WorldWideScience

Sample records for hidden layer nodes

  1. 粗糙集约简的WNN隐层节点优化方法%Optimization method for hidden layer nodes of WNN based on rough set reduction

    Institute of Scientific and Technical Information of China (English)

    孟月波; 邹建华; 刘光辉; 甘旭升

    2014-01-01

    Under the premise of ensuring network performance, the key of wavelet neural network(WNN) application and promotion is how to get the most simple network structure by determining the optimal hidden layer nodes. Therefore, a Chi-Square discretization algorithm based on the information entropy and heuristic attribute reduction recursive algorithm is proposed, reduction process of the rough set theory is used to optimize wavelet neural network hidden layer nodes without changing network performance, and an aircraft aerodynamic model is built by modifying wavelet neural network. Simulation results show that WNN optimized by the proposed improved rough set method the can not only simplify the network structure, but also improve model accuracy and training speed.%在确保网络性能的前提下,如何确定最佳隐层节点,获得最简网络结构是小波神经网络(WNN)应用推广的关键。对此,引入粗糙集理论,提出了基于信息熵的卡方离散化算法和启发式的属性约简递归算法,利用粗糙集约简过程对WNN隐层节点进行精简,并将其应用于飞行器气动力建模。仿真结果表明,采用改进的粗糙集方法设计WNN,不仅能够简化网络结构,而且与未经结构优化的WNN相比,其模型精度和训练速度都得到了实质性改善。

  2. Universal approximation of extreme learning machine with adaptive growth of hidden nodes.

    Science.gov (United States)

    Zhang, Rui; Lan, Yuan; Huang, Guang-Bin; Xu, Zong-Ben

    2012-02-01

    Extreme learning machines (ELMs) have been proposed for generalized single-hidden-layer feedforward networks which need not be neuron-like and perform well in both regression and classification applications. In this brief, we propose an ELM with adaptive growth of hidden nodes (AG-ELM), which provides a new approach for the automated design of networks. Different from other incremental ELMs (I-ELMs) whose existing hidden nodes are frozen when the new hidden nodes are added one by one, in AG-ELM the number of hidden nodes is determined in an adaptive way in the sense that the existing networks may be replaced by newly generated networks which have fewer hidden nodes and better generalization performance. We then prove that such an AG-ELM using Lebesgue p-integrable hidden activation functions can approximate any Lebesgue p-integrable function on a compact input set. Simulation results demonstrate and verify that this new approach can achieve a more compact network architecture than the I-ELM.

  3. Hidden Connectivity in Networks with Vulnerable Classes of Nodes

    Science.gov (United States)

    Krause, Sebastian M.; Danziger, Michael M.; Zlatić, Vinko

    2016-10-01

    In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a "color-avoiding" percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.

  4. Hidden Connectivity in Networks with Vulnerable Classes of Nodes

    Directory of Open Access Journals (Sweden)

    Sebastian M. Krause

    2016-10-01

    Full Text Available In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a “color-avoiding” percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.

  5. Effectiveness of AODV Protocol under Hidden Node Environment

    Science.gov (United States)

    Garg, Ruchi; Sharma, Himanshu; Kumar, Sumit

    IEEE 802.11 is a standard for mobile ad hoc networks (MANET), implemented with various different protocols. Ad Hoc on Demand Distance Vector Routing (AODV) is one of the several protocols of IEEE 802.11, intended to provide various Quality of Service (QOS) parameters under acceptable range. To avoid the collision and interference the MAC protocol has only two solutions, one, to sense the physical carrier and second, to use the RTS/CTS handshake mechanism. But with the help of these methods AODV is not free from the problem of hidden nodes like other several protocols. Under the hidden node environment, performance of AODV depends upon various factors. The position of receiver and sender among the other nodes is very crucial and it affects the performance. Under the various situations the AODV is simulated with the help of NS2 and the outcomes are discussed.

  6. Shadow networks: Discovering hidden nodes with models of information flow

    CERN Document Server

    Bagrow, James P; Frank, Morgan R; Manukyan, Narine; Mitchell, Lewis; Reagan, Andrew; Bloedorn, Eric E; Booker, Lashon B; Branting, Luther K; Smith, Michael J; Tivnan, Brian F; Danforth, Christopher M; Dodds, Peter S; Bongard, Joshua C

    2013-01-01

    Complex, dynamic networks underlie many systems, and understanding these networks is the concern of a great span of important scientific and engineering problems. Quantitative description is crucial for this understanding yet, due to a range of measurement problems, many real network datasets are incomplete. Here we explore how accidentally missing or deliberately hidden nodes may be detected in networks by the effect of their absence on predictions of the speed with which information flows through the network. We use Symbolic Regression (SR) to learn models relating information flow to network topology. These models show localized, systematic, and non-random discrepancies when applied to test networks with intentionally masked nodes, demonstrating the ability to detect the presence of missing nodes and where in the network those nodes are likely to reside.

  7. A Fast SVD-Hidden-nodes based Extreme Learning Machine for Large-Scale Data Analytics.

    Science.gov (United States)

    Deng, Wan-Yu; Bai, Zuo; Huang, Guang-Bin; Zheng, Qing-Hua

    2016-05-01

    Big dimensional data is a growing trend that is emerging in many real world contexts, extending from web mining, gene expression analysis, protein-protein interaction to high-frequency financial data. Nowadays, there is a growing consensus that the increasing dimensionality poses impeding effects on the performances of classifiers, which is termed as the "peaking phenomenon" in the field of machine intelligence. To address the issue, dimensionality reduction is commonly employed as a preprocessing step on the Big dimensional data before building the classifiers. In this paper, we propose an Extreme Learning Machine (ELM) approach for large-scale data analytic. In contrast to existing approaches, we embed hidden nodes that are designed using singular value decomposition (SVD) into the classical ELM. These SVD nodes in the hidden layer are shown to capture the underlying characteristics of the Big dimensional data well, exhibiting excellent generalization performances. The drawback of using SVD on the entire dataset, however, is the high computational complexity involved. To address this, a fast divide and conquer approximation scheme is introduced to maintain computational tractability on high volume data. The resultant algorithm proposed is labeled here as Fast Singular Value Decomposition-Hidden-nodes based Extreme Learning Machine or FSVD-H-ELM in short. In FSVD-H-ELM, instead of identifying the SVD hidden nodes directly from the entire dataset, SVD hidden nodes are derived from multiple random subsets of data sampled from the original dataset. Comprehensive experiments and comparisons are conducted to assess the FSVD-H-ELM against other state-of-the-art algorithms. The results obtained demonstrated the superior generalization performance and efficiency of the FSVD-H-ELM. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. DoS detection in IEEE 802.11 with the presence of hidden nodes

    Directory of Open Access Journals (Sweden)

    Joseph Soryal

    2014-07-01

    Full Text Available The paper presents a novel technique to detect Denial of Service (DoS attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS and Frequency Hopping Spread Spectrum (FHSS and the results are presented to validate the algorithm.

  9. DoS detection in IEEE 802.11 with the presence of hidden nodes.

    Science.gov (United States)

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2014-07-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.

  10. Comparative Study of Hidden Node Problem and Solution Using Different Techniques and Protocols

    CERN Document Server

    Kapadia, Viral V; Jhaveri, Rutvij H

    2010-01-01

    Hidden nodes in a wireless network refer to nodes that are out of range of other nodes or a collection of nodes. We will discuss a few problems introduced by the RTS/CTS mechanism of collision avoidance and focus on the virtual jamming problem, which allows a malicious node to effectively jam a large fragment of a wireless network at minimum expense of power. We have also discussed WiCCP (Wireless Central Coordinated Protocol) which is a protocol booster that also provides good solution to hidden nodes.

  11. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance

    Directory of Open Access Journals (Sweden)

    Carlos Ley-Bosch

    2016-02-01

    Full Text Available In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  12. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    Science.gov (United States)

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  13. An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2016-09-07

    Successful transmission of online multimedia streams in wireless multimedia sensor networks (WMSNs) is a big challenge due to their limited bandwidth and power resources. The existing WSN protocols are not completely appropriate for multimedia communication. The effectiveness of WMSNs varies, and it depends on the correct location of its sensor nodes in the field. Thus, maximizing the multimedia coverage is the most important issue in the delivery of multimedia contents. The nodes in WMSNs are either static or mobile. Thus, the node connections change continuously due to the mobility in wireless multimedia communication that causes an additional energy consumption, and synchronization loss between neighboring nodes. In this paper, we introduce an Optimized Hidden Node Detection (OHND) paradigm. The OHND consists of three phases: hidden node detection, message exchange, and location detection. These three phases aim to maximize the multimedia node coverage, and improve energy efficiency, hidden node detection capacity, and packet delivery ratio. OHND helps multimedia sensor nodes to compute the directional coverage. Furthermore, an OHND is used to maintain a continuous node- continuous neighbor discovery process in order to handle the mobility of the nodes. We implement our proposed algorithms by using a network simulator (NS2). The simulation results demonstrate that nodes are capable of maintaining direct coverage and detecting hidden nodes in order to maximize coverage and multimedia node mobility. To evaluate the performance of our proposed algorithms, we compared our results with other known approaches.

  14. An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2016-01-01

    Successful transmission of online multimedia streams in wireless multimedia sensor networks (WMSNs) is a big challenge due to their limited bandwidth and power resources. The existing WSN protocols are not completely appropriate for multimedia communication. The effectiveness of WMSNs varies, and it depends on the correct location of its sensor nodes in the field. Thus, maximizing the multimedia coverage is the most important issue in the delivery of multimedia contents. The nodes in WMSNs are either static or mobile. Thus, the node connections change continuously due to the mobility in wireless multimedia communication that causes an additional energy consumption, and synchronization loss between neighboring nodes. In this paper, we introduce an Optimized Hidden Node Detection (OHND) paradigm. The OHND consists of three phases: hidden node detection, message exchange, and location detection. These three phases aim to maximize the multimedia node coverage, and improve energy efficiency, hidden node detection capacity, and packet delivery ratio. OHND helps multimedia sensor nodes to compute the directional coverage. Furthermore, an OHND is used to maintain a continuous node– continuous neighbor discovery process in order to handle the mobility of the nodes. We implement our proposed algorithms by using a network simulator (NS2). The simulation results demonstrate that nodes are capable of maintaining direct coverage and detecting hidden nodes in order to maximize coverage and multimedia node mobility. To evaluate the performance of our proposed algorithms, we compared our results with other known approaches. PMID:27618048

  15. On Throughput Improvement of Wireless Ad Hoc Networks with Hidden Nodes

    Science.gov (United States)

    Choi, Hong-Seok; Lim, Jong-Tae

    In this letter, we present the throughput analysis of the wireless ad hoc networks based on the IEEE 802.11 MAC (Medium Access Control). Especially, our analysis includes the case with the hidden node problem so that it can be applied to the multi-hop networks. In addition, we suggest a new channel access control algorithm to maximize the network throughput and show the usefulness of the proposed algorithm through simulations.

  16. Backoff-stage synchronization in three-hop string-topology wireless networks with hidden nodes

    Science.gov (United States)

    Sanada, Kosuke; Sekiya, Hiroo; Komuro, Nobuyoshi; Sakata, Shiro

    In IEEE 802.11 wireless multi-hop networks, each node works individually and their individual operations generate entire network dynamics. It is important to clarify the network dynamics in wireless multi-hop networks for designing and constructing multi-hop communication networks. This paper presents the network-dynamics investigations for three-hop string-topology wireless network in detail. From the investigations, a “backoff-stage synchronization” phenomenon, which is mutuality between hidden nodes, is found. The mechanism of the backoff-stage synchronization is expressed and the sufficient conditions for the synchronization occurrence are given. This phenomenon gives some impacts on the IEEE 802.11 multi-hop-network communications.

  17. Backpropagation-Based Cooperative Localization of Primary User for Avoiding Hidden-Node Problem in Cognitive Networks

    Directory of Open Access Journals (Sweden)

    Lin Liu

    2010-01-01

    Full Text Available Cognitive radio (CR is a technology to implement opportunistic spectrum sharing to improve the spectrum utilization. However, there exists a hidden-node problem, which can be a big challenge to solve especially when the primary receiver is passive listening. We aim to provide a solution to the hidden-node problem for passive-listening receiver based on cooperation of multiple CRs. Specifically, we consider a cooperative GPS-enabled cognitive network. Once the existence of PU is detected, a localization algorithm will be employed to first estimate the path loss model for the environment based on backpropagation method and then to locate the position of PU. Finally, a disable region is identified taking into account the communication range of both the PU and the CR. The CRs within the disabled region are prohibited to transmit in order to avoid interfering with the primary receiver. Both analysis and simulation results are provided.

  18. Single-hidden-layer feed-forward quantum neural network based on Grover learning.

    Science.gov (United States)

    Liu, Cheng-Yi; Chen, Chein; Chang, Ching-Ter; Shih, Lun-Min

    2013-09-01

    In this paper, a novel single-hidden-layer feed-forward quantum neural network model is proposed based on some concepts and principles in the quantum theory. By combining the quantum mechanism with the feed-forward neural network, we defined quantum hidden neurons and connected quantum weights, and used them as the fundamental information processing unit in a single-hidden-layer feed-forward neural network. The quantum neurons make a wide range of nonlinear functions serve as the activation functions in the hidden layer of the network, and the Grover searching algorithm outstands the optimal parameter setting iteratively and thus makes very efficient neural network learning possible. The quantum neuron and weights, along with a Grover searching algorithm based learning, result in a novel and efficient neural network characteristic of reduced network, high efficient training and prospect application in future. Some simulations are taken to investigate the performance of the proposed quantum network and the result show that it can achieve accurate learning.

  19. 多隐层输出矩阵极限学习机%Multiple hidden layer output matrices extreme learning machine

    Institute of Scientific and Technical Information of China (English)

    张文博; 姬红兵; 王磊; 朱明哲

    2014-01-01

    The extreme learning machine (ELM)achieves good performance for classification and runs at a fast learning speed because of choosing the learning parameters of hidden nodes randomly.However,when the parameters of the hidden nodes are absolutely randomly chosen,the performance of ELM is not always optimal. The multiple hidden layer output matrices extreme learning machine (M-ELM)is proposed which optimizes the architecture of hidden nodes by weighted calculation of different output matrices,and the matrices weights and the output weights are analytically determined simultaneously.In addition,the feature level fusion of ELM can be achieved by this method.For the real word classification problems,simulation experiments verify that M-ELM can provide a better performance than ELM.%得益于隐层节点学习参数的随机选择,极限学习机(extreme learning machine,ELM)在学习速度极快的基础上,可以达到较为良好的分类性能。但是,当隐层节点参数完全随机选择时,ELM 的性能并不总能达到最优。本文提出多隐层输出矩阵极限学习机(multiple hidden layer output matrices extreme learning machine, M-ELM)方法解决这一问题,该方法通过对不同输出矩阵加权运算以优化隐层节点结构,其中权系数与输出权值在学习过程中同时分析确定。另外,利用该方法可以实现特征级融合 ELM。实验证明,对于真实分类问题, M-ELM可以提供比 ELM 更为准确的分类结果。

  20. Monitoring of hidden damage in multi-layered aerospace structures using high-frequency guided waves

    Science.gov (United States)

    Semoroz, A.; Masserey, B.; Fromme, P.

    2011-04-01

    Aerospace structures contain multi-layered components connected by fasteners, where fatigue cracks and disbonds or localized lack of sealant can develop due to cyclic loading conditions and stress concentration. High frequency guided waves propagating along such a structure allow for the efficient non-destructive testing of large components, such as aircraft wings. The type of multi-layered model structure investigated in this contribution consists of two aluminium plates adhesively bonded with an epoxy based sealant layer. Using commercially available transducer equipment, specific high frequency guided ultrasonic wave modes that penetrate through the complete thickness of the structure were excited. The wave propagation along the structure was measured experimentally using a laser interferometer. Two types of hidden damage were considered: a localized lack of sealant and small surface defects in the metallic layer facing the sealant. The detection sensitivity using standard pulse-echo measurement equipment has been quantified and the detection of small hidden defects from significant stand-off distances has been shown. Fatigue experiments were carried out and the potential of high frequency guided waves for the monitoring of fatigue crack growth at a fastener hole during cyclic loading was discussed.

  1. Modification of Hidden Layer Weight in Extreme Learning Machine Using Gain Ratio

    Directory of Open Access Journals (Sweden)

    Anggraeny Fetty Tri

    2016-01-01

    Full Text Available Extreme Learning Machine (ELM is a method of learning feed forward neural network quickly and has a fairly good accuracy. This method is devoted to a feed forward neural network with one hidden layer where the parameters (i.e. weight and bias are adjusted one time randomly at the beginning of the learning process. In neural network, the input layer is connected to all characteristics/features, and the output layer is connected to all classes of species. This research used three datasets from UCI database, which were Iris, Breast Wisconsin, and Dermatology, with each dataset having several features. Each characteristic/feature of the data has a role in the process of classification levels, starting from the most influencing role to non-influencing at all. Gain ratio was used to extract each feature role on each datasets. Gain ratio is a method to extract feature role in order to develop a decision tree structure. In this study, ELM structure has been modified, where the random weights of the hidden layer were adjusted to the level of each feature role in determining the species class, so as to improve the level of training and testing accuracy. The proposed method has higher classification accuracy rate than basic ELM on all three datasets, which were 99%, 96%, and 82%, respectively.

  2. High frequency guided waves for hidden fatigue crack growth monitoring in multi-layer aerospace structures

    Science.gov (United States)

    Chan, Henry; Fromme, Paul

    2015-03-01

    Varying loading conditions of aircraft structures result in stress concentration at fastener holes, where multi-layered components are connected, possibly leading to the development of fatigue cracks. High frequency guided waves propagating along the structure allow for the non-destructive testing of such components, e.g., aircraft wings. However, the sensitivity for the detection of small, potentially hidden, fatigue cracks has to be ascertained. The type of multi-layered model structure investigated consists of two adhesively bonded aluminium plate-strips. Fatigue experiments were carried out. The sensitivity of the high frequency guided wave modes to monitor fatigue crack growth at a fastener hole during cyclic loading was investigated, using both standard pulse-echo equipment and laser interferometry. The sensitivity and repeatability of the measurements were ascertained, having the potential for fatigue crack growth monitoring at critical and difficult to access fastener locations from a stand-off distance.

  3. Double hidden layer RBF process neural network based online prediction of steam turbine exhaust enthalpy

    Institute of Scientific and Technical Information of China (English)

    GONG Huanchun

    2014-01-01

    In order to diagnose the unit economic performance online,the radial basis function (RBF) process neural network with two hidden layers was introduced to online prediction of steam turbine exhaust enthalpy.Thus,the model reflecting complicated relationship between the steam turbine exhaust enthalpy and the relative operation parameters was established.Moreover,the enthalpy of final stage extraction steam and exhaust from a 300 MW unit turbine was taken as the example to perform the online calculation. The results show that,the average relative error of this method is less than 1%,so the accuracy of this al-gorithm is higher than that of the BP neutral network.Furthermore,this method has advantages of high convergence rate,simple structure and high accuracy.

  4. Identifying IDS Agent Nodes Based on 3-Layered Key Management Framework for MANET

    Directory of Open Access Journals (Sweden)

    Marjan KUCHAKI RAFSANJANI

    2014-02-01

    Full Text Available Nowadays, Mobile Ad Hoc Networks (MANETs have become one of the most important networks in advanced technologies. However, MANETs are more vulnerable than wired and wireless networks to active and passive attacks. So, security and intrusion detection are very important in these networks. In this paper, we have presented a method of identifying IDS agent nodes in MANET. Whereas, IDS agent nodes due to monitoring activities in Intrusion Detection Systems (IDSs need more battery energy than other nodes in the network. In the first step, our method uses a 3-layered key management framework in order to authenticate and then in the second step, nodes with higher battery power from among authorized nodes as IDS agent nodes are considered. Therefore, with this method, some authorized nodes contribute in monitoring activities and the network lifetime will be increased and also communication cost in the 3-layered key management framework is less than other frameworks, thus communication performance will be increased.doi:10.14456/WJST.2014.30

  5. ON THE ORDER OF APPROXIMATION BY PERIODIC NEURAL NETWORKS BASED ON SCATTERED NODES%基于散乱阈值结点的周期神经网络的逼近阶

    Institute of Scientific and Technical Information of China (English)

    周观珍

    2005-01-01

    The relationship between the order of approximation by neural network based on scattered threshold value nodes and the neurons involved in a single hidden layer is investigated.The results obtained show that the degree of approximation by the periodic neural network with one hidden layer and scattered threshold value nodes is increased with the increase of the number of neurons hid in hidden layer and the smoothness of excitation function.

  6. Handwritten Multiscript Pin Code Recognition System having Multiple hidden layers using Back Propagation Neural Network

    Directory of Open Access Journals (Sweden)

    Stuti Asthana Rakesh K Bhujade Niresh Sharma Rajdeep Singh

    2011-10-01

    Full Text Available India is a country where multiple languages are spoken depending upon the place where people live as well as their mother tongue. For example ,a person living in tamilnadu is more familiar in writing/speaking Tamil as compared to Hindi or any other language. Usually due to this problem , sometimes people write pincode in the combination of two different numeric scripting, mainly the local language (which depend on the location or the mother tongue and the official language (which may be national language hindi or international language english.In this paper, we are concentrating on this problem of recognizing multiscript number recognition using artificial neural network on postcard, keeping accuracy as a chief criteria. This work has been tested on five different popular Indian scripts namely Hindi, Urdu, Tamil ,English and Telugu. Experiments were performed on samples by using two hidden layers having 250 neurons each and the results revealed that with the use of proper combination of number of neurons and number of layers in the neural network, accuracy upto 96% can be achieved under ideal condition.

  7. Monitoring of hidden fatigue crack growth in multi-layer aircraft structures using high frequency guided waves

    Science.gov (United States)

    Chan, H.; Masserey, B.; Fromme, P.

    2015-03-01

    Varying loading conditions of aircraft structures result in stress concentration at fastener holes, where multi-layered components are connected, potentially leading to the development of hidden fatigue cracks in inaccessible layers. High frequency guided waves propagating along the structure allow for the structural health monitoring (SHM) of such components, e.g., aircraft wings. Experimentally the required guided wave modes can be easily excited using standard ultrasonic wedge transducers. However, the sensitivity for the detection of small, potentially hidden, fatigue cracks has to be ascertained. The type of multi-layered model structure investigated consists of two adhesively bonded aluminum plate-strips with a sealant layer. Fatigue experiments were carried out and the growth of fatigue cracks at the fastener hole in one of the metallic layers was monitored optically during cyclic loading. The influence of the fatigue cracks of increasing size on the scattered guided wave field was evaluated. The sensitivity and repeatability of the high frequency guided wave modes to detect and monitor the fatigue crack growth was investigated, using both standard pulse-echo equipment and a laser interferometer. The potential for hidden fatigue crack growth monitoring at critical and difficult to access fastener locations from a stand-off distance was ascertained. The robustness of the methodology for practical in situ ultrasonic monitoring of fatigue crack growth is discussed.

  8. Hidden geometric correlations in real multiplex networks

    Science.gov (United States)

    Kleineberg, Kaj-Kolja; Boguñá, Marián; Ángeles Serrano, M.; Papadopoulos, Fragkiskos

    2016-11-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.

  9. Resolution Strategy of Hidden Node Collision Based on Collision Indication and Grouping%基于冲突指示和分组隐藏节点冲突解析策略*

    Institute of Scientific and Technical Information of China (English)

    李拥军; 谢嵘; 谭晓青

    2014-01-01

    Hidden node problem is an important factor in performance degradation of IEEE 802.15.4 protocol. This paper presents a resolution strategy of hidden collision based on collision indication and grouping. The new strategy, named Hidden Node Collision Detection and Avoidance Strategy (HNCDAS), uses grouping method to divide the CFP of IEEE 802.15.4 protocol into several equal slot cycles and extract the hidden node address information from some damaged frame caused by the hidden conflict. The strategy dynamically adjusts nodes to different competition groups based on currently obtained hidden relationship. The nodes within competitive groups still competitively send messages in accordance with the binary back method in the same period, while different competitive groups send messages in different time slots. As a result, the strategy completely solves the hidden conflict problem. Compared with other hidden node collision resolution strategies, HNCDAS has certain advantages such as less overhead and dynamic adjustment capability. The convergence of the strategy and the maximum time of resolution strategies are also demonstrated in theory. Experimental results show that HNCDAS can significantly improve data transmission rate, throughput and energy efficiency.%隐藏节点问题是导致IEEE 802.15.4协议性能下降的一个重要因素,而在IEEE 802.15.4中没有给出解决该类问题的具体方案.提出一种基于冲突指示和分组的隐藏冲突避免策略(hidden node collision detection and avoid strategy,简称HNCDAS),该策略采用分组方法将IEEE 802.15.4的CAP周期划分为多个等分时隙,从隐藏冲突导致的部分破损帧中提取出隐藏节点地址信息,依据当前获得的隐藏关系动态地将节点调整到相应的竞争组,竞争组内的节点在同一周期内仍按照二进制后退方法竞争发送消息,不同的竞争组在不同的时隙发送消息,从而彻底解决隐藏冲突问题.与其他隐

  10. Neural node network and model, and method of teaching same

    Science.gov (United States)

    Parlos, Alexander G. (Inventor); Atiya, Amir F. (Inventor); Fernandez, Benito (Inventor); Tsai, Wei K. (Inventor); Chong, Kil T. (Inventor)

    1995-01-01

    The present invention is a fully connected feed forward network that includes at least one hidden layer 16. The hidden layer 16 includes nodes 20 in which the output of the node is fed back to that node as an input with a unit delay produced by a delay device 24 occurring in the feedback path 22 (local feedback). Each node within each layer also receives a delayed output (crosstalk) produced by a delay unit 36 from all the other nodes within the same layer 16. The node performs a transfer function operation based on the inputs from the previous layer and the delayed outputs. The network can be implemented as analog or digital or within a general purpose processor. Two teaching methods can be used: (1) back propagation of weight calculation that includes the local feedback and the crosstalk or (2) more preferably a feed forward gradient decent which immediately follows the output computations and which also includes the local feedback and the crosstalk. Subsequent to the gradient propagation, the weights can be normalized, thereby preventing convergence to a local optimum. Education of the network can be incremental both on and off-line. An educated network is suitable for modeling and controlling dynamic nonlinear systems and time series systems and predicting the outputs as well as hidden states and parameters. The educated network can also be further educated during on-line processing.

  11. Hidden phase in a two-dimensional Sn layer stabilized by modulation hole doping

    Science.gov (United States)

    Ming, Fangfei; Mulugeta, Daniel; Tu, Weisong; Smith, Tyler S.; Vilmercati, Paolo; Lee, Geunseop; Huang, Ying-Tzu; Diehl, Renee D.; Snijders, Paul C.; Weitering, Hanno H.

    2017-03-01

    Semiconductor surfaces and ultrathin interfaces exhibit an interesting variety of two-dimensional quantum matter phases, such as charge density waves, spin density waves and superconducting condensates. Yet, the electronic properties of these broken symmetry phases are extremely difficult to control due to the inherent difficulty of doping a strictly two-dimensional material without introducing chemical disorder. Here we successfully exploit a modulation doping scheme to uncover, in conjunction with a scanning tunnelling microscope tip-assist, a hidden equilibrium phase in a hole-doped bilayer of Sn on Si(111). This new phase is intrinsically phase separated into insulating domains with polar and nonpolar symmetries. Its formation involves a spontaneous symmetry breaking process that appears to be electronically driven, notwithstanding the lack of metallicity in this system. This modulation doping approach allows access to novel phases of matter, promising new avenues for exploring competing quantum matter phases on a silicon platform.

  12. Selection of Hidden Layer Neurons and Best Training Method for FFNN in Application of Long Term Load Forecasting

    Science.gov (United States)

    Singh, Navneet K.; Singh, Asheesh K.; Tripathy, Manoj

    2012-05-01

    For power industries electricity load forecast plays an important role for real-time control, security, optimal unit commitment, economic scheduling, maintenance, energy management, and plant structure planning etc. A new technique for long term load forecasting (LTLF) using optimized feed forward artificial neural network (FFNN) architecture is presented in this paper, which selects optimal number of neurons in the hidden layer as well as the best training method for the case study. The prediction performance of proposed technique is evaluated using mean absolute percentage error (MAPE) of Thailand private electricity consumption and forecasted data. The results obtained are compared with the results of classical auto-regressive (AR) and moving average (MA) methods. It is, in general, observed that the proposed method is prediction wise more accurate.

  13. UNIVERSAL APPROXIMATION WITH NON-SIGMOID HIDDEN LAYER ACTIVATION FUNCTIONS BY USING ARTIFICIAL NEURAL NETWORK MODELING

    Directory of Open Access Journals (Sweden)

    R. Murugadoss

    2014-10-01

    Full Text Available Neural networks are modeled on the way the human brain. They are capable of learning and can automatically recognize by skillfully training and design complex relationships and hidden dependencies based on historical example patterns and use this information for forecasting. The main difference, and at the same time is biggest advantage of the model of neural networks over statistical techniques seen that the forecaster the exact functional structure between input and Output variables need not be specified, but this by the system with certain Learning algorithms is "learned" using a kind of threshold logic. Goal of the learning procedure is to define the training phase while those parameters of the network, with Help the network has one of those adequate for the problem behavior. Mathematically, the training phase is an iterative, converging towards a minimum error value process. They identify the processors of the network, minimize the "total error". The currently the most popular and most widely for business applications algorithm is the backpropagation algorithm. This paper opens the black box of Backpropagation networks and makes the optimization process in the network over time and locally comprehensible.

  14. Curvature of co-links uncovers hidden thematic layers in the World Wide Web.

    Science.gov (United States)

    Eckmann, Jean-Pierre; Moses, Elisha

    2002-04-30

    Beyond the information stored in pages of the World Wide Web, novel types of "meta-information" are created when pages connect to each other. Such meta-information is a collective effect of independent agents writing and linking pages, hidden from the casual user. Accessing it and understanding the interrelation between connectivity and content in the World Wide Web is a challenging problem [Botafogo, R. A. & Shneiderman, B. (1991) in Proceedings of Hypertext (Assoc. Comput. Mach., New York), pp. 63-77 and Albert, R. & Barabási, A.-L. (2002) Rev. Mod. Phys. 74, 47-97]. We demonstrate here how thematic relationships can be located precisely by looking only at the graph of hyperlinks, gleaning content and context from the Web without having to read what is in the pages. We begin by noting that reciprocal links (co-links) between pages signal a mutual recognition of authors and then focus on triangles containing such links, because triangles indicate a transitive relation. The importance of triangles is quantified by the clustering coefficient [Watts, D. J. & Strogatz, S. H. (1999) Nature (London) 393, 440-442], which we interpret as a curvature [Bridson, M. R. & Haefliger, A. (1999) Metric Spaces of Non-Positive Curvature (Springer, Berlin)]. This curvature defines a World Wide Web landscape whose connected regions of high curvature characterize a common topic. We show experimentally that reciprocity and curvature, when combined, accurately capture this meta-information for a wide variety of topics. As an example of future directions we analyze the neural network of Caenorhabditis elegans, using the same methods.

  15. A Cross-Layer Delay-Aware Node Disjoint Multipath Routing Algorithm for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mahadev A. Gawas

    2014-09-01

    Full Text Available Mobile Ad Hoc Networks (MANETS require reliable routing and Quality of Service(QoS mechanism to support diverse applications with varying and stringent requirements for delay, jitter, bandwidth, packets loss. Routing protocols such as AODV, AOMDV, DSR and OLSR use shortest path with minimum hop count as the main metric for path selection, hence are not suitable for delay sensitive real time applications. To support such applications delay constrained routing protocols are employed. These Protocols makes path selection between source and destination based on the delay over the discovered links during routing discovery and routing table calculations. We propose a variation of a node-disjoint Multipath QoS Routing protocol called Cross Layer Delay aware Node Disjoint Multipath AODV (CLDMAODV based on delay constraint. It employs cross-layer communications between MAC and routing layers to achieve link and channel-awareness. It regularly updates the path status in terms of lowest delay incurred at each intermediate node. Performance of the proposed protocol is compared with single path AODV and NDMR protocols. Proposed CLDM-AODV is superior in terms of better packet delivery and reduced overhead between intermediate nodes.

  16. Liver Tumor Segmentation from MR Images Using 3D Fast Marching Algorithm and Single Hidden Layer Feedforward Neural Network

    Directory of Open Access Journals (Sweden)

    Trong-Ngoc Le

    2016-01-01

    Full Text Available Objective. Our objective is to develop a computerized scheme for liver tumor segmentation in MR images. Materials and Methods. Our proposed scheme consists of four main stages. Firstly, the region of interest (ROI image which contains the liver tumor region in the T1-weighted MR image series was extracted by using seed points. The noise in this ROI image was reduced and the boundaries were enhanced. A 3D fast marching algorithm was applied to generate the initial labeled regions which are considered as teacher regions. A single hidden layer feedforward neural network (SLFN, which was trained by a noniterative algorithm, was employed to classify the unlabeled voxels. Finally, the postprocessing stage was applied to extract and refine the liver tumor boundaries. The liver tumors determined by our scheme were compared with those manually traced by a radiologist, used as the “ground truth.” Results. The study was evaluated on two datasets of 25 tumors from 16 patients. The proposed scheme obtained the mean volumetric overlap error of 27.43% and the mean percentage volume error of 15.73%. The mean of the average surface distance, the root mean square surface distance, and the maximal surface distance were 0.58 mm, 1.20 mm, and 6.29 mm, respectively.

  17. A Single Hidden Layered Fuzzy Back propagation Algorithm for Joint Radio Resource Management in Radio Access Systems

    Directory of Open Access Journals (Sweden)

    J.Preethi

    2010-07-01

    Full Text Available In this paper, we propose a single hidden layered fuzzy neural algorithm, which is able to provide a better quality of service constraints in a multi-cell scenario with three different radio access technologies (RATs namely the Universal Mobile Telecommunication Systems (UMTS, the Wireless Local Area Network (WLAN and the Global System for Mobile Telecommunication (GSM /Enhanced Data rate for GSM Evolution (EDGE Radio access Network (GERAN. This proposed algorithm works in two steps; the first step is to select a suitable combination of cells among the three different RATs. The second step chooses the most appropriate RAT to which the users can be attached and to choose the suitable bandwidth to allocate for the users. The Joint Radio Resource Management (JRRM makes use of fuzzy neural approach to manage dynamically the allocation and deallocation of the different radio resources among thedifferent radio access systems for spectrum bands allocated to each of these systems. By simulation results, we have shown that the proposed algorithm selects the most appropriate RAT in a multi-cell scenario.

  18. High-frequency guided ultrasonic waves for hidden defect detection in multi-layer aircraft structures

    Science.gov (United States)

    Masserey, B.; Raemy, C.; Fromme, P.

    2012-05-01

    Aerospace structures contain multi-layer components subjected to cyclic loading conditions; fatigue cracks and disbonds can develop, often at fastener holes. High-frequency guided waves have the potential for non-destructive damage detection at critical and difficult to access locations from a stand-off distance. Using commercially available ultrasonic transducers, high frequency guided waves were generated that penetrate through the complete thickness of a model structure, consisting of two adhesively bonded aluminum plates. The wave propagation along the specimen was measured and quantified using a laser interferometer. The wave propagation and scattering at internal defects was simulated using Finite Element (FE) models and good agreement with the measurement results found. The detection sensitivity using standard pulse-echo measurements was verified and the influence of the stand-off distance predicted from the FE simulation results.

  19. Hidden Layers of Hafiz’s Psyche (a new analysis of Hafiz’s poetry based on collective unconscious’ archetypes

    Directory of Open Access Journals (Sweden)

    M Rozatian

    2013-03-01

    Full Text Available There are many words about Hafiz and his poetry, perhaps more than other Persian poets. The reason for this can be sought in his ambiguous poems. Thus, a critic calls him a broad-minded mystic whose poems have mystical implications, whereas another one considers him as a fickle person who changes his opinions every moment. For some critics he is a smart poet who has simply created a literary work without inserting his mindset into it. For this reason, there are a number of paradoxical and even opposite interpretations for most of his verses and it seems that new interpretations are still possible. One reason for the interpretability of his poems is the presence of various characters such as Rend (the libertine, Pire Moghan (the old Magian, Saghi (the cup-bearer, Sufi, Mohtaseb (the reckoner in his Divan for some of which historical equivalents have been presented in several works and some scholars have tried to prove that each of these characters refers to real persons in Hafiz’s epoch or past epochs. Contemplation on the atmosphere of his poetry brings this question to the mind that if it is possible to consider each of these characters as hidden layers of Hafiz’s psyche that his consciousness tries to achieve self-knowledge and Perfection through recognition of such layers and creating balance and harmony between them. Using the idea proposed in analytical psychology about archetypes of collective unconscious, this article tries to find an answer for the mentioned question to achieve a new horizon in the analysis of Hafiz’s poems.

  20. High output efficiency in a one wavelength microcavity OLED with emitter layer positioned at an anti-node

    CERN Document Server

    Nelson, Mitchell C

    2015-01-01

    A novel OLED architecture is described in which a thin emitter layer is located at the anti-node of a resonant microcavity. In two realizations, the mode space is constrained by either multi-layer mirrors or by an emitter with transition dipole moments oriented normal to the vertical mode of the device. The multi-layer mirror device achieves 315 lm/W and shows linear light output versus current with a small offset. The symmetrized emitter device demonstrates a luminous efficiency of 340 lm/W. Rate equation analysis predicts the observed linear behavior with constant loss term for stimulated emission devices. For spontaneous emission devices a coefficient is obtained that is analogous to the out-coupling factor and goes to 1 for high finesse cavities. Both types of devices can approach unit efficiency, the stimulated emission device should be less susceptible to roll-off and may be easier to manufacture.

  1. Physical Layer Multi-Core Prototyping A Dataflow-Based Approach for LTE eNodeB

    CERN Document Server

    Pelcat, Maxime; Piat, Jonathan; Nezan, Jean-François

    2013-01-01

    Base stations developed according to the 3GPP Long Term Evolution (LTE) standard require unprecedented processing power. 3GPP LTE enables data rates beyond hundreds of Mbits/s by using advanced technologies, necessitating a highly complex LTE physical layer. The operating power of base stations is a significant cost for operators, and is currently optimized using state-of-the-art hardware solutions, such as heterogeneous distributed systems. The traditional system design method of porting algorithms to heterogeneous distributed systems based on test-and-refine methods is a manual, thus time-expensive, task.   Physical Layer Multi-Core Prototyping: A Dataflow-Based Approach for LTE eNodeB provides a clear introduction to the 3GPP LTE physical layer and to dataflow-based prototyping and programming. The difficulties in the process of 3GPP LTE physical layer porting are outlined, with particular focus on automatic partitioning and scheduling, load balancing and computation latency reduction, specifically in sys...

  2. Web Data Text Extraction Algorithm Based on Hidden Nodes Resonance Dense Matching%基于隐节点共振致密配对的Web数据文本抽取

    Institute of Scientific and Technical Information of China (English)

    亢华爱

    2015-01-01

    Web网络中存在海量文本,需要进行合理高效的文本抽取,实现Web文本数据挖掘。由于Web文本数据的高维特性,文本抽取过程中自动分类配对困难。提出一种基于RBF神经网络隐节点共振致密配对的Web数据文本抽取算法,进行Web数据文本特征采样与关联主特征挖掘,在每次移动中形成RBF隐节点共振致密配对,得到最优文本特征选择的路径,建立RBF神经网络分类器,实现基于蚁群算法的特征抽取算法改进。实验结果表明,该算法能有效实现对隐节点的共振致密配对,特征挖掘跟踪性能较好,保障了挖掘性能,系统所提取的特征分量与其他模糊分量差距较小,文本正确抽取召回率高于传统方法,在Web网络数据文本抽取中具有优越可靠的应用价值。%There are a large number of text in Web network, we need for text extraction efficiently and implementation of Web text data mining. Due to the high dimensionality of the Web text data, matching difficulties of automatic text classifica⁃tion extraction process. A Web data text extraction algorithm of RBF neural network hidden nodes resonance dense pairing based text feature is proposed, Web data sampling associated with main feature mining, random selection to the mass data information, the formation of RBF hidden nodes in each move in resonance dense matching, get the path optimal text fea⁃ture selection, RBF neural network classifier, the improved feature extraction algorithm is obtained based on ant colony al⁃gorithm. The experimental results show that the algorithm can effectively realize the resonance of hidden nodes dense matching, feature mining has good tracking performance, it can guarantee the mining performance, the component features extracted from the system and other fuzzy component gap is smaller, the recall rate of correct text extraction is higher than traditional method, and it has good application value

  3. Holistic overlay control for multi-patterning process layers at the 10nm and 7nm nodes

    Science.gov (United States)

    Verstappen, Leon; Mos, Evert; Wardenier, Peter; Megens, Henry; Schmitt-Weaver, Emil; Bhattacharyya, Kaustuve; Adam, Omer; Grzela, Grzegorz; van Heijst, Joost; Willems, Lotte; Wildenberg, Jochem; Ignatova, Velislava; Chen, Albert; Elich, Frank; Rajasekharan, Bijoy; Vergaij-Huizer, Lydia; Lewis, Brian; Kea, Marc; Mulkens, Jan

    2016-03-01

    Multi-patterning lithography at the 10-nm and 7-nm nodes is driving the allowed overlay error down to extreme low values. Advanced high order overlay correction schemes are needed to control the process variability. Additionally the increase of the number of split layers results in an exponential increase of metrology complexity of the total overlay and alignment tree. At the same time, the process stack includes more hard-mask steps and becomes more and more complex, with as consequence that the setup and verification of the overlay metrology recipe becomes more critical. All of the above require a holistic approach that addresses total overlay optimization from process design to process setup and control in volume manufacturing. In this paper we will present the holistic overlay control flow designed for 10-nm and 7-nm nodes and illustrate the achievable ultimate overlay performance for a logic and DRAM use case. As figure 1 illustrates we will explain the details of the steps in the holistic flow. Overlay accuracy is the driver for target design and metrology tool optimization like wavelength and polarization. We will show that it is essential to include processing effects like etching and CMP which can result in a physical asymmetry of the bottom grating of diffraction based overlay targets. We will introduce a new method to create a reference overlay map, based on metrology data using multiple wavelengths and polarization settings. A similar approach is developed for the wafer alignment step. The overlay fingerprint correction using linear or high order correction per exposure (CPE) has a large amount of parameters. It is critical to balance the metrology noise with the ultimate correction model and the related metrology sampling scheme. Similar approach is needed for the wafer align step. Both for overlay control as well as alignment we have developed methods which include efficient use of metrology time, available for an in the litho-cluster integrated

  4. Distinguishing dynamical features of water inside protein hydration layer: Distribution reveals what is hidden behind the average

    Science.gov (United States)

    Mukherjee, Saumyak; Mondal, Sayantan; Bagchi, Biman

    2017-07-01

    Since the pioneering works of Pethig, Grant, and Wüthrich on a protein hydration layer, many studies have been devoted to find out if there are any "general and universal" characteristic features that can distinguish water molecules inside the protein hydration layer from bulk. Given that the surface itself varies from protein to protein, and that each surface facing the water is heterogeneous, search for universal features has been elusive. Here, we perform an atomistic molecular dynamics simulation in order to propose and demonstrate that such defining characteristics can emerge if we look not at average properties but the distribution of relaxation times. We present results of calculations of distributions of residence times and rotational relaxation times for four different protein-water systems and compare them with the same quantities in the bulk. The distributions in the hydration layer are unusually broad and log-normal in nature due to the simultaneous presence of peptide backbones that form weak hydrogen bonds, hydrophobic amino acid side chains that form no hydrogen bond, and charged polar groups that form a strong hydrogen bond with the surrounding water molecules. The broad distribution is responsible for the non-exponential dielectric response and also agrees with large specific heat of the hydration water. Our calculations reveal that while the average time constant is just about 2-3 times larger than that of bulk water, it provides a poor representation of the real behaviour. In particular, the average leads to the erroneous conclusion that water in the hydration layer is bulk-like. However, the observed and calculated lower value of static dielectric constant of hydration layer remained difficult to reconcile with the broad distribution observed in dynamical properties. We offer a plausible explanation of these unique properties.

  5. Imaging challenges in 20nm and 14nm logic nodes: hot spots performance in Metal1 layer

    Science.gov (United States)

    Timoshkov, V.; Rio, D.; Liu, H.; Gillijns, W.; Wang, J.; Wong, P.; Van Den Heuvel, D.; Wiaux, V.; Nikolsky, P.; Finders, J.

    2013-10-01

    The 20nm Metal1 layer, based on ARM standard cells, has a 2D design with minimum pitch of 64nm. This 2D design requires a Litho-Etch-Litho-Etch (LELE) double patterning. The whole design is divided in 2 splits: Me1A and Me1B. But solution of splitting conflicts needs stitching at some locations, what requires good Critical Dimension (CD) and overlay control to provide reliable contact between 2 stitched line ends. ASML Immersion NXT tools are aimed at 20 and 14nm logic production nodes. Focus control requirements become tighter, as existing 20nm production logic layouts, based on ARM, have about 50-60nm focus latitude and tight CD Uniformity (CDU) specifications, especially for line ends. IMEC inspected 20nm production Metal1 ARM standard cells with a Negative Tone Development (NTD) process using the Process Window Qualification-like technique experimentally and by Brion Tachyon LMC by simulations. Stronger defects were found thru process variations. A calibrated Tachyon model proved a good overall predictability capability for this process. Selected defects are likely to be transferred to hard mask during etch. Further, CDU inspection was performed for these critical features. Hot spots showed worse CD uniformity than specifications. Intra-field CDU contribution is significant in overall CDU budget, where reticle has major impact due to high MEEF of hot spots. Tip-to-Tip and tip-to-line hot spots have high MEEF and its variation over the field. Best focus variation range was determined by best focus offsets between hot spots and its variation within the field.

  6. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main...... the ill parent. These findings contribute to a deeper understanding of the traumatic process of parental ABI that some children experience and emphasize the importance of family-centred interventions that include the children....

  7. APPLICATION LAYER MULTICAST ALGORITHM BASED ON NODE HETEROGENEOUS%基于节点异构性的应用层组播算法

    Institute of Scientific and Technical Information of China (English)

    王君; 王以刚

    2011-01-01

    为降低组播树的维护开销、改善组播树的负载平衡、提高组播树的性能,给出一种基于节点异构性的应用层组播算法.与已有的应用层组播算法相比,综合考虑了节点的异构性(动态计算节点异构性,综合考虑节点的网络转发能力和计算能力来),提出了全新的组播树构建策略并通过黄牌节点的数量来及时调整组播树.仿真结果表明,该算法大大降低了端到端的延迟和平均链路伸展长度,提高了系统的稳定性.%To reduce the multicast tree maintenance cost, improve its load balance and performance, this paper proposes an application layer multicast algorithm based on node heterogeneous. Compared with existing application layer multicast algorithms, it comprehensively considers node heterogeneous ( dynamically calculates node heterogeneous, comprehensively considers the node's network forwarding capacity and computing power); then presents a new multicast tree construction strategy and timely adjust the multicast tree according to the number of yellow nodes. Simulation results show that the algorithm greatly shortens the delay between peers as well as the average link stretch length; therefore the system stability is improved.

  8. 无线自组织网络中多层综合的节点行为异常检测方法%Multi-layer Integrated Anomaly Detection of Mobile Nodes Behaviors in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    王涛; 余顺争

    2009-01-01

    Mobile Ad hoc Networks are very vulnerable to malicious attacks due to the nature of mobile computing envi-ronment such as wireless communication channels, limited power and bandwidth, dynamically changing and distributed network topology,etc.The general existing Intrusion Detection Systems (IDS) have provided little evidence that they are applicable to a broader range threats.Based on the generalized and cooperative intrusion detection architecture pro-posed as the foundation for all intrusion detection, we presented an anomaly detection mechanism to discriminate the il-legitimate network behaviors of mobile nodes.By collecting the observation sequences of multiple protocol layers, Hid-den semi-Markov Model (HSMM) was explored to describe the network behaviors of legitimate nodes and to implement the anomaly detection for various malicious attacks.We conducted extensive experiments using the na-2 simulation envi-ronment to evaluate and validate our research.%Ad hoe网络由于采用无线信道、有限的电源和带宽、分布式控制等,会比有线网络更易受到入侵攻击.通常的入侵检测技术具有检测能力单一、缺乏对抗新入侵方式的能力等缺陷.在分布式入侵检测系统(IDS)的基础上,提出一种针对移动节点网络行为的异常检测机制.基于多层综合的观测值序列,采用隐半马尔可夫模型(HSMM)建立描述网络中合法节点正常行为的检测模型,继而对网络中的正常与异常行为进行判断与识别.实验表明,此方法能针对现有多种入侵方式进行有效的检测.

  9. Critical scaling in hidden state inference for linear Langevin dynamics

    OpenAIRE

    Bravi, Barbara; Sollich, Peter

    2016-01-01

    We consider the problem of inferring the dynamics of unknown (i.e. hidden) nodes from a set of observed trajectories and we study analytically the average prediction error given by the Extended Plefka Expansion applied to it, as presented in [1]. We focus on a stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings in the infinite network size limit. The expected error on the hidden time courses can be found as the equal-time hidden-to-hidden cova...

  10. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  11. Node cookbook

    CERN Document Server

    Clements, David Mark

    2014-01-01

    In Node Cookbook Second Edition, each chapter focuses on a different aspect of working with Node. Following a Cookbook structure, the recipes are written in an easy-to-understand language. Readers will find it easier to grasp even the complex recipes which are backed by lots of illustrations, tips, and hints.If you have some knowledge of JavaScript and want to build fast, efficient, scalable client-server solutions, then Node Cookbook Second Edition is for you. Knowledge of Node will be an advantage but is not required. Experienced users of Node will be able to improve their skills.

  12. Layered Non-uniform Node Distribution Strategy to Achieve Energy Consumption Balance%分层式非均匀节点布置的能耗均衡策略

    Institute of Scientific and Technical Information of China (English)

    凌强; 袁俊杰; 严金丰

    2013-01-01

    In wireless sensor networks, sensor nodes need to send data to the sink node. Due to the communication distance limitation, the sensor nodes being far from the sink node cannot directly send their data to the sink node and need other nodes to relay their data to the sink node. The nodes near the sink node have to spend much energy to relay the data from the far nodes, and will die faster. When the near nodes all die, no data can be received by the sink node and the network stops working, which is referred to as energy hole. We propose a new layered non-uniform strategy to distribute the sensor nodes in a network, which increases the inner node density in order to avoid energy hole and can greatly improve the efficiency of the energy consumption. This strategy is simulated on an NS2 platform. Simulation results confirms that this strategy is effective and can significantly improve the energy consumption balance.%无线传感器网络中,大量的传感器节点检测的数据需要转发给基站.但是由于节点本身能量十分有限,有时需要多次转发才能到达基站.由于转发机制的存在,在基站附近的节点除了转发本身检测的数据外,还要大量转发远离基站的外层节点的数据,这使得基站附近节点负载过重而提前死亡,导致基站附近形成”能量洞”,最终导致网络死亡.针对这个问题,提出一种新的非均匀节点布置策略:调整网络的节点密度布置结构、增加内层节点的密度以分担内层节点负载,从而避免”能量洞”,提高网络的能量利用率.本文的策略通过NS2仿真平台加以实现.仿真结果表明本策略针对”能量洞”问题是有效的、能够有效提高网络的能耗均衡性.

  13. Geometric correlations in real multiplex networks: multidimensional communities, trans-layer link prediction, and efficient navigation

    CERN Document Server

    Kleineberg, Kaj-Kolja; Serrano, M Angeles; Papadopoulos, Fragkiskos

    2016-01-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the individual layers. We find that these correlations are strong in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate: (i) the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers; (ii) accurate trans-layer link prediction, where connections in one layer can be predicted by observing the hidden geometric space of another layer; and (iii) efficient targeted navigation in the multilayer system using only local knowledge, which outperforms naviga...

  14. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  15. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression wher...

  16. The value of peripheral nodes in controlling multilayer networks

    CERN Document Server

    Zhang, Yan; Schweitzer, Frank

    2015-01-01

    We analyze the controllability of a two-layer network, where driver nodes can be chosen only from one layer. Each layer contains a scale-free network with directed links. The dynamics of nodes depends on the incoming links from other nodes (reputation dynamics). We find that the controllable part of the network is larger when choosing peripherial nodes to connect the two layers. The control is as efficient for peripherial nodes as driver nodes as it is for more central nodes. If we assume a cost to utilize nodes which is proportional to their degree, utilizing peripherial nodes to connect the two layers or to act as driver nodes is not only the most cost-efficient solution, it is also the one that gives us the best performance in controlling the two-layer network.

  17. Entanglement without hidden nonlocality

    Science.gov (United States)

    Hirsch, Flavien; Túlio Quintino, Marco; Bowles, Joseph; Vértesi, Tamás; Brunner, Nicolas

    2016-11-01

    We consider Bell tests in which the distant observers can perform local filtering before testing a Bell inequality. Notably, in this setup, certain entangled states admitting a local hidden variable model in the standard Bell scenario can nevertheless violate a Bell inequality after filtering, displaying so-called hidden nonlocality. Here we ask whether all entangled states can violate a Bell inequality after well-chosen local filtering. We answer this question in the negative by showing that there exist entangled states without hidden nonlocality. Specifically, we prove that some two-qubit Werner states still admit a local hidden variable model after any possible local filtering on a single copy of the state.

  18. Self-similarity of complex networks and hidden metric spaces

    CERN Document Server

    Serrano, M Angeles; Boguna, Marian

    2007-01-01

    We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.

  19. Hidden circuits and argumentation

    Science.gov (United States)

    Leinonen, Risto; Kesonen, Mikko H. P.; Hirvonen, Pekka E.

    2016-11-01

    Despite the relevance of DC circuits in everyday life and schools, they have been shown to cause numerous learning difficulties at various school levels. In the course of this article, we present a flexible method for teaching DC circuits at lower secondary level. The method is labelled as hidden circuits, and the essential idea underlying hidden circuits is in hiding the actual wiring of DC circuits, but to make their behaviour evident for pupils. Pupils are expected to find out the wiring of the circuit which should enhance their learning of DC circuits. We present two possible ways to utilise hidden circuits in a classroom. First, they can be used to test and enhance pupils’ conceptual understanding when pupils are expected to find out which one of the offered circuit diagram options corresponds to the actual circuit shown. This method aims to get pupils to evaluate the circuits holistically rather than locally, and as a part of that aim this method highlights any learning difficulties of pupils. Second, hidden circuits can be used to enhance pupils’ argumentation skills with the aid of argumentation sheet that illustrates the main elements of an argument. Based on the findings from our co-operating teachers and our own experiences, hidden circuits offer a flexible and motivating way to supplement teaching of DC circuits.

  20. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  1. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  2. Solar Hidden Photon Search

    CERN Document Server

    Schwarz, Matthias; Redondo, Javier; Ringwald, Andreas; Wiedemann, Guenter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope.

  3. Solar Hidden Photon Search

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Max-Planck-Institut fuer Physik und Astrophysik, Muenchen (Germany)

    2011-11-15

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope. (orig.)

  4. P2P Structure Based on Active Super-node and Layered DHT%基于主动超节点的DHT分层P2P模型研究

    Institute of Scientific and Technical Information of China (English)

    程澜; 罗建

    2012-01-01

    随着计算机硬件和计算机网络迅速发展,P2P网络模型的优势日渐被人们所重视.基于P2P网络模型的应用也层出不穷,在P2P网络中如何高效地定位节点资源是衡量P2P应用软件价值的重要参考点,也是目前研究的热点.在现有超节点机制和DHT网络的基础上,采用主动网络技术和分层DHT模型,在原理分析和模型设计的前提下,提出了一种主动超节点的DHT分层机制的P2P模型,并通过试验此模型对该机制进行了分析.%With the rapid development of computer hardware update and network application, the advantage of P2P network model is approved to be more and more attractive to users. The application of different P2P network model varied a lot and emerged in endlessly. In P2P network,how to locate the node resource fast and effectively is a key point to evaluate the value of P2P application software, which is also hotly researched at present. Base on the present super- node framework and layered DHT model,adopting active network technology and layered DHT framework, and under the precondition of theory analysis and model design,this article claims a new P2P model with active super- node and layered DHT framework and analyzes the performance of this model which via simulate experiments.

  5. Sentinel Lymph Node Biopsy

    Science.gov (United States)

    ... Ask about Your Diagnosis Research Sentinel Lymph Node Biopsy On This Page What are lymph nodes? What ... lymph node? What is a sentinel lymph node biopsy? What happens during an SLNB? What are the ...

  6. Lymph node biopsy

    Science.gov (United States)

    Biopsy - lymph nodes; Open lymph node biopsy; Fine needle aspiration biopsy; Sentinel lymph node biopsy ... A lymph node biopsy is done in an operating room in a hospital. Or, it is done at an outpatient surgical center. The ...

  7. Hidden layers of human small RNAs

    DEFF Research Database (Denmark)

    Kawaji, Hideya; Nakamura, Mari; Takahashi, Yukari;

    2008-01-01

    shows that well-characterized non-coding RNA, such as tRNA, snoRNA, and snRNA are cleaved at sites specific to the class of ncRNA. In particular, tRNA cleavage is regulated depending on tRNA type and tissue expression. We also found small RNAs mapped to genomic regions that are transcribed in both...... small RNA have focused on miRNA and/or siRNA rather than on the exploration of additional classes of RNAs. RESULTS: Here, we explored human small RNAs by unbiased sequencing of RNAs with sizes of 19-40 nt. We provide substantial evidences for the existence of independent classes of small RNAs. Our data...

  8. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  9. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  10. Reconfigureable network node

    Science.gov (United States)

    Vanderveen, Keith B.; Talbot, Edward B.; Mayer, Laurence E.

    2008-04-08

    Nodes in a network having a plurality of nodes establish communication links with other nodes using available transmission media, as the ability to establish such links becomes available and desirable. The nodes predict when existing communications links will fail, become overloaded or otherwise degrade network effectiveness and act to establish substitute or additional links before the node's ability to communicate with the other nodes on the network is adversely affected. A node stores network topology information and programmed link establishment rules and criteria. The node evaluates characteristics that predict existing links with other nodes becoming unavailable or degraded. The node then determines whether it can form a communication link with a substitute node, in order to maintain connectivity with the network. When changing its communication links, a node broadcasts that information to the network. Other nodes update their stored topology information and consider the updated topology when establishing new communications links for themselves.

  11. Reconfigureable network node

    Energy Technology Data Exchange (ETDEWEB)

    Vanderveen, Keith B. (Tracy, CA); Talbot, Edward B. (Livermore, CA); Mayer, Laurence E. (Davis, CA)

    2008-04-08

    Nodes in a network having a plurality of nodes establish communication links with other nodes using available transmission media, as the ability to establish such links becomes available and desirable. The nodes predict when existing communications links will fail, become overloaded or otherwise degrade network effectiveness and act to establish substitute or additional links before the node's ability to communicate with the other nodes on the network is adversely affected. A node stores network topology information and programmed link establishment rules and criteria. The node evaluates characteristics that predict existing links with other nodes becoming unavailable or degraded. The node then determines whether it can form a communication link with a substitute node, in order to maintain connectivity with the network. When changing its communication links, a node broadcasts that information to the network. Other nodes update their stored topology information and consider the updated topology when establishing new communications links for themselves.

  12. Hidden variables and hidden time in quantum theory

    OpenAIRE

    Kurakin, Pavel V.

    2005-01-01

    Bell's theorem proves only that hidden variables evolving in true physical time can't exist; still the theorem's meaning is usually interpreted intolerably wide. The concept of hidden time (and, in general, hidden space-time) is introduced. Such concept provides a whole new class of physical theories, fully compatible with current knowledge, but giving new tremendous possibilities. Those theories do not violate Bell's theorem.

  13. AN ENERGY EFFICIENT TASK SCHEDULING SCHEME FOR NODE-LAYER HETEROGENEOUS GPU CLUSTERS%面向节点异构GPU集群的能量有效调度方案

    Institute of Scientific and Technical Information of China (English)

    霍洪鹏; 胡新明; 盛冲冲; 吴百锋

    2013-01-01

    GPU-enhanced clusters has become mainstream components in HPC field and are expected to be heterogeneous in node layer as the evolvement of processing elements (CPUs and GPUs) and the expansion of clusters nodes. In this paper, we propose an energy efficient task scheduling scheme for heterogeneous tasks in heterogeneous GPU-enhanced clusters. A formal description is presented to its task and resource model as well as energy consumption evaluation model in this paper. According to specific node selection policy, it can decrease the energy consumption loss of GPUs in idle status. By the division of task types and buddy allocation plus DVFS, it can improve the utilisation of CPU resource. What' s more, proceeding from system level, the scheme is compatible with algorithm-level and instruction-level energy optimisation.%GPU集群已经成为高性能计算(HPC)领域的主流组件.随着处理单元的发展和集群节点的拓展,GPU集群将在节点层面趋于异构化.提出一套针对异构任务在节点异构GPU集群上的能量有效调度方案.形式化地描述其任务和资源模型以及能耗评估模型.通过特定的节点选择策略,减少空闲状态的能耗损失.通过任务类型划分和组合分配以及DVFS,增加CPU资源利用率.该方案从系统层面着手,能够与现有的算法和指令层面的优化方法兼容.

  14. Centrality measures in networks based on nodes attributes, long-range interactions and group influence

    CERN Document Server

    Aleskerov, F; Shvydun, S

    2016-01-01

    We propose a new method for assessing agents influence in network structures, which takes into consideration nodes attributes, individual and group influences of nodes, and the intensity of interactions. This approach helps us to identify both explicit and hidden central elements which cannot be detected by classical centrality measures or other indices.

  15. Research of the Node Operating System (NodeOS) in an Active Network

    Institute of Scientific and Technical Information of China (English)

    HUABei; LIZheng; XIONGYan; GELin

    2005-01-01

    This paper firstly proposes a three-layered NodeOS structural model that divides the functionality of NodeOS among hardware abstraction layer, resource man-agement layer and API layer, and discusses the primary functions of each layer. NodeOS built on this model will be open and programmable. Then, from the view of supporting fair and customized services, this paper puts forward a general NodeOS service model that defines threetypes of NodeOS services according to the tradeoiT between quality of service and cost of service, then specifies a general method to map special application-oriented services to NodeOS services, and lastly discusses the resource allocation policies and corresponding enforcement mechanisms. Finally, after analyzing the security requirements of active net, this paper puts forward a general but powerful security architecture for NodeOS, which embeds elementary security mechanisms in NodeOS by enforcing well-designed domain relations and encapsulating sensitive underlying interfaces, and provides further security services of authorization management and packet checking by integrating additional service facilities.

  16. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  17. Thermoelectric generator hidden in a shirt with a fabric radiator

    Science.gov (United States)

    Leonov, Vladimir; Vullers, Ruud J. M.; Hoof, Chris Van

    2012-06-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers of a shirt and its characteristics are reported.

  18. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  19. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  20. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  1. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  2. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  3. Sentinel node biopsy (image)

    Science.gov (United States)

    Sentinel node biopsy is a technique which helps determine if a cancer has spread (metastasized), or is contained locally. When a ... is closest to the cancer site. Sentinel node biopsy is used to stage many kinds of cancer, ...

  4. Modular sensor network node

    Science.gov (United States)

    Davis, Jesse Harper Zehring; Stark, Jr., Douglas Paul; Kershaw, Christopher Patrick; Kyker, Ronald Dean

    2008-06-10

    A distributed wireless sensor network node is disclosed. The wireless sensor network node includes a plurality of sensor modules coupled to a system bus and configured to sense a parameter. The parameter may be an object, an event or any other parameter. The node collects data representative of the parameter. The node also includes a communication module coupled to the system bus and configured to allow the node to communicate with other nodes. The node also includes a processing module coupled to the system bus and adapted to receive the data from the sensor module and operable to analyze the data. The node also includes a power module connected to the system bus and operable to generate a regulated voltage.

  5. Multiple node remote messaging

    Energy Technology Data Exchange (ETDEWEB)

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Steinmacher-Burow, Burkhard (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  6. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  7. Microgenetic analysis of hidden figures

    OpenAIRE

    Marković Slobodan S.; Gvozdenović Vasilije P.

    2006-01-01

    In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenes...

  8. The Hidden Subgroup Problem

    CERN Document Server

    Wang, Frédéric

    2010-01-01

    We give an overview of the Hidden Subgroup Problem (HSP) as of July 2010, including new results discovered since the survey of arXiv:quant-ph/0411037v1. We recall how the problem provides a framework for efficient quantum algorithms and present the standard methods based on coset sampling. We study the Dihedral and Symmetric HSPs and how they relate to hard problems on lattices and graphs. Finally, we conclude with the known solutions and techniques, describe connections with efficient algorithms as well as miscellaneous variants of HSP. We also bring various contributions to the topic. We show that in theory, we can solve HSP over a given group inductively: the base case is solving HSP over its simple factor groups and the inductive step is building efficient oracles over a normal subgroup N and over the factor group G/N. We apply this analysis to the Dedekindian HSP to get an alternative abelian HSP algorithm based on a change of the underlying group. We also propose a quotient reduction by the normal group...

  9. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs. In......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group.......This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  10. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs of offshor...... of our study is to suggest how hidden costs of offshoring can be mitigated through an explicit orientation towards improving organizational processes and structures as well as experience with offshoring.......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  11. Related Drupal Nodes Block

    NARCIS (Netherlands)

    Van der Vegt, Wim

    2010-01-01

    Related Drupal Nodes Block This module exposes a block that uses Latent Semantic Analysis (Lsa) internally to suggest three nodes that are relevant to the node a user is viewing. This module performs three tasks. 1) It periodically indexes a Drupal site and generates a Lsa Term Document Matrix. Inde

  12. Live and Dead Nodes

    DEFF Research Database (Denmark)

    Jørgensen, Sune Lehman; Jackson, A. D.

    2005-01-01

    In this paper, we explore the consequences of a distinction between `live' and `dead' network nodes; `live' nodes are able to acquire new links whereas `dead' nodes are static. We develop an analytically soluble growing network model incorporating this distinction and show that it can provide a q...

  13. Related Drupal Nodes Block

    NARCIS (Netherlands)

    Van der Vegt, Wim

    2010-01-01

    Related Drupal Nodes Block This module exposes a block that uses Latent Semantic Analysis (Lsa) internally to suggest three nodes that are relevant to the node a user is viewing. This module performs three tasks. 1) It periodically indexes a Drupal site and generates a Lsa Term Document Matrix. Inde

  14. Wikipedia mining of hidden links between political leaders

    CERN Document Server

    Frahm, Klaus M; Shepelyansky, Dima L

    2016-01-01

    We describe a new method of reduced Google matrix which allows to establish direct and hidden links between a subset of nodes of a large directed network. This approach uses parallels with quantum scattering theory, developed for processes in nuclear and mesoscopic physics and quantum chaos. The method is applied to the Wikipedia networks in different language editions analyzing several groups of political leaders of USA, UK, Germany, France, Russia and G20. We demonstrate that this approach allows to recover reliably direct and hidden links among political leaders. We argue that the reduced Google matrix method can form the mathematical basis for studies in social and political sciences analyzing Leader-Members eXchange (LMX).

  15. Wikipedia mining of hidden links between political leaders

    Science.gov (United States)

    Frahm, Klaus M.; Jaffrès-Runser, Katia; Shepelyansky, Dima L.

    2016-12-01

    We describe a new method of reduced Google matrix which allows to establish direct and hidden links between a subset of nodes of a large directed network. This approach uses parallels with quantum scattering theory, developed for processes in nuclear and mesoscopic physics and quantum chaos. The method is applied to the Wikipedia networks in different language editions analyzing several groups of political leaders of USA, UK, Germany, France, Russia and G20. We demonstrate that this approach allows to recover reliably direct and hidden links among political leaders. We argue that the reduced Google matrix method can form the mathematical basis for studies in social and political sciences analyzing Leader-Members eXchange (LMX).

  16. Intramammary lymph nodes.

    Science.gov (United States)

    Egan, R L; McSweeney, M B

    1983-05-15

    Radiographic, gross, and histopathologic studies on 158 whole breasts with primary operable carcinoma revealed intramammary lymph nodes in 28%, and of these breasts, 10% contained a metastatic deposit of carcinoma. Cancerous and noncancerous nodes were found in all quadrants of the breast with the positive ones being in the same quadrant as the carcinoma only 50% of the time. There was no demonstrable connection with the usual lymphatic drainage of the breast. With Stage II carcinoma, positive intramammary lymph nodes had no direct effect on prognosis, merely representing advanced disease and indicating a greater likelihood of axillary metastatic disease. There was a trend toward poorer prognosis in Stage I lesions with positive intramammary lymph nodes. This may indicate the Stage I carcinomas that have a similar prognosis as Stage II tumors. Conceivably, a Stage Ia, positive intramammary lymph node(s) but normal axillary lymph nodes, could be defined and used.

  17. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  18. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  19. Otiy: Loactors tracking nodes

    CERN Document Server

    Boc, Mathias; de Amorim, Marcelo dias

    2007-01-01

    We propose Otiy, a node-centric location service that limits the impact of location updates generate by mobile nodes in IEEE802.11-based wireless mesh networks. Existing location services use node identifiers to determine the locator (aka anchor) that is responsible for keeping track of a node's location. Such a strategy can be inefficient because: (i) identifiers give no clue on the node's mobility and (ii) locators can be far from the source/destination shortest path, which increases both location delays and bandwidth consumption. To solve these issues, Otiy introduces a new strategy that identifies nodes to play the role of locators based on the likelihood of a destination to be close to these nodes- i.e., locators are identified depending on the mobility pattern of nodes. Otiy relies on the cyclic mobility patterns of nodes and creates a slotted agenda composed of a set of predicted locations, defined according to the past and present patterns of mobility. Correspondent nodes fetch this agenda only once a...

  20. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  1. Hidden Variables or Positive Probabilities?

    CERN Document Server

    Rothman, T; Rothman, Tony

    2001-01-01

    Despite claims that Bell's inequalities are based on the Einstein locality condition, or equivalent, all derivations make an identical mathematical assumption: that local hidden-variable theories produce a set of positive-definite probabilities for detecting a particle with a given spin orientation. The standard argument is that because quantum mechanics assumes that particles are emitted in a superposition of states the theory cannot produce such a set of probabilities. We examine a paper by Eberhard who claims to show that a generalized Bell inequality, the CHSH inequality, can be derived solely on the basis of the locality condition, without recourse to hidden variables. We point out that he nonetheless assumes a set of positive-definite probabilities, which supports the claim that hidden variables or "locality" is not at issue here, positive-definite probabilities are. We demonstrate that quantum mechanics does predict a set of probabilities that violate the CHSH inequality; however these probabilities ar...

  2. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  3. Hidden symmetries in jammed systems

    Science.gov (United States)

    Morse, Peter K.; Corwin, Eric I.

    2016-07-01

    There are deep, but hidden, geometric structures within jammed systems, associated with hidden symmetries. These can be revealed by repeated transformations under which these structures lead to fixed points. These geometric structures can be found in the Voronoi tesselation of space defined by the packing. In this paper we examine two iterative processes: maximum inscribed sphere (MIS) inversion and a real-space coarsening scheme. Under repeated iterations of the MIS inversion process we find invariant systems in which every particle is equal to the maximum inscribed sphere within its Voronoi cell. Using a real-space coarsening scheme we reveal behavior in geometric order parameters which is length-scale invariant.

  4. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  5. Modeling Multiple Risks: Hidden Domain of Attraction

    CERN Document Server

    Mitra, Abhimanyu

    2011-01-01

    Hidden regular variation is a sub-model of multivariate regular variation and facilitates accurate estimation of joint tail probabilities. We generalize the model of hidden regular variation to what we call hidden domain of attraction. We exhibit examples that illustrate the need for a more general model and discuss detection and estimation techniques.

  6. Pentaquark states with hidden charm

    Science.gov (United States)

    Bijker, Roelof

    2017-07-01

    I develop an extension of the usual three-flavor quark model to four flavors (u, d, s and c), and discuss the classification of pentaquark states with hidden charm. This work is motivated by the recent observation of such states by the LHCb Collatoration at CERN.

  7. Microgenetic analysis of hidden figures

    Directory of Open Access Journals (Sweden)

    Marković Slobodan S.

    2006-01-01

    Full Text Available In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenesis of the perception of hidden figures was investigated. The primed matching paradigm and the same-different task were used. In each experiment two types of test figures were contrasted: the more frequent and the less frequent ones. There were two prime types: identical (equal to test figures and complex (the pattern with hidden test figures. The prime duration was varied, 50 ms and 400 ms. The main result indicates that in the case of complex priming the more frequent test figures were processed significantly faster than the less frequent ones in both prime duration conditions. These results suggest that the faster the processing of a figure, the more probable the perceptual generation of this figure.

  8. Deploying Node.js

    CERN Document Server

    Pasquali, Sandro

    2015-01-01

    If you are an intermediate or advanced developer deploying your Node.js applications, then this book is for you. If you have already built a Node application or module and want to take your knowledge to the next level, this book will help you find your way.

  9. Underwater Sensor Nodes and Networks

    Directory of Open Access Journals (Sweden)

    Jaime Lloret

    2013-09-01

    Full Text Available Sensor technology has matured enough to be used in any type of environment. The appearance of new physical sensors has increased the range of environmental parameters for gathering data. Because of the huge amount of unexploited resources in the ocean environment, there is a need of new research in the field of sensors and sensor networks. This special issue is focused on collecting recent advances on underwater sensors and underwater sensor networks in order to measure, monitor, surveillance of and control of underwater environments. On the one hand, from the sensor node perspective, we will see works related with the deployment of physical sensors, development of sensor nodes and transceivers for sensor nodes, sensor measurement analysis and several issues such as layer 1 and 2 protocols for underwater communication and sensor localization and positioning systems. On the other hand, from the sensor network perspective, we will see several architectures and protocols for underwater environments and analysis concerning sensor network measurements. Both sides will provide us a complete view of last scientific advances in this research field.

  10. Measure of Node Similarity in Multilayer Networks

    DEFF Research Database (Denmark)

    Møllgaard, Anders; Zettler, Ingo; Dammeyer, Jesper

    2016-01-01

    The weight of links in a network is often related to the similarity of thenodes. Here, we introduce a simple tunable measure for analysing the similarityof nodes across different link weights. In particular, we use the measure toanalyze homophily in a group of 659 freshman students at a large...... university.Our analysis is based on data obtained using smartphones equipped with customdata collection software, complemented by questionnaire-based data. The networkof social contacts is represented as a weighted multilayer network constructedfrom different channels of telecommunication as well as data...... might bepresent in one layer of the multilayer network and simultaneously be absent inthe other layers. For a variable such as gender, our measure reveals atransition from similarity between nodes connected with links of relatively lowweight to dis-similarity for the nodes connected by the strongest...

  11. Nonintentional behavioural responses to psi : hidden targets and hidden observers

    OpenAIRE

    Anderson, Mary-Jane Charlotte

    2012-01-01

    Psi is the phenomenon of apparently responding to or receiving information by means other than the recognised senses. Psi information may influence human behaviour, without the individual intending this or even being aware of it. This thesis seeks to investigate nonintentional behavioural responses to psi. We present five empirical studies that investigated nonintentional behavioural responses to psi information. In each study, the psi information was hidden from participants, ...

  12. Revealing pentimenti: the hidden history in a painting

    Science.gov (United States)

    Gooch, Amy A.

    2007-02-01

    Art conservators often explore X-ray images of paintings to help find pentimenti, the artist's revisions hidden beneath the painting's visible first surfaces. X-ray interpretation is difficult due to artifacts in the image, superimposed features from all paint layers, and because image intensity depends on both the paint layer thickness and each pigment's opacity. We present a robust user-guided method to suppress clutter, find visually significant differences between X-ray images and color photographs, and visualize them together. These tools allow domain experts as well as museum visitors to explore the artist's creative decisions that led to a masterpiece.

  13. Swollen lymph nodes

    Science.gov (United States)

    ... gingivitis ) Mononucleosis Mouth sores Sexually transmitted illness (STI) Tonsillitis Tuberculosis Skin infections Immune or autoimmune disorders that ... goes away in a couple of days, without treatment. The lymph node may not return to its ...

  14. Lymph node culture

    Science.gov (United States)

    Culture - lymph node ... or viruses grow. This process is called a culture. Sometimes, special stains are also used to identify specific cells or microorganisms before culture results are available. If needle aspiration does not ...

  15. Measure of Node Similarity in Multilayer Networks.

    Directory of Open Access Journals (Sweden)

    Anders Mollgaard

    Full Text Available The weight of links in a network is often related to the similarity of the nodes. Here, we introduce a simple tunable measure for analysing the similarity of nodes across different link weights. In particular, we use the measure to analyze homophily in a group of 659 freshman students at a large university. Our analysis is based on data obtained using smartphones equipped with custom data collection software, complemented by questionnaire-based data. The network of social contacts is represented as a weighted multilayer network constructed from different channels of telecommunication as well as data on face-to-face contacts. We find that even strongly connected individuals are not more similar with respect to basic personality traits than randomly chosen pairs of individuals. In contrast, several socio-demographics variables have a significant degree of similarity. We further observe that similarity might be present in one layer of the multilayer network and simultaneously be absent in the other layers. For a variable such as gender, our measure reveals a transition from similarity between nodes connected with links of relatively low weight to dis-similarity for the nodes connected by the strongest links. We finally analyze the overlap between layers in the network for different levels of acquaintanceships.

  16. Measure of Node Similarity in Multilayer Networks

    Science.gov (United States)

    Mollgaard, Anders; Zettler, Ingo; Dammeyer, Jesper; Jensen, Mogens H.; Lehmann, Sune; Mathiesen, Joachim

    2016-01-01

    The weight of links in a network is often related to the similarity of the nodes. Here, we introduce a simple tunable measure for analysing the similarity of nodes across different link weights. In particular, we use the measure to analyze homophily in a group of 659 freshman students at a large university. Our analysis is based on data obtained using smartphones equipped with custom data collection software, complemented by questionnaire-based data. The network of social contacts is represented as a weighted multilayer network constructed from different channels of telecommunication as well as data on face-to-face contacts. We find that even strongly connected individuals are not more similar with respect to basic personality traits than randomly chosen pairs of individuals. In contrast, several socio-demographics variables have a significant degree of similarity. We further observe that similarity might be present in one layer of the multilayer network and simultaneously be absent in the other layers. For a variable such as gender, our measure reveals a transition from similarity between nodes connected with links of relatively low weight to dis-similarity for the nodes connected by the strongest links. We finally analyze the overlap between layers in the network for different levels of acquaintanceships. PMID:27300084

  17. Active Learning for Node Classification in Assortative and Disassortative Networks

    CERN Document Server

    Moore, Cristopher; Zhu, Yaojia; Rouquier, Jean-Baptiste; Lane, Terran

    2011-01-01

    In many real-world networks, nodes have class labels, attributes, or variables that affect the network's topology. If the topology of the network is known but the labels of the nodes are hidden, we would like to select a small subset of nodes such that, if we knew their labels, we could accurately predict the labels of all the other nodes. We develop an active learning algorithm for this problem which uses information-theoretic techniques to choose which nodes to explore. We test our algorithm on networks from three different domains: a social network, a network of English words that appear adjacently in a novel, and a marine food web. Our algorithm makes no initial assumptions about how the groups connect, and performs well even when faced with quite general types of network structure. In particular, we do not assume that nodes of the same class are more likely to be connected to each other---only that they connect to the rest of the network in similar ways.

  18. Hidden Tree Structure is a Key to the Emergence of Scaling in the World Wide Web

    Institute of Scientific and Technical Information of China (English)

    ZHENG Bo-Jin; WANG Jian-Min; CHEN Gui-Sheng; JIANG Jian; SHEN Xian-Jun

    2011-01-01

    Preferential attachment is the most popular explanation for the emergence of scaling behavior in the World Wide Web, but this explanation has been challenged by the global information hypothesis, the existence of linear preference and the emergence of new big internet companies in the real world. We notice that most websites have an obvious feature that their pages are organized as a tree (namely hidden tree) and hence propose a new model that introduces a hidden tree structure into the Erd(o)s-Rényi model by adding a new rule: when one node connects to another, it should also connect to all nodes in the path between these two nodes in the hidden tree. The experimental results show that the degree distribution of the generated graphs would obey power law distributions and have variable high clustering coefficients and variable small average lengths of shortest paths. The proposed model provides an alternative explanation to the emergence of scaling in the World Wide Web without the above-mentioned difficulties, and also explains the "preferential attachment" phenomenon.

  19. Hidden Tree Structure is a Key to the Emergence of Scaling in the World Wide Web

    Science.gov (United States)

    Zheng, Bo-Jin; Wang, Jian-Min; Chen, Gui-Sheng; Jiang, Jian; Shen, Xian-Jun

    2011-01-01

    Preferential attachment is the most popular explanation for the emergence of scaling behavior in the World Wide Web, but this explanation has been challenged by the global information hypothesis, the existence of linear preference and the emergence of new big internet companies in the real world. We notice that most websites have an obvious feature that their pages are organized as a tree (namely hidden tree) and hence propose a new model that introduces a hidden tree structure into the Erdös—Rényi model by adding a new rule: when one node connects to another, it should also connect to all nodes in the path between these two nodes in the hidden tree. The experimental results show that the degree distribution of the generated graphs would obey power law distributions and have variable high clustering coefficients and variable small average lengths of shortest paths. The proposed model provides an alternative explanation to the emergence of scaling in the World Wide Web without the above-mentioned difficulties, and also explains the “preferential attachment" phenomenon.

  20. On quantum algorithms for noncommutative hidden subgroups

    Energy Technology Data Exchange (ETDEWEB)

    Ettinger, M. [Los Alamos National Lab., NM (United States); Hoeyer, P. [Odense Univ. (Denmark)

    1998-12-01

    Quantum algorithms for factoring and discrete logarithm have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the possibility of extending this general viewpoint to finding hidden subgroups of noncommutative groups. The authors present a quantum algorithm for the special case of dihedral groups which determines the hidden subgroup in a linear number of calls to the input function. They also explore the difficulties of developing an algorithm to process the data to explicitly calculate a generating set for the subgroup. A general framework for the noncommutative hidden subgroup problem is discussed and they indicate future research directions.

  1. Lesson Nine Sinus node dysfunction

    Institute of Scientific and Technical Information of China (English)

    鲁端; 吴文烈

    2004-01-01

    @@ Sinus node dysfunction most often is found in the elderly as an isolated phenomenon. Although interruption of the blood supply to the sinus node may produce dysfunction, the correlation between obstruction of the sinus node artery and clinical evidence of sinus node dysfunction is poor.

  2. 物联网感知层多Sink节点关联算法研究%Research on Multi-Sink Node Association Algorithm of Internet of Things Perception Layer

    Institute of Scientific and Technical Information of China (English)

    王华东; 王大羽

    2015-01-01

    针对大规模无线传感器网络采用单一的Sink节点容易造成网络"能量空洞"效应,而多Sink节点数量和位置的合理部署能有效延长无线传感器网络寿命、控制网络成本,同时多Sink节点数量和位置是一个NP--难问题,因此提出新颖的萤火虫算法对多Sink节点布局模型问题进行求解计算,并对算法的计算精度、效率进行了分析.通过理论分析和仿真验证表明,结果表明文中提出基于萤火虫算法的多Sink节点布局模型与随机分布,基于遗传算法、蚁群算法的多Sink节点部署算法相比,能够有效降低无线传感器网络的能量消耗,减少端到端网络延时,降低网络部署成本,提高网络服务效率,延长网络的生存期.%In large-scale wireless sensor networks monitoring environment,using a single Sink node in the network is likely to cause "energy hole" effect ,while Sink node number and location of proper deployment can cost effectively extend the lifetime of wireless sensor networks,control network costs,at the same time multi-Sink node number and location is an NP - hard problem.Therefore propose the firefly algorithm to solve the problems of the multiple Sink node layout model calculation,and analyses the calculation accuracy and efficiency of algorithm.Theoretical analysis and simulation results show that the proposed in this paper based on the firefly algorithm Sink node layout model with random distribution,based on genetic algorithm,ant colony algorithm Sink node deployment algorithm,can effectively reduce the energy consumption of wireless sensor networks,reducing end-to-end network delay,reduce network deployment costs,improve network efficiency and prolong the lifetime of the network.

  3. Instant node package module

    CERN Document Server

    Ali, Juzer

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A practical exploration of the lifecycle of creating node modules as well as learning all of the top features that npm has to offer.Intended for readers who want to create their first node.js modules. The programming paradigm of JavaScript is not covered so a foundation in these concepts would be beneficial.

  4. Data driven CAN node reliability assessment for manufacturing system

    Science.gov (United States)

    Zhang, Leiming; Yuan, Yong; Lei, Yong

    2017-01-01

    The reliability of the Controller Area Network(CAN) is critical to the performance and safety of the system. However, direct bus-off time assessment tools are lacking in practice due to inaccessibility of the node information and the complexity of the node interactions upon errors. In order to measure the mean time to bus-off(MTTB) of all the nodes, a novel data driven node bus-off time assessment method for CAN network is proposed by directly using network error information. First, the corresponding network error event sequence for each node is constructed using multiple-layer network error information. Then, the generalized zero inflated Poisson process(GZIP) model is established for each node based on the error event sequence. Finally, the stochastic model is constructed to predict the MTTB of the node. The accelerated case studies with different error injection rates are conducted on a laboratory network to demonstrate the proposed method, where the network errors are generated by a computer controlled error injection system. Experiment results show that the MTTB of nodes predicted by the proposed method agree well with observations in the case studies. The proposed data driven node time to bus-off assessment method for CAN networks can successfully predict the MTTB of nodes by directly using network error event data.

  5. Proof of node densities

    NARCIS (Netherlands)

    Klein Wolterink, W.; Heijenk, G.; Berg, van den J.L.

    2012-01-01

    In this paper we present an analytical model accurately describing the forwarding behaviour of a multi-hop broadcast protocol. Our model covers the scenario in which a message is forwarded over a straight road and inter-node distances are distributed exponentially. Intermediate forwarders draw a sma

  6. Discovering Hidden Painted Images: Subsurface Imaging Using Microscale Spatially Offset Raman Spectroscopy.

    Science.gov (United States)

    Botteon, Alessandra; Conti, Claudia; Realini, Marco; Colombo, Chiara; Matousek, Pavel

    2017-01-03

    We demonstrate for the first time the mapping capability of micro-spatially offset Raman spectroscopy (micro-SORS). The technique enables to form noninvasive images of thin sublayers through highly turbid overlayers. The approach is conceptually demonstrated on recovering overpainted images in situations where conventional Raman microscopy was unable to visualize the sublayer. The specimens mimic real situations encountered in Cultural Heritage that deal, for example, with hidden paintings vandalized with graffiti or covered by superimposed painted layers or whitewash. Additionally, using a letter as a hidden image, we demonstrated the micro-SORS potential to reconstruct also a hidden writing covered, for example, with paper sheets that cannot be easily removed. Potential applications could also include other disciplines such as polymers, biological, catalytic, and forensic sciences where thin, highly turbid layers mask chemically distinct subsurface structures.

  7. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  8. Estimating an Activity Driven Hidden Markov Model

    OpenAIRE

    Meyer, David A.; Shakeel, Asif

    2015-01-01

    We define a Hidden Markov Model (HMM) in which each hidden state has time-dependent $\\textit{activity levels}$ that drive transitions and emissions, and show how to estimate its parameters. Our construction is motivated by the problem of inferring human mobility on sub-daily time scales from, for example, mobile phone records.

  9. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  10. Measure of Node Similarity in Multilayer Networks

    CERN Document Server

    Mollgaard, Anders; Dammeyer, Jesper; Jensen, Mogens H; Lehmann, Sune; Mathiesen, Joachim

    2016-01-01

    The weight of links in a network is often related to the similarity of the nodes. Here, we introduce a simple tunable measure for analysing the similarity of nodes across different link weights. In particular, we use the measure to analyze homophily in a group of 659 freshman students at a large university. Our analysis is based on data obtained using smartphones equipped with custom data collection software, complemented by questionnaire-based data. The network of social contacts is represented as a weighted multilayer network constructed from different channels of telecommunication as well as data on face-to-face contacts. We find that even strongly connected individuals are not more similar with respect to basic personality traits than randomly chosen pairs of individuals. In contrast, several socio-demographics variables have a significant degree of similarity. We further observe that similarity might be present in one layer of the multilayer network and simultaneously be absent in the other layers. For a...

  11. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  12. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  13. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  14. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  15. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  16. Hidden Web信息获取

    Institute of Scientific and Technical Information of China (English)

    陈珂; 陈小英; 徐科

    2007-01-01

    如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词.由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面.然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值.文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息.

  17. Network structure exploration in networks with node attributes

    Science.gov (United States)

    Chen, Yi; Wang, Xiaolong; Bu, Junzhao; Tang, Buzhou; Xiang, Xin

    2016-05-01

    Complex networks provide a powerful way to represent complex systems and have been widely studied during the past several years. One of the most important tasks of network analysis is to detect structures (also called structural regularities) embedded in networks by determining group number and group partition. Most of network structure exploration models only consider network links. However, in real world networks, nodes may have attributes that are useful for network structure exploration. In this paper, we propose a novel Bayesian nonparametric (BNP) model to explore structural regularities in networks with node attributes, called Bayesian nonparametric attribute (BNPA) model. This model does not only take full advantage of both links between nodes and node attributes for group partition via shared hidden variables, but also determine group number automatically via the Bayesian nonparametric theory. Experiments conducted on a number of real and synthetic networks show that our BNPA model is able to automatically explore structural regularities in networks with node attributes and is competitive with other state-of-the-art models.

  18. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...

  19. Hidden scale in quantum mechanics

    CERN Document Server

    Giri, Pulak Ranjan

    2007-01-01

    We show that the intriguing localization of a free particle wave-packet is possible due to a hidden scale present in the system. Self-adjoint extensions (SAE) is responsible for introducing this scale in quantum mechanical models through the nontrivial boundary conditions. We discuss a couple of classically scale invariant free particle systems to illustrate the issue. In this context it has been shown that a free quantum particle moving on a full line may have localized wave-packet around the origin. As a generalization, it has also been shown that particles moving on a portion of a plane or on a portion of a three dimensional space can have unusual localized wave-packet.

  20. Node seniority ranking

    CERN Document Server

    Fioriti, Vincenzo

    2014-01-01

    Recent advances in graph theory suggest that is possible to identify the oldest nodes of a network using only the graph topology. Here we report on applications to heterogeneous real world networks. To this end, and in order to gain new insights, we propose the theoretical framework of the Estrada communicability. We apply it to two technological networks (an underground, the diffusion of a software worm in a LAN) and to a third network representing a cholera outbreak. In spite of errors introduced in the adjacency matrix of their graphs, the identification of the oldest nodes is feasible, within a small margin of error, and extremely simple. Utilizations include the search of the initial disease-spreader (patient zero problem), rumors in social networks, malware in computer networks, triggering events in blackouts, oldest urban sites recognition.

  1. One node driving synchronisation.

    Science.gov (United States)

    Wang, Chengwei; Grebogi, Celso; Baptista, Murilo S

    2015-12-11

    Abrupt changes of behaviour in complex networks can be triggered by a single node. This work describes the dynamical fundamentals of how the behaviour of one node affects the whole network formed by coupled phase-oscillators with heterogeneous coupling strengths. The synchronisation of phase-oscillators is independent of the distribution of the natural frequencies, weakly depends on the network size, but highly depends on only one key oscillator whose ratio between its natural frequency in a rotating frame and its coupling strength is maximum. This result is based on a novel method to calculate the critical coupling strength with which the phase-oscillators emerge into frequency synchronisation. In addition, we put forward an analytical method to approximately calculate the phase-angles for the synchronous oscillators.

  2. One node driving synchronisation

    CERN Document Server

    Wang, Chengwei; Baptista, Murilo S

    2015-01-01

    Abrupt changes of behaviour in complex networks can be triggered by a single node. This work describes the dynamical fundamentals of how the behaviour of one node affects the whole network formed by coupled phase-oscillators with heterogeneous coupling strengths. The synchronisation of phase-oscillators is independent of the distribution of the natural frequencies, weakly depends on the network size, but highly depends on only one key oscillator whose ratio between its natural frequency in a rotating frame and its coupling strength is maximum. This result is based on a novel method to calculate the critical coupling strength with which the phase-oscillators emerge into frequency synchronisation. In addition, we put forward an analytical method to approximately calculate the phase-angles for the synchronous oscillators.

  3. Involved Node Radiation Therapy

    DEFF Research Database (Denmark)

    Maraldo, Maja V; Aznar, Marianne C; Vogelius, Ivan R

    2012-01-01

    PURPOSE: The involved node radiation therapy (INRT) strategy was introduced for patients with Hodgkin lymphoma (HL) to reduce the risk of late effects. With INRT, only the originally involved lymph nodes are irradiated. We present treatment outcome in a retrospective analysis using this strategy...... to 36 Gy). Patients attended regular follow-up visits until 5 years after therapy. RESULTS: The 4-year freedom from disease progression was 96.4% (95% confidence interval: 92.4%-100.4%), median follow-up of 50 months (range: 4-71 months). Three relapses occurred: 2 within the previous radiation field......, and 1 in a previously uninvolved region. The 4-year overall survival was 94% (95% confidence interval: 88.8%-99.1%), median follow-up of 58 months (range: 4-91 months). Early radiation therapy toxicity was limited to grade 1 (23.4%) and grade 2 (13.8%). During follow-up, 8 patients died, none from HL, 7...

  4. Node web development

    CERN Document Server

    Herron, David

    2013-01-01

    Presented in a simple, step-by-step format, this book is an introduction to web development with Node.This book is for anybody looking for an alternative to the ""P"" languages (Perl, PHP, Python), or anyone looking for a new paradigm of server-side application development.The reader should have at least a rudimentary understanding of JavaScript and web application development.

  5. Efficient MAC Protocol for Hybrid Wireless Network with Heterogeneous Sensor Nodes

    Directory of Open Access Journals (Sweden)

    Md. Nasre Alam

    2016-01-01

    Full Text Available Although several Directional Medium Access Control (DMAC protocols have been designed for use with homogeneous networks, it can take a substantial amount of time to change sensor nodes that are equipped with an omnidirectional antenna for sensor nodes with a directional antenna. Thus, we require a novel MAC protocol for use with an intermediate wireless network that consists of heterogeneous sensor nodes equipped with either an omnidirectional antenna or a directional antenna. The MAC protocols that have been designed for use in homogeneous networks are not suitable for use in a hybrid network due to deaf, hidden, and exposed nodes. Therefore, we propose a MAC protocol that exploits the characteristics of a directional antenna and can also work efficiently with omnidirectional nodes in a hybrid network. In order to address the deaf, hidden, and exposed node problems, we define RTS/CTS for the neighbor (RTSN/CTSN and Neighbor Information (NIP packets. The performance of the proposed MAC protocol is evaluated through a numerical analysis using a Markov model. In addition, the analytical results of the MAC protocol are verified through an OPNET simulation.

  6. Analysis of High Degree Nodes in a Social Network

    Directory of Open Access Journals (Sweden)

    Nadeem Akhtar

    2013-05-01

    Full Text Available Online Social Network platforms(e.g. Facebook, LinkedIn, Flickr, Instant Messenger etc provide a deeper comprehension of social networks and hence render the basis for social network analysis. The huge amount of data from these sites has given a boost to the researchers who examine a network from different perspectives through various SNA methods. The development of network analysis tools have further helped to extract actionable patterns which are useful for business, consumers, and users. This study is a part of the growing body of research on Social Network Analysis and make use of a Facebook network to analyze the attributes of high degree nodes (users having greater number of friends and to uncover the hidden relationships of that network. Results show that there is little association among high degree nodes

  7. Node Classification in Social Networks

    Science.gov (United States)

    Bhagat, Smriti; Cormode, Graham; Muthukrishnan, S.

    When dealing with large graphs, such as those that arise in the context of online social networks, a subset of nodes may be labeled. These labels can indicate demographic values, interest, beliefs or other characteristics of the nodes (users). A core problem is to use this information to extend the labeling so that all nodes are assigned a label (or labels).

  8. Hidden torsion, 3-manifolds, and homology cobordism

    CERN Document Server

    Cha, Jae Choon

    2011-01-01

    This paper continues our exploration of homology cobordism of 3-manifolds using our recent results on Cheeger-Gromov rho-invariants associated to amenable representations. We introduce a new type of torsion in 3-manifold groups we call hidden torsion, and an algebraic approximation we call local hidden torsion. We construct infinitely many hyperbolic 3-manifolds which have local hidden torsion in the transfinite lower central subgroup. By realizing Cheeger-Gromov invariants over amenable groups, we show that our hyperbolic 3-manifolds are not pairwise homology cobordant, yet remain indistinguishable by any prior known homology cobordism invariants.

  9. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  10. Visible Effects of Invisible Hidden Valley Radiation

    CERN Document Server

    Carloni, Lisa

    2010-01-01

    Assuming there is a new gauge group in a Hidden Valley, and a new type of radiation, can we observe it through its effect on the kinematic distributions of recoiling visible particles? Specifically, what are the collider signatures of radiation in a hidden sector? We address these questions using a generic SU(N)-like Hidden Valley model that we implement in Pythia. We find that in both the e+e- and the LHC cases the kinematic distributions of the visible particles can be significantly affected by the valley radiation. Without a proper understanding of such effects, inferred masses of "communicators" and of invisible particles can be substantially off.

  11. Inferring hidden states in Langevin dynamics on large networks: Average case performance

    Science.gov (United States)

    Bravi, B.; Opper, M.; Sollich, P.

    2017-01-01

    We present average performance results for dynamical inference problems in large networks, where a set of nodes is hidden while the time trajectories of the others are observed. Examples of this scenario can occur in signal transduction and gene regulation networks. We focus on the linear stochastic dynamics of continuous variables interacting via random Gaussian couplings of generic symmetry. We analyze the inference error, given by the variance of the posterior distribution over hidden paths, in the thermodynamic limit and as a function of the system parameters and the ratio α between the number of hidden and observed nodes. By applying Kalman filter recursions we find that the posterior dynamics is governed by an "effective" drift that incorporates the effect of the observations. We present two approaches for characterizing the posterior variance that allow us to tackle, respectively, equilibrium and nonequilibrium dynamics. The first appeals to Random Matrix Theory and reveals average spectral properties of the inference error and typical posterior relaxation times; the second is based on dynamical functionals and yields the inference error as the solution of an algebraic equation.

  12. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  13. Identifying key nodes in multilayer networks based on tensor decomposition

    Science.gov (United States)

    Wang, Dingjie; Wang, Haitao; Zou, Xiufen

    2017-06-01

    The identification of essential agents in multilayer networks characterized by different types of interactions is a crucial and challenging topic, one that is essential for understanding the topological structure and dynamic processes of multilayer networks. In this paper, we use the fourth-order tensor to represent multilayer networks and propose a novel method to identify essential nodes based on CANDECOMP/PARAFAC (CP) tensor decomposition, referred to as the EDCPTD centrality. This method is based on the perspective of multilayer networked structures, which integrate the information of edges among nodes and links between different layers to quantify the importance of nodes in multilayer networks. Three real-world multilayer biological networks are used to evaluate the performance of the EDCPTD centrality. The bar chart and ROC curves of these multilayer networks indicate that the proposed approach is a good alternative index to identify real important nodes. Meanwhile, by comparing the behavior of both the proposed method and the aggregated single-layer methods, we demonstrate that neglecting the multiple relationships between nodes may lead to incorrect identification of the most versatile nodes. Furthermore, the Gene Ontology functional annotation demonstrates that the identified top nodes based on the proposed approach play a significant role in many vital biological processes. Finally, we have implemented many centrality methods of multilayer networks (including our method and the published methods) and created a visual software based on the MATLAB GUI, called ENMNFinder, which can be used by other researchers.

  14. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  15. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  16. Faddeev-Jackiw approach to hidden symmetries

    CERN Document Server

    Wotzasek, C

    1994-01-01

    The study of hidden symmetries within Dirac's formalism does not possess a systematic procedure due to the lack of first-class constraints to act as symmetry generators. On the other hand, in the Faddeev-Jackiw approach, gauge and reparametrization symmetries are generated by the null eigenvectors of the sympletic matrix and not by constraints, suggesting the possibility of dealing systematically with hidden symmetries through this formalism. It is shown in this paper that indeed hidden symmetries of noninvariant or gauge fixed systems are equally well described by null eigenvectors of the sympletic matrix, just as the explicit invariances. The Faddeev-Jackiw approach therefore provide a systematic algorithm for treating all sorts of symmetries in an unified way. This technique is illustrated here by the SL(2,R) Kac-Moody current algebra of the 2-D induced gravity proposed by Polyakov, which is a hidden symmetry in the canonical approach of constrained systems via Dirac's method, after conformal and reparamet...

  17. Fibroid Tumors in Women: A Hidden Epidemic?

    Science.gov (United States)

    ... Issue Past Issues Fibroid Tumors in Women: A Hidden Epidemic? Past Issues / Spring 2007 Table of Contents ... fibroids@rics.bwh.harvard.edu , or visit our Web site: www.fibroids.net . You may also write ...

  18. Hidden Regular Variation: Detection and Estimation

    CERN Document Server

    Mitra, Abhimanyu

    2010-01-01

    Hidden regular variation defines a subfamily of distributions satisfying multivariate regular variation on $\\mathbb{E} = [0, \\infty]^d \\backslash \\{(0,0, ..., 0) \\} $ and models another regular variation on the sub-cone $\\mathbb{E}^{(2)} = \\mathbb{E} \\backslash \\cup_{i=1}^d \\mathbb{L}_i$, where $\\mathbb{L}_i$ is the $i$-th axis. We extend the concept of hidden regular variation to sub-cones of $\\mathbb{E}^{(2)}$ as well. We suggest a procedure of detecting the presence of hidden regular variation, and if it exists, propose a method of estimating the limit measure exploiting its semi-parametric structure. We exhibit examples where hidden regular variation yields better estimates of probabilities of risk sets.

  19. The Hidden Zone of the Skaergaard Intrusion Revealed

    Science.gov (United States)

    Tegner, Christian; Salmonsen, Lars Peter

    2013-04-01

    The Hidden Zone of Skaergaard was hypothesized by LR Wager and co-workers as representing a large, unexposed, basal cumulate series rich in calcic plagioclase and with subordinate olivine and pyroxene. Although the size, shape and composition of this subzone have been debated, all subsequent works include it in their models. In 1966 a team from Oxford and Cambridge drilled a core penetrating most of Lower Zone a of the exposed Layered Series and c. 150 metres into the Hidden Zone. This core was drilled close to the western margin of the intrusion but did not reach the base although S. Maaløe argued it stopped near to the basement contact. Recent work on this core is underway by M. Holness and co-workers. Here we report on "new" outcrops at Dobbeltgletscheren in the central, basal zone of the northern part of the intrusion; these outcrops appear to be exposed only recently due to melting of the glaciers. A c. 200 m thick section is exposed. Upwards the section grades into typical Lower Zone rocks. Downwards the section is covered by ice and moraine, and the contact to the underlying basement is not exposed. The lowermost outcrops are composed of fine-grained, olivine-rich micro-troctolite layered on a scale of centimetres to decimetres. The melanocratic layers have a distinct sugary texture due to abundant (up to 60% by volume), equant olivine grains typically 0.5-1 mm across. The plagioclase is of similar size and with habits ranging from subhedral laths to anhedral grains interstitial to olivine, and oikocrysts of Ca-rich and Ca-poor pyroxene enclose equant olivine and subhedral plagioclase laths as chadacrysts. The lighter coloured mesocratic layers show the same mineralogy with less olivine (up to 40%) and more and slightly larger plagioclase relative to the melanocratic layers. Upsection the layering largely fades away and the grain size increases gradually reaching textures similar to typical Lower Zone a. Olivine (Fo72-64, 0.22-0.17 wt% NiO) and plagioclase

  20. A chaotic system with a single unstable node

    Energy Technology Data Exchange (ETDEWEB)

    Sprott, J.C. [Department of Physics, University of Wisconsin, Madison, WI 53706 (United States); Jafari, Sajad, E-mail: sajadjafari@aut.ac.ir [Biomedical Engineering Department, Amirkabir University of Technology, Tehran 15875-4413 (Iran, Islamic Republic of); Pham, Viet-Thanh [School of Electronics and Telecommunications, Hanoi University of Science and Technology, 01 Dai Co Viet, Hanoi (Viet Nam); Hosseini, Zahra Sadat [Biomedical Engineering Department, Amirkabir University of Technology, Tehran 15875-4413 (Iran, Islamic Republic of)

    2015-09-25

    This paper describes an unusual example of a three-dimensional dissipative chaotic flow with quadratic nonlinearities in which the only equilibrium is an unstable node. The region of parameter space with bounded solutions is relatively small as is the basin of attraction, which accounts for the difficulty of its discovery. Furthermore, for some values of the parameters, the system has an attracting torus, which is uncommon in three-dimensional systems, and this torus can coexist with a strange attractor or with a limit cycle. The limit cycle and strange attractor exhibit symmetry breaking and attractor merging. All the attractors appear to be hidden in that they cannot be found by starting with initial conditions in the vicinity of the equilibrium, and thus they represent a new type of hidden attractor with important and potentially problematic engineering consequences. - Highlights: • An unusual example of a three-dimensional dissipative chaotic flow is introduced. • In this system the only equilibrium is an unstable node. • For some values of the parameters, the system has an attracting torus. • This torus can coexist with a strange attractor or with a limit cycle. • These properties are uncommon in three-dimensional systems.

  1. Hidden figures are ever present.

    Science.gov (United States)

    Mens, L H; Leeuwenberg, E L

    1988-11-01

    Preference judgments about alternative interpretations of unambiguous patterns can be explained in terms of a rivalry between a preferred and a second-best interpretation (cf. Leeuwenberg & Buffart, 1983). We tested whether this second-best interpretation corresponds to a suppressed but concurrently present interpretation or whether it merely reflects an alternative view that happens to be preferred less often. Two patterns were present immediately following each other with a very short onset asynchrony: a complete pattern and one out of three possible subpatterns of it, corresponding to the best, the second best, or an odd interpretation of the complete pattern. Subjects indicated which subpattern was presented by choosing among the three subpatterns shown after each trial. The scores, corrected for response-bias effects, indicated a relative facilitation of the second-best interpretation, in agreement with its predicted "hidden" presence. This result is more in line with theories that capitalize on the quality of the finally selected representation than with processing models aimed at reaching one single solution as fast and as economically as possible.

  2. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  3. Hidden local symmetry and beyond

    Science.gov (United States)

    Yamawaki, Koichi

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here, I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H = SU(2)L × SU(2)R/SU(2)V with additional symmetry, the nonlinearly-realized scale symmetry. Then, the SM does have a dynamical gauge boson of the SU(2)V HLS, "SM ρ meson", in addition to the Higgs as a pseudo-dilaton as well as the NG bosons to be absorbed in to the W and Z. Based on the recent work done with Matsuzaki and Ohki, I discuss a novel possibility that the SM ρ meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "dark SM skyrmion (DSMS)".

  4. Constraining solar hidden photons using HPGe detector

    Energy Technology Data Exchange (ETDEWEB)

    Horvat, R.; Kekez, D., E-mail: Dalibor.Kekez@irb.hr; Krčmar, M.; Krečak, Z.; Ljubičić, A.

    2013-04-25

    In this Letter we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory. With our experimental setup we observe the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, entails both photon into hidden state oscillations and a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in Sun's interior as well as in the detector. We exclude hidden photons with kinetic couplings χ>(2.2×10{sup −13}–3×10{sup −7}) in the mass region 0.2 eV≲m{sub γ{sup ′}}≲30 keV. Our constraints on the mixing parameter χ in the mass region from 20 eV up to 15 keV prove even slightly better then those obtained recently by using data from the CAST experiment, albeit still somewhat weaker than those obtained from solar and HB stars lifetime arguments.

  5. Time-reversal symmetry breaking hidden order in Sr2(Ir,Rh)O4

    Science.gov (United States)

    Jeong, Jaehong; Sidis, Yvan; Louat, Alex; Brouet, Véronique; Bourges, Philippe

    2017-04-01

    Layered 5d transition iridium oxides, Sr2(Ir,Rh)O4, are described as unconventional Mott insulators with strong spin-orbit coupling. The undoped compound, Sr2IrO4, is a nearly ideal two-dimensional pseudospin-1/2 Heisenberg antiferromagnet, similarly to the insulating parent compound of high-temperature superconducting copper oxides. Using polarized neutron diffraction, we here report a hidden magnetic order in pure and doped Sr2(Ir,Rh)O4, distinct from the usual antiferromagnetic pseudospin ordering. We find that time-reversal symmetry is broken while the lattice translation invariance is preserved in the hidden order phase. The onset temperature matches that of the odd-parity hidden order recently highlighted using optical second-harmonic generation experiments. The novel magnetic order and broken symmetries can be explained by the loop-current model, previously predicted for the copper oxide superconductors.

  6. Hidden geometry of traffic jamming

    Science.gov (United States)

    Andjelković, Miroslav; Gupte, Neelima; Tadić, Bosiljka

    2015-05-01

    We introduce an approach based on algebraic topological methods that allow an accurate characterization of jamming in dynamical systems with queues. As a prototype system, we analyze the traffic of information packets with navigation and queuing at nodes on a network substrate in distinct dynamical regimes. A temporal sequence of traffic density fluctuations is mapped onto a mathematical graph in which each vertex denotes one dynamical state of the system. The coupling complexity between these states is revealed by classifying agglomerates of high-dimensional cliques that are intermingled at different topological levels and quantified by a set of geometrical and entropy measures. The free-flow, jamming, and congested traffic regimes result in graphs of different structure, while the largest geometrical complexity and minimum entropy mark the edge of the jamming region.

  7. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  8. An Algorithm on Generating Lattice Based on Layered Concept Lattice

    Directory of Open Access Journals (Sweden)

    Zhang Chang-sheng

    2013-08-01

    Full Text Available Concept lattice is an effective tool for data analysis and rule extraction, a bottleneck factor on impacting the applications of concept lattice is how to generate lattice efficiently. In this paper, an algorithm LCLG on generating lattice in batch processing based on layered concept lattice is developed, this algorithm is based on layered concept lattice, the lattice is generated downward layer by layer through concept nodes and provisional nodes in current layer; the concept nodes are found parent-child relationships upward layer by layer, then the Hasse diagram of inter-layer connection is generated; in the generated process of the lattice nodes in each layer, we do the pruning operations dynamically according to relevant properties, and delete some unnecessary nodes, such that the generating speed is improved greatly; the experimental results demonstrate that the proposed algorithm has good performance.

  9. Generalization of FEM Using Node-Based Shape Functions

    Directory of Open Access Journals (Sweden)

    Kanok-Nukulchai W.

    2015-12-01

    Full Text Available In standard FEM, the stiffness of an element is exclusively influenced by nodes associated with the element via its element-based shape functions. In this paper, the authors present a method that can be viewed as a generalization of FEM for which the influence of a node is not limited by a hat function around the node. Shape functions over an element can be interpolated over a predefined set of nodes around the element. These node-based shape functions employ Kriging Interpolations commonly found in geostatistical technique. In this study, a set of influencing nodes are covered by surrounding layers of elements defined as its domain of influence (DOI. Thus, the element stiffness is influenced by not only the element nodes, but also satellite nodes outside the element. In a special case with zero satellite nodes, the method is specialized to the conventional FEM. This method is referred to as Node-Based Kriging FEM or K-FEM. The K-FEM has been tested on 2D elastostatic, Reissner-Mindlin’s plate and shell problems. In all cases, exceptionally accurate displacement and stress fields can be achieved with relatively coarse meshes. In addition, the same set of Kringing shape functions can be used to interpolate the mesh geometry. This property is very useful for representing the curved geometry of shells. The distinctive advantage of the K-FEM is its inheritance of the computational procedure of FEM. Any existing FE code can be easily extended to K-FEM; thus, it has a higher chance to be accepted in practice.

  10. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  11. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  12. Centrality of nodes in multiplex networks

    CERN Document Server

    Sola, Luis; Criado, Regino; Flores, Julio; del Amo, Alejandro Garcia; Boccaletti, Stefano

    2013-01-01

    We extend the concept of eigenvector centrality to multiplex networks, and introduce several alternative parameters that quantify the importance of nodes in a multi-layered networked system, including the de?nition of vectorial-type centralities. In addition we rigorously show that, under reasonable conditions, such centrality measures exist and are unique. Computer experiments and simulations demonstrate that the proposed measures provide substantially di?erent results when applied to the same multiplex structure, and highlight the non-trivial relationships between the di?erent measures of centrality introduced.

  13. Probing Hidden Sector Photons through the Higgs Window.

    OpenAIRE

    Ahlers, M.; Jaeckel, J; Redondo, J.; Ringwald, A.

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light...

  14. NRC/UBC Node

    Energy Technology Data Exchange (ETDEWEB)

    Ellis-Perry, B. [Univ. of British Columbia, Vancouver, British Columbia (Canada); Yogendran, Y. [NRC Inst. for Fuel Cell Innovation, Vancouver, British Columbia (Canada)

    2004-07-01

    'Full text:' In the search for cleaner, more sustainable energy sources, many of the most promising breakthroughs have been in hydrogen technology. However, this promise will remain unfulfilled without public interest and enthusiasm, and without the infrastructure to support the technology. In order to get there, we have to test, perfect, and demonstrate technology that is safe and affordable, and we must do so in practical, familiar settings. Ideally, such settings should be easily accessible to the engineers, planners, and architects of tomorrow while providing a showcase for hydrogen technology that will attract the general public. This place is the NRC/UBC Hydrogen Node. The UBC campus in Point Grey is home to leading edge, internationally recognized researchers in a range of disciplines, both within the University and at the NRC Institute for Fuel Cell Innovation. On average, 40,000 students, faculty, and staff use the campus every day; UBC graduates go on to leadership positions in communities around the globe. Its spectacular setting makes UBC a popular destination for thousands of visitors from around the world. In 2006 UBC will host the World Urban Forum, and in 2010 it will be one of the sites for the Vancouver-Whistler Olympic Games. UBC and its South Campus neighbourhoods are developing as a model sustainable community, offering an excellent opportunity to develop and showcase hydrogen infrastructure and technology in a real-life, attractive setting that will be seen by thousands of people around the world. UBC's facilities, location, and Trek 2010 commitment to excellence in learning, research, and sustainability make it an ideal location for such a project. The H2 Village at UBC will be an integrated hydrogen demonstration project, linked to the hydrogen highway. This project is bringing together leading companies, researchers, and government agencies committed to making the refinement and early adoption of safe hydrogen technology a

  15. Dynamic Subchannel Assignment-Based Cross-Layer MAC and Network Protocol for Multihop Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Khanh Nguyen Quang

    2013-01-01

    Full Text Available The paper presents a dynamic subchannel assignment algorithm based on orthogonal frequency division multiple access technology operating in the time division duplexing and a new cross-layer design based on a proposed routing protocol jointed with the MAC protocol. The proposed dynamic sub-channel assignment algorithm provides a new interference avoidance mechanism which solves several drawbacks of existing radio resource allocation techniques in wireless networks using OFDMA/TDD, such as the hidden node and exposed node problems, mobility, and cochannels interference in frequency (CCI. Besides, in wireless networks, when a route is established, the radio resource allocation problems may decrease the end to end performance proportionally with the length of each route. The contention at MAC layer may cause the routing protocol at network layer to respond by finding new routes and routing table updates. The proposed routing protocol is jointed with the MAC protocol based on dynamic sub-channel assignment to ensure that the quality of service in multihop ad hoc networks is significantly improved.

  16. Supersymmetric leptogenesis and light hidden sectors

    CERN Document Server

    Weniger, Christoph

    2010-01-01

    Thermal leptogenesis and supergravity are attractive scenarios for physics beyond the standard model. However, it is well known that the super-weak interaction of the gravitino often leads to problems with primordial nucleosynthesis in the standard scenario of matter parity conserving MSSM + three right-handed neutrinos. We will present and compare two related solutions to these problems: 1) The conflict between BBN and leptogenesis can be avoided in presence of a hidden sector with light supersymmetric particles which open new decay channels for the dangerous long-lived particles. 2) If there is a condensate in the hidden sector, such additional decay channels can be alternatively opened by dynamical breaking of matter parity in the hidden sector.

  17. Receiver-Controlled Multi-Node Cooperation

    Institute of Scientific and Technical Information of China (English)

    Liang Ye; Yue Li; XueJun Sha; Esko Alasaarela

    2014-01-01

    Since wireless links in Ad hoc networks are more fragile than those in traditional wireless networks due to route flapping, multi-node cooperation plays an important role in ensuring the quality of service ( QoS) . Based on the authors’ previous work, this paper proposes a receiver-controlled multi-node cooperation routing protocol, known as AODV-RCC. In this protocol, nodes form a cooperation group based on signal power. In a cooperation group, signal power between a partner and a transmitter, as well as signal power between the partner and the receiver, must be larger than the signal power between the transmitter and the receiver. Otherwise, the transmission will not benefit from cooperation. To avoid collision or congestion, each cooperation group only contains one partner. This partner offers both data and ACK cooperative retransmission. Its retransmission time should be shorter than the internal retry time of the transmitter’ s MAC layer, because it is better for the partner to retransmit firstly, as it offers a more reliable cooperative link. In AODV-RCC, it is the receiver that chooses the partner, because the link between the partner and the receiver is the most important. According to our simulation results, AODV-RCC shortens the end-to-end delay and increases the packet delivery ratio.

  18. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  19. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  20. Hidden simplicity of gauge theory amplitudes

    Science.gov (United States)

    Drummond, J. M.

    2010-11-01

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in \\ {N}=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  1. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...

  2. Dark Radiation from a hidden U(1)

    CERN Document Server

    Vogel, Hendrik

    2015-01-01

    We discuss the impact of a hidden sector consisting of Minicharged Particles (MCPs) and massless hidden photons on the expansion history of our Universe. We present parameter scans for the amount of extra relativistic particles (Neff) and the abundance of light nuclei for fermionic MCPs with masses between ~100 keV and 10 GeV and minicharges in the range 10^(-11)-1. Current CMB and BBN data significantly constrain the available parameter space of MCPs. The shown results are a valuable indicator for future experimental searches and are presented in a flexible way so that more accurate results on Neff can be easily interpreted.

  3. Hidden Symmetries, Central Charges and All That

    CERN Document Server

    de Wit, Bernard; Wit, Bernard de; Nicolai, Hermann

    2001-01-01

    In this review we discuss hidden symmetries of toroidal compactifications of eleven-dimensional supergravity. We recall alternative versions of this theory which exhibit traces of the hidden symmetries when still retaining the massive Kaluza-Klein states. We reconsider them in the broader perspective of M-theory which incorporates a more extended variety of BPS states. We also argue for a new geometry that may underly these theories. All our arguments point towards an extension of the number of space-time coordinates beyond eleven.

  4. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  5. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2015-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  6. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  7. The Corporate Illiterates: The Hidden Illiterates of Silicon Valley.

    Science.gov (United States)

    Chase, Sharon

    1991-01-01

    Describes the writing and business communication problems of college-educated workers in Silicon Valley. Discusses hidden illiterates in the universities and in the workplace. Offers solutions for professors and managers faced with the problem of hidden illiterates. (PRA)

  8. Drawing non-layered tidy trees in linear time

    NARCIS (Netherlands)

    Ploeg, A.J. van der

    2013-01-01

    The well-known Reingold–Tilford algorithm produces tidy-layered drawings of trees: drawings where all nodes at the same depth are vertically aligned. However, when nodes have varying heights, layered drawing may use more vertical space than necessary. A non-layered drawing of a tree places children

  9. Design and Implementation of Domain based Semantic Hidden Web Crawler

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Web is a wide term which mainly consists of surface web and hidden web. One can easily access the surface web using traditional web crawlers, but they are not able to crawl the hidden portion of the web. These traditional crawlers retrieve contents from web pages, which are linked by hyperlinks ignoring the information hidden behind form pages, which cannot be extracted using simple hyperlink structure. Thus, they ignore large amount of data hidden behind search forms. This paper emphasizes o...

  10. Energy Efficient Routing and Node Activity Scheduling in the OCARI Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Saoucene Mahfoudh

    2010-08-01

    Full Text Available Sensor nodes are characterized by a small size, a low cost, an advanced communication technology, but also a limited amount of energy. Energy efficient strategies are required in such networks to maximize network lifetime. In this paper, we focus on a solution integrating energy efficient routing and node activity scheduling. The energy efficient routing we propose, called EOLSR, selects the route and minimizes the energy consumed by an end-to-end transmission, while avoiding nodes with low residual energy. Simulation results show that EOLSR outperforms the solution selecting the route of minimum energy as well as the solution based on node residual energy. Cross-layering allows EOLSR to use information from the application layer or the MAC layer to reduce its overhead and increase network lifetime. Node activity scheduling is based on the following observation: the sleep state is the least power consuming state. So, to schedule node active and sleeping periods, we propose SERENA that colors all network nodes using a small number of colors, such that two nodes with the same color can transmit without interfering. The node color is mapped into a time slot during which the node can transmit. Consequently, each node is awake during its slot and the slots of its one-hop neighbors, and sleeps in the remaining time. We evaluate SERENA benefits obtained in terms of bandwidth, delay and energy. We also show how cross-layering with the application layer can improve the end-to-end delays for data gathering applications.

  11. Variational Hidden Conditional Random Fields with Coupled Dirichlet Process Mixtures

    NARCIS (Netherlands)

    Bousmalis, K.; Zafeiriou, S.; Morency, L.P.; Pantic, Maja; Ghahramani, Z.

    2013-01-01

    Hidden Conditional Random Fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An infinite HCRF is an HCRF with a countably infinite number of hidden states, which rids us not only of the necessit

  12. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless......Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because...

  13. Perceptual consequences of "hidden" hearing loss.

    Science.gov (United States)

    Plack, Christopher J; Barker, Daphne; Prendergast, Garreth

    2014-09-09

    Dramatic results from recent animal experiments show that noise exposure can cause a selective loss of high-threshold auditory nerve fibers without affecting absolute sensitivity permanently. This cochlear neuropathy has been described as hidden hearing loss, as it is not thought to be detectable using standard measures of audiometric threshold. It is possible that hidden hearing loss is a common condition in humans and may underlie some of the perceptual deficits experienced by people with clinically normal hearing. There is some evidence that a history of noise exposure is associated with difficulties in speech discrimination and temporal processing, even in the absence of any audiometric loss. There is also evidence that the tinnitus experienced by listeners with clinically normal hearing is associated with cochlear neuropathy, as measured using Wave I of the auditory brainstem response. To date, however, there has been no direct link made between noise exposure, cochlear neuropathy, and perceptual difficulties. Animal experiments also reveal that the aging process itself, in the absence of significant noise exposure, is associated with loss of auditory nerve fibers. Evidence from human temporal bone studies and auditory brainstem response measures suggests that this form of hidden loss is common in humans and may have perceptual consequences, in particular, regarding the coding of the temporal aspects of sounds. Hidden hearing loss is potentially a major health issue, and investigations are ongoing to identify the causes and consequences of this troubling condition.

  14. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements

  15. Discovering Hidden Treasures with GPS Technology

    Science.gov (United States)

    Nagel, Paul; Palmer, Roger

    2014-01-01

    "I found it!" Addison proudly proclaimed, as she used an iPhone and Global Positioning System (GPS) software to find the hidden geocache along the riverbank. Others in Lisa Bostick's fourth grade class were jealous, but there would be other geocaches to find. With the excitement of movies like "Pirates of the Caribbean" and…

  16. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover...

  17. Dermatologic hazards from hidden contacts with penicillin

    Energy Technology Data Exchange (ETDEWEB)

    Boonk, W.J.

    1981-01-01

    The unbridled use of penicillin after its discovery by Fleming has resulted in possible hazards to human health due to traces of the drug being present in food and other hidden sources. These hazards may include toxic effects, hypersensitivity reactions and possibly a raising of the frequency and duration of allergy to penicillin.

  18. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements incr

  19. Computerized Testing: The Hidden Figures Test.

    Science.gov (United States)

    Jacobs, Ronald L.; And Others

    1985-01-01

    This study adapted the Hidden Figures Test for use on PLATO and determined the reliability of the computerized version compared to the paper and pencil version. Results indicate the test was successfully adapted with some modifications, and it was judged reliable although it may be measuring additional constructs. (MBR)

  20. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  1. Hidden Costs and Challenges of Servitization

    DEFF Research Database (Denmark)

    Yang, Yifan; Slepniov, Dmitrij

    of these labels, the potential benefits of servitization are often overshadowed by costs associated with it. By using the cases of Chinese and Danish manufacturing firms, this study takes a closer look at possible hidden costs of servitization and contributes to our understanding of servitization performance...

  2. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  3. The Sentinel Lymph Node Concept

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    The sentinel lymph node concept is meeting with steadily growing interest and is being extended to the different sites of the primaries. In addition, the concept is being applied in an increasingly sophisticated manner. In this book the practical

  4. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause/receive inter......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  5. Mesenteric lymph node cavitation syndrome

    Institute of Scientific and Technical Information of China (English)

    Hugh; James; Freeman

    2010-01-01

    The mesenteric lymph node cavitation syndrome consists of central necrosis of mesenteric lymph nodes and may occur with either celiac disease or a sprue-like intestinal disease that fails to respond to a gluten-free diet. Splenic hypofunction may also be present. The cause is not known but its development during the clinical course of celiac disease is usually indicative of a poor prognosis for the intestinal disorder, a potential for signif icant compli-cations including sepsis and malignancy, particularly...

  6. Immunolymphoscintigraphy for Metastatic Sentinel Nodes

    DEFF Research Database (Denmark)

    Chakera, A.H.; Nielsen, B.S.; Madsen, J.;

    2011-01-01

    Aim. To develop a method and obtain proof-of-principle for immunolymphoscintigraphy for identification of metastatic sentinel nodes. Methods. We selected one of four tumour-specific antibodies against human breast cancer and investigated (1), in immune- deficient (nude) mice with xenograft human...... in healthy rabbits. Results and Conclusion. Our paper suggests the theoretical possibility of a model of dual isotope immuno-lymphoscintigraphy for noninvasive, preoperative, malignant sentinel node imaging....

  7. Landslide Displacement Prediction With Uncertainty Based on Neural Networks With Random Hidden Weights.

    Science.gov (United States)

    Lian, Cheng; Zeng, Zhigang; Yao, Wei; Tang, Huiming; Chen, Chun Lung Philip

    2016-12-01

    In this paper, we propose a new approach to establish a landslide displacement forecasting model based on artificial neural networks (ANNs) with random hidden weights. To quantify the uncertainty associated with the predictions, a framework for probabilistic forecasting of landslide displacement is developed. The aim of this paper is to construct prediction intervals (PIs) instead of deterministic forecasting. A lower-upper bound estimation (LUBE) method is adopted to construct ANN-based PIs, while a new single hidden layer feedforward ANN with random hidden weights for LUBE is proposed. Unlike the original implementation of LUBE, the input weights and hidden biases of the ANN are randomly chosen, and only the output weights need to be adjusted. Combining particle swarm optimization (PSO) and gravitational search algorithm (GSA), a hybrid evolutionary algorithm, PSOGSA, is utilized to optimize the output weights. Furthermore, a new ANN objective function, which combines a modified combinational coverage width-based criterion with one-norm regularization, is proposed. Two benchmark data sets and two real-world landslide data sets are presented to illustrate the capability and merit of our method. Experimental results reveal that the proposed method can construct high-quality PIs.

  8. Hidden penis release: adjunctive suprapubic lipectomy.

    Science.gov (United States)

    Horton, C E; Vorstman, B; Teasley, D; Winslow, B

    1987-08-01

    We believe the hidden penis may be caused and concealed by a prominent suprapubic fat pad in addition to the restrictive fibrous bands of the dartos fascia fixing the shaft of the penis proximally while loose skin folds prolapse distally over the phallus. A penis of inadequate length or appearance may affect body image. Patients with this problem often require psychological support. Hidden penis may be distinguished from micropenis by palpating adequate corpora and showing a stretched penile length within 2 SD of normal. Excision of suprapubic fat with sectioning of the tethering dartos bands will release and increase the length of the penis. Suprapubic fat pad resection may also be helpful to elongate a short penis in cases of adult microphallus, or after partial penectomy because of trauma or cancer. Circumcision is contraindicated.

  9. Laser experiments explore the hidden sector

    CERN Document Server

    Ahlers, M; Jaeckel, J; Redondo, J; Ringwald, A

    2007-01-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses <~0.05 eV, the charge is now restricted to be less than (3-4)x10^(-7) times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background.

  10. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  11. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  12. Finite State Transducers Approximating Hidden Markov Models

    CERN Document Server

    Kempe, A

    1999-01-01

    This paper describes the conversion of a Hidden Markov Model into a sequential transducer that closely approximates the behavior of the stochastic model. This transformation is especially advantageous for part-of-speech tagging because the resulting transducer can be composed with other transducers that encode correction rules for the most frequent tagging errors. The speed of tagging is also improved. The described methods have been implemented and successfully tested on six languages.

  13. Hidden symmetries in dilaton-axion gravity

    CERN Document Server

    Kechkin, O V

    1996-01-01

    Four--dimensional Einstein--Maxwell--dilaton--axion system restricted to space--times with one non--null Killing symmetry is formulated as the three--dimensional gravity coupled sigma--model. Several alternative representations are discussed and the associated hidden symmetries are revealed. The action of target space isometries on the initial set of (non--dualized ) variables is found. New mulicenter solutions are obtained via generating technique based on the formulation in terms of the non--dualized variables.

  14. Caldera rim collapse: A hidden volcanic hazard

    OpenAIRE

    Merle, Olivier; Michon, Laurent; Bachèlery, Patrick

    2008-01-01

    International audience; Following the emblematic flank collapse of Mount St Helens in 1981, numerous models of flank sliding have been proposed. These models have allowed to largely improve the understanding of mechanisms involved in such landslides, which represent a tremendous risk for populations living around volcanoes. In this article, a new mode of landslide formation, related to buried calderas, is described. The model emphasizes the paramount importance of the hidden ring fault that, ...

  15. Killing and letting die: hidden value assumptions.

    Science.gov (United States)

    Atkinson, G

    1983-01-01

    In this paper I argue for several related theses: first, that the distinction between killing and letting die, as it is drawn by ordinary persons in ordinary contexts, is more complex than is generally understood; second, that the key feature of this complexity lies in the presence of a hidden normative component in what appears to be a straightforwardly descriptive distinction; and, third, that this complexity renders the killing/letting die distinction an inadequate and hazardous guide for moral reasoning.

  16. Online Learning in Discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2007-01-01

    We present and analyse three online algorithms for learning in discrete Hidden Markov Models (HMMs) and compare them with the Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalisation error we draw learning curves in simplified situations. The performance for learning drifting concepts of one of the presented algorithms is analysed and compared with the Baldi-Chauvin algorithm in the same situations. A brief discussion about learning and symmetry breaking b...

  17. Sentinel Node Biopsy Alone versus Completion Axillary Node Dissection in Node Positive Breast Cancer: Systematic Review and Meta-Analysis

    OpenAIRE

    Rachna Ram; Jasprit Singh; Eddie McCaig

    2014-01-01

    Introduction. There has been recent interest in validity of completion axillary node dissection after a positive sentinel node. This systematic review aims to ascertain if sentinel lymph node dissection alone was noninferior to axillary lymph node dissection for breast cancer patients who have a positive sentinel node. Method. A systematic review of the electronic databases Embase, MEDLINE, and Cochrane Register of Controlled Trials was carried out. Only randomised trials that had patients wi...

  18. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  19. Otoendoscopic treatment of hidden lesions in otomastoiditis

    Institute of Scientific and Technical Information of China (English)

    LIU Yang; SUN Jian-jun; LIN Yong-sheng; ZHAO Dan-heng; ZHAO Jing; LEI Fei

    2010-01-01

    Background Surgical treatments for chronic suppurative and cholesteatoma otitis media have been discussed for several decades, but recurrences still occur because of the complex dissection required and hidden lesions associated with otomastoiditis. This study investigated the technology and strategy behind the use of otoendoscopic-assisted otosurgery.Methods We reported on hidden lesions in 32 ears of patients with otomastoiditis between November 2006 and January 2009. All the patients were treated with the aid of an otoendoscope. The advantages of otoendoscopy, including multi-angle light scattering, aperture illumination, and magnification of the local operative field, were utilized in otologic microsurgery, and otoendoscopic operative techniques were introduced for operative sites such as the epitympanum, aditus of the antrum, facial recess, sinus tympani and the mastoid tip.Results All patients were followed up from 3 months to 2 years after surgery. All patients recovered well within 3 months following surgery, except for one case of epithelialization of the mastoid cavity occurring 6 months after surgery for cholesteatoma on the cerebellar surface and another case with Bezold's abscess, hyperplastic granulation tissue developed at the antrum.Conclusions Otoendoscopy can overcome the technical deficiency of rectilinearity of the visual axis associated with otomicroscopic illumination, which presents a problem when dealing with otomastoiditis lesions in hidden areas. This technique allows such lesions within the complex three-dimensional structure to be visualized and cleaned. Otoendoscopy thus has significant potential for improving the quality of surgery and reducing the risk of postoperative recurrence.

  20. Dark matter in the hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2014-01-01

    The cosmological scenario of the dark matter generated in the hidden gauge theory based on the grand unification is discussed. It is found that the stability of the dark matter halo of our Galaxy and the cosmic ray observation constrain, respectively, the dark matter mass and the unification scale between the standard model and the hidden gauge theory sectors. To obtain a phenomenologically consistent thermal evolution, the entropy of the standard model sector needs to be increased. We therefore propose a scenario where the mini-inflation is induced from the potential coupled to the Standard model sector, in particular the Higgs sector. This scenario makes consistent the current dark matter density as well as the baryon-to-photon ratio for the case of pion dark matter. For the glueball or heavy pion of hidden gauge theory, an additional mini-inflation in the standard model sector before the leptogenesis is required. We also propose the possibility to confirm this scenario by known prospective experimental app...

  1. Phylogenetic mixture models can reduce node-density artifacts.

    Science.gov (United States)

    Venditti, Chris; Meade, Andrew; Pagel, Mark

    2008-04-01

    We investigate the performance of phylogenetic mixture models in reducing a well-known and pervasive artifact of phylogenetic inference known as the node-density effect, comparing them to partitioned analyses of the same data. The node-density effect refers to the tendency for the amount of evolutionary change in longer branches of phylogenies to be underestimated compared to that in regions of the tree where there are more nodes and thus branches are typically shorter. Mixture models allow more than one model of sequence evolution to describe the sites in an alignment without prior knowledge of the evolutionary processes that characterize the data or how they correspond to different sites. If multiple evolutionary patterns are common in sequence evolution, mixture models may be capable of reducing node-density effects by characterizing the evolutionary processes more accurately. In gene-sequence alignments simulated to have heterogeneous patterns of evolution, we find that mixture models can reduce node-density effects to negligible levels or remove them altogether, performing as well as partitioned analyses based on the known simulated patterns. The mixture models achieve this without knowledge of the patterns that generated the data and even in some cases without specifying the full or true model of sequence evolution known to underlie the data. The latter result is especially important in real applications, as the true model of evolution is seldom known. We find the same patterns of results for two real data sets with evidence of complex patterns of sequence evolution: mixture models substantially reduced node-density effects and returned better likelihoods compared to partitioning models specifically fitted to these data. We suggest that the presence of more than one pattern of evolution in the data is a common source of error in phylogenetic inference and that mixture models can often detect these patterns even without prior knowledge of their presence in the

  2. The hidden X suture: a technical note on a novel suture technique for alveolar ridge preservation

    Science.gov (United States)

    2016-01-01

    Purpose The present study investigated the impact of 2 different suture techniques, the conventional crossed mattress suture (X suture) and the novel hidden X suture, for alveolar ridge preservation (ARP) with an open healing approach. Methods This study was a prospective randomized controlled clinical trial. Fourteen patients requiring extraction of the maxillary or mandibular posterior teeth were enrolled and allocated into 2 groups. After extraction, demineralized bovine bone matrix mixed with 10% collagen (DBBM-C) was grafted and the socket was covered by porcine collagen membrane in a double-layer fashion. No attempt to obtain primary closure was made. The hidden X suture and conventional X suture techniques were performed in the test and control groups, respectively. Cone-beam computed tomographic (CBCT) images were taken immediately after the graft procedure and before implant surgery 4 months later. Additionally, the change in the mucogingival junction (MGJ) position was measured and was compared after extraction, after suturing, and 4 months after the operation. Results All sites healed without any complications. Clinical evaluations showed that the MGJ line shifted to the lingual side immediately after the application of the X suture by 1.56±0.90 mm in the control group, while the application of the hidden X suture rather pushed the MGJ line slightly to the buccal side by 0.25±0.66 mm. It was demonstrated that the amount of keratinized tissue (KT) preserved on the buccal side was significantly greater in the hidden X suture group 4 months after the procedure (Pclinical and radiographic verification of the efficacy of the hidden X suture in preserving the width of KT and the dimensions of the alveolar ridge after ARP. PMID:28050319

  3. Swiss EMBnet node web server.

    Science.gov (United States)

    Falquet, Laurent; Bordoli, Lorenza; Ioannidis, Vassilios; Pagni, Marco; Jongeneel, C Victor

    2003-07-01

    EMBnet is a consortium of collaborating bioinformatics groups located mainly within Europe (http://www.embnet.org). Each member country is represented by a 'node', a group responsible for the maintenance of local services for their users (e.g. education, training, software, database distribution, technical support, helpdesk). Among these services a web portal with links and access to locally developed and maintained software is essential and different for each node. Our web portal targets biomedical scientists in Switzerland and elsewhere, offering them access to a collection of important sequence analysis tools mirrored from other sites or developed locally. We describe here the Swiss EMBnet node web site (http://www.ch.embnet.org), which presents a number of original services not available anywhere else.

  4. Intraoperative Sentinel Lymph Node Evaluation

    DEFF Research Database (Denmark)

    Shaw, Richard; Christensen, Anders; Java, Kapil;

    2016-01-01

    BACKGROUND: Intraoperative analysis of sentinel lymph nodes would enhance the care of early-stage oral squamous cell carcinoma (OSCC). We determined the frequency and extent of cytokeratin 19 (CK19) expression in OSCC primary tumours and surrounding tissues to explore the feasibility of a "clinic......-ready" intraoperative diagnostic test (one step nucleic acid amplification-OSNA, sysmex). METHODS: Two cohorts were assembled: cohort 1, OSCC with stage and site that closely match cases suitable for sentinel lymph node biopsy (SLNB); cohort 2, HNSCC with sufficient fresh tumour tissue available for the OSNA assay (>50...

  5. Allocating resources between network nodes for providing a network node function

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention provides a method wherein a first network node advertises available resources that a second network node may use to offload network node functions transparently to the first network node. Examples of the first network node are a client device (e.g. PC, notebook, tablet, smart phone), a

  6. Detectability of small communities in multilayer and temporal networks: Eigenvector localization, layer aggregation, and time series discretization

    CERN Document Server

    Taylor, Dane; Mucha, Peter J

    2016-01-01

    Inspired by real-world networks that are naturally represented by layers encoding different types of connections, such as different instances in time, we study the detectability of small-scale communities that are anomalies in that they are hidden in a multilayer network. Letting $K$ and $T$ respectively denote the community size and the number of layers in which it is present, we assume that it is unknown which of the $N\\gg K$ nodes are involved in the community or in which of the $L\\ge T$ layers it is present. We study fundamental limitations on the detectability of small communities by developing random matrix theory for the dominant eigenvectors of a modularity matrix that is associated with an aggregation of layers. We identify a phase transition in detectability that is caused by an eigenvector localization phenomenon that is analogous to localization arising for disordered media and occurs when $K$ surpasses a critical size $K^*\\varpropto \\sqrt{T^{-2}NL}$. We highlight several consequences of this scal...

  7. Hidden laser communications through matter. An application of meV-scale hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-04-15

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  8. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  9. Critical nodes in signalling pathways

    DEFF Research Database (Denmark)

    Taniguchi, Cullen M; Emanuelli, Brice; Kahn, C Ronald

    2006-01-01

    Physiologically important cell-signalling networks are complex, and contain several points of regulation, signal divergence and crosstalk with other signalling cascades. Here, we use the concept of 'critical nodes' to define the important junctions in these pathways and illustrate their unique role...

  10. Node.js by example

    CERN Document Server

    Tsonev, Krasimir

    2015-01-01

    If you are a JavaScript developer with no experience with Node.js or server-side web development, this book is for you. It will lead you through creating a fairly complex social network. You will learn how to work with a database and create real-time communication channels.

  11. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  12. Hidden History: A Mobile Application for Discovering Surrounding Landscapes

    OpenAIRE

    2016-01-01

    This thesis work describes the design, development and evaluation of a mobile application called Hidden History. This application lets users discover and explore three types of landscapes (Historic, Scenic and Cultural) using three different modes of discovery (Route, Explore and Tour). Before designing Hidden History, the feature set of other applications that help users explore surrounding landscapes were identified and analyzed. Hidden History was then designed to implement the best fea...

  13. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  14. ADAPTIVE LEARNING OF HIDDEN MARKOV MODELS FOR EMOTIONAL SPEECH

    Directory of Open Access Journals (Sweden)

    A. V. Tkachenia

    2014-01-01

    Full Text Available An on-line unsupervised algorithm for estimating the hidden Markov models (HMM parame-ters is presented. The problem of hidden Markov models adaptation to emotional speech is solved. To increase the reliability of estimated HMM parameters, a mechanism of forgetting and updating is proposed. A functional block diagram of the hidden Markov models adaptation algorithm is also provided with obtained results, which improve the efficiency of emotional speech recognition.

  15. Hidden Photons in Aharonov-Bohm-Type Experiments

    OpenAIRE

    Arias, Paola; Diaz, Christian; Diaz, Marco Aurelio; Jaeckel, Joerg; Koch, Benjamin; Redondo, Javier

    2016-01-01

    We discuss the Aharonov-Bohm effect in the presence of hidden photons kinetically mixed with the ordinary electromagnetic photons. The hidden photon field causes a slight phase shift in the observable interference pattern. It is then shown how the limited sensitivity of this experiment can be largely improved. The key observation is that the hidden photon field causes a leakage of the ordinary magnetic field into the supposedly field-free region. The direct measurement of this magnetic field ...

  16. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  17. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  18. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  19. Error statistics of hidden Markov model and hidden Boltzmann model results

    Science.gov (United States)

    Newberg, Lee A

    2009-01-01

    Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results. PMID:19589158

  20. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  1. OFDM System Channel Estimation with Hidden Pilot

    Institute of Scientific and Technical Information of China (English)

    YANG Feng; LIN Cheng-yu; ZHANG Wen-jun

    2007-01-01

    Channel estimation using pilot is common used in OFDM system. The pilot is usually time division multiplexed with the informative sequence. One of the main drawbacks is bandwidth losing. In this paper, a new method was proposed to perform channel estimation in OFDM system. The pilot is arithmetically added to the output of OFDM modulator. Receiver uses the hidden pilot to get an accurate estimation of the channel. Then pilot is removed after channel estimation. The Cramer-Rao lower bound for this method was deprived. The performance of the algorithm is then shown. Compared with traditional methods, the proposed algorithm increases the bandwidth efficiency dramatically.

  2. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  3. Hidden photon CDM search at Tokyo

    CERN Document Server

    Suzuki, Jun'ya; Horie, Tomoki; Minowa, Makoto

    2015-01-01

    We report on a search for hidden photon cold dark matter (HP CDM) using a novel technique with a dish antenna. We constructed two independent apparatus: one is aiming at the detection of the HP with a mass of $\\sim\\,\\rm{eV}$ which employs optical instruments, and the other is for a mass of $\\sim5\\times10^{-5}\\, \\rm{eV}$ utilizing a commercially available parabolic antenna facing on a plane reflector. From the result of the measurements, we found no evidence for the existence of HP CDM and set upper limits on the photon-HP mixing parameter $\\chi$.

  4. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  5. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  6. Scaling dimensions in hidden Kerr/CFT

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2011-01-01

    It has been proposed that a hidden conformal field theory (CFT) governs the dynamics of low frequency scattering in a general Kerr black hole background. We further investigate this correspondence by mapping higher order corrections to the massless wave equations in a Kerr background to an expansion within the CFT in terms of higher dimension operators. This implies the presence of infinite towers of CFT primary operators with positive conformal dimensions compatible with unitarity. The exact Kerr background softly breaks the conformal symmetry and the scaling dimensions of these operators run with frequency. The scale-invariant fixed point is dual to a degenerate case of flat spacetime.

  7. Hidden Kerr/CFT at finite frequencies

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2013-01-01

    Massless fields propagating in a generic Kerr black hole background enjoy a hidden SL(2,R)xSL(2,R) symmetry. We determine how the exact mode functions decompose into representations of this symmetry group. This extends earlier results on the low frequency limit of the massless scalar case to finite frequencies and general spin. As an application, we numerically determine the parameters of the representations that appear in quasinormal modes. These results represent a first step to formulating a more precise mapping to a holographic dual conformal field theory for generic black holes.

  8. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  9. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  10. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  11. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  12. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The locations of the breaks are subsequently obtained by assigning states to data points according to the Maximum Posterior Mode (MPM) algorithm. The Integrated Classification Likelihood-Bayesian Information Criterion (ICL-BIC) allows for the determination of the number of regimes by taking into account...... in the monetary policy of United States, the dierent functional form being variants of the Taylor (1993) rule....

  13. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  14. Lymph node staging in prostate cancer.

    Science.gov (United States)

    Sankineni, Sandeep; Brown, Anna M; Fascelli, Michele; Law, Yan Mee; Pinto, Peter A; Choyke, Peter L; Turkbey, Baris

    2015-05-01

    Nodal staging is important in prostate cancer treatment. While surgical lymph node dissection is the classic method of determining whether lymph nodes harbor malignancy, this is a very invasive technique. Current noninvasive approaches to identifying malignant lymph nodes are limited. Conventional imaging methods rely on size and morphology of lymph nodes and have notoriously low sensitivity for detecting malignant nodes. New imaging techniques such as targeted positron emission tomography (PET) imaging and magnetic resonance lymphography (MRL) with iron oxide particles are promising for nodal staging of prostate cancer. In this review, the strengths and limitations of imaging techniques for lymph node staging of prostate cancer are discussed.

  15. Controlling data transfers from an origin compute node to a target compute node

    Science.gov (United States)

    Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.

    2011-06-21

    Methods, apparatus, and products are disclosed for controlling data transfers from an origin compute node to a target compute node that include: receiving, by an application messaging module on the target compute node, an indication of a data transfer from an origin compute node to the target compute node; and administering, by the application messaging module on the target compute node, the data transfer using one or more messaging primitives of a system messaging module in dependence upon the indication.

  16. Inter-layer synchronization in multiplex networks of identical layers

    Energy Technology Data Exchange (ETDEWEB)

    Sevilla-Escoboza, R. [Centro Universitario de los Lagos, Universidad de Guadalajara, Jalisco 47460 (Mexico); Sendiña-Nadal, I.; Leyva, I.; Buldú, J. M. [Complex Systems Group & GISC, Universidad Rey Juan Carlos, 28933 Móstoles, Madrid (Spain); Center for Biomedical Technology, Universidad Politécnica de Madrid, 28223 Pozuelo de Alarcón, Madrid (Spain); Gutiérrez, R. [School of Physics and Astronomy, University of Nottingham, Nottingham NG7 2RD (United Kingdom); Boccaletti, S. [CNR-Institute of Complex Systems, Via Madonna del Piano, 10, 50019 Sesto Fiorentino, Florence (Italy); The Italian Embassy in Israel, 25 Hamered st., 68125 Tel Aviv (Israel)

    2016-06-15

    Inter-layer synchronization is a distinctive process of multiplex networks whereby each node in a given layer evolves synchronously with all its replicas in other layers, irrespective of whether or not it is synchronized with the other units of the same layer. We analytically derive the necessary conditions for the existence and stability of such a state, and verify numerically the analytical predictions in several cases where such a state emerges. We further inspect its robustness against a progressive de-multiplexing of the network, and provide experimental evidence by means of multiplexes of nonlinear electronic circuits affected by intrinsic noise and parameter mismatch.

  17. Decellularized Lymph Nodes as Scaffolds for Tissue Engineered Lymph Nodes

    Science.gov (United States)

    Cuzzone, Daniel A.; Albano, Nicholas J.; Aschen, Seth Z.; Ghanta, Swapna

    2015-01-01

    Abstract Background: The lymphatic system is commonly injured during cancer treatment. However, despite the morbidity of these injuries, there are currently no options for replacing damaged lymphatics. The purpose of this study was to optimize methods for decellularization of murine lymph nodes (LN) and to determine if these scaffolds can be used to tissue engineer lymph node-like structures. Methods and Results: LNs were harvested from adult mice and subjected to various decellularization protocols. The degree of decellularization and removal of nuclear material was analyzed histologically and quantitatively using DNA isolation. In addition, we analyzed histological architecture by staining for matrix proteins. After the optimal method of decellularization was identified, decellularized constructs were implanted in the renal capsule of syngeneic or allogeneic recipient mice and analyzed for antigenicity. Finally, to determine if decellularized constructs could deliver lymphocytes to recipient animals, the matrices were repopulated with splenocytes, implanted in submuscular pockets, and harvested 14 days later. Decellularization was best accomplished with the detergent sodium dodecyl sulfate (SDS), resulting in negligible residual cellular material but maintenance of LN architecture. Implantation of decellularized LNs into syngeneic or allogeneic mice did not elicit a significant antigenic response. In addition, repopulation of decellularized LNs with splenocytes resulted in successful in vivo cellular delivery. Conclusions: We show, for the first time, that LNs can be successfully decellularized and that these matrices have preserved extracellular matrix architecture and the potential to deliver leukocytes in vivo. Future studies are needed to determine if tissue engineered lymph nodes maintain immunologic function. PMID:25144673

  18. Intraoperative Sentinel Lymph Node Evaluation

    DEFF Research Database (Denmark)

    Shaw, Richard; Christensen, Anders; Java, Kapil

    2016-01-01

    BACKGROUND: Intraoperative analysis of sentinel lymph nodes would enhance the care of early-stage oral squamous cell carcinoma (OSCC). We determined the frequency and extent of cytokeratin 19 (CK19) expression in OSCC primary tumours and surrounding tissues to explore the feasibility of a "clinic...... mg). CK19 assays included qRT-PCR, RNA in situ hybridisation (ISH), and immunohistochemistry (IHC), as well as OSNA. RESULTS: CK19 mRNA expression was detected with variable sensitivity, depending on method, in 60-80% of primary OSCC tumours, while protein expression was observed in only 50......% of tumours. Discordance between different techniques indicated that OSNA was more sensitive than qRT-PCR or RNA-ISH, which in turn were more sensitive than IHC. OSNA results showed CK19 expression in 80% of primary cases, so if used for diagnosis of lymph node metastasis would lead to a false-negative result...

  19. Women's hidden transcripts about abortion in Brazil.

    Science.gov (United States)

    Nations, M K; Misago, C; Fonseca, W; Correia, L L; Campbell, O M

    1997-06-01

    Two folk medical conditions, "delayed" (atrasada) and "suspended" (suspendida) menstruation, are described as perceived by poor Brazilian women in Northeast Brazil. Culturally prescribed methods to "regulate" these conditions and provoke menstrual bleeding are also described, including ingesting herbal remedies, patent drugs, and modern pharmaceuticals. The ingestion of such self-administered remedies is facilitated by the cognitive ambiguity, euphemisms, folklore, etc., which surround conception and gestation. The authors argue that the ethnomedical conditions of "delayed" and "suspended" menstruation and subsequent menstrual regulation are part of the "hidden reproductive transcript" of poor and powerless Brazilian women. Through popular culture, they voice their collective dissent to the official, public opinion about the illegality and immorality of induced abortion and the chronic lack of family planning services in Northeast Brazil. While many health professionals consider women's explanations of menstrual regulation as a "cover-up" for self-induced abortions, such popular justifications may represent either an unconscious or artful manipulation of hegemonic, anti-abortion ideology expressed in prudent, unobtrusive and veiled ways. The development of safer abortion alternatives should consider women's hidden reproductive transcripts.

  20. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  1. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  2. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  3. Quantum Hidden Subgroup Problems A Mathematical Perspective

    CERN Document Server

    Lomonaco, S J; Lomonaco, Samuel J.; Kauffman, Louis H.

    2002-01-01

    The ultimate objective of this paper is to create a stepping stone to the development of new quantum algorithms. The strategy chosen is to begin by focusing on the class of abelian quantum hidden subgroup algorithms, i.e., the class of abelian algorithms of the Shor/Simon genre. Our strategy is to make this class of algorithms as mathematically transparent as possible. By the phrase "mathematically transparent" we mean to expose, to bring to the surface, and to make explicit the concealed mathematical structures that are inherently and fundamentally a part of such algorithms. In so doing, we create symbolic abelian quantum hidden subgroup algorithms that are analogous to the those symbolic algorithms found within such software packages as Axiom, Cayley, Maple, Mathematica, and Magma. As a spin-off of this effort, we create three different generalizations of Shor's quantum factoring algorithm to free abelian groups of finite rank. We refer to these algorithms as wandering (or vintage Z_Q) Shor algorithms. They...

  4. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  5. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  6. Hidden charm molecules in finite volume

    CERN Document Server

    Albaladejo, Miguel; Nieves, Juan; Oset, Eulogio

    2013-01-01

    In the present paper we address the interaction of pairs of charmed mesons with hidden charm in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and from them some synthetic data are generated. These data are then employed to study the inverse problem of getting the energies of the bound states and phase shifts for $D \\bar D$ or $D^* {\\bar D}^*$. Different strategies are investigated using the lowest two levels for different values of the box size, carrying a study of the errors produced. Starting from the upper level, fits to the synthetic data are carried out to determine the scattering length and effective range plus the binding energy of the ground state. A similar strategy using the effective range formula is considered with a simultaneous fit to the two levels, one above and the other one below threshold. This method turns out to be more...

  7. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  8. Bayesian structural inference for hidden processes.

    Science.gov (United States)

    Strelioff, Christopher C; Crutchfield, James P

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ε-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ε-machines, irrespective of estimated transition probabilities. Properties of ε-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  9. Axillary Lymph Nodes and Breast Cancer

    Science.gov (United States)

    ... more likely to affect arm function and cause lymphedema. For this reason, sentinel node biopsy is the ... OR supraclavicular (above the clavicle) nodes have cancer Lymphedema Lymphedema [lim-fa-DEE-ma] is a build- ...

  10. Interpectoral Nodes Metastases in Breast Cancer

    Institute of Scientific and Technical Information of China (English)

    ZHOU Xin; YANG Jia-xiang; LIU Xiao-yu; ZHU Ning-sheng; JIANG Ge-li

    2008-01-01

    Objective:To study interpectoral nodes metastasis rate in breast cancer and its clinical significance.Methods:171 female patients undergone surgery for breast cancer were reviewed,of whom the interpectoral nodes were SUbjected to pathological examination.Results:Interpectoral nodes were identified in 25.7% of the 171 female patients,and the interpectoral nodes metastasis rate was 9.9%.The patients with interpectoral nodes metastasis had larger tumor size,later TNM classification,higher axillary apical nodes metastasis rate and lower ER positive rate.Conclusion:Dissection of interpectoral nodes should be regard as routine clinical practice in modified radical mastectomy,and interpectoral nodes should be snbjected to pathological examination.

  11. Pattern of lymph node metastases of squamous cell esophageal cancer based on the anatomical lymphatic drainage system: efficacy of lymph node dissection according to tumor location

    Science.gov (United States)

    2017-01-01

    Knowing the anatomical lymphatic drainage of the esophagus is crucial to understanding the dissemination pattern of esophageal tumor. During the embryonal growth, the middle and lower part of the esophagus stretches as the lymphatic networks develop in the submucosal layer. The abundant submucosal lymphatics drain in a longitudinal fashion directly to their proximal and distal ends. The lymphatic route from the proximal esophagus through recurrent nerve nodes to supraclavicular nodes are a component of the mesentery of the proximal esophagus. The lower esophagus mostly drains its lymph into paracardial nodes related to celiac nodes through the mesentery of the distal esophagus. Lymphatic routes to mid and lower paraesophageal nodes usually originate from the intermuscular area of the muscularis propria. The lymphatic communication between the submucosa and intermuscular area is limited. The anatomical concept was confirmed clinically by a large series of single institution and the nationwide registry in Japan. The clinical data for the incidence of involved nodes verified the anatomical observations that long longitudinal extension of lymphatic drainage in the submucosa connected to the upper mediastinum lymphatics and paracardial lymphatics. The extent of dissection should be not tailored according to the anatomical distance from the tumor but according to the incidences of metastasis of each area, those were differed by tumor location. The areas for node dissection should be modified according to the tumor location. Although in patients with tumor limited to within the submucosal layer, even with tumors located in the mid- and lower esophagus, lymphatic metastasis was frequent in the upper mediastinum and perigastric area via the abundant submucosal lymphatics in a longitudinal fashion. When tumor invades or penetrates the muscle layer, the incidence of paraesophageal lymph node metastasis in the middle and lower mediastinum increases. PMID:28815068

  12. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    Decker, T.; Draisma, J.; Wocjan, P.

    2009-01-01

    We consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be m-variate po

  13. Hidden attractor in the Rabinovich system, Chua circuits and PLL

    Science.gov (United States)

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Seledzhi, S. M.

    2016-06-01

    In this report the existence of hidden attractors in Rabinovich system, phase-locked loop and coupled Chua circuits is considered. It is shown that the existence of hidden attractors may complicate the analysis of the systems and significantly affect the synchronization.

  14. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  15. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  16. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  17. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  18. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in Seuss's…

  19. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  20. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  1. Contribution of hidden modes to nonlinear epidemic dynamics in urban human proximity networks

    CERN Document Server

    Fujiwara, Naoya; Iwayama, Koji; Aihara, Kazuyuki

    2015-01-01

    Recently developed techniques to acquire high-quality human mobility data allow large-scale simulations of the spread of infectious diseases with high spatial and temporal resolution.Analysis of such data has revealed the oversimplification of existing theoretical frameworks to infer the final epidemic size or influential nodes from the network topology. Here we propose a spectral decomposition-based framework for the quantitative analysis of epidemic processes on realistic networks of human proximity derived from urban mobility data. Common wisdom suggests that modes with larger eigenvalues contribute more to the epidemic dynamics. However, we show that hidden dominant structures, namely modes with smaller eigenvalues but a greater contribution to the epidemic dynamics, exist in the proximity network. This framework provides a basic understanding of the relationship between urban human motion and epidemic dynamics, and will contribute to strategic mitigation policy decisions.

  2. Multi-Level Steganography: Improving Hidden Communication in Networks

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the upper-level) serves as a carrier for the second one (called the lower-level). Such a relationship between two (or more) information hiding solutions has several potential benefits. The most important is that the lower-level method steganographic bandwidth can be utilised to make the steganogram unreadable even after the detection of the upper-level method: e.g., it can carry a cryptographic key that deciphers the steganogram carried by the upper-level one. It can also be used to provide the steganogram with integrity. Another important benefit is that the lower-layer method may be used as a signalling channel in which to exchange information that affects the way that the upper-level method functions, thus possibly making the steganographic communication harder to detect. MLS is presented in t...

  3. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  4. Secluded Dark Matter Coupled to a Hidden CFT

    CERN Document Server

    von Harling, Benedict

    2012-01-01

    Models of secluded dark matter offer a variant on the standard WIMP picture and can modify our expectations for hidden sector phenomenology and detection. In this work we extend a minimal model of secluded dark matter, comprised of a U(1)'-charged dark matter candidate, to include a confining hidden-sector CFT. This provides a technically natural explanation for the hierarchically small mediator-scale, with hidden-sector confinement generating m_{gamma'}>0. Furthermore, the thermal history of the universe can differ markedly from the WIMP picture due to (i) new annihilation channels, (ii) a (potentially) large number of hidden-sector degrees of freedom, and (iii) a hidden-sector phase transition at temperatures T << M_{dm} after freeze out. The mediator allows both the dark matter and the Standard Model to communicate with the CFT, thus modifying the low-energy phenomenology and cosmic-ray signals from the secluded sector.

  5. Abelian Hidden Sectors at a GeV

    Energy Technology Data Exchange (ETDEWEB)

    Morrissey, David E.; Poland, David; /Harvard U.; Zurek, Kathryn; /Fermilab /Michigan U.

    2009-04-16

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1){sub x} gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  6. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  7. Gauge Coupling Unification with Hidden Photon, and Minicharged Dark Matter

    CERN Document Server

    Daido, Ryuji; Yokozaki, Norimi

    2016-01-01

    We show that gauge coupling unification is realized with a greater accuracy in the presence of a massless hidden photon which has a large kinetic mixing with hypercharge. We solve the renormalization group equations at two-loop level and find that the GUT unification scale is around $10^{16.5}$ GeV which sufficiently suppresses the proton decay rate, and that the unification depends only on the kinetic mixing, but not on the hidden gauge coupling nor the presence of vector-like matter fields charged under U(1)$_H$ and/or SU(5). Matter fields charged under the unbroken hidden U(1)$_H$ are stable and they contribute to dark matter. Interestingly, they become minicharged dark matter which carries a small but non-zero electric charge, if the hidden gauge coupling is tiny. The minicharged dark matter is a natural outcome of the gauge coupling unification with a hidden photon.

  8. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  9. Hidden Markov induced Dynamic Bayesian Network for recovering time evolving gene regulatory networks

    Science.gov (United States)

    Zhu, Shijia; Wang, Yadong

    2015-12-01

    Dynamic Bayesian Networks (DBN) have been widely used to recover gene regulatory relationships from time-series data in computational systems biology. Its standard assumption is ‘stationarity’, and therefore, several research efforts have been recently proposed to relax this restriction. However, those methods suffer from three challenges: long running time, low accuracy and reliance on parameter settings. To address these problems, we propose a novel non-stationary DBN model by extending each hidden node of Hidden Markov Model into a DBN (called HMDBN), which properly handles the underlying time-evolving networks. Correspondingly, an improved structural EM algorithm is proposed to learn the HMDBN. It dramatically reduces searching space, thereby substantially improving computational efficiency. Additionally, we derived a novel generalized Bayesian Information Criterion under the non-stationary assumption (called BWBIC), which can help significantly improve the reconstruction accuracy and largely reduce over-fitting. Moreover, the re-estimation formulas for all parameters of our model are derived, enabling us to avoid reliance on parameter settings. Compared to the state-of-the-art methods, the experimental evaluation of our proposed method on both synthetic and real biological data demonstrates more stably high prediction accuracy and significantly improved computation efficiency, even with no prior knowledge and parameter settings.

  10. Hidden Markov induced Dynamic Bayesian Network for recovering time evolving gene regulatory networks.

    Science.gov (United States)

    Zhu, Shijia; Wang, Yadong

    2015-12-18

    Dynamic Bayesian Networks (DBN) have been widely used to recover gene regulatory relationships from time-series data in computational systems biology. Its standard assumption is 'stationarity', and therefore, several research efforts have been recently proposed to relax this restriction. However, those methods suffer from three challenges: long running time, low accuracy and reliance on parameter settings. To address these problems, we propose a novel non-stationary DBN model by extending each hidden node of Hidden Markov Model into a DBN (called HMDBN), which properly handles the underlying time-evolving networks. Correspondingly, an improved structural EM algorithm is proposed to learn the HMDBN. It dramatically reduces searching space, thereby substantially improving computational efficiency. Additionally, we derived a novel generalized Bayesian Information Criterion under the non-stationary assumption (called BWBIC), which can help significantly improve the reconstruction accuracy and largely reduce over-fitting. Moreover, the re-estimation formulas for all parameters of our model are derived, enabling us to avoid reliance on parameter settings. Compared to the state-of-the-art methods, the experimental evaluation of our proposed method on both synthetic and real biological data demonstrates more stably high prediction accuracy and significantly improved computation efficiency, even with no prior knowledge and parameter settings.

  11. Analysis of Decision Trees in Context Clustering of Hidden Markov Model Based Thai Speech Synthesis

    Directory of Open Access Journals (Sweden)

    Suphattharachai Chomphan

    2011-01-01

    Full Text Available Problem statement: In Thai speech synthesis using Hidden Markov model (HMM based synthesis system, the tonal speech quality is degraded due to tone distortion. This major problem must be treated appropriately to preserve the tone characteristics of each syllable unit. Since tone brings about the intelligibility of the synthesized speech. It is needed to establish the tone questions and other phonetic questions in tree-based context clustering process accordingly. Approach: This study describes the analysis of questions in tree-based context clustering process of an HMM-based speech synthesis system for Thai language. In the system, spectrum, pitch or F0 and state duration are modeled simultaneously in a unified framework of HMM, their parameter distributions are clustered independently by using a decision-tree based context clustering technique. The contextual factors which affect spectrum, pitch and duration, i.e., part of speech, position and number of phones in a syllable, position and number of syllables in a word, position and number of words in a sentence, phone type and tone type, are taken into account for constructing the questions of the decision tree. All in all, thirteen sets of questions are analyzed in comparison. Results: In the experiment, we analyzed the decision trees by counting the number of questions in each node coming from those thirteen sets and by calculating the dominance score given to each question as the reciprocal of the distance from the root node to the question node. The highest number and dominance score are of the set of phonetic type, while the second, third highest ones are of the set of part of speech and tone type. Conclusion: By counting the number of questions in each node and calculating the dominance score, we can set the priority of each question set. All in all, the analysis results bring about further development of Thai speech synthesis with efficient context clustering process in

  12. Evolutionary Game Analysis of Co-opetition Relationship between Regional Logistics Nodes

    Directory of Open Access Journals (Sweden)

    D.Z. Wang

    2014-04-01

    Full Text Available The evolutionary game of co-opetition relationship between regional logistics nodes is studied in this paper. A replicator dynamic model is built to obtain the Evolutionary Stable Strategy (ESS of the game. Then, according to the status and level of logistics nodes, the symmetric and asymmetric game models based on evolutionary game theory are proposed, respectively. The former is used to analyze the changing trends of co-opetition relationship between logistics nodes from a same layer of a logistics network. While the latter can be used to deal with the relationship forecasting problems between logistics nodes from different layers. The result of the case study reveals that the proposed models have good practicability and accuracy in dealing with the relationship forecasting problems within a regional logistics network.

  13. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  14. Misbehaving Node Detection in Mobile Ad Hoc Networks using Multi Hop Acknowledgement Scheme

    Directory of Open Access Journals (Sweden)

    U. Sakthivel

    2011-01-01

    Full Text Available Problem statement: For any node in a Mobile Ad hoc Network conservation of battery power and bandwidth are the priority. Hence, they try to reduce the overload they would otherwise incur when they forward packets. This selfish behavior of a node affects the throughput of the network. The nodes may also choose a back off value of shorter duration. These problems are handled effectively by the methodology proposed in this study. A conscious effort has been made keeping the constraints of the MANETs in mind. Approach: Misbehavior is best identified at the lower levels as the upper levels of the OSI standard primarily deals with the data the packets carry and less about how, so the network and the MAC layers is where the primary focus lies. Thus, keeping these points in mind, we propose algorithms that work along with the 802.11 MAC protocol to monitor the behavior of neighboring nodes by listening to the channel, specifically monitoring parameters like back off values sent by the nodes. A counter is maintained which is incremented every time node misconduct is detected, subsequently after a particular value is cross the node is labeled as misbehaving and the information is broadcast over the network. Results: Performance parameters like throughput, packet delivery ratio were monitored with traffic of the magnitude 10 to 60 nodes. Also the performance of the network based on the percentage of selfish nodes present in the network was monitored and a graph was generated based on the statistics. Conclusion: An algorithmic approach for misbehaving node detection and isolation in ad hoc networks by modifying the protocol being used in the lower layers which consequently improves performance of the network had been proposed. Simulation results show considerable performance increase upon implementing the proposed algorithm. Further research can confirm the practicality of the proposed idea.

  15. Nonadiabatic eigenfunctions can have conical nodes

    Science.gov (United States)

    Foster, Peter W.; Peters, William K.; Jonas, David M.

    2017-09-01

    It has been argued the total vibrational probability amplitude for a molecular nonadiabatic eigenfunction should not have nodes unless required by symmetry. For a model with two nonadiabatically coupled electronic states, exact factorization of nonadiabatic eigenfunctions into a total vibrational probability amplitude and a normalized electronic factor reveals zero-dimensional nodes in nonadiabatic eigenfunctions over a two-dimensional vibrational space. These conical nodes have the shape of a right elliptical cone with the node at the vertex. Low dimensionality nodes are likely when the number of nonadiabatically coupled electronic states is less than or equal to the dimensionality of the vibrational space.

  16. Characteristics of cast and welded aluminium nodes

    Energy Technology Data Exchange (ETDEWEB)

    Oedegaard, J.; Polanco, M.; Syvertsen, F.; Sund, H. [SINTEF, Trondheim (Norway). Materials Technology

    2000-07-01

    It has been demonstrated that sand cast aluminium nodes can be produced with properties that gives competitive energy absorption capacity compared with welded aluminium nodes. Sand cast nodes could be mass-produced to a low cost and with properties that should be competitive to the properties of fusion welded nodes. This may open for simpler and more cost-effective joint alternatives when production of aluminium space-frames and subassemblies are in focus. Cast nodes joined to extruded members by adhesive bonding could be one example. (orig.)

  17. A tattoo pigmented node and breast cancer.

    Science.gov (United States)

    Soran, A; Kanbour-Shakir, A; Bas, O; Bonaventura, M

    2014-01-01

    Over the last decade, the axillary SLNB has replaced routine ALND for clinical staging in early breast cancer. Studies describe a potential pitfall in the identification of a true sentinel node during surgery due to lymph node pigmentation secondary to migration of tattoo dye. These pigmented “pseudo-sentinel” nodes, if located superficially in the axilla, may mimic the blue sentinel node on visual inspection, therefore missing the true sentinel node and potentially understaging the patient. Here, we present a case report of a breast cancer patient with a tattoo and discuss the importance of tattoo pigment in the LN (Fig. 1, Ref. 8).

  18. Power Aware Simulation Framework for Wireless Sensor Networks and Nodes

    Directory of Open Access Journals (Sweden)

    Glaser Johann

    2008-01-01

    Full Text Available Abstract The constrained resources of sensor nodes limit analytical techniques and cost-time factors limit test beds to study wireless sensor networks (WSNs. Consequently, simulation becomes an essential tool to evaluate such systems.We present the power aware wireless sensors (PAWiS simulation framework that supports design and simulation of wireless sensor networks and nodes. The framework emphasizes power consumption capturing and hence the identification of inefficiencies in various hardware and software modules of the systems. These modules include all layers of the communication system, the targeted class of application itself, the power supply and energy management, the central processing unit (CPU, and the sensor-actuator interface. The modular design makes it possible to simulate heterogeneous systems. PAWiS is an OMNeT++ based discrete event simulator written in C++. It captures the node internals (modules as well as the node surroundings (network, environment and provides specific features critical to WSNs like capturing power consumption at various levels of granularity, support for mobility, and environmental dynamics as well as the simulation of timing effects. A module library with standardized interfaces and a power analysis tool have been developed to support the design and analysis of simulation models. The performance of the PAWiS simulator is comparable with other simulation environments.

  19. Power Aware Simulation Framework for Wireless Sensor Networks and Nodes

    Directory of Open Access Journals (Sweden)

    Daniel Weber

    2008-07-01

    Full Text Available The constrained resources of sensor nodes limit analytical techniques and cost-time factors limit test beds to study wireless sensor networks (WSNs. Consequently, simulation becomes an essential tool to evaluate such systems.We present the power aware wireless sensors (PAWiS simulation framework that supports design and simulation of wireless sensor networks and nodes. The framework emphasizes power consumption capturing and hence the identification of inefficiencies in various hardware and software modules of the systems. These modules include all layers of the communication system, the targeted class of application itself, the power supply and energy management, the central processing unit (CPU, and the sensor-actuator interface. The modular design makes it possible to simulate heterogeneous systems. PAWiS is an OMNeT++ based discrete event simulator written in C++. It captures the node internals (modules as well as the node surroundings (network, environment and provides specific features critical to WSNs like capturing power consumption at various levels of granularity, support for mobility, and environmental dynamics as well as the simulation of timing effects. A module library with standardized interfaces and a power analysis tool have been developed to support the design and analysis of simulation models. The performance of the PAWiS simulator is comparable with other simulation environments.

  20. Quality metric for accurate overlay control in <20nm nodes

    Science.gov (United States)

    Klein, Dana; Amit, Eran; Cohen, Guy; Amir, Nuriel; Har-Zvi, Michael; Huang, Chin-Chou Kevin; Karur-Shanmugam, Ramkumar; Pierson, Bill; Kato, Cindy; Kurita, Hiroyuki

    2013-04-01

    The semiconductor industry is moving toward 20nm nodes and below. As the Overlay (OVL) budget is getting tighter at these advanced nodes, the importance in the accuracy in each nanometer of OVL error is critical. When process owners select OVL targets and methods for their process, they must do it wisely; otherwise the reported OVL could be inaccurate, resulting in yield loss. The same problem can occur when the target sampling map is chosen incorrectly, consisting of asymmetric targets that will cause biased correctable terms and a corrupted wafer. Total measurement uncertainty (TMU) is the main parameter that process owners use when choosing an OVL target per layer. Going towards the 20nm nodes and below, TMU will not be enough for accurate OVL control. KLA-Tencor has introduced a quality score named `Qmerit' for its imaging based OVL (IBO) targets, which is obtained on the-fly for each OVL measurement point in X & Y. This Qmerit score will enable the process owners to select compatible targets which provide accurate OVL values for their process and thereby improve their yield. Together with K-T Analyzer's ability to detect the symmetric targets across the wafer and within the field, the Archer tools will continue to provide an independent, reliable measurement of OVL error into the next advanced nodes, enabling fabs to manufacture devices that meet their tight OVL error budgets.

  1. Accurate energy model for WSN node and its optimal design

    Institute of Scientific and Technical Information of China (English)

    Kan Baoqiang; Cai Li; Zhu Hongsong; Xu Yongjun

    2008-01-01

    With the development of CMOS and MEMS technologies, the implementation of a large number of wireless distributed micro-sensors that can be easily and rapidly deployed to form highly redundant, self-configuring, and ad hoc sensor networks. To facilitate ease of deployment, these sensors operate on battery for extended periods of time. A particular challenge in maintaining extended battery lifetime lies in achieving communications with low power. For better understanding of the design tradeoffs of wireless sensor network (WSN), a more accurate energy model for wireless sensor node is proposed, and an optimal design method of energy efficient wireless sensor node is described as well. Different from power models ever shown which assume the power cost of each component in WSN node is constant, the new one takes into account the energy dissipation of circuits in practical physical layer. It shows that there are some parameters, such as data rate, carrier frequency, bandwidth, Tsw, etc, which have a significant effect on the WSN node energy consumption per useful bit (EPUB). For a given quality specification, how energy consumption can be reduced by adjusting one or more of these parameters is shown.

  2. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  3. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  4. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  5. Grand unified hidden-sector dark matter

    Science.gov (United States)

    Lonsdale, Stephen J.; Volkas, Raymond R.

    2014-10-01

    We explore G×G unified theories with the visible and the hidden or dark sectors paired under a Z2 symmetry. Developing a system of "asymmetric symmetry breaking" we motivate such models on the basis of their ability to generate dark baryons that are confined with a mass scale just above that of the proton, as motivated by asymmetric dark matter. This difference is achieved from the distinct but related confinement scales that develop in unified theories that have the two factors of G spontaneously breaking in an asymmetric manner. We show how Higgs potentials that admit different gauge group breaking chains in each sector can be constructed, and demonstrate the capacity for generating different fermion mass scales. Lastly we discuss supersymmetric extensions of such schemes.

  6. Hidden caries’ challenge diagnosis: case report

    Directory of Open Access Journals (Sweden)

    Fernanda Mara de Paiva Bertoli

    2013-06-01

    Full Text Available Introduction: Hidden caries is a term used to describe occlusal dentine caries that is missed on a visual examination, but is large and demineralised enough to be detected by another exam for example, radiographs. Case report: This article reports a case of large dentine caries, which presented as to be a small pit-and-fissure carious lesion on the occlusal surface of the right mandibular permanent first molar in a 10-year-old girl. The treatment included root canal treatment and the sealing of the cavity with composite resin. Conclusion: Careful visual examination, with cleaning and drying of teeth, associated to bitewing radiographs may improve occlusal caries detection. Dentists should examine bitewing radiographs carefully for proximal caries and occlusal demineralization. Radiographs are an effective method of caries diagnosis that can avoid large destruction and allows less invasive treatment.

  7. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  8. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  9. Nuclear scissors modes and hidden angular momenta

    CERN Document Server

    Balbutsev, E B; Schuck, P

    2016-01-01

    The coupled dynamics of low lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time Dependent Hartree-Fock-Bogoliubov equations. The model of the harmonic oscillator including spin-orbit potential plus quadrupole-quadrupole and spin-spin interactions is considered. New low lying spin dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  10. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school......Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...

  11. Hidden baryons: The physics of Compton composites

    Science.gov (United States)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  12. Hidden realities inside PBL design processes

    DEFF Research Database (Denmark)

    Pihl, Ole Verner

    2015-01-01

    Design Process, but is a group-based architecture and design education better than that which is individually based? How does PBL affect space, form, and creative processes? Hans Kiib, professor and one of the founders of the Department of Architecture and Design in Aalborg, describes his intentions...... within the group work, as it is closer related to the actual PBL process”. Is the Integrated Design Process (Knudstrup 2004) and is Colb (1975) still current and valid? Can we still use these methodologies when we must create “learning for an unknown future,” as Ronald Barnett (2004) claims that we...... investigates the creative processes of the collective and the individual and clarifies some of the hidden realities behind the PBL-based creative processes, both through an inquiry with the students and a more methodological and theoretical approach. The paper also explores how to integrate artistic...

  13. Aluminium Diphosphamethanides: Hidden Frustrated Lewis Pairs.

    Science.gov (United States)

    Styra, Steffen; Radius, Michael; Moos, Eric; Bihlmeier, Angela; Breher, Frank

    2016-07-04

    The synthesis and characterisation of two aluminium diphosphamethanide complexes, [Al(tBu)2 {κ(2) P,P'-Mes*PCHPMes*}] (3) and [Al(C6 F5 )2 {κ(2) P,P'-Mes*PCHPMes*}] (4), and the silylated analogue, Mes*PCHP(SiMe3 )Mes* (5), are reported. The aluminium complexes feature four-membered PCPAl core structures consisting of diphosphaallyl ligands. The silylated phosphine 5 was found to be a valuable precursor for the synthesis of 4 as it cleanly reacts with the diaryl aluminium chloride [(C6 F5 )2 AlCl]2 . The aluminium complex 3 reacts with molecular dihydrogen at room temperature under formation of the acyclic σ(2) λ(3) ,σ(3) λ(3) -diphosphine Mes*PCHP(H)Mes* and the corresponding dialkyl aluminium hydride [tBu2 AlH]3 . Thus, 3 belongs to the family of so-called hidden frustrated Lewis pairs.

  14. Wavelet domain hidden markovian bayesian document segmentation

    Institute of Scientific and Technical Information of China (English)

    Sun Junxi; Xiao Changyan; Zhang Su; Chen Yazhu

    2005-01-01

    A novel algorithm for Bayesian document segmentation is proposed based on the wavelet domain hidden Markov tree (HMT) model. Once the parameters of model are known, according to the sequential maximum a posterior probability (SMAP) rule, firstly, the likelihood probability of HMT model for each pattern is computed from fine to coarse procedure. Then, the interscale state transition probability is solved using Expectation Maximum (EM) algorithm based on hybrid-quadtree and multiscale context information is fused from coarse to fine procedure. In order to get pixellevel segmentation, the redundant wavelet domain Gaussian mixture model (GMM) is employed to formulate pixel-level statistical property. The experiment results show that the proposed scheme is feasible and robust.

  15. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  16. Hidden fungi, emergent properties: endophytes and microbiomes.

    Science.gov (United States)

    Porras-Alfaro, Andrea; Bayman, Paul

    2011-01-01

    Endophytes are microorganisms that live within plant tissues without causing symptoms of disease. They are important components of plant microbiomes. Endophytes interact with, and overlap in function with, other core microbial groups that colonize plant tissues, e.g., mycorrhizal fungi, pathogens, epiphytes, and saprotrophs. Some fungal endophytes affect plant growth and plant responses to pathogens, herbivores, and environmental change; others produce useful or interesting secondary metabolites. Here, we focus on new techniques and approaches that can provide an integrative understanding of the role of fungal endophytes in the plant microbiome. Clavicipitaceous endophytes of grasses are not considered because they have unique properties distinct from other endophytes. Hidden from view and often overlooked, endophytes are emerging as their diversity, importance for plant growth and survival, and interactions with other organisms are revealed.

  17. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  18. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  19. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments.

  20. Using HPGe detector for a solar hidden-photons search

    CERN Document Server

    Horvat, R; Krcmar, M; Krecak, Z; Ljubicic, A

    2012-01-01

    In this paper we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory, by observing the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, leads to both photon into hidden states oscillations and to a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in the Sun's interior. We exclude hidden photons with kinetic couplings chi > (1.5x10^{-6}-2.6x10^{-11}) for the mass region 1.7x10^{-4} eV < m_\\gamma' < 3.4 eV. Our constraints on the mixing parameter chi at sub-eV hidden-photon masses p...

  1. A error predictive control model of mechanical processing based on double hidden layers & L-M algorithm to adjusting BP neural networks%基于双隐层L-M算法的BP神经网络机械加工误差预测控制模型

    Institute of Scientific and Technical Information of China (English)

    龚立雄; 万勇; 侯智; 黄敏; 姜建华

    2013-01-01

    Analyzed error transmission and formation, and constructed double hidden L-M algorithm BP neural network predictive control model according to multiple input and output. The model is used to predict and control total amount of feed,first and second amount of feed by means of the rigidity of process system,workpiece hardness,before and after processing the radial error. Experimental and simulation shows that the model can guide the production, optimize the machining process, improve products quality. Finally, software system of error predictive control with LABVIEW and MATLAB realize predictive control visualization.%分析了误差的来源和传递方式,针对机械加工过程高度非线性、多输入和多输出的特点,构造了双隐层L-M算法BP神经网络误差预测控制模型.根据工艺系统刚度、工件硬度、加工前、后径向误差来预测控制刀具径向总进刀量、第一、第二次刀具径向进刀量,实验和仿真结果表明该模型能指导生产、优化加工工艺和提高产品质量.最后,采用LAB-VIEW软件和MATLAB软件编制了误差预测控制系统,实现了预测控制的可视化.

  2. Hidden photon dark matter search with large metallic mirror

    Energy Technology Data Exchange (ETDEWEB)

    Doebrich, Babette; Lindner, Axel [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Daumiller, Kai; Engel, Ralph; Roth, Markus [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany); Kowalski, Marek [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Redondo, Javier [Zaragoza Univ. (Spain)

    2014-10-15

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  3. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  4. Suppressing the QCD axion abundance by hidden monopoles

    Directory of Open Access Journals (Sweden)

    Masahiro Kawasaki

    2016-02-01

    Full Text Available We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 1012GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei–Quinn symmetry is spontaneously broken after inflation.

  5. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  6. Node Deployment and the Impact of Relay Nodes in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Rudranath Mitra

    2012-06-01

    Full Text Available Node deployment is a fundamental issue to be solved in wireless sensor network. A proper node deployment can reduce the complexity of problems in WSN as for eg, routing, data fusion, communication etc. Different node deployment models have been proposed to reduce the complexity. In this paper we will discuss about the three models- Tri-hexagon-tiling (THT, Uniform Random and Square Grid. The nature of deployment of sensor nodes depend on the type of sensors, application and the environment where the networks will operate. Deployment of sensor nodes can be random or pre-determined. In random deployment nodes are deployed in a random manner. In pre-determined deployment, location of the nodes are specified. Most commonly used cell structure is Regular Hexagonal Cell Architecture. Here we will discuss the concept of relay nodes and its impact in sensor nodes

  7. Localizing and placement of network node functions in a network

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention enables placement and use of a network node function in a second network node instead of using the network node function in a first network node. The network node function is e.g. a server function or a router function. The second network node is typically located in or close to the cl

  8. Localizing and placement of network node functions in a network

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention enables placement and use of a network node function in a second network node instead of using the network node function in a first network node. The network node function is e.g. a server function or a router function. The second network node is typically located in or close to the

  9. Node Exchange Network and its Statistical Analysis

    CERN Document Server

    Toyota, N

    2005-01-01

    In considering a social network, there are cases where people is transferred to another place. Then the physical (direct) relations among nodes are lost by the movement. In terms of a network theory, some nodes break the present connections with neighboring nodes, move and there build new connections of nodes. For simplicity we here consider only that two nodes exchange the place each other on a network. Such exchange is assumed to be constantly carried out. We study this dynamic network (node exchange network NEN) and uncover some new features which usual networks do not contain. We mainly consider average path length and the diameter. Lastly we consider a propagation of one virus on the network by a computer simulation. They are compared to other networks investigated hitherto. The relation to a scale free network is also discussed.

  10. Isovector and hidden-beauty partners of the X(3872)

    Energy Technology Data Exchange (ETDEWEB)

    Høgaasen, Hallstein, E-mail: hallstein.hogasen@fys.uio.no [Department of Physics, University of Oslo, Box 1048, NO-0316 Oslo (Norway); Kou, Emi, E-mail: kou@lal.in2p3.fr [Laboratoire de l' Accélérateur Linéaire, Université Paris-Sud, IN2P3-CNRS, Centre Scientifique d' Orsay, 91898 Orsay Cedex (France); Richard, Jean-Marc, E-mail: j-m.richard@ipnl.in2p3.fr [Université de Lyon, Institut de Physique Nucléaire de Lyon, UCBL–IN2P3-CNRS, 4, rue Enrico Fermi, 69622 Villeurbanne Cedex (France); Sorba, Paul, E-mail: paul.sorba@lapth.cnrs.fr [LAPTh, Laboratoire d' Annecy-le-Vieux de Physique Théorique, CNRS, Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France)

    2014-05-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  11. Local clustering in scale-free networks with hidden variables.

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A J E M; van Leeuwaarden, Johan S H; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ∈(2,3), so that the degrees have infinite variance. The natural cutoff h_{c} characterizes the largest degrees in the hidden variable models, and a structural cutoff h_{s} introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N, as a function of h_{s} and h_{c}. For scale-free networks with exponent 2vanish only for networks as large as N=10^{9}.

  12. A Bell-type Theorem Without Hidden Variables

    CERN Document Server

    Stapp, Henry P

    2002-01-01

    Bell's theorem rules out local hidden-variable theories. The locality condition is the demand that what an experimenter freely chooses to measure in one space-time region has no influence in a second space-time region that is spacelike separated from the first. The hidden-variable stipulation means that this demand is implemented through requirements on an assumed-to-exist substructure involving hidden variables. The question thus arises whether the locality condition itself fails, or only its implementation by means of the assumed hidden-variable structure. This paper shows that any theory that satisfies two generally accepted features of orthodox quantum theory and that yields certain predictions of quantum theory cannot satisfy the afore-mentioned locality condition. These two features are that the choices made by the experimenters can be treated as localized free variables and that such free choices do not affect outcomes that have already occurred.

  13. Modelling proteins' hidden conformations to predict antibiotic resistance

    Science.gov (United States)

    Hart, Kathryn M.; Ho, Chris M. W.; Dutta, Supratik; Gross, Michael L.; Bowman, Gregory R.

    2016-10-01

    TEM β-lactamase confers bacteria with resistance to many antibiotics and rapidly evolves activity against new drugs. However, functional changes are not easily explained by differences in crystal structures. We employ Markov state models to identify hidden conformations and explore their role in determining TEM's specificity. We integrate these models with existing drug-design tools to create a new technique, called Boltzmann docking, which better predicts TEM specificity by accounting for conformational heterogeneity. Using our MSMs, we identify hidden states whose populations correlate with activity against cefotaxime. To experimentally detect our predicted hidden states, we use rapid mass spectrometric footprinting and confirm our models' prediction that increased cefotaxime activity correlates with reduced Ω-loop flexibility. Finally, we design novel variants to stabilize the hidden cefotaximase states, and find their populations predict activity against cefotaxime in vitro and in vivo. Therefore, we expect this framework to have numerous applications in drug and protein design.

  14. Recent Applications of Hidden Markov Models in Computational Biology

    Institute of Scientific and Technical Information of China (English)

    Khar Heng Choo; Joo Chuan Tong; Louxin Zhang

    2004-01-01

    This paper examines recent developments and applications of Hidden Markov Models (HMMs) to various problems in computational biology, including multiple sequence alignment, homology detection, protein sequences classification, and genomic annotation.

  15. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  16. Dark matter in the nonabelian hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2015-01-01

    We discuss the dark matter in the hidden gauge theory. We propose a scenario where the mini-inflation dilutes the dark matter density. This scenario is consistent with the current baryon number asymmetry.

  17. Hidden Symmetry from Supersymmetry in One-Dimensional Quantum Mechanics

    Directory of Open Access Journals (Sweden)

    Alexander A. Andrianov

    2009-06-01

    Full Text Available When several inequivalent supercharges form a closed superalgebra in Quantum Mechanics it entails the appearance of hidden symmetries of a Super-Hamiltonian. We examine this problem in one-dimensional QM for the case of periodic potentials and potentials with finite number of bound states. After the survey of the results existing in the subject the algebraic and analytic properties of hidden-symmetry differential operators are rigorously elaborated in the Theorems and illuminated by several examples.

  18. Stabilization of stochastic systems with hidden Markovian jumps

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper considers the adaptive control of discrete-time hybrid stochastic systems with unknown randomly jumping parameters described by a finite-state hidden Markov chain. An intuitive yet longstanding conjecture in this area is that such hybrid systems can be adaptively stabilized whenever the rate of transition of the hidden Markov chain is small enough. This paper provides a rigorous positive answer to this conjecture by establishing the global stability of a gradient-algorithm-based adaptive linear-quadratic control.

  19. Extracting hidden trails and roads under canopy using LIDAR

    OpenAIRE

    Krougios, Prokopios

    2008-01-01

    The field of Remote Sensing has been greatly benefited by the development of LIDAR. The extraction of bare earth under tree canopies and especially the identification of hidden trails are important tools for military and civilian operations in dense forests. LIDAR data from Sequoia National Park in California (2008) and Fort Belvoir Military Base in Virginia (2007) were two areas that were selected for analysis. Quick Terrain Modeler software was used in order to recognize hidden trails....

  20. Physical nature of a hidden mass in the Universe

    Energy Technology Data Exchange (ETDEWEB)

    Doroshkevich, A.G.; Khlopov, M.Yu. (AN SSSR, Moscow. Inst. Prikladnoj Matematiki)

    1984-04-01

    The problem of an origin of the hidden mass of the Universe is discussed. Observation astronomic data on large-scale Universe structure and hidden mass distribution within the framework of the adiabatic theory of galaxies formation point out the dominance in nowadays Universe of weakly-interacting particles with 15-60 eV mass. Restrictions are obtained for a possible admixture of other relict particles.

  1. Hidden Markov Models with Factored Gaussian Mixtures Densities

    Institute of Scientific and Technical Information of China (English)

    LI Hao-zheng; LIU Zhi-qiang; ZHU Xiang-hua

    2004-01-01

    We present a factorial representation of Gaussian mixture models for observation densities in Hidden Markov Models(HMMs), which uses the factorial learning in the HMM framework. We derive the reestimation formulas for estimating the factorized parameters by the Expectation Maximization (EM) algorithm. We conduct several experiments to compare the performance of this model structure with Factorial Hidden Markov Models(FHMMs) and HMMs, some conclusions and promising empirical results are presented.

  2. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...

  3. Node for Front-End Developers

    CERN Document Server

    Means, Garann

    2012-01-01

    If you know how to use JavaScript in the browser, you already have the skills you need to put JavaScript to work on back-end servers with Node. This hands-on book shows you how to use this popular JavaScript platform to create simple server applications, communicate with the client, build dynamic pages, work with data, and tackle other tasks. Although Node has a complete library of developer-contributed modules to automate server-side development, this book will show you how to program with Node on your own, so you truly understand the platform. Discover firsthand how well Node works as a we

  4. Multi- Layer Tree Hierarchical Architecture Based on Web Service

    Institute of Scientific and Technical Information of China (English)

    TONG Hengjian; LI Deren; ZHU Xinyan; SHAO Zhenfeng

    2006-01-01

    To solve the problem of the information share and services integration in population information system, we propose a multi-layer tree hierarchical architecture. The com mand (Web Service Call) is recursively multicast from top layer of tree to bottom layer of tree and statistical data are gathered from bottom layer to top layer. We implemented the architecture by using Web Services technology. In our implementation, client program is the requestor of Web Services,and all leaf nodes of the last layer are only the provider of Web Services. For those nodes of intermediate layers, every node is not only the provider of Web Services, but also the dispatcher of Web Services. We take population census as an example to describe the working flow of the architecture.

  5. Thermal imaging method to visualize a hidden painting thermally excited by far infrared radiations

    Science.gov (United States)

    Davin, T.; Wang, X.; Chabane, A.; Pawelko, R.; Guida, G.; Serio, B.; Hervé, P.

    2015-06-01

    The diagnosis of hidden painting is a major issue for cultural heritage. In this paper, a non-destructive active infrared thermographic technique was considered to reveal paintings covered by a lime layer. An extended infrared spectral range radiation was used as the excitation source. The external long wave infrared energy source delivered to the surface is then propagated through the material until it encounters a painting zone. Due to several thermal effects, the sample surface then presents non-uniformity patterns. Using a high sensitive infrared camera, the presence of covered pigments can thus be highlighted by the analysis of the non-stationary phenomena. Reconstituted thermal contrast images of mural samples covered by a lime layer are shown.

  6. Reduced-Rank Hidden Markov Models

    CERN Document Server

    Siddiqi, Sajid M; Gordon, Geoffrey J

    2009-01-01

    We introduce the Reduced-Rank Hidden Markov Model (RR-HMM), a generalization of HMMs that can model smooth state evolution as in Linear Dynamical Systems (LDSs) as well as non-log-concave predictive distributions as in continuous-observation HMMs. RR-HMMs assume an m-dimensional latent state and n discrete observations, with a transition matrix of rank k <= m. This implies the dynamics evolve in a k-dimensional subspace, while the shape of the set of predictive distributions is determined by m. Latent state belief is represented with a k-dimensional state vector and inference is carried out entirely in R^k, making RR-HMMs as computationally efficient as k-state HMMs yet more expressive. To learn RR-HMMs, we relax the assumptions of a recently proposed spectral learning algorithm for HMMs (Hsu, Kakade and Zhang 2009) and apply it to learn k-dimensional observable representations of rank-k RR-HMMs. The algorithm is consistent and free of local optima, and we extend its performance guarantees to cover the RR-...

  7. A hidden classical symmetry of QCD

    CERN Document Server

    Glozman, L Ya

    2016-01-01

    The classical part of the QCD partition function (the integrand) has, ignoring irrelevant exact zero modes of the Dirac operator, a local SU(2N_F) \\supset SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A symmetry which is absent at the Lagrangian level. This symmetry is broken anomalously and spontaneously. Effects of spontaneous breaking of chiral symmetry are contained in the near-zero modes of the Dirac operator. If physics of anomaly is also encoded in the same near-zero modes, then their truncation on the lattice should recover a hidden classical SU(2N_F) symmetry in correlators and spectra. This naturally explains observation on the lattice of a large degeneracy of hadrons, that is higher than the SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A chiral symmetry, upon elimination by hands of the lowest-lying modes of the Dirac operator. We also discuss an implication of this symmetry for the high temperature QCD.

  8. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  9. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  10. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  11. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  12. Stochastic precipitation generator with hidden state covariates

    Science.gov (United States)

    Kim, Yongku; Lee, GyuWon

    2017-08-01

    Time series of daily weather such as precipitation, minimum temperature and maximum temperature are commonly required for various fields. Stochastic weather generators constitute one of the techniques to produce synthetic daily weather. The recently introduced approach for stochastic weather generators is based on generalized linear modeling (GLM) with covariates to account for seasonality and teleconnections (e.g., with the El Niño). In general, stochastic weather generators tend to underestimate the observed interannual variance of seasonally aggregated variables. To reduce this overdispersion, we incorporated time series of seasonal dry/wet indicators in the GLM weather generator as covariates. These seasonal time series were local (or global) decodings obtained by a hidden Markov model of seasonal total precipitation and implemented in the weather generator. The proposed method is applied to time series of daily weather from Seoul, Korea and Pergamino, Argentina. This method provides a straightforward translation of the uncertainty of the seasonal forecast to the corresponding conditional daily weather statistics.

  13. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  14. Coulomb gauge model for hidden charm tetraquarks

    Science.gov (United States)

    Xie, W.; Mo, L. Q.; Wang, Ping; Cotanch, Stephen R.

    2013-08-01

    The spectrum of tetraquark states with hidden charm is studied within an effective Coulomb gauge Hamiltonian approach. Of the four independent color schemes, two are investigated, the (qcbar)1(cqbar)1 singlet-singlet (molecule) and the (qc)3(qbarcbar)3 triplet-triplet (diquark), for selected JPC states using a variational method. The predicted masses of triplet-triplet tetraquarks are roughly a GeV heavier than the singlet-singlet states. There is also an interesting flavor dependence with (qqbar)1 (ccbar1) states about half a GeV lighter than (qcbar)1(qbarc)1. The lightest 1++ and 1-- predictions are in agreement with the observed X (3872) and Y (4008) masses suggesting they are molecules with ωJ / ψ and ηhc, rather than D*Dbar* and DDbar, type structure, respectively. Similarly, the lightest isovector 1++ molecule, having a ρJ / ψ flavor composition, has mass near the recently observed charged Zc (3900) value. These flavor configurations are consistent with observed X, Y and Zc decays to ππJ / ψ.

  15. Hidden topological angles and Lefschetz thimbles

    CERN Document Server

    Behtash, Alireza; Schaefer, Thomas; Unsal, Mithat

    2015-01-01

    We demonstrate the existence of hidden topological angles (HTAs) in a large class of quantum field theories and quantum mechanical systems. HTAs are distinct from theta-parameters in the lagrangian. They arise as invariant angle associated with saddle points of the complexified path integral and their descent manifolds (Lefschetz thimbles). Physical effects of HTAs become most transparent upon analytic continuation in $n_f$ to non-integer number of flavors, reducing in the integer $n_f$ limit to a $\\mathbb Z_2$ valued phase difference between dominant saddles. In ${\\cal N}=1$ super Yang-Mills theory we demonstrate the microscopic mechanism for the vanishing of the gluon condensate. The same effect leads to an anomalously small condensate in a QCD-like $SU(N)$ gauge theory with fermions in the two-index representation. The basic phenomenon is that, contrary to folklore, the gluon condensate can receive both positive and negative contributions in a semi-classical expansion. In quantum mechanics, a HTA leads to ...

  16. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  17. Hidden Web Data Extraction Using Dynamic Rule Generation

    Directory of Open Access Journals (Sweden)

    Anuradha

    2011-08-01

    Full Text Available World Wide Web is a global information medium of interlinked hypertext documents accessed via computers connected to the internet. Most of the users rely on traditional search engines to search theinformation on the web. These search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called Hidden Web which is hidden to present-day search engines. It lies behind search forms and this part of the web containing an almost endless amount of sources providing high quality information stored in specialized databases can be found in the depths of the WWW. A large amount of this Hidden web is structured i.e Hidden websites contain the information in the form of lists and tables. However visiting dozens of these sites and analyzing the results is very much time consuming task for user. Hence, it is desirable to build a prototype which will minimize user’s effort and give him high quality information in integrated form. This paper proposes a novel method that extracts the data records from the lists and tables of various hidden web sites of same domain using dynamic rule generation and forms a repository which is used for later searching. By searching the data from this repository, user will find the desired data at one place. It reduces the user’s effort to look at various result pages of different hidden websites.

  18. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  19. QCD sum rule study of hidden-charm pentaquarks

    CERN Document Server

    Chen, Hua-Xing; Chen, Wei; Steele, T G; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    We study the mass spectra of hidden-charm pentaquarks having spin $J = {1\\over2},{3\\over2},{5\\over2}$ and quark contents $uud c \\bar c$. We systematically construct all the relevant local hidden-charm pentaquark currents, and select some of them to perform QCD sum rule analyses. We find that the $P_c(4380)$ and $P_c(4450)$ can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. We also find the lowest-lying hidden-charm $J^P = 1/2^-$ pentaquark state of mass $4.33^{+0.17}_{-0.13}$ GeV, while the $J^P = 1/2^+$ mass prediction of 4.7--4.9 GeV is significantly higher. Similarly, the lowest-lying hidden-charm $J^P = 3/2^-$ pentaquark state mass is $4.37^{+0.18}_{-0.13}$ GeV, consistent with the $J^P = 3/2^-$ $P_c(4380)$, while the $J^P = 3/2^+$ is also significantly higher with a mass above 4.6 GeV. The hidden-charm $J^P = 5/2^-$ pentaquark state mass is 4.5--4.6 GeV, slightly larger than the $J^P = 5/2^+$ $P_c(4450)$.

  20. Wireless Network Coding with Local Network Views: Coded Layer Scheduling

    CERN Document Server

    Vahid, Alireza; Avestimehr, A Salman; Sabharwal, Ashutosh

    2011-01-01

    One of the fundamental challenges in the design of distributed wireless networks is the large dynamic range of network state. Since continuous tracking of global network state at all nodes is practically impossible, nodes can only acquire limited local views of the whole network to design their transmission strategies. In this paper, we study multi-layer wireless networks and assume that each node has only a limited knowledge, namely 1-local view, where each S-D pair has enough information to perform optimally when other pairs do not interfere, along with connectivity information for rest of the network. We investigate the information-theoretic limits of communication with such limited knowledge at the nodes. We develop a novel transmission strategy, namely Coded Layer Scheduling, that solely relies on 1-local view at the nodes and incorporates three different techniques: (1) per layer interference avoidance, (2) repetition coding to allow overhearing of the interference, and (3) network coding to allow inter...

  1. Sentinel Node Biopsy Alone versus Completion Axillary Node Dissection in Node Positive Breast Cancer: Systematic Review and Meta-Analysis

    Directory of Open Access Journals (Sweden)

    Rachna Ram

    2014-01-01

    Full Text Available Introduction. There has been recent interest in validity of completion axillary node dissection after a positive sentinel node. This systematic review aims to ascertain if sentinel lymph node dissection alone was noninferior to axillary lymph node dissection for breast cancer patients who have a positive sentinel node. Method. A systematic review of the electronic databases Embase, MEDLINE, and Cochrane Register of Controlled Trials was carried out. Only randomised trials that had patients with positive sentinel node as the study sample were included in the meta-analysis using the reported hazard ratios with a fixed effect model. Results. Three randomised controlled trials and five retrospective studies were identified. The pooled effect for overall survival was HR 0.94, 95% CI [0.79, 1.19], and for disease free survival was HR 0.83, 95% CI [0.60, 1.14]. The reported rates for locoregional recurrence were similar in both groups. The surgical morbidity was found to be significantly more in patients who had underwent axillary dissection. Conclusion. Amongst patients with micrometastasis in the sentinel node, no further axillary dissection is necessary. For patients with macrometastasis in the sentinel node, it is reasonable to consider omitting axillary dissection to avoid the morbidity of the procedure.

  2. Sentinel Node Biopsy Alone versus Completion Axillary Node Dissection in Node Positive Breast Cancer: Systematic Review and Meta-Analysis

    Science.gov (United States)

    Singh, Jasprit; McCaig, Eddie

    2014-01-01

    Introduction. There has been recent interest in validity of completion axillary node dissection after a positive sentinel node. This systematic review aims to ascertain if sentinel lymph node dissection alone was noninferior to axillary lymph node dissection for breast cancer patients who have a positive sentinel node. Method. A systematic review of the electronic databases Embase, MEDLINE, and Cochrane Register of Controlled Trials was carried out. Only randomised trials that had patients with positive sentinel node as the study sample were included in the meta-analysis using the reported hazard ratios with a fixed effect model. Results. Three randomised controlled trials and five retrospective studies were identified. The pooled effect for overall survival was HR 0.94, 95% CI [0.79, 1.19], and for disease free survival was HR 0.83, 95% CI [0.60, 1.14]. The reported rates for locoregional recurrence were similar in both groups. The surgical morbidity was found to be significantly more in patients who had underwent axillary dissection. Conclusion. Amongst patients with micrometastasis in the sentinel node, no further axillary dissection is necessary. For patients with macrometastasis in the sentinel node, it is reasonable to consider omitting axillary dissection to avoid the morbidity of the procedure. PMID:25383226

  3. Layer-layer competition in multiplex complex networks

    CERN Document Server

    Gómez-Gardeñes, Jesús; Gutiérrez, Gerardo; Arenas, Alex; Gómez, Sergio

    2015-01-01

    The coexistence of multiple types of interactions within social, technological and biological networks has moved the focus of the physics of complex systems towards a multiplex description of the interactions between their constituents. This novel approach has unveiled that the multiplex nature of complex systems has strong influence in the emergence of collective states and their critical properties. Here we address an important issue that is intrinsic to the coexistence of multiple means of interactions within a network: their competition. To this aim, we study a two-layer multiplex in which the activity of users can be localized in each of the layer or shared between them, favoring that neighboring nodes within a layer focus their activity on the same layer. This framework mimics the coexistence and competition of multiple communication channels, in a way that the prevalence of a particular communication platform emerges as a result of the localization of users activity in one single interaction layer. Our...

  4. Degree-layer theory of network topology

    CERN Document Server

    Zhou, Bin; Zhe, He

    2014-01-01

    The network topology can be described by the number of nodes and the interconnections among them. The degree of a node in a network is the number of connections it has to other nodes and the degree distribution is the probability distribution of these degrees over the whole network. Therefore, the degree is very important structural parameter of network topology. However, given the number of nodes and the degree of each node in a network, the topology of the network cannot be determined. Therefore, we propose the degree-layer theory of network topology to describe deeply the network topology. First, we propose the concept of degree-tree with the breadth-first search tree. The degrees of all nodes are layered and have a hierarchical structure. Second,the degree-layer theory is described in detail. Two new concepts are defined in the theory. An index is proposed to quantitatively distinguish the two network topologies. It also can quantitatively measure the stability of network topology built by a model mechani...

  5. Penile Cancer: Contemporary Lymph Node Management.

    Science.gov (United States)

    O'Brien, Jonathan S; Perera, Marlon; Manning, Todd; Bozin, Mike; Cabarkapa, Sonja; Chen, Emily; Lawrentschuk, Nathan

    2017-06-01

    In penile cancer, the optimal diagnostics and management of metastatic lymph nodes are not clear. Advances in minimally invasive staging, including dynamic sentinel lymph node biopsy, have widened the diagnostic repertoire of the urologist. We aimed to provide an objective update of the recent trends in the management of penile squamous cell carcinoma, and inguinal and pelvic lymph node metastases. We systematically reviewed several medical databases, including the Web of Science® (with MEDLINE®), Embase® and Cochrane databases, according to PRISMA (Preferred Reporting Items for Systematic Review and Meta-Analyses) guidelines. The search terms used were penile cancer, lymph node, sentinel node, minimally invasive, surgery and outcomes, alone and in combination. Articles pertaining to the management of lymph nodes in penile cancer were reviewed, including original research, reviews and clinical guidelines published between 1980 and 2016. Accurate and minimally invasive lymph node staging is of the utmost importance in the surgical management of penile squamous cell carcinoma. In patients with clinically node negative disease, a growing body of evidence supports the use of sentinel lymph node biopsies. Dynamic sentinel lymph node biopsy exposes the patient to minimal risk, and results in superior sensitivity and specificity profiles compared to alternate nodal staging techniques. In the presence of locoregional disease, improvements in inguinal or pelvic lymphadenectomy have reduced morbidity and improved oncologic outcomes. A multimodal approach of chemotherapy and surgery has demonstrated a survival benefit for patients with advanced disease. Recent developments in lymph node management have occurred in penile cancer, such as minimally invasive lymph node diagnosis and intervention strategies. These advances have been met with a degree of controversy in the contemporary literature. Current data suggest that dynamic sentinel lymph node biopsy provides excellent

  6. Was ist das Hidden Web? Die Entstehung, Eigenschaften und gesellschaftliche Bedeutung von anonymer Kommunikation im Hidden Web.

    OpenAIRE

    Papsdorf, Christian

    2016-01-01

    More than two-and-a-half million people currently use the Tor network to communicate anonymously via the Internet and gain access to online media that are not accessible using standard Internet technology. This sphere of communication can be described as the hidden web. In part because this phenomenon is very recent, the subject has scarcely been studied in the social sciences. It is therefore the purpose of this paper to answer four fundamental questions: What is the hidden web? What charact...

  7. Inter-layer synchronization in non-identical multi-layer networks.

    Science.gov (United States)

    Leyva, I; Sevilla-Escoboza, R; Sendiña-Nadal, I; Gutiérrez, R; Buldú, J M; Boccaletti, S

    2017-04-04

    Inter-layer synchronization is a dynamical process occurring in multi-layer networks composed of identical nodes. This process emerges when all layers are synchronized, while nodes in each layer do not necessarily evolve in unison. So far, the study of such inter-layer synchronization has been restricted to the case in which all layers have an identical connectivity structure. When layers are not identical, the inter-layer synchronous state is no longer a stable solution of the system. Nevertheless, when layers differ in just a few links, an approximate treatment is still feasible, and allows one to gather information on whether and how the system may wander around an inter-layer synchronous configuration. We report the details of an approximate analytical treatment for a two-layer multiplex, which results in the introduction of an extra inertial term accounting for structural differences. Numerical validation of the predictions highlights the usefulness of our approach, especially for small or moderate topological differences in the intra-layer coupling. Moreover, we identify a non-trivial relationship connecting the betweenness centrality of the missing links and the intra-layer coupling strength. Finally, by the use of multiplexed layers of electronic circuits, we study the inter-layer synchronization as a function of the removed links.

  8. Salvage Lymph Node Dissection for Node-only Recurrence of Prostate Cancer: Ready for Prime Time?

    Science.gov (United States)

    Suardi, Nazareno; Briganti, Alberto; Gandaglia, Giorgio; Fossati, Nicola; Montorsi, Francesco

    2016-12-30

    Several studies show that salvage lymph-node dissection for node-only recurrence of prostate cancer after radical treatment might represent a viable treatment modality for node-only recurrent PCa. However, as long as high quality data is not available, this approach should still be considered experimental.

  9. Role of dynamic sentinel node biopsy in carcinoma penis with or without palpable nodes

    Directory of Open Access Journals (Sweden)

    N Kathiresan

    2016-01-01

    Conclusion: DSLNB is a useful and reliable technique to identify the involved node(s in patients diagnosed as having carcinoma penis with clinical N0 status (with or without palpable nodes. It helps to avoid the morbidity associated with a staging inguinal dissection in these patients.

  10. On Prolonging Network Lifetime through Load-Similar Node Deployment in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jun Zheng

    2011-03-01

    Full Text Available This paper is focused on the study of the energy hole problem in the Progressive Multi-hop Rotational Clustered (PMRC-structure, a highly scalable wireless sensor network (WSN architecture. Based on an analysis on the traffic load distribution in PMRC-based WSNs, we propose a novel load-similar node distribution strategy combined with the Minimum Overlapping Layers (MOL scheme to address the energy hole problem in PMRC-based WSNs. In this strategy, sensor nodes are deployed in the network area according to the load distribution. That is, more nodes shall be deployed in the range where the average load is higher, and then the loads among different areas in the sensor network tend to be balanced. Simulation results demonstrate that the load-similar node distribution strategy prolongs network lifetime and reduces the average packet latency in comparison with existing nonuniform node distribution and uniform node distribution strategies. Note that, besides the PMRC structure, the analysis model and the proposed load-similar node distribution strategy are also applicable to other multi-hop WSN structures.

  11. On prolonging network lifetime through load-similar node deployment in wireless sensor networks.

    Science.gov (United States)

    Li, Qiao-Qin; Gong, Haigang; Liu, Ming; Yang, Mei; Zheng, Jun

    2011-01-01

    This paper is focused on the study of the energy hole problem in the Progressive Multi-hop Rotational Clustered (PMRC)-structure, a highly scalable wireless sensor network (WSN) architecture. Based on an analysis on the traffic load distribution in PMRC-based WSNs, we propose a novel load-similar node distribution strategy combined with the Minimum Overlapping Layers (MOL) scheme to address the energy hole problem in PMRC-based WSNs. In this strategy, sensor nodes are deployed in the network area according to the load distribution. That is, more nodes shall be deployed in the range where the average load is higher, and then the loads among different areas in the sensor network tend to be balanced. Simulation results demonstrate that the load-similar node distribution strategy prolongs network lifetime and reduces the average packet latency in comparison with existing nonuniform node distribution and uniform node distribution strategies. Note that, besides the PMRC structure, the analysis model and the proposed load-similar node distribution strategy are also applicable to other multi-hop WSN structures.

  12. A multi-node model for transient heat transfer analysis of stratospheric airships

    Science.gov (United States)

    Alam, Mohammad Irfan; Pant, Rajkumar S.

    2017-06-01

    This paper describes a seven-node thermal model for transient heat transfer analysis of a solar powered stratospheric airship in floating condition. The solar array is modeled as a three node system, viz., outer layer, solar cell and substrate. The envelope is also modeled in three nodes, and the contained gas is considered as the seventh node. The heat transfer equations involving radiative, infra-red and conductive heat are solved simultaneously using a fourth order Runge-Kutta Method. The model can be used to study the effect of solar radiation, ambient wind, altitude and location of deployment of the airship on the temperature of the solar array. The model has been validated against some experimental data and numerical results quoted in literature. The effect of change in the value of some operational parameters on temperature of the solar array, and hence on its power output is also discussed.

  13. Contrast enhanced ultrasound of sentinel lymph nodes

    Directory of Open Access Journals (Sweden)

    XinWu Cui

    2013-03-01

    Full Text Available Sentinel lymph nodes are the first lymph nodes in the region that receive lymphatic drainage from a primary tumor. The detection or exclusion of sentinel lymph node micrometastases is critical in the staging of cancer, especially breast cancer and melanoma because it directly affects patient’s prognosis and surgical management. Currently, intraoperative sentinel lymph node biopsies using blue dye and radioisotopes are the method of choice for the detection of sentinel lymph node with high identification rate. In contrast, conventional ultrasound is not capable of detecting sentinel lymph nodes in most cases. Contrast enhanced ultrasound with contrast specific imaging modes has been used for the evaluation and diagnostic work-up of peripherally located suspected lymphadenopathy. The method allows for real-time analysis of all vascular phases and the visualization of intranodal focal “avascular” areas that represent necrosis or deposits of neoplastic cells. In recent years, a number of animal and human studies showed that contrast enhanced ultrasound can be also used for the detection of sentinel lymph node, and may become a potential application in clinical routine. Several contrast agents have been used in those studies, including albumin solution, hydroxyethylated starch, SonoVue®, Sonazoid® and Definity®. This review summarizes the current knowledge about the use of ultrasound techniques in detection and evaluation of sentinel lymph node.

  14. Towards Interactive, Incremental Programming of ROS Nodes

    DEFF Research Database (Denmark)

    Adam, Marian Sorin; Schultz, Ulrik Pagh

    experimentation. We propose the use of an internal DSL providing both a tool to interactively create ROS nodes and a behaviour-replacement mechanism to interactively reshape existing ROS nodes by wrapping the external interfaces (the publish/subscribe topics), dynamically controlled using the Python command line...

  15. A multiple node software development environment

    Energy Technology Data Exchange (ETDEWEB)

    Heinicke, P.; Nicinski, T.; Constanta-Fanourakis, P.; Petravick, D.; Pordes, R.; Ritchie, D.; White, V.

    1987-06-01

    Experimenters on over 30 DECnet nodes at Fermilab use software developed, distributed, and maintained by the Data Acquisition Software Group. A general methodology and set of tools have been developed to distribute, use and manage the software on different sites. The methodology and tools are of interest to any group developing and using software on multiple nodes.

  16. A node architecture for disaster relief networking

    NARCIS (Netherlands)

    Hoeksema, F.W.; Heskamp, M.; Schiphorst, R.; Slump, C.H.

    2005-01-01

    In this paper we present node architecture for a personal node in a cognitive ad-hoc disaster relief network. This architecture is motivated from the network system requirements, especially single-hop distance and jamming-resilience requirements. It is shown that the power consumption of current-day

  17. Testnodes: a Lightweight Node-Testing Infrastructure

    Science.gov (United States)

    Fay, R.; Bland, J.

    2014-06-01

    A key aspect of ensuring optimum cluster reliability and productivity lies in keeping worker nodes in a healthy state. Testnodes is a lightweight node testing solution developed at Liverpool. While Nagios has been used locally for general monitoring of hosts and services, Testnodes is optimised to answer one question: is there any reason this node should not be accepting jobs? This tight focus enables Testnodes to inspect nodes frequently with minimal impact and provide a comprehensive and easily extended check with each inspection. On the server side, Testnodes, implemented in python, interoperates with the Torque batch server to control the nodes production status. Testnodes remotely and in parallel executes client-side test scripts and processes the return codes and output, adjusting the node's online/offline status accordingly to preserve the integrity of the overall batch system. Testnodes reports via log, email and Nagios, allowing a quick overview of node status to be reviewed and specific node issues to be identified and resolved quickly. This presentation will cover testnodes design and implementation, together with the results of its use in production at Liverpool, and future development plans.

  18. Localized Lymph Node Light Chain Amyloidosis

    Directory of Open Access Journals (Sweden)

    Binod Dhakal

    2015-01-01

    Full Text Available Immunoglobulin-derived light chain amyloidosis can occasionally be associated with localized disease. We present a patient with localized lymph node light chain amyloidosis without an underlying monoclonal protein or lymphoproliferative disorder and review the literature of lymph node amyloidosis discussing work-up and risk factors for systemic progression.

  19. Changes in human lymphocyte subpopulations in tonsils and regional lymph nodes of human head and neck squamous carcinoma compared to control lymph nodes

    Directory of Open Access Journals (Sweden)

    González-Femandez África

    2001-04-01

    Full Text Available Abstract Background Lymphoid tissues constitute basic structures where specific immune responses take place. This leads to the development of germinal centres (GCs, migration of cells and the generation of memory cells. Here, we have compared human tumour reactive lymph nodes and tonsils with control lymph nodes. Results The study by flow cytometry shows that in control lymph nodes the majority of cells were naive T-lymphocytes (CD45RA+/CD7+. In reactive nodes, although the percentage of CD45RO+ T cells remains constant, there is an increase in the number of B-lymphocytes, and a reduction in naive T cells. The percentage of cells expressing CD69 was similar in reactive nodes and in controls. In both cases, we have found two populations of B cells of either CD69- or CD69dull. Two populations of T cells, which are either negative for CD69 or express it in bright levels (CD69bright, were also found. The analysis of tissue sections by confocal microscopy revealed differences between control, tonsils and tumor reactive lymph nodes. In control lymph nodes, CD19 B cells are surrounded by a unique layer of CD69bright/CD45RO+ T cells. GCs from tonsils and from tumour reactive nodes are mainly constituted by CD19 B cells and have four distinct layers. The central zone is composed of CD69- B cells surrounded by CD69bright/CD45RO+ T cells. The mantle region has basically CD69dull B-lymphocytes and, finally, there is an outer zone with CD69-/CD45RO+ T cells. Conclusions Human secondary lymphoid organs react with an increase in the proportion of B lymphocytes and a decrease in the number of CD45RA+ T cells (naive. In tonsils, this is due to chronic pathogen stimulation, whereas in lymph nodes draining head and neck carcinomas the reaction is prompted by surrounded tumors. During this process, secondary lymphoid organs develop secondary follicles with a special organization of T and B cells in consecutive layers, that are described here by confocal microscopy

  20. Revealing the Hidden Language of Complex Networks

    Science.gov (United States)

    Yaveroğlu, Ömer Nebil; Malod-Dognin, Noël; Davis, Darren; Levnajic, Zoran; Janjic, Vuk; Karapandza, Rasa; Stojmirovic, Aleksandar; Pržulj, Nataša

    2014-04-01

    Sophisticated methods for analysing complex networks promise to be of great benefit to almost all scientific disciplines, yet they elude us. In this work, we make fundamental methodological advances to rectify this. We discover that the interaction between a small number of roles, played by nodes in a network, can characterize a network's structure and also provide a clear real-world interpretation. Given this insight, we develop a framework for analysing and comparing networks, which outperforms all existing ones. We demonstrate its strength by uncovering novel relationships between seemingly unrelated networks, such as Facebook, metabolic, and protein structure networks. We also use it to track the dynamics of the world trade network, showing that a country's role of a broker between non-trading countries indicates economic prosperity, whereas peripheral roles are associated with poverty. This result, though intuitive, has escaped all existing frameworks. Finally, our approach translates network topology into everyday language, bringing network analysis closer to domain scientists.

  1. Advanced CMOS device technologies for 45 nm node and below

    Directory of Open Access Journals (Sweden)

    A. Veloso, T. Hoffmann, A. Lauwers, H. Yu, S. Severi, E. Augendre, S. Kubicek, P. Verheyen, N. Collaert, P. Absil, M. Jurczak and S. Biesemans

    2007-01-01

    Full Text Available We review and discuss the latest developments and technology options for 45 nm node and below, with scaled planar bulk MOSFETs and MuGFETs as emerging devices. One of the main metal gate (MG candidates for scaled CMOS technologies are fully silicided (FUSI gates. In this work, by means of a selective and controlled poly etch-back integration process, dual work-function Ni-based FUSI/HfSiON CMOS circuits with record ring oscillator performance (high-VT are reported (17 ps at VDD=1.1 V and 20 pA/μm Ioff, meeting the ITRS 45 nm node requirement for low-power (LP CMOS. Compatibility of FUSI and other MG with known stress boosters like stressed CESL (contact-etch-stop-layer with high intrinsic stress or embedded SiGe in the pMOS S/D regions is validated. To obtain MuGFET devices that are competitive, as compared to conventional planar bulk devices, and that meet the stringent drive and leakage current requirements for the 32 nm node and beyond, higher channel mobilities are required. Results obtained by several strain engineering methods are presented here.

  2. Disease surveillance using a hidden Markov model

    Directory of Open Access Journals (Sweden)

    Wright Graeme

    2009-08-01

    Full Text Available Abstract Background Routine surveillance of disease notification data can enable the early detection of localised disease outbreaks. Although hidden Markov models (HMMs have been recognised as an appropriate method to model disease surveillance data, they have been rarely applied in public health practice. We aimed to develop and evaluate a simple flexible HMM for disease surveillance which is suitable for use with sparse small area count data and requires little baseline data. Methods A Bayesian HMM was designed to monitor routinely collected notifiable disease data that are aggregated by residential postcode. Semi-synthetic data were used to evaluate the algorithm and compare outbreak detection performance with the established Early Aberration Reporting System (EARS algorithms and a negative binomial cusum. Results Algorithm performance varied according to the desired false alarm rate for surveillance. At false alarm rates around 0.05, the cusum-based algorithms provided the best overall outbreak detection performance, having similar sensitivity to the HMMs and a shorter average time to detection. At false alarm rates around 0.01, the HMM algorithms provided the best overall outbreak detection performance, having higher sensitivity than the cusum-based Methods and a generally shorter time to detection for larger outbreaks. Overall, the 14-day HMM had a significantly greater area under the receiver operator characteristic curve than the EARS C3 and 7-day negative binomial cusum algorithms. Conclusion Our findings suggest that the HMM provides an effective method for the surveillance of sparse small area notifiable disease data at low false alarm rates. Further investigations are required to evaluation algorithm performance across other diseases and surveillance contexts.

  3. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  4. Foundational Forces & Hidden Variables in Technology Commercialization

    Science.gov (United States)

    Barnett, Brandon

    2011-03-01

    The science of physics seems vastly different from the process of technology commercialization. Physics strives to understand our world through the experimental deduction of immutable laws and dependent variables and the resulting macro-scale phenomenon. In comparison, the~goal of business is to make a profit by addressing the needs, preferences, and whims of individuals in a market. It may seem that this environment is too dynamic to identify all the hidden variables and deduct the foundational forces that impact a business's ability to commercialize innovative technologies. One example of a business ``force'' is found in the semiconductor industry. In 1965, Intel co-founder Gordon Moore predicted that the number of transistors incorporated in a chip will approximately double every 24 months. Known as Moore's Law, this prediction has become the guiding principle for the semiconductor industry for the last 40 years. Of course, Moore's Law is not really a law of nature; rather it is the result of efforts by Intel and the entire semiconductor industry. A closer examination suggests that there are foundational principles of business that underlie the macro-scale phenomenon of Moore's Law. Principles of profitability, incentive, and strategic alignment have resulted in a coordinated influx of resources that has driven technologies to market, increasing the profitability of the semiconductor industry and optimizing the fitness of its participants. New innovations in technology are subject to these same principles. So, in addition to traditional market forces, these often unrecognized forces and variables create challenges for new technology commercialization. In this talk, I will draw from ethnographic research, complex adaptive theory, and industry data to suggest a framework with which to think about new technology commercialization. Intel's bio-silicon initiative provides a case study.

  5. Extended lymph node dissection for prostate cancer.

    Science.gov (United States)

    Jeschke, Stephan; Burkhard, Fiona C; Thurairaja, Ramesh; Dhar, Nivedita; Studer, Urs E

    2008-05-01

    Lymph node status is an important determinant for the management of patients with newly diagnosed prostate cancer. Given the significant limitations of cross-sectional and functional preoperative imaging in the detection of small metastases, pelvic lymph node dissection remains the only reliable staging method in clinically localized prostate cancer. Although lymph node dissection is a well-established form of staging in prostate cancer, controversy remains about indications and the surgical extent of the procedure. Reported practices vary from omitting pelvic lymph node dissection in low-risk disease to routine pelvic lymph node dissection in all radical prostatectomy patients. This review highlights the recent literature concerning pelvic lymphadenectomy in prostate cancer with respect to anatomical extent and oncologic outcome.

  6. Locating influential nodes in complex networks

    Science.gov (United States)

    Malliaros, Fragkiskos D.; Rossi, Maria-Evgenia G.; Vazirgiannis, Michalis

    2016-01-01

    Understanding and controlling spreading processes in networks is an important topic with many diverse applications, including information dissemination, disease propagation and viral marketing. It is of crucial importance to identify which entities act as influential spreaders that can propagate information to a large portion of the network, in order to ensure efficient information diffusion, optimize available resources or even control the spreading. In this work, we capitalize on the properties of the K-truss decomposition, a triangle-based extension of the core decomposition of graphs, to locate individual influential nodes. Our analysis on real networks indicates that the nodes belonging to the maximal K-truss subgraph show better spreading behavior compared to previously used importance criteria, including node degree and k-core index, leading to faster and wider epidemic spreading. We further show that nodes belonging to such dense subgraphs, dominate the small set of nodes that achieve the optimal spreading in the network.

  7. A layer reduction based community detection algorithm on multiplex networks

    Science.gov (United States)

    Wang, Xiaodong; Liu, Jing

    2017-04-01

    Detecting hidden communities is important for the analysis of complex networks. However, many algorithms have been designed for single layer networks (SLNs) while just a few approaches have been designed for multiplex networks (MNs). In this paper, we propose an algorithm based on layer reduction for detecting communities on MNs, which is termed as LRCD-MNs. First, we improve a layer reduction algorithm termed as neighaggre to combine similar layers and keep others separated. Then, we use neighaggre to find the community structure hidden in MNs. Experiments on real-life networks show that neighaggre can obtain higher relative entropy than the other algorithm. Moreover, we apply LRCD-MNs on some real-life and synthetic multiplex networks and the results demonstrate that, although LRCD-MNs does not have the advantage in terms of modularity, it can obtain higher values of surprise, which is used to evaluate the quality of partitions of a network.

  8. Hidden Degeneracies in Piecewise Smooth Dynamical Systems

    Science.gov (United States)

    Jeffrey, Mike R.

    When a flow suffers a discontinuity in its vector field at some switching surface, the flow can cross through or slide along the surface. Sliding along the switching surface can be understood as the flow along an invariant manifold inside a switching layer. It turns out that the usual method for finding sliding modes — the Filippov convex combination or Utkin equivalent control — results in a degeneracy in the switching layer whenever the flow is tangent to the switching surface from both sides. We derive the general result and analyze the simplest case here, where the flow curves parabolically on either side of the switching surface (the so-called fold-fold or two-fold singularities). The result is a set of zeros of the fast switching flow inside the layer, which is structurally unstable to perturbation by terms nonlinear in the switching parameter, terms such as (signx)2 [where the superscript does mean “squared”]. We provide structurally stable forms, and show that in this form the layer system is equivalent to a generic singularity of a two timescale system. Finally we show that the same degeneracy arises when a discontinuity is smoothed using standard regularization methods.

  9. Hidden Gauge Structure of Supersymmetric Free Differential Algebras

    CERN Document Server

    Andrianopoli, L; Ravera, L

    2016-01-01

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q' introduced in Ref. [3] and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B^(2) and B^(3) in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of t...

  10. Defining nodes in complex brain networks

    Directory of Open Access Journals (Sweden)

    Matthew Lawrence Stanley

    2013-11-01

    Full Text Available Network science holds great promise for expanding our understanding of the human brain in health, disease, development, and aging. Network analyses are quickly becoming the method of choice for analyzing functional MRI data. However, many technical issues have yet to be confronted in order to optimize results. One particular issue that remains controversial in functional brain network analyses is the definition of a network node. In functional brain networks a node represents some predefined collection of brain tissue, and an edge measures the functional connectivity between pairs of nodes. The characteristics of a node, chosen by the researcher, vary considerably in the literature. This manuscript reviews the current state of the art based on published manuscripts and highlights the strengths and weaknesses of three main methods for defining nodes. Voxel-wise networks are constructed by assigning a node to each, equally sized brain area (voxel. The fMRI time-series recorded from each voxel is then used to create the functional network. Anatomical methods utilize atlases to define the nodes based on brain structure. The fMRI time-series from all voxels within the anatomical area are averaged and subsequently used to generate the network. Functional activation methods rely on data from traditional fMRI activation studies, often from databases, to identify network nodes. Such methods identify the peaks or centers of mass from activation maps to determine the location of the nodes. Small (~10-20 millimeter diameter spheres located at the coordinates of the activation foci are then applied to the data being used in the network analysis. The fMRI time-series from all voxels in the sphere are then averaged, and the resultant time series is used to generate the network. We attempt to clarify the discussion and move the study of complex brain networks forward. While the correct method to be used remains an open, possibly unsolvable question that

  11. Evidence Feed Forward Hidden Markov Model: A New Type of Hidden Markov Model

    CERN Document Server

    DelRose, Michael; Frederick, Philip; 10.5121/ijaia.2011.2101

    2011-01-01

    The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM), and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important...

  12. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  13. Riboswitch Detection Using Profile Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Krishnamachari A

    2009-10-01

    Full Text Available Abstract Background Riboswitches are a type of noncoding RNA that regulate gene expression by switching from one structural conformation to another on ligand binding. The various classes of riboswitches discovered so far are differentiated by the ligand, which on binding induces a conformational switch. Every class of riboswitch is characterized by an aptamer domain, which provides the site for ligand binding, and an expression platform that undergoes conformational change on ligand binding. The sequence and structure of the aptamer domain is highly conserved in riboswitches belonging to the same class. We propose a method for fast and accurate identification of riboswitches using profile Hidden Markov Models (pHMM. Our method exploits the high degree of sequence conservation that characterizes the aptamer domain. Results Our method can detect riboswitches in genomic databases rapidly and accurately. Its sensitivity is comparable to the method based on the Covariance Model (CM. For six out of ten riboswitch classes, our method detects more than 99.5% of the candidates identified by the much slower CM method while being several hundred times faster. For three riboswitch classes, our method detects 97-99% of the candidates relative to the CM method. Our method works very well for those classes of riboswitches that are characterized by distinct and conserved sequence motifs. Conclusion Riboswitches play a crucial role in controlling the expression of several prokaryotic genes involved in metabolism and transport processes. As more and more new classes of riboswitches are being discovered, it is important to understand the patterns of their intra and inter genomic distribution. Understanding such patterns will enable us to better understand the evolutionary history of these genetic regulatory elements. However, a complete picture of the distribution pattern of riboswitches will emerge only after accurate identification of riboswitches across genomes

  14. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  15. Evidence Feed Forward Hidden Markov Model: A New Type Of Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Michael Del Rose

    2011-01-01

    Full Text Available The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM, and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important in creating intelligent algorithms for determining human actions based on visual observations. The Evidence Feed Forward Hidden Markov Model is a newly developed algorithm which provides observation to observation linkages. The following research addresses the theory behind Evidence Feed Forward HMMs, provides mathematical proofs of their learning of these parameters to optimize the likelihood of observations with a Evidence Feed Forwards HMM, which is important in all computational intelligence algorithm, and gives comparative examples with standard HMMs in classification of both visual action data and measurement data; thus providing a strong base for Evidence Feed Forward HMMs in classification of many types of problems.

  16. Checkpointing for a hybrid computing node

    Energy Technology Data Exchange (ETDEWEB)

    Cher, Chen-Yong

    2016-03-08

    According to an aspect, a method for checkpointing in a hybrid computing node includes executing a task in a processing accelerator of the hybrid computing node. A checkpoint is created in a local memory of the processing accelerator. The checkpoint includes state data to restart execution of the task in the processing accelerator upon a restart operation. Execution of the task is resumed in the processing accelerator after creating the checkpoint. The state data of the checkpoint are transferred from the processing accelerator to a main processor of the hybrid computing node while the processing accelerator is executing the task.

  17. Lymph node involvement in multicystic peritoneal mesothelioma.

    Science.gov (United States)

    Engohan-Aloghe, Corinne; Anaf, Vincent; Noël, Jean Christophe

    2009-11-01

    Multicystic peritoneal mesothelioma is an uncommon lesion most frequently encountered in women of reproductive age. Although the pathologic characteristics have been documented, the lymph node status associated with this pathology, the etiopathogenesis and prognosis of which remain unclear, is unknown. We report here the case of a 35-year-old woman with a 5.5 cm multicystic mesothelioma affecting the pelvic peritoneum of the rectum. Involvement by multicystic mesothelioma was observed within two lymph nodes simultaneously resected with the tumor. To the best of our knowledge, lymph node involvement has not been described in previous studies.

  18. Inguinal Lymph Node Anthracosis: A Case Report

    Science.gov (United States)

    Soto, Carlos Alberto

    2016-01-01

    Summary: Anthracosis is defined as black, dense pigments in tissues, usually carbon deposits. We, as surgeons, have to make decisions during surgery to the best of our knowledge and based on what the literature provides us. We present the case of a 30-year-old female patient who underwent abdominoplasty. During surgery, bilateral inguinal pigmented and enlarged lymph nodes were seen. Biopsy of the nodes was done to rule out any malignancy. The results showed tattoo pigments on all lymph nodes. We present this case as tattoo pigment migration, which has been rarely described. PMID:27536493

  19. Recent Progress in Search for Hidden/Dark Photon

    CERN Document Server

    Deliyergiyev, M A

    2015-01-01

    We will try to communicate the many difficulties that we encounter when attempting to pinpoint a common origin for the several observed anomalies, or assessing their tension with existing exclusion limits. These include systematics affecting the operation of the detectors, our knowledge of their response, astrophysical uncertainties, and the broad range of particle couplings that can mediate the interaction with a detector target. The interesting astrophysical evidence that motivates a search for dark-photon and focuses our attention on a Hidden Valleys model with a GeV-scale dark sector that produces the exciting signatures, which may include the possible constituent of dark matter, the possible existence of extra gauge groups. Results from the recent underground experiments are also considered. Many models of new physics beyond the Standard Model contain a 'light' hidden sector (dark sector) with a colorful spectrum of new particles. Recently, it has been shown that the hidden sector can give rise to unique...

  20. Applications of hidden symmetries to black hole physics

    Energy Technology Data Exchange (ETDEWEB)

    Frolov, Valeri, E-mail: vfrolov@ualberta.ca [Institute of Theoretical Physics, Department of Physics University of Alberta, Edmonton, Alberta, T6G 2G7 (Canada)

    2011-02-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  1. The hidden-charm pentaquark and tetraquark states

    CERN Document Server

    Chen, Hua-Xing; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    In the past decade many charmonium-like states were observed experimentally. Especially those charged charmonium-like $Z_c$ states and bottomonium-like $Z_b$ states can not be accommodated within the naive quark model. These charged $Z_c$ states are good candidates of either the hidden-charm tetraquark states or molecules composed of a pair of charmed mesons. Recently, the LHCb Collaboration discovered two hidden-charm pentaquark states, which are also beyond the quark model. In this work, we review the current experimental progress and investigate various theoretical interpretations of these candidates of the multiquark states. We list the puzzles and theoretical challenges of these models when confronted with the experimental data. We also discuss possible future measurements which may distinguish the theoretical schemes on the underlying structures of the hidden-charm multiquark states.

  2. Ontology-based Knowledge Extraction from Hidden Web

    Institute of Scientific and Technical Information of China (English)

    SONG Hui; MA Fan-yuan; LIU Xiao-qiang

    2004-01-01

    Hidden Web provides great amount of domain-specific data for constructing knowledge services. Most previous knowledge extraction researches ignore the valuable data hidden in Web database, and related works do not refer how to make extracted information available for knowledge system. This paper describes a novel approach to build a domain-specific knowledge service with the data retrieved from Hidden Web. Ontology serves to model the domain knowledge. Queries forms of different Web sites are translated into machine-understandable format, defined knowledge concepts, so that they can be accessed automatically. Also knowledge data are extracted from Web pages and organized in ontology format knowledge. The experiment proves the algorithm achieves high accuracy and the system facilitates constructing knowledge services greatly.

  3. Applications of hidden symmetries to black hole physics

    CERN Document Server

    Frolov, Valeri

    2010-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set (`tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  4. Using the hidden curriculum to teach professionalism in nursing students.

    Science.gov (United States)

    Karimi, Zohreh; Ashktorab, Tahereh; Mohammadi, Easa; Abedi, Heidar Ali

    2014-03-01

    Professionalism in nursing is critical for creating credibility and a positive image. This study was carried out to explain the use of hidden curriculum in teaching professionalism in nursing students. This qualitative study was conducted through purposeful sampling strategy by the participation of 32 nursing students. The data were collected by using semi-structured interviews, and this process was continued until achieving data saturation and themes' emergence. Content analysis method was used for data analysis. DATA ANALYSIS REVEALED THREE MAIN THEMES: Development of understanding the professionalism elements, Variety of influenceability strategies, and Influenceability to various resources. Each theme consisted of some subthemes. The nursing students learnt the professionalism elements by different methods from different resources through the hidden curriculum. Therefore, exploration of the currently administered hidden curricula is suggested.

  5. phylo-node: A molecular phylogenetic toolkit using Node.js.

    Science.gov (United States)

    O'Halloran, Damien M

    2017-01-01

    Node.js is an open-source and cross-platform environment that provides a JavaScript codebase for back-end server-side applications. JavaScript has been used to develop very fast and user-friendly front-end tools for bioinformatic and phylogenetic analyses. However, no such toolkits are available using Node.js to conduct comprehensive molecular phylogenetic analysis. To address this problem, I have developed, phylo-node, which was developed using Node.js and provides a stable and scalable toolkit that allows the user to perform diverse molecular and phylogenetic tasks. phylo-node can execute the analysis and process the resulting outputs from a suite of software options that provides tools for read processing and genome alignment, sequence retrieval, multiple sequence alignment, primer design, evolutionary modeling, and phylogeny reconstruction. Furthermore, phylo-node enables the user to deploy server dependent applications, and also provides simple integration and interoperation with other Node modules and languages using Node inheritance patterns, and a customized piping module to support the production of diverse pipelines. phylo-node is open-source and freely available to all users without sign-up or login requirements. All source code and user guidelines are openly available at the GitHub repository: https://github.com/dohalloran/phylo-node.

  6. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  7. Detect and exploit hidden structure in fatty acid signature data

    Science.gov (United States)

    Budge, Suzanne; Bromaghin, Jeffrey; Thiemann, Gregory

    2017-01-01

    Estimates of predator diet composition are essential to our understanding of their ecology. Although several methods of estimating diet are practiced, methods based on biomarkers have become increasingly common. Quantitative fatty acid signature analysis (QFASA) is a popular method that continues to be refined and extended. Quantitative fatty acid signature analysis is based on differences in the signatures of prey types, often species, which are recognized and designated by investigators. Similarly, predator signatures may be structured by known factors such as sex or age class, and the season or region of sample collection. The recognized structure in signature data inherently influences QFASA results in important and typically beneficial ways. However, predator and prey signatures may contain additional, hidden structure that investigators either choose not to incorporate into an analysis or of which they are unaware, being caused by unknown ecological mechanisms. Hidden structure also influences QFASA results, most often negatively. We developed a new method to explore signature data for hidden structure, called divisive magnetic clustering (DIMAC). Our DIMAC approach is based on the same distance measure used in diet estimation, closely linking methods of data exploration and parameter estimation, and it does not require data transformation or distributional assumptions, as do many multivariate ordination methods in common use. We investigated the potential benefits of the DIMAC method to detect and subsequently exploit hidden structure in signature data using two prey signature libraries with quite different characteristics. We found that the existence of hidden structure in prey signatures can increase the confusion between prey types and thereby reduce the accuracy and precision of QFASA diet estimates. Conversely, the detection and exploitation of hidden structure represent a potential opportunity to improve predator diet estimates and may lead to new

  8. Performance based analysis of hidden beams in reinforced concrete structures

    Directory of Open Access Journals (Sweden)

    Helou Samir H.

    2014-01-01

    Full Text Available Local and perhaps regional vernacular reinforced concrete building construction leans heavily against designing slabs with imbedded hidden beams for flooring systems in most structures including major edifices. The practice is distinctive in both framed and in shear wall structures. Hidden beams are favoured structural elements due to their many inherent features that characterize them; they save on floor height clearance; they also save on formwork, labour and material cost. Moreover, hidden beams form an acceptable aesthetic appearance that does not hinder efficient interior space partitioning. Such beams have the added advantage of clearing the way for horizontal electromechanical ductwork. However, seismic considerations, in all likelihood, are seldom seriously addressed. The mentioned structural system of shallow beams is adopted in ribbed slabs, waffle slabs and at times with solid slabs. Ribbed slabs and waffle slabs are more prone to hidden beam inclusion due to the added effective height of the concrete section. Due to the presence of a relatively high reinforcement ratio at the joints the sections at such location tend to become less ductile with unreliable contribution to spandrel force resistance. In the following study the structural influence of hidden beams within slabs is investigated. With the primary focus on a performance based analysis of such elements within a structure. This is investigated with due attention to shear wall contribution to the overall behaviour of such structures. Numerical results point in the direction that the function of hidden beams is not as adequate as desired. Therefore it is strongly believed that they are generally superfluous and maybe eliminated altogether. Conversely, shallow beams seem to render the overall seismic capacity of the structure unreliable. Since such an argument is rarely manifested within the linear analysis domain; a pushover analysis exercise is thus mandatory for behaviour

  9. Reheating the Standard Model from a hidden sector

    Science.gov (United States)

    Tenkanen, Tommi; Vaskonen, Ville

    2016-10-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before big bang nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful big bang nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  10. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-01-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  11. Backward causation, hidden variables and the meaning of completeness

    Indian Academy of Sciences (India)

    Huw Price

    2001-02-01

    Bell’s theorem requires the assumption that hidden variables are independent of future measurement settings. This independence assumption rests on surprisingly shaky ground. In particular, it is puzzlingly time-asymmetric. The paper begins with a summary of the case for considering hidden variable models which, in abandoning this independence assumption, allow a degree of ‘backward causation’. The remainder of the paper clarifies the physical significance of such models, in relation to the issue as to whether quantum mechanics provides a complete description of physical reality.

  12. Dynamically Generated Open and Hidden Charm Meson Systems

    CERN Document Server

    Gamermann, D; Strottman, D D; Vacas, M J V

    2006-01-01

    The lowest order chiral Lagrangian successfully applied to study the interaction of the SU(3) octet of pseudo-scalar mesons is generalized to include all mesons from the SU(4) 15-plet of pseudo-scalar mesons. Exchanges of heavy vector mesons, which are indirectly taken into account via this approach, are suppressed. Unitarization in coupled channels leads to dynamical generation of resonances in the open and hidden charm sectors. In particular, for reasonable values of the input, a new narrow scalar resonance in the hidden charm sector appears with a mass of 3.7 GeV.

  13. Reheating the Standard Model from a Hidden Sector

    CERN Document Server

    Tenkanen, Tommi

    2016-01-01

    We consider a scenario where the inflaton decays to a hidden sector thermally decoupled from the visible Standard Model sector. A tiny portal coupling between the hidden and the visible sectors later heats the visible sector so that the Standard Model degrees of freedom come to dominate the energy density of the Universe before Big Bang Nucleosynthesis. We find that this scenario is viable, although obtaining the correct dark matter abundance and retaining successful Big Bang Nucleosynthesis is not obvious. We also show that the isocurvature perturbations constituted by a primordial Higgs condensate are not problematic for the viability of the scenario.

  14. On Noncontextual, Non-Kolmogorovian Hidden Variable Theories

    Science.gov (United States)

    Feintzeig, Benjamin H.; Fletcher, Samuel C.

    2017-02-01

    One implication of Bell's theorem is that there cannot in general be hidden variable models for quantum mechanics that both are noncontextual and retain the structure of a classical probability space. Thus, some hidden variable programs aim to retain noncontextuality at the cost of using a generalization of the Kolmogorov probability axioms. We generalize a theorem of Feintzeig (Br J Philos Sci 66(4): 905-927, 2015) to show that such programs are committed to the existence of a finite null cover for some quantum mechanical experiments, i.e., a finite collection of probability zero events whose disjunction exhausts the space of experimental possibilities.

  15. Image Coding using Markov Models with Hidden States

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto

    1999-01-01

    The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same.......The Cylinder Partially Hidden Markov Model (CPH-MM) is applied to lossless coding of bi-level images. The original CPH-MM is relaxed for the purpose of coding by not imposing stationarity, but otherwise the model description is the same....

  16. How to Find a Hidden World at the LHC

    CERN Document Server

    Wells, James D

    2008-01-01

    I discuss how the Large Hadron Collider era should broaden our view of particle physics research, and apply this thinking to the case of Hidden Worlds. I focus on one of the simplest representative cases of a Hidden World, and detail the rich implications it has for LHC physics, including universal suppression of Higgs boson production, trans-TeV heavy Higgs boson signatures, heavy-to-light Higgs boson decays, weakly coupled exotic gauge bosons, and Higgs boson decays to four fermions via light exotic gauge bosons. Some signatures may be accessible in the very early stages of collider operation, whereas others motivate a later high-lumonosity upgrade.

  17. Sentinel lymph node biopsy in oral cancer

    DEFF Research Database (Denmark)

    Thomsen, Jørn Bo; Sørensen, Jens Ahm; Grupe, Peter;

    2005-01-01

    PURPOSE: To validate lymphatic mapping combined with sentinel lymph node biopsy as a staging procedure, and to evaluate the possible clinical implications of added oblique lymphoscintigraphy and/or tomography and test the intra- and interobserver reproducibility of lymphoscintigraphy. MATERIAL...... AND METHODS: Forty patients (17 F and 23 M, aged 32-90) with 24 T1 and 16 T2 squamous cell carcinoma of the oral cavity. Planar lymphoscintigraphy, emission and transmission tomography were performed. Detection and excision of the sentinel nodes were guided by a gamma probe. The sentinel nodes were step......-sectioning and stained with hematoxylin and eosin and cytokeratin (CK 1). Histology and follow-up were used as "gold standard". Tumor location, number of sentinel lymph nodes, metastasis, and recurrences were registered. Two observers evaluated the lymphoscintigraphic images to assess the inter-rater agreement. RESULTS...

  18. WHOI MVCO 12m Node ADCP SOS

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Wave observations from the 12m node ADCP in the Martha's Vineyard Coastal Observatory (MVCO) in the northwest Atlantic in coastal waters of North America. Extensive,...

  19. ARC Code TI: NodeMon

    Data.gov (United States)

    National Aeronautics and Space Administration — NodeMon is a resource utilization monitor tailored to the Altix architecture, but is applicable to any Linux system or cluster. It allows distributed resource...

  20. Axillary node metastasis from primary ovarian carcinoma

    Directory of Open Access Journals (Sweden)

    Trupti S Patel

    2014-01-01

    Full Text Available Metastasization and distinction from mammary carcinoma is of great clinical importance because of different treatment modalities. Here, we discuss a case of stage IIIC ovarian serous carcinoma, presenting with bilateral axillary nodes metastasis after 25 months interval of its initial presentation. Increased serum CA-125 level caused clinical suspicion. Computed tomography scan of abdomen and pelvis showed no residual disease or any abdominal lymphadenopathy. Mammography of both breast were normal. Bilateral axillary nodes were noted. Guided fine needle aspiration cytology (FNAC and biopsy of ovarian carcinoma to axillary node is a rare event. Its recogn done. Cytomorphology revealed poorly differentiated carcinoma, compatible to that of primary ovarian tumor. Thus, metastatic carcinoma to axillary node from ovary was confirmed. This case illustrates a rare metastatic presentation of ovarian carcinoma and unequivocal role of FNAC to provide rapid diagnosis and preferred to be first line diagnostic procedure.

  1. PROTOCOLS FOR INCREASING THE LIFETIME OF NODES OF AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    B.Malarkodi

    2010-03-01

    Full Text Available Power consumption of nodes in ad hoc networks is a critical issue as they predominantly operate on batteries. In order to improve the lifetime of an ad hoc network, all the nodes must be utilized evenly and the power required for connections must be minimized. Energy management deals with the process of managing energy resources by means of controlling the battery discharge, adjusting the transmission power and scheduling of power sources so as to increase the lifetime of the nodes of an ad hoc wireless network. In this paper, two protocols are proposed to improve the lifetime of the nodes. The first protocol assumes smart battery packages with L cells and uses dynamic programming (DP to optimally select the set of cells used to satisfy a request for power. The second one proposes a MAC layer protocol denoted as Power Aware medium Access Control (PAMAC protocol which enables the network layer to select a route with minimum total power requirement among the possible routes between a source and a destination provided all nodes in the routes have battery capacity above a threshold. The life time of the nodes using the DP based scheduling policy is found through simulation and compared with that obtained using the techniques reported in the literature. It is found that DP based policy increases the lifetime of the mobile nodes by a factor of 1.15 to 1.8. The life expectancy, the average power consumption and throughput of the network using PAMAC protocol are computed through simulation and compared with that of the other MAC layer protocols 802.11, MACA, and CSMA. Besides this, the life expectancy and average power consumption of the network for different values of threshold are also compared. From the simulation results, it is observed that PAMAC consumes the least power and provides the longest lifetime among the various MAC Layer protocols. Moreover, using PAMAC as the MAC layer protocol, the performance obtained using different routing layer

  2. Genetic algorithm based support vector machine regression in predicting wave transmission of horizontally interlaced multi-layer moored floating pipe breakwater

    Digital Repository Service at National Institute of Oceanography (India)

    Patil, S.G.; Mandal, S.; Hegde, A.V.

    , number of hidden layers and neurons by trial and error, which is time consuming. To overcome the problems inherent in ANN training procedures Jeng et al., [19] adopted the concept of genetic algorithm based training of ANN models, which provided...-fuzzy inference system (ANFIS), which is a five-layer feed-forward neural network, which includes fuzzification layer, rule layer, normalization layer, defuzzification layer and a single summation neuron . It is a hybrid neuro-fuzzy technique that brings...

  3. 78 FR 17744 - Culturally Significant Objects Imported for Exhibition Determinations: “Maya: Hidden Worlds...

    Science.gov (United States)

    2013-03-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Culturally Significant Objects Imported for Exhibition Determinations: ``Maya: Hidden Worlds Revealed... determine that the objects to be included in the exhibition ``Maya: Hidden Worlds Revealed,'' imported...

  4. The Function and the Utilization of Hidden Curriculum in College English Teaching

    Institute of Scientific and Technical Information of China (English)

    张英

    2013-01-01

    Explore the nature of the hidden curriculum, and utilize the positive functions of hidden curriculum with theory on English teaching and psychological linguistics to obtain desirable effects in College English teaching.

  5. Dynamically reassigning a connected node to a block of compute nodes for re-launching a failed job

    Science.gov (United States)

    Budnik, Thomas A [Rochester, MN; Knudson, Brant L [Rochester, MN; Megerian, Mark G [Rochester, MN; Miller, Samuel J [Rochester, MN; Stockdell, William M [Byron, MN

    2012-03-20

    Methods, systems, and products for dynamically reassigning a connected node to a block of compute nodes for re-launching a failed job that include: identifying that a job failed to execute on the block of compute nodes because connectivity failed between a compute node assigned as at least one of the connected nodes for the block of compute nodes and its supporting I/O node; and re-launching the job, including selecting an alternative connected node that is actively coupled for data communications with an active I/O node; and assigning the alternative connected node as the connected node for the block of compute nodes running the re-launched job.

  6. Node Disjoint Multipath Routing Considering Link and Node Stability protocol: A characteristic Evaluation

    CERN Document Server

    Upadhayaya, Shuchita

    2010-01-01

    Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater various challenges in QoS routing in Mobile Add hoc Networks, a Node Disjoint Multipath Routing Considering Link and Node Stability (NDMLNR) protocol has been proposed by the authors. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. This paper studies various challenges in the QoS routing and presents the characteristic evaluation of NDMLNR w.r.t various existing protocols in this area.

  7. Signaling completion of a message transfer from an origin compute node to a target compute node

    Science.gov (United States)

    Blocksome, Michael A.

    2011-02-15

    Signaling completion of a message transfer from an origin node to a target node includes: sending, by an origin DMA engine, an RTS message, the RTS message specifying an application message for transfer to the target node from the origin node; receiving, by the origin DMA engine, a remote get message containing a data descriptor for the message and a completion notification descriptor, the completion notification descriptor specifying a local memory FIFO data transfer operation for transferring data locally on the origin node; inserting, by the origin DMA engine in an injection FIFO buffer, the data descriptor followed by the completion notification descriptor; transferring, by the origin DMA engine to the target node, the message in dependence upon the data descriptor; and notifying, by the origin DMA engine, the application that transfer of the message is complete in dependence upon the completion notification descriptor.

  8. Improved Data Search Capability At The PDS Rings Node

    Science.gov (United States)

    Gordon, Mitchell K.; Ballard, L.; Showalter, M. R.; Heather, N.

    2007-10-01

    As the number and complexity of NASA's data sets grow, users legitimately face the "needle-in-a-haystack" problem of zeroing in on the finite set of data products most relevant to a particular scientific question. They expect to be able to query the archive using a rich set of reliable metadata, without necessarily knowing in advance which data set(s) might hold the answers, or even whether an answer can be found within the archive's holdings. The Rings Node is developing a web-based search engine that is capable of meeting many of these challenges. The user can start a query at a very high level (e.g., images of Saturn) and "drill down" through all the available holdings to reach the desired data products (e.g., infrared images of Saturn's F ring at low phase angle and resolution finer than 5 km per pixel). The interface responds quickly to each new constraint entered by the user, removing irrelevant options and adding new ones as appropriate. For example, if it is determined that only Cassini images fit the constraints entered so far, then a page of Cassini-related constraints becomes available but options for occultation profiles and Hubble data are hidden. At each step, the engine displays a live tally of how many available products match the user's constraints. Using Ajax technology, caching of previous results, and a highly optimized database, the system is quick and responsive in spite of the millions of database records that must be searched. The proto-type was unveiled for the COSPAR Capacity Building Workshop on Planetary Science, held in Montevideo, Uruguay earlier this year. The new search engine can be accessed at http://pds-rings.seti.org/catalog/.

  9. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    Indian Academy of Sciences (India)

    H Itoh; N Okada; T Yamashita

    2007-11-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden.

  10. Coarse-grained hidden entropy production in partially inaccessible quantum jump trajectories

    OpenAIRE

    Frenzel, Max F.; Sagawa, Takahiro

    2016-01-01

    We consider an open quantum system for which only a subset of all possible transitions are accessible, while the remaining ones are hidden from direct observation. Using a modification of the notion of quantum jump trajectories we introduce the coarse-grained hidden entropy, which quantifies the entropy production in the hidden subsystem conditioned on our observations of the visible part. The entropy production consisting of the sum of visible and coarse-grained hidden entropy is shown to sa...

  11. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  12. Triple AIM evaluation and application in advanced node

    Science.gov (United States)

    Wang, Gary C.; Lio, En Chuan; Hung, Yuting; Chen, Charlie; Wang, Sybil; Weng, Tang Chun; Lin, Bill; Yu, Chun Chi

    2016-03-01

    A novel method on advanced node for IBO (Image Based Overlay) data extraction accuracy is demonstrated in this work, and here some special design in triple-AIM (Advanced Imaging Metrology) is able to realize the approach. Since triple AIM design has 3 locations left for patterning layers insertion, a new design with 2 layers locations, location-A (inner) and location-B (middle), are generated by 1st pattering, i.e. once lithography exposure, and the 2 marks grouping are formed on dielectric through lithography and etching process with a predetermined overlay "zero offset" through original mask layout design, as illustrated in Fig. (1). And then, as following top photo resist layer, assumed location-C (outer), lithography patterning process, PR coating, exposure and development complete, full triple-AIM patterns is generated, and 3 sets of overlay data could be obtained, A to B, C to B, C to A. Through re-calculating the overlay raw data of current (2nd patterning layer) to previous (1st patterning layer) layer by averaging [C to B] and [C to A], then theoretically the data extraction of sites would be more accuracy, since the variation of local marks signal, induced by inline process instability, could be minimized through the raw data averaging procedure. Moreover, from raw data [A to B], an extra monitor function for detections of the inline process variation, marks selection and recipe setting optimization could be obtained, since marks in [A] and [BB] locations are both generated in 1st patterning, and with the target "zero". So if the raw data [A to BB] is bigger or smaller than "zero" in some degree, there should be some process issue or marks condition setting error in triple-AIM design.

  13. Hidden but important parameters in Ga{sub 0.5}In{sub 0.5}P cell growth

    Energy Technology Data Exchange (ETDEWEB)

    Kurtz, S.R.; Olson, J.M.; Bertness, K.A. [National Renewable Energy Lab., Golden, CO (United States)] [and others

    1996-05-01

    Despite their best intentions, authors often omit from publications many important technical details. These omissions can lead to contradictions in the literature and inhibit {open_quotes}researchers{close_quotes} abilities to duplicate published results. Here, the authors explore {open_quote}hidden{close_quote} parameters that are usually not reported, either because they are unknown (e.g., impurity levels) or because they are considered to be of little importance. Specifically the authors focus on the effects - and how to reduce the effects - of growth parameters in nearby layers (diffusion), impurities (oxygen), and the cooldown atmosphere (hydrogen passivation).

  14. An efficient schedule based data aggregation using node mobility for wireless sensor network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Pawar, Pranav M.; Prasad, Neeli R.;

    2014-01-01

    In the Wireless Sensor Networks, (WSNs) a key challenge is to schedule the activities of the mobile node for improvement in throughput, energy consumption and delay. This paper proposes efficient schedule based data aggregation algorithm using node mobility (SDNM). It considers the cluster-based...... myopic and non-myopic scheduling scheme for conflict free schedule based on the current and next state. It uses TDMA as the MAC layer protocol and schedules the aggregated packets with consecutive slots. Simulation results show that, SDNM is energy efficient, has less delay as compared with state...

  15. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  16. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De...

  17. Searching for a hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Sanchis-Lozano Miguel-Angel

    2016-01-01

    Full Text Available A hidden sector beyond the Standard Model can show up in multiparticle production altering inclusive correlations and factorial cumulants of multiplicity distributions. In this report such a study is advocated with a special emphasis on the searches at LHC.

  18. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  19. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  20. Is the Hidden Curriculum a Relevant Issue in Educational Processes

    Directory of Open Access Journals (Sweden)

    Patarroyo Esther

    2004-08-01

    Full Text Available This paper explores some ideas about the hidden curriculum as an amount of ideas and beliefs which are implicit in an indirect way into the scholar life. Those ideas are regarding to gender equality, social status and racial difference, among others. We consider teachers are able to integrate the hidden curriculum as a pedagogical strategy in the classroom. Examples of integration include activities such as observation techniques, role-plays, peer modeling and particularly, the portfolio as a useful tool for reflection which reveals the hidden curriculum. Key words: Hidden Curriculum, Pedagogical Strategy, Portfolio, ELT Processes, Stereotypes Este documento explora algunas ideas acerca del currículo oculto como una suma de ideas y creencias que están implícitos de una forma indirecta dentro de la vida escolar. Estas ideas están relacionadas con la equidad de género, diferencias sociales y raciales, entre otros. Consideramos que es posible para los docentes integrar el currículo como estrategia pedagógica en el aula. Ejemplos de esta integración incluyen técnicas de observación, juegos de roles, modelamiento en parejas y particularmente, el portafolio como herramienta de reflexión que permita hacer evidente el currículo oculto. Palabras claves: Currículo Oculto, Estrategia Pedagógica, Estereotipos, Enseñanza de Inglés, Portafolio

  1. Multistability and hidden attractors in a relay system with hysteresis

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.

    2015-01-01

    For nonlinear dynamic systems with switching control, the concept of a "hidden attractor" naturally applies to a stable dynamic state that either (1) coexists with the stable switching cycle or (2), if the switching cycle is unstable, has a basin of attraction that does not intersect with the nei...

  2. The Hidden Curriculum of Youth Policy: A Dutch Example

    NARCIS (Netherlands)

    Hopman, M.; De Winter, M.; Koops, W.

    2014-01-01

    Youth policy is more than a mere response to the actual behavior of children, but it is equally influenced by values and beliefs of policy makers. These values are however rarely made explicit and, therefore, the authors refer to them as “the hidden curriculum” of youth policy. The study investigati

  3. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel

    2016-01-01

    Most signatures of new physics in colliders have been studied so far on the transverse plane with respect to the beam direction. In this work however we study the impact of a hidden sector beyond the Standard Model (SM) on inclusive (pseudo)rapidity correlations and moments of the multiplicity distributions, with special emphasis in the LHC results.

  4. From epistemology to hidden curriculum: Critical vs. 'commercial' pedagogic perspective

    Directory of Open Access Journals (Sweden)

    Marojević Jovana C.

    2016-01-01

    Full Text Available Knowledge or, more precisely, its power is one of central themes in critical pedagogy. Since they are interested in school as the site of social critique, aimed at social transformations, critically oriented pedagogues pay special attention to the relation of knowledge and power or, to simplify it, the function of knowledge in the reproduction of the existing (often oppressive social relations. Not recognizing school as a mere site of social, economic or cultural preservation, they often study epistemology on which modern school is founded (positivistic epistemology and its hidden curriculum who function so that they legitimate social reproductive function of the school in a continuous cycle of self-justification. Since a certain understanding of knowledge and its function reveals the hidden curriculum of a certain educational philosophy, and since this consequently changes school into a site of social transformation or social transmission, viewed from the critical position this is the subject of the analysis of our paper. By final sublimation and contrasting the opposite positivistic and critical positions we conclude that the hidden curriculum of the first is the curriculum of the soliloquies while the curriculum of the second, critical tendency is entirely of a dialogue nature. It is clear that uni-directedness of the hidden curriculum formed according the postulates of positivistic epistemology can contribute only to positivistic transmission and regeneration of the existing social order, while the discursivity of critically oriented school defines the relation towards society as two-way, transformational, active and emancipatory.

  5. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  6. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...

  7. Discriminative training of self-structuring hidden control neural models

    DEFF Research Database (Denmark)

    Sørensen, Helge Bjarup Dissing; Hartmann, Uwe; Hunnerup, Preben

    1995-01-01

    This paper presents a new training algorithm for self-structuring hidden control neural (SHC) models. The SHC models were trained non-discriminatively for speech recognition applications. Better recognition performance can generally be achieved, if discriminative training is applied instead. Thus...

  8. Old, New and Hidden Causes of Perioperative Hypersensitivity.

    Science.gov (United States)

    Garvey, Lene Heise

    2016-01-01

    Perioperative hypersensitivity reactions are rare, often life-threatening events, and subsequent investigations to identify the culprit are important to avoid re-exposure. All exposures in the perioperative setting may potentially be the cause of a hypersensitivity reaction, but drugs administered intravenously such as neuromuscular blocking agents (NMBA), induction agents and antibiotics have traditionally been reported to be implicated most commonly. It has recently become apparent that there are geographical differences in sensitization patterns related to variation in exposures, referral patterns and performance and interpretation of investigations. Differences in sensitization to NMBAs are partly explained by cross sensitization to pholcodine, an ingredient in cough-medicines available in some countries. While NMBAs are the most common causes of perioperative hypersensitivity in some countries, this may not necessarily be the case in all countries. New and hidden allergens have emerged as causes of perioperative hypersensitivity such as blue dyes, chlorhexidine and excipients. Detailed knowledge of the events at the time of reaction is necessary to identify potential culprits including rare and hidden allergens. Cooperation between allergists and anaesthetists, or other staff present perioperatively, is often needed to identify hidden or even undocumented exposures. The objectives of this review are to provide an overview of the history of investigation of perioperative hypersensitivity, to describe the differences in causes of perioperative hypersensitivity emerging over time and to increase awareness about the "hidden allergens" in the perioperative setting. Some practical advice on how to approach the patient testing negative on all initial investigations is also included.

  9. Parameter estimation of hidden periodic model in random fields

    Institute of Scientific and Technical Information of China (English)

    何书元

    1999-01-01

    Two-dimensional hidden periodic model is an important model in random fields. The model is used in the field of two-dimensional signal processing, prediction and spectral analysis. A method of estimating the parameters for the model is designed. The strong consistency of the estimators is proved.

  10. Beyond the hidden curriculum: The challenging search for authentic ...

    African Journals Online (AJOL)

    2013-11-01

    Nov 1, 2013 ... [6] It was erroneously assumed that medical students ... hidden curriculum, therefore, demands an authentic and comprehensive enquiry into the concept of human dignity, ... reasoning that underpins the desirable values-based healthcare. ... and highly interpersonal form of teaching and learning that takes.

  11. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    2014-01-01

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated S-lemma

  12. Recognizing Strokes in Tennis Videos Using Hidden Markov Models

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, W.; Zivkovic, Z.

    2001-01-01

    This paper addresses content-based video retrieval with an emphasis on recognizing events in tennis game videos. In particular, we aim at recognizing different classes of tennis strokes using automatic learning capability of Hidden Markov Models. Driven by our domain knowledge, a robust player segme

  13. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving...

  14. Evolving the Topology of Hidden Markov Models using Evolutionary Algorithms

    DEFF Research Database (Denmark)

    Thomsen, Réne

    2002-01-01

    Hidden Markov models (HMM) are widely used for speech recognition and have recently gained a lot of attention in the bioinformatics community, because of their ability to capture the information buried in biological sequences. Usually, heuristic algorithms such as Baum-Welch are used to estimate...

  15. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a techniqu

  16. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a

  17. Optical Test of Local Hidden-Variable Model

    Institute of Scientific and Technical Information of China (English)

    WU XiaoHua; ZONG HongShi; PANG HouRong

    2001-01-01

    An inequality is deduced from local realism and a supplementary assumption. This inequality defines an experiment that can be actually performed with the present technology to test local hidden-variable models, and it is violated by quantum mechanics with a factor 1.92, while it can be simplified into a form where just two measurements are required.``

  18. New Caledonian crows reason about hidden causal agents.

    Science.gov (United States)

    Taylor, Alex H; Miller, Rachael; Gray, Russell D

    2012-10-02

    The ability to make inferences about hidden causal mechanisms underpins scientific and religious thought. It also facilitates the understanding of social interactions and the production of sophisticated tool-using behaviors. However, although animals can reason about the outcomes of accidental interventions, only humans have been shown to make inferences about hidden causal mechanisms. Here, we show that tool-making New Caledonian crows react differently to an observable event when it is caused by a hidden causal agent. Eight crows watched two series of events in which a stick moved. In the first set of events, the crows observed a human enter a hide, a stick move, and the human then leave the hide. In the second, the stick moved without a human entering or exiting the hide. The crows inspected the hide and abandoned probing with a tool for food more often after the second, unexplained series of events. This difference shows that the crows can reason about a hidden causal agent. Comparative studies with the methodology outlined here could aid in elucidating the selective pressures that led to the evolution of this cognitive ability.

  19. Search for dark photons from supersymmetric hidden valleys

    NARCIS (Netherlands)

    Abazov, V.M.; et al., [Unknown; Ancu, L.S.; de Jong, S.J.; Filthaut, F.; Galea, C.F.; Hegeman, J.G.; Houben, P.; Meijer, M.M.; Svoisky, P.; van den Berg, P.J.; van Leeuwen, W.M.

    2009-01-01

    We search for a new light gauge boson, a dark photon, with the D0 experiment. In the model we consider, supersymmetric partners are pair produced and cascade to the lightest neutralinos that can decay into the hidden sector state plus either a photon or a dark photon. The dark photon decays through

  20. Education as Text: The Varieties of Educational Hiddenness.

    Science.gov (United States)

    Gordon, David

    1988-01-01

    Using the ideas of Paul Ricoeur and Clifford Geertz, this article develops the notion of education as a "text" and analyzes the "hidden curriculum" of that text as it is read by all members of the society. The hypothesis is proposed that education becomes a text about society's myths and sacred beliefs. (TE)

  1. Simple yet Hidden Counterexamples in Undergraduate Real Analysis

    Science.gov (United States)

    Shipman, Barbara A.; Shipman, Patrick D.

    2013-01-01

    We study situations in introductory analysis in which students affirmed false statements as true, despite simple counterexamples that they easily recognized afterwards. The study draws attention to how simple counterexamples can become hidden in plain sight, even in an active learning atmosphere where students proposed simple (as well as more…

  2. Local clustering in scale-free networks with hidden variables

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A. J. E. M.; van Leeuwaarden, Johan S. H.; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ ∈(2 ,3 ) , so that the degrees have infinite variance. The natural cutoff hc characterizes the largest degrees in the hidden variable models, and a structural cutoff hs introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N , as a function of hs and hc. For scale-free networks with exponent 2 universality class at hand. We characterize the extremely slow decay of C when τ ≈2 and show that for τ =2.1 , say, clustering starts to vanish only for networks as large as N =109 .

  3. On local-hidden-variable no-go theorems

    Science.gov (United States)

    Methot, A. A.

    2006-06-01

    The strongest attack against quantum mechanics came in 1935 in the form of a paper by Einstein, Podolsky, and Rosen. It was argued that the theory of quantum mechanics could not be called a complete theory of Nature, for every element of reality is not represented in the formalism as such. The authors then put forth a proposition: we must search for a theory where, upon knowing everything about the system, including possible hidden variables, one could make precise predictions concerning elements of reality. This project was ultimately doomed in 1964 with the work of Bell, who showed that the most general local hidden variable theory could not reproduce correlations that arise in quantum mechanics. There exist mainly three forms of no-go theorems for local hidden variable theories. Although almost every physicist knows the consequences of these no-go theorems, not every physicist is aware of the distinctions between the three or even their exact definitions. Thus, we will discuss here the three principal forms of no-go theorems for local hidden variable theories of Nature. We will define Bell theorems, Bell theorems without inequalities, and pseudo-telepathy. A discussion of the similarities and differences will follow.

  4. Isovector and hidden-beauty partners of the X(3872)

    CERN Document Server

    Hogaasen, Hallstein; Richard, Jean-Marc; Sorba, Paul

    2014-01-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks (H. Hogaasen, J-M. Richard and P. Sorba, Phys. Rev. D73, 054013, 2006). The extension to the hidden-beauty sector is discussed.

  5. Bayesian online algorithms for learning in discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2008-01-01

    We propose and analyze two different Bayesian online algorithms for learning in discrete Hidden Markov Models and compare their performance with the already known Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalization we draw learning curves in simplified situations for these algorithms and compare their performances.

  6. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  7. Application-Network Cross Layer Multi-variable Cost Function for Application Layer Multicast of Multimedia Delivery over Convergent Networks

    OpenAIRE

    Le, Tien Anh; Nguyen, Hang; Nguyen, Manh Cuong

    2015-01-01

    International audience; Application layer multicast (ALM) algorithms are either similar or conceptually based on network layer multicast's cost functions. In this research work, a new application-network cross layer multi-variable cost function is proposed. It optimizes the variable requirements and available resources from both the application and the network layers. It can dynamically update the available resources required for reaching a particular node on the ALM's media distribution tree...

  8. An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack

    Directory of Open Access Journals (Sweden)

    ZUBAIR AHMED KHAN

    2016-07-01

    Full Text Available MANETs (Mobile Ad Hoc Networks are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time and RSSI (Received Signal Strength Indicator for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead.

  9. Effective identification of conserved pathways in biological networks using hidden Markov models.

    Directory of Open Access Journals (Sweden)

    Xiaoning Qian

    Full Text Available BACKGROUND: The advent of various high-throughput experimental techniques for measuring molecular interactions has enabled the systematic study of biological interactions on a global scale. Since biological processes are carried out by elaborate collaborations of numerous molecules that give rise to a complex network of molecular interactions, comparative analysis of these biological networks can bring important insights into the functional organization and regulatory mechanisms of biological systems. METHODOLOGY/PRINCIPAL FINDINGS: In this paper, we present an effective framework for identifying common interaction patterns in the biological networks of different organisms based on hidden Markov models (HMMs. Given two or more networks, our method efficiently finds the top matching paths in the respective networks, where the matching paths may contain a flexible number of consecutive insertions and deletions. CONCLUSIONS/SIGNIFICANCE: Based on several protein-protein interaction (PPI networks obtained from the Database of Interacting Proteins (DIP and other public databases, we demonstrate that our method is able to detect biologically significant pathways that are conserved across different organisms. Our algorithm has a polynomial complexity that grows linearly with the size of the aligned paths. This enables the search for very long paths with more than 10 nodes within a few minutes on a desktop computer. The software program that implements this algorithm is available upon request from the authors.

  10. The role of hidden influentials in the diffusion of online information cascades

    CERN Document Server

    Baños, Raquel A; Moreno, Yamir

    2013-01-01

    In a diversified context with multiple social networking sites, heterogeneous activity patterns and different user-user relations, the concept of "information cascade" is all but univocal. Despite the fact that such information cascades can be defined in different ways, it is important to check whether some of the observed patterns are common to diverse contagion processes that take place on modern social media. Here, we explore one type of information cascades, namely, those that are time-constrained, related to two kinds of socially-rooted topics on Twitter. Specifically, we show that in both cases cascades sizes distribute following a fat tailed distribution and that whether or not a cascade reaches system-wide proportions is mainly given by the presence of so-called hidden influentials. These latter nodes are not the hubs, which on the contrary, often act as firewalls for information spreading. Our results are important for a better understanding of the dynamics of complex contagion and, from a practical ...

  11. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  12. Hidden Owners, Hidden Profits, and Poor Nursing Home Care: A Case Study.

    Science.gov (United States)

    Harrington, Charlene; Ross, Leslie; Kang, Taewoon

    2015-01-01

    The study examined the ownership transparency, financial accountability, and quality indicators of a regional for-profit nursing home chain in California, using a case study methodology to analyze data on the chain's ownership and management structure, financial data, staffing levels, deficiencies and complaints, and litigation. Secondary data were obtained from regulatory and cost reports and litigation cases. Qualitative descriptions of ownership and management were presented and quantitative analyses were conducted by comparing financial and quality indicators with other California for-profit chains, for-profit non-chains, and nonprofit nursing home groups in 2011. The chain's complex, interlocking individual and corporate owners and property companies obscured its ownership structure and financial arrangements. Nursing and support services expenditures were lower than nonprofits and administrative costs were higher than for-profit non-chains. The chain's nurse staffing was lower than expected staffing levels; its deficiencies and citations were higher than in nonprofits; and a number of lawsuits resulted in bankruptcy. Profits were hidden in the chain's management fees, lease agreements, interest payments to owners, and purchases from related-party companies. Greater ownership transparency and financial accountability requirements are needed to ensure regulatory oversight and quality of care.

  13. Defining nodes in complex brain networks.

    Science.gov (United States)

    Stanley, Matthew L; Moussa, Malaak N; Paolini, Brielle M; Lyday, Robert G; Burdette, Jonathan H; Laurienti, Paul J

    2013-11-22

    Network science holds great promise for expanding our understanding of the human brain in health, disease, development, and aging. Network analyses are quickly becoming the method of choice for analyzing functional MRI data. However, many technical issues have yet to be confronted in order to optimize results. One particular issue that remains controversial in functional brain network analyses is the definition of a network node. In functional brain networks a node represents some predefined collection of brain tissue, and an edge measures the functional connectivity between pairs of nodes. The characteristics of a node, chosen by the researcher, vary considerably in the literature. This manuscript reviews the current state of the art based on published manuscripts and highlights the strengths and weaknesses of three main methods for defining nodes. Voxel-wise networks are constructed by assigning a node to each, equally sized brain area (voxel). The fMRI time-series recorded from each voxel is then used to create the functional network. Anatomical methods utilize atlases to define the nodes based on brain structure. The fMRI time-series from all voxels within the anatomical area are averaged and subsequently used to generate the network. Functional activation methods rely on data from traditional fMRI activation studies, often from databases, to identify network nodes. Such methods identify the peaks or centers of mass from activation maps to determine the location of the nodes. Small (~10-20 millimeter diameter) spheres located at the coordinates of the activation foci are then applied to the data being used in the network analysis. The fMRI time-series from all voxels in the sphere are then averaged, and the resultant time series is used to generate the network. We attempt to clarify the discussion and move the study of complex brain networks forward. While the "correct" method to be used remains an open, possibly unsolvable question that deserves extensive

  14. Node Survival in Networks under Correlated Attacks.

    Directory of Open Access Journals (Sweden)

    Yan Hao

    Full Text Available We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles.

  15. Considerations for fine hole patterning for the 7nm node

    Science.gov (United States)

    Yaegashi, Hidetami; Oyama, Kenichi; Hara, Arisa; Natori, Sakurako; Yamauchi, Shohei; Yamato, Masatoshi; Koike, Kyohei

    2016-03-01

    One of the practical candidates to produce 7nm node logic devices is to use the multiple patterning with 193-immersion exposure. For the multiple patterning, it is important to evaluate the relation between the number of mask layer and the minimum pitch systematically to judge the device manufacturability. Although the number of the time of patterning, namely LE(Litho-Etch) ^ x-time, and overlay steps have to be reduced, there are some challenges in miniaturization of hole size below 20nm. Various process fluctuations on contact hole have a direct impact on device performance. According to the technical trend, 12nm diameter hole on 30nm-pitch hole will be needed on 7nm node. Extreme ultraviolet lithography (EUV) and Directed self-assembly (DSA) are attracting considerable attention to obtain small feature size pattern, however, 193-immersion still has the potential to extend optical lithography cost-effectively for sub-7nm node. The objective of this work is to study the process variation challenges and resolution in post-processing for the CD-bias control to meet sub-20nm diameter contact hole. Another pattern modulation is also demonstrated during post-processing step for hole shrink. With the realization that pattern fidelity and pattern placement management will limit scaling long before devices and interconnects fail to perform intrinsically, the talk will also outline how circle edge roughness (CER) and Local-CD uniformity can correct efficiency. On the other hand, 1D Gridded-Design-Rules layout (1D layout) has simple rectangular shapes. Also, we have demonstrated CD-bias modification on short trench pattern to cut grating line for its fabrication.

  16. Prognostic Implications of Lymph Node Yield and Lymph Node Ratio in Papillary Thyroid Carcinoma

    NARCIS (Netherlands)

    Nunes, Jonathan H. Vas; Clark, Jonathan R.; Gao, Kan; Chua, Elizabeth; Campbell, Peter; Niles, Navin; Gargya, Ash; Elliott, Michael S.

    2013-01-01

    Background: The lymph node yield (LNY) and the lymph node ratio (LNR) have been shown to be important prognostic factors in oral, colon, and gastric cancers. The role of the LNY and LNR in papillary thyroid cancer (PTC) is unclear. The aims of this study were to determine if a high LNR and a low LNY

  17. Current concepts of anatomy and electrophysiology of the sinus node.

    Science.gov (United States)

    Murphy, Cliona; Lazzara, Ralph

    2016-06-01

    The sinoatrial node, or sinus node, of humans is the principal pacemaker of the heart. Over the last century, studies have unraveled the complex molecular architecture of the sinus node and the expression of unique ion channels within its specialized myocytes. Aim of this review is to describe the embriology, the anatomy, the histology and the electrophisiology of the sinus node.

  18. Two-Layer Coding Rate Optimization in Relay-Aided Systems

    DEFF Research Database (Denmark)

    Sun, Fan

    2011-01-01

    We consider a three-node transmission system, where a source node conveys a data block to a destination node with the help of a half-duplex decode and-forward (DF) relay node. The whole data block is transmitted as a sequence of packets. For reliable transmission in the three-node system, a two......-layer coding scheme is proposed, where physical layer channel coding is utilized within each packet for error-correction and random network coding is applied on top of channel coding for network error-control. There is a natural tradeoff between the physical layer coding rate and the network coding rate given...... requirement. Numerical results are also provided to show the optimized physical layer coding and network coding rate pairs in different system scenarios....

  19. Image steganography using layered pixel-value differencing

    Science.gov (United States)

    Kim, Jaeyoung; Park, Hanhoon

    2017-02-01

    This paper proposes a layered approach to improve the embedding capacity of the existing pixel-value differencing (PVD) methods for image steganography. Specifically, one of the PVD methods is applied to embed a secret information into a cover image and the resulting image, called stego-image, is used to embed additional secret information by the same or another PVD method. This results in a double-layered stego-image. Then, another PVD method can be applied to the double-layered stego-image, resulting in a triple-layered stego-image. Likewise, multi-layered stego-images can be obtained. To successfully recover the secret information hidden in each layer, the embedding process is carefully designed. In the experiment, the proposed layered PVD method proved to be effective.

  20. Communication: Fixed-node errors in quantum Monte Carlo: Interplay of electron density and node nonlinearities

    Energy Technology Data Exchange (ETDEWEB)

    Rasch, Kevin M.; Hu, Shuming; Mitas, Lubos [Center for High Performance Simulation and Department of Physics, North Carolina State University, Raleigh, North Carolina 27695 (United States)

    2014-01-28

    We elucidate the origin of large differences (two-fold or more) in the fixed-node errors between the first- vs second-row systems for single-configuration trial wave functions in quantum Monte Carlo calculations. This significant difference in the valence fixed-node biases is studied across a set of atoms, molecules, and also Si, C solid crystals. We show that the key features which affect the fixed-node errors are the differences in electron density and the degree of node nonlinearity. The findings reveal how the accuracy of the quantum Monte Carlo varies across a variety of systems, provide new perspectives on the origins of the fixed-node biases in calculations of molecular and condensed systems, and carry implications for pseudopotential constructions for heavy elements.

  1. Communication: Fixed-node errors in quantum Monte Carlo: Interplay of electron density and node nonlinearities

    Science.gov (United States)

    Rasch, Kevin M.; Hu, Shuming; Mitas, Lubos

    2014-01-01

    We elucidate the origin of large differences (two-fold or more) in the fixed-node errors between the first- vs second-row systems for single-configuration trial wave functions in quantum Monte Carlo calculations. This significant difference in the valence fixed-node biases is studied across a set of atoms, molecules, and also Si, C solid crystals. We show that the key features which affect the fixed-node errors are the differences in electron density and the degree of node nonlinearity. The findings reveal how the accuracy of the quantum Monte Carlo varies across a variety of systems, provide new perspectives on the origins of the fixed-node biases in calculations of molecular and condensed systems, and carry implications for pseudopotential constructions for heavy elements.

  2. Performance Evaluation of AODV, DSDV & DSR for Quasi Random Deployment of Sensor Nodes in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Kulkarni, Nandkumar P.; Prasad, Ramjee; Cornean, Horia;

    2011-01-01

    . The efficiency of this deployment is evaluated assuming three routing protocols used for the adhoc networks. They are AODV, DSDV, and DSR. The protocol assumed at transport layer is UDP. Application layer generates the CBR traffic. The performance of these three routing techniques is compared based on total...... energy consumption, coverage area. The simulation results show that the conventional routing protocols like DSR have a best performance for both RD and QRD of the sensor nodes when there is no mobility of the sensor nodes as compared to AODV and DSDV. Among AODV and DSDV, AODV performs better as compared...

  3. Vital nodes identification in complex networks

    Science.gov (United States)

    Lü, Linyuan; Chen, Duanbing; Ren, Xiao-Long; Zhang, Qian-Ming; Zhang, Yi-Cheng; Zhou, Tao

    2016-09-01

    Real networks exhibit heterogeneous nature with nodes playing far different roles in structure and function. To identify vital nodes is thus very significant, allowing us to control the outbreak of epidemics, to conduct advertisements for e-commercial products, to predict popular scientific publications, and so on. The vital nodes identification attracts increasing attentions from both computer science and physical societies, with algorithms ranging from simply counting the immediate neighbors to complicated machine learning and message passing approaches. In this review, we clarify the concepts and metrics, classify the problems and methods, as well as review the important progresses and describe the state of the art. Furthermore, we provide extensive empirical analyses to compare well-known methods on disparate real networks, and highlight the future directions. In spite of the emphasis on physics-rooted approaches, the unification of the language and comparison with cross-domain methods would trigger interdisciplinary solutions in the near future.

  4. Predicting missing links via correlation between nodes

    CERN Document Server

    Liao, Hao; Zhang, Yi-Cheng

    2014-01-01

    As a fundamental problem in many different fields, link prediction aims to estimate the likelihood of an existing link between two nodes based on the observed information. Since this problem is related to many applications ranging from uncovering missing data to predicting the evolution of networks, link prediction has been intensively investigated recently and many methods have been proposed so far. The essential challenge of link prediction is to estimate the similarity between nodes. Most of the existing methods are based on the common neighbor index and its variants. In this paper, we propose to calculate the similarity between nodes by the correlation coefficient. This method is found to be very effective when applied to calculate similarity based on high order paths. We finally fuse the correlation-based method with the resource allocation method, and find that the combined method can substantially outperform the existing methods, especially in sparse networks.

  5. Vital nodes identification in complex networks

    CERN Document Server

    Lü, Linyuan; Ren, Xiao-Long; Zhang, Qian-Ming; Zhang, Yi-Cheng; Zhou, Tao

    2016-01-01

    Real networks exhibit heterogeneous nature with nodes playing far different roles in structure and function. To identify vital nodes is thus very significant, allowing us to control the outbreak of epidemics, to conduct advertisements for e-commercial products, to predict popular scientific publications, and so on. The vital nodes identification attracts increasing attentions from both computer science and physical societies, with algorithms ranging from simply counting the immediate neighbors to complicated machine learning and message passing approaches. In this review, we clarify the concepts and metrics, classify the problems and methods, as well as review the important progresses and describe the state of the art. Furthermore, we provide extensive empirical analyses to compare well-known methods on disparate real networks, and highlight the future directions. In despite of the emphasis on physics-rooted approaches, the unification of the language and comparison with cross-domain methods would trigger int...

  6. Energy Options for Wireless Sensor Nodes

    Directory of Open Access Journals (Sweden)

    Chris Knight

    2008-12-01

    Full Text Available Reduction in size and power consumption of consumer electronics has opened up many opportunities for low power wireless sensor networks. One of the major challenges is in supporting battery operated devices as the number of nodes in a network grows. The two main alternatives are to utilize higher energy density sources of stored energy, or to generate power at the node from local forms of energy. This paper reviews the state-of-the art technology in the field of both energy storage and energy harvesting for sensor nodes. The options discussed for energy storage include batteries, capacitors, fuel cells, heat engines and betavoltaic systems. The field of energy harvesting is discussed with reference to photovoltaics, temperature gradients, fluid flow, pressure variations and vibration harvesting.

  7. Imaging Classification of Cervical Lymph Nodes

    Directory of Open Access Journals (Sweden)

    Gh. Bakhshandepour

    2008-01-01

    Full Text Available Nearly four decades, Rouviere classification, which is a clinically based system, was the only system for cervical adenopathy classification. The best possible classification of cervical nodal disease may be accomplished by using both clinical palpation and also informations provided by imaging, because imaging can reveal clinically silent lymph nodes. most head and neck tumors spread to the neck nodes as a part of their natural history ,depending on the primary site. Up to 80% of patients with upper aerodigestive mucosal malignancies will have cervical nodal metastasis"nat presentation.The occurrence of nodal metastasis has a profound effect on the management and prognosis of the patients .nodal metastasis is the most important prognostic factor in squamous cell carcinoma of the head and neck. In general it decreases the overall survival by half, and extracapsular spread worsens the prognosis by another half. Our purpose in this presentation is to review imaging classification of cervical lymph nodes.

  8. Node discovery problem for a social network

    CERN Document Server

    Maeno, Yoshiharu

    2007-01-01

    This paper presents a practical heuristic algorithm to address a node discovery problem. The node discovery problem is to discover a clue on the person, who does not appear in the observed records, but is relevant functionally in affecting decision-making and behavior of an organization. We define two topological relevance of a node in a social network (global and local relevance). Association between the topological relevance and the functional relevance is studied with a few example networks in criminal organizations. We propose a heuristic algorithm to infer an invisible, functionally relevant person. Its performance (precision, recall, and F value) is demonstrated with a simulation experiment using a network derived from the Watts-Strogatz (WS) model.

  9. Node degree distribution in spanning trees

    Science.gov (United States)

    Pozrikidis, C.

    2016-03-01

    A method is presented for computing the number of spanning trees involving one link or a specified group of links, and excluding another link or a specified group of links, in a network described by a simple graph in terms of derivatives of the spanning-tree generating function defined with respect to the eigenvalues of the Kirchhoff (weighted Laplacian) matrix. The method is applied to deduce the node degree distribution in a complete or randomized set of spanning trees of an arbitrary network. An important feature of the proposed method is that the explicit construction of spanning trees is not required. It is shown that the node degree distribution in the spanning trees of the complete network is described by the binomial distribution. Numerical results are presented for the node degree distribution in square, triangular, and honeycomb lattices.

  10. Functional Testing of Wireless Sensor Node Designs

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Madsen, Jan

    2007-01-01

    Wireless sensor networks are networked embedded computer systems with stringent power, performance, cost and form-factor requirements along with numerous other constraints related to their pervasiveness and ubiquitousness. Therefore, only a systematic design methdology coupled with an efficient...... test approach can enable their conformance to design and deployment specifications. We discuss off-line, hierarchical, functional testing of complete wireless sensor nodes containing configurable logic through a combination of FPGA-based board test and Software-Based Self-Test (SBST) techniques....... The proposed functional test methodology has been applied to a COTS-based sensor node development platform and can be applied, in general, for testing all types of wireless sensor node designs....

  11. Input graph: the hidden geometry in controlling complex networks

    Science.gov (United States)

    Zhang, Xizhe; Lv, Tianyang; Pu, Yuanyuan

    2016-11-01

    The ability to control a complex network towards a desired behavior relies on our understanding of the complex nature of these social and technological networks. The existence of numerous control schemes in a network promotes us to wonder: what is the underlying relationship of all possible input nodes? Here we introduce input graph, a simple geometry that reveals the complex relationship between all control schemes and input nodes. We prove that the node adjacent to an input node in the input graph will appear in another control scheme, and the connected nodes in input graph have the same type in control, which they are either all possible input nodes or not. Furthermore, we find that the giant components emerge in the input graphs of many real networks, which provides a clear topological explanation of bifurcation phenomenon emerging in dense networks and promotes us to design an efficient method to alter the node type in control. The findings provide an insight into control principles of complex networks and offer a general mechanism to design a suitable control scheme for different purposes.

  12. Information Capacity of Energy Harvesting Sensor Nodes

    CERN Document Server

    Rajesh, R

    2010-01-01

    Sensor nodes with energy harvesting sources are gaining popularity due to their ability to improve the network life time and are becoming a preferred choice supporting 'green communication'. We study such a sensor node with an energy harvesting source and compare various architectures by which the harvested energy is used. We find its Shannon capacity when it is transmitting its observations over an AWGN channel and show that the capacity achieving energy management policy is the same as the throughput optimal policy. We also obtain the capacity for the system with energy inefficiencies in storage and an achievable rate when energy conserving sleep-wake modes are supported.

  13. Refining Nodes and Edges of State Machines

    DEFF Research Database (Denmark)

    Hallerstede, Stefan; Snook, Colin

    2011-01-01

    State machines are hierarchical automata that are widely used to structure complex behavioural specifications. We develop two notions of refinement of state machines, node refinement and edge refinement. We compare the two notions by means of examples and argue that, by adopting simple convention...... refinement theory and UML-B state machine refinement influences the style of node refinement. Hence we propose a method with direct proof of state machine refinement avoiding the detour via Event-B that is needed by UML-B....

  14. Optimal Placement of Wavelength Converting Nodes

    DEFF Research Database (Denmark)

    Belotti, Pietro; Stidsen, Thomas K.

    2001-01-01

    The all optical network using WDM and optical nodes (OXC's) seems to be a possibility in a near future. The consensus to day seems to be that optical wavelength conversions is un-realistic for several decades, hence wavelength blocking will happen in the all optical networks. A possible solution ...... to this problem could be to include digital nodes (DXC's) in the network at the right places. In this article we present a linear programming model which optimizes the placement of these more expensive DXC's in the network....

  15. Automatic Testing of a CANopen Node

    OpenAIRE

    Liang, Hui

    2013-01-01

    This Bachelor’s thesis was commissioned by TK Engineering Oy in Vaasa. The goals of the thesis were to test a prototype CANopen node, called UWASA Node for conformance to the CiA 301 standard, and to develop the automatic performance test software and the automatic CiA 401 test software. A test report that describes to the designer what needs to be corrected and improved is made in this thesis. For the CiA 301 test there is a CANopen conformance test tool that can be used. The automatic perfo...

  16. Reliability of sentinel node procedure for lymph node staging in prostate cancer patients at high risk for lymph node involvement

    NARCIS (Netherlands)

    Van den Bergh, Laura; Joniau, Steven; Haustermans, Karin; Deroose, Christophe M.; Isebaert, Sofie; Oyen, Raymond; Mottaghy, Felix M.; Ameye, Filip; Berkers, Joost; Van Poppel, Hendrik; Lerut, Evelyne

    2015-01-01

    PURPOSE Accurate staging modalities to diagnose lymph node involvement in patients with prostate cancer (PCa) are lacking. We wanted to prospectively assess sensitivity, specificity, and positive predictive value (PPV) and negative predictive value of (11)C-choline positron emission tomography (PET)

  17. Detection of sentinel nodes with radiopharmaceuticals

    Energy Technology Data Exchange (ETDEWEB)

    Yokoyama, Kunihiko; Michigishi, Takatoshi; Kinuya, Seigo; Konishi, Shota; Nakajima, Kenichi; Tonami, Norihisa [Kanazawa Univ. (Japan). School of Medicine

    2000-10-01

    Sentinel lymph nodes have been found to be an indicator of lymph node metastasis in breast cancer. In Japan, the theory and concept of sentinel lymph nodes in breast cancer have begun to be applied to carcinomas of the digestive system. Based on clinical experience in the detection of sentinel lymph nodes with radiopharmaceuticals, differences and similarities between the radiopharmaceuticals, methods, and techniques used to detect sentinel lymph nodes have been assessed in relation to breast cancer and carcinomas of the digestive system (including carcinomas of the esophagus and large intestine). The greatest difference between the methods used for breast and digestive cancers is the site of administration of the radiopharmaceutical. In breast cancer, the radiopharmaceutical is administered into a superficial organ (i.e., the mammary gland), whereas in carcinomas of the digestive system, it is administered into a deep organ (i.e., digestive tract). Another obvious difference is in lymph flow, i.e., the flow of the mammary glands is subcutaneous whereas lymph flow in the digestive tract is submucosal. Two radionuclide diagnostic methods are available to detect sentinel lymph nodes: sentinel lymphoscintigraphy with a gamma camera and a method that involves the use of a gamma probe intraoperatively. Radiopharmaceuticals used to detect sentinel lymph nodes must be smoothly transferred from the site of administration into the lymph, and uptake by the sentinel lymph node must continue for a long time without excessive flowing to lower reaches. The optimal particle size remains a matter of controversy, and no radiopharmaceuticals appropriate for lymphoscintigraphy have ever been approved in Japan. The authors compared the pharmacokinetics of three different radiopharmaceuticals used for sentinel lymphoscintigraphy in breast cancer ({sup 99m}Tc-labeled albumin, {sup 99m}Tc-labeled tin colloid, and {sup 99m}Tc-labeled phytic acid) and founded that the detection rate was

  18. Nonmixing layers

    Science.gov (United States)

    Gaillard, Pierre; Giovangigli, Vincent; Matuszewski, Lionel

    2016-12-01

    We investigate the impact of nonideal diffusion on the structure of supercritical cryogenic binary mixing layers. This situation is typical of liquid fuel injection in high-pressure rocket engines. Nonideal diffusion has a dramatic impact in the neighborhood of chemical thermodynamic stability limits where the components become quasi-immiscible and ultimately form a nonmixing layer. Numerical simulations are performed for mixing layers of H2 and N2 at a pressure of 100 atm and temperature around 120-150 K near chemical thermodynamic stability limits.

  19. An Efficient Data Collection Protocol Based on Multihop Routing and Single-Node Cooperation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Guoqiang Zheng

    2014-01-01

    Full Text Available Considering the constrained resource and energy in wireless sensor networks, an efficient data collection protocol named ESCDD which adopts the multihop routing technology and the single-node selection cooperative communication is proposed to make the communication protocol more simple and easy to realize for the large-scale multihop wireless sensor networks. ESCDD uses the greedy strategy and the control information based on RTS/CTS to select forwarding nodes. Then, the hops in the multihop data transmission are reduced. Based on the power control in physical layer and the control frame called CoTS in MAC layer, ESCDD chooses a single cooperative node to perform cooperative transmission. The receiving node adopts maximal ratio combining (MRC to recover original data. The energy consumption per hop is reduced. Furthermore, the total energy consumption in data collection process is shared by more nodes and the network lifetime is extended. Compared with GeRaF, EERNFS, and REEFG protocol, the simulation results show that ESCDD can effectively reduce the average delay of multihop data transmission, improve the successful delivery rate of data packets, significantly save the energy consumption of network nodes, and make the energy consumption more balanced.

  20. Single skip metastasis in sentinel lymph node: In an early gastric cancer.

    Science.gov (United States)

    Bara, Tivadar; Gurzu, Simona; Jung, Ioan; Kadar, Zoltan; Sugimura, Haruhiko; Bara, Tivadar

    2015-09-01

    Lymph node status is considered a key prognostic and predictive factor in patients with gastric cancer (GC). Although there is a practical approach to the intraoperative detection of sentinel lymph nodes (SLNs), such a procedure is not included in the European surgical protocol. In this report, we present a practical approach to SLN mapping in a representative case with early gastric cancer (EGC). A 74-year-old female was hospitalized with an endoscopically observed, superficially ulcerated tumor located in the antral region. Subtotal gastrectomy with D2 lymphadenectomy and SLN mapping was performed by injecting methylene blue dye into the peritumoral submucosal layer. An incidentally detected blue-stained lymph node located along the middle colic artery was also removed. This was detected 40 min after injection of the methylene blue. Histopathologic examination showed a pT1b-staged well-differentiated HER-2-negative adenocarcinoma. All of the 41 LNs located at the first, third, and fifth station of the regional LN compartments were found to be free of tumor cells. The only lymph node with metastasis was located along the middle colic artery and was considered a non-regional lymph node. This incidentally identified skip metastasis indicated stage IV GC. A classic chemotherapy regimen was given, and no recurrences were observed six months after surgery. In this representative case, low-cost SLN mapping, with a longer intraoperative waiting time, totally changed the stage of the tumor in a patient with EGC.