction for the baryon in holographic QCD. We argue that Skyrmion with π, ρ, and a 1 mesons become stable due to the curved extra dimension and also the presence of the Skyrme term in holographic QCD. From this result, we also discuss the features of our truncated-resonance analysis on baryon properties with π and ρ mesons below the cutoff scale M KK ∼1 GeV in holographic QCD, which is compared with other 5D instanton analysis.

  17. Rural Tanzanian women's awareness of danger signs of obstetric complications

    Directory of Open Access Journals (Sweden)

    Lindmark Gunilla

    2009-03-01

    Full Text Available Abstract Background Awareness of the danger signs of obstetric complications is the essential first step in accepting appropriate and timely referral to obstetric and newborn care. The objectives of this study were to assess women's awareness of danger signs of obstetric complications and to identify associated factors in a rural district in Tanzania. Methods A total of 1118 women who had been pregnant in the past two years were interviewed. A list of medically recognized potentially life threatening obstetric signs was obtained from the responses given. Chi- square test was used to determine associations between categorical variables and multivariate logistic regression analysis was used to identify factors associated with awareness of obstetric danger signs. Results More than 98% of the women attended antenatal care at least once. Half of the women knew at least one obstetric danger sign. The percentage of women who knew at least one danger sign during pregnancy was 26%, during delivery 23% and after delivery 40%. Few women knew three or more danger signs. According to multivariate logistic regression analysis having secondary education or more increased the likelihood of awareness of obstetric danger signs six-fold (OR = 5.8; 95% CI: 1.8–19 in comparison with no education at all. The likelihood to have more awareness increased significantly by increasing age of the mother, number of deliveries, number of antenatal visits, whether the delivery took place at a health institution and whether the mother was informed of having a risks/complications during antenatal care. Conclusion Women had low awareness of danger signs of obstetric complications. We recommend the following in order to increase awareness of danger signs of obstetrical complications: to improve quality of counseling and involving other family members in antenatal and postnatal care, to use radio messages and educational sessions targeting the whole community and to intensify

  18. Adaptive filtering for hidden node detection and tracking in networks.

    Science.gov (United States)

    Hamilton, Franz; Setzer, Beverly; Chavez, Sergio; Tran, Hien; Lloyd, Alun L

    2017-07-01

    The identification of network connectivity from noisy time series is of great interest in the study of network dynamics. This connectivity estimation problem becomes more complicated when we consider the possibility of hidden nodes within the network. These hidden nodes act as unknown drivers on our network and their presence can lead to the identification of false connections, resulting in incorrect network inference. Detecting the parts of the network they are acting on is thus critical. Here, we propose a novel method for hidden node detection based on an adaptive filtering framework with specific application to neuronal networks. We consider the hidden node as a problem of missing variables when model fitting and show that the estimated system noise covariance provided by the adaptive filter can be used to localize the influence of the hidden nodes and distinguish the effects of different hidden nodes. Additionally, we show that the sequential nature of our algorithm allows for tracking changes in the hidden node influence over time.

  19. Hidden gauge structure of supersymmetric free differential algebras

    Energy Technology Data Exchange (ETDEWEB)

    Andrianopoli, Laura [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy); D’Auria, Riccardo [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); Ravera, Lucrezia [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy)

    2016-08-16

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q{sup ′} introduced in http://dx.doi.org/10.1016/0550-3213(82)90376-5 and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B{sup (2)} and B{sup (3)} in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of two nilpotent fermionic generators in the hidden algebra. We propose that our approach, where all the invariances of the FDA are expressed as Lie derivatives of the p-forms in the hidden supergroup manifold, could be an appropriate framework to discuss theories defined in enlarged versions of superspace recently considered in the literature, such us double field theory and its generalizations.

  20. Top of the Most Dangerous Food Parasites

    Directory of Open Access Journals (Sweden)

    A.A. Zaslavskaya

    2016-09-01

    Full Text Available According to the rating of the risk of infection by food parasites, which was published the World Health Organization (WHO and the Food Agriculture Organisation in 2014, cryptosporidiosis is on the 5th place. It is a parasitic protozoan disease, belongs to the genus Cryptosporidium type Apicomplexa. About 20 species of Cryptosporidium are revealed and known now. The incubation period of cryptosporidiosis lasts from 4 to 14 days. The main and most typical clinical manifestation of the disease — a profuse watery diarrhea, as well as clinically possible cryptosporidiosis of the biliary tract and broncho-pulmonary (respiratory cryptosporidiosis. Cryptosporidiosis diagnosis is based on laboratory studies of faeces (in vivo and pathological material (posthumously, taking into account epizootic, clinical and postmortem data. Causal treatment is not developed. But it is possible to control the diarrhea caused by this infection. Specific preventive management of cryptosporidiosis is not developed. Personal hygiene measures are necessary. The 6th most dangerous food parasitosis is Entamoeba histolytica. This intestinal protozoa disease is characterized by ulcerative lesions of the colon, chronic protracted course with the risk of the formation of abscesses in the liver and various organs. The causative agent of ame­biasis — Entamoeba histolytica — belongs to the genus Entamoeba, family Entamoebidae, the simplest type — Protozoa. According to the recommendations of the WHO Expert Committee (1970, there are three clinical forms of amebiasis: intestinal, extra-intestinal and skin. Diagnostic microscopy of the native smears of fresh feces in saline solution and smears stained with Lugol’s solution is carried out. In the presence of clinical signs of intestinal amebiasis and negative results of parasitological studies, serological tests are used based on the detection of specific antibodies against Entamoeba. There are several groups of drugs for

  1. Sociocultural Dimension of Hidden Content in a Professional Language Curriculum

    Directory of Open Access Journals (Sweden)

    Ekaterina E. Shishlova

    2017-12-01

    Full Text Available Introduction: studying curriculum as a pedagogical problem has traditionally been reduced to the analysis of its explicit content, set in official educational documents. However, a much less studied hidden content plays a significant role in education. So, what is the role of the hidden curriculum during professional language training? The purpose of the article is to determine the potential impact of hidden curriculum on students’ conceptual worldview. Comparing the worldview presented in textbooks with students’ one has allowed us to estimate the rate of influence of hidden curr iculum. Materials and Methods: the methodological basis of the work is the cultural concept of personalityoriented education. The methodology for studying the role of hidden curriculum includes four stages: at the first stage, the authors set the criteria for selecting textbooks for analysis and do the selection; at the second stage, the authors select sociocultural concepts for analysis; at the third stage, the scheme of analysis is designed and the analysis of textbooks is done; at the fourth stage, the authors identify the potential influence of hidden curriculum on students’ conceptual worldview. Results: the structure of hidden curriculum has been determined and the scheme for analysing its subject component has been developed. The authors have identified a significant influence of hidden curriculum on students’ worldview, which represents the scientific novelty of the article. Discussion and Conclusions: the article gives the definition of a hidden curriculum which is new for Russian pedagogy and presents a methodology for its analysis in EFL textbooks. That analysis is recommended to be conducted when selecting teaching materials both i n languages and other humanities.

  2. The Second International Conference on Nutrition: Implications for Hidden Hunger.

    Science.gov (United States)

    Amoroso, Leslie

    2016-01-01

    The Second International Conference on Nutrition (ICN2) was jointly organized by the Food and Agriculture Organization of the United Nations (FAO) and the World Health Organization (WHO) and was held at the FAO Headquarters in Rome, Italy, from 19 to 21 November 2014. The ICN2 was a high-level intergovernmental meeting that focused global attention on addressing malnutrition in all its forms: undernutrition, including micronutrient deficiencies, overweight, and obesity. The ICN2 was held to specifically address the persistent and unacceptably high levels of malnutrition. Despite much progress in reducing hunger globally, 795 million people remain undernourished, over 2 billion people suffer from various micronutrient deficiencies, and an estimated 161 million children under 5 years of age are stunted, 99 million underweight, and 51 million wasted. Meanwhile, more than 600 million adults are obese. Global problems require global solutions. The ICN2 brought together national policy-makers from food, agriculture, health, education, social protection and other relevant sectors to address the complex problem of malnutrition through a multi-sectoral approach. Two outcome documents - the Rome Declaration on Nutrition and the Framework for Action - were endorsed by participating governments at the Conference, committing world leaders to establishing national policies aimed at eradicating malnutrition in all its forms and transforming food systems to make nutritious diets available to all. The Rome Declaration on Nutrition is a political statement of 10 commitments for more effective and coordinated action to improve nutrition, while the Framework for Action is a voluntary technical guide of 60 recommendations for the implementation of the political commitments. This chapter provides information on the ICN2 and its outcomes as well as follow-up activities. Emphasis is placed on the Rome Declaration on Nutrition and the Framework for Action, with special focus on hidden

  3. Multilayer Neural Networks with Extensively Many Hidden Units

    International Nuclear Information System (INIS)

    Rosen-Zvi, Michal; Engel, Andreas; Kanter, Ido

    2001-01-01

    The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions, whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an overlap in the space of Boolean functions as order parameter, the storage capacity is found to scale with the logarithm of the number of implementable Boolean functions. The generalization behavior is smooth for continuous couplings and shows a discontinuous transition to perfect generalization for discrete ones

  4. Update on hidden sectors with dark forces and dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-11-15

    Recently there has been much interest in hidden sectors, especially in the context of dark matter and ''dark forces'', since they are a common feature of beyond standard model scenarios like string theory and SUSY and additionally exhibit interesting phenomenological aspects. Various laboratory experiments place limits on the so-called hidden photon and continuously further probe and constrain the parameter space; an updated overview is presented here. Furthermore, for several hidden sector models with light dark matter we study the viability with respect to the relic abundance and direct detection experiments.

  5. Hidden photon dark matter search with large metallic mirror

    International Nuclear Information System (INIS)

    Doebrich, Babette; Lindner, Axel; Daumiller, Kai; Engel, Ralph; Roth, Markus; Kowalski, Marek

    2014-10-01

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  6. Naturally light hidden photons in LARGE volume string compactifications

    International Nuclear Information System (INIS)

    Goodsell, M.; Jaeckel, J.; Redondo, J.; Ringwald, A.

    2009-09-01

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  7. Hidden Area and Mechanical Nonlinearities in Freestanding Graphene

    Science.gov (United States)

    Nicholl, Ryan J. T.; Lavrik, Nickolay V.; Vlassiouk, Ivan; Srijanto, Bernadeta R.; Bolotin, Kirill I.

    2017-06-01

    We investigated the effect of out-of-plane crumpling on the mechanical response of graphene membranes. In our experiments, stress was applied to graphene membranes using pressurized gas while the strain state was monitored through two complementary techniques: interferometric profilometry and Raman spectroscopy. By comparing the data obtained through these two techniques, we determined the geometric hidden area which quantifies the crumpling strength. While the devices with hidden area ˜0 % obeyed linear mechanics with biaxial stiffness 428 ±10 N /m , specimens with hidden area in the range 0.5%-1.0% were found to obey an anomalous nonlinear Hooke's law with an exponent ˜0.1 .

  8. Context Tree Estimation in Variable Length Hidden Markov Models

    OpenAIRE

    Dumont, Thierry

    2011-01-01

    We address the issue of context tree estimation in variable length hidden Markov models. We propose an estimator of the context tree of the hidden Markov process which needs no prior upper bound on the depth of the context tree. We prove that the estimator is strongly consistent. This uses information-theoretic mixture inequalities in the spirit of Finesso and Lorenzo(Consistent estimation of the order for Markov and hidden Markov chains(1990)) and E.Gassiat and S.Boucheron (Optimal error exp...

  9. Local models and hidden nonlocality in Quantum Theory

    OpenAIRE

    Guerini, Leonardo

    2014-01-01

    This Master's thesis has two central subjects: the simulation of correlations generated by local measurements on entangled quantum states by local hidden-variables models and the revelation of hidden nonlocality. We present and detail the Werner's local model and the hidden nonlocality of some Werner states of dimension $d\\geq5$, the Gisin-Degorre's local model for a Werner state of dimension $d=2$ and the local model of Hirsch et al. for mixtures of the singlet state and noise, all of them f...

  10. Suppressing the QCD axion abundance by hidden monopoles

    International Nuclear Information System (INIS)

    Kawasaki, Masahiro

    2015-11-01

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10 12 GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  11. male knowledge of danger signs of obstetric complications

    African Journals Online (AJOL)

    Maternal mortality in sub-Saharan Africa has been unacceptably high over the ... In addition to this, the autonomy of pregnant women to access health care is ... practices concerning antenatal care, knowledge of danger signs in pregnancy and ...

  12. Regulations concerning marine transport and storage of dangerous things (abridged)

    International Nuclear Information System (INIS)

    1987-01-01

    This report shows the Ordinances No.84 (1967) and No.30 (1957) of the Ministry of transport. The Ordinance No.84 has been published in detail elsewhere. The provisions concerning shipping transport and storage of dangerous substances deal with isolation of each dangerous substance, method for loading (cleaning of container, etc.), certificate for ship for transporting dangerous substances, renewal of certificate for ship for transporting dangerous substances, return of certificate, fee (for renewal and reissue of certificate), definition of terms, type of radioactive cargo (L-type cargo, A-type cargo, BM-type cargo, BU type cargo), transport of radioactive substances, type of fissionable cargo (Type I, Type II and Type III), confirmation of safety concerning radioactive cargo (conformity to standards, inspection, approval, etc.), limit of cargo volume, transport index, marking (type of cargo), confirmation of safety of transport, inspection of contamination, notice of transport, special measures, inspection of cargo (radioactive substances), requirements for container and package, etc. (Nogami, K.)

  13. Ways out of danger. Wege aus der Gefahr

    Energy Technology Data Exchange (ETDEWEB)

    Eppler, E

    1981-01-01

    The volume divides into five sections: ways out of danger; pressure leading into danger; what might save us, and will it grow to become effective; tedious paths out of danger; companions out of danger. The author puts the question whether the true art of politics will be restored. He shows that by reducing politics to mere crisis management we shall not be enabled to overcome the serious problems of the eighties. He points out future possibilities by making clear the chances and misdevelopments of energy policy, of foreign, development and defence policy. The political experience of recent years, the new approach showing different needs and ways of life should be taken seriously as hopeful signs and ought to be reflected in politics again.

  14. Danger Signals Activating the Immune Response after Trauma

    Directory of Open Access Journals (Sweden)

    Stefanie Hirsiger

    2012-01-01

    Full Text Available Sterile injury can cause a systemic inflammatory response syndrome (SIRS that resembles the host response during sepsis. The inflammatory response following trauma comprises various systems of the human body which are cross-linked with each other within a highly complex network of inflammation. Endogenous danger signals (danger-associated molecular patterns; DAMPs; alarmins as well as exogenous pathogen-associated molecular patterns (PAMPs play a crucial role in the initiation of the immune response. With popularization of the “danger theory,” numerous DAMPs and PAMPs and their corresponding pathogen-recognition receptors have been identified. In this paper, we highlight the role of the DAMPs high-mobility group box protein 1 (HMGB1, interleukin-1α (IL-1α, and interleukin-33 (IL-33 as unique dual-function mediators as well as mitochondrial danger signals released upon cellular trauma and necrosis.

  15. An exploratory study of international tourists' perception of danger in ...

    African Journals Online (AJOL)

    South African Journal for Research in Sport, Physical Education and Recreation ... gender, group composition and time of day have an influence on the perception of ... relatively safe, the differences in perceived danger between the three ...

  16. Sentencing dangerous offenders: policy and practice in the Crown Court

    OpenAIRE

    Henham, R

    2001-01-01

    Analysis of Crown Courts' use of protective sentencing powers under s.80(2)(b), s.85, and s.109 of 2000 Act and whether preference for s.85 reflects fundamental flaw in leaving determination of "dangerousness" to judiciary.

  17. 8. knowledge and perception of women towards danger signs

    African Journals Online (AJOL)

    Esem

    Sometimes a pregnant woman may experience signs and symptoms which signal danger. ... order to raise women's awareness and enable them to seek care when they .... midwifery students graduate with the skills to teach women and ...

  18. Modelling human behaviours and reactions under dangerous environment

    OpenAIRE

    Kang, J; Wright, D K; Qin, S F; Zhao, Y

    2005-01-01

    This paper describes the framework of a real-time simulation system to model human behavior and reactions in dangerous environments. The system utilizes the latest 3D computer animation techniques, combined with artificial intelligence, robotics and psychology, to model human behavior, reactions and decision making under expected/unexpected dangers in real-time in virtual environments. The development of the system includes: classification on the conscious/subconscious behaviors and reactions...

  19. Overcoming negative tendencies concerning public attitude to potentially dangerous technologies

    International Nuclear Information System (INIS)

    Barinov, A.; Shmelev, S.

    1995-01-01

    The Moscow Scientific industrial Association RADON is an enterprise with potentially dangerous technology. RADON fulfils the collection, transportation, treatment and disposal of radioactive waste from Moscow region. The inhabitants of this region consider it, and that is true, to be essentially dangerous. We understood, that it is necessary to change the situation and give the public the true information about RADON's activity. For this purpose 4 years ago we developed a new Department, the Department or External Relations

  20. The Economic Side Effects of Dangerous Drug Announcements.

    OpenAIRE

    Dranove, David; Olsen, Chris

    1994-01-01

    Immediately prior to the passage of the 1962 Food and Drug Administration Amendments, there were a number of drugs recalled from markets worldwide. Announcements about the dangerous side effects of these drugs were associated with lower-share prices for their manufacturers and the industry as a whole. We perform several analyses to sort out alternative explanations for the observed declines. We find that dangerous drug announcements had no effect on the sales of other drugs and didn't affect ...

  1. The heterosexual singles scene: putting danger into pleasure.

    Science.gov (United States)

    Peart, R; Rosenthal, D; Moore, S

    1996-06-01

    The juxtaposition of pleasure and danger has engaged many feminist theorists and researchers in the field of sexuality. This article presents a theoretical analysis of the ambiguous and complex relationship between 'pleasure', 'danger' and contemporary feminist theory. In doing so, it offers an understanding of the ways in which the categories of pleasure and danger operate within the discourses of heterosexuality to construct perceptions of risk in the context of HIV/AIDS. Data were collected from a study of the sexual attitudes and practices of 112 sexually-active, single, heterosexual adults (58 men and 54 women), aged 20 to 40 years (mean = 27 years) who agreed to be interviewed when approached at night-clubs and public "singles' bars around Melbourne, Australia. The qualitative analysis presented here is consistent with a poststructuralist feminism. First, we discuss how sexuality cannot be cast solely as pleasurable or dangerous. Second, we demonstrate how heterosexualized notions of pleasure and danger operate to provide misperceptions of risk from HIV/AIDS transmission. Third, we identify the ways in which the logic of identity functions to obscure risk within the discourse of heterosexuality, and finally we attempt to forge new ways of practising pleasure which disrupt heterosexist discourses and allow for pleasures which incorporate danger.

  2. High Energy Colliders and Hidden Sectors

    Science.gov (United States)

    Dror, Asaf Jeff

    This thesis explores two dominant frontiers of theoretical physics, high energy colliders and hidden sectors. The Large Hadron Collider (LHC) is just starting to reach its maximum operational capabilities. However, already with the current data, large classes of models are being put under significant pressure. It is crucial to understand whether the (thus far) null results are a consequence of a lack of solution to the hierarchy problem around the weak scale or requires expanding the search strategy employed at the LHC. It is the duty of the current generation of physicists to design new searches to ensure that no stone is left unturned. To this end, we study the sensitivity of the LHC to the couplings in the Standard Model top sector. We find it can significantly improve the measurements on ZtRtR coupling by a novel search strategy, making use of an implied unitarity violation in such models. Analogously, we show that other couplings in the top sector can also be measured with the same technique. Furthermore, we critically analyze a set of anomalies in the LHC data and how they may appear from consistent UV completions. We also propose a technique to measure lifetimes of new colored particles with non-trivial spin. While the high energy frontier will continue to take data, it is likely the only collider of its kind for the next couple decades. On the other hand, low-energy experiments have a promising future with many new proposed experiments to probe the existence of particles well below the weak scale but with small couplings to the Standard Model. In this work we survey the different possibilities, focusingon the constraints as well as possible new hidden sector dynamics. In particular, we show that vector portals which couple to an anomalous current, e.g., baryon number, are significantly constrained from flavor changing meson decays and rare Z decays. Furthermore, we present a new mechanism for dark matter freezeout which depletes the dark sector through an

  3. Alleviating hidden hunger. Approaches that work

    International Nuclear Information System (INIS)

    Kennedy, E.; Mannar, V.; Iyengar, V.

    2003-01-01

    The world has come a long way in understanding the nature, magnitude and range of solutions to micronutrient malnutrition - often called 'hidden hunger'. The most sustainable solutions - that is those that are likely to be maintained in the long term - almost surely will include food-based approaches including diet diversity, food fortification and biofortification. Food fortification and biofortification could be some of the most cost-effective of all public health interventions and thus within the economic reach of even the world's poorest. In order to implement them in a sustainable manner, a combination of technical, operational, economic, behavioural and political factors need to be addressed. In some ways the technological issues are the easiest. Because of attention to research, we now have a variety of ways for both single and multiple micronutrients to reach the target population. We also know what is needed in order to ensure delivery systems. The key factor for continued success in reducing micronutrient malnutrition through fortification is a political commitment at the national and international level and creating effective public-private partnerships at the national level. The payoff for eliminating hidden hunger through nutrient fortification is enormous and few other public health interventions offer such a promising health, nutrition and economic success story. Nuclear and isotopic techniques are valuable tools in helping to meet the multifaceted challenges posed by nutritional disorders affecting the entire human life span (embryonic to elderly). Among the numerous applications available, isotopic techniques are uniquely well suited for targeting and tracking progress in food and nutrition development programmes (See box: How Nutrients are Tracked). These include: use of the stable isotopes of iron (Fe) and zinc (Zn) as a kind of gold standard in studies of their bioavailability from foods; trace element bioavailability and pool sizes for

  4. Prediction of Annual Rainfall Pattern Using Hidden Markov Model ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Hidden Markov model is very influential in stochastic world because of its ... the earth from the clouds. The usual ... Rainfall modelling and ... Markov Models have become popular tools ... environment sciences, University of Jos, plateau state,.

  5. New limits on hidden photons from past electron beam dumps

    International Nuclear Information System (INIS)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-01

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  6. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  7. Cosmological abundance of the QCD axion coupled to hidden photons

    Science.gov (United States)

    Kitajima, Naoya; Sekiguchi, Toyokazu; Takahashi, Fuminobu

    2018-06-01

    We study the cosmological evolution of the QCD axion coupled to hidden photons. For a moderately strong coupling, the motion of the axion field leads to an explosive production of hidden photons by tachyonic instability. We use lattice simulations to evaluate the cosmological abundance of the QCD axion. In doing so, we incorporate the backreaction of the produced hidden photons on the axion dynamics, which becomes significant in the non-linear regime. We find that the axion abundance is suppressed by at most O (102) for the decay constant fa =1016GeV, compared to the case without the coupling. For a sufficiently large coupling, the motion of the QCD axion becomes strongly damped, and as a result, the axion abundance is enhanced. Our results show that the cosmological upper bound on the axion decay constant can be relaxed by a few hundred for a certain range of the coupling to hidden photons.

  8. Dopamine reward prediction errors reflect hidden state inference across time

    Science.gov (United States)

    Starkweather, Clara Kwon; Babayan, Benedicte M.; Uchida, Naoshige; Gershman, Samuel J.

    2017-01-01

    Midbrain dopamine neurons signal reward prediction error (RPE), or actual minus expected reward. The temporal difference (TD) learning model has been a cornerstone in understanding how dopamine RPEs could drive associative learning. Classically, TD learning imparts value to features that serially track elapsed time relative to observable stimuli. In the real world, however, sensory stimuli provide ambiguous information about the hidden state of the environment, leading to the proposal that TD learning might instead compute a value signal based on an inferred distribution of hidden states (a ‘belief state’). In this work, we asked whether dopaminergic signaling supports a TD learning framework that operates over hidden states. We found that dopamine signaling exhibited a striking difference between two tasks that differed only with respect to whether reward was delivered deterministically. Our results favor an associative learning rule that combines cached values with hidden state inference. PMID:28263301

  9. Optimisation of Hidden Markov Model using Baum–Welch algorithm ...

    Indian Academy of Sciences (India)

    The present work is a part of development of Hidden Markov Model. (HMM) based ... the Himalaya. In this work, HMMs have been developed for forecasting of maximum and minimum ..... data collection teams of Snow and Avalanche Study.

  10. On the LHC sensitivity for non-thermalised hidden sectors

    Science.gov (United States)

    Kahlhoefer, Felix

    2018-04-01

    We show under rather general assumptions that hidden sectors that never reach thermal equilibrium in the early Universe are also inaccessible for the LHC. In other words, any particle that can be produced at the LHC must either have been in thermal equilibrium with the Standard Model at some point or must be produced via the decays of another hidden sector particle that has been in thermal equilibrium. To reach this conclusion, we parametrise the cross section connecting the Standard Model to the hidden sector in a very general way and use methods from linear programming to calculate the largest possible number of LHC events compatible with the requirement of non-thermalisation. We find that even the HL-LHC cannot possibly produce more than a few events with energy above 10 GeV involving states from a non-thermalised hidden sector.

  11. Risk from the frontlines of a hidden epidemic sexuality, masculinities ...

    African Journals Online (AJOL)

    Risk from the frontlines of a hidden epidemic sexuality, masculinities and social pressures ... It frames risk in the context of the dynamics governing sexuality, underlined ... MSM risk and practice, in these contexts, are consequently shaped by ...

  12. New limits on hidden photons from past electron beam dumps

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-15

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  13. A Novel Method for Decoding Any High-Order Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Fei Ye

    2014-01-01

    Full Text Available This paper proposes a novel method for decoding any high-order hidden Markov model. First, the high-order hidden Markov model is transformed into an equivalent first-order hidden Markov model by Hadar’s transformation. Next, the optimal state sequence of the equivalent first-order hidden Markov model is recognized by the existing Viterbi algorithm of the first-order hidden Markov model. Finally, the optimal state sequence of the high-order hidden Markov model is inferred from the optimal state sequence of the equivalent first-order hidden Markov model. This method provides a unified algorithm framework for decoding hidden Markov models including the first-order hidden Markov model and any high-order hidden Markov model.

  14. A two particle hidden sector and the oscillations with photons

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Pedro D. [Universidad de Antofagasta, Departamento de Fisica, Antofagasta (Chile); Arias, Paola; Maldonado, Carlos [Universidad de Santiago de Chile, Departmento de Fisica, Santiago (Chile)

    2018-01-15

    We present a detailed study of the oscillations and optical properties for vacuum, in a model for the dark sector that contains axion-like particles and hidden photons. We provide bounds for the couplings versus the mass, using current results from ALPS-I and PVLAS. We also discuss the challenges for the detection of models with more than one hidden particle in light shining trough wall-like experiments. (orig.)

  15. Rare Z boson decays to a hidden sector

    Science.gov (United States)

    Blinov, Nikita; Izaguirre, Eder; Shuve, Brian

    2018-01-01

    We demonstrate that rare decays of the Standard Model Z boson can be used to discover and characterize the nature of new hidden-sector particles. We propose new searches for these particles in soft, high-multiplicity leptonic final states at the Large Hadron Collider. The proposed searches are sensitive to low-mass particles produced in Z decays, and we argue that these striking signatures can shed light on the hidden-sector couplings and mechanism for mass generation.

  16. Anticipating hidden text salting in emails (extended abstract)

    OpenAIRE

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  17. Hidden twelve-dimensional super Poincare symmetry in eleven dimensions

    International Nuclear Information System (INIS)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2004-01-01

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional super Poincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven-dimensional superparticle, taken off-shell, we discover a hidden twelve-dimensional super Poincare symmetry that governs the theory

  18. Hidden charged dark matter and chiral dark radiation

    Science.gov (United States)

    Ko, P.; Nagata, Natsumi; Tang, Yong

    2017-10-01

    In the light of recent possible tensions in the Hubble constant H0 and the structure growth rate σ8 between the Planck and other measurements, we investigate a hidden-charged dark matter (DM) model where DM interacts with hidden chiral fermions, which are charged under the hidden SU(N) and U(1) gauge interactions. The symmetries in this model assure these fermions to be massless. The DM in this model, which is a Dirac fermion and singlet under the hidden SU(N), is also assumed to be charged under the U(1) gauge symmetry, through which it can interact with the chiral fermions. Below the confinement scale of SU(N), the hidden quark condensate spontaneously breaks the U(1) gauge symmetry such that there remains a discrete symmetry, which accounts for the stability of DM. This condensate also breaks a flavor symmetry in this model and Nambu-Goldstone bosons associated with this flavor symmetry appear below the confinement scale. The hidden U(1) gauge boson and hidden quarks/Nambu-Goldstone bosons are components of dark radiation (DR) above/below the confinement scale. These light fields increase the effective number of neutrinos by δNeff ≃ 0.59 above the confinement scale for N = 2, resolving the tension in the measurements of the Hubble constant by Planck and Hubble Space Telescope if the confinement scale is ≲1 eV. DM and DR continuously scatter with each other via the hidden U(1) gauge interaction, which suppresses the matter power spectrum and results in a smaller structure growth rate. The DM sector couples to the Standard Model sector through the exchange of a real singlet scalar mixing with the Higgs boson, which makes it possible to probe our model in DM direct detection experiments. Variants of this model are also discussed, which may offer alternative ways to investigate this scenario.

  19. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  20. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  1. Hidden Structural Codes in Protein Intrinsic Disorder.

    Science.gov (United States)

    Borkosky, Silvia S; Camporeale, Gabriela; Chemes, Lucía B; Risso, Marikena; Noval, María Gabriela; Sánchez, Ignacio E; Alonso, Leonardo G; de Prat Gay, Gonzalo

    2017-10-17

    Intrinsic disorder is a major structural category in biology, accounting for more than 30% of coding regions across the domains of life, yet consists of conformational ensembles in equilibrium, a major challenge in protein chemistry. Anciently evolved papillomavirus genomes constitute an unparalleled case for sequence to structure-function correlation in cases in which there are no folded structures. E7, the major transforming oncoprotein of human papillomaviruses, is a paradigmatic example among the intrinsically disordered proteins. Analysis of a large number of sequences of the same viral protein allowed for the identification of a handful of residues with absolute conservation, scattered along the sequence of its N-terminal intrinsically disordered domain, which intriguingly are mostly leucine residues. Mutation of these led to a pronounced increase in both α-helix and β-sheet structural content, reflected by drastic effects on equilibrium propensities and oligomerization kinetics, and uncovers the existence of local structural elements that oppose canonical folding. These folding relays suggest the existence of yet undefined hidden structural codes behind intrinsic disorder in this model protein. Thus, evolution pinpoints conformational hot spots that could have not been identified by direct experimental methods for analyzing or perturbing the equilibrium of an intrinsically disordered protein ensemble.

  2. Dietary phytate, zinc and hidden zinc deficiency.

    Science.gov (United States)

    Sandstead, Harold H; Freeland-Graves, Jeanne H

    2014-10-01

    Epidemiological data suggest at least one in five humans are at risk of zinc deficiency. This is in large part because the phytate in cereals and legumes has not been removed during food preparation. Phytate, a potent indigestible ligand for zinc prevents it's absorption. Without knowledge of the frequency of consumption of foods rich in phytate, and foods rich in bioavailable zinc, the recognition of zinc deficiency early in the illness may be difficult. Plasma zinc is insensitive to early zinc deficiency. Serum ferritin concentration≤20μg/L is a potential indirect biomarker. Early effects of zinc deficiency are chemical, functional and may be "hidden". The clinical problem is illustrated by 2 studies that involved US Mexican-American children, and US premenopausal women. The children were consuming home diets that included traditional foods high in phytate. The premenopausal women were not eating red meat on a regular basis, and their consumption of phytate was mainly from bran breakfast cereals. In both studies the presence of zinc deficiency was proven by functional responses to controlled zinc treatment. In the children lean-mass, reasoning, and immunity were significantly affected. In the women memory, reasoning, and eye-hand coordination were significantly affected. A screening self-administered food frequency questionnaire for office might help caregiver's identify patients at risk of zinc deficiency. Copyright © 2014 Elsevier GmbH. All rights reserved.

  3. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  4. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  5. Gauging hidden symmetries in two dimensions

    International Nuclear Information System (INIS)

    Samtleben, Henning; Weidner, Martin

    2007-01-01

    We initiate the systematic construction of gauged matter-coupled supergravity theories in two dimensions. Subgroups of the affine global symmetry group of toroidally compactified supergravity can be gauged by coupling vector fields with minimal couplings and a particular topological term. The gauge groups typically include hidden symmetries that are not among the target-space isometries of the ungauged theory. The gaugings constructed in this paper are described group-theoretically in terms of a constant embedding tensor subject to a number of constraints which parametrizes the different theories and entirely encodes the gauged Lagrangian. The prime example is the bosonic sector of the maximally supersymmetric theory whose ungauged version admits an affine e 9 global symmetry algebra. The various parameters (related to higher-dimensional p-form fluxes, geometric and non-geometric fluxes, etc.) which characterize the possible gaugings, combine into an embedding tensor transforming in the basic representation of e 9 . This yields an infinite-dimensional class of maximally supersymmetric theories in two dimensions. We work out and discuss several examples of higher-dimensional origin which can be systematically analyzed using the different gradings of e 9

  6. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  7. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M; Aarnio, P [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T; Tiilikainen, H [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1998-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  8. Hidden-Sector Dynamics and the Supersymmetric Seesaw

    CERN Document Server

    Campbell, Bruce A; Maybury, David W

    2008-01-01

    In light of recent analyses that have shown that nontrivial hidden-sector dynamics in models of supersymmetry breaking can lead to a significant impact on the predicted low-energy supersymmetric spectrum, we extend these studies to consider hidden-sector effects in extensions of the MSSM to include a seesaw model for neutrino masses. A dynamical hidden sector in an interval of mass scales below the seesaw scale would yield renormalization-group running involving both the anomalous dimension from the hidden sector and the seesaw-extended MSSM renormalization group equations (RGEs). These effects interfere in general, altering the generational mixing of the sleptons, and allowing for a substantial change to the expected level of charged-lepton flavour violation in seesaw-extended MSSM models. These results provide further support for recent theoretical observations that knowledge of the hidden sector is required in order to make concrete low-energy predictions, if the hidden sector is strongly coupled. In parti...

  9. The sounds of safety: stress and danger in music perception.

    Science.gov (United States)

    Schäfer, Thomas; Huron, David; Shanahan, Daniel; Sedlmeier, Peter

    2015-01-01

    As with any sensory input, music might be expected to incorporate the processing of information about the safety of the environment. Little research has been done on how such processing has evolved and how different kinds of sounds may affect the experience of certain environments. In this article, we investigate if music, as a form of auditory information, can trigger the experience of safety. We hypothesized that (1) there should be an optimal, subjectively preferred degree of information density of musical sounds, at which safety-related information can be processed optimally; (2) any deviation from the optimum, that is, both higher and lower levels of information density, should elicit experiences of higher stress and danger; and (3) in general, sonic scenarios with music should reduce experiences of stress and danger more than other scenarios. In Experiment 1, the information density of short music-like rhythmic stimuli was manipulated via their tempo. In an initial session, listeners adjusted the tempo of the stimuli to what they deemed an appropriate tempo. In an ensuing session, the same listeners judged their experienced stress and danger in response to the same stimuli, as well as stimuli exhibiting tempo variants. Results are consistent with the existence of an optimum information density for a given rhythm; the preferred tempo decreased for increasingly complex rhythms. The hypothesis that any deviation from the optimum would lead to experiences of higher stress and danger was only partly fit by the data. In Experiment 2, listeners should indicate their experience of stress and danger in response to different sonic scenarios: music, natural sounds, and silence. As expected, the music scenarios were associated with lowest stress and danger whereas both natural sounds and silence resulted in higher stress and danger. Overall, the results largely fit the hypothesis that music seemingly carries safety-related information about the environment.

  10. Dangerous and severe personality disorder: an ethical concept?

    Science.gov (United States)

    Glen, Sally

    2005-04-01

    Most clinicians and mental health practitioners are reluctant to work with people with dangerous and severe personality disorders because they believe there is nothing that mental health services can offer. Dangerous and severe personality disorder also signals a diagnosis which is problematic morally. Moral philosophy has not found an adequate way of dealing with personality disorders. This paper explores the question: What makes a person morally responsible for his actions and what is a legitimate mitigating factor? How do psychiatric nurses working with this client group understand the awful things some clients do? What concepts do they need, if they are to know how to explain and how to react? It is suggested that dangerous and severe personality disorder is best regarded as a moral category, framed in terms of goodness, badness, obligation and other ethical concepts. It seems plausible that in important ways the dangerous and severe personality disordered client does not understand morality or understands it differently. The peculiar position of the dangerous and severe personality disordered individual in our system of moral responsibility stems from his apparent inability to see the importance of the interests of others. It might be more helpful to regard personality disordered clients as we do children: partially but not fully reasonable for their actions. We might regard the dangerous and severe personality disordered client responsible for those actions which he most clearly understands, such as causing others physical pain, but not for those with which he is only superficially engaged, such as causing emotional pain. The paper concludes by suggesting that the dangerous and severe personality disordered individual does not fit easily into any conventional moral category, be it criminal, patient, animal or child, and thus an assessment of his moral accountability must take into consideration his special circumstances.

  11. A single hidden layer feedforward network with only one neuron in the hidden layer can approximate any univariate function

    OpenAIRE

    Guliyev , Namig; Ismailov , Vugar

    2016-01-01

    The possibility of approximating a continuous function on a compact subset of the real line by a feedforward single hidden layer neural network with a sigmoidal activation function has been studied in many papers. Such networks can approximate an arbitrary continuous function provided that an unlimited number of neurons in a hidden layer is permitted. In this paper, we consider constructive approximation on any finite interval of $\\mathbb{R}$ by neural networks with only one neuron in the hid...

  12. The Art of the Hidden: Magical and Esoteric Practices in Rinconete y Cortadillo

    Directory of Open Access Journals (Sweden)

    Frederick A. de Armas

    2013-12-01

    Full Text Available One of the most frequently studied motifs in Rinconete y Cortadillo has been its relation to the picaresque as well as the new elements that it brings to this genre. It has also been asserted that, since chronologically it is one of the first novellas included in the collection of Novelas ejemplares, it eschews the structures of romance, which are prevalent in later novellas. This study foregrounds a series of elements of romance which can be found in Rinconete y Cortadillo and that reveal a series of hidden mysteries in the novella. The essay analyzes, among others, the motif of descent and the infernal geography of the novella; the presence of Mercury as a guide to the infernal regions; the final ascent promised by Rinconete and the onomastic secrets hidden in his name; the significance of perfect friendship; the desire for freedom and its implications; and the meaning of joy as found among the rogues and the followers of the barbarous Monipodio.

  13. Differing types of cellular phone conversations and dangerous driving.

    Science.gov (United States)

    Dula, Chris S; Martin, Benjamin A; Fox, Russell T; Leonard, Robin L

    2011-01-01

    This study sought to investigate the relationship between cell phone conversation type and dangerous driving behaviors. It was hypothesized that more emotional phone conversations engaged in while driving would produce greater frequencies of dangerous driving behaviors in a simulated environment than more mundane conversation or no phone conversation at all. Participants were semi-randomly assigned to one of three conditions: (1) no call, (2) mundane call, and, (3) emotional call. While driving in a simulated environment, participants in the experimental groups received a phone call from a research confederate who either engaged them in innocuous conversation (mundane call) or arguing the opposite position of a deeply held belief of the participant (emotional call). Participants in the no call and mundane call groups differed significantly only on percent time spent speeding and center line crossings, though the mundane call group consistently engaged in more of all dangerous driving behaviors than did the no call participants. Participants in the emotional call group engaged in significantly more dangerous driving behaviors than participants in both the no call and mundane call groups, with the exception of traffic light infractions, where there were no significant group differences. Though there is need for replication, the authors concluded that whereas talking on a cell phone while driving is risky to begin with, having emotionally intense conversations is considerably more dangerous. Copyright © 2010 Elsevier Ltd. All rights reserved.

  14. Regulations concerning marine transport and storage of dangerous things (abridged)

    International Nuclear Information System (INIS)

    1981-01-01

    When the dangerous things of different classes or items are loaded on a same ship, they shall be separated mutually according to the specified standards. Containers shall be cleaned well before loading dangerous things. When there is the danger of heating, gasification, corrosion and other critical physical or chemical processes by the mutual action of the dangerous things of different items or dangerous things and other goods, they must not be loaded in a same container. Basic terms are defined, such as radioactive transported goods, fissile transported goods and exclusive loading. Radioactive transported goods are classified into types of L, A, BM and BU, and fissile transported goods into 3 kinds. Each type of these goods is defined in size and radioactivity. When the makers of radioactive transported goods pack radioactive materials into the transported goods of type BM or BU, they shall get before shipment the confirmation of the Minister of Transport concerning the standard to which these goods conform. The maximum radiation dose rate must not exceed 200 milli-rem an hour on the surface and 10 milli-rem an hour at the distance of 1 meter from the surfaces of containers loaded with radioactive transported goods. Signs, the limit of shipment and other related matters are prescribed in detail. (Okada, K.)

  15. Regulations concerning marine transport and storage of dangerous things (abridged)

    International Nuclear Information System (INIS)

    1985-01-01

    When the dangerous things of different classes or items are loaded on a same ship, they shall be separated mutually according to the specified standards. Containers shall be cleaned well before loading dangerous things. When there is the danger of heating, gasification, corrosion and other critical physical or chemical processes by the mutual action of the dangerous things of different items or dangerous things and other goods, they must not be loaded in a same container. Basic terms are defined, such as radioactive transported goods, fissile transported goods and exclusive loading. Radioactive transported goods are classified into types of L, A, BM and BU, and fissile transported goods into 3 kinds. Each type of these goods is defined in size and radioactivity. When the makers of radioactive transported goods pack radioactive materials into the transported goods of type BM or BU, they shall get before shipment the confirmation of the Minister of Transport concerning the standard to which these goods conform. The maximum radiation dose rate must not exceed 200 milli-rem an hour on the surface and 10 milli-rem an hour at the distance of 1 meter from the surfaces of containers loaded with radioactive transported goods. Signs, the limit of shipment and other related matters are prescribed in detail. (Kubozono, M.)

  16. Hidden burden of malaria in Indian women

    Directory of Open Access Journals (Sweden)

    Sharma Vinod P

    2009-12-01

    Full Text Available Abstract Malaria is endemic in India with an estimated 70-100 million cases each year (1.6-1.8 million reported by NVBDCP; of this 50-55% are Plasmodium vivax and 45-50% Plasmodium falciparum. A recent study on malaria in pregnancy reported from undivided Madhya Pradesh state (includes Chhattisgarh state, that an estimated over 220,000 pregnant women contract malaria infection each year. Malaria in pregnancy caused- abortions 34.5%; stillbirths 9%; and maternal deaths 0.45%. Bulk of this tragic outcome can be averted by following the Roll Back Malaria/WHO recommendations of the use of malaria prevention i.e. indoor residual spraying (IRS/insecticide-treated bed nets (ITN preferably long-lasting treated bed nets (LLIN; intermittent preventive therapy (IPT; early diagnosis, prompt and complete treatment using microscopic/malaria rapid diagnostics test (RDT and case management. High incidence in pregnancy has arisen because of malaria surveillance lacking coverage, lack of age and sex wise data, staff shortages, and intermittent preventive treatment (IPT applicable in high transmission states/pockets is not included in the national drug policy- an essential component of fighting malaria in pregnancy in African settings. Inadequate surveillance and gross under-reporting has been highlighted time and again for over three decades. As a result the huge problem of malaria in pregnancy reported occasionally by researchers has remained hidden. Malaria in pregnancy may quicken severity in patients with drug resistant parasites, anaemia, endemic poverty, and malnutrition. There is, therefore, urgent need to streamline malaria control strategies to make a difference in tackling this grim scenario in human health.

  17. Hydrogeophysical investigations at Hidden Dam, Raymond, California

    Science.gov (United States)

    Minsley, Burke J.; Burton, Bethany L.; Ikard, Scott; Powers, Michael H.

    2011-01-01

    Self-potential and direct current resistivity surveys are carried out at the Hidden Dam site in Raymond, California to assess present-day seepage patterns and better understand the hydrogeologic mechanisms that likely influence seepage. Numerical modeling is utilized in conjunction with the geophysical measurements to predict variably-saturated flow through typical two-dimensional dam cross-sections as a function of reservoir elevation. Several different flow scenarios are investigated based on the known hydrogeology, as well as information about typical subsurface structures gained from the resistivity survey. The flow models are also used to simulate the bulk electrical resistivity in the subsurface under varying saturation conditions, as well as the self-potential response using petrophysical relationships and electrokinetic coupling equations.The self-potential survey consists of 512 measurements on the downstream area of the dam, and corroborates known seepage areas on the northwest side of the dam. Two direct-current resistivity profiles, each approximately 2,500 ft (762 m) long, indicate a broad sediment channel under the northwest side of the dam, which may be a significant seepage pathway through the foundation. A focusing of seepage in low-topography areas downstream of the dam is confirmed from the numerical flow simulations, which is also consistent with past observations. Little evidence of seepage is identified from the self-potential data on the southeast side of the dam, also consistent with historical records, though one possible area of focused seepage is identified near the outlet works. Integration of the geophysical surveys, numerical modeling, and observation well data provides a framework for better understanding seepage at the site through a combined hydrogeophysical approach.

  18. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  19. Identifying hidden voice and video streams

    Science.gov (United States)

    Fan, Jieyan; Wu, Dapeng; Nucci, Antonio; Keralapura, Ram; Gao, Lixin

    2009-04-01

    Given the rising popularity of voice and video services over the Internet, accurately identifying voice and video traffic that traverse their networks has become a critical task for Internet service providers (ISPs). As the number of proprietary applications that deliver voice and video services to end users increases over time, the search for the one methodology that can accurately detect such services while being application independent still remains open. This problem becomes even more complicated when voice and video service providers like Skype, Microsoft, and Google bundle their voice and video services with other services like file transfer and chat. For example, a bundled Skype session can contain both voice stream and file transfer stream in the same layer-3/layer-4 flow. In this context, traditional techniques to identify voice and video streams do not work. In this paper, we propose a novel self-learning classifier, called VVS-I , that detects the presence of voice and video streams in flows with minimum manual intervention. Our classifier works in two phases: training phase and detection phase. In the training phase, VVS-I first extracts the relevant features, and subsequently constructs a fingerprint of a flow using the power spectral density (PSD) analysis. In the detection phase, it compares the fingerprint of a flow to the existing fingerprints learned during the training phase, and subsequently classifies the flow. Our classifier is not only capable of detecting voice and video streams that are hidden in different flows, but is also capable of detecting different applications (like Skype, MSN, etc.) that generate these voice/video streams. We show that our classifier can achieve close to 100% detection rate while keeping the false positive rate to less that 1%.

  20. 33 CFR 95.020 - Standard for under the influence of alcohol or a dangerous drug.

    Science.gov (United States)

    2010-07-01

    ... of alcohol or a dangerous drug. 95.020 Section 95.020 Navigation and Navigable Waters COAST GUARD... ALCOHOL OR A DANGEROUS DRUG § 95.020 Standard for under the influence of alcohol or a dangerous drug. An individual is under the influence of alcohol or a dangerous drug when: (a) The individual is operating a...

  1. 33 CFR 95.030 - Evidence of under the influence of alcohol or a dangerous drug.

    Science.gov (United States)

    2010-07-01

    ... of alcohol or a dangerous drug. 95.030 Section 95.030 Navigation and Navigable Waters COAST GUARD... ALCOHOL OR A DANGEROUS DRUG § 95.030 Evidence of under the influence of alcohol or a dangerous drug. Acceptable evidence of when a vessel operator is under the influence of alcohol or a dangerous drug includes...

  2. 46 CFR 154.1015 - Lighting in gas-dangerous space.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Lighting in gas-dangerous space. 154.1015 Section 154... Equipment Electrical § 154.1015 Lighting in gas-dangerous space. (a) Each gas-dangerous space that has... protective device for any lighting circuit that is in a gas-dangerous space must open each conductor of the...

  3. Increased taxon sampling reveals thousands of hidden orthologs in flatworms

    Science.gov (United States)

    2017-01-01

    Gains and losses shape the gene complement of animal lineages and are a fundamental aspect of genomic evolution. Acquiring a comprehensive view of the evolution of gene repertoires is limited by the intrinsic limitations of common sequence similarity searches and available databases. Thus, a subset of the gene complement of an organism consists of hidden orthologs, i.e., those with no apparent homology to sequenced animal lineages—mistakenly considered new genes—but actually representing rapidly evolving orthologs or undetected paralogs. Here, we describe Leapfrog, a simple automated BLAST pipeline that leverages increased taxon sampling to overcome long evolutionary distances and identify putative hidden orthologs in large transcriptomic databases by transitive homology. As a case study, we used 35 transcriptomes of 29 flatworm lineages to recover 3427 putative hidden orthologs, some unidentified by OrthoFinder and HaMStR, two common orthogroup inference algorithms. Unexpectedly, we do not observe a correlation between the number of putative hidden orthologs in a lineage and its “average” evolutionary rate. Hidden orthologs do not show unusual sequence composition biases that might account for systematic errors in sequence similarity searches. Instead, gene duplication with divergence of one paralog and weak positive selection appear to underlie hidden orthology in Platyhelminthes. By using Leapfrog, we identify key centrosome-related genes and homeodomain classes previously reported as absent in free-living flatworms, e.g., planarians. Altogether, our findings demonstrate that hidden orthologs comprise a significant proportion of the gene repertoire in flatworms, qualifying the impact of gene losses and gains in gene complement evolution. PMID:28400424

  4. The Merchant Shipping (Dangerous Goods) Rules 1978 (Statutory Instrument 1543, 25 October 1978)

    International Nuclear Information System (INIS)

    1978-01-01

    These Rules supersede the Merchant Shipping (Dangerous Goods) Rule of 1965 as amended by the Merchant Shipping (Dangerous Goods) (Amendment) Rules of 1968 and 1972. The Rules now define 'dangerous goods' by reference to goods classified as dangerous for carriage by sea as well as any other goods whose properties might be dangerous it they were carried by sea. This classification is based on that of the 1978 Report of the Standing Advisory Committee on the Carriage of Dangerous Goods of the Department of Trade, and the 1977 Edition of the International Maritime Dangerous Goods Code published by the Intergovernmental Maritime consultative Organisation. (NEA) [fr

  5. The potential predictability of fire danger provided by ECMWF forecast

    Science.gov (United States)

    Di Giuseppe, Francesca

    2017-04-01

    The European Forest Fire Information System (EFFIS), is currently being developed in the framework of the Copernicus Emergency Management Services to monitor and forecast fire danger in Europe. The system provides timely information to civil protection authorities in 38 nations across Europe and mostly concentrates on flagging regions which might be at high danger of spontaneous ignition due to persistent drought. The daily predictions of fire danger conditions are based on the US Forest Service National Fire Danger Rating System (NFDRS), the Canadian forest service Fire Weather Index Rating System (FWI) and the Australian McArthur (MARK-5) rating systems. Weather forcings are provided in real time by the European Centre for Medium range Weather Forecasts (ECMWF) forecasting system. The global system's potential predictability is assessed using re-analysis fields as weather forcings. The Global Fire Emissions Database (GFED4) provides 11 years of observed burned areas from satellite measurements and is used as a validation dataset. The fire indices implemented are good predictors to highlight dangerous conditions. High values are correlated with observed fire and low values correspond to non observed events. A more quantitative skill evaluation was performed using the Extremal Dependency Index which is a skill score specifically designed for rare events. It revealed that the three indices were more skilful on a global scale than the random forecast to detect large fires. The performance peaks in the boreal forests, in the Mediterranean, the Amazon rain-forests and southeast Asia. The skill-scores were then aggregated at country level to reveal which nations could potentiallty benefit from the system information in aid of decision making and fire control support. Overall we found that fire danger modelling based on weather forecasts, can provide reasonable predictability over large parts of the global landmass.

  6. Hidden corrosion detection in aircraft aluminum structures using laser ultrasonics and wavelet transform signal analysis.

    Science.gov (United States)

    Silva, M Z; Gouyon, R; Lepoutre, F

    2003-06-01

    Preliminary results of hidden corrosion detection in aircraft aluminum structures using a noncontact laser based ultrasonic technique are presented. A short laser pulse focused to a line spot is used as a broadband source of ultrasonic guided waves in an aluminum 2024 sample cut from an aircraft structure and prepared with artificially corroded circular areas on its back surface. The out of plane surface displacements produced by the propagating ultrasonic waves were detected with a heterodyne Mach-Zehnder interferometer. Time-frequency analysis of the signals using a continuous wavelet transform allowed the identification of the generated Lamb modes by comparison with the calculated dispersion curves. The presence of back surface corrosion was detected by noting the loss of the S(1) mode near its cutoff frequency. This method is applicable to fast scanning inspection techniques and it is particularly suited for early corrosion detection.

  7. Windows 7 Tweaks A Comprehensive Guide on Customizing, Increasing Performance, and Securing Microsoft Windows 7

    CERN Document Server

    Sinchak, Steve

    2009-01-01

    The definitive guide to unlocking the hidden potential of the Windows 7 OS. Written by bestselling author and the creator of tweaks.com Steve Sinchak, this unique guide provides you with the ultimate collection of hidden gems that will enable you to get the most out of Windows 7. Packed with more than 400 pages of insider tips, the book delves beneath the surface to reveal little-known ways to tweak, modify, and customize Windows 7 so you can get every ounce of performance from your operating system. Regardless of your experience with tweaking your system, you'll find fascinating and fun tips

  8. 2012 drug packaging review: many dangerous, reportable flaws.

    Science.gov (United States)

    2013-05-01

    Drug packaging plays an important role in protecting and providing information to patients. The packaging examined by Prescrire in 2012, on the whole, still fails to perform all of these functions effectively. Two issues are especially worrisome. First, packaging too often poses a danger to children. In addition, too many patient leaflets provide incomplete information about adverse effects, thus failing to properly protect the most vulnerable patients. Yet, the method Prescrire used to analyse drug packaging shows that it is not difficult to detect and anticipate risks. It is up to healthcare professionals to take advantage of the method, to protect patients from, and report, dangerous packaging.

  9. The chemical industry - a danger to nuclear power plants

    International Nuclear Information System (INIS)

    Voigtsberger, P.

    1976-01-01

    Nuclear power stations could contaminate large areas with radioactivity when destroyed by strong external influences. In Germany, authorities try to cope with this danger firstly by making certain demands on the strength of the reactor shell and secondly by imposing strict safety regulations on dangerous industrial plants in the surroundings of the reactor. In the case of chemical industry, this means: If a chemical plant and a nuclear reactor lie closely together, special stress is given to explosion pretection measures in the form of primary explosion protection, e.g. strong sealing of inflammable gases and liquids handled in the immediate neighbourhood of the reactor. (orig.) [de

  10. [Responsibilities of enterprises introducing new dangerous chemical substances and preparations].

    Science.gov (United States)

    Cieśla, Jacek; Majka, Jerzy

    2004-01-01

    The paper reviews the responsibilities of producers, importers and distributors set in a new Act of January 2001 on chemical substances and preparations (Off. J. 2001, No. 11, item 84, with subsequent amendments). This Act together with executive provisions is aimed at harmonizing Polish legislation with EU requirements. The Act sets conditions, restriction and bans of production placing on the market and use of chemical substances and preparations in order to protect human health and environment against their harmful effects. The Act together with a number of executive provisions render those who introduce dangerous chemicals and chemical preparations, including distributors responsible for: classification and labelling of dangerous chemical substances and preparations; possessing, making available and up-dating safety data sheets; supplying packages containing certain dangerous substances with child-proof fastenings; notifying the Inspector for Chemical Substances and Preparations about placing a dangerous preparation on the market; notifying the Inspector about a new substance and conducting required studies; being properly qualified to handle dangerous substances. The Act strictly defines the term "placing a substance or a preparation on the market"--it means making a substance or a preparation available to third parties on the territory of The Republic of Poland, territories of the Member States of the European Union or the territory of Iceland, Liechtenstein and Norway, unless the Act provides otherwise; it also means introduction of a substance or a preparation from outside of the territory referred to above on the customs territory of The Republic of Poland, or that of the member states of the European Union and other states listed above. In addition, some of the responsibilities defined by the provisions of the law on chemical substances and preparations are also applicable to handling of biocidals, which are classified as dangerous substances. The Act

  11. Ordinance on the transport of dangerous goods by road (SDR)

    International Nuclear Information System (INIS)

    1985-04-01

    This Ordinance regulates the transport of dangerous goods by road and replaces a similar Ordinance of 1972. The dangerous goods are listed in Annex A and the special provisions to be complied with for their transport are contained in Annex B. Radioactive materials, categorized as Class IVb, are included in the goods covered by the Ordinance. The Ordinance which entered into force on 1 May 1985 was amended on 9 April 1987 on a minor point and on 27 November 1989 so as to provide for special training for drivers of vehicles carrying such goods. This latter amendment entered into force on 1 January 1990. (NEA) [fr

  12. Infinite hidden conditional random fields for human behavior analysis.

    Science.gov (United States)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja

    2013-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF), which is a nonparametric model based on hierarchical Dirichlet processes and is capable of automatically learning the optimal number of hidden states for a classification task. We show how we learn the model hyperparameters with an effective Markov-chain Monte Carlo sampling technique, and we explain the process that underlines our iHCRF model with the Restaurant Franchise Rating Agencies analogy. We show that the iHCRF is able to converge to a correct number of represented hidden states, and outperforms the best finite HCRFs--chosen via cross-validation--for the difficult tasks of recognizing instances of agreement, disagreement, and pain. Moreover, the iHCRF manages to achieve this performance in significantly less total training, validation, and testing time.

  13. Dangerous quantities of radioactive material (D-values). Emergency preparedness and response. Publication date: August 2006

    International Nuclear Information System (INIS)

    2006-08-01

    Radioactive material is widely used in industry, medicine, education and agriculture. In addition, it occurs naturally. The health risk posed by these materials vary widely depending on many factors, the most important of which are the amount of the material involved and its physical and chemical form. Therefore, there is a need to identify the quantity and type of radioactive material for which emergency preparedness and other arrangements (e.g. security) are warrant due to the health risk they pose. The aim of this publication is to provide practical guidance for Member States on that quantity of radioactive material that may be considered dangerous. A dangerous quantity is that, which if uncontrolled, could be involved in a reasonable scenario resulting in the death of an exposed individual or a permanent injury, which decreases that person's quality of life. This publication is published as part of the IAEA Emergency Preparedness and Response Series. It supports several publications including: the IAEA Safety Requirements 'Preparedness and Response for a Nuclear or Radiological Emergency', IAEA Safety Standards Series No. GS-R-2. IAEA, Vienna (2002); IAEA Safety Guide 'Categorization of Radioactive Sources', IAEA Safety Standards Series No RS-G-1.9, IAEA, Vienna (2005) and IAEA Safety Guide 'Arrangements for Preparedness for a Nuclear or Radiological Emergency' IAEA Safety Standards Series No. GS-G-2.1, IAEA, Vienna (2006). The procedures and data in this publication have been prepared with due attention to accuracy. However, as part of the review process, they undergo ongoing quality assurance checks. Comments are welcome and, following a period that will allow for a more extensive review, the IAEA may revise this publication as part of the process of continuous improvement. The publication uses a number of exposure scenarios, risk models and dosimetric data, which could be used during the response to nuclear or radiological emergency or other purposes

  14. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  15. Guided labworks

    DEFF Research Database (Denmark)

    Jacobsen, Lærke Bang

    For the last 40 years physics education research has shown poor learning outcomes of guided labs. Still this is found to be a very used teaching method in the upper secodary schools. This study explains the teacher's choice of guided labs throught the concept of redesign as obstacle dislodgement...

  16. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  17. Neuroscience in forensic psychiatry: From responsibility to dangerousness. Ethical and legal implications of using neuroscience for dangerousness assessments.

    Science.gov (United States)

    Gkotsi, Georgia Martha; Gasser, Jacques

    2016-01-01

    Neuroscientific evidence is increasingly being used in criminal trials as part of psychiatric testimony. Up to now, "neurolaw" literature remained focused on the use of neuroscience for assessments of criminal responsibility. However, in the field of forensic psychiatry, responsibility assessments are progressively being weakened, whereas dangerousness and risk assessment gain increasing importance. In this paper, we argue that the introduction of neuroscientific data by forensic experts in criminal trials will be mostly be used in the future as a means to evaluate or as an indication of an offender's dangerousness, rather than their responsibility. Judges confronted with the pressure to ensure public security may tend to interpret neuroscientific knowledge and data as an objective and reliable way of evaluating one's risk of reoffending. First, we aim to show how the current socio-legal context has reshaped the task of the forensic psychiatrist, with dangerousness assessments prevailing. In the second part, we examine from a critical point of view the promise of neuroscience to serve a better criminal justice system by offering new tools for risk assessment. Then we aim to explain why neuroscientific evidence is likely to be used as evidence of dangerousness of the defendants. On a theoretical level, the current tendency in criminal policies to focus on prognostics of dangerousness seems to be "justified" by a utilitarian approach to punishment, supposedly revealed by new neuroscientific discoveries that challenge the notions of free will and responsibility. Although often promoted as progressive and humane, we believe that this approach could lead to an instrumentalization of neuroscience in the interest of public safety and give rise to interventions which could entail ethical caveats and run counter to the interests of the offenders. The last part of this paper deals with some of these issues-the danger of stigmatization for brain damaged offenders because of

  18. Gauge mediation scenario with hidden sector renormalization in MSSM

    International Nuclear Information System (INIS)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-01-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5 minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  19. Gauge mediation scenario with hidden sector renormalization in MSSM

    Science.gov (United States)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-02-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5¯ minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  20. Multivariate longitudinal data analysis with mixed effects hidden Markov models.

    Science.gov (United States)

    Raffa, Jesse D; Dubin, Joel A

    2015-09-01

    Multiple longitudinal responses are often collected as a means to capture relevant features of the true outcome of interest, which is often hidden and not directly measurable. We outline an approach which models these multivariate longitudinal responses as generated from a hidden disease process. We propose a class of models which uses a hidden Markov model with separate but correlated random effects between multiple longitudinal responses. This approach was motivated by a smoking cessation clinical trial, where a bivariate longitudinal response involving both a continuous and a binomial response was collected for each participant to monitor smoking behavior. A Bayesian method using Markov chain Monte Carlo is used. Comparison of separate univariate response models to the bivariate response models was undertaken. Our methods are demonstrated on the smoking cessation clinical trial dataset, and properties of our approach are examined through extensive simulation studies. © 2015, The International Biometric Society.

  1. Applications of hidden symmetries to black hole physics

    International Nuclear Information System (INIS)

    Frolov, Valeri

    2011-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  2. Discovering Hidden Controlling Parameters using Data Analytics and Dimensional Analysis

    Science.gov (United States)

    Del Rosario, Zachary; Lee, Minyong; Iaccarino, Gianluca

    2017-11-01

    Dimensional Analysis is a powerful tool, one which takes a priori information and produces important simplifications. However, if this a priori information - the list of relevant parameters - is missing a relevant quantity, then the conclusions from Dimensional Analysis will be incorrect. In this work, we present novel conclusions in Dimensional Analysis, which provide a means to detect this failure mode of missing or hidden parameters. These results are based on a restated form of the Buckingham Pi theorem that reveals a ridge function structure underlying all dimensionless physical laws. We leverage this structure by constructing a hypothesis test based on sufficient dimension reduction, allowing for an experimental data-driven detection of hidden parameters. Both theory and examples will be presented, using classical turbulent pipe flow as the working example. Keywords: experimental techniques, dimensional analysis, lurking variables, hidden parameters, buckingham pi, data analysis. First author supported by the NSF GRFP under Grant Number DGE-114747.

  3. Supersymmetry, p-brane duality, and hidden spacetime dimensions

    International Nuclear Information System (INIS)

    Bars, I.

    1996-01-01

    A global superalgebra with 32 supercharges and all possible central extensions is studied in order to extract some general properties of duality and hidden dimensions in a theory that treats p-branes democratically. The maximal number of dimensions is 12, with signature (10,2), containing one space and one time dimension that are hidden from the point of view of perturbative ten-dimensional string theory or its compactifications. When the theory is compactified on R d-1,1 circle-times T c+1,1 with d+c+2=12, there are isometry groups that relate to the hidden dimensions as well as to duality. Their combined intersecting classification schemes provide some properties of nonperturbative states and their couplings. copyright 1996 The American Physical Society

  4. Chemical industrial areas and their dynamic danger behaviour

    NARCIS (Netherlands)

    Reniers, Genserik L L; Audenaert, Amaryllis; Dullaert, W.; Soudan, K.

    2007-01-01

    Chemical industrial areas or so-called chemical clusters consist of various companies situated next to each other. Such areas are composed of hundreds of chemical installations exhibiting danger to a certain degree for initiating or continuing knock-on effects. In this paper, a methodology to model

  5. The Danger of Contempt in Universities and in Modern Society

    Science.gov (United States)

    Sternberg, Robert J.

    2017-01-01

    Segments of modern U.S. society are rewarding rather than punishing the expression of contempt. College campuses are increasingly becoming tolerant of expressions of contempt rather than of respect for diversity of opinions. Universities need to take an active role in teaching students the danger of contempt because of its role in the development…

  6. Radioactivity and dangerous radiation: safety and worker protection. 1. ed.

    International Nuclear Information System (INIS)

    Ahmad Termizi Ramli

    1988-01-01

    This book discussed the aspects of radiological protection for radiation workers and working place in details. It covered all aspect in this subject, from the basic information of radiations which is dangerous for whom did not know much about it, to specific recommendations and procedures in order to work safely with it

  7. Quantitative comparison of fire danger index performance using fire activity

    CSIR Research Space (South Africa)

    Steenkamp, KC

    2012-07-01

    Full Text Available parameters such as flame length or rate of spread can be physically measured or modeled. Fire danger indices are not designed to describe the characteristics of a fire but rather the potential of a fire taking place in an area of interest [5]. Several...

  8. Social Contradictions and Change in Okri's Dangerous Love ...

    African Journals Online (AJOL)

    Ben Okri is one of Africa's most experimental contemporary novelists in the Magical realist tradition through which he has carved a nitch for himself. In this paper we critically interrogate his utilization of the magic realist form in Dangerous Love to examine the theme of contradiction and love. Through a Marxist dialectic ...

  9. An investigation into the handling and storage of dangerous goods ...

    African Journals Online (AJOL)

    As Ghana develops, the Port of Tema has seen an increase in the handling of good, which are substances either due to their inherent properties or in reaction to the environment are considered dangerous and therefore when not handled properly pose significant injury or harm to people, property and the environment.

  10. The choice of locations for disposal of dangerous (radioactive) waste

    International Nuclear Information System (INIS)

    Hisschemoller, M.; Midden, C.J.H.; Stallen, P.J.; Rijksuniversiteit Leiden; Nederlandse Centrale Organisatie voor Toegepast Natuurwetenschappelijk Onderzoek, The Hague)

    1985-11-01

    In this report a managerial and psychological analysis, based on literature study and case analysis, is presented of various policy strategies which are or can be followed by governments in decisions about disposal of dangerous waste. Special attention is given to radioactive waste. (Auth.)

  11. The 1978 National Fire-Danger Rating System: technical documentation

    Science.gov (United States)

    Larry S. Bradshaw; John E. Deeming; Robert E. Burgan; Jack D. Cohen

    1984-01-01

    The National Fire-Danger Rating System (NFDRS), implemented in 1972, has been revised and reissued as the 1978 NFDRS. This report describes the full developmental history of the NFDRS, including purpose, technical foundation, and structure. Includes an extensive bibliography and appendixes.

  12. Detecting danger labels with RAM-based neural networks

    DEFF Research Database (Denmark)

    Jørgensen, T.M.; Christensen, S.S.; Andersen, A.W.

    1996-01-01

    An image processing system for the automatic location of danger labels on the back of containers is presented. The system uses RAM-based neural networks to locate and classify labels after a pre-processing step involving specially designed non-linear edge filters and RGB-to-HSV conversion. Result...

  13. Teens Share Sexually Explicit Messages: Simple Rebellion or Dangerous Behavior?

    Science.gov (United States)

    Curriculum Review, 2009

    2009-01-01

    An increasingly popular form of communication among teenagers is "sexting," sending nude photos via text messaging, reported The Orange County Register (3/20/09). This "flirtation" technique has sparked quite a bit of debate: is this simply a form of rebellion or is it dangerous behavior that could have adverse penalties? Although many teens say…

  14. Male knowledge of danger signs of obstetric complications in an ...

    African Journals Online (AJOL)

    cannot be overlooked in this regard. The aim of this study was to determine men's knowledge of danger signs in pregnancy and their role in pregnancy related decision making. Methods: A cross sectional survey was conducted among 259 men aged 15-65 years in selected communities in Ibadan, Oyo State by multistage

  15. The dangers of eating away from home: review | Wright | South ...

    African Journals Online (AJOL)

    The dangers of eating away from home: review. JP Wright. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and ...

  16. Asbestos: A Lingering Danger. AIO Red Paper #20.

    Science.gov (United States)

    Malcolm, Stuart

    Its unique qualities makes asbestos extremely useful in industry, yet it is termed one of the most dangerous and insidious substances in the work place. Composed of mostly fibers, asbestos is readily freed into the atmosphere during handling, constituting a real health risk. There are two ways asbestos can enter the human body: by inhalation or…

  17. Flood vulnerability: Impending danger in Sabon-Gari Minna, Niger ...

    African Journals Online (AJOL)

    This study examines the vulnerability of buildings to flooding and the danger posed at Sabo Gari area of Minna, Niger State. Sabon-Gari which is one of the 22 neighborhoods found in Minna is a highly populated area as people who cannot afford to stay in the low density areas (Government Reserve Area - G.R.A) move to ...

  18. Ecological model of the interprise danger of gas

    International Nuclear Information System (INIS)

    Sadygov, A.B.

    2009-01-01

    It has been looked into the basic problems for establishment of ecological model of the enterprise danger of gas. There have been established mathematical model in the base of equation of Novye-Stoks which consists of private reproductive second row differential equation system of three

  19. Evaluation of correct knowledge of key danger signs in pregnancy ...

    African Journals Online (AJOL)

    2015-06-01

    Jun 1, 2015 ... Aim: The aim was to assess correct knowledge of danger signs among pregnant ... analysis were younger age (P = 0.028), Islamic religion (P = 0.048), ethnicity (P ... they include; age, educational level, number and place of.

  20. Transport of Gamma Radiography Apparatus (Dangerous Goods 1978, no. 7)

    International Nuclear Information System (INIS)

    1978-01-01

    The Minister of Transport amended the Regulations on the Transport of Dangerous Goods of 15 April 1945 by Order dated 24 August 1978. The modifications concern the safety conditions to be complied with for the transport of portable industrial gamma radiography apparatus containing sealed radioactive sources. (NEA) [fr

  1. 30 CFR 77.511 - Danger signs at electrical installations.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Danger signs at electrical installations. 77.511 Section 77.511 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR COAL MINE SAFETY AND HEALTH MANDATORY SAFETY STANDARDS, SURFACE COAL MINES AND SURFACE WORK AREAS OF...

  2. Mothers' recognition of newborn danger signs and health seeking ...

    African Journals Online (AJOL)

    The mothers were asked to identify danger signs of neonatal illness from a list of symptoms, to indicate which of the listed symptoms their babies experienced, to state what actions were taken in ... Unconsciousness and excessive crying were thought to be caused by evil spirits and consultations sought with faith healers.

  3. The Neglected Heart: The Emotional Dangers of Premature Sexual Involvement.

    Science.gov (United States)

    Lickona, Thomas

    1994-01-01

    Discussions of teen sex usually focus on the dangers of pregnancy and disease but ignore the emotional hazards and destructive psychological consequences of temporary sexual relationships. Teenagers absorbed in a sexual relationship may turn inward at a time then they should be reaching out to others. (SLD)

  4. Dangers of social networking sites- the propagation of malware

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2013-07-01

    Full Text Available The paper will illustrate the dangers of social networking malware through examples. In addition, the paper will discuss propagation techniques used in social networking malware. The aim of the paper is to create user awareness to minimise the risk...

  5. Danger-signaler og inflammasomer ved autoinflammatoriske og autoimmune sygdomme

    DEFF Research Database (Denmark)

    Bendtzen, Klaus

    2011-01-01

    Cytoplasmic inflammasomes are formed through activation of pattern recognition receptors (PRR) of the innate immune system. Endogenous and exogenous danger signals, e.g. DNA- and RNA-fragments, urate- and cholesterol crystals, silica and asbestos, ß-amyloid, UV-light and skin irritants, may induce...

  6. On the transportation of dangerous materials | Obi | Nigerian Journal ...

    African Journals Online (AJOL)

    ... storage and transportation in compliance with the respective and relevant regulatory bodies. This paper highlights the design criteria and testing of packages for the transportation of various categories of dangerous goods with special reference to the nuclear and petrochemical industries. Nigerian Journal of Physics Vol.

  7. Constructing mental illness as dangerous: a pilot study.

    Science.gov (United States)

    Wilson, C; Nairn, R; Coverdale, J; Panapa, A

    1999-04-01

    There is a dearth of studies examining how dangerousness is constructed in media depictions of mentally ill individuals who are frequently portrayed as acting violently. The aim of the present study was to identify the contribution of diverse technical, semiotic and discursive resources utilised in portraying a character with a mental illness in a prime-time drama as dangerous. Discourse analytic techniques, involving systematic, repeated, critical viewings, were applied to a single program drawn from a sample of prime-time television drama episodes touching on mental illness. Nine devices (appearance, music and sound effects, lighting, language, intercutting, jump-cutting, point of view shots, horror conventions and intertextuality) were identified as contributing to the signified dangerousness of person receiving care in the community for a mental illness. These techniques combine in signifying mental illness and a person suffering from it as dangerous. The findings suggest that mental health professionals working to reduce the stigma of mental illness need to have a reasonably sophisticated understanding of the practices and priorities of television production if they are to collaborate effectively with producers to create dramas that convey more human and sympathetic understandings of mental illness or to combat the negative effects of such portrayals.

  8. Analysing the hidden curriculum: use of a cultural web.

    Science.gov (United States)

    Mossop, Liz; Dennick, Reg; Hammond, Richard; Robbé, Iain

    2013-02-01

    Major influences on learning about medical professionalism come from the hidden curriculum. These influences can contribute positively or negatively towards the professional enculturation of clinical students. The fact that there is no validated method for identifying the components of the hidden curriculum poses problems for educators considering professionalism. The aim of this study was to analyse whether a cultural web, adapted from a business context, might assist in the identification of elements of the hidden curriculum at a UK veterinary school. A qualitative approach was used. Seven focus groups consisting of three staff groups and four student groups were organised. Questioning was framed using the cultural web, which is a model used by business owners to assess their environment and consider how it affects their employees and customers. The focus group discussions were recorded, transcribed and analysed thematically using a combination of a priori and emergent themes. The cultural web identified elements of the hidden curriculum for both students and staff. These included: core assumptions; routines; rituals; control systems; organisational factors; power structures, and symbols. Discussions occurred about how and where these issues may affect students' professional identity development. The cultural web framework functioned well to help participants identify elements of the hidden curriculum. These aspects aligned broadly with previously described factors such as role models and institutional slang. The influence of these issues on a student's development of a professional identity requires discussion amongst faculty staff, and could be used to develop learning opportunities for students. The framework is promising for the analysis of the hidden curriculum and could be developed as an instrument for implementation in other clinical teaching environments. © Blackwell Publishing Ltd 2013.

  9. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  10. When Dieting Becomes Dangerous: A Guide to Understanding and Treating Anorexia and Bulimia.

    Science.gov (United States)

    Michel, Deborah Marcontell; Willard, Susan G.

    This book about anorexia and bulimia is written for patients and the people who care about them. It describes the symptoms and warning signs of eating disorders, explains their presumed causes and complexities, and suggests effective treatments. The book emphasizes the critical role of psychotherapy and family therapy in recovery, explains how…

  11. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  12. Low-intensity interference effects and hidden-variable theories

    Energy Technology Data Exchange (ETDEWEB)

    Buonomano, V [Universidade Estadual de Campinas (Brazil). Inst. de Matematica

    1978-05-11

    The double-slit interference experiment and other similar experiments in the low-intensity limit (that is, one photon in the apparatus at a time) are examined in the spirit of Bell's work from the point of view of hidden-variable theories. It is found that there exists a class of hidden-variable theories which disagrees with quantum mechanics for a certain type of interference experiment. A manufactured conceptualization of this class, which is a particle view of interference, is described. An experiment, which appears to be feasible, is proposed to examine this disagreement.

  13. Application of Hidden Markov Models in Biomolecular Simulations.

    Science.gov (United States)

    Shukla, Saurabh; Shamsi, Zahra; Moffett, Alexander S; Selvam, Balaji; Shukla, Diwakar

    2017-01-01

    Hidden Markov models (HMMs) provide a framework to analyze large trajectories of biomolecular simulation datasets. HMMs decompose the conformational space of a biological molecule into finite number of states that interconvert among each other with certain rates. HMMs simplify long timescale trajectories for human comprehension, and allow comparison of simulations with experimental data. In this chapter, we provide an overview of building HMMs for analyzing bimolecular simulation datasets. We demonstrate the procedure for building a Hidden Markov model for Met-enkephalin peptide simulation dataset and compare the timescales of the process.

  14. Enhanced axion-photon coupling in GUT with hidden photon

    Science.gov (United States)

    Daido, Ryuji; Takahashi, Fuminobu; Yokozaki, Norimi

    2018-05-01

    We show that the axion coupling to photons can be enhanced in simple models with a single Peccei-Quinn field, if the gauge coupling unification is realized by a large kinetic mixing χ = O (0.1) between hypercharge and unbroken hidden U(1)H. The key observation is that the U(1)H gauge coupling should be rather strong to induce such large kinetic mixing, leading to enhanced contributions of hidden matter fields to the electromagnetic anomaly. We find that the axion-photon coupling is enhanced by about a factor of 10-100 with respect to the GUT-axion models with E / N = 8 / 3.

  15. Hidden Neural Networks: A Framework for HMM/NN Hybrids

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric; Krogh, Anders Stærmose

    1997-01-01

    This paper presents a general framework for hybrids of hidden Markov models (HMM) and neural networks (NN). In the new framework called hidden neural networks (HNN) the usual HMM probability parameters are replaced by neural network outputs. To ensure a probabilistic interpretation the HNN is nor...... HMMs on TIMIT continuous speech recognition benchmarks. On the task of recognizing five broad phoneme classes an accuracy of 84% is obtained compared to 76% for a standard HMM. Additionally, we report a preliminary result of 69% accuracy on the TIMIT 39 phoneme task...

  16. Search for hidden Higgs decay in ATLAS detector

    International Nuclear Information System (INIS)

    Gabrielli, A.

    2013-01-01

    In this paper, a brief overview of the search for the Higgs boson in Hidden Valley models is given. Hidden Valley models predict Higgs decays to neutral particles, which can be also long lived with decay paths comparable to the LHC detectors dimensions. Decay final states consist of collimated leptons (Lepton Jets). Results are presented of a search for Higgs decays to long lived particles in the ATLAS detector at the LHC, based on 1.92 fb −1 data collected during 2011 at a 7TeV center-of-mass energy.

  17. Detecting Faults By Use Of Hidden Markov Models

    Science.gov (United States)

    Smyth, Padhraic J.

    1995-01-01

    Frequency of false alarms reduced. Faults in complicated dynamic system (e.g., antenna-aiming system, telecommunication network, or human heart) detected automatically by method of automated, continuous monitoring. Obtains time-series data by sampling multiple sensor outputs at discrete intervals of t and processes data via algorithm determining whether system in normal or faulty state. Algorithm implements, among other things, hidden first-order temporal Markov model of states of system. Mathematical model of dynamics of system not needed. Present method is "prior" method mentioned in "Improved Hidden-Markov-Model Method of Detecting Faults" (NPO-18982).

  18. From the solar system fo hidden cosmic structures

    Energy Technology Data Exchange (ETDEWEB)

    Benes, K

    1987-01-01

    The development of experimental astrophysics showed that in the evolution of planets, natural processes of a common nature take place. They include, e.g., radiogenic heat, the production of magmas, volcanic activity, degassing, etc. The solar system is a cosmic formation in an advanced stage of development and it is a realistic assumption that in the Galaxy other hidden planetary systems in various stages of development exist. The views on the possibility of the origination of life in other systems differ; life, however, is seen as a hidden property of cosmic matter. (M.D.).

  19. HBR guides

    CERN Document Server

    Duarte, Nancy; Dillon, Karen

    2015-01-01

    Master your most pressing professional challenges with this seven-volume set that collects the smartest best practices from leading experts all in one place. "HBR Guide to Better Business Writing" and "HBR Guide to Persuasive Presentations" help you perfect your communication skills; "HBR Guide to Managing Up and Across" and "HBR Guide to Office Politics" show you how to build the best professional relationships; "HBR Guide to Finance Basics for Managers" is the one book you'll ever need to teach you about the numbers; "HBR Guide to Project Management" addresses tough questions such as how to manage stakeholder expectations and how to manage uncertainty in a complex project; and "HBR Guide to Getting the Right Work Done" goes beyond basic productivity tips to teach you how to prioritize and focus on your work. This specially priced set of the most popular books in the series makes a perfect gift for aspiring leaders looking for trusted advice. Arm yourself with the advice you need to succeed on the job, from ...

  20. IMPROVING METHODOLOGY OF RISK IDENTIFICATION OF OCCUPATIONAL DANGEROUS

    Directory of Open Access Journals (Sweden)

    A. P. BOCHKOVSKYI

    2018-04-01

    Full Text Available In the paper, according to the analysis of statistical data, correlation between the amount of occupational injuries and occupationaldiseases in Ukraine within last 5 years is defined. Also, using methodology of the International Labor Organizationcorrelcation between the amount of accident fatalities and general number of accidents in Ukraine and EU countries (Austria, GreatBritain, Germany, Denmark, Norway, Poland, Hungry, Finland, France is defined. It is shown that in spite of the positive dynamicsof decreasing amount of occupational injuries, the number of occupational diseases in Ukraine always increases. The comparativeanalysis of the ratio of the number of accident fatalities to the total number of registered accidents showed that, on average, Ukraineexceeds the EU countries by this indicator by 100 times.It is noted, that such negative indicators (in particular, increasing amount of occupational diseases, may occure because ofimperfect methodology for identifying the risks of professional dangerous.Also, it is ascertained that basing on the existed methodology, the identefication process of occupational dangerous isquite subjective, which reduces objectivity of conducting quantitative assessment. In order to eliminate defined drawnbacks it is firsttime proposed to use corresponding integral criterion to conduct the process of quantitative risk assessmentTo solve this problem authors formulate and propose an algorithm of improving methodology of a process of analysing dangerousand harmful production effects (DHPE which are the mainest reasons of occupational dangerous.The proposed algorithm includes implementation of four following successive steps: DHPE identification, indication of theirmaximum allowed threshold of concentrations (levels, identification of the sources of identified DHPE, esimation of consequencesof manifestation.The improved proposed methodology allows indentify risks of occurrence occupational dangerous in systems

  1. Hidden Pair of Supermassive Black Holes

    Science.gov (United States)

    Kohler, Susanna

    2015-08-01

    Could a pair of supermassive black holes (SMBHs) be lurking at the center of the galaxy Mrk 231? A recent study finds that this may be the case and the unique spectrum of this galaxy could be the key to discovering more hidden binary SMBH systems.Where Are the Binary Supermassive Black Holes?Its believed that most, if not all, galaxies have an SMBH at their centers. As two galaxies merge, the two SMBHs should evolve into a closely-bound binary system before they eventually merge. Given the abundance of galaxy mergers, we would expect to see the kinematic and visual signatures of these binary SMBHs among observed active galactic nuclei yet such evidence for sub-parsec binary SMBH systems remains scarce and ambiguous. This has led researchers to wonder: is there another way that we might detect these elusive systems?A collaboration led by Chang-Shuo Yan (National Astronomical Observatories, Chinese Academy of Sciences) thinks that there is. The group suggests that these systems might have distinct signatures in their optical-to-UV spectra, and they identify a system that might be just such a candidate: Mrk 231.A Binary CandidateProposed model of Mrk 231. Two supermassive black holes, each with their own mini-disk, orbit each other in the center of a circumbinary disk. The secondary black hole has cleared gap in the circumbinary disk as a result of its orbit around the primary black hole. [Yan et al. 2015]Mrk 231 is a galaxy with a disturbed morphology and tidal tails strong clues that it might be in the final stages of a galactic merger. In addition to these signs, Mrk 231 also has an unusual spectrum for a quasar: its continuum emission displays an unexpected drop in the near-UV band.Yan and her collaborators propose that the odd behavior of Mrk 231s spectrum can be explained if the center of the galaxy houses a pair of SMBHs each with its own mini accretion disk surrounded by a circumbinary accretion disk. As the secondary SMBH orbits the primary SMBH (with a

  2. The dangers of irradiate uranium in nuclear reactors; Les dangers de l'uranium irradie dans les reacteurs nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    Jammet, H; Joffre, H [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1955-07-01

    The danger of the uranium cans sur-activated by the use in the nuclear reactors is triple: - Irradiation from afar, during manipulations of the cans. - Contamination of air when decladding. - Contamination of air by fire of uranium in a reactor in function The first two dangers are usual and can be treated thanks to the rules of security in use in the atomic industry. The third has an accidental character and claimed for the use of special and exceptional rules, overflowing the industrial setting, to reach the surrounding populations. (authors) [French] Le danger des cartouches d'uranium suractive par utilisation dans les reacteurs nucleaires est triple: - Irradiation a distance, lors des manipulations des cartouches. - Contamination de l'air au moment de leur degainage. - Contamination de l'air par incendie d'uranium dans un reacteur en fonctionnement. Les deux premiers dangers sont habituels et peuvent etre traites grace aux regles de securite en usage dans l'industrie atomique. Le troisieme revet un caractere accidentel et reclame l'emploi de regles speciales et exceptionnelles, debordant le cadre industriel, pour atteindre celui des populations environnantes. (auteurs)

  3. Medication Guide

    Science.gov (United States)

    ... Size Small Text Medium Text Large Text Contrast Dark on Light Light on Dark Donate Search Menu Donate What is Glaucoma? Care ... Low Vision Resources Medication Guide Resources on the Web » See All Articles Where the Money Goes Have ...

  4. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  5. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    International Nuclear Information System (INIS)

    Itoh, H.; Okada, N.; Yamashita, T.

    2007-01-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden. (author)

  6. On the hidden maxwell superalgebra underlying D = 4 supergravity

    Energy Technology Data Exchange (ETDEWEB)

    Penafiel, D.M. [Departamento de Fisica, Universidad de Concepcion (Chile); DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy); Ravera, L. [DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy)

    2017-09-15

    In this work, we expand the hidden AdS-Lorentz superalgebra underlying D = 4 supergravity, reaching a (hidden) Maxwell superalgebra. The latter can be viewed as an extension involving cosmological constant of the superalgebra underlying D = 4 supergravity in flat spacetime. We write the Maurer-Cartan equations in this context and we find some interesting extensions of the antisymmetric 3-form A{sup (3)} appearing in the Free Differential Algebra in Minkowski space. The structure of Free Differential Algebras is obtained by considering the zero curvature equations. We write the parametrization of A{sup (3)} in terms of 1-forms and we rend the topological features of its extensions manifest. We interestingly find out that the structure of these extensions, and consequently the structure of the corresponding boundary contribution dA{sup (3)}, strongly depends on the form of the extra fermionic generator appearing in the hidden Maxwell superalgebra. The model we develop in this work is defined in an enlarged superspace with respect to the ordinary one, and the extra bosonic and fermionic 1-forms required for the closure of the hidden Maxwell superalgebra must be considered as physical fields in this enlarged superspace. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  7. Generalized inequalities for quantum correlations with hidden variables

    International Nuclear Information System (INIS)

    Vinduska, M.

    1991-01-01

    Renowned inequalities for quantum correlations are generalized for the case when quantum system cannot be described with an absolute independent measure of the probability. Such a formulation appears to be suitable for the formulation of the hidden variables theory in terms of non-Euclidean geometry. 10 refs

  8. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated

  9. Measurement problem and local hidden variables with entangled photons

    Directory of Open Access Journals (Sweden)

    Muchowski Eugen

    2017-12-01

    Full Text Available It is shown that there is no remote action with polarization measurements of photons in singlet state. A model is presented introducing a hidden parameter which determines the polarizer output. This model is able to explain the polarization measurement results with entangled photons. It is not ruled out by Bell’s Theorem.

  10. The incompatibility between local hidden variable theories and the ...

    Indian Academy of Sciences (India)

    I discuss in detail the result that the Bell's inequalities derived in the context of local hidden variable theories for discrete quantized observables can be satisfied only if a fundamental conservation law is violated on the average. This result shows that such theories are physically nonviable, and makes the demarcating criteria ...

  11. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  12. Hidden symmetries of the Principal Chiral Model unveiled

    International Nuclear Information System (INIS)

    Devchand, C.; Schiff, J.

    1996-12-01

    By relating the two-dimensional U(N) Principal Chiral Model to a Simple linear system we obtain a free-field parametrization of solutions. Obvious symmetry transformations on the free-field data give symmetries of the model. In this way all known 'hidden symmetries' and Baecklund transformations, as well as a host of new symmetries, arise. (author). 21 refs

  13. A hidden bias in a common calorimeter calibration scheme

    International Nuclear Information System (INIS)

    Lincoln, Don; Morrow, Greg; Kasper, Peter

    1994-01-01

    In this paper, a common calorimeter calibration scheme is explored and a hidden bias found. Since this bias mimics a non-linearity in response in the calorimeter, it must be understood and removed from the calibration before true non-linearities are investigated. The effect and its removal are explored and understood through straightforward calculus and algebra. ((orig.))

  14. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a

  15. Crisis Entrepreneurs and Hidden Crises : Illustrative Examples of Interactional

    NARCIS (Netherlands)

    Prof. Cees van Woerkum; dr. Annette Klarenbeek

    2012-01-01

    We examine the ways in which a hidden crisis can be exposed from a communication point of view. In which way can organisations create general awareness of a crisis and try to understand the dynamic nature of interactions? With the help of discourse analysis, we have examined the interactional

  16. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...... functions are also discussed....

  17. Duality and hidden symmetries in interacting particle systems

    NARCIS (Netherlands)

    Giardinà, C.; Kurchan, J.; Redig, F.H.J.; Vafayi, K.

    2009-01-01

    In the context of Markov processes, both in discrete and continuous setting, we show a general relation between duality functions and symmetries of the generator. If the generator can be written in the form of a Hamiltonian of a quantum spin system, then the "hidden" symmetries are easily derived.

  18. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving ...

  19. Is There Hidden Potential for Rural Population Growth in Sweden?

    Science.gov (United States)

    Niedomysl, Thomas; Amcoff, Jan

    2011-01-01

    Rural depopulation is a concern in many countries, and various policy initiatives have been taken to combat such trends. This article examines whether hidden potential for rural population growth can be found in Sweden. If such potential exists, it implies that the development prospects for many rural areas are not as unpromising as they may seem…

  20. Optimisation of Hidden Markov Model using Baum–Welch algorithm

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 126; Issue 1. Optimisation of Hidden Markov Model using Baum–Welch algorithm for prediction of maximum and minimum temperature over Indian Himalaya. J C Joshi Tankeshwar Kumar Sunita Srivastava Divya Sachdeva. Volume 126 Issue 1 February 2017 ...

  1. Hidden Markov Model for quantitative prediction of snowfall

    Indian Academy of Sciences (India)

    A Hidden Markov Model (HMM) has been developed for prediction of quantitative snowfall in Pir-Panjal and Great Himalayan mountain ranges of Indian Himalaya. The model predicts snowfall for two days in advance using daily recorded nine meteorological variables of past 20 winters from 1992–2012. There are six ...

  2. Light hidden-sector U(1)s in string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, Mark; Ringwald, Andreas

    2010-02-15

    We review the case for light U(1) gauge bosons in the hidden-sector of heterotic and type II string compactifications, present estimates of the size of their kinetic mixing with the visible-sector hypercharge U(1), and discuss their possibly very interesting phenomenological consequences in particle physics and cosmology. (orig.)

  3. Book Review: "Hidden Markov Models for Time Series: An ...

    African Journals Online (AJOL)

    Hidden Markov Models for Time Series: An Introduction using R. by Walter Zucchini and Iain L. MacDonald. Chapman & Hall (CRC Press), 2009. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.4314/saaj.v10i1.61717 · AJOL African Journals Online.

  4. TeraHertz imaging of hidden paint layers on canvas

    NARCIS (Netherlands)

    Adam, A.J.L.; Planken, P.C.M.; Meloni, S.; Dik, J.

    2009-01-01

    We show terahertz reflection images of hidden paint layers in a painting on canvas and compare the results with X-ray Radiography and Infrared Reflectography. Our terahertz measurements show strong reflections from both the canvas/paint interface and from the raw umber/lead white interface,

  5. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  6. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  7. Hidden and generalized conformal symmetry of Kerr–Sen spacetimes

    International Nuclear Information System (INIS)

    Ghezelbash, A M; Siahaan, H M

    2013-01-01

    It is recently conjectured that generic non-extremal Kerr black hole could be holographically dual to a hidden conformal field theory (CFT) in two dimensions. Moreover, it is known that there are two CFT duals (pictures) to describe the charged rotating black holes which correspond to angular momentum J and electric charge Q of the black hole. Furthermore these two pictures can be incorporated by the CFT duals (general picture) that are generated by SL(2,Z) modular group. The general conformal structure can be revealed by looking at charged scalar wave equation in some appropriate values of frequency and charge. In this regard, we consider the wave equation of a charged massless scalar field in the background of Kerr–Sen black hole and show that in the ‘near region’, the wave equation can be reproduced by the Casimir operator of a local SL(2,R) L ×SL(2,R) R hidden conformal symmetry. We find the exact agreement between macroscopic and microscopic physical quantities like entropy and absorption cross section of scalars for Kerr–Sen black hole. We then find an extension of vector fields that in turn yields an extended local family of SL(2,R) L ×SL(2,R) R hidden conformal symmetry, parameterized by one parameter. For some special values of the parameter, we find a copy of SL(2,R) hidden conformal algebra for the charged Gibbons–Maeda–Garfinkle–Horowitz–Strominger black hole in the strong deflection limit. (paper)

  8. Light hidden-sector U(1)s in string compactifications

    International Nuclear Information System (INIS)

    Goodsell, Mark; Ringwald, Andreas

    2010-02-01

    We review the case for light U(1) gauge bosons in the hidden-sector of heterotic and type II string compactifications, present estimates of the size of their kinetic mixing with the visible-sector hypercharge U(1), and discuss their possibly very interesting phenomenological consequences in particle physics and cosmology. (orig.)

  9. Securing Localization With Hidden and Mobile Base Stations

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Srivastava, Mani; Cagalj, Mario

    2006-01-01

    localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure nodecentric...

  10. Optimal Number of States in Hidden Markov Models and its ...

    African Journals Online (AJOL)

    In this paper, Hidden Markov Model is applied to model human movements as to facilitate an automatic detection of the same. A number of activities were simulated with the help of two persons. The four movements considered are walking, sitting down-getting up, fall while walking and fall while standing. The data is ...

  11. Book review: Troubling possibility, hidden fires and secret drawers ...

    African Journals Online (AJOL)

    Book review: Troubling possibility, hidden fires and secret drawers: Tiyambe Zeleza's smouldering charcoal. H.F. Ross. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL.

  12. Charm and Hidden Charm Scalar Resonances in Nuclear Matter

    NARCIS (Netherlands)

    Tolos, Laura; Molina, Raquel; Gamermann, Daniel; Oset, Eulogio

    2009-01-01

    We study the properties of the scalar charm resonances D(s0)(2317) and D(0)(2400), and the theoretical hidden charm state X(3700) in nuclear matter. We find that for the D(s0)(2317) and X(3700) resonances, with negligible and small width at zero density, respectively, the width becomes about 100 MeV

  13. Hidden Markov model for improved ultrasound-based presence detection

    NARCIS (Netherlands)

    Jaramillo Garcia, P.A.; Linnartz, J.P.M.G.

    2015-01-01

    Adaptive lighting systems typically use a presence detector to save energy by switching off lights in unoccupied rooms. However, it is highly annoying when lights are erroneously turned off while a user is present (false negative, FN). This paper focuses on the estimation of presence, using a Hidden

  14. Job Clubs: Getting into the Hidden Labor Market.

    Science.gov (United States)

    Kimeldorf, Martin; Tornow, Janice A.

    1984-01-01

    A job club approach for secondary disabled youth focuses on mastering job seeking skills by behaviorally sequenced steps learned in situational experiences within a self-help group process framework. Students learn to penetrate the hidden job market, to use social networking via the telephone, and to participate successfully in job interviews. (CL)

  15. Unpacking the Hidden Efficacies of Learning in Productive Failure

    Science.gov (United States)

    Hung, David; Chen, Victor; Lim, Seo Hong

    2009-01-01

    This paper describes a framework for learning where learners undergo experimentations with the phenomena at hand according to progressive and staged goals. Bowling is used as a case study in this paper. The premise for experimentations is that learners can experience hidden efficacies, including the formation of "bad habits." A distinction is made…

  16. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  17. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  18. Improving Support for America's Hidden Heroes

    Science.gov (United States)

    Terri, Tanielian; Kathryn E., Bouskill; Rajeev, Ramchand; Esther M., Friedman; Thomas E., Trail; Angela, Clague

    2018-01-01

    Abstract The United States is home to more than 21 million veterans, many of whom deployed to support combat operations around the globe during their military service and sustained service-related conditions or disabilities. Supporting these wounded, ill, and injured warriors once home are millions of informal caregivers—individuals who provide unpaid support with activities that enable the service member or veteran to live in a noninstitutionalized setting. In this study, researchers describe elements of a research blueprint to inform future efforts to improve support for military and veteran caregivers. To construct this blueprint, researchers inventoried currently available research on caregiving for disabled adults and children and gathered stakeholder input by conducting a survey and facilitating an online panel. The study highlights the need for more studies that examine how military and veteran caregiver needs evolve over time, how programs are working, and how caregiving affects specific subgroups. The resulting blueprint should serve as a guide for the caregiver support community to use in prioritizing and facilitating future research. PMID:29416949

  19. Baryon states with hidden charm in the extended local hidden gauge approach

    International Nuclear Information System (INIS)

    Uchino, T.; Oset, E.; Liang, Wei-Hong

    2016-01-01

    The s-wave interaction of anti DΛ c , anti DΣ c , anti D * Λ c , anti D * Σ c and anti DΣ c * , anti D * Σ c * , is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ c - anti D * Σ c with J = 1/2, and two of anti DΣ c * - anti D * Σ c * with J = 3/2. Moreover, we find a anti D * Σ c resonance which couples to the anti DΛ c channel and one spin degenerated bound state of anti D * Σ c * with J = 1/2,5/2. (orig.)

  20. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  1. Are dangerous offenders different from other offenders? A clinical profile.

    Science.gov (United States)

    Langevin, Ron; Curnoe, Suzanne

    2014-07-01

    The Canadian dangerous offender (DO) statute requires the assistance of psychiatrists and psychologists in evaluating offenders' potential danger and risk of future offenses, without substantive supporting empirical clinical research on the topic. The present study compared 62 men facing Canadian DO applications to 2,414 non-DO sexual and violent offenders (ACs) and 62 non-DO offenders matched on offense type (MCs). DOs differed significantly from ACs on 30 of 45 variables and from MCs only on 6. More DOs than MCs had an extensive criminal history, were psychopaths, and had more school truancy. Compared with ACs, DOs had less education and more school adjustment problems, more disturbed childhoods, and more often were diagnosed with sadism, psychopathy, and substance abuse problems. Total sexual and violent offense convictions provided the best but weak distinction of DOs from ACs. The "three strikes" law is noted and early intervention in DOs' criminal careers is discussed. © The Author(s) 2013.

  2. Hanford facility dangerous waste permit application, general information portion

    International Nuclear Information System (INIS)

    Hays, C.B.

    1998-01-01

    The Hanford Facility Dangerous Waste Permit Application is considered to be a single application organized into a General Information Portion (document number DOE/RL-91-28) and a Unit-Specific Portion. Both the General Information and Unit-Specific portions of the Hanford Facility Dangerous Waste Permit Application address the content of the Part B permit application guidance prepared by the Washington State Department of Ecology (Ecology 1996) and the U.S. Environmental Protection Agency (40 Code of Federal Regulations 270), with additional information needed by the Hazardous and Solid Waste Amendments and revisions of Washington Administrative Code 173-303. Documentation contained in the General Information Portion is broader in nature and could be used by multiple treatment, storage, and/or disposal units (e.g., the glossary provided in this report)

  3. 2727-S Nonradioactive Dangerous Waste Storage Facility Closure Plan

    International Nuclear Information System (INIS)

    Wilczek, T.A.; Laws, J.R.; Izatt, R.D.

    1992-01-01

    This closure plan describes the activities for final closure of the 2727-S Nonradioactive Dangerous Waste Storage (NRDWS) Facility at the Hanford Site. The 2727-S NRDWS Facility provided container storage for nonradioactive dangerous and extremely hazardous wastes generated in the research and development laboratories, process operations, and maintenance and transportation functions throughout the Hanford Site. Storage operations began at the 2727-S NRDWS Facility March 14, 1983, and continued until December 30, 1986, when the last shipment of materials from the facility took place. These storage operations have been moved to the new 616 NRDWS Facility, which is an interim status unit located between the 200 East and 200 West Areas of the Hanford Site

  4. The choking game and YouTube: a dangerous combination.

    Science.gov (United States)

    Linkletter, Martha; Gordon, Kevin; Dooley, Joe

    2010-03-01

    To study postings of partial asphyxiation by adolescents on YouTube and to increase awareness of this dangerous activity as well as the value of YouTube as a research tool. Videos were searched on YouTube using many terms for recreational partial asphyxiation. Data were gathered on the participants and on the occurrence of hypoxic seizure. Sixty-five videos of the asphyxiation game were identified. Most (90%) participants were male. A variety of techniques were used. Hypoxic seizures were witnessed in 55% of videos, but occurred in 88% of videos that employed the "sleeper hold" technique. The videos were collectively viewed 173550 times on YouTube. YouTube has enabled millions of young people to watch videos of the "choking game" and other dangerous activities. Seeing videos may normalize the behavior among adolescents. Increased awareness of this activity may prevent some youths from participating and potentially harming themselves or others.

  5. Nuclear smuggling in Europe real dangers and enigmatic deceptions

    International Nuclear Information System (INIS)

    Schaper, A.

    1998-01-01

    During the last years, alarming news has accumulated on smuggled nuclear material, migrating experts, stolen bombs and new miracle substances that render obsolete all nonproliferation efforts. Together with a look at the economic difficulties, sinking living standards, and rising unemployment in the CIS countries, a pessimistic impression evolves of how to control the huge Russian nuclear complex and how to stem further proliferation of nuclear weapons. This paper tries to assess the dangers of nuclear smuggling and to discuss some possibilities for remedies

  6. Hanford facility dangerous waste permit application, 242-A evaporator

    International Nuclear Information System (INIS)

    Engelmann, R.H.

    1997-01-01

    The Hanford Facility Dangerous Waste Permit Application is considered to be a single application organized into a General Information Portion (document number DOE/RL-91-28) and a Unit-Specific Portion. The scope of the Unit-Specific Portion is limited to Part B permit application documentation submitted for individual, 'operating' treatment, storage, and/or disposal units, such as the 242-A Evaporator (this document, DOE/RL-90-42)

  7. Visual simulation study of equipment maintenance in dangerous environment

    International Nuclear Information System (INIS)

    Zhu Bo; Yang Yanhua; Li Shiting

    2010-01-01

    The maintenance characteristics in dangerous environments are analyzed, and the application characteristics of visualized maintenance technology are introduced. The interactive method to implement maintenance simulation is presented using EON simulation platform. Then an interacted Virtual Maintenance Training System (VMTS) is further developed, and the composition and function are described in details. The VMTS can be used in extensive array of application scopes, and it is well compatible to the hardware of virtual reality. (author)

  8. FEATURES FOR TRANSPORT AND AIR MECHANICAL SYSTEMS OF DANGEROUS GOODS

    Directory of Open Access Journals (Sweden)

    Eugen Dumitru BUSA

    2012-05-01

    Full Text Available Transport of dangerous goods are regulated activities, they take place under the direction and control of the authorities and specialized bodies in an institutional framework determined by national and international law. Of economic, transport infrastructure is the crucial element without which both production and trade would become meaningless, it is an essential element of a civilization, is also a necessary accessory of other economic activities.

  9. CIVIL ACTION SETTLEMENT IN CRIMINAL PROCEEDINGS THE DANGER RELATED CRIMES

    Directory of Open Access Journals (Sweden)

    Andrei-Viorel IUGAN

    2017-05-01

    Full Text Available Article 1357 para. (1 Civil Code stipulates that “one that causes harm to another by an unlawful act committed with guilt is obliged to repair it”. In this study, we propose to analyze whether and to what extent, a danger related crime can generate a prejudice, and if for committing such a crime, civil action may be exercised in criminal proceedings.

  10. A Protection plan of wildlife in a danger of extinction

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sang Don; Park, Yong Ha; Suh, Jung Soo [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    This report collected data on the present situation of mammals, birds, amphibians, reptiles, fishes, insects, invertebrates, and 43 kinds of plants, which is in a danger of extinction, and their habitat, by the article 2 of 1998 Natural Environmental Conservation Act, as a part of 'Establishment of Biological diversity strategy'. This will utilize as a basic data for protection management to establish the recovery plan for each species. 358 refs., 43 figs., 3 tabs.

  11. River Protection Project (RPP) Dangerous Waste Training Plan

    International Nuclear Information System (INIS)

    POHTO, R.E.

    2000-01-01

    This supporting document contains the training plan for dangerous waste management at River Protection Project TSD Units. This document outlines the dangerous waste training program developed and implemented for all Treatment, Storage, and Disposal (TSD) Units operated by River Protection Project (RPP) in the Hanford 200 East, 200 West and 600 Areas and the <90 Day Accumulation Area at 209E. Operating TSD Units managed by RPP are: the Double-Shell Tank (DST) System, 204-AR Waste Unloading Facility, Grout, and the Single-Shell Tank (SST) System. The program is designed in compliance with the requirements of Washington Administrative Code (WAC) 173-303-330 and Title 40 Code of Federal Regulations (CFR) 265.16 for the development of a written dangerous waste training program and the Hanford Facility Permit. Training requirements were determined by an assessment of employee duties and responsibilities. The RPP training program is designed to prepare employees to operate and maintain the Tank Farms in a safe, effective, efficient, and environmentally sound manner. In addition to preparing employees to operate and maintain the Tank Farms under normal conditions, the training program ensures that employees are prepared to respond in a prompt and effective manner should abnormal or emergency conditions occur. Emergency response training is consistent with emergency responses outlined in the following Building Emergency Plans: HNF-IP-0263-TF and HNF-=IP-0263-209E

  12. River Protection Project (RPP) Dangerous Waste Training Plan

    Energy Technology Data Exchange (ETDEWEB)

    POHTO, R.E.

    2000-03-09

    This supporting document contains the training plan for dangerous waste management at River Protection Project TSD Units. This document outlines the dangerous waste training program developed and implemented for all Treatment, Storage, and Disposal (TSD) Units operated by River Protection Project (RPP) in the Hanford 200 East, 200 West and 600 Areas and the <90 Day Accumulation Area at 209E. Operating TSD Units managed by RPP are: the Double-Shell Tank (DST) System, 204-AR Waste Unloading Facility, Grout, and the Single-Shell Tank (SST) System. The program is designed in compliance with the requirements of Washington Administrative Code (WAC) 173-303-330 and Title 40 Code of Federal Regulations (CFR) 265.16 for the development of a written dangerous waste training program and the Hanford Facility Permit. Training requirements were determined by an assessment of employee duties and responsibilities. The RPP training program is designed to prepare employees to operate and maintain the Tank Farms in a safe, effective, efficient, and environmentally sound manner. In addition to preparing employees to operate and maintain the Tank Farms under normal conditions, the training program ensures that employees are prepared to respond in a prompt and effective manner should abnormal or emergency conditions occur. Emergency response training is consistent with emergency responses outlined in the following Building Emergency Plans: HNF-IP-0263-TF and HNF-=IP-0263-209E.

  13. Hanford Facility Annual Dangerous Waste Report Calendar Year 2002

    International Nuclear Information System (INIS)

    FR-EEMAN, D.A.

    2003-01-01

    Hanford CY 2002 dangerous waste generation and management forms. The Hanford Facility Annual Dangerous Waste Report (ADWR) is prepared to meet the requirements of Washington Administrative Code Sections 173-303-220, Generator Reporting, and 173-303-390, Facility Reporting. In addition, the ADWR is required to meet Hanford Facility RCRA Permit Condition I.E.22, Annual Reporting. The ADWR provides summary information on dangerous waste generation and management activities for the Calendar Year for the Hanford Facility EPA ID number assigned to the Department of Energy for RCRA regulated waste, as well as Washington State only designated waste and radioactive mixed waste. The Solid Waste Information and Tracking System (SWITS) database is utilized to collect and compile the large array of data needed for preparation of this report. Information includes details of waste generated on the Hanford Facility, waste generated offsite and sent to Hanford for management, and other waste management activities conducted at Hanford, including treatment, storage, and disposal. Report details consist of waste descriptions and weights, waste codes and designations, and waste handling codes. In addition, for waste shipped to Hanford for treatment and/or disposal, information on manifest numbers, the waste transporter, the waste receiving facility, and the original waste generators are included. In addition to paper copies, electronic copies of the report are also transmitted to the regulatory agency

  14. Danger defence and risk provision in nuclear law

    International Nuclear Information System (INIS)

    Breuer, R.

    1978-01-01

    Starting from the atomic-law term of danger, which is defined as a product of likeliness and volume of damage, the author comments upon the decisive and, as to date, unsolved question of which degree of likeliness a possible course of events must have in order to be taken into consideration as a danger that must be averted. In doing this, it is stressed that the most important point is to find a rationally practicable standard of likeliness or unlikeliness. This standard is then developed from the deterministical point of view. It corresponds with the postulate that effective precautions must be taken against all known causes for incidents and accidents. A standard of practical ratio results from this: damage does not have to be taken into consideration any longer if, due to the precautions taken and the knowledge level of the leading scientists and technicians, if it is not likely to occur. In addition to this preventive protection from danger, paragraph 7, Sec.2 No.3 Atomic Energy Act stipulates another risk under the reservation of precaution, however the technical possibility of realization and the relativity of expenditure and benefit. With regard to these criteria, the author gives his opinion on the judgements of the administrative courts in Wuerzburg and Freiburg which, starting from the same principles, have different points of view on the question of the so-called rupture safety in nuclear power plants. (UN) [de

  15. Kidney sales and the analogy with dangerous employment.

    Science.gov (United States)

    Malmqvist, Erik

    2015-06-01

    Proponents of permitting living kidney sales often argue as follows. Many jobs involve significant risks; people are and should be free to take these risks in exchange for money; the risks involved in giving up a kidney are no greater than the risks involved in acceptable hazardous jobs; so people should be free to give up a kidney for money, too. This paper examines this frequently invoked but rarely analysed analogy. Two objections are raised. First, it is far from clear that kidney sales and dangerous jobs involve comparable risks on an appropriately broad comparison. Second, and more importantly, even if they do involve comparable risks it does not follow that kidney sales must be permitted because dangerous jobs are. The analogy assumes that kidney sales are banned for paternalistic reasons. But there may be other, non-paternalistic reasons for the ban. And paternalists, too, can consistently defend the ban even if kidney sales are no riskier than occupations that they find acceptable. Soft paternalists may want to protect would-be vendors from harms that they have not voluntarily chosen. Egalitarian hard paternalists may want to protect already badly off vendors from further worsening their situation. For neither species of paternalist is the size of the risk prevented decisive. I conclude that the analogy with dangerous jobs, while rhetorically powerful, pulls little real argumentative weight. Future debates on living kidney sales should therefore proceed without it.

  16. Dangerous Climate Velocities from Geoengineering Termination: Potential Biodiversity Impacts

    Science.gov (United States)

    Trisos, C.; Gurevitch, J.; Zambri, B.; Xia, L.; Amatulli, G.; Robock, A.

    2016-12-01

    Geoengineering has been suggested as a potential societal response to the impacts of ongoing global warming. If ongoing mitigation and adaptation measures do not prevent the most dangerous consequences of climate change, it is important to study whether solar radiation management would make the world less dangerous. While impacts of albedo modification on temperature, precipitation, and agriculture have been studied before, here for the first time we investigate its potential ecological impacts. We estimate the speeds marine and terrestrial ecosystems will need to move to remain in their current climate conditions (i.e., climate velocities) in response to the implementation and subsequent termination of geoengineering. We take advantage of climate model simulations conducted using the G4 scenario of the Geoengineering Model Intercomparison Project, in which increased radiative forcing from the RCP4.5 scenario is balanced by a stratospheric aerosol cloud produced by an injection of 5 Tg of SO2 per year into the lower stratosphere for 50 years, and then stopped. The termination of geoengineering is projected to produce a very rapid warming of the climate, resulting in climate velocities much faster than those that will be produced from anthropogenic global warming. Should ongoing geoengineering be terminated abruptly due to society losing the means or will to continue, the resulting ecological impacts, as measured by climate velocities, could be severe for many terrestrial and marine biodiversity hotspots. Thus, the implementation of solar geoengineering represents a potential danger not just to humans, but also to biodiversity globally.

  17. Double-shell tank system dangerous waste permit application

    International Nuclear Information System (INIS)

    1991-06-01

    This Double-Shell Tank System Dangerous Waste Permit Application should be read in conjunction with the 242-A Evaporator Dangerous Waste Permit Application and the Liquid Effluent Retention Facility Dangerous Waste Permit Application, also submitted on June 28, 1991. Information contained in the Double-Shell Tank System permit application is referenced in the other two permit applications. The Double-Shell Tank System stores and treats mixed waste received from a variety of sources on the Hanford Site. The 242-A Evaporator treats liquid mixed waste received from the double-shell tanks. The 242-A Evaporator returns a mixed-waste slurry to the double-shell tanks and generates the dilute mixed-waste stream stored in the Liquid Effluent Retention Facility. This report contains information on the following topics: Facility Description and General Provisions; Waste Characteristics; Process Information; Groundwater Monitoring; Procedures to Prevent Hazards; Contingency Plan; Personnel Training; Exposure Information Report; Waste Minimization Plan; Closure and Postclosure Requirements; Reporting and Recordkeeping; other Relevant Laws; and Certification. 150 refs., 141 figs., 118 tabs

  18. Hidden photons in beam dump experiments and in connection with dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-12-15

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  19. Hidden photons in beam dump experiments and in connection with dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah

    2012-12-01

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  20. Guide device

    International Nuclear Information System (INIS)

    Brammer, C.M. Jr.

    1977-01-01

    Disclosed is a fuel handling guide tube centering device for use in nuclear reactors during fuel assembly handling operations. The device comprises an outer ring secured to the flange of a nuclear reactor pressure vessel, a rotatable table rotatably coupled to the outer ring, and a plurality of openings through the table. Truncated locating cones are positioned in each of the openings in the table, and the locating cones center the guide tube during fuel handling operations. The openings in the table are located such that each fuel assembly in the nuclear core may be aligned with one of the openings by a suitable rotation of the table. The locating cones thereby provide alignment between the fuel handling mechanism located in the guide tube and the individual fuel assemblies of the cone. The need for a device to provide alignment is especially critical for floating nuclear power plants, where wave motion may exist during fuel handling operations. 5 claims, 4 figures

  1. Dissecting a hidden gene duplication: the Arabidopsis thaliana SEC10 locus.

    Directory of Open Access Journals (Sweden)

    Nemanja Vukašinović

    Full Text Available Repetitive sequences present a challenge for genome sequence assembly, and highly similar segmental duplications may disappear from assembled genome sequences. Having found a surprising lack of observable phenotypic deviations and non-Mendelian segregation in Arabidopsis thaliana mutants in SEC10, a gene encoding a core subunit of the exocyst tethering complex, we examined whether this could be explained by a hidden gene duplication. Re-sequencing and manual assembly of the Arabidopsis thaliana SEC10 (At5g12370 locus revealed that this locus, comprising a single gene in the reference genome assembly, indeed contains two paralogous genes in tandem, SEC10a and SEC10b, and that a sequence segment of 7 kb in length is missing from the reference genome sequence. Differences between the two paralogs are concentrated in non-coding regions, while the predicted protein sequences exhibit 99% identity, differing only by substitution of five amino acid residues and an indel of four residues. Both SEC10 genes are expressed, although varying transcript levels suggest differential regulation. Homozygous T-DNA insertion mutants in either paralog exhibit a wild-type phenotype, consistent with proposed extensive functional redundancy of the two genes. By these observations we demonstrate that recently duplicated genes may remain hidden even in well-characterized genomes, such as that of A. thaliana. Moreover, we show that the use of the existing A. thaliana reference genome sequence as a guide for sequence assembly of new Arabidopsis accessions or related species has at least in some cases led to error propagation.

  2. FIRES: Fire Information Retrieval and Evaluation System - A program for fire danger rating analysis

    Science.gov (United States)

    Patricia L. Andrews; Larry S. Bradshaw

    1997-01-01

    A computer program, FIRES: Fire Information Retrieval and Evaluation System, provides methods for evaluating the performance of fire danger rating indexes. The relationship between fire danger indexes and historical fire occurrence and size is examined through logistic regression and percentiles. Historical seasonal trends of fire danger and fire occurrence can be...

  3. DMPD: Macrophage activation by endogenous danger signals. [Dynamic Macrophage Pathway CSML Database

    Lifescience Database Archive (English)

    Full Text Available 18161744 Macrophage activation by endogenous danger signals. Zhang X, Mosser DM. J ...Pathol. 2008 Jan;214(2):161-78. (.png) (.svg) (.html) (.csml) Show Macrophage activation by endogenous dange...r signals. PubmedID 18161744 Title Macrophage activation by endogenous danger signals. Authors Zhang X, Moss

  4. 77 FR 17569 - United States-Canada Regulatory Cooperation Council (RCC)-Transportation-Dangerous Goods Working...

    Science.gov (United States)

    2012-03-26

    ... identified in the Joint Action Plan, the Transportation--Dangerous Goods Working Group led by senior...)-- Transportation--Dangerous Goods Working Group AGENCY: Pipeline and Hazardous Materials Safety Administration...--Dangerous Goods Working Group, of the United States-Canada Regulatory Cooperation Council (RCC). Comments...

  5. Ontario hydro radioactive material transportation field guide

    International Nuclear Information System (INIS)

    Howe, W.

    1987-01-01

    The recent introduction of both the AECB Transport Packaging of Radioactive Material Regulations and Transport Canada's Transportation of Dangerous Goods Regulations have significantly altered the requirements for transporting radioactive material in Canada. Extensive additional training as well as certification of several hundred Ontario Hydro employees has been necessary to ensure compliance with the additional and revised regulatory requirements. To assist in the training of personnel, an 'active' corporate Ontario Hydro Field Guide for Radioactive Material Transport document has been developed and published. The contents of this Field Guide identify current Ontario Hydro equipment and procedures as well as the updated relevant regulatory requirements within Canada. In addition, to satisfying Ontario Hydro requirements for this type of information over two thousand of these Field Guides have been provided to key emergency response personnel throughout the province of Ontario to assist in their transportation accident response training

  6. An impossibility theorem for parameter independent hidden variable theories

    Science.gov (United States)

    Leegwater, Gijs

    2016-05-01

    Recently, Roger Colbeck and Renato Renner (C&R) have claimed that '[n]o extension of quantum theory can have improved predictive power' (Colbeck & Renner, 2011, 2012b). If correct, this is a spectacular impossibility theorem for hidden variable theories, which is more general than the theorems of Bell (1964) and Leggett (2003). Also, C&R have used their claim in attempt to prove that a system's quantum-mechanical wave function is in a one-to-one correspondence with its 'ontic' state (Colbeck & Renner, 2012a). C&R's claim essentially means that in any hidden variable theory that is compatible with quantum-mechanical predictions, probabilities of measurement outcomes are independent of these hidden variables. This makes such variables otiose. On closer inspection, however, the generality and validity of the claim can be contested. First, it is based on an assumption called 'Freedom of Choice'. As the name suggests, this assumption involves the independence of an experimenter's choice of measurement settings. But in the way C&R define this assumption, a no-signalling condition is surreptitiously presupposed, making the assumption less innocent than it sounds. When using this definition, any hidden variable theory violating parameter independence, such as Bohmian Mechanics, is immediately shown to be incompatible with quantum-mechanical predictions. Also, the argument of C&R is hard to follow and their mathematical derivation contains several gaps, some of which cannot be closed in the way they suggest. We shall show that these gaps can be filled. The issue with the 'Freedom of Choice' assumption can be circumvented by explicitly assuming parameter independence. This makes the result less general, but better founded. We then obtain an impossibility theorem for hidden variable theories satisfying parameter independence only. As stated above, such hidden variable theories are impossible in the sense that any supplemental variables have no bearing on outcome probabilities

  7. Transport and handling of dangerous goods. Training of persons in charge of vehicles or vessels carrying dangerous goods by road or by inland waterways (Dangerous Goods 1979 No.1)

    International Nuclear Information System (INIS)

    1979-01-01

    This Order supplements the Regulations of 15 April 1945 on the transport of dangerous goods by rail, land and inland waterways. It deals with the training of persons in charge of vehicles or boats carrying dangerous goods by road or by inland waterways. It refers in particular to transport of radioactive materials. (NEA) [fr

  8. Homebuyer's Guide.

    Science.gov (United States)

    Sindt, Roger P.; Harris, Jack

    Designed to assist prospective buyers in making such important decisions as whether to buy a new or older home and within what price range, the guide provides information on the purchase process. Discussion of the purchase process covers the life-cycle costs (recurring homeownership costs that must be met every month); selection of a home;…

  9. Heavy superpartners with less tuning from hidden sector renormalisation

    International Nuclear Information System (INIS)

    Hardy, Edward

    2014-01-01

    In supersymmetric extensions of the Standard Model, superpartner masses consistent with collider bounds typically introduce significant tuning of the electroweak scale. We show that hidden sector renormalisation can greatly reduce such a tuning if the supersymmetry breaking, or mediating, sector runs through a region of strong coupling not far from the weak scale. In the simplest models, only the tuning due to the gaugino masses is improved, and a weak scale gluino mass in the region of 5 TeV may be obtained with an associated tuning of only one part in ten. In models with more complex couplings between the visible and hidden sectors, the tuning with respect to sfermions can also be reduced. We give an example of a model, with low scale gauge mediation and superpartner masses allowed by current LHC bounds, that has an overall tuning of one part in twenty

  10. Hidden order and disorder effects in URu2Si2

    Science.gov (United States)

    Bernal, O. O.; Moroz, M. E.; Ishida, K.; Murakawa, H.; Reyes, A. P.; Kuhns, P. L.; MacLaughlin, D. E.; Mydosh, J. A.; Gortenmulder, T. J.

    2006-05-01

    NMR experiments at ambient pressure in URu 2Si 2 demonstrate a linewidth enhancement effect below the hidden order transition temperature T0. We present single-crystal 29Si NMR parameters for various temperatures and for an applied magnetic field perpendicular to the crystal c-axis. By comparing oriented-powder and single-crystal data, we observe that the size of the linewidth enhancement below T0 correlates with the size of the high- T broadening. We measure a 29Si up-field line shift below T0 which indicates the presence of an internal-field average for the entire crystal. This shift also correlates with the high-temperature width. The 101Ru NQR frequency as a function of temperature was also measured. No strong effect on the NQR frequency is observed at T0. Both NMR and NQR measurements suggest a connection between linewidth/disorder effects and the transition to hidden order.

  11. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De......_different are integrated. We experimentally validate our approach on the biologically motivated problem of global pairwise alignment.......A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference...

  12. Hidden Valley Higgs Decays in the ATLAS detector

    CERN Document Server

    Ciapetti, G

    2009-01-01

    A number of extensions of the Standard Model result in particles that are neutral, weakly-coupled and have macroscopic decay lengths that can be comparable with LHC detector dimensions. These particles represent, from an experimental point of view, a challenge both for the trigger and for the reconstruction capabilities of the ATLAS apparatus. For the purpose of exploring the challenges to the trigger posed by long-lived particles, the Hidden Valley scenario serves as an excellent setting. In this note we present the results of a first study of ATLAS detector performance for some Hidden Valley processes with long-lived, neutral states that decay throughout the detector volume to multi heavy-flavor jets, mainly b-bbar.

  13. HMMEditor: a visual editing tool for profile hidden Markov model

    Directory of Open Access Journals (Sweden)

    Cheng Jianlin

    2008-03-01

    Full Text Available Abstract Background Profile Hidden Markov Model (HMM is a powerful statistical model to represent a family of DNA, RNA, and protein sequences. Profile HMM has been widely used in bioinformatics research such as sequence alignment, gene structure prediction, motif identification, protein structure prediction, and biological database search. However, few comprehensive, visual editing tools for profile HMM are publicly available. Results We develop a visual editor for profile Hidden Markov Models (HMMEditor. HMMEditor can visualize the profile HMM architecture, transition probabilities, and emission probabilities. Moreover, it provides functions to edit and save HMM and parameters. Furthermore, HMMEditor allows users to align a sequence against the profile HMM and to visualize the corresponding Viterbi path. Conclusion HMMEditor provides a set of unique functions to visualize and edit a profile HMM. It is a useful tool for biological sequence analysis and modeling. Both HMMEditor software and web service are freely available.

  14. Hidden magnetism in periodically modulated one dimensional dipolar fermions

    Science.gov (United States)

    Fazzini, S.; Montorsi, A.; Roncaglia, M.; Barbiero, L.

    2017-12-01

    The experimental realization of time-dependent ultracold lattice systems has paved the way towards the implementation of new Hubbard-like Hamiltonians. We show that in a one-dimensional two-components lattice dipolar Fermi gas the competition between long range repulsion and correlated hopping induced by periodically modulated on-site interaction allows for the formation of hidden magnetic phases, with degenerate protected edge modes. The magnetism, characterized solely by string-like nonlocal order parameters, manifests in the charge and/or in the spin degrees of freedom. Such behavior is enlighten by employing Luttinger liquid theory and numerical methods. The range of parameters for which hidden magnetism is present can be reached by means of the currently available experimental setups and probes.

  15. What are the Hidden Quantum Processes Behind Newton's Laws?

    OpenAIRE

    Ostoma, Tom; Trushyk, Mike

    1999-01-01

    We investigate the hidden quantum processes that are responsible for Newton's laws of motion and Newton's universal law of gravity. We apply Electro-Magnetic Quantum Gravity or EMQG to investigate Newtonian classical physics. EQMG is a quantum gravity theory that is manifestly compatible with Cellular Automata (CA) theory, a new paradigm for physical reality. EMQG is also based on a theory of inertia proposed by R. Haisch, A. Rueda, and H. Puthoff, which we modified and called Quantum Inertia...

  16. Uncovering Hidden Mathematics of the Multiplication Table Using Spreadsheets

    Directory of Open Access Journals (Sweden)

    Sergei Abramovich

    2007-05-01

    Full Text Available This paper reveals a number of learning activities emerging from a spreadsheetgenerated multiplication table. These activities are made possible by using such features of the software as conditional formatting, circular referencing, calculation through iteration, scroll bars, and graphing. The paper is a reflection on a mathematics content course designed for prospective elementary teachers using the hidden mathematics curriculum framework. It is written in support of standards for teaching and recommendations for teachers in North America.

  17. Sterile neutrino, hidden dark matter and their cosmological signatures

    International Nuclear Information System (INIS)

    Das, Subinoy

    2012-01-01

    Though thermal dark matter has been the central idea behind the dark matter candidates, it is highly possible that dark matter of the universe is non-thermal in origin or it might be in thermal contact with some hidden or dark sector but not with standard model. Here we explore the cosmological bounds as well as the signatures on two types of non-thermal dark matter candidates. First we discuss a hidden dark matter with almost no interaction (or very feeble) with standard model particles so that it is not in thermal contact with visible sector but we assume it is thermalized with in a hidden sector due to some interaction. While encompassing the standard cold WIMP scenario, we do not require the freeze-out process to be non-relativistic. Rather, freeze-out may also occur when dark matter particles are semi-relativistic or relativistic. Especially we focus on the warm dark matter scenario in this set up and find the constraints on the warm dark matter mass, cross-section and hidden to visible sector temperature ratio which accounts for the observed dark-matter density, satisfies the Tremaine-Gunn bound on dark-matter phase space density and has a free-streaming length consistent with cosmological constraints on the matter power spectrum. Our method can also be applied to keV sterile neutrino dark matter which is not thermalized with standard model but is thermalized with in a dark sector. The second part of this proceeding focuses on an exotic dark matter candidate which arises from the existence of eV mass sterile neutrino through a late phase transition. Due to existence of a strong scalar force the light sterile states get trapped into stable degenerate micro nuggets. We find that its signature in matter power spectra is close to a warm dark matter candidate.

  18. Pendidikan Anti Korupsi melalui Hidden Curriculum dan Pendidikan Moral

    Directory of Open Access Journals (Sweden)

    Dewi Salistina

    2015-11-01

    Full Text Available This article is intended to elaborate strategies in incorporating anti corruption awareness through hidden curriculum and morality education. It is of necessity to increase such kind of awareness among students so that they can avoid any action related to corruption. In this case, some practices such as good behavior, discipline, and good relationship among students-teachers are fostered in the daily activities at school. The effect is the increase of students’ honesty, responsibility, and solidarity across level of education.

  19. Hidden Markov models: the best models for forager movements?

    Science.gov (United States)

    Joo, Rocio; Bertrand, Sophie; Tam, Jorge; Fablet, Ronan

    2013-01-01

    One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs). We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs). They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour), while their behavioural modes (fishing, searching and cruising) were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines) for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%), significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  20. Einstein-Bohr controversy and theory of hidden variables

    Czech Academy of Sciences Publication Activity Database

    Lokajíček, Miloš V.

    2010-01-01

    Roč. 8, č. 4 (2010), s. 638-645 ISSN 1303-5150 R&D Projects: GA MŠk LA08015 Institutional research plan: CEZ:AV0Z10100502 Keywords : Schroedinger equation * EPR paradox * hidden variables Subject RIV: BF - Elementary Particles and High Energy Physics Impact factor: 0.697, year: 2010 http://arxiv.org/abs/1004.3005

  1. MOBILE APP FOR HIDDEN DATA ANALYTICS OF ONLINE MARKETPLACE SYSTEMS

    OpenAIRE

    Aqle, Aboubakr

    2016-01-01

    In this project, an extensive analysis and evaluation of the existing e-marketplaces is performed. The aim of this analysis is to improve the experience of end-users through an Android application that is capable of summarizing multiple heterogeneous hidden data sources and unify received responses to one single, structured and homogenous source. The proposed Android application is based on the multi-level conceptual analysis and modeling strategy. In which, the data is analyzed in a way ...

  2. About hidden influence of predictor variables: Suppressor and mediator variables

    Directory of Open Access Journals (Sweden)

    Milovanović Boško

    2013-01-01

    Full Text Available In this paper procedure for researching hidden influence of predictor variables in regression models and depicting suppressor variables and mediator variables is shown. It is also shown that detection of suppressor variables and mediator variables could provide refined information about the research problem. As an example for applying this procedure, relation between Atlantic atmospheric centers and air temperature and precipitation amount in Serbia is chosen. [Projekat Ministarstva nauke Republike Srbije, br. 47007

  3. Hidden Markov models: the best models for forager movements?

    Directory of Open Access Journals (Sweden)

    Rocio Joo

    Full Text Available One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs. We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs. They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour, while their behavioural modes (fishing, searching and cruising were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%, significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  4. Hidden mission of the psyche in abuse and addiction.

    Science.gov (United States)

    Gostecnik, Christian; Repic, Tanja; Cvetek, Mateja; Cvetek, Robert

    2010-09-01

    Traumatic experiences can become the central mental content in our psychic structure and can deeply mark all our later perceptions and experiences of our surroundings. We can claim something similar also for addictions of all kinds. In this article, we will demonstrate that recurring traumatic experiences and abuse as well as addiction represent a hidden mission of psyche for resolution and a great cry of longing for salvation.

  5. A preon model with hidden electric and magnetic type charges

    International Nuclear Information System (INIS)

    Pati, J.C.; Strathdee, J.

    1980-11-01

    The U(1) x U(1) binding forces in an earlier preonic composite model of quarks and leptons are interpreted as arising from hidden electric and magnetic type charges. The preons may possess intrinsic spin zero; the half-integer spins of the composites being contributed by the force field. The quark-lepton gauge symmetry is interpreted as an effective low-energy symmetry arising at the composite level. Some remarks are made regarding the possible composite nature of the graviton. (author)

  6. [Insight and psychiatric dangerousness: A review of the literature].

    Science.gov (United States)

    Bonnet, S; Lacambre, M; Schandrin, A; Capdevielle, D; Courtet, P

    2017-04-01

    Violence committed by individuals with severe mental illness has become an increasing focus of concern among clinicians, policy makers, and the general public, often as the result of tragic events. Research has shown in the past two decades an increased risk of violence among patients with mental disorder. Nevertheless, of those suffering from mental illness, perpetrators of other directed violence form a minority subgroup. The means by which there is this association between mental illness and violence has remained controversial. Factors such as positive psychotic symptoms, medication non-adherence, alcohol or psychoactive substance abuse and antisocial personality were found to be predictive of violence. Overall, literature provides support to the assertion that violent behavior of mentally ill patients is a heterogeneous phenomenon that is driven by multiple inter-related and independent factors. Furthermore, psychiatrists are often asked to predict an individual's future dangerousness, in a medical or a legal context. In the process of risk assessment of dangerousness, more focus has been placed on dynamic risk factor. In this context, lack of insight has established itself both as a part of violence risk models and as a clinical item in structured approaches to measure dangerousness. However, few studies have tested these associations. The main purpose of this paper is to review the literature concerning the relationship between insight and dangerousness and discuss the contributions of the insight in the assessment of dangerousness in patients with mental illness. We included twenty studies that evaluated the association between insight and variable such as physical or verbal violence, aggressiveness, hostility or sexual aggression. According to the findings of this review, the strength and specific nature of this relationship remain unclear due to considerable methodological and conceptual shortcomings, including heterogeneity in the definition and

  7. Modeling human behaviors and reactions under dangerous environment.

    Science.gov (United States)

    Kang, J; Wright, D K; Qin, S F; Zhao, Y

    2005-01-01

    This paper describes the framework of a real-time simulation system to model human behavior and reactions in dangerous environments. The system utilizes the latest 3D computer animation techniques, combined with artificial intelligence, robotics and psychology, to model human behavior, reactions and decision making under expected/unexpected dangers in real-time in virtual environments. The development of the system includes: classification on the conscious/subconscious behaviors and reactions of different people; capturing different motion postures by the Eagle Digital System; establishing 3D character animation models; establishing 3D models for the scene; planning the scenario and the contents; and programming within Virtools Dev. Programming within Virtools Dev is subdivided into modeling dangerous events, modeling character's perceptions, modeling character's decision making, modeling character's movements, modeling character's interaction with environment and setting up the virtual cameras. The real-time simulation of human reactions in hazardous environments is invaluable in military defense, fire escape, rescue operation planning, traffic safety studies, and safety planning in chemical factories, the design of buildings, airplanes, ships and trains. Currently, human motion modeling can be realized through established technology, whereas to integrate perception and intelligence into virtual human's motion is still a huge undertaking. The challenges here are the synchronization of motion and intelligence, the accurate modeling of human's vision, smell, touch and hearing, the diversity and effects of emotion and personality in decision making. There are three types of software platforms which could be employed to realize the motion and intelligence within one system, and their advantages and disadvantages are discussed.

  8. Reducing the nuclear dangers from the former Soviet Union

    International Nuclear Information System (INIS)

    Carter, A.B.

    1992-01-01

    The disintegration of the former Soviet Union, a nation armed with over 27,000 nuclear weapons, poses a new form of nuclear danger. First, there is the risk that as political authority devolves to the former Soviet republics, the nuclear arsenal could similarly by parcelled out, in ways that will not be conducive to nuclear stability or to safe custody. Second, there is a danger of seizure, theft, sale, or use of nuclear weapons or components during the period of transition, particularly if the nuclear weapon operating and custodial system - apparently still intact at present - disintegrates. Third, there is a danger that any weakening of control over weapons, fissionable materials, sensitive components, or know-how could result in transfers outside the territory of the new Commonwealth of Independent States, fueling nuclear proliferation worldwide. To deal with these risks, there are a number of steps that should be taken now. These recommendations are primarily addressed to the US government, working in concert with the authorities in the Commonwealth states and the world commmunity. In order of urgency, they are: encouraging and assisting prompt securing, disabling, removing to Russia, and dismantlement of the weapons covered by the Bush-Gorbachev reciprocal proposals of last fall, and by other nuclear arms accords; extending the Bush-Gorbachev proposals to strategic nuclear weapons; assuring safety and security of Soviet nuclear weapons during a difficult transitional period; addressing proliferation outside the Commonwealth; exposing the new political structures of the Commonwealth to prevailing conceptions of international stability and security; and adjusting US nuclear relationships and military policy to the new nuclear realities in the former Soviet Union

  9. Exploring inequality violations by classical hidden variables numerically

    International Nuclear Information System (INIS)

    Vongehr, Sascha

    2013-01-01

    There are increasingly suggestions for computer simulations of quantum statistics which try to violate Bell type inequalities via classical, common cause correlations. The Clauser–Horne–Shimony–Holt (CHSH) inequality is very robust. However, we argue that with the Einstein–Podolsky–Rosen setup, the CHSH is inferior to the Bell inequality, although and because the latter must assume anti-correlation of entangled photon singlet states. We simulate how often quantum behavior violates both inequalities, depending on the number of photons. Violating Bell 99% of the time is argued to be an ideal benchmark. We present hidden variables that violate the Bell and CHSH inequalities with 50% probability, and ones which violate Bell 85% of the time when missing 13% anti-correlation. We discuss how to present the quantum correlations to a wide audience and conclude that, when defending against claims of hidden classicality, one should demand numerical simulations and insist on anti-correlation and the full amount of Bell violation. -- Highlights: •The widely assumed superiority of the CHSH fails in the EPR problem. •We simulate Bell type inequalities behavior depending on the number of photons. •The core of Bell’s theorem in the EPR setup is introduced in a simple way understandable to a wide audience. •We present hidden variables that violate both inequalities with 50% probability. •Algorithms have been supplied in form of Mathematica programs

  10. In Brief: Hidden environment and health costs of energy

    Science.gov (United States)

    Showstack, Randy

    2009-10-01

    The hidden costs of energy production and use in the United States amounted to an estimated $120 billion in 2005, according to a 19 October report by the U.S. National Research Council. The report, “Hidden Costs of Energy: Unpriced Consequences of Energy Production and Use,” examines hidden costs, including the cost of air pollution damage to human health, which are not reflected in market prices of energy sources, electricity, or gasoline. The report found that in 2005, the total annual external damages from sulfur dioxide, nitrogen oxides, and particulate matter created by coal-burning power plants that produced 95% of the nation's coal-generated electricity were about $62 billion, with nonclimate damages averaging about 3.2 cents for every kilowatt-hour of energy produced. It is estimated that by 2030, nonclimate damages will fall to 1.7 cents per kilowatt-hour. The 2030 figure assumes that new policies already slated for implementation are put in place.

  11. Quasiparticle scattering image in hidden order phases and chiral superconductors

    Energy Technology Data Exchange (ETDEWEB)

    Thalmeier, Peter [Max Planck Institute for Chemical Physics of Solids, 01187 Dresden (Germany); Akbari, Alireza, E-mail: alireza@apctp.org [Asia Pacific Center for Theoretical Physics, Pohang, Gyeongbuk 790-784 (Korea, Republic of); Department of Physics, and Max Planck POSTECH Center for Complex Phase Materials, POSTECH, Pohang 790-784 (Korea, Republic of)

    2016-02-15

    The technique of Bogoliubov quasiparticle interference (QPI) has been successfully used to investigate the symmetry of unconventional superconducting gaps, also in heavy fermion compounds. It was demonstrated that QPI can distinguish between the d-wave singlet candidates in CeCoIn{sub 5}. In URu{sub 2}Si{sub 2} presumably a chiral d-wave singlet superconducting (SC) state exists inside a multipolar hidden order (HO) phase. We show that hidden order leaves an imprint on the symmetry of QPI pattern that may be used to determine the essential question whether HO in URu{sub 2}Si{sub 2} breaks the in-plane rotational symmetry or not. We also demonstrate that the chiral d-wave SC gap leads to a crossover to a quasi-2D QPI spectrum below T{sub c} which sharpens the HO features. Furthermore we investigate the QPI image of chiral p-wave multigap superconductor Sr{sub 2}RuO{sub 4}. - Highlights: • The chiral multigap structure of Sr{sub 2}RuO{sub 4} leads to rotation of QPI spectrum with bias voltage. • 5f band reconstruction in hidden order phase of URu{sub 2}Si{sub 2} is obtained from two orbital model. • The chiral superconductivity in URu{sub 2}Si{sub 2} leads to quasi-2D quasiparticle interference (QPI).

  12. Mass spectra of hidden-charm molecular pentaquarks states

    International Nuclear Information System (INIS)

    Patel, Smruti; Vinodkumar, P.C.

    2016-01-01

    Very recently, the LHCb Collaboration has reported two hidden-charmed resonances P_c(4380) and P_c(4450) consistent with pentaquark states in the Λ_b"0 → K"-J/Ψp process with masses (widths) (4380 ±8 ± 29) MeV ((205 ±18 ± 86) MeV) and (4449.8 ±1.7 ± 2.5) MeV ((39 ±5 ±19) MeV), respectively. The observation of the P_c states has aroused the theorist's strong interest in the hidden-charm pentaquark states. They have been studied in various frameworks, such as the molecule-like pentaquark states, the diquark-diquark-antiquark type pentaquark states, the diquark-triquark type pentaquark states, re-scattering effects, etc. An identification of pentaquark states as exotic hadron has been one of the long standing problems in the physics of strong interaction and quantum chromodynamics (QCD). A decade ago lots of discussion were made about pentaquarks states but due to lack of further experimental evidences the study of pentaquarks have been almost gone in the darkness. But, recent remarkable observation of two resonances i.e. P_c(4380) and P_c(4450) with hidden charm and the minimal quark content cc-baruud provided new impact for studies of pentaquark states and opens a new window to study the exotic hadronic matter

  13. Searching for confining hidden valleys at LHCb, ATLAS, and CMS

    Science.gov (United States)

    Pierce, Aaron; Shakya, Bibhushan; Tsai, Yuhsin; Zhao, Yue

    2018-05-01

    We explore strategies for probing hidden valley scenarios exhibiting confinement. Such scenarios lead to a moderate multiplicity of light hidden hadrons for generic showering and hadronization similar to QCD. Their decays are typically soft and displaced, making them challenging to probe with traditional LHC searches. We show that the low trigger requirements and excellent track and vertex reconstruction at LHCb provide a favorable environment to search for such signals. We propose novel search strategies in both muonic and hadronic channels. We also study existing ATLAS and CMS searches and compare them with our proposals at LHCb. We find that the reach at LHCb is generically better in the parameter space we consider here, even with optimistic background estimations for ATLAS and CMS searches. We discuss potential modifications at ATLAS and CMS that might make these experiments competitive with the LHCb reach. Our proposed searches can be applied to general hidden valley models as well as exotic Higgs boson decays, such as in twin Higgs models.

  14. The selection and implementation of hidden line algorithms

    International Nuclear Information System (INIS)

    Schneider, A.

    1983-06-01

    One of the most challenging problems in the field of computer graphics is the elimination of hidden lines in images of nontransparent bodies. In the real world the nontransparent material hinders the light ray coming from hidden regions to the observer. In the computer based image formation process there is no automatic visibility regulation of this kind. So many lines are created which result in a poor quality of the spacial representation. Therefore a three-dimensional representation on the screen is only meaningfull if the hidden lines are eliminated. For this process many algorithms have been developed in the past. A common feature of these codes is the large amount of computer time needed. In the first generation of algorithms, which are commonly used today, the bodies are modeled by plane polygons. More recently, however, also algorithms are in use, which are able to treat curved surfaces without discretisation by plane surfaces. In this paper the first group of algorithms is reviewed, and the most important codes are described. The experience obtained during the implementation of two algorithms is presented. (orig.) [de

  15. The application of dangerous goods regulations to the transport of radioactive wastes

    International Nuclear Information System (INIS)

    Blenkin, J.J.; Darby, W.P.; Heywood, J.D.; Wikinson, H.L.; Carrington, C.K.; Murray, M.A.

    1998-01-01

    Some radioactive materials to be transported, including certain radioactive wastes, contain materials that qualify as dangerous goods as defined by the United Nations Recommendations on the Transport of Dangerous Goods (United Nations 1997). The regulations governing the transport of radioactive and dangerous goods in the UK are largely based on the IAEA Regulations for the Safe Transport of Radioactive Material (IAEA 1990) and the UN Recommendations (United Nations 1993). Additional legislation will also apply including the Carriage of Dangerous Goods by Road (Driver Training) Regulations 1996 (UK 1996). The IAEA Transport Regulations are clear that where radioactive materials have other dangerous properties the requirements of other relevant transport regulations for dangerous goods must also be met. They require that consignments are appropriately segregated from other dangerous goods, in accordance with relevant legislation, and that dangerous properties such as explosiveness, flammability etc. are taken into account in packing, labelling, marking, placarding, storage and transport. In practice, however, it requires a clear understanding of the relationship between the IAEA Transport Regulations and other dangerous goods legislation in order to avoid a number of problems in the approval of package design. This paper discusses the regulations applying to the transport of dangerous goods and explores practical problems associated with implementing them. It highlights a number of opportunities for developing the regulations, to make them easier to apply to radioactive materials that also have other potentially dangerous properties. (authors)

  16. Energy-Efficient Systems Eliminate Icing Danger for UAVs

    Science.gov (United States)

    2010-01-01

    Ames Research Center engineer Leonard Haslim invented an anti-icing t echnology called an electroexpulsive separation system, which uses m echanical force to shatter potentially dangerous ice buildup on an ai rcraft surface. Temecula, California-based Ice Management Systems (no w known as IMS-ESS) licensed the technology from Ames and has discov ered a niche market for the lightweight, energy-efficient technology: unmanned aerial vehicles (UAVs). IMS-ESS systems now prevent damagi ng ice accumulation on military UAVs, allowing the vehicles to carry out crucial missions year round.

  17. Treatment and disposal techniques of dangerous municipal solid wastes

    International Nuclear Information System (INIS)

    Beone, G.; Carbone, A.I.; Zagaroli, M.

    1989-01-01

    This paper describes the qualitative and quantitative features of the different types of dangerous municipal solid wastes, according to Italian law. In the second part the impact on environment and man health is presented. This impact should be minimized by suitable controlled disposal techniques, which differ from other municipal waste treatments. Finally, the paper deals with the most appropriate systems for treatment and disposal of such kind of waste. Particularly, some research activities in the field of metal recovery from used batteries, sponsored by ENEA, and carrying out by private companies, are described. (author)

  18. Tank waste remediation system dangerous waste training plan

    International Nuclear Information System (INIS)

    POHTO, R.E.

    1999-01-01

    This document outlines the dangerous waste training program developed and implemented for all Treatment, Storage, and Disposal (TSD) Units operated by Lockheed Martin Hanford Corporation (LMHC) Tank Waste Remediation System (TWRS) in the Hanford 200 East, 200 West and 600 Areas and the <90 Day Accumulation Area at 209E. Operating TSD Units operated by TWRS are: the Double-Shell Tank (DST) System (including 204-AR Waste Transfer Building), the 600 Area Purgewater Storage and the Effluent Treatment Facility. TSD Units undergoing closure are: the Single-Shell Tank (SST) System, 207-A South Retention Basin, and the 216-B-63 Trench

  19. On Dangerous Anthropogenic Interference and Climate Change Risk (Invited)

    Science.gov (United States)

    Mann, M. E.

    2009-12-01

    The United Nations Framework Convention on Climate Change (UNFCCC) commits signatory nations (which includes all major nations including the United States) to stabilizing greenhouse gas concentrations at levels short of Dangerous Anthropogenic Interference (“ DAI”) with the climate. To properly define DAI, one must take into account issues that are not only scientific, but, economic, political, and ethical in nature. Defining DAI is furthermore complicated by the inter-generational and regionally-disaggregated nature of the risks associated with climate change. In this talk, I will explore the nature of anthropogenic climate change risks and the notion of DAI.

  20. The induced radioactivity danger parameter for gamma radiation

    International Nuclear Information System (INIS)

    Perry, D.R.

    1985-07-01

    Dosimetric and practical aspects of the induced radioactivity danger parameter, as used for calculating the gamma radiation dose rate near to objects that have been exposed to high energy radiation, are examined. A simplified and more generally applicable method of calculation is proposed, based on energy balance in homogeneous media. The problems of applying this in practice are discussed, and it is shown that corrections are generally small enough to be neglected in many practical applications. Examples of calculations by previous and proposed methods are given. (author)