WorldWideScience

Sample records for hidden layer nodes

  1. Selection of hidden layer nodes in neural networks by statistical tests

    International Nuclear Information System (INIS)

    Ciftcioglu, Ozer

    1992-05-01

    A statistical methodology for selection of the number of hidden layer nodes in feedforward neural networks is described. The method considers the network as an empirical model for the experimental data set subject to pattern classification so that the selection process becomes a model estimation through parameter identification. The solution is performed for an overdetermined estimation problem for identification using nonlinear least squares minimization technique. The number of the hidden layer nodes is determined as result of hypothesis testing. Accordingly the redundant network structure with respect to the number of parameters is avoided and the classification error being kept to a minimum. (author). 11 refs.; 4 figs.; 1 tab

  2. Adaptive filtering for hidden node detection and tracking in networks.

    Science.gov (United States)

    Hamilton, Franz; Setzer, Beverly; Chavez, Sergio; Tran, Hien; Lloyd, Alun L

    2017-07-01

    The identification of network connectivity from noisy time series is of great interest in the study of network dynamics. This connectivity estimation problem becomes more complicated when we consider the possibility of hidden nodes within the network. These hidden nodes act as unknown drivers on our network and their presence can lead to the identification of false connections, resulting in incorrect network inference. Detecting the parts of the network they are acting on is thus critical. Here, we propose a novel method for hidden node detection based on an adaptive filtering framework with specific application to neuronal networks. We consider the hidden node as a problem of missing variables when model fitting and show that the estimated system noise covariance provided by the adaptive filter can be used to localize the influence of the hidden nodes and distinguish the effects of different hidden nodes. Additionally, we show that the sequential nature of our algorithm allows for tracking changes in the hidden node influence over time.

  3. The hidden sentinel node in breast cancer

    NARCIS (Netherlands)

    Tanis, P. J.; van Sandick, J. W.; Nieweg, O. E.; Valdés Olmos, R. A.; Rutgers, E. J. T.; Hoefnagel, C. A.; Kroon, B. B. R.

    2002-01-01

    The purpose of this study was to analyse the occurrence of non-visualisation during preoperative lymphoscintigraphy for sentinel node identification in breast cancer. Preoperative lymphoscintigraphy was performed in 495 clinically node-negative breast cancer patients (501 sentinel node procedures)

  4. Hidden Connectivity in Networks with Vulnerable Classes of Nodes

    Directory of Open Access Journals (Sweden)

    Sebastian M. Krause

    2016-10-01

    Full Text Available In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally used to analyze connectivity in complex networks, but in its existing forms, it cannot treat the heterogeneity of multiple vulnerable classes. To analyze the connectivity under these constraints, we describe each class as a color and develop a “color-avoiding” percolation. We present an analytic theory for random networks and a numerical algorithm for all networks, with which we can determine which nodes are color-avoiding connected and whether the maximal set percolates in the system. We find that the interaction of topology and color distribution implies a rich critical behavior, with critical values and critical exponents depending both on the topology and on the color distribution. Applying our physics-based theory to the Internet, we show how color-avoiding percolation can be used as the basis for new topologically aware secure communication protocols. Beyond applications to cybersecurity, our framework reveals a new layer of hidden structure in a wide range of natural and technological systems.

  5. The hidden sentinel node in breast cancer

    International Nuclear Information System (INIS)

    Tanis, P.J.; Sandick, J.W. van; Nieweg, O.E.; Rutgers, E.J.T.; Kroon, B.B.R.; Valdes Olmos, R.A.; Hoefnagel, C.A.

    2002-01-01

    The purpose of this study was to analyse the occurrence of non-visualisation during preoperative lymphoscintigraphy for sentinel node identification in breast cancer. Preoperative lymphoscintigraphy was performed in 495 clinically node-negative breast cancer patients (501 sentinel node procedures) after injection of technetium-99m nanocolloid. Anterior and prone lateral (hanging breast) planar images were obtained a few minutes and 4 h after injection. The sentinel node was intraoperatively identified with the aid of patent blue dye and a gamma-ray detection probe. A sentinel node was visualised on the 4-h images in 449 of 501 procedures (90%). This visualisation rate improved from 76% to 94% during the study period. Delayed imaging (5-23 h) in 19 patients whose sentinel nodes failed to show, resulted in visualisation in four of them. A repeat injection of radiocolloid in 11 patients revealed a sentinel node in six. In the end, the visualisation rate was 92%. The sentinel node was surgically retrieved in 24 of the remaining 42 patients with non-visualisation (57%). Sentinel nodes that were visualised were tumour-positive in 38% and non-visualised sentinel nodes were involved in 50% (χ 2 , P=0.17). In a multivariate regression analysis, scintigraphic non-visualisation was independently associated with increased patient age (P<0.001), decreased tracer dose (P<0.001) and increased number of tumour-positive lymph nodes (P=0.013). The use of a sufficient amount of radioactivity (at least 100 MBq) is recommended for lymphatic mapping in breast cancer, especially in elderly women. Delayed imaging and re-injection of the radioactive tracer increase the visualisation rate. The non-visualised sentinel node can be identified intraoperatively in more than half of the patients. (orig.)

  6. The hidden sentinel node in breast cancer

    Energy Technology Data Exchange (ETDEWEB)

    Tanis, P.J.; Sandick, J.W. van; Nieweg, O.E.; Rutgers, E.J.T.; Kroon, B.B.R. [Department of Surgery, Netherlands Cancer Institute, Amsterdam (Netherlands); Valdes Olmos, R.A.; Hoefnagel, C.A. [Department of Nuclear Medicine, Netherlands Cancer Institute, Amsterdam (Netherlands)

    2002-03-01

    The purpose of this study was to analyse the occurrence of non-visualisation during preoperative lymphoscintigraphy for sentinel node identification in breast cancer. Preoperative lymphoscintigraphy was performed in 495 clinically node-negative breast cancer patients (501 sentinel node procedures) after injection of technetium-99m nanocolloid. Anterior and prone lateral (hanging breast) planar images were obtained a few minutes and 4 h after injection. The sentinel node was intraoperatively identified with the aid of patent blue dye and a gamma-ray detection probe. A sentinel node was visualised on the 4-h images in 449 of 501 procedures (90%). This visualisation rate improved from 76% to 94% during the study period. Delayed imaging (5-23 h) in 19 patients whose sentinel nodes failed to show, resulted in visualisation in four of them. A repeat injection of radiocolloid in 11 patients revealed a sentinel node in six. In the end, the visualisation rate was 92%. The sentinel node was surgically retrieved in 24 of the remaining 42 patients with non-visualisation (57%). Sentinel nodes that were visualised were tumour-positive in 38% and non-visualised sentinel nodes were involved in 50% ({chi}{sup 2}, P=0.17). In a multivariate regression analysis, scintigraphic non-visualisation was independently associated with increased patient age (P<0.001), decreased tracer dose (P<0.001) and increased number of tumour-positive lymph nodes (P=0.013). The use of a sufficient amount of radioactivity (at least 100 MBq) is recommended for lymphatic mapping in breast cancer, especially in elderly women. Delayed imaging and re-injection of the radioactive tracer increase the visualisation rate. The non-visualised sentinel node can be identified intraoperatively in more than half of the patients. (orig.)

  7. A Fast SVD-Hidden-nodes based Extreme Learning Machine for Large-Scale Data Analytics.

    Science.gov (United States)

    Deng, Wan-Yu; Bai, Zuo; Huang, Guang-Bin; Zheng, Qing-Hua

    2016-05-01

    Big dimensional data is a growing trend that is emerging in many real world contexts, extending from web mining, gene expression analysis, protein-protein interaction to high-frequency financial data. Nowadays, there is a growing consensus that the increasing dimensionality poses impeding effects on the performances of classifiers, which is termed as the "peaking phenomenon" in the field of machine intelligence. To address the issue, dimensionality reduction is commonly employed as a preprocessing step on the Big dimensional data before building the classifiers. In this paper, we propose an Extreme Learning Machine (ELM) approach for large-scale data analytic. In contrast to existing approaches, we embed hidden nodes that are designed using singular value decomposition (SVD) into the classical ELM. These SVD nodes in the hidden layer are shown to capture the underlying characteristics of the Big dimensional data well, exhibiting excellent generalization performances. The drawback of using SVD on the entire dataset, however, is the high computational complexity involved. To address this, a fast divide and conquer approximation scheme is introduced to maintain computational tractability on high volume data. The resultant algorithm proposed is labeled here as Fast Singular Value Decomposition-Hidden-nodes based Extreme Learning Machine or FSVD-H-ELM in short. In FSVD-H-ELM, instead of identifying the SVD hidden nodes directly from the entire dataset, SVD hidden nodes are derived from multiple random subsets of data sampled from the original dataset. Comprehensive experiments and comparisons are conducted to assess the FSVD-H-ELM against other state-of-the-art algorithms. The results obtained demonstrated the superior generalization performance and efficiency of the FSVD-H-ELM. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. DoS detection in IEEE 802.11 with the presence of hidden nodes

    Directory of Open Access Journals (Sweden)

    Joseph Soryal

    2014-07-01

    Full Text Available The paper presents a novel technique to detect Denial of Service (DoS attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS and Frequency Hopping Spread Spectrum (FHSS and the results are presented to validate the algorithm.

  9. DoS detection in IEEE 802.11 with the presence of hidden nodes.

    Science.gov (United States)

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2014-07-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.

  10. Learning and inference in a nonequilibrium Ising model with hidden nodes.

    Science.gov (United States)

    Dunn, Benjamin; Roudi, Yasser

    2013-02-01

    We study inference and reconstruction of couplings in a partially observed kinetic Ising model. With hidden spins, calculating the likelihood of a sequence of observed spin configurations requires performing a trace over the configurations of the hidden ones. This, as we show, can be represented as a path integral. Using this representation, we demonstrate that systematic approximate inference and learning rules can be derived using dynamical mean-field theory. Although naive mean-field theory leads to an unstable learning rule, taking into account Gaussian corrections allows learning the couplings involving hidden nodes. It also improves learning of the couplings between the observed nodes compared to when hidden nodes are ignored.

  11. A single hidden layer feedforward network with only one neuron in the hidden layer can approximate any univariate function

    OpenAIRE

    Guliyev , Namig; Ismailov , Vugar

    2016-01-01

    The possibility of approximating a continuous function on a compact subset of the real line by a feedforward single hidden layer neural network with a sigmoidal activation function has been studied in many papers. Such networks can approximate an arbitrary continuous function provided that an unlimited number of neurons in a hidden layer is permitted. In this paper, we consider constructive approximation on any finite interval of $\\mathbb{R}$ by neural networks with only one neuron in the hid...

  12. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    Science.gov (United States)

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  13. Aero Engine Component Fault Diagnosis Using Multi-Hidden-Layer Extreme Learning Machine with Optimized Structure

    Directory of Open Access Journals (Sweden)

    Shan Pang

    2016-01-01

    Full Text Available A new aero gas turbine engine gas path component fault diagnosis method based on multi-hidden-layer extreme learning machine with optimized structure (OM-ELM was proposed. OM-ELM employs quantum-behaved particle swarm optimization to automatically obtain the optimal network structure according to both the root mean square error on training data set and the norm of output weights. The proposed method is applied to handwritten recognition data set and a gas turbine engine diagnostic application and is compared with basic ELM, multi-hidden-layer ELM, and two state-of-the-art deep learning algorithms: deep belief network and the stacked denoising autoencoder. Results show that, with optimized network structure, OM-ELM obtains better test accuracy in both applications and is more robust to sensor noise. Meanwhile it controls the model complexity and needs far less hidden nodes than multi-hidden-layer ELM, thus saving computer memory and making it more efficient to implement. All these advantages make our method an effective and reliable tool for engine component fault diagnosis tool.

  14. TeraHertz imaging of hidden paint layers on canvas

    NARCIS (Netherlands)

    Adam, A.J.L.; Planken, P.C.M.; Meloni, S.; Dik, J.

    2009-01-01

    We show terahertz reflection images of hidden paint layers in a painting on canvas and compare the results with X-ray Radiography and Infrared Reflectography. Our terahertz measurements show strong reflections from both the canvas/paint interface and from the raw umber/lead white interface,

  15. On Throughput Improvement of Wireless Ad Hoc Networks with Hidden Nodes

    Science.gov (United States)

    Choi, Hong-Seok; Lim, Jong-Tae

    In this letter, we present the throughput analysis of the wireless ad hoc networks based on the IEEE 802.11 MAC (Medium Access Control). Especially, our analysis includes the case with the hidden node problem so that it can be applied to the multi-hop networks. In addition, we suggest a new channel access control algorithm to maximize the network throughput and show the usefulness of the proposed algorithm through simulations.

  16. Backoff-stage synchronization in three-hop string-topology wireless networks with hidden nodes

    Science.gov (United States)

    Sanada, Kosuke; Sekiya, Hiroo; Komuro, Nobuyoshi; Sakata, Shiro

    In IEEE 802.11 wireless multi-hop networks, each node works individually and their individual operations generate entire network dynamics. It is important to clarify the network dynamics in wireless multi-hop networks for designing and constructing multi-hop communication networks. This paper presents the network-dynamics investigations for three-hop string-topology wireless network in detail. From the investigations, a “backoff-stage synchronization” phenomenon, which is mutuality between hidden nodes, is found. The mechanism of the backoff-stage synchronization is expressed and the sufficient conditions for the synchronization occurrence are given. This phenomenon gives some impacts on the IEEE 802.11 multi-hop-network communications.

  17. Application of ANNS in tube CHF prediction: effect on neuron number in hidden layer

    International Nuclear Information System (INIS)

    Han, L.; Shan, J.; Zhang, B.

    2004-01-01

    Prediction of the Critical Heat Flux (CHF) for upward flow of water in uniformly heated vertical round tube is studied with Artificial Neuron Networks (ANNs) method utilizing different neuron number in hidden layers. This study is based on thermal equilibrium conditions. The neuron number in hidden layers is chosen to vary from 5 to 30 with the step of 5. The effect due to the variety of the neuron number in hidden layers is analyzed. The analysis shows that the neuron number in hidden layers should be appropriate, too less will affect the prediction accuracy and too much may result in abnormal parametric trends. It is concluded that the appropriate neuron number in two hidden layers should be [15 15]. (authors)

  18. On the approximation by single hidden layer feedforward neural networks with fixed weights

    OpenAIRE

    Guliyev, Namig J.; Ismailov, Vugar E.

    2017-01-01

    International audience; Feedforward neural networks have wide applicability in various disciplines of science due to their universal approximation property. Some authors have shown that single hidden layer feedforward neural networks (SLFNs) with fixed weights still possess the universal approximation property provided that approximated functions are univariate. But this phenomenon does not lay any restrictions on the number of neurons in the hidden layer. The more this number, the more the p...

  19. Single-hidden-layer feed-forward quantum neural network based on Grover learning.

    Science.gov (United States)

    Liu, Cheng-Yi; Chen, Chein; Chang, Ching-Ter; Shih, Lun-Min

    2013-09-01

    In this paper, a novel single-hidden-layer feed-forward quantum neural network model is proposed based on some concepts and principles in the quantum theory. By combining the quantum mechanism with the feed-forward neural network, we defined quantum hidden neurons and connected quantum weights, and used them as the fundamental information processing unit in a single-hidden-layer feed-forward neural network. The quantum neurons make a wide range of nonlinear functions serve as the activation functions in the hidden layer of the network, and the Grover searching algorithm outstands the optimal parameter setting iteratively and thus makes very efficient neural network learning possible. The quantum neuron and weights, along with a Grover searching algorithm based learning, result in a novel and efficient neural network characteristic of reduced network, high efficient training and prospect application in future. Some simulations are taken to investigate the performance of the proposed quantum network and the result show that it can achieve accurate learning. Copyright © 2013 Elsevier Ltd. All rights reserved.

  20. Hidden symmetries in N-layer dielectric stacks

    Science.gov (United States)

    Liu, Haihao; Shoufie Ukhtary, M.; Saito, Riichiro

    2017-11-01

    The optical properties of a multilayer system with arbitrary N layers of dielectric media are investigated. Each layer is one of two dielectric media, with a thickness one-quarter the wavelength of light in that medium, corresponding to a central frequency f 0. Using the transfer matrix method, the transmittance T is calculated for all possible 2 N sequences for small N. Unexpectedly, it is found that instead of 2 N different values of T at f 0 (T 0), there are only (N/2+1) discrete values of T 0, for even N, and (N + 1) for odd N. We explain this high degeneracy in T 0 values by finding symmetry operations on the sequences that do not change T 0. Analytical formulae were derived for the T 0 values and their degeneracies as functions of N and an integer parameter for each sequence we call ‘charge’. Additionally, the bandwidth at f 0 and filter response of the transmission spectra are investigated, revealing asymptotic behavior at large N.

  1. Optimized hardware framework of MLP with random hidden layers for classification applications

    Science.gov (United States)

    Zyarah, Abdullah M.; Ramesh, Abhishek; Merkel, Cory; Kudithipudi, Dhireesha

    2016-05-01

    Multilayer Perceptron Networks with random hidden layers are very efficient at automatic feature extraction and offer significant performance improvements in the training process. They essentially employ large collection of fixed, random features, and are expedient for form-factor constrained embedded platforms. In this work, a reconfigurable and scalable architecture is proposed for the MLPs with random hidden layers with a customized building block based on CORDIC algorithm. The proposed architecture also exploits fixed point operations for area efficiency. The design is validated for classification on two different datasets. An accuracy of ~ 90% for MNIST dataset and 75% for gender classification on LFW dataset was observed. The hardware has 299 speed-up over the corresponding software realization.

  2. Modification of Hidden Layer Weight in Extreme Learning Machine Using Gain Ratio

    Directory of Open Access Journals (Sweden)

    Anggraeny Fetty Tri

    2016-01-01

    Full Text Available Extreme Learning Machine (ELM is a method of learning feed forward neural network quickly and has a fairly good accuracy. This method is devoted to a feed forward neural network with one hidden layer where the parameters (i.e. weight and bias are adjusted one time randomly at the beginning of the learning process. In neural network, the input layer is connected to all characteristics/features, and the output layer is connected to all classes of species. This research used three datasets from UCI database, which were Iris, Breast Wisconsin, and Dermatology, with each dataset having several features. Each characteristic/feature of the data has a role in the process of classification levels, starting from the most influencing role to non-influencing at all. Gain ratio was used to extract each feature role on each datasets. Gain ratio is a method to extract feature role in order to develop a decision tree structure. In this study, ELM structure has been modified, where the random weights of the hidden layer were adjusted to the level of each feature role in determining the species class, so as to improve the level of training and testing accuracy. The proposed method has higher classification accuracy rate than basic ELM on all three datasets, which were 99%, 96%, and 82%, respectively.

  3. A Hybrid Double-Layer Master-Slave Model For Multicore-Node Clusters

    International Nuclear Information System (INIS)

    Liu Gang; Schmider, Hartmut; Edgecombe, Kenneth E

    2012-01-01

    The Double-Layer Master-Slave Model (DMSM) is a suitable hybrid model for executing a workload that consists of multiple independent tasks of varying length on a cluster consisting of multicore nodes. In this model, groups of individual tasks are first deployed to the cluster nodes through an MPI based Master-Slave model. Then, each group is processed by multiple threads on the node through an OpenMP based All-Slave approach. The lack of thread safety of most MPI libraries has to be addressed by a judicious use of OpenMP critical regions and locks. The HPCVL DMSM Library implements this model in Fortran and C. It requires a minimum of user input to set up the framework for the model and to define the individual tasks. Optionally, it supports the dynamic distribution of task-related data and the collection of results at runtime. This library is freely available as source code. Here, we outline the working principles of the library and on a few examples demonstrate its capability to efficiently distribute a workload on a distributed-memory cluster with shared-memory nodes.

  4. Smart Multiple Access Topologi Employing Intelligent Physical Layer for addressing the Mobile Node

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi

    2014-01-01

    of the mobile users, the cell size of the mobile network will shrink. Eventually, there will be an upsurge of signaling messages interchanged between the device and the network due to an increase in handover related operations. Attempt should be made to reduce the interaction with the network and simplify...... the mobility and location management related processes. In this thesis we set out a technical architecture of a mobile network to abridge the intricate mobility and location management processes as well as the addressing principle to render more operational efficiency and cater to the needs of the data hungry......, for example, addressing of a node. If we have a method to actuate user identification for the purpose of mobility management by implementing lower layer processes, we can simplify or eliminate the layer 7 processes and hence reduce the intricacy and costs of mobile network elements and user equipment...

  5. Neural node network and model, and method of teaching same

    Science.gov (United States)

    Parlos, Alexander G. (Inventor); Atiya, Amir F. (Inventor); Fernandez, Benito (Inventor); Tsai, Wei K. (Inventor); Chong, Kil T. (Inventor)

    1995-01-01

    The present invention is a fully connected feed forward network that includes at least one hidden layer 16. The hidden layer 16 includes nodes 20 in which the output of the node is fed back to that node as an input with a unit delay produced by a delay device 24 occurring in the feedback path 22 (local feedback). Each node within each layer also receives a delayed output (crosstalk) produced by a delay unit 36 from all the other nodes within the same layer 16. The node performs a transfer function operation based on the inputs from the previous layer and the delayed outputs. The network can be implemented as analog or digital or within a general purpose processor. Two teaching methods can be used: (1) back propagation of weight calculation that includes the local feedback and the crosstalk or (2) more preferably a feed forward gradient decent which immediately follows the output computations and which also includes the local feedback and the crosstalk. Subsequent to the gradient propagation, the weights can be normalized, thereby preventing convergence to a local optimum. Education of the network can be incremental both on and off-line. An educated network is suitable for modeling and controlling dynamic nonlinear systems and time series systems and predicting the outputs as well as hidden states and parameters. The educated network can also be further educated during on-line processing.

  6. Selection of Hidden Layer Neurons and Best Training Method for FFNN in Application of Long Term Load Forecasting

    Science.gov (United States)

    Singh, Navneet K.; Singh, Asheesh K.; Tripathy, Manoj

    2012-05-01

    For power industries electricity load forecast plays an important role for real-time control, security, optimal unit commitment, economic scheduling, maintenance, energy management, and plant structure planning etc. A new technique for long term load forecasting (LTLF) using optimized feed forward artificial neural network (FFNN) architecture is presented in this paper, which selects optimal number of neurons in the hidden layer as well as the best training method for the case study. The prediction performance of proposed technique is evaluated using mean absolute percentage error (MAPE) of Thailand private electricity consumption and forecasted data. The results obtained are compared with the results of classical auto-regressive (AR) and moving average (MA) methods. It is, in general, observed that the proposed method is prediction wise more accurate.

  7. Rigorous assessment of patterning solution of metal layer in 7 nm technology node

    Science.gov (United States)

    Gao, Weimin; Ciofi, Ivan; Saad, Yves; Matagne, Philippe; Bachmann, Michael; Gillijns, Werner; Lucas, Kevin; Demmerle, Wolfgang; Schmoeller, Thomas

    2016-01-01

    In a 7 nm node (N7), the logic design requires a critical poly pitch of 42 to 45 nm and a metal 1 (M1) pitch of 28 to 32 nm. Such high-pattern density pushes the 193 immersion lithography solution toward its limit and also brings extremely complex patterning scenarios. The N7 M1 layer may require a self-aligned quadruple patterning (SAQP) with a triple litho-etch (LE3) block process. Therefore, the whole patterning process flow requires multiple exposure+etch+deposition processes and each step introduces a particular impact on the pattern profiles and the topography. In this study, we have successfully integrated a simulation tool that enables emulation of the whole patterning flow with realistic process-dependent three-dimensional (3-D) profile and topology. We use this tool to study the patterning process variations of the N7 M1 layer including the overlay control, the critical dimension uniformity budget, and the lithographic process window (PW). The resulting 3-D pattern structure can be used to optimize the process flow, verify design rules, extract parasitics, and most importantly, simulate the electric field, and identify hot spots for dielectric reliability. As an example application, the maximum electric field at M1 tip-to-tip, which is one of the most critical patterning locations, has been simulated and extracted. The approach helps to investigate the impact of process variations on dielectric reliability. We have also assessed the alternative M1 patterning flow with a single exposure block using extreme ultraviolet lithography (EUVL) and analyzed its advantages compared to the LE3 block approach.

  8. SOFT COMPUTING SINGLE HIDDEN LAYER MODELS FOR SHELF LIFE PREDICTION OF BURFI

    Directory of Open Access Journals (Sweden)

    Sumit Goyal

    2012-05-01

    Full Text Available Burfi is an extremely popular sweetmeat, which is prepared by desiccating the standardized water buffalo milk. Soft computing feedforward single layer models were developed for predicting the shelf life of burfi stored at 30g.C. The data of the product relating to moisture, titratable acidity, free fatty acids, tyrosine, and peroxide value were used as input variables, and the overall acceptability score as output variable. The results showed excellent agreement between the experimental and the predicted data, suggesting that the developed soft computing model can alternatively be used for predicting the shelf life of burfi.

  9. Liver Tumor Segmentation from MR Images Using 3D Fast Marching Algorithm and Single Hidden Layer Feedforward Neural Network

    Directory of Open Access Journals (Sweden)

    Trong-Ngoc Le

    2016-01-01

    Full Text Available Objective. Our objective is to develop a computerized scheme for liver tumor segmentation in MR images. Materials and Methods. Our proposed scheme consists of four main stages. Firstly, the region of interest (ROI image which contains the liver tumor region in the T1-weighted MR image series was extracted by using seed points. The noise in this ROI image was reduced and the boundaries were enhanced. A 3D fast marching algorithm was applied to generate the initial labeled regions which are considered as teacher regions. A single hidden layer feedforward neural network (SLFN, which was trained by a noniterative algorithm, was employed to classify the unlabeled voxels. Finally, the postprocessing stage was applied to extract and refine the liver tumor boundaries. The liver tumors determined by our scheme were compared with those manually traced by a radiologist, used as the “ground truth.” Results. The study was evaluated on two datasets of 25 tumors from 16 patients. The proposed scheme obtained the mean volumetric overlap error of 27.43% and the mean percentage volume error of 15.73%. The mean of the average surface distance, the root mean square surface distance, and the maximal surface distance were 0.58 mm, 1.20 mm, and 6.29 mm, respectively.

  10. Extreme Ultraviolet Process Optimization for Contact Layer of 14 nm Node Logic and 16 nm Half Pitch Memory Devices

    Science.gov (United States)

    Tseng, Shih-En; Chen, Alek

    2012-06-01

    Extreme ultraviolet (EUV) lithography is considered the most promising single exposure technology at the 27 nm half-pitch node and beyond. The imaging performance of ASML TWINSCAN NXE:3100 has been demonstrated to be able to resolve 26 nm Flash gate layer and 16 nm static random access memory (SRAM) metal layer with a 0.25 numerical aperture (NA) and conventional illumination. Targeting for high volume manufacturing, ASML TWINSCAN NXE:3300B, featuring a 0.33 NA lens with off-axis illumination, will generate a higher contrast aerial image due to improved diffraction order collection efficiency and is expected to reduce target dose via mask biasing. This work performed a simulation to determine how EUV high NA imaging benefits the mask rule check trade-offs required to achieve viable lithography solutions in two device application scenarios: a 14 nm node 6T-SRAM contact layer and a 16 nm half-pitch NAND Flash staggered contact layer. In each application, the three-dimensional mask effects versus Kirchhoff mask were also investigated.

  11. Physical Layer Multi-Core Prototyping A Dataflow-Based Approach for LTE eNodeB

    CERN Document Server

    Pelcat, Maxime; Piat, Jonathan; Nezan, Jean-François

    2013-01-01

    Base stations developed according to the 3GPP Long Term Evolution (LTE) standard require unprecedented processing power. 3GPP LTE enables data rates beyond hundreds of Mbits/s by using advanced technologies, necessitating a highly complex LTE physical layer. The operating power of base stations is a significant cost for operators, and is currently optimized using state-of-the-art hardware solutions, such as heterogeneous distributed systems. The traditional system design method of porting algorithms to heterogeneous distributed systems based on test-and-refine methods is a manual, thus time-expensive, task.   Physical Layer Multi-Core Prototyping: A Dataflow-Based Approach for LTE eNodeB provides a clear introduction to the 3GPP LTE physical layer and to dataflow-based prototyping and programming. The difficulties in the process of 3GPP LTE physical layer porting are outlined, with particular focus on automatic partitioning and scheduling, load balancing and computation latency reduction, specifically in sys...

  12. Hidden Liquidity

    OpenAIRE

    Cebiroglu, Gökhan; Horst, Ulrich

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, hi...

  13. Quantifying hidden defect in multi-layered structures by using eddy current system combined with a scanner

    International Nuclear Information System (INIS)

    Huang Pingjie; Zhou Zekui; Wu Zhaotong

    2005-01-01

    The eddy current testing forward model of scanning inspection of multi-layered structures is introduced and simulation work is carried out to reveal the interaction between the scanning coil and defects with different geometric properties. A multi-frequency ECT experimental instrument combined with a scanner is established and scanning inspections are performed to detect the artificial etched flaws with different geometric parameters in the multi-layered structures. The predicted signals by the forward model are compared with the measured signals and the defects are characterized

  14. Evaluation of the feasibility for detecting hidden corrosion damage in multi-layer gusset plates using multiple inspection techniques

    International Nuclear Information System (INIS)

    Cobb, Adam C.; Duffer, Charles E.; Light, Glenn M.

    2014-01-01

    Gusset plates are used to connect the members in truss bridges and they are usually inspected using calipers or conventional thickness measurement ultrasonic testing (UT) devices. The damage mechanism of particular concern in gusset plates is corrosion and the regions most susceptible to corrosion damage are on the gusset interior surface where it intersects the chord, diagonal, and vertical members from water collecting at the interfaces. For heavily loaded gusset plates, one or more shingle plates are used to reinforce the gusset plate, creating a multi-layer structure. While the areas with corrosion damage remain near the members on the gusset plate, the shingle plates cover the gusset plate and greatly limit the surface access to the gusset plate, making UT thickness measurement impractical. Because of the critical nature of the gussets, a viable inspection strategy for multi-layer gusset assemblies must be developed. The premise of this research and development effort was to develop viable, field-deployable inspection approaches for this problem area. This paper presents three separate inspection approaches: two ultrasonic-based techniques and one radiographic approach. Each of these techniques was evaluated on a mock-up specimen provided by the Federal Highway Administration (FHWA) that is representative of gusseted connection from a truss bridge

  15. Evaluation of the feasibility for detecting hidden corrosion damage in multi-layer gusset plates using multiple inspection techniques

    Energy Technology Data Exchange (ETDEWEB)

    Cobb, Adam C.; Duffer, Charles E.; Light, Glenn M. [Southwest Research Institute, 6220 Culebra Road, San Antonio, TX 78238-5166 (United States)

    2014-02-18

    Gusset plates are used to connect the members in truss bridges and they are usually inspected using calipers or conventional thickness measurement ultrasonic testing (UT) devices. The damage mechanism of particular concern in gusset plates is corrosion and the regions most susceptible to corrosion damage are on the gusset interior surface where it intersects the chord, diagonal, and vertical members from water collecting at the interfaces. For heavily loaded gusset plates, one or more shingle plates are used to reinforce the gusset plate, creating a multi-layer structure. While the areas with corrosion damage remain near the members on the gusset plate, the shingle plates cover the gusset plate and greatly limit the surface access to the gusset plate, making UT thickness measurement impractical. Because of the critical nature of the gussets, a viable inspection strategy for multi-layer gusset assemblies must be developed. The premise of this research and development effort was to develop viable, field-deployable inspection approaches for this problem area. This paper presents three separate inspection approaches: two ultrasonic-based techniques and one radiographic approach. Each of these techniques was evaluated on a mock-up specimen provided by the Federal Highway Administration (FHWA) that is representative of gusseted connection from a truss bridge.

  16. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main......PRIMARY OBJECTIVE: The purpose of this study was to listen to and learn from children showing high levels of post-traumatic stress symptoms after parental acquired brain injury (ABI), in order to achieve an in-depth understanding of the difficulties the children face in their everyday lives...... finding indicates that the children experienced numerous losses, many of which were often suppressed or neglected by the children to protect the ill parents. CONCLUSIONS: The findings indicated that the children seemed to make a special effort to hide their feelings of loss and grief in order to protect...

  17. Node cookbook

    CERN Document Server

    Clements, David Mark

    2014-01-01

    In Node Cookbook Second Edition, each chapter focuses on a different aspect of working with Node. Following a Cookbook structure, the recipes are written in an easy-to-understand language. Readers will find it easier to grasp even the complex recipes which are backed by lots of illustrations, tips, and hints.If you have some knowledge of JavaScript and want to build fast, efficient, scalable client-server solutions, then Node Cookbook Second Edition is for you. Knowledge of Node will be an advantage but is not required. Experienced users of Node will be able to improve their skills.

  18. Sociology of Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Alireza Moradi

    2017-06-01

    Full Text Available This paper reviews the concept of hidden curriculum in the sociological theories and wants to explain sociological aspects of formation of hidden curriculum. The main question concentrates on the theoretical approaches in which hidden curriculum is explained sociologically.For this purpose it was applied qualitative research methodology. The relevant data include various sociological concepts and theories of hidden curriculum collected by the documentary method. The study showed a set of rules, procedures, relationships and social structure of education have decisive role in the formation of hidden curriculum. A hidden curriculum reinforces by existed inequalities among learners (based on their social classes or statues. There is, in fact, a balance between the learner's "knowledge receptions" with their "inequality proportion".The hidden curriculum studies from different major sociological theories such as Functionalism, Marxism and critical theory, Symbolic internationalism and Feminism. According to the functionalist perspective a hidden curriculum has a social function because it transmits social values. Marxists and critical thinkers correlate between hidden curriculum and the totality of social structure. They depicts that curriculum prepares learners for the exploitation in the work markets. Symbolic internationalism rejects absolute hegemony of hidden curriculum on education and looks to the socialization as a result of interaction between learner and instructor. Feminism theory also considers hidden curriculum as a vehicle which legitimates gender stereotypes.

  19. Node insertion in Coalescence Fractal Interpolation Function

    International Nuclear Information System (INIS)

    Prasad, Srijanani Anurag

    2013-01-01

    The Iterated Function System (IFS) used in the construction of Coalescence Hidden-variable Fractal Interpolation Function (CHFIF) depends on the interpolation data. The insertion of a new point in a given set of interpolation data is called the problem of node insertion. In this paper, the effect of insertion of new point on the related IFS and the Coalescence Fractal Interpolation Function is studied. Smoothness and Fractal Dimension of a CHFIF obtained with a node are also discussed

  20. POVMs and hidden variables

    International Nuclear Information System (INIS)

    Stairs, Allen

    2007-01-01

    Recent results by Paul Busch and Adan Cabello claim to show that by appealing to POVMs, non-contextual hidden variables can be ruled out in two dimensions. While the results of Busch and Cabello are mathematically correct, interpretive problems render them problematic as no hidden variable proofs

  1. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression where...

  2. Hidden gauge symmetry

    International Nuclear Information System (INIS)

    O'Raifeartaigh, L.

    1979-01-01

    This review describes the principles of hidden gauge symmetry and of its application to the fundamental interactions. The emphasis is on the structure of the theory rather than on the technical details and, in order to emphasise the structure, gauge symmetry and hidden symmetry are first treated as independent phenomena before being combined into a single (hidden gauge symmetric) theory. The main application of the theory is to the weak and electromagnetic interactions of the elementary particles, and although models are used for comparison with experiment and for illustration, emphasis is placed on those features of the application which are model-independent. (author)

  3. Multilayer Neural Networks with Extensively Many Hidden Units

    International Nuclear Information System (INIS)

    Rosen-Zvi, Michal; Engel, Andreas; Kanter, Ido

    2001-01-01

    The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions, whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an overlap in the space of Boolean functions as order parameter, the storage capacity is found to scale with the logarithm of the number of implementable Boolean functions. The generalization behavior is smooth for continuous couplings and shows a discontinuous transition to perfect generalization for discrete ones

  4. The hidden universe

    International Nuclear Information System (INIS)

    Disney, M.

    1985-01-01

    Astronomer Disney has followed a somewhat different tack than that of most popular books on cosmology by concentrating on the notion of hidden (as in not directly observable by its own radiation) matter in the universe

  5. Locating Hidden Servers

    National Research Council Canada - National Science Library

    Oeverlier, Lasse; Syverson, Paul F

    2006-01-01

    .... Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Without Borders have issued guides that describe using hidden services via Tor to protect the safety of dissidents as well as to resist censorship...

  6. Hidden charged dark matter

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Kaplinghat, Manoj; Tu, Huitzu; Yu, Hai-Bo

    2009-01-01

    Can dark matter be stabilized by charge conservation, just as the electron is in the standard model? We examine the possibility that dark matter is hidden, that is, neutral under all standard model gauge interactions, but charged under an exact (\\rm U)(1) gauge symmetry of the hidden sector. Such candidates are predicted in WIMPless models, supersymmetric models in which hidden dark matter has the desired thermal relic density for a wide range of masses. Hidden charged dark matter has many novel properties not shared by neutral dark matter: (1) bound state formation and Sommerfeld-enhanced annihilation after chemical freeze out may reduce its relic density, (2) similar effects greatly enhance dark matter annihilation in protohalos at redshifts of z ∼ 30, (3) Compton scattering off hidden photons delays kinetic decoupling, suppressing small scale structure, and (4) Rutherford scattering makes such dark matter self-interacting and collisional, potentially impacting properties of the Bullet Cluster and the observed morphology of galactic halos. We analyze all of these effects in a WIMPless model in which the hidden sector is a simplified version of the minimal supersymmetric standard model and the dark matter is a hidden sector stau. We find that charged hidden dark matter is viable and consistent with the correct relic density for reasonable model parameters and dark matter masses in the range 1 GeV ∼ X ∼< 10 TeV. At the same time, in the preferred range of parameters, this model predicts cores in the dark matter halos of small galaxies and other halo properties that may be within the reach of future observations. These models therefore provide a viable and well-motivated framework for collisional dark matter with Sommerfeld enhancement, with novel implications for astrophysics and dark matter searches

  7. Search for Hidden Particles

    CERN Multimedia

    Solovev, V

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  8. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  9. Hidden layers of human small RNAs

    DEFF Research Database (Denmark)

    Kawaji, Hideya; Nakamura, Mari; Takahashi, Yukari

    2008-01-01

    small RNA have focused on miRNA and/or siRNA rather than on the exploration of additional classes of RNAs. RESULTS: Here, we explored human small RNAs by unbiased sequencing of RNAs with sizes of 19-40 nt. We provide substantial evidences for the existence of independent classes of small RNAs. Our data......BACKGROUND: Small RNA attracts increasing interest based on the discovery of RNA silencing and the rapid progress of our understanding of these phenomena. Although recent studies suggest the possible existence of yet undiscovered types of small RNAs in higher organisms, many studies to profile...... shows that well-characterized non-coding RNA, such as tRNA, snoRNA, and snRNA are cleaved at sites specific to the class of ncRNA. In particular, tRNA cleavage is regulated depending on tRNA type and tissue expression. We also found small RNAs mapped to genomic regions that are transcribed in both...

  10. The hidden values

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Jensen, Karsten Klint

    “The Hidden Values - Transparency in Decision-Making Processes Dealing with Hazardous Activities”. The report seeks to shed light on what is needed to create a transparent framework for political and administrative decisions on the use of GMOs and chemical products. It is our hope that the report...

  11. X-ray appearance of intrathoracic lymph nodes in lymphogranulomatosis

    International Nuclear Information System (INIS)

    Zagorodskaya, M.M.; Antonova, R.A.

    1980-01-01

    Analysis of clinico-roentgenological data obtained when examining 174 patients with lymphogranulomatosis is carried out. Roentgenological semiotics of the lesions of intrathoracic lymp nodes according to the Rouviere classification supplemented by Zhdanov has been specified. Technique of layer-by-layer examination with an account of roentgenotopography of intrathoracic lymph nodes promoting to their determination is developed. Dynamics of the lymph node changes under treatment is traced. Rarely occurring wide-spread decalcification of prevascular nodes after the radiotherapy is described

  12. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  13. A hidden history

    OpenAIRE

    Peppers, Emily

    2008-01-01

    The Cultural Collections Audit project began at the University of Edinburgh in 2004, searching for hidden treasures in its 'distributed heritage collections' across the university. The objects and collections recorded in the Audit ranged widely from fine art and furniture to historical scientific and teaching equipment and personalia relating to key figures in the university's long tradition of academic excellence. This information was gathered in order to create a central database of informa...

  14. Distinguishing Hidden Markov Chains

    OpenAIRE

    Kiefer, Stefan; Sistla, A. Prasad

    2015-01-01

    Hidden Markov Chains (HMCs) are commonly used mathematical models of probabilistic systems. They are employed in various fields such as speech recognition, signal processing, and biological sequence analysis. We consider the problem of distinguishing two given HMCs based on an observation sequence that one of the HMCs generates. More precisely, given two HMCs and an observation sequence, a distinguishing algorithm is expected to identify the HMC that generates the observation sequence. Two HM...

  15. Coupling of Hidden Sector

    OpenAIRE

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fer\\-mions (``sterinos'') and sterile mediating bosons (``sterons'') of mass dimension 1 (not 2!) --- the last described by an antisymmetric tensor field --- requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, sugge...

  16. Localization of hidden Chua's attractors

    International Nuclear Information System (INIS)

    Leonov, G.A.; Kuznetsov, N.V.; Vagaitsev, V.I.

    2011-01-01

    The classical attractors of Lorenz, Rossler, Chua, Chen, and other widely-known attractors are those excited from unstable equilibria. From computational point of view this allows one to use numerical method, in which after transient process a trajectory, started from a point of unstable manifold in the neighborhood of equilibrium, reaches an attractor and identifies it. However there are attractors of another type: hidden attractors, a basin of attraction of which does not contain neighborhoods of equilibria. In the present Letter for localization of hidden attractors of Chua's circuit it is suggested to use a special analytical-numerical algorithm. -- Highlights: → There are hidden attractors: basin doesn't contain neighborhoods of equilibria. → Hidden attractors cannot be reached by trajectory from neighborhoods of equilibria. → We suggested special procedure for localization of hidden attractors. → We discovered hidden attractor in Chua's system, L. Chua in his work didn't expect this.

  17. Hidden Liquidity: Determinants and Impact

    OpenAIRE

    Gökhan Cebiroglu; Ulrich Horst

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, ...

  18. A hidden service model based on HS-HS anonymous network

    Science.gov (United States)

    Meng, Yitong; Zhao, Xing; Fei, Jinlong; Zhu, Yuefei

    2017-10-01

    The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today's anonymous service.

  19. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  20. A SURVEY ON DELAY AND NEIGHBOR NODE MONITORING BASED WORMHOLE ATTACK PREVENTION AND DETECTION

    Directory of Open Access Journals (Sweden)

    Sudhir T Bagade

    2016-12-01

    Full Text Available In Mobile Ad-hoc Networks (MANET, network layer attacks, for example wormhole attacks, disrupt the network routing operations and can be used for data theft. Wormhole attacks are of two types: hidden and exposed wormhole. There are various mechanisms in literature which are used to prevent and detect wormhole attacks. In this paper, we survey wormhole prevention and detection techniques and present our critical observations for each. These techniques are based on cryptographic mechanisms, monitoring of packet transmission delay and control packet forwarding behavior of neighbor nodes. We compare the techniques using the following criteria- extra resources needed applicability to different network topologies and routing protocols, prevention/detection capability, etc. We conclude the paper with potential research directions.

  1. Hidden Risk Factors for Women

    Science.gov (United States)

    ... A.S.T. Quiz Hidden Stroke Risk Factors for Women Updated:Nov 22,2016 Excerpted from "What Women Need To Know About The Hidden Risk Factors ... 2012) This year, more than 100,000 U.S. women under 65 will have a stroke. Stroke is ...

  2. Higgs Portal into Hidden Sectors

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    Several attractive theoretical ideas suggest the existence of one or more 'hidden sectors' consisting of standard model singlet fields, some of which may not be too heavy. There is a profound reason to think that the Higgs sector might provide the first access to these hidden sectors. This scenario could affect Higgs phenomenology in drastic ways.

  3. Modular sensor network node

    Science.gov (United States)

    Davis, Jesse Harper Zehring [Berkeley, CA; Stark, Jr., Douglas Paul; Kershaw, Christopher Patrick [Hayward, CA; Kyker, Ronald Dean [Livermore, CA

    2008-06-10

    A distributed wireless sensor network node is disclosed. The wireless sensor network node includes a plurality of sensor modules coupled to a system bus and configured to sense a parameter. The parameter may be an object, an event or any other parameter. The node collects data representative of the parameter. The node also includes a communication module coupled to the system bus and configured to allow the node to communicate with other nodes. The node also includes a processing module coupled to the system bus and adapted to receive the data from the sensor module and operable to analyze the data. The node also includes a power module connected to the system bus and operable to generate a regulated voltage.

  4. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  5. Related Drupal Nodes Block

    NARCIS (Netherlands)

    Van der Vegt, Wim

    2010-01-01

    Related Drupal Nodes Block This module exposes a block that uses Latent Semantic Analysis (Lsa) internally to suggest three nodes that are relevant to the node a user is viewing. This module performs three tasks. 1) It periodically indexes a Drupal site and generates a Lsa Term Document Matrix.

  6. Live and Dead Nodes

    DEFF Research Database (Denmark)

    Jørgensen, Sune Lehman; Jackson, A. D.

    2005-01-01

    In this paper, we explore the consequences of a distinction between `live' and `dead' network nodes; `live' nodes are able to acquire new links whereas `dead' nodes are static. We develop an analytically soluble growing network model incorporating this distinction and show that it can provide...

  7. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  8. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  9. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group....

  10. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...

  11. Child Abuse: The Hidden Bruises

    Science.gov (United States)

    ... for Families - Vietnamese Spanish Facts for Families Guide Child Abuse - The Hidden Bruises No. 5; Updated November 2014 The statistics on physical child abuse are alarming. It is estimated hundreds of thousands ...

  12. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  13. Hidden Curriculum: An Analytical Definition

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Andarvazh

    2018-03-01

    Full Text Available Background: The concept of hidden curriculum was first used by Philip Jackson in 1968, and Hafferty brought this concept to the medical education. Many of the subjects that medical students learn are attributed to this curriculum. So far several definitions have been presented for the hidden curriculum, which on the one hand made this concept richer, and on the other hand, led to confusion and ambiguity.This paper tries to provide a clear and comprehensive definition of it.Methods: In this study, concept analysis of McKenna method was used. Using keywords and searching in the databases, 561 English and 26 Persian references related to the concept was found, then by limitingthe research scope, 125 abstracts and by finding more relevant references, 55 articles were fully studied.Results: After analyzing the definitions by McKenna method, the hidden curriculum is defined as follows: The hidden curriculum is a hidden, powerful, intrinsic in organizational structure and culture and sometimes contradictory message, conveyed implicitly and tacitly in the learning environment by structural and human factors and its contents includes cultural habits and customs, norms, values, belief systems, attitudes, skills, desires and behavioral and social expectations can have a positive or negative effect, unplanned, neither planners nor teachers, nor learners are aware of it. The ultimate consequence of the hidden curriculum includes reproducing the existing class structure, socialization, and familiarizing learners for transmission and joining the professional world.Conclusion: Based on the concept analysis, we arrived at an analytical definition of the hidden curriculum that could be useful for further studies in this area.Keywords: CONCEPT ANALYSIS, HIDDEN CURRICULUM, MCKENNA’S METHOD

  14. Protocol for multiple node network

    Science.gov (United States)

    Kirkham, Harold (Inventor)

    1995-01-01

    The invention is a multiple interconnected network of intelligent message-repeating remote nodes which employs an antibody recognition message termination process performed by all remote nodes and a remote node polling process performed by other nodes which are master units controlling remote nodes in respective zones of the network assigned to respective master nodes. Each remote node repeats only those messages originated in the local zone, to provide isolation among the master nodes.

  15. Belief propagation and replicas for inference and learning in a kinetic Ising model with hidden spins

    International Nuclear Information System (INIS)

    Battistin, C; Roudi, Y; Hertz, J; Tyrcha, J

    2015-01-01

    We propose a new algorithm for inferring the state of hidden spins and reconstructing the connections in a synchronous kinetic Ising model, given the observed history. Focusing on the case in which the hidden spins are conditionally independent of each other given the state of observable spins, we show that calculating the likelihood of the data can be simplified by introducing a set of replicated auxiliary spins. Belief propagation (BP) and susceptibility propagation (SusP) can then be used to infer the states of hidden variables and to learn the couplings. We study the convergence and performance of this algorithm for networks with both Gaussian-distributed and binary bonds. We also study how the algorithm behaves as the fraction of hidden nodes and the amount of data are changed, showing that it outperforms the Thouless–Anderson–Palmer (TAP) equations for reconstructing the connections. (paper)

  16. Measure of Node Similarity in Multilayer Networks

    DEFF Research Database (Denmark)

    Møllgaard, Anders; Zettler, Ingo; Dammeyer, Jesper

    2016-01-01

    university.Our analysis is based on data obtained using smartphones equipped with customdata collection software, complemented by questionnaire-based data. The networkof social contacts is represented as a weighted multilayer network constructedfrom different channels of telecommunication as well as data...... might bepresent in one layer of the multilayer network and simultaneously be absent inthe other layers. For a variable such as gender, our measure reveals atransition from similarity between nodes connected with links of relatively lowweight to dis-similarity for the nodes connected by the strongest...

  17. Hidden ion population: Revisited

    International Nuclear Information System (INIS)

    Olsen, R.C.; Chappell, C.R.; Gallagher, D.L.; Green, J.L.; Gurnett, D.A.

    1985-01-01

    Satellite potentials in the outer plasmasphere range from near zero to +5 to +10 V. Under such conditions ion measurements may not include the low energy core of the plasma population. In eclipse, the photoelectron current drops to zero, and the spacecraft potential can drop to near zero volts. In regions where the ambient plasma density is below 100 cm -3 , previously unobserved portions of the ambient plasma distribution function can become visible in eclipse. A survey of the data obtained from the retarding ion mass spectrometer (RIMS) on Dynamics Explorer 1 shows that the RIMS detector generally measured the isotropic background in both sunlight and eclipse in the plasma-sphere. Absolute density measurements for the ''hidden'' ion population are obtained for the first time using the plasma wave instrument observations of the upper hybrid resonance. Agreement in total density is found in sunlight and eclipse measurements at densities above 80 cm -3 . In eclipse, agreement is found at densities as low as 20 cm -3 . The isotropic plasma composition is primarily H + , with approx.10% He + , and 0.1 to 1.0% O + . A low energy field-aligned ion population appears in eclipse measurements outside the plasmasphere, which is obscured in sunlight. These field-aligned ions can be interpreted as field-aligned flows with densities of a few particles per cubic centimeter, flowing at 5-20 km/s. The problem in measuring these field-aligned flows in sunlight is the masking of the high energy tail of the field-aligned distribution by the isotropic background. Effective measurement of the core of the magnetospheric plasma distribution awaits satellites with active means of controlling the satellite potential

  18. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  19. Deploying Node.js

    CERN Document Server

    Pasquali, Sandro

    2015-01-01

    If you are an intermediate or advanced developer deploying your Node.js applications, then this book is for you. If you have already built a Node application or module and want to take your knowledge to the next level, this book will help you find your way.

  20. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  1. Hidden photons in connection to dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah; Ringwald, Andreas; Goodsell, Mark D.

    2013-06-01

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  2. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  3. Measure of Node Similarity in Multilayer Networks

    DEFF Research Database (Denmark)

    Møllgaard, Anders; Zettler, Ingo; Dammeyer, Jesper

    2016-01-01

    The weight of links in a network is often related to the similarity of thenodes. Here, we introduce a simple tunable measure for analysing the similarityof nodes across different link weights. In particular, we use the measure toanalyze homophily in a group of 659 freshman students at a large...... university.Our analysis is based on data obtained using smartphones equipped with customdata collection software, complemented by questionnaire-based data. The networkof social contacts is represented as a weighted multilayer network constructedfrom different channels of telecommunication as well as data...... might bepresent in one layer of the multilayer network and simultaneously be absent inthe other layers. For a variable such as gender, our measure reveals atransition from similarity between nodes connected with links of relatively lowweight to dis-similarity for the nodes connected by the strongest...

  4. Optimal random search for a single hidden target.

    Science.gov (United States)

    Snider, Joseph

    2011-01-01

    A single target is hidden at a location chosen from a predetermined probability distribution. Then, a searcher must find a second probability distribution from which random search points are sampled such that the target is found in the minimum number of trials. Here it will be shown that if the searcher must get very close to the target to find it, then the best search distribution is proportional to the square root of the target distribution regardless of dimension. For a Gaussian target distribution, the optimum search distribution is approximately a Gaussian with a standard deviation that varies inversely with how close the searcher must be to the target to find it. For a network where the searcher randomly samples nodes and looks for the fixed target along edges, the optimum is either to sample a node with probability proportional to the square root of the out-degree plus 1 or not to do so at all.

  5. Detecting hidden particles with MATHUSLA

    Science.gov (United States)

    Evans, Jared A.

    2018-03-01

    A hidden sector containing light long-lived particles provides a well-motivated place to find new physics. The recently proposed MATHUSLA experiment has the potential to be extremely sensitive to light particles originating from rare meson decays in the very long lifetime region. In this work, we illustrate this strength with the specific example of a light scalar mixed with the standard model-like Higgs boson, a model where MATHUSLA can further probe unexplored parameter space from exotic Higgs decays. Design augmentations should be considered in order to maximize the ability of MATHUSLA to discover very light hidden sector particles.

  6. Hidden Crises and Communication: An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  7. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  8. Entry deterrence and hidden competition

    NARCIS (Netherlands)

    Lavrutich, Maria; Huisman, Kuno; Kort, Peter

    This paper studies strategic investment behavior of firms facing an uncertain demand in a duopoly setting. Firms choose both investment timing and the capacity level while facing additional uncertainty about market participants, which is introduced via the concept of hidden competition. We focus on

  9. Adaptive Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rasmussen, Tage

    1996-01-01

    Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding....

  10. The Hidden Dimensions of Databases.

    Science.gov (United States)

    Jacso, Peter

    1994-01-01

    Discusses methods of evaluating commercial online databases and provides examples that illustrate their hidden dimensions. Topics addressed include size, including the number of records or the number of titles; the number of years covered; and the frequency of updates. Comparisons of Readers' Guide Abstracts and Magazine Article Summaries are…

  11. Intelligent Mission Controller Node

    National Research Council Canada - National Science Library

    Perme, David

    2002-01-01

    The goal of the Intelligent Mission Controller Node (IMCN) project was to improve the process of translating mission taskings between real-world Command, Control, Communications, Computers, and Intelligence (C41...

  12. Lymph node culture

    Science.gov (United States)

    Culture - lymph node ... or viruses grow. This process is called a culture. Sometimes, special stains are also used to identify specific cells or microorganisms before culture results are available. If needle aspiration does not ...

  13. Mirror node correlations tuning synchronization in multiplex networks

    Science.gov (United States)

    Kumar, Anil; Baptista, Murilo S.; Zaikin, Alexey; Jalan, Sarika

    2017-12-01

    We show that the degree-degree correlations have a major impact on global synchronizability (GS) of multiplex networks, enabling the specification of synchronizability by only changing the degree-degree correlations of the mirror nodes while maintaining the connection architecture of the individual layer unaltered. If individual layers have nodes that are mildly correlated, the multiplex network is best synchronizable when the mirror degrees are strongly negatively correlated. If individual layers have nodes with strong degree-degree correlations, mild correlations among the degrees of mirror nodes are the best strategy for the optimization of GS. Global synchronization also depend on the density of connections, a phenomenon not observed in a single layer network. The results are crucial to understand, predict, and specify behavior of systems having multiple types of connections among the interacting units.

  14. Measure of Node Similarity in Multilayer Networks.

    Directory of Open Access Journals (Sweden)

    Anders Mollgaard

    Full Text Available The weight of links in a network is often related to the similarity of the nodes. Here, we introduce a simple tunable measure for analysing the similarity of nodes across different link weights. In particular, we use the measure to analyze homophily in a group of 659 freshman students at a large university. Our analysis is based on data obtained using smartphones equipped with custom data collection software, complemented by questionnaire-based data. The network of social contacts is represented as a weighted multilayer network constructed from different channels of telecommunication as well as data on face-to-face contacts. We find that even strongly connected individuals are not more similar with respect to basic personality traits than randomly chosen pairs of individuals. In contrast, several socio-demographics variables have a significant degree of similarity. We further observe that similarity might be present in one layer of the multilayer network and simultaneously be absent in the other layers. For a variable such as gender, our measure reveals a transition from similarity between nodes connected with links of relatively low weight to dis-similarity for the nodes connected by the strongest links. We finally analyze the overlap between layers in the network for different levels of acquaintanceships.

  15. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    of interfering nodes and usage of spatial reservation mechanisms. Specifically, we introduce a reserved area in order to protect the nodes involved in two-way relaying from the interference caused by neighboring nodes. We analytically derive the end-to-end rate achieved by PLNC considering the impact......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  16. Hidden supersymmetry and large N

    International Nuclear Information System (INIS)

    Alfaro, J.

    1988-01-01

    In this paper we present a new method to deal with the leading order in the large-N expansion of a quantum field theory. The method uses explicitly the hidden supersymmetry that is present in the path-integral formulation of a stochastic process. In addition to this we derive a new relation that is valid in the leading order of the large-N expansion of the hermitian-matrix model for any spacetime dimension. (orig.)

  17. Instant node package module

    CERN Document Server

    Ali, Juzer

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A practical exploration of the lifecycle of creating node modules as well as learning all of the top features that npm has to offer.Intended for readers who want to create their first node.js modules. The programming paradigm of JavaScript is not covered so a foundation in these concepts would be beneficial.

  18. Data driven CAN node reliability assessment for manufacturing system

    Science.gov (United States)

    Zhang, Leiming; Yuan, Yong; Lei, Yong

    2017-01-01

    The reliability of the Controller Area Network(CAN) is critical to the performance and safety of the system. However, direct bus-off time assessment tools are lacking in practice due to inaccessibility of the node information and the complexity of the node interactions upon errors. In order to measure the mean time to bus-off(MTTB) of all the nodes, a novel data driven node bus-off time assessment method for CAN network is proposed by directly using network error information. First, the corresponding network error event sequence for each node is constructed using multiple-layer network error information. Then, the generalized zero inflated Poisson process(GZIP) model is established for each node based on the error event sequence. Finally, the stochastic model is constructed to predict the MTTB of the node. The accelerated case studies with different error injection rates are conducted on a laboratory network to demonstrate the proposed method, where the network errors are generated by a computer controlled error injection system. Experiment results show that the MTTB of nodes predicted by the proposed method agree well with observations in the case studies. The proposed data driven node time to bus-off assessment method for CAN networks can successfully predict the MTTB of nodes by directly using network error event data.

  19. Hidden particle production at the ILC

    International Nuclear Information System (INIS)

    Fujii, Keisuke; Itoh, Hideo; Okada, Nobuchika; Hano, Hitoshi; Yoshioka, Tamaki

    2008-01-01

    In a class of new physics models, the new physics sector is completely or partly hidden, namely, a singlet under the standard model (SM) gauge group. Hidden fields included in such new physics models communicate with the standard model sector through higher-dimensional operators. If a cutoff lies in the TeV range, such hidden fields can be produced at future colliders. We consider a scalar field as an example of the hidden fields. Collider phenomenology on this hidden scalar is similar to that of the SM Higgs boson, but there are several features quite different from those of the Higgs boson. We investigate productions of the hidden scalar at the International Linear Collider (ILC) and study the feasibility of its measurements, in particular, how well the ILC distinguishes the scalar from the Higgs boson, through realistic Monte Carlo simulations.

  20. Finding Hidden Location Patterns of Two Competitive Supermarkets in Thailand

    Science.gov (United States)

    Khumsri, Jinattaporn; Fujihara, Akihiro

    There are two famous supermarkets in Thailand: Big C and Lotus. They are the highest competitive supermarkets whose hold the most market share by lots of promotions and also gather all convenience services including banking, restaurant, and others. In recent years, they gradually expand their stores and they take a similar strategy to determine where to locate a store. It is important for them to consider store allocation to obtain new customers efficiently. To consider this, we gather geographical locations of these supermarkets from Twitter using Twitter API. We gathered tweets having these supermarket names and geotags for seven months. To extract hidden location patterns from gathered data, we introduce location motif which is a directed subgraph whose edges are linked to every pair of the shortest-distance opponent node. We investigate every possible configuration of location motif when they have a small number of nodes and find that the configuration increases exponentially. We also visualize location motifs generated from gathered data on the map of Thailand and count the frequency of observed location motifs. As a result, we find that even if the possible location motifs exponentially increase as the number of nodes grows, limited location motifs can be observed. Using location motif, we successfully find an evidence of biased store allocation in reality.

  1. Storage capacity of multi-layered neural networks with binary weights

    International Nuclear Information System (INIS)

    Tarkowski, W.; Hemmen, J.L. van

    1997-01-01

    Using statistical physics methods we investigate two-layered perceptrons which consist of N binary input neurons, K hidden units and a single output node. Four basic types of such networks are considered: the so-called Committee, Parity, and AND Machines which makes a decision based on a majority, parity, and the logical AND rules, respectively (for these cases the weights that connect hidden units and output node are taken to be equal to one), and the General Machine where one allows all the synaptic couplings to vary. For these kinds of network we examine two types of architecture: fully connected and three-connected ones (with overlapping and non-overlapping receptive fields, respectively). All the above mentioned machines heave binary weights. Our basic interest is focused on the storage capabilities of such networks which realize p= αN random, unbiased dichotomies (α denotes the so-called storage ratio). The analysis is done using the annealed approximation and is valid for all values of K. The critical (maximal) storage capacity of the fully connected Committee Machine reads α c =K, while in the case of the three-structure one gets α c =1, independent of K. The results obtained for the Parity Machine are exactly the same as those for the Committee network. The optimal storage of the AND Machine depends on distribution of the outputs for the patterns. These associations are studied in detail. We have found also that the capacity of the General Machines remains the same as compared to systems with fixed weights between intermediate layer and the output node. Some of the findings (especially those concerning the storage capacity of the Parity Machine) are in a good agreement with known numerical results. (author)

  2. Hidden measurements, hidden variables and the volume representation of transition probabilities

    OpenAIRE

    Oliynyk, Todd A.

    2005-01-01

    We construct, for any finite dimension $n$, a new hidden measurement model for quantum mechanics based on representing quantum transition probabilities by the volume of regions in projective Hilbert space. For $n=2$ our model is equivalent to the Aerts sphere model and serves as a generalization of it for dimensions $n \\geq 3$. We also show how to construct a hidden variables scheme based on hidden measurements and we discuss how joint distributions arise in our hidden variables scheme and th...

  3. Dissipative hidden sector dark matter

    Science.gov (United States)

    Foot, R.; Vagnozzi, S.

    2015-01-01

    A simple way of explaining dark matter without modifying known Standard Model physics is to require the existence of a hidden (dark) sector, which interacts with the visible one predominantly via gravity. We consider a hidden sector containing two stable particles charged under an unbroken U (1 )' gauge symmetry, hence featuring dissipative interactions. The massless gauge field associated with this symmetry, the dark photon, can interact via kinetic mixing with the ordinary photon. In fact, such an interaction of strength ε ˜10-9 appears to be necessary in order to explain galactic structure. We calculate the effect of this new physics on big bang nucleosynthesis and its contribution to the relativistic energy density at hydrogen recombination. We then examine the process of dark recombination, during which neutral dark states are formed, which is important for large-scale structure formation. Galactic structure is considered next, focusing on spiral and irregular galaxies. For these galaxies we modeled the dark matter halo (at the current epoch) as a dissipative plasma of dark matter particles, where the energy lost due to dissipation is compensated by the energy produced from ordinary supernovae (the core-collapse energy is transferred to the hidden sector via kinetic mixing induced processes in the supernova core). We find that such a dynamical halo model can reproduce several observed features of disk galaxies, including the cored density profile and the Tully-Fisher relation. We also discuss how elliptical and dwarf spheroidal galaxies could fit into this picture. Finally, these analyses are combined to set bounds on the parameter space of our model, which can serve as a guideline for future experimental searches.

  4. Network structure exploration in networks with node attributes

    Science.gov (United States)

    Chen, Yi; Wang, Xiaolong; Bu, Junzhao; Tang, Buzhou; Xiang, Xin

    2016-05-01

    Complex networks provide a powerful way to represent complex systems and have been widely studied during the past several years. One of the most important tasks of network analysis is to detect structures (also called structural regularities) embedded in networks by determining group number and group partition. Most of network structure exploration models only consider network links. However, in real world networks, nodes may have attributes that are useful for network structure exploration. In this paper, we propose a novel Bayesian nonparametric (BNP) model to explore structural regularities in networks with node attributes, called Bayesian nonparametric attribute (BNPA) model. This model does not only take full advantage of both links between nodes and node attributes for group partition via shared hidden variables, but also determine group number automatically via the Bayesian nonparametric theory. Experiments conducted on a number of real and synthetic networks show that our BNPA model is able to automatically explore structural regularities in networks with node attributes and is competitive with other state-of-the-art models.

  5. Involved Node Radiation Therapy

    DEFF Research Database (Denmark)

    Maraldo, Maja V; Aznar, Marianne C; Vogelius, Ivan R

    2012-01-01

    PURPOSE: The involved node radiation therapy (INRT) strategy was introduced for patients with Hodgkin lymphoma (HL) to reduce the risk of late effects. With INRT, only the originally involved lymph nodes are irradiated. We present treatment outcome in a retrospective analysis using this strategy...... to 36 Gy). Patients attended regular follow-up visits until 5 years after therapy. RESULTS: The 4-year freedom from disease progression was 96.4% (95% confidence interval: 92.4%-100.4%), median follow-up of 50 months (range: 4-71 months). Three relapses occurred: 2 within the previous radiation field......, and 1 in a previously uninvolved region. The 4-year overall survival was 94% (95% confidence interval: 88.8%-99.1%), median follow-up of 58 months (range: 4-91 months). Early radiation therapy toxicity was limited to grade 1 (23.4%) and grade 2 (13.8%). During follow-up, 8 patients died, none from HL, 7...

  6. One node driving synchronisation

    Science.gov (United States)

    Wang, Chengwei; Grebogi, Celso; Baptista, Murilo S.

    2015-12-01

    Abrupt changes of behaviour in complex networks can be triggered by a single node. This work describes the dynamical fundamentals of how the behaviour of one node affects the whole network formed by coupled phase-oscillators with heterogeneous coupling strengths. The synchronisation of phase-oscillators is independent of the distribution of the natural frequencies, weakly depends on the network size, but highly depends on only one key oscillator whose ratio between its natural frequency in a rotating frame and its coupling strength is maximum. This result is based on a novel method to calculate the critical coupling strength with which the phase-oscillators emerge into frequency synchronisation. In addition, we put forward an analytical method to approximately calculate the phase-angles for the synchronous oscillators.

  7. Node web development

    CERN Document Server

    Herron, David

    2013-01-01

    Presented in a simple, step-by-step format, this book is an introduction to web development with Node.This book is for anybody looking for an alternative to the ""P"" languages (Perl, PHP, Python), or anyone looking for a new paradigm of server-side application development.The reader should have at least a rudimentary understanding of JavaScript and web application development.

  8. Hidden inventory and safety considerations

    International Nuclear Information System (INIS)

    Anderson, A.R.; James, R.H.; Morgan, F.

    1976-01-01

    Preliminary results are described of the evaluation of residual plutonium in a process line used for the production of experimental fast reactor fuel. Initial attention has been focussed on a selection of work boxes used for processing powders and solutions. Amounts of material measured as ''hidden inventory'' are generally less than 0.1 percent of throughput but in one box containing very complex equipment the amount was exceptionally about 0.5 percent. The total surface area of the box and the installed equipment appears to be the most significant factor in determining the amount of plutonium held-up as ''hidden inventory,'' representing an average of about 4 x 10 -4 g cm -2 . Present results are based on gamma spectrometer measurements but neutron techniques are being developed to overcome some of the inherent uncertainties in the gamma method. It is suggested that the routine use of sample plates of known surface area would be valuable in monitoring the deposition of plutonium in work boxes

  9. Hidden costs of nuclear power

    International Nuclear Information System (INIS)

    England, R.W.

    1979-01-01

    Mr. England contends that these hidden costs add up to a figure much higher than those that appear in the electric utilities' profit and loss account - costs that are borne by Federal taxpayers, by nuclear industry workers, and by all those people who must share their environment with nuclear facilities. Costs he details are additional deaths and illnesses resulting from exposure to radiation, and the use of tax dollars to clean up the lethal garbage produced by those activities. He asserts that careless handling of uranium ore and mill tailings in past years has apparently resulted in serious public health problems in those mining communities. In another example, Mr. England states that the failure to isolate uranium tailings physically from their environment has probably contributed to an acute leukemia rate in Mesa County, Colorado. He mentions much of the technology development for power reactors being done by the Federal government, not by private reactor manufacturers - thus, again, hidden costs that do not show up in electric bills of customers. The back end of the nuclear fuel cycle as a place for Federally subsidized research and development is discussed briefly. 1 figure, 2 tables

  10. Hidden imperfect synchronization of wall turbulence.

    Science.gov (United States)

    Tardu, Sedat F

    2010-03-01

    Instantaneous amplitude and phase concept emerging from analytical signal formulation is applied to the wavelet coefficients of streamwise velocity fluctuations in the buffer layer of a near wall turbulent flow. Experiments and direct numerical simulations show both the existence of long periods of inert zones wherein the local phase is constant. These regions are separated by random phase jumps. The local amplitude is globally highly intermittent, but not in the phase locked regions wherein it varies smoothly. These behaviors are reminiscent of phase synchronization phenomena observed in stochastic chaotic systems. The lengths of the constant phase inert (laminar) zones reveal a type I intermittency behavior, in concordance with saddle-node bifurcation, and the periodic orbits of saddle nature recently identified in Couette turbulence. The imperfect synchronization is related to the footprint of coherent Reynolds shear stress producing eddies convecting in the low buffer.

  11. Status of lymph node staging

    NARCIS (Netherlands)

    Nieweg, O. E.; Estourgie, S. H.; Deurloo, E. E.; Rutgers, E. J. Th; Kroon, B. B. R.

    2002-01-01

    Sentinel node biopsy has the potential to provide more accurate staging information than axillary node dissection. Given the considerable morbidity of axillary node dissection this less invasive approach is attractive. However, there are a number of issues to be resolved before the best technique of

  12. The Hidden Reason Behind Children's Misbehavior.

    Science.gov (United States)

    Nystul, Michael S.

    1986-01-01

    Discusses hidden reason theory based on the assumptions that: (1) the nature of people is positive; (2) a child's most basic psychological need is involvement; and (3) a child has four possible choices in life (good somebody, good nobody, bad somebody, or severely mentally ill.) A three step approach for implementing hidden reason theory is…

  13. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...

  14. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  15. Hidden variables and locality in quantum theory

    International Nuclear Information System (INIS)

    Shiva, Vandana.

    1978-12-01

    The status of hidden variables in quantum theory has been debated since the 1920s. The author examines the no-hidden-variable theories of von Neumann, Kochen, Specker and Bell, and finds that they all share one basic assumption: averaging over the hidden variables should reproduce the quantum mechanical probabilities. Von Neumann also makes a linearity assumption, Kochen and Specker require the preservation of certain functional relations between magnitudes, and Bell proposes a locality condition. It has been assumed that the extrastatistical requirements are needed to serve as criteria of success for the introduction of hidden variables because the statistical condition is trivially satisfied, and that Bell's result is based on a locality condition that is physically motivated. The author shows that the requirement of weak locality, which is not physically motivated, is enough to give Bell's result. The proof of Bell's inequality works equally well for any pair of commuting magnitudes satisfying a condition called the degeneracy principle. None of the no-hidden-variable proofs apply to a class of hidden variable theories that are not phase-space reconstructions of quantum mechanics. The author discusses one of these theories, the Bohm-Bub theory, and finds that hidden variable theories that re all the quantum statistics, for single and sequential measurements, must introduce a randomization process for the hidden variables after each measurement. The philosophical significance of this theory lies in the role it can play in solving the conceptual puzzles posed by quantum theory

  16. Hidden supersymmetry and Fermion number fractionalization

    International Nuclear Information System (INIS)

    Akhoury, R.

    1985-01-01

    This paper discusses how a hidden supersymmetry of the underlying field theories can be used to interpret and to calculate fermion number fractionalization in different dimensions. This is made possible by relating it to a corresponding Witten index of the hidden supersymmetry. The closely related anomalies in odd dimensions are also discussed

  17. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  18. Helioscope bounds on hidden sector photons

    International Nuclear Information System (INIS)

    Redondo, J.

    2008-01-01

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to χ -14 , depending on the hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter χ at low masses (m γ' <1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  19. Optimization of Artificial Neural Network using Evolutionary Programming for Prediction of Cascading Collapse Occurrence due to the Hidden Failure Effect

    Science.gov (United States)

    Idris, N. H.; Salim, N. A.; Othman, M. M.; Yasin, Z. M.

    2018-03-01

    This paper presents the Evolutionary Programming (EP) which proposed to optimize the training parameters for Artificial Neural Network (ANN) in predicting cascading collapse occurrence due to the effect of protection system hidden failure. The data has been collected from the probability of hidden failure model simulation from the historical data. The training parameters of multilayer-feedforward with backpropagation has been optimized with objective function to minimize the Mean Square Error (MSE). The optimal training parameters consists of the momentum rate, learning rate and number of neurons in first hidden layer and second hidden layer is selected in EP-ANN. The IEEE 14 bus system has been tested as a case study to validate the propose technique. The results show the reliable prediction of performance validated through MSE and Correlation Coefficient (R).

  20. Efficient MAC Protocol for Hybrid Wireless Network with Heterogeneous Sensor Nodes

    Directory of Open Access Journals (Sweden)

    Md. Nasre Alam

    2016-01-01

    Full Text Available Although several Directional Medium Access Control (DMAC protocols have been designed for use with homogeneous networks, it can take a substantial amount of time to change sensor nodes that are equipped with an omnidirectional antenna for sensor nodes with a directional antenna. Thus, we require a novel MAC protocol for use with an intermediate wireless network that consists of heterogeneous sensor nodes equipped with either an omnidirectional antenna or a directional antenna. The MAC protocols that have been designed for use in homogeneous networks are not suitable for use in a hybrid network due to deaf, hidden, and exposed nodes. Therefore, we propose a MAC protocol that exploits the characteristics of a directional antenna and can also work efficiently with omnidirectional nodes in a hybrid network. In order to address the deaf, hidden, and exposed node problems, we define RTS/CTS for the neighbor (RTSN/CTSN and Neighbor Information (NIP packets. The performance of the proposed MAC protocol is evaluated through a numerical analysis using a Markov model. In addition, the analytical results of the MAC protocol are verified through an OPNET simulation.

  1. Identifying hidden voice and video streams

    Science.gov (United States)

    Fan, Jieyan; Wu, Dapeng; Nucci, Antonio; Keralapura, Ram; Gao, Lixin

    2009-04-01

    Given the rising popularity of voice and video services over the Internet, accurately identifying voice and video traffic that traverse their networks has become a critical task for Internet service providers (ISPs). As the number of proprietary applications that deliver voice and video services to end users increases over time, the search for the one methodology that can accurately detect such services while being application independent still remains open. This problem becomes even more complicated when voice and video service providers like Skype, Microsoft, and Google bundle their voice and video services with other services like file transfer and chat. For example, a bundled Skype session can contain both voice stream and file transfer stream in the same layer-3/layer-4 flow. In this context, traditional techniques to identify voice and video streams do not work. In this paper, we propose a novel self-learning classifier, called VVS-I , that detects the presence of voice and video streams in flows with minimum manual intervention. Our classifier works in two phases: training phase and detection phase. In the training phase, VVS-I first extracts the relevant features, and subsequently constructs a fingerprint of a flow using the power spectral density (PSD) analysis. In the detection phase, it compares the fingerprint of a flow to the existing fingerprints learned during the training phase, and subsequently classifies the flow. Our classifier is not only capable of detecting voice and video streams that are hidden in different flows, but is also capable of detecting different applications (like Skype, MSN, etc.) that generate these voice/video streams. We show that our classifier can achieve close to 100% detection rate while keeping the false positive rate to less that 1%.

  2. Identifying key nodes in multilayer networks based on tensor decomposition.

    Science.gov (United States)

    Wang, Dingjie; Wang, Haitao; Zou, Xiufen

    2017-06-01

    The identification of essential agents in multilayer networks characterized by different types of interactions is a crucial and challenging topic, one that is essential for understanding the topological structure and dynamic processes of multilayer networks. In this paper, we use the fourth-order tensor to represent multilayer networks and propose a novel method to identify essential nodes based on CANDECOMP/PARAFAC (CP) tensor decomposition, referred to as the EDCPTD centrality. This method is based on the perspective of multilayer networked structures, which integrate the information of edges among nodes and links between different layers to quantify the importance of nodes in multilayer networks. Three real-world multilayer biological networks are used to evaluate the performance of the EDCPTD centrality. The bar chart and ROC curves of these multilayer networks indicate that the proposed approach is a good alternative index to identify real important nodes. Meanwhile, by comparing the behavior of both the proposed method and the aggregated single-layer methods, we demonstrate that neglecting the multiple relationships between nodes may lead to incorrect identification of the most versatile nodes. Furthermore, the Gene Ontology functional annotation demonstrates that the identified top nodes based on the proposed approach play a significant role in many vital biological processes. Finally, we have implemented many centrality methods of multilayer networks (including our method and the published methods) and created a visual software based on the MATLAB GUI, called ENMNFinder, which can be used by other researchers.

  3. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were...... available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...

  4. Hidden Valley Search at ATLAS

    CERN Document Server

    Verducci, M

    2011-01-01

    A number of extensions of the Standard Model result in neutral and weakly-coupled particles that decay to multi hadrons or multi leptons with macroscopic decay lengths. These particles with decay paths that can be comparable with ATLAS detector dimensions represent, from an experimental point of view, a challenge both for the trigger and for the reconstruction capabilities of the ATLAS detector. We will present a set of signature driven triggers for the ATLAS detector that target such displaced decays and evaluate their performances for some benchmark models and describe analysis strategies and limits on the production of such long-lived particles. A first estimation of the Hidden Valley trigger rates has been evaluated with 6 pb-1 of data collected at ATLAS during the data taking of 2010.

  5. Revisiting of Channel Access Mechanisms in Mobile Wireless Networks through Exploiting Physical Layer Technologies

    Directory of Open Access Journals (Sweden)

    Junmei Yao

    2018-01-01

    Full Text Available The wireless local area networks (WLANs have been widely deployed with the rapid development of mobile devices and have further been brought into new applications with infrastructure mobility due to the growth of unmanned aerial vehicles (UAVs. However, the WLANs still face persistent challenge on increasing the network throughput to meet the customer’s requirement and fight against the node mobility. Interference is a well-known issue that would degrade the network performance due to the broadcast characteristics of the wireless signals. Moreover, with infrastructure mobility, the interference becomes the key obstacle in pursuing the channel capacity. Legacy interference management mechanism through the channel access control in the MAC layer design of the 802.11 standard has some well-known drawbacks, such as exposed and hidden terminal problems, inefficient rate adaptation, and retransmission schemes, making the efficient interference management an everlasting research topic over the years. Recently, interference management through exploiting physical layer mechanisms has attracted much research interest and has been proven to be a promising way to improve the network throughput, especially under the infrastructure mobility scenarios which provides more indicators for node dynamics. In this paper, we introduce a series of representative physical layer techniques and analyze how they are exploited for interference management to improve the network performance. We also provide some discussions about the research challenges and give potential future research topics in this area.

  6. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  7. A classification of hidden-variable properties

    International Nuclear Information System (INIS)

    Brandenburger, Adam; Yanofsky, Noson

    2008-01-01

    Hidden variables are extra components added to try to banish counterintuitive features of quantum mechanics. We start with a quantum-mechanical model and describe various properties that can be asked of a hidden-variable model. We present six such properties and a Venn diagram of how they are related. With two existence theorems and three no-go theorems (EPR, Bell and Kochen-Specker), we show which properties of empirically equivalent hidden-variable models are possible and which are not. Formally, our treatment relies only on classical probability models, and physical phenomena are used only to motivate which models to choose

  8. A chaotic system with a single unstable node

    Energy Technology Data Exchange (ETDEWEB)

    Sprott, J.C. [Department of Physics, University of Wisconsin, Madison, WI 53706 (United States); Jafari, Sajad, E-mail: sajadjafari@aut.ac.ir [Biomedical Engineering Department, Amirkabir University of Technology, Tehran 15875-4413 (Iran, Islamic Republic of); Pham, Viet-Thanh [School of Electronics and Telecommunications, Hanoi University of Science and Technology, 01 Dai Co Viet, Hanoi (Viet Nam); Hosseini, Zahra Sadat [Biomedical Engineering Department, Amirkabir University of Technology, Tehran 15875-4413 (Iran, Islamic Republic of)

    2015-09-25

    This paper describes an unusual example of a three-dimensional dissipative chaotic flow with quadratic nonlinearities in which the only equilibrium is an unstable node. The region of parameter space with bounded solutions is relatively small as is the basin of attraction, which accounts for the difficulty of its discovery. Furthermore, for some values of the parameters, the system has an attracting torus, which is uncommon in three-dimensional systems, and this torus can coexist with a strange attractor or with a limit cycle. The limit cycle and strange attractor exhibit symmetry breaking and attractor merging. All the attractors appear to be hidden in that they cannot be found by starting with initial conditions in the vicinity of the equilibrium, and thus they represent a new type of hidden attractor with important and potentially problematic engineering consequences. - Highlights: • An unusual example of a three-dimensional dissipative chaotic flow is introduced. • In this system the only equilibrium is an unstable node. • For some values of the parameters, the system has an attracting torus. • This torus can coexist with a strange attractor or with a limit cycle. • These properties are uncommon in three-dimensional systems.

  9. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  10. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  11. Hidden costs, value lost: uninsurance in America

    National Research Council Canada - National Science Library

    Committee on the Consequences of Uninsurance

    2003-01-01

    Hidden Cost, Value Lost , the fifth of a series of six books on the consequences of uninsurance in the United States, illustrates some of the economic and social losses to the country of maintaining...

  12. The hidden epidemic: confronting sexually transmitted diseases

    National Research Council Canada - National Science Library

    Eng, Thomas R; Butler, William T

    .... In addition, STDs increase the risk of HIV transmission. The Hidden Epidemic examines the scope of sexually transmitted infections in the United States and provides a critical assessment of the nation's response to this public health crisis...

  13. Perspective: Disclosing hidden sources of funding.

    Science.gov (United States)

    Resnik, David B

    2009-09-01

    In this article, the author discusses ethical and policy issues related to the disclosure of hidden sources of funding in research. The author argues that authors have an ethical obligation to disclose hidden sources of funding and that journals should adopt policies to enforce this obligation. Journal policies should require disclosure of hidden sources of funding that authors know about and that have a direct relation to their research. To stimulate this discussion, the author describes a recent case: investigators who conducted a lung cancer screening study had received funding from a private foundation that was supported by a tobacco company, but they did not disclose this relationship to the journal. Investigators and journal editors must be prepared to deal with these issues in a manner that promotes honesty, transparency, fairness, and accountability in research. The development of well-defined, reasonable policies pertaining to hidden sources of funding can be a step in this direction.

  14. Petro Rents, Political Institutions, and Hidden Wealth

    DEFF Research Database (Denmark)

    Andersen, Jørgen Juel; Johannesen, Niels; Lassen, David Dreyer

    2017-01-01

    Do political institutions limit rent seeking by politicians? We study the transformation of petroleum rents, almost universally under direct government control, into hidden wealth using unique data on bank deposits in offshore financial centers that specialize in secrecy and asset protection. Our...... rulers is diverted to secret accounts. We find very limited evidence that shocks to other types of income not directly controlled by governments affect hidden wealth....

  15. Hidden charm molecules in a finite volume

    International Nuclear Information System (INIS)

    Albaladejo, M.; Hidalgo-Duque, C.; Nieves, J.; Oset, E.

    2014-01-01

    In the present paper we address the interaction of charmed mesons in hidden charm channels in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and several methods for the analysis of these levels ("inverse problem") are investigated. (author)

  16. Sentinel nodes outside lymph node basins in patients with melanoma

    NARCIS (Netherlands)

    Roozendaal, GK; de Vries, JDH; van Poll, D; Jansen, L; Nieweg, OE; Kroon, BBR; Schraffordt Koops, H.

    Background: Lymphoscintigraphy occasionally reveals hot spots outside lymph node basins in patients with melanoma. The aim of this study was to evaluate such abnormally located hot spots. Methods: Sentinel node biopsy was studied prospectively in 379 patients with clinically localized cutaneous

  17. Workplace ageism: discovering hidden bias.

    Science.gov (United States)

    Malinen, Sanna; Johnston, Lucy

    2013-01-01

    BACKGROUND/STUDY CONTEXT: Research largely shows no performance differences between older and younger employees, or that older workers even outperform younger employees, yet negative attitudes towards older workers can underpin discrimination. Unfortunately, traditional "explicit" techniques for assessing attitudes (i.e., self-report measures) have serious drawbacks. Therefore, using an approach that is novel to organizational contexts, the authors supplemented explicit with implicit (indirect) measures of attitudes towards older workers, and examined the malleability of both. This research consists of two studies. The authors measured self-report (explicit) attitudes towards older and younger workers with a survey, and implicit attitudes with a reaction-time-based measure of implicit associations. In addition, to test whether attitudes were malleable, the authors measured attitudes before and after a mental imagery intervention, where the authors asked participants in the experimental group to imagine respected and valued older workers from their surroundings. Negative, stable implicit attitudes towards older workers emerged in two studies. Conversely, explicit attitudes showed no age bias and were more susceptible to change intervention, such that attitudes became more positive towards older workers following the experimental manipulation. This research demonstrates the unconscious nature of bias against older workers, and highlights the utility of implicit attitude measures in the context of the workplace. In the current era of aging workforce and skill shortages, implicit measures may be necessary to illuminate hidden workplace ageism.

  18. Hidden slow pulsars in binaries

    Science.gov (United States)

    Tavani, Marco; Brookshaw, Leigh

    1993-01-01

    The recent discovery of the binary containing the slow pulsar PSR 1718-19 orbiting around a low-mass companion star adds new light on the characteristics of binary pulsars. The properties of the radio eclipses of PSR 1718-19 are the most striking observational characteristics of this system. The surface of the companion star produces a mass outflow which leaves only a small 'window' in orbital phase for the detection of PSR 1718-19 around 400 MHz. At this observing frequency, PSR 1718-19 is clearly observable only for about 1 hr out of the total 6.2 hr orbital period. The aim of this Letter is twofold: (1) to model the hydrodynamical behavior of the eclipsing material from the companion star of PSR 1718-19 and (2) to argue that a population of binary slow pulsars might have escaped detection in pulsar surveys carried out at 400 MHz. The possible existence of a population of partially or totally hidden slow pulsars in binaries will have a strong impact on current theories of binary evolution of neutron stars.

  19. Inferring hidden causal relations between pathway members using reduced Google matrix of directed biological networks

    Science.gov (United States)

    2018-01-01

    Signaling pathways represent parts of the global biological molecular network which connects them into a seamless whole through complex direct and indirect (hidden) crosstalk whose structure can change during development or in pathological conditions. We suggest a novel methodology, called Googlomics, for the structural analysis of directed biological networks using spectral analysis of their Google matrices, using parallels with quantum scattering theory, developed for nuclear and mesoscopic physics and quantum chaos. We introduce analytical “reduced Google matrix” method for the analysis of biological network structure. The method allows inferring hidden causal relations between the members of a signaling pathway or a functionally related group of genes. We investigate how the structure of hidden causal relations can be reprogrammed as a result of changes in the transcriptional network layer during cancerogenesis. The suggested Googlomics approach rigorously characterizes complex systemic changes in the wiring of large causal biological networks in a computationally efficient way. PMID:29370181

  20. NRC/UBC Node

    Energy Technology Data Exchange (ETDEWEB)

    Ellis-Perry, B. [Univ. of British Columbia, Vancouver, British Columbia (Canada); Yogendran, Y. [NRC Inst. for Fuel Cell Innovation, Vancouver, British Columbia (Canada)

    2004-07-01

    'Full text:' In the search for cleaner, more sustainable energy sources, many of the most promising breakthroughs have been in hydrogen technology. However, this promise will remain unfulfilled without public interest and enthusiasm, and without the infrastructure to support the technology. In order to get there, we have to test, perfect, and demonstrate technology that is safe and affordable, and we must do so in practical, familiar settings. Ideally, such settings should be easily accessible to the engineers, planners, and architects of tomorrow while providing a showcase for hydrogen technology that will attract the general public. This place is the NRC/UBC Hydrogen Node. The UBC campus in Point Grey is home to leading edge, internationally recognized researchers in a range of disciplines, both within the University and at the NRC Institute for Fuel Cell Innovation. On average, 40,000 students, faculty, and staff use the campus every day; UBC graduates go on to leadership positions in communities around the globe. Its spectacular setting makes UBC a popular destination for thousands of visitors from around the world. In 2006 UBC will host the World Urban Forum, and in 2010 it will be one of the sites for the Vancouver-Whistler Olympic Games. UBC and its South Campus neighbourhoods are developing as a model sustainable community, offering an excellent opportunity to develop and showcase hydrogen infrastructure and technology in a real-life, attractive setting that will be seen by thousands of people around the world. UBC's facilities, location, and Trek 2010 commitment to excellence in learning, research, and sustainability make it an ideal location for such a project. The H2 Village at UBC will be an integrated hydrogen demonstration project, linked to the hydrogen highway. This project is bringing together leading companies, researchers, and government agencies committed to making the refinement and early adoption of safe hydrogen technology a

  1. NRC/UBC Node

    International Nuclear Information System (INIS)

    Ellis-Perry, B.; Yogendran, Y.

    2004-01-01

    'Full text:' In the search for cleaner, more sustainable energy sources, many of the most promising breakthroughs have been in hydrogen technology. However, this promise will remain unfulfilled without public interest and enthusiasm, and without the infrastructure to support the technology. In order to get there, we have to test, perfect, and demonstrate technology that is safe and affordable, and we must do so in practical, familiar settings. Ideally, such settings should be easily accessible to the engineers, planners, and architects of tomorrow while providing a showcase for hydrogen technology that will attract the general public. This place is the NRC/UBC Hydrogen Node. The UBC campus in Point Grey is home to leading edge, internationally recognized researchers in a range of disciplines, both within the University and at the NRC Institute for Fuel Cell Innovation. On average, 40,000 students, faculty, and staff use the campus every day; UBC graduates go on to leadership positions in communities around the globe. Its spectacular setting makes UBC a popular destination for thousands of visitors from around the world. In 2006 UBC will host the World Urban Forum, and in 2010 it will be one of the sites for the Vancouver-Whistler Olympic Games. UBC and its South Campus neighbourhoods are developing as a model sustainable community, offering an excellent opportunity to develop and showcase hydrogen infrastructure and technology in a real-life, attractive setting that will be seen by thousands of people around the world. UBC's facilities, location, and Trek 2010 commitment to excellence in learning, research, and sustainability make it an ideal location for such a project. The H2 Village at UBC will be an integrated hydrogen demonstration project, linked to the hydrogen highway. This project is bringing together leading companies, researchers, and government agencies committed to making the refinement and early adoption of safe hydrogen technology a reality

  2. Counterpart synchronization of duplex networks with delayed nodes and noise perturbation

    International Nuclear Information System (INIS)

    Wei, Xiang; Wu, Xiaoqun; Lu, Jun-an; Zhao, Junchan

    2015-01-01

    In the real world, many complex systems are represented not by single networks but rather by sets of interdependent ones. In these specific networks, nodes in one network mutually interact with nodes in other networks. This paper focuses on a simple representative case of two-layer networks (the so-called duplex networks) with unidirectional inter-layer couplings. That is, each node in one network depends on a counterpart in the other network. Accordingly, the former network is called the response layer and the latter network is the drive layer. Specifically, synchronization between each node in the drive layer and its counterpart in the response layer (counterpart synchronization (CS)) in these kinds of duplex networks with delayed nodes and noise perturbation is investigated. Based on the LaSalle-type invariance principle, a control technique is proposed and a sufficient condition is developed for realizing CS of duplex networks. Furthermore, two corollaries are derived as special cases. In addition, node dynamics within each layer can be varied and topologies of the two layers are not necessarily identical. Therefore, the proposed synchronization method can be applied to a wide range of multiplex networks. Numerical examples are provided to illustrate the feasibility and effectiveness of the results. (paper)

  3. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, M.

    2008-07-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  4. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, Markus; Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the standard model Higgs via a renormalizable quartic term - sometimes called the Higgs portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs, we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone.

  5. Drawing non-layered tidy trees in linear time

    NARCIS (Netherlands)

    A.J. van der Ploeg (Atze)

    2013-01-01

    htmlabstractThe well-known Reingold–Tilford algorithm produces tidy-layered drawings of trees: drawings where all nodes at the same depth are vertically aligned. However, when nodes have varying heights, layered drawing may use more vertical space than necessary. A non-layered drawing of a tree

  6. Energy Efficient Routing and Node Activity Scheduling in the OCARI Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Saoucene Mahfoudh

    2010-08-01

    Full Text Available Sensor nodes are characterized by a small size, a low cost, an advanced communication technology, but also a limited amount of energy. Energy efficient strategies are required in such networks to maximize network lifetime. In this paper, we focus on a solution integrating energy efficient routing and node activity scheduling. The energy efficient routing we propose, called EOLSR, selects the route and minimizes the energy consumed by an end-to-end transmission, while avoiding nodes with low residual energy. Simulation results show that EOLSR outperforms the solution selecting the route of minimum energy as well as the solution based on node residual energy. Cross-layering allows EOLSR to use information from the application layer or the MAC layer to reduce its overhead and increase network lifetime. Node activity scheduling is based on the following observation: the sleep state is the least power consuming state. So, to schedule node active and sleeping periods, we propose SERENA that colors all network nodes using a small number of colors, such that two nodes with the same color can transmit without interfering. The node color is mapped into a time slot during which the node can transmit. Consequently, each node is awake during its slot and the slots of its one-hop neighbors, and sleeps in the remaining time. We evaluate SERENA benefits obtained in terms of bandwidth, delay and energy. We also show how cross-layering with the application layer can improve the end-to-end delays for data gathering applications.

  7. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  8. Geometric phases and hidden local gauge symmetry

    International Nuclear Information System (INIS)

    Fujikawa, Kazuo

    2005-01-01

    The analysis of geometric phases associated with level crossing is reduced to the familiar diagonalization of the Hamiltonian in the second quantized formulation. A hidden local gauge symmetry, which is associated with the arbitrariness of the phase choice of a complete orthonormal basis set, becomes explicit in this formulation (in particular, in the adiabatic approximation) and specifies physical observables. The choice of a basis set which specifies the coordinate in the functional space is arbitrary in the second quantization, and a subclass of coordinate transformations, which keeps the form of the action invariant, is recognized as the gauge symmetry. We discuss the implications of this hidden local gauge symmetry in detail by analyzing geometric phases for cyclic and noncyclic evolutions. It is shown that the hidden local symmetry provides a basic concept alternative to the notion of holonomy to analyze geometric phases and that the analysis based on the hidden local gauge symmetry leads to results consistent with the general prescription of Pancharatnam. We however note an important difference between the geometric phases for cyclic and noncyclic evolutions. We also explain a basic difference between our hidden local gauge symmetry and a gauge symmetry (or equivalence class) used by Aharonov and Anandan in their definition of generalized geometric phases

  9. Sentinel lymph node detection with Tc-99m tin colloids in patients with esophagogastric cancer

    International Nuclear Information System (INIS)

    Yasuda, Seiei; Shimada, Hideo; Chino, Osamu

    2003-01-01

    The aim of this study was to determine by radioisotope use whether the sentinel lymph node concept is applicable to esophagogastric cancers. In addition, we examined radioactivities of hot nodes and compared them with the sensitivity of a gamma probe. The subjects were 44 patients, 23 with esophageal cancer and 21 with gastric cancer. The day before surgery, patients underwent endoscopic submucosal injection of 184 MBq of Tc-99m tin colloids into sites surrounding the tumor. Radioisotope activities of lymph nodes dissected at surgery were measured with a well-typed gamma detector and each lymph node was categorized as a hot or cold node. Histopathology of the lymph nodes was examined by hematoxylin and eosin staining. Radioisotope activities and histopathological results were compared to determine whether radioisotope flow reflects lymphatic flow to regional lymph nodes. The sensitivity of a gamma probe was measured in a laboratory study and the relation between the radioisotope activities of hot nodes and the detection sensitivity of the gamma probe was examined. Histopathological examination revealed lymph node metastasis in 18 of the 44 patients. In 15 of these 18 patients, metastatic foci were recognized in at least one hot node. Subsequent analysis was performed on the 36 patients in whom tumor invasion was confined to the muscle layer and in whom endoscopic clippings had not been applied. Lymph node metastases were observed in 12 of these 36 patients. In these 12 patients, at least one hot node was positive for metastasis. The laboratory study revealed that the gamma probe was able to detect radioisotope activities of ≥0.02μCi. Thirty-two of 63 (51%) esophageal cancer hot nodes and 16 of 86 (19%) gastric cancer hot nodes showed radioisotope activities below the detection sensitivity of the gamma probe. The sentinel lymph node concept is applicable to patients with esophageal and gastric cancers; however, further studies are necessary to identify hot nodes

  10. Massive hidden photons as lukewarm dark matter

    International Nuclear Information System (INIS)

    Redondo, Javier; Postma, Marieke

    2008-11-01

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  11. Massive hidden photons as lukewarm dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Postma, Marieke [Nationaal Inst. voor Kernfysica en Hoge-Energiefysica (NIKHEF), Amsterdam (Netherlands)

    2008-11-15

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  12. Religious Tolerance in the Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Kevin Nobel Kurniawan

    2018-03-01

    Full Text Available Religious intolerance is spreading within the Indonesian institution of education. Previous studies have shown that the growth of intolerance is due to the state’s regulation and pedagogical apparatus. In contrast to the previous studies, I argue that the intolerance is related to hidden curriculum applied by the institution of education.  Normatively, the hidden curriculum contains the value of religious tolerance. However, factually, the author found that there are practices of intolerance, through the formal and informal spheres in the school’s structure, within the hidden curriculum. This article applies a qualitative approach with a mixed method research strategy to analyze data collected from students, teachers, and alumnis through field observation, in-depth interview, and survey.

  13. Hidden treasures - 50 km points of interests

    Science.gov (United States)

    Lommi, Matias; Kortelainen, Jaana

    2015-04-01

    Tampere is third largest city in Finland and a regional centre. During 70's there occurred several communal mergers. Nowadays this local area has both strong and diversed identity - from wilderness and agricultural fields to high density city living. Outside the city center there are interesting geological points unknown for modern city settlers. There is even a local proverb, "Go abroad to Teisko!". That is the area the Hidden Treasures -student project is focused on. Our school Tammerkoski Upper Secondary School (or Gymnasium) has emphasis on visual arts. We are going to offer our art students scientific and artistic experiences and knowledge about the hidden treasures of Teisko area and involve the Teisko inhabitants into this project. Hidden treasures - Precambrian subduction zone and a volcanism belt with dense bed of gold (Au) and arsenic (As), operating goldmines and quarries of minerals and metamorphic slates. - North of subduction zone a homogenic precambrian magmastone area with quarries, products known as Kuru Grey. - Former ashores of post-glasial Lake Näsijärvi and it's sediments enabled the developing agriculture and sustained settlement. Nowadays these ashores have both scenery and biodiversity values. - Old cattle sheds and dairy buildings made of local granite stones related to cultural stonebuilding inheritance. - Local active community of Kapee, about 100 inhabitants. Students will discover information of these "hidden" phenomena, and rendering this information trough Enviromental Art Method. Final form of this project will be published in several artistic and informative geocaches. These caches are achieved by a GPS-based special Hidden Treasures Cycling Route and by a website guiding people to find these hidden points of interests.

  14. The origin of the hidden supersymmetry

    International Nuclear Information System (INIS)

    Jakubsky, Vit; Nieto, Luis-Miguel; Plyushchay, Mikhail S.

    2010-01-01

    The hidden supersymmetry and related tri-supersymmetric structure of the free particle system, the Dirac delta potential problem and the Aharonov-Bohm effect (planar, bound state, and tubule models) are explained by a special nonlocal unitary transformation, which for the usual N=2 supercharges has a nature of Foldy-Wouthuysen transformation. We show that in general case, the bosonized supersymmetry of nonlocal, parity even systems emerges in the same construction, and explain the origin of the unusual N=2 supersymmetry of electron in three-dimensional parity even magnetic field. The observation extends to include the hidden superconformal symmetry.

  15. Signatures of a hidden cosmic microwave background.

    Science.gov (United States)

    Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-09-26

    If there is a light Abelian gauge boson gamma' in the hidden sector its kinetic mixing with the photon can produce a hidden cosmic microwave background (HCMB). For meV masses, resonant oscillations gammagamma' happen after big bang nucleosynthesis (BBN) but before CMB decoupling, increasing the effective number of neutrinos Nnu(eff) and the baryon to photon ratio, and distorting the CMB blackbody spectrum. The agreement between BBN and CMB data provides new constraints. However, including Lyman-alpha data, Nnu(eff) > 3 is preferred. It is tempting to attribute this effect to the HCMB. The interesting parameter range will be tested in upcoming laboratory experiments.

  16. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  17. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2016-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  18. Generalization and capacity of extensively large two-layered perceptrons

    International Nuclear Information System (INIS)

    Rosen-Zvi, Michal; Kanter, Ido; Engel, Andreas

    2002-01-01

    The generalization ability and storage capacity of a treelike two-layered neural network with a number of hidden units scaling as the input dimension is examined. The mapping from the input to the hidden layer is via Boolean functions; the mapping from the hidden layer to the output is done by a perceptron. The analysis is within the replica framework where an order parameter characterizing the overlap between two networks in the combined space of Boolean functions and hidden-to-output couplings is introduced. The maximal capacity of such networks is found to scale linearly with the logarithm of the number of Boolean functions per hidden unit. The generalization process exhibits a first-order phase transition from poor to perfect learning for the case of discrete hidden-to-output couplings. The critical number of examples per input dimension, α c , at which the transition occurs, again scales linearly with the logarithm of the number of Boolean functions. In the case of continuous hidden-to-output couplings, the generalization error decreases according to the same power law as for the perceptron, with the prefactor being different

  19. Compressing the hidden variable space of a qubit

    OpenAIRE

    Montina, Alberto

    2010-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of a single realization is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with the quantum states satisfy reasonable criteria ...

  20. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover com...

  1. The Hidden Cost of Buying a Computer.

    Science.gov (United States)

    Johnson, Michael

    1983-01-01

    In order to process data in a computer, application software must be either developed or purchased. Costs for modifications of the software package and maintenance are often hidden. The decision to buy or develop software packages should be based upon factors of time and maintenance. (MLF)

  2. Hidden symmetries in five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, M.

    2003-05-01

    This thesis is concerned with the study of hidden symmetries in supergravity, which play an important role in the present picture of supergravity and string theory. Concretely, the appearance of a hidden G 2(+2) /SO(4) symmetry is studied in the dimensional reduction of d=5, N=2 supergravity to three dimensions - a parallel model to the more famous E 8(+8) /SO(16) case in eleven-dimensional supergravity. Extending previous partial results for the bosonic part, I give a derivation that includes fermionic terms. This sheds new light on the appearance of the local hidden symmetry SO(4) in the reduction, and shows up an unusual feature which follows from an analysis of the R-symmetry associated with N=4 supergravity and of the supersymmetry variations, and which has no parallel in the eleven-dimensional case: The emergence of an additional SO(3) as part of the enhanced local symmetry, invisible in the dimensional reduction of the gravitino, and corresponding to the fact that, of the SO(4) used in the coset model, only the diagonal SO(3) is visible immediately upon dimensional reduction. The uncovering of the hidden symmetries proceeds via the construction of the proper coset gravity in three dimensions, and matching it with the Lagrangian obtained from the reduction. (orig.)

  3. Discovering hidden sectors with monophoton Z' searches

    International Nuclear Information System (INIS)

    Gershtein, Yuri; Petriello, Frank; Quackenbush, Seth; Zurek, Kathryn M.

    2008-01-01

    In many theories of physics beyond the standard model, from extra dimensions to Hidden Valleys and models of dark matter, Z ' bosons mediate between standard model particles and hidden sector states. We study the feasibility of observing such hidden states through an invisibly decaying Z ' at the LHC. We focus on the process pp→γZ ' →γXX † , where X is any neutral, (quasi-) stable particle, whether a standard model neutrino or a new state. This complements a previous study using pp→ZZ ' →l + l - XX † . Only the Z ' mass and two effective charges are needed to describe this process. If the Z ' decays invisibly only to standard model neutrinos, then these charges are predicted by observation of the Z ' through the Drell-Yan process, allowing discrimination between Z ' decays to standard model ν's and invisible decays to new states. We carefully discuss all backgrounds and systematic errors that affect this search. We find that hidden sector decays of a 1 TeV Z ' can be observed at 5σ significance with 50 fb -1 at the LHC. Observation of a 1.5 TeV state requires super-LHC statistics of 1 ab -1 . Control of the systematic errors, in particular, the parton distribution function uncertainty of the dominant Zγ background, is crucial to maximize the LHC search reach.

  4. Hidden Markov models for labeled sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1994-01-01

    A hidden Markov model for labeled observations, called a class HMM, is introduced and a maximum likelihood method is developed for estimating the parameters of the model. Instead of training it to model the statistics of the training sequences it is trained to optimize recognition. It resembles MMI...

  5. Cluster-based adaptive power control protocol using Hidden Markov Model for Wireless Sensor Networks

    Science.gov (United States)

    Vinutha, C. B.; Nalini, N.; Nagaraja, M.

    2017-06-01

    This paper presents strategies for an efficient and dynamic transmission power control technique, in order to reduce packet drop and hence energy consumption of power-hungry sensor nodes operated in highly non-linear channel conditions of Wireless Sensor Networks. Besides, we also focus to prolong network lifetime and scalability by designing cluster-based network structure. Specifically we consider weight-based clustering approach wherein, minimum significant node is chosen as Cluster Head (CH) which is computed stemmed from the factors distance, remaining residual battery power and received signal strength (RSS). Further, transmission power control schemes to fit into dynamic channel conditions are meticulously implemented using Hidden Markov Model (HMM) where probability transition matrix is formulated based on the observed RSS measurements. Typically, CH estimates initial transmission power of its cluster members (CMs) from RSS using HMM and broadcast this value to its CMs for initialising their power value. Further, if CH finds that there are variations in link quality and RSS of the CMs, it again re-computes and optimises the transmission power level of the nodes using HMM to avoid packet loss due noise interference. We have demonstrated our simulation results to prove that our technique efficiently controls the power levels of sensing nodes to save significant quantity of energy for different sized network.

  6. Intraoperative Sentinel Lymph Node Evaluation

    DEFF Research Database (Denmark)

    Shaw, Richard; Christensen, Anders; Java, Kapil

    2016-01-01

    BACKGROUND: Intraoperative analysis of sentinel lymph nodes would enhance the care of early-stage oral squamous cell carcinoma (OSCC). We determined the frequency and extent of cytokeratin 19 (CK19) expression in OSCC primary tumours and surrounding tissues to explore the feasibility of a "clinic......-ready" intraoperative diagnostic test (one step nucleic acid amplification-OSNA, sysmex). METHODS: Two cohorts were assembled: cohort 1, OSCC with stage and site that closely match cases suitable for sentinel lymph node biopsy (SLNB); cohort 2, HNSCC with sufficient fresh tumour tissue available for the OSNA assay (>50......% of tumours. Discordance between different techniques indicated that OSNA was more sensitive than qRT-PCR or RNA-ISH, which in turn were more sensitive than IHC. OSNA results showed CK19 expression in 80% of primary cases, so if used for diagnosis of lymph node metastasis would lead to a false-negative result...

  7. Methodology of sentinel node detection

    International Nuclear Information System (INIS)

    Maublant, J.

    2000-01-01

    The isotopic localisation of the sentinel node, i.e., the first functional lymph node in a tumor basin, is probably the fastest growing field ever experienced in nuclear medicine. Although based on the simple concept of the lymphatic migration of Tc-labeled colloids, the choice of the optimal technique remains controversial. We review and discuss the role of the colloids, of the site of injection, of the injected volume, of early imaging and of the colorimetric approach. Initially applied to melanoma and breast cancer, the sentinel node detection is now tested in other types of cancer such as lung, colon and prostate. It could become one of the leading tools in minimally invasive surgical oncology. The nuclear medicine physician has to remain aware of the rapid evolutions in this field in order to be able to answer to a rapidly growing demand. (author)

  8. Evaluation of CT images on metastasis to cervical lymph node in patients with oral cancer

    International Nuclear Information System (INIS)

    Fujiki, Tomokazu; Wada, Takurou; Wakasa, Toru; Yanagi, Yoshinobu; Honda, Yasutoshi; Kawai, Noriko; Kishi, Kanji

    1998-01-01

    There have been many reports about the usefulness of CT in diagnosing cervical lymph node metastasis from oral cancer. With relatively high diagnostic accuracy, various diagnostic criteria have been used. This study evaluated CT images of cervical lymph node metastasis in patients with oral cancer using these criteria. Eighty-nine cases of various oral cancers (132 lymph node groups) were evaluated regarding cervical lymph node metastasis. In patients with nodes measuring over 1 cm in minimal axial diameter, 58.1% were metastatic (metastatic/total=47/74), while 17.2% of patients with nodes measuring less than 1 cm in minimal axial diameter of lymph node were metastatic (10/58). As for other diagnostic criteria, in patients with spherical nodes, 38.7% (metastatic/total=29/75), in patients showing ring enhancement, 70.4% (19/27) and in patients with fusion, 75.0% (3/4) were metastatic. In addition, in patients with spherical nodes measuring over 1 cm in minimal axial diameter, 59.5% (22/37), in patients with nodes measuring over 1 cm in minimal axial diameter and showing ring enhancement, 78.3% (18/23), in patients with spherical nodes showing ring enhancement, 60.0% (9/15) and in patients with spherical nodes measuring over 1 cm in minimal axial diameter and showing ring enhancement, 64.3% (9/14) were metastatic. In case of disappearance of fat layer (1/1), cancer infiltration of the surrounding tissue was seen. In conclusion, over 1 cm in minimal axial diameter, spherical node and ring enhancement were found to be appropriate diagnostic criteria. Furthermore, CT is essential in diagnosing cervical lymph node metastasis from oral cancer. (author)

  9. The Power of Poincar\\'e: Elucidating the Hidden Symmetries in Focal Conic Domains

    OpenAIRE

    Alexander, Gareth P.; Chen, Bryan Gin-ge; Matsumoto, Elisabetta A.; Kamien, Randall D.

    2010-01-01

    Focal conic domains are typically the "smoking gun" by which smectic liquid crystalline phases are identified. The geometry of the equally-spaced smectic layers is highly generic but, at the same time, difficult to work with. In this Letter we develop an approach to the study of focal sets in smectics which exploits a hidden Poincar\\'e symmetry revealed only by viewing the smectic layers as projections from one-higher dimension. We use this perspective to shed light upon several classic focal...

  10. Power of the Poincaré group: elucidating the hidden symmetries in focal conic domains.

    Science.gov (United States)

    Alexander, Gareth P; Chen, Bryan Gin-Ge; Matsumoto, Elisabetta A; Kamien, Randall D

    2010-06-25

    Focal conic domains are typically the "smoking gun" by which smectic liquid crystalline phases are identified. The geometry of the equally spaced smectic layers is highly generic but, at the same time, difficult to work with. In this Letter we develop an approach to the study of focal sets in smectics which exploits a hidden Poincaré symmetry revealed only by viewing the smectic layers as projections from one-higher dimension. We use this perspective to shed light upon several classic focal conic textures, including the concentric cyclides of Dupin, polygonal textures, and tilt-grain boundaries.

  11. Power of the Poincare Group: Elucidating the Hidden Symmetries in Focal Conic Domains

    International Nuclear Information System (INIS)

    Alexander, Gareth P.; Chen, Bryan Gin-ge; Matsumoto, Elisabetta A.; Kamien, Randall D.

    2010-01-01

    Focal conic domains are typically the 'smoking gun' by which smectic liquid crystalline phases are identified. The geometry of the equally spaced smectic layers is highly generic but, at the same time, difficult to work with. In this Letter we develop an approach to the study of focal sets in smectics which exploits a hidden Poincare symmetry revealed only by viewing the smectic layers as projections from one-higher dimension. We use this perspective to shed light upon several classic focal conic textures, including the concentric cyclides of Dupin, polygonal textures, and tilt-grain boundaries.

  12. Allocating resources between network nodes for providing a network node function

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention provides a method wherein a first network node advertises available resources that a second network node may use to offload network node functions transparently to the first network node. Examples of the first network node are a client device (e.g. PC, notebook, tablet, smart phone), a

  13. Does the atrioventricular node conduct?

    NARCIS (Netherlands)

    Meijler, F.L.; Fisch, C.

    1989-01-01

    It is difficult to be certain wh en the term "conduction" was first applied to the transfer of atrial activation to the ventricles .' In 1894, Engelmann used the word "Leitung", which can be translated as "connection" or as "conduction" .2 In 1906, Tawara described the atrioventricular node,

  14. Node.js by example

    CERN Document Server

    Tsonev, Krasimir

    2015-01-01

    If you are a JavaScript developer with no experience with Node.js or server-side web development, this book is for you. It will lead you through creating a fairly complex social network. You will learn how to work with a database and create real-time communication channels.

  15. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  16. Critical nodes in signalling pathways

    DEFF Research Database (Denmark)

    Taniguchi, Cullen M; Emanuelli, Brice; Kahn, C Ronald

    2006-01-01

    Physiologically important cell-signalling networks are complex, and contain several points of regulation, signal divergence and crosstalk with other signalling cascades. Here, we use the concept of 'critical nodes' to define the important junctions in these pathways and illustrate their unique role...... using insulin signalling as a model system....

  17. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  18. Laser experiments explore the hidden sector

    International Nuclear Information System (INIS)

    Ahlers, M.

    2007-11-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses -7 times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background. (orig.)

  19. Quantum mechanics and hidden superconformal symmetry

    Science.gov (United States)

    Bonezzi, R.; Corradini, O.; Latini, E.; Waldron, A.

    2017-12-01

    Solvability of the ubiquitous quantum harmonic oscillator relies on a spectrum generating osp (1 |2 ) superconformal symmetry. We study the problem of constructing all quantum mechanical models with a hidden osp (1 |2 ) symmetry on a given space of states. This problem stems from interacting higher spin models coupled to gravity. In one dimension, we show that the solution to this problem is the Vasiliev-Plyushchay family of quantum mechanical models with hidden superconformal symmetry obtained by viewing the harmonic oscillator as a one dimensional Dirac system, so that Grassmann parity equals wave function parity. These models—both oscillator and particlelike—realize all possible unitary irreducible representations of osp (1 |2 ).

  20. Hidden Costs and the Role of Modularity

    DEFF Research Database (Denmark)

    Larsen, Marcus M.

    2013-01-01

    that the inability to effectively estimate the costs of implementing an activity in a foreign location has a negative impact on the process performance of that activity. Performance is deterred as operations are likely to be disrupted by opportunity costs and managerial responses. However, this relationship......This paper addresses estimation errors in strategic decision-making processes due to hidden costs. While previous research has investigated the antecedents of hidden costs, this paper investigates performance consequences. Using unique data on 221 offshoring implementations, it is argued...... is mitigated by the degree of modularity in the activity as it reduces the need for costly coordination in offshoring. This paper contributes to research on offshoring and strategic decision-making by emphasizing the importance of organizational design and of estimating the costs of internal organizational...

  1. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  2. Hidden neuronal correlations in cultured networks

    International Nuclear Information System (INIS)

    Segev, Ronen; Baruchi, Itay; Hulata, Eyal; Ben-Jacob, Eshel

    2004-01-01

    Utilization of a clustering algorithm on neuronal spatiotemporal correlation matrices recorded during a spontaneous activity of in vitro networks revealed the existence of hidden correlations: the sequence of synchronized bursting events (SBEs) is composed of statistically distinguishable subgroups each with its own distinct pattern of interneuron spatiotemporal correlations. These findings hint that each of the SBE subgroups can serve as a template for coding, storage, and retrieval of a specific information

  3. A masking index for quantifying hidden glitches

    OpenAIRE

    Berti-Equille, Laure; Loh, J. M.; Dasu, T.

    2015-01-01

    Data glitches are errors in a dataset. They are complex entities that often span multiple attributes and records. When they co-occur in data, the presence of one type of glitch can hinder the detection of another type of glitch. This phenomenon is called masking. In this paper, we define two important types of masking and propose a novel, statistically rigorous indicator called masking index for quantifying the hidden glitches. We outline four cases of masking: outliers masked by missing valu...

  4. Cold dark matter from the hidden sector

    International Nuclear Information System (INIS)

    Arias, Paola; Pontificia Univ. Catolica de Chile, Santiago

    2012-02-01

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  5. Completing Quantum Mechanics with Quantized Hidden Variables

    OpenAIRE

    van Enk, S. J.

    2015-01-01

    I explore the possibility that a quantum system S may be described completely by the combination of its standard quantum state $|\\psi\\rangle$ and a (hidden) quantum state $|\\phi\\rangle$ (that lives in the same Hilbert space), such that the outcome of any standard projective measurement on the system S is determined once the two quantum states are specified. I construct an algorithm that retrieves the standard quantum-mechanical probabilities, which depend only on $|\\psi\\rangle$, by assuming t...

  6. Cold dark matter from the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Arias, Paola [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Pontificia Univ. Catolica de Chile, Santiago (Chile). Facultad de Fisica

    2012-02-15

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  7. Hidden histories: challenges for pedagogy and participation

    OpenAIRE

    Morrice, Linda

    2013-01-01

    Higher Education has become and an increasingly diverse and globalised system in which the binaries between ‘traditional’ and ‘non-traditional’ students, exclusion and inclusion have less resonance and analytical purchase. Drawing on research with refugees Linda will suggest that higher education can be marked simultaneously by belonging and recognition, deficit and exclusion. Complex differences and inequalities remain hidden and unspoken, raising new questions and challenges for pedagogy an...

  8. Hidden sector behind the CKM matrix

    Science.gov (United States)

    Okawa, Shohei; Omura, Yuji

    2017-08-01

    The small quark mixing, described by the Cabibbo-Kobayashi-Maskawa (CKM) matrix in the standard model, may be a clue to reveal new physics around the TeV scale. We consider a simple scenario that extra particles in a hidden sector radiatively mediate the flavor violation to the quark sector around the TeV scale and effectively realize the observed CKM matrix. The lightest particle in the hidden sector, whose contribution to the CKM matrix is expected to be dominant, is a good dark matter (DM) candidate. There are many possible setups to describe this scenario, so that we investigate some universal predictions of this kind of model, focusing on the contribution of DM to the quark mixing and flavor physics. In this scenario, there is an explicit relation between the CKM matrix and flavor violating couplings, such as four-quark couplings, because both are radiatively induced by the particles in the hidden sector. Then, we can explicitly find the DM mass region and the size of Yukawa couplings between the DM and quarks, based on the study of flavor physics and DM physics. In conclusion, we show that DM mass in our scenario is around the TeV scale, and the Yukawa couplings are between O (0.01 ) and O (1 ). The spin-independent DM scattering cross section is estimated as O (10-9) [pb]. An extra colored particle is also predicted at the O (10 ) TeV scale.

  9. Controlling data transfers from an origin compute node to a target compute node

    Science.gov (United States)

    Archer, Charles J [Rochester, MN; Blocksome, Michael A [Rochester, MN; Ratterman, Joseph D [Rochester, MN; Smith, Brian E [Rochester, MN

    2011-06-21

    Methods, apparatus, and products are disclosed for controlling data transfers from an origin compute node to a target compute node that include: receiving, by an application messaging module on the target compute node, an indication of a data transfer from an origin compute node to the target compute node; and administering, by the application messaging module on the target compute node, the data transfer using one or more messaging primitives of a system messaging module in dependence upon the indication.

  10. Allocating resources between network nodes for providing a network node function

    OpenAIRE

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention provides a method wherein a first network node advertises available resources that a second network node may use to offload network node functions transparently to the first network node. Examples of the first network node are a client device (e.g. PC, notebook, tablet, smart phone), a server (e.g. application server, a proxy server, cloud location, router). Examples of the second network node are an application server, a cloud location or a router. The available resources may b...

  11. Secure message authentication system for node to node network

    Science.gov (United States)

    Sindhu, R.; Vanitha, M. M.; Norman, J.

    2017-10-01

    The Message verification remains some of the best actual methods for prevent the illegal and dis honored communication after presence progressed to WSNs (Wireless Sensor Networks). Intend for this purpose, several message verification systems must stand established, created on both symmetric key cryptography otherwise public key cryptosystems. Best of them will have some limits for great computational then statement above in count of deficiency of climb ability then flexibility in node settlement occurrence. In a polynomial based system was newly presented for these problems. Though, this system then situations delay will must the dimness of integral limitation firm in the point of polynomial: once the amount of message transferred remains the greater than the limitation then the opponent will completely improve the polynomial approaches. This paper suggests using ECC (Elliptic Curve Cryptography). Though using the node verification the technique in this paper permits some nodes to transfer a limitless amount of messages lacking misery in the limit problem. This system will have the message cause secrecy. Equally theoretic study then model effects show our planned system will be effective than the polynomial based method in positions of calculation then statement above in privacy points though message basis privacy.

  12. An automated approach for annual layer counting in ice cores

    DEFF Research Database (Denmark)

    Winstrup, Mai; Svensson, A. M.; Rasmussen, S. O.

    2012-01-01

    A novel method for automated annual layer counting in seasonally-resolved paleoclimate records has been developed. It relies on algorithms from the statistical framework of Hidden Markov Models (HMMs), which originally was developed for use in machine speech-recognition. The strength of the layer...

  13. An automated approach for annual layer counting in ice cores

    DEFF Research Database (Denmark)

    Winstrup, Mai; Svensson, A. M.; Rasmussen, S. O.

    2012-01-01

    A novel method for automated annual layer counting in seasonally-resolved paleoclimate records has been developed. It relies on algorithms from the statistical framework of hidden Markov models (HMMs), which originally was developed for use in machine speech recognition. The strength of the layer...

  14. Multi-layer universal correction magnet

    International Nuclear Information System (INIS)

    Parzen, G.

    1981-08-01

    This paper presents an approach for constructing a universal correction magnet in which the return currents play an active role in determining the field. The return currents are not hidden by the iron shield. The coil is wound in many layers, instead of just one layer. Each layer has a particular symmetry, and generates a particular class of field multipoles such that the location of the return current for each independently excited current block is clear. Three layers may be sufficient in many cases. This approach is applied to the ISABELLE storage accelerator correction system

  15. Codimension n saddle-nodes

    International Nuclear Information System (INIS)

    Gheiner, Jaques

    2014-01-01

    We consider the generic unfolding of a diffeomorphism on a compact C ∞ manifold that is Morse–Smale except for one non-hyperbolic periodic orbit being a codimension n saddle-node (one eigenvalue is 1, the other eigenvalues have norm different from 1). Local and global bifurcations are described. We characterize structural stability of the unfolding, depending on the codimension. A universal model of the unfolding is given when there is stability. Dynamical behaviour is analysed in other cases. (paper)

  16. Microwave background constraints on mixing of photons with hidden photons

    International Nuclear Information System (INIS)

    Mirizzi, Alessandro; Redondo, Javier; Sigl, Guenter

    2008-12-01

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle χ 0 -7 - 10 -5 for hidden photon masses between 10 -14 eV and 10 -7 eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  17. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  18. Sentinel node biopsy in penile cancer

    DEFF Research Database (Denmark)

    Jakobsen, J. K.; Krarup, K. P.; Sommer, P.

    2015-01-01

    INTRODUCTION & OBJECTIVES: Nodal involvement is a strong prognosticator in penile cancer and lymph node staging is crucial. Sentinel node biopsy (SNB) has proven a useful staging tool with few complications, but evidence rely mostly on single institution publications with a short follow-up. In th......INTRODUCTION & OBJECTIVES: Nodal involvement is a strong prognosticator in penile cancer and lymph node staging is crucial. Sentinel node biopsy (SNB) has proven a useful staging tool with few complications, but evidence rely mostly on single institution publications with a short follow...... died from complications. CONCLUSIONS: To our knowledge, this is the first complete national study on sentinel node biopsy. Penile cancer sentinel node biopsy with a close follow-up is a reliable lymph node staging and has few complications in a national multicentre setting. Inguinal lymph node...

  19. Axillary Lymph Nodes and Breast Cancer

    Science.gov (United States)

    ... white blood cells that help fight illness. If breast cancer spreads, the lymph nodes in the underarm (called ... if they contain cancer cells. This helps determine breast cancer stage and guide treatment. Sentinel node biopsy and ...

  20. Sentinel Node in Oral Cancer

    DEFF Research Database (Denmark)

    Tartaglione, Girolamo; Stoeckli, Sandro J; de Bree, Remco

    2016-01-01

    /static scan and/or SPECT/CT. RESULTS: Lymphoscintigraphy identified 723 lymphatic basins. 1398 sentinel lymph nodes (SNs) were biopsied (3.2 SN per patient; range, 1-10). Dynamic scan allowed the differentiation of sentinel nodes from second tier lymph nodes. SPECT/CT allowed more accurate anatomical......PURPOSE: Nuclear imaging plays a crucial role in lymphatic mapping of oral cancer. This evaluation represents a subanalysis of the original multicenter SENT trial data set, involving 434 patients with T1-T2, N0, and M0 oral squamous cell carcinoma. The impact of acquisition techniques, tracer...... localization and estimated SN depth more efficiently. After pathological examination, 9.9% of the SN excised (138 of 1398 SNs) showed metastases. The first neck level (NL) containing SN+ was NL I in 28.6%, NL IIa in 44.8%, NL IIb in 2.8%, NL III in 17.1%, and NL IV in 6.7% of positive patients. Approximately...

  1. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  2. T.Node, industrial version of supernode

    Science.gov (United States)

    Flieller, Sylvain

    1989-12-01

    The Esprit I P1085 "SuperNode" project developed a modular reconfigurable archtecture, based on transputers. This highly parallel machine is now marketed by Telmat Informatique under the name T.Node. This paper presents the P1085 project, the architecture of SuperNode, its industrial implementation and its software enviroment.

  3. CT perfusion study of neck lymph nodes

    International Nuclear Information System (INIS)

    Zhong Jin; Liu Jun; Hua Rui; Qiao Hui; Gong Yi

    2011-01-01

    Objective: To study the CT perfusion features of various lymph nodes in the neck. Methods: Dynamic perfusion CT scanning was performed in 83 neck lymph nodes proved by pathology, including tuberculosis lymph nodes, lymphoma and metastatic lymph nodes. The shapes, blood flow modes, and perfusion parameters of these lymph nodes were compared among 3 groups. Statistical analysis of L/T and CT perfusion parameters was performed by one-way ANOVA and LSD test. Results: The values of MTT of tuberculosis lymph nodes, lymphoma and metastatic lymph nodes were (28.13±5.08), (31.08±5.82), and (11.24±5.31) s, respectively. The MTT of metastatic lymph nodes was statistically lower than that of tuberculosis lymph nodes and lymphoma (P -1 · 100 g -1 , respectively. The values of BV were (24.68±2.84), (25.30±3.16), and (25.15± 8.81) ml·100 g -1 respectively. The values of TTP were (40.90±8.85), (40.67±6.45), and (40.98±6.62) s, respectively. There were no significant differences in L/T, BF, BV and TTP among tuberculosis lymph nodes, lymphoma and metastatic lymph nodes (P>0.05). Conclusion: CT perfusion, especially combination functional imaging with perfusion images may be helpful in judging the nature of neck lymph nodes. (authors)

  4. Compressing the hidden variable space of a qubit

    International Nuclear Information System (INIS)

    Montina, Alberto

    2011-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of single realizations is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with quantum states satisfy reasonable criteria of regularity. Possible generalizations of this shrinking to an N-dimensional Hilbert space are discussed.

  5. Zipf exponent of trajectory distribution in the hidden Markov model

    Science.gov (United States)

    Bochkarev, V. V.; Lerner, E. Yu

    2014-03-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.

  6. Zipf exponent of trajectory distribution in the hidden Markov model

    International Nuclear Information System (INIS)

    Bochkarev, V V; Lerner, E Yu

    2014-01-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different

  7. Hidden acoustic information revealed by intentional nonlinearity

    Science.gov (United States)

    Dowling, David R.

    2017-11-01

    Acoustic waves are omnipresent in modern life and are well described by the linearized equations of fluid dynamics. Once generated, acoustic waves carry and collect information about their source and the environment through which they propagate, respectively, and this information may be retrieved by analyzing recordings of these waves. Because of this, acoustics is the primary means for observation, surveillance, reconnaissance, and remote sensing in otherwise opaque environments, such as the Earth's oceans and crust, and the interior of the human body. For such information-retrieval tasks, acoustic fields are nearly always interrogated within their recorded frequency range or bandwidth. However, this frequency-range restriction is not general; acoustic fields may also carry (hidden) information at frequencies outside their bandwidth. Although such a claim may seem counter intuitive, hidden acoustic-field information can be revealed by re-introducing a marquee trait of fluid dynamics: nonlinearity. In particular, an intentional quadratic nonlinearity - a form of intra-signal heterodyning - can be used to obtain acoustic field information at frequencies outside a recorded acoustic field's bandwidth. This quadratic nonlinearity enables a variety of acoustic remote sensing applications that were long thought to be impossible. In particular, it allows the detrimental effects of sparse recordings and random scattering to be suppressed when the original acoustic field has sufficient bandwidth. In this presentation, the topic is developed heuristically, with a just brief exposition of the relevant mathematics. Hidden acoustic field information is then revealed from simulated and measured acoustic fields in simple and complicated acoustic environments involving frequencies from a few Hertz to more than 100 kHz, and propagation distances from tens of centimeters to hundreds of kilometers. Sponsored by ONR, NAVSEA, and NSF.

  8. Sentinel node concept in breast cancer

    International Nuclear Information System (INIS)

    Kiricuta, I.C.

    2000-01-01

    Background/purpose: It seems that there exists a specific lymph node center called sentinel node (SN) which appears to be the primary site of metastases. The sentinel node concept (SNC) is fundamentally based on the orderly progression of tumor cells within the lymphatic system. It is the most important new concept in surgical and radiation oncology. The purpose is to present the biological significance, the diagnostic and clinical basis of the sentinel node concept in breast cancer patients. Material and methods: Lymphoscintigraphy and gamma probe biopsy is necessary to show predictable lymph flow to the regional sentinel node, to multiple sentinel nodes or unpredictable lymph flow to extra-regional sentinel nodes and for performing sentinel node procedure. The standard protocol for the evaluation of the sentinel node metastases consists of extensive histopathological investigation including step Hematoxylin and Eosin (H and E) stained sections and immunohistochemistry. Results: A high rate of success of the identification of the sentinel node for breast cancer was reported. The presence or absence of metastasis in this node is a very accurate predictor of overall nodal status. The temptation to examine the sentinel node with the greatest possible degree of accuracy highlights one of the major problems related to sentinel node biopsy. The success of the sentinel node procedure depends primarily on the adequate functional capacity necessary for sufficient uptake to ensure the accurate identification. In negative sentinel-node patients a complete axillary lymph node dissection is avoidable. In sentinel-node positive patients and clinically negative patients a postoperative radiotherapy would permit an adequate tumor control. The last 2-procedures permit a low morbidity. In the actual TNM classification it was recently introduced a definition of a 'pN0' patient based on sentinel node biopsy. New target volumes are defined for adjuvant radiotherapy or lymphatic basins

  9. Recovering a hidden polarization by ghost polarimetry.

    Science.gov (United States)

    Janassek, Patrick; Blumenstein, Sébastien; Elsäßer, Wolfgang

    2018-02-15

    By exploiting polarization correlations of light from a broadband fiber-based amplified spontaneous emission source we succeed in reconstructing a hidden polarization in a ghost polarimetry experiment in close analogy to ghost imaging and ghost spectroscopy. Thereby, an original linear polarization state in the object arm of a Mach-Zehnder interferometer configuration which has been camouflaged by a subsequent depolarizer is recovered by correlating it with light from a reference beam. The variation of a linear polarizer placed inside the reference beam results in a Malus law type second-order intensity correlation with high contrast, thus measuring a ghost polarigram.

  10. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  11. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  12. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  13. The hidden face of the petroleum

    International Nuclear Information System (INIS)

    Laurent, E.

    2006-02-01

    For the first time, a book reveals what that was hidden to the public opinions: why the petroleum crisis of 1973 what only a manipulation, an arrangement between the OPEC and the petroleum companies, why the data concerning the petroleum reserves are wrong and increased by the producers countries, how Washington used the Saudi petroleum weapon to create the Soviet Union fall, and why from march 2001 maps of the Iraq (where were drawn the future petroleum explorations) were working documents for the vice President Cheney and petroleum managers for the ''secret society''. (A.L.B.)

  14. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  15. The hidden costs of nuclear power

    International Nuclear Information System (INIS)

    Keough, C.

    1981-01-01

    The two basic hidden costs of nuclear power are public money and public health. Nuclear power appears to be economical because many of the costs of producins electricity in these plants are paid by the federal government. So, like it or not, the citizens are footing the bill with their taxes. Design and development of plants have been paid for with public money, and disposal and cleanup costs will also be paid in this manner. The economic and health costs associated with nuclear accidents are staggering

  16. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  17. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The estimation of the HMM is conducted using a variant of the Iterative Conditional Expectation-Generalized Mixture (ICE-GEMI) algorithm proposed by Delignon et al. (1997), that permits analysis of the conditional distributions of economic data and allows for different functional forms across regimes...

  18. Offloading of a Wireless Node Authentication with Core Network

    DEFF Research Database (Denmark)

    2017-01-01

    An example technique may include controlling receiving, by a second node from a first node in a wireless network, a request to offload authentication of the first node with the core network to the second node, controlling receiving, by the second node from the first node, data to be forwarded...... to the core network, performing, by the second node based on the request, an authentication with the core network on behalf of the first node while the first node is not connected with the second node, and controlling forwarding the received data from the second node to the core network while the first node...

  19. Sentinel lymph node biopsy in oral cancer

    DEFF Research Database (Denmark)

    Thomsen, Jørn Bo; Sørensen, Jens Ahm; Grupe, Peter

    2005-01-01

    PURPOSE: To validate lymphatic mapping combined with sentinel lymph node biopsy as a staging procedure, and to evaluate the possible clinical implications of added oblique lymphoscintigraphy and/or tomography and test the intra- and interobserver reproducibility of lymphoscintigraphy. MATERIAL......: Eleven (28%) patients were upstaged. The sentinel lymph node identification rate was 97.5%. Sentinel lymph node biopsy significantly differentiated between patients with or without lymph node metastasis (P = 0.001). Lymphatic mapping revealed 124 hotspots and 144 hot lymph nodes were removed by sentinel...

  20. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index

    Science.gov (United States)

    Stevens, Gretchen A.; Ezzati, Majid; Black, Robert E.; Kraemer, Klaus

    2015-01-01

    Background Deficiencies in essential vitamins and minerals–also termed hidden hunger–are pervasive and hold negative consequences for the cognitive and physical development of children. Methods This analysis evaluates the change in hidden hunger over time in the form of one composite indicator–the Hidden Hunger Index (HHI)–using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency). Net changes from 1995–2011 and population weighted regional means for various time periods are measured. Findings Globally, hidden hunger improved (-6.7 net change in HHI) from 1995–2011. Africa was the only region to see a deterioration in hidden hunger (+1.9) over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0), while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased. Interpretation This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs). However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda. Funding Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish. PMID:26673631

  1. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index.

    Directory of Open Access Journals (Sweden)

    Julie C Ruel-Bergeron

    Full Text Available Deficiencies in essential vitamins and minerals-also termed hidden hunger-are pervasive and hold negative consequences for the cognitive and physical development of children.This analysis evaluates the change in hidden hunger over time in the form of one composite indicator-the Hidden Hunger Index (HHI-using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency. Net changes from 1995-2011 and population weighted regional means for various time periods are measured.Globally, hidden hunger improved (-6.7 net change in HHI from 1995-2011. Africa was the only region to see a deterioration in hidden hunger (+1.9 over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0, while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased.This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs. However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda.Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish.

  2. Hidden in plain sight: the formal, informal, and hidden curricula of a psychiatry clerkship.

    Science.gov (United States)

    Wear, Delese; Skillicorn, Jodie

    2009-04-01

    To examine perceptions of the formal, informal, and hidden curricula in psychiatry as they are observed and experienced by (1) attending physicians who have teaching responsibilities for residents and medical students, (2) residents who are taught by those same physicians and who have teaching responsibilities for medical students, and (3) medical students who are taught by attendings and residents during their psychiatry rotation. From June to November 2007, the authors conducted focus groups with attendings, residents, and students in one midwestern academic setting. The sessions were audiotaped, transcribed, and analyzed for themes surrounding the formal, informal, and hidden curricula. All three groups offered a similar belief that the knowledge, skills, and values of the formal curriculum focused on building relationships. Similarly, all three suggested that elements of the informal and hidden curricula were expressed primarily as the values arising from attendings' role modeling, as the nature and amount of time attendings spend with patients, and as attendings' advice arising from experience and intuition versus "textbook learning." Whereas students and residents offered negative values arising from the informal and hidden curricula, attendings did not, offering instead the more positive values they intended to encourage through the informal and hidden curricula. The process described here has great potential in local settings across all disciplines. Asking teachers and learners in any setting to think about how they experience the educational environment and what sense they make of all curricular efforts can provide a reality check for educators and a values check for learners as they critically reflect on the meanings of what they are learning.

  3. Power Aware Simulation Framework for Wireless Sensor Networks and Nodes

    Directory of Open Access Journals (Sweden)

    Daniel Weber

    2008-07-01

    Full Text Available The constrained resources of sensor nodes limit analytical techniques and cost-time factors limit test beds to study wireless sensor networks (WSNs. Consequently, simulation becomes an essential tool to evaluate such systems.We present the power aware wireless sensors (PAWiS simulation framework that supports design and simulation of wireless sensor networks and nodes. The framework emphasizes power consumption capturing and hence the identification of inefficiencies in various hardware and software modules of the systems. These modules include all layers of the communication system, the targeted class of application itself, the power supply and energy management, the central processing unit (CPU, and the sensor-actuator interface. The modular design makes it possible to simulate heterogeneous systems. PAWiS is an OMNeT++ based discrete event simulator written in C++. It captures the node internals (modules as well as the node surroundings (network, environment and provides specific features critical to WSNs like capturing power consumption at various levels of granularity, support for mobility, and environmental dynamics as well as the simulation of timing effects. A module library with standardized interfaces and a power analysis tool have been developed to support the design and analysis of simulation models. The performance of the PAWiS simulator is comparable with other simulation environments.

  4. Quality metric for accurate overlay control in <20nm nodes

    Science.gov (United States)

    Klein, Dana; Amit, Eran; Cohen, Guy; Amir, Nuriel; Har-Zvi, Michael; Huang, Chin-Chou Kevin; Karur-Shanmugam, Ramkumar; Pierson, Bill; Kato, Cindy; Kurita, Hiroyuki

    2013-04-01

    The semiconductor industry is moving toward 20nm nodes and below. As the Overlay (OVL) budget is getting tighter at these advanced nodes, the importance in the accuracy in each nanometer of OVL error is critical. When process owners select OVL targets and methods for their process, they must do it wisely; otherwise the reported OVL could be inaccurate, resulting in yield loss. The same problem can occur when the target sampling map is chosen incorrectly, consisting of asymmetric targets that will cause biased correctable terms and a corrupted wafer. Total measurement uncertainty (TMU) is the main parameter that process owners use when choosing an OVL target per layer. Going towards the 20nm nodes and below, TMU will not be enough for accurate OVL control. KLA-Tencor has introduced a quality score named `Qmerit' for its imaging based OVL (IBO) targets, which is obtained on the-fly for each OVL measurement point in X & Y. This Qmerit score will enable the process owners to select compatible targets which provide accurate OVL values for their process and thereby improve their yield. Together with K-T Analyzer's ability to detect the symmetric targets across the wafer and within the field, the Archer tools will continue to provide an independent, reliable measurement of OVL error into the next advanced nodes, enabling fabs to manufacture devices that meet their tight OVL error budgets.

  5. Pattern of Colon Cancer Lymph Node Metastases in Patients Undergoing Central Mesocolic Lymph Node Excision

    DEFF Research Database (Denmark)

    Bertelsen, Claus A; Kirkegaard-Klitbo, Anders; Nielsen, Mingyuan

    2016-01-01

    BACKGROUND: Extended mesocolic lymph node dissection in colon cancer surgery seems to improve oncological outcome. A possible reason might be related to metastases in the central mesocolic lymph nodes. OBJECTIVE: The purpose of this study was to describe the pattern of mesocolic lymph node...... metastases, particularly in central lymph nodes, and the risk of skip, aberrant, and gastrocolic ligament metastases as the argument for performing extended lymph node dissection. DATA SOURCES: EMBASE and PubMed were searched using the terms colon or colorectal with sentinel node, lymph node mapping, or skip...... node; lymph node resection colon; and complete or total and mesocolic excision. STUDY SELECTION: Studies describing the risk of metastases in central, skip, aberrant, and gastrocolic ligament lymph node metastases from colon adenocarcinomas in 10 or more patients were included. No languages were...

  6. Targeted Delivery of Immunomodulators to Lymph Nodes

    Directory of Open Access Journals (Sweden)

    Jamil Azzi

    2016-05-01

    Full Text Available Active-targeted delivery to lymph nodes represents a major advance toward more effective treatment of immune-mediated disease. The MECA79 antibody recognizes peripheral node addressin molecules expressed by high endothelial venules of lymph nodes. By mimicking lymphocyte trafficking to the lymph nodes, we have engineered MECA79-coated microparticles containing an immunosuppressive medication, tacrolimus. Following intravenous administration, MECA79-bearing particles showed marked accumulation in the draining lymph nodes of transplanted animals. Using an allograft heart transplant model, we show that targeted lymph node delivery of microparticles containing tacrolimus can prolong heart allograft survival with negligible changes in tacrolimus serum level. Using MECA79 conjugation, we have demonstrated targeted delivery of tacrolimus to the lymph nodes following systemic administration, with the capacity for immune modulation in vivo.

  7. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  8. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier, E-mail: redondo@mpp.mpg.de [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza, España (Spain)

    2015-07-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  9. Bayesian structural inference for hidden processes

    Science.gov (United States)

    Strelioff, Christopher C.; Crutchfield, James P.

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ɛ-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ɛ-machines, irrespective of estimated transition probabilities. Properties of ɛ-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  10. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  11. Hidden ion population of the magnetosphere

    International Nuclear Information System (INIS)

    Olsen, R.C.

    1982-01-01

    Particle data from two geosynchronous satellites (Applied Technology Satellite 6 and SCATHA) show a normally hidden ion population appearing when the satellites are in the earth's shadow. Ion and electron data show the spacecraft potential dropping from +10 V in sunlight to +4 and +5 V in eclipse at local midnight, in low-energy (T/sub e/ -2 ), isotropic ion population appears which was invisible in sunlight because of the larger positive spacecraft potential. Higher-energy populations generally cover the tails of the hidden ion populations, so they cannot be inferred from daylight data. The isotropic populations appears only in a few percent of the spacecraft eclipse events, appearing only at times of low Kp (2 or less, preceded by a day with Σ Kp< or =20). A low-energy (T = 1--2 eV) field-aligned population often appears with and without the isotropic population, at slightly higher flux levels. These fluxes are visible in sunlight, but again the distribution functions obtained in eclipse differ from those that would be inferred from daylight data. Measurement of the thermal plasma population on a consistent basis, particularly in the plasma sheet, will require some method of controlling the detector potential with respect to the ambient plamsa

  12. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  13. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  14. Pentaquarks with hidden charm as hadroquarkonia

    Energy Technology Data Exchange (ETDEWEB)

    Eides, Michael I. [University of Kentucky, Department of Physics and Astronomy, Lexington, KY (United States); Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Petrov, Victor Yu. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Polyakov, Maxim V. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Ruhr-Universitaet Bochum, Institut fuer Theoretische Physik II, Bochum (Germany)

    2018-01-15

    We consider hidden charm pentaquarks as hadroquarkonium states in a QCD inspired approach. Pentaquarks arise naturally as bound states of quarkonia excitations and ordinary baryons. The LHCb P{sub c}(4450) pentaquark is interpreted as a ψ{sup '}-nucleon bound state with spin-parity J{sup P} = 3/2{sup -}. The partial decay width Γ(P{sub c}(4450) → J/ψ + N) ∼ 11 MeV is calculated and turned out to be in agreement with the experimental data for P{sub c}(4450). The P{sub c}(4450) pentaquark is predicted to be a member of one of the two almost degenerate hidden-charm baryon octets with spin-parities J{sup P} = 1/2{sup -}, 3/2{sup -}. The masses and decay widths of the octet pentaquarks are calculated. The widths are small and comparable with the width of the P{sub c}(4450) pentaquark, and the masses of the octet pentaquarks satisfy the Gell-Mann-Okubo relation. Interpretation of pentaquarks as loosely bound Σ{sub c} anti D* and Σ{sub c}{sup *} anti D* deuteronlike states is also considered. We determine quantum numbers of these bound states and calculate their masses in the one-pion exchange scenario. The hadroquarkonium and molecular approaches to exotic hadrons are compared and the relative advantages and drawbacks of each approach are discussed. (orig.)

  15. Low energy theorems of hidden local symmetries

    International Nuclear Information System (INIS)

    Harada, Masayasu; Kugo, Taichiro; Yamawaki, Koichi.

    1994-01-01

    We prove to all orders of the loop expansion the low energy theorems of hidden local symmetries in four-dimensional nonlinear sigma models based on the coset space G/H, with G and H being arbitrary compact groups. Although the models are non-renormalizable, the proof is done in an analogous manner to the renormalization proof of gauge theories and two-dimensional nonlinear sigma models by restricting ourselves to the operators with two derivatives (counting a hidden gauge boson field as one derivative), i.e., with dimension 2, which are the only operators relevant to the low energy limit. Through loop-wise mathematical induction based on the Ward-Takahashi identity for the BRS symmetry, we solve renormalization equation for the effective action up to dimension-2 terms plus terms with the relevant BRS sources. We then show that all the quantum corrections to the dimension-2 operators, including the finite parts as well as the divergent ones, can be entirely absorbed into a re-definition (renormalization) of the parameters and the fields in the dimension-2 part of the tree-level Lagrangian. (author)

  16. Black holes, hidden symmetries, and complete integrability.

    Science.gov (United States)

    Frolov, Valeri P; Krtouš, Pavel; Kubizňák, David

    2017-01-01

    The study of higher-dimensional black holes is a subject which has recently attracted vast interest. Perhaps one of the most surprising discoveries is a realization that the properties of higher-dimensional black holes with the spherical horizon topology and described by the Kerr-NUT-(A)dS metrics are very similar to the properties of the well known four-dimensional Kerr metric. This remarkable result stems from the existence of a single object called the principal tensor. In our review we discuss explicit and hidden symmetries of higher-dimensional Kerr-NUT-(A)dS black hole spacetimes. We start with discussion of the Killing and Killing-Yano objects representing explicit and hidden symmetries. We demonstrate that the principal tensor can be used as a "seed object" which generates all these symmetries. It determines the form of the geometry, as well as guarantees its remarkable properties, such as special algebraic type of the spacetime, complete integrability of geodesic motion, and separability of the Hamilton-Jacobi, Klein-Gordon, and Dirac equations. The review also contains a discussion of different applications of the developed formalism and its possible generalizations.

  17. Sentinel node biopsy before neoadjuvant chemotherapy spares breast cancer patients axillary lymph node dissection.

    Science.gov (United States)

    van Rijk, Maartje C; Nieweg, Omgo E; Rutgers, Emiel J T; Oldenburg, Hester S A; Olmos, Renato Valdés; Hoefnagel, Cornelis A; Kroon, Bin B R

    2006-04-01

    Neoadjuvant chemotherapy in breast cancer patients is a valuable method to determine the efficacy of chemotherapy and potentially downsize the primary tumor, which facilitates breast-conserving therapy. In 18 studies published about sentinel node biopsy after neoadjuvant chemotherapy, the sentinel node was identified in on average 89%, and the false-negative rate was on average 10%. Because of these mediocre results, no author dares to omit axillary clearance just yet. In our institute, sentinel lymph node biopsy is performed before neoadjuvant chemotherapy. The aim of this study was to evaluate our experience with this approach. Sentinel node biopsy was performed before neoadjuvant chemotherapy in 25 T2N0 patients by using lymphoscintigraphy, a gamma ray detection probe, and patent blue dye. Axillary lymph node dissection was performed after chemotherapy if the sentinel node contained metastases. Ten patients had a tumor-positive axillary sentinel node, and one patient had an involved lateral intramammary node. Four patients had additional involved nodes in the completion lymph node dissection specimen. The other 14 patients (56%) had a tumor-negative sentinel node and did not undergo axillary lymph node dissection. No recurrences have been observed after a median follow-up of 18 months. Fourteen (56%) of the 25 patients were spared axillary lymph node dissection when the sentinel node was found to be disease free. Performing sentinel node biopsy before neoadjuvant chemotherapy seems successful and reliable in patients with T2N0 breast cancer.

  18. Node-pair reliability of network systems with small distances between adjacent nodes

    International Nuclear Information System (INIS)

    Malinowski, Jacek

    2007-01-01

    A new method for computing the node-pair reliability of network systems modeled by random graphs with nodes arranged in sequence is presented. It is based on a recursive algorithm using the 'sliding window' technique, the window being composed of several consecutive nodes. In a single step, the connectivity probabilities for all nodes included in the window are found. Subsequently, the window is moved one node forward. This process is repeated until, in the last step, the window reaches the terminal node. The connectivity probabilities found at that point are used to compute the node-pair reliability of the network system considered. The algorithm is designed especially for graphs with small distances between adjacent nodes, where the distance between two nodes is defined as the absolute value of the difference between the nodes' numbers. The maximal distance between any two adjacent nodes is denoted by Γ(G), where G symbolizes a random graph. If Γ(G)=2 then the method can be applied for directed as well as undirected graphs whose nodes and edges are subject to failure. This is important in view of the fact that many algorithms computing network reliability are designed for graphs with failure-prone edges and reliable nodes. If Γ(G)=3 then the method's applicability is limited to undirected graphs with reliable nodes. The main asset of the presented algorithms is their low numerical complexity-O(n), where n denotes the number of nodes

  19. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  20. Asymptotics for Estimating Equations in Hidden Markov Models

    DEFF Research Database (Denmark)

    Hansen, Jørgen Vinsløv; Jensen, Jens Ledet

    Results on asymptotic normality for the maximum likelihood estimate in hidden Markov models are extended in two directions. The stationarity assumption is relaxed, which allows for a covariate process influencing the hidden Markov process. Furthermore a class of estimating equations is considered...

  1. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  2. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  3. Hidden Agendas in Marriage: Affective and Longitudinal Dimensions.

    Science.gov (United States)

    Krokoff, Lowell J.

    1990-01-01

    Examines how couples' discussions of troublesome problems reveal hidden agendas (issues not directly discussed or explored). Finds disgust and contempt are at the core of both love and respect agendas for husbands and wives. Finds that wives' more than husbands' hidden agendas are directly predictive of how negatively they argue at home. (SR)

  4. Hidden symmetries in minimal five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, Markus; Silva, Sebastian

    2004-01-01

    We study the hidden symmetries arising in the dimensional reduction of d=5, N=2 supergravity to three dimensions. Extending previous partial results for the bosonic part, we give a derivation that includes fermionic terms, shedding light on the appearance of the local hidden symmetry SO(4) in the reduction

  5. Anti-pairing in learning of a neural network with redundant hidden units

    International Nuclear Information System (INIS)

    Kwon, Chulan; Kim, Hyong Kyun

    2005-01-01

    We study the statistical mechanics of learning from examples between the two-layered committee machines with different numbers of hidden units using the replica theory. The number M of hidden units of the student network is larger than the number M T of those of the target network called the teacher. We choose the networks to have binary synaptic weights, ±1, which makes it possible to compare the calculation with the Monte Carlo simulation. We propose an effective teacher as a virtual target network which has the same M hidden units as the student and gives identical outputs with those of the original teacher. This is a way of making a conjecture for a ground state of a thermodynamic system, given by the weights of the effective teacher in our study. We suppose that the weights on M T hidden units of the effective teacher are the same as those of the original teacher while those on M - M T redundant hidden units are composed of anti-pairs, {1, - 1}, with probability 1 - p in the limit p → 0. For p = 0 exact, there are no terms related to the effective teacher in the calculation, for the contributions of anti-pairs to outputs are exactly cancelled. In the limit p → 0, however, we find that the learnt weights of the student are actually equivalent to those of the suggested effective teacher, which is not possible from the calculation for p = 0. p plays the role of a symmetry breaking parameter for anti-pairing ordering, which is analogous to the magnetic field for the Ising model. A first-order phase transition is found to be signalled by breaking of symmetry in permuting hidden units. Above a critical number of examples, the student is shown to learn perfectly the effective teacher. Anti-pairing can be measured by a set of order parameters; zero in the permutation-symmetric phase and nonzero in the permutation symmetry breaking phase. Results from the Monte Carlo simulation are shown to be in good agreement with those from the replica calculation

  6. Abelian hidden sectors at a GeV

    International Nuclear Information System (INIS)

    Morrissey, David E.; Poland, David; Zurek, Kathryn M.

    2009-01-01

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1) x gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  7. Lymphoscintigraphic diagnosis of the lymph node metastasis of esophageal cancer

    International Nuclear Information System (INIS)

    Terui, Shoji; Kawai, Hideo; Hirashima, Toshio; Yamaguchi, Hajime; Kato, Hoichi; Iizuka, Norifumi

    1985-01-01

    Lymphoscintigraphy with 99m Tc-labeled rhenium sulfur colloid was performed preoperatively in 30 patients with esopohageal cancer. It showed hot nodes in a total of 267 lymph nodes, 176 mediastinal nodes and 91 celiac artery nodes. Of these 267 nodes, 47 (18 %) were found to have metastasis, including 34 (19 %) mediastinal nodes and 13 (14 %) celiac artery nodes. On the other hand, the number of non-visualized lymph nodes (cold nodes) was 542. Of them, 78 (14 %) had metastasis; 46 (15 %) were mediastinal nodes and 32 (14 %) were celiac artery nodes. (Namekawa, K.)

  8. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  9. Localizing and placement of network node functions in a network

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention enables placement and use of a network node function in a second network node instead of using the network node function in a first network node. The network node function is e.g. a server function or a router function. The second network node is typically located in or close to the

  10. … To be hidden does not mean to be merely revealed – Part 1 Artistic research on hidden curriculum

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-09-01

    Full Text Available This text revisits the long-term project Hidden Curriculum, initiated by Annette Krauss. The project addresses unquestioned routines, hierarchies of knowledge (part 1, and the role of the body in learning processes (part 2 from the perspective of secondary/high school education (in the research on a hidden curriculum. A deeper analysis of educational studies on the phenomenon of ‘hidden curriculum’ in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire, and Jacques Rancière brings forward important insights generated through the artistic research within hidden curriculum. The aim of this text is to address academic canons, corporeality, and investigate everyday norms through revisiting the framework, results, and processes of the collaborative research into hidden curriculum with secondary high school students.

  11. Dynamic portfolio optimization across hidden market regimes

    DEFF Research Database (Denmark)

    Nystrup, Peter; Madsen, Henrik; Lindström, Erik

    2017-01-01

    Regime-based asset allocation has been shown to add value over rebalancing to static weights and, in particular, reduce potential drawdowns by reacting to changes in market conditions. The predominant approach in previous studies has been to specify in advance a static decision rule for changing...... the allocation based on the state of financial markets or the economy. In this article, model predictive control (MPC) is used to dynamically optimize a portfolio based on forecasts of the mean and variance of financial returns from a hidden Markov model with time-varying parameters. There are computational...... than a buy-and-hold investment in various major stock market indices. This is after accounting for transaction costs, with a one-day delay in the implementation of allocation changes, and with zero-interest cash as the only alternative to the stock indices. Imposing a trading penalty that reduces...

  12. Supersymmetric leptogenesis with a light hidden sector

    International Nuclear Information System (INIS)

    De Simone, Andrea

    2010-04-01

    Supersymmetric scenarios incorporating thermal leptogenesis as the origin of the observed matter-antimatter asymmetry generically predict abundances of the primordial elements which are in conflict with observations. In this paper we pro- pose a simple way to circumvent this tension and accommodate naturally ther- mal leptogenesis and primordial nucleosynthesis. We postulate the existence of a light hidden sector, coupled very weakly to the Minimal Supersymmetric Standard Model, which opens up new decay channels for the next-to-lightest supersymmetric particle, thus diluting its abundance during nucleosynthesis. We present a general model-independent analysis of this mechanism as well as two concrete realizations, and describe the relevant cosmological and astrophysical bounds and implications for this dark matter scenario. Possible experimental signatures at colliders and in cosmic-ray observations are also discussed. (orig.)

  13. Nuclear scissors modes and hidden angular momenta

    Energy Technology Data Exchange (ETDEWEB)

    Balbutsev, E. B., E-mail: balbuts@theor.jinr.ru; Molodtsova, I. V. [Joint Institute for Nuclear Research (Russian Federation); Schuck, P. [Université Paris-Sud, Institut de Physique Nucléaire, IN2P3–CNRS (France)

    2017-01-15

    The coupled dynamics of low-lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time-Dependent Hartree–Fock–Bogoliubov equations. The model of the harmonic oscillator including spin–orbit potential plus quadrupole–quadrupole and spin–spin interactions is considered. New low-lying spin-dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  14. Neuroevolution Mechanism for Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-12-01

    Full Text Available Hidden Markov Model (HMM is a statistical model based on probabilities. HMM is becoming one of the major models involved in many applications such as natural language
    processing, handwritten recognition, image processing, prediction systems and many more. In this research we are concerned with finding out the best HMM for a certain application domain. We propose a neuroevolution process that is based first on converting the HMM to a neural network, then generating many neural networks at random where each represents a HMM. We proceed by
    applying genetic operators to obtain new set of neural networks where each represents HMMs, and updating the population. Finally select the best neural network based on a fitness function.

  15. Improved hidden Markov model for nosocomial infections.

    Science.gov (United States)

    Khader, Karim; Leecaster, Molly; Greene, Tom; Samore, Matthew; Thomas, Alun

    2014-12-01

    We propose a novel hidden Markov model (HMM) for parameter estimation in hospital transmission models, and show that commonly made simplifying assumptions can lead to severe model misspecification and poor parameter estimates. A standard HMM that embodies two commonly made simplifying assumptions, namely a fixed patient count and binomially distributed detections is compared with a new alternative HMM that does not require these simplifying assumptions. Using simulated data, we demonstrate how each of the simplifying assumptions used by the standard model leads to model misspecification, whereas the alternative model results in accurate parameter estimates. © The Authors 2013. Published by Oxford University Press on behalf of the Institute of Mathematics and its Applications. All rights reserved.

  16. The elliptic genus and Hidden symmetry

    International Nuclear Information System (INIS)

    Jaffe, A.

    2001-01-01

    We study the elliptic genus (a partition function) in certain interacting, twist quantum field theories. Without twists, these theories have N=2 supersymmetry. The twists provide a regularization, and also partially break the supersymmetry. In spite of the regularization, one can establish a homotopy of the elliptic genus in a coupling parameter. Our construction relies on a priori estimates and other methods from constructive quantum field theory; this mathematical underpinning allows us to justify evaluating the elliptic genus at one endpoint of the homotopy. We obtain a version of Witten's proposed formula for the elliptic genus in terms of classical theta functions. As a consequence, the elliptic genus has a hidden SL(2,Z) symmetry characteristic of conformal theory, even though the underlying theory is not conformal. (orig.)

  17. Hidden conformal symmetry of extremal black holes

    International Nuclear Information System (INIS)

    Chen Bin; Long Jiang; Zhang Jiaju

    2010-01-01

    We study the hidden conformal symmetry of extremal black holes. We introduce a new set of conformal coordinates to write the SL(2,R) generators. We find that the Laplacian of the scalar field in many extremal black holes, including Kerr(-Newman), Reissner-Nordstrom, warped AdS 3 , and null warped black holes, could be written in terms of the SL(2,R) quadratic Casimir. This suggests that there exist dual conformal field theory (CFT) descriptions of these black holes. From the conformal coordinates, the temperatures of the dual CFTs could be read directly. For the extremal black hole, the Hawking temperature is vanishing. Correspondingly, only the left (right) temperature of the dual CFT is nonvanishing, and the excitations of the other sector are suppressed. In the probe limit, we compute the scattering amplitudes of the scalar off the extremal black holes and find perfect agreement with the CFT prediction.

  18. Exact solution of the hidden Markov processes

    Science.gov (United States)

    Saakian, David B.

    2017-11-01

    We write a master equation for the distributions related to hidden Markov processes (HMPs) and solve it using a functional equation. Thus the solution of HMPs is mapped exactly to the solution of the functional equation. For a general case the latter can be solved only numerically. We derive an exact expression for the entropy of HMPs. Our expression for the entropy is an alternative to the ones given before by the solution of integral equations. The exact solution is possible because actually the model can be considered as a generalized random walk on a one-dimensional strip. While we give the solution for the two second-order matrices, our solution can be easily generalized for the L values of the Markov process and M values of observables: We should be able to solve a system of L functional equations in the space of dimension M -1 .

  19. Social exclusion, health and hidden homelessness.

    Science.gov (United States)

    Watson, J; Crawley, J; Kane, D

    2016-10-01

    Homelessness and poverty are extreme forms of social exclusion which extend beyond the lack of physical or material needs. The purpose of this study was to explore and expand the concept of social exclusion within the social determinants of health perspective - to understand how the social environment, health behaviours and health status are associated with material and social deprivation. Fundamental qualitative description with tones of focused ethnography. Participants who identified as hidden homeless described their everyday living conditions and how these everyday conditions were impacted and influenced by their social environments, coping/health behaviours and current health status. Research Ethics Board approval was granted and informed consents were obtained from 21 participants prior to the completion of individual interviews. Qualitative content analysis examined the descriptions of men and women experiencing hidden homelessness. Participants described the 'lack of quality social interactions and supports' and their 'daily struggles of street life'. They also shared the 'pain of addiction' and how coping strategies influenced health. Participants were hopeful that their insights would 'better the health of homeless people' by helping shape public policy and funding of community resources that would reduce barriers and improve overall health. Health professionals who understand health behaviours as coping mechanisms for poor quality social environments can provide more comprehensive and holistic care. The findings of this study can be used to support the importance of housing as a key factor in the health and well-being of people experiencing poverty, homelessness and social exclusion; and consequently, reinforces the need for a national housing strategy. Copyright © 2016 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  20. Skyrmions with holography and hidden local symmetry

    International Nuclear Information System (INIS)

    Nawa, Kanabu; Hosaka, Atsushi; Suganuma, Hideo

    2009-01-01

    We study baryons as Skyrmions in holographic QCD with D4/D8/D8 multi-D brane system in type IIA superstring theory, and also in the nonlinear sigma model with hidden local symmetry. Comparing these two models, we find that the extra dimension and its nontrivial curvature can largely change the role of (axial) vector mesons for baryons in four-dimensional space-time. In the hidden local symmetry approach, the ρ-meson field as a massive Yang-Mills field has a singular configuration in Skyrmion, which gives a strong repulsion for the baryon as a stabilizer. When the a 1 meson is added in this approach, the stability of Skyrmion is lost by the cancellation of ρ and a 1 contributions. On the contrary, in holographic QCD, the ρ-meson field does not appear as a massive Yang-Mills field due to the extra dimension and its nontrivial curvature. We show that the ρ-meson field has a regular configuration in Skyrmion, which gives a weak attraction for the baryon in holographic QCD. We argue that Skyrmion with π, ρ, and a 1 mesons become stable due to the curved extra dimension and also the presence of the Skyrme term in holographic QCD. From this result, we also discuss the features of our truncated-resonance analysis on baryon properties with π and ρ mesons below the cutoff scale M KK ∼1 GeV in holographic QCD, which is compared with other 5D instanton analysis.

  1. Gammascintigraphy of metastases of the lymph nodes

    International Nuclear Information System (INIS)

    Mechev, D.S.; Shishkina, V.V.

    1985-01-01

    It was indicated that according to the degree of informative value all the methods used in this study can be listed as follows: the method of combined use of positive and negative scintigraphy, the method of positive scintigraphy with Ga 67 -citrate (the tymph nodes above the diagram) and Tc 99 -pertechnate (the lymph nodes below the diaphragm), the method of indirect radionuclide lymphography with colloids. The main indices of radionuclide methods in the diagnosis of the lymph node metastatic involvement are presented

  2. The complex network reliability and influential nodes

    Science.gov (United States)

    Li, Kai; He, Yongfeng

    2017-08-01

    In order to study the complex network node important degree and reliability, considering semi-local centrality, betweenness centrality and PageRank algorithm, through the simulation method to gradually remove nodes and recalculate the importance in the random network, small world network and scale-free network. Study the relationship between the largest connected component and node removed proportion, the research results show that betweenness centrality and PageRank algorithm based on the global information network are more effective for evaluating the importance of nodes, and the reliability of the network is related to the network topology.

  3. Hidden gauge structure of supersymmetric free differential algebras

    Energy Technology Data Exchange (ETDEWEB)

    Andrianopoli, Laura [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy); D’Auria, Riccardo [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); Ravera, Lucrezia [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy)

    2016-08-16

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q{sup ′} introduced in http://dx.doi.org/10.1016/0550-3213(82)90376-5 and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B{sup (2)} and B{sup (3)} in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of two nilpotent fermionic generators in the hidden algebra. We propose that our approach, where all the invariances of the FDA are expressed as Lie derivatives of the p-forms in the hidden supergroup manifold, could be an appropriate framework to discuss theories defined in enlarged versions of superspace recently considered in the literature, such us double field theory and its generalizations.

  4. Sentinel node concept in breast cancer

    Energy Technology Data Exchange (ETDEWEB)

    Kiricuta, I.C. [St. Vincenz-Hospital, Limburg (Germany). Inst. for Radiation Oncology

    2000-07-01

    Background/purpose: It seems that there exists a specific lymph node center called sentinel node (SN) which appears to be the primary site of metastases. The sentinel node concept (SNC) is fundamentally based on the orderly progression of tumor cells within the lymphatic system. It is the most important new concept in surgical and radiation oncology. The purpose is to present the biological significance, the diagnostic and clinical basis of the sentinel node concept in breast cancer patients. Material and methods: Lymphoscintigraphy and gamma probe biopsy is necessary to show predictable lymph flow to the regional sentinel node, to multiple sentinel nodes or unpredictable lymph flow to extra-regional sentinel nodes and for performing sentinel node procedure. The standard protocol for the evaluation of the sentinel node metastases consists of extensive histopathological investigation including step Hematoxylin and Eosin (H and E) stained sections and immunohistochemistry. Results: A high rate of success of the identification of the sentinel node for breast cancer was reported. The presence or absence of metastasis in this node is a very accurate predictor of overall nodal status. The temptation to examine the sentinel node with the greatest possible degree of accuracy highlights one of the major problems related to sentinel node biopsy. The success of the sentinel node procedure depends primarily on the adequate functional capacity necessary for sufficient uptake to ensure the accurate identification. In negative sentinel-node patients a complete axillary lymph node dissection is avoidable. In sentinel-node positive patients and clinically negative patients a postoperative radiotherapy would permit an adequate tumor control. The last 2-procedures permit a low morbidity. In the actual TNM classification it was recently introduced a definition of a 'pN0' patient based on sentinel node biopsy. New target volumes are defined for adjuvant radiotherapy or

  5. Prediction of Cascading Collapse Occurrence due to the Effect of Hidden Failure of a Protection System using Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    Nor Hazwani Idris

    2017-06-01

    Full Text Available Transmission line act as a medium of transportation for electrical energy from a power station to the consumer. There are many factors that could cause the cascading collapse such as instability of voltage and frequency, the change of environment and weather, the software and operator error and also the failure in protection system. Protection system plays an important function in maintaining the stability and reliability of the power grid. Hidden failures in relay protection systems are the primary factors for triggering the cascading collapse. This paper presents an Artificial Neural Network (ANN model for prediction of cascading collapse occurrence due to the effect of hidden failure of protection system. The ANN model has been developed through the normalized training and testing data process with optimum number of hidden layer, the momentum rate and the learning rate. The ANN model employs probability of hidden failure, random number of line limit power flow and exposed line as its input while trip index of cascading collapse occurrence as its output. IEEE 14 bus system is used in this study to illustrate the proposed approach. The performance of the results is analysed in terms of its Mean Square Error (MSE and Correlation Coefficient (R. The results show the ANN model produce reliable prediction of cascading collapse occurrence.

  6. Sociocultural Dimension of Hidden Content in a Professional Language Curriculum

    Directory of Open Access Journals (Sweden)

    Ekaterina E. Shishlova

    2017-12-01

    Full Text Available Introduction: studying curriculum as a pedagogical problem has traditionally been reduced to the analysis of its explicit content, set in official educational documents. However, a much less studied hidden content plays a significant role in education. So, what is the role of the hidden curriculum during professional language training? The purpose of the article is to determine the potential impact of hidden curriculum on students’ conceptual worldview. Comparing the worldview presented in textbooks with students’ one has allowed us to estimate the rate of influence of hidden curr iculum. Materials and Methods: the methodological basis of the work is the cultural concept of personalityoriented education. The methodology for studying the role of hidden curriculum includes four stages: at the first stage, the authors set the criteria for selecting textbooks for analysis and do the selection; at the second stage, the authors select sociocultural concepts for analysis; at the third stage, the scheme of analysis is designed and the analysis of textbooks is done; at the fourth stage, the authors identify the potential influence of hidden curriculum on students’ conceptual worldview. Results: the structure of hidden curriculum has been determined and the scheme for analysing its subject component has been developed. The authors have identified a significant influence of hidden curriculum on students’ worldview, which represents the scientific novelty of the article. Discussion and Conclusions: the article gives the definition of a hidden curriculum which is new for Russian pedagogy and presents a methodology for its analysis in EFL textbooks. That analysis is recommended to be conducted when selecting teaching materials both i n languages and other humanities.

  7. Sentinel Node Biopsy Alone versus Completion Axillary Node Dissection in Node Positive Breast Cancer: Systematic Review and Meta-Analysis

    Directory of Open Access Journals (Sweden)

    Rachna Ram

    2014-01-01

    Full Text Available Introduction. There has been recent interest in validity of completion axillary node dissection after a positive sentinel node. This systematic review aims to ascertain if sentinel lymph node dissection alone was noninferior to axillary lymph node dissection for breast cancer patients who have a positive sentinel node. Method. A systematic review of the electronic databases Embase, MEDLINE, and Cochrane Register of Controlled Trials was carried out. Only randomised trials that had patients with positive sentinel node as the study sample were included in the meta-analysis using the reported hazard ratios with a fixed effect model. Results. Three randomised controlled trials and five retrospective studies were identified. The pooled effect for overall survival was HR 0.94, 95% CI [0.79, 1.19], and for disease free survival was HR 0.83, 95% CI [0.60, 1.14]. The reported rates for locoregional recurrence were similar in both groups. The surgical morbidity was found to be significantly more in patients who had underwent axillary dissection. Conclusion. Amongst patients with micrometastasis in the sentinel node, no further axillary dissection is necessary. For patients with macrometastasis in the sentinel node, it is reasonable to consider omitting axillary dissection to avoid the morbidity of the procedure.

  8. Update on hidden sectors with dark forces and dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-11-15

    Recently there has been much interest in hidden sectors, especially in the context of dark matter and ''dark forces'', since they are a common feature of beyond standard model scenarios like string theory and SUSY and additionally exhibit interesting phenomenological aspects. Various laboratory experiments place limits on the so-called hidden photon and continuously further probe and constrain the parameter space; an updated overview is presented here. Furthermore, for several hidden sector models with light dark matter we study the viability with respect to the relic abundance and direct detection experiments.

  9. Hidden photon dark matter search with large metallic mirror

    International Nuclear Information System (INIS)

    Doebrich, Babette; Lindner, Axel; Daumiller, Kai; Engel, Ralph; Roth, Markus; Kowalski, Marek

    2014-10-01

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  10. Naturally light hidden photons in LARGE volume string compactifications

    International Nuclear Information System (INIS)

    Goodsell, M.; Jaeckel, J.; Redondo, J.; Ringwald, A.

    2009-09-01

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  11. Hidden Area and Mechanical Nonlinearities in Freestanding Graphene

    Science.gov (United States)

    Nicholl, Ryan J. T.; Lavrik, Nickolay V.; Vlassiouk, Ivan; Srijanto, Bernadeta R.; Bolotin, Kirill I.

    2017-06-01

    We investigated the effect of out-of-plane crumpling on the mechanical response of graphene membranes. In our experiments, stress was applied to graphene membranes using pressurized gas while the strain state was monitored through two complementary techniques: interferometric profilometry and Raman spectroscopy. By comparing the data obtained through these two techniques, we determined the geometric hidden area which quantifies the crumpling strength. While the devices with hidden area ˜0 % obeyed linear mechanics with biaxial stiffness 428 ±10 N /m , specimens with hidden area in the range 0.5%-1.0% were found to obey an anomalous nonlinear Hooke's law with an exponent ˜0.1 .

  12. Context Tree Estimation in Variable Length Hidden Markov Models

    OpenAIRE

    Dumont, Thierry

    2011-01-01

    We address the issue of context tree estimation in variable length hidden Markov models. We propose an estimator of the context tree of the hidden Markov process which needs no prior upper bound on the depth of the context tree. We prove that the estimator is strongly consistent. This uses information-theoretic mixture inequalities in the spirit of Finesso and Lorenzo(Consistent estimation of the order for Markov and hidden Markov chains(1990)) and E.Gassiat and S.Boucheron (Optimal error exp...

  13. Local models and hidden nonlocality in Quantum Theory

    OpenAIRE

    Guerini, Leonardo

    2014-01-01

    This Master's thesis has two central subjects: the simulation of correlations generated by local measurements on entangled quantum states by local hidden-variables models and the revelation of hidden nonlocality. We present and detail the Werner's local model and the hidden nonlocality of some Werner states of dimension $d\\geq5$, the Gisin-Degorre's local model for a Werner state of dimension $d=2$ and the local model of Hirsch et al. for mixtures of the singlet state and noise, all of them f...

  14. Suppressing the QCD axion abundance by hidden monopoles

    International Nuclear Information System (INIS)

    Kawasaki, Masahiro

    2015-11-01

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10 12 GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  15. Penile Cancer: Contemporary Lymph Node Management.

    Science.gov (United States)

    O'Brien, Jonathan S; Perera, Marlon; Manning, Todd; Bozin, Mike; Cabarkapa, Sonja; Chen, Emily; Lawrentschuk, Nathan

    2017-06-01

    In penile cancer, the optimal diagnostics and management of metastatic lymph nodes are not clear. Advances in minimally invasive staging, including dynamic sentinel lymph node biopsy, have widened the diagnostic repertoire of the urologist. We aimed to provide an objective update of the recent trends in the management of penile squamous cell carcinoma, and inguinal and pelvic lymph node metastases. We systematically reviewed several medical databases, including the Web of Science® (with MEDLINE®), Embase® and Cochrane databases, according to PRISMA (Preferred Reporting Items for Systematic Review and Meta-Analyses) guidelines. The search terms used were penile cancer, lymph node, sentinel node, minimally invasive, surgery and outcomes, alone and in combination. Articles pertaining to the management of lymph nodes in penile cancer were reviewed, including original research, reviews and clinical guidelines published between 1980 and 2016. Accurate and minimally invasive lymph node staging is of the utmost importance in the surgical management of penile squamous cell carcinoma. In patients with clinically node negative disease, a growing body of evidence supports the use of sentinel lymph node biopsies. Dynamic sentinel lymph node biopsy exposes the patient to minimal risk, and results in superior sensitivity and specificity profiles compared to alternate nodal staging techniques. In the presence of locoregional disease, improvements in inguinal or pelvic lymphadenectomy have reduced morbidity and improved oncologic outcomes. A multimodal approach of chemotherapy and surgery has demonstrated a survival benefit for patients with advanced disease. Recent developments in lymph node management have occurred in penile cancer, such as minimally invasive lymph node diagnosis and intervention strategies. These advances have been met with a degree of controversy in the contemporary literature. Current data suggest that dynamic sentinel lymph node biopsy provides excellent

  16. Enhancement characteristics of retroperitoneal lymphomatous lymph nodes

    International Nuclear Information System (INIS)

    Hagtvedt, Trond; Smith, Hans-Joergen; Kolbenstvedt, Alf; Aaloekken, Trond Mogens; Graff, Bjoern Anton; Holte, Harald

    2013-01-01

    Background: Previous studies of CT enhancement of lymphomatous lymph nodes (LLN) of the neck and the mediastinum showed that the LLN had lower enhancement values than normal lymph nodes. Purpose: To elucidate the contrast medium enhancement curves of LLN in the retroperitoneum by comparing the curves of LLN with those of normal lymph nodes, to test whether differences between these curves could be of diagnostic value, and to compare the present enhancement curves of LLN of the retroperitoneum with the curves of LLN of the neck and the mediastinum from previous similar investigations. Material and Methods: Twenty-eight consecutive patients with LLN of the retroperitoneum (three with Hodgkin's lymphoma [HL]) and 21 control patients with sarcomas and thus presumably normal retroperitoneal nodes underwent dynamic CT examinations. The previous, similar investigation of lymph nodes of the neck comprised 28 patients with LLN and the investigation of mediastinal lymph nodes comprised 24 patients with LLN. Results: The enhancement curves of the retroperitoneal LLN had significantly lower attenuation than those of the retroperitoneal control nodes. A combination of peak contrast value and time to peak adjusted to total body weight yielded a diagnostic accuracy which at the best showed a sensitivity of 90.5% with a specificity of 82.6%. The LLN of the retroperitoneum had higher attenuation values than corresponding nodes of the mediastinum but no significant difference was found between LLN of the retroperitoneum and LLN of the neck in previous similar investigations. Conclusion: The comparison of enhancement curves of retroperitoneal LLN with retroperitoneal control nodes showed a marked similarity with and substantiates our previous findings in lymph nodes of the neck and of the mediastinum. The best diagnostic accuracy was achieved by combining the parameters peak contrast value and time to peak and adjusting these values to the body weight. Peak enhancement of the

  17. The Hidden Flow Structure and Metric Space of Network Embedding Algorithms Based on Random Walks.

    Science.gov (United States)

    Gu, Weiwei; Gong, Li; Lou, Xiaodan; Zhang, Jiang

    2017-10-13

    Network embedding which encodes all vertices in a network as a set of numerical vectors in accordance with it's local and global structures, has drawn widespread attention. Network embedding not only learns significant features of a network, such as the clustering and linking prediction but also learns the latent vector representation of the nodes which provides theoretical support for a variety of applications, such as visualization, link prediction, node classification, and recommendation. As the latest progress of the research, several algorithms based on random walks have been devised. Although those algorithms have drawn much attention for their high scores in learning efficiency and accuracy, there is still a lack of theoretical explanation, and the transparency of those algorithms has been doubted. Here, we propose an approach based on the open-flow network model to reveal the underlying flow structure and its hidden metric space of different random walk strategies on networks. We show that the essence of embedding based on random walks is the latent metric structure defined on the open-flow network. This not only deepens our understanding of random- walk-based embedding algorithms but also helps in finding new potential applications in network embedding.

  18. On Prolonging Network Lifetime through Load-Similar Node Deployment in Wireless Sensor Networks

    Science.gov (United States)

    Li, Qiao-Qin; Gong, Haigang; Liu, Ming; Yang, Mei; Zheng, Jun

    2011-01-01

    This paper is focused on the study of the energy hole problem in the Progressive Multi-hop Rotational Clustered (PMRC)-structure, a highly scalable wireless sensor network (WSN) architecture. Based on an analysis on the traffic load distribution in PMRC-based WSNs, we propose a novel load-similar node distribution strategy combined with the Minimum Overlapping Layers (MOL) scheme to address the energy hole problem in PMRC-based WSNs. In this strategy, sensor nodes are deployed in the network area according to the load distribution. That is, more nodes shall be deployed in the range where the average load is higher, and then the loads among different areas in the sensor network tend to be balanced. Simulation results demonstrate that the load-similar node distribution strategy prolongs network lifetime and reduces the average packet latency in comparison with existing nonuniform node distribution and uniform node distribution strategies. Note that, besides the PMRC structure, the analysis model and the proposed load-similar node distribution strategy are also applicable to other multi-hop WSN structures. PMID:22163809

  19. Localized Lymph Node Light Chain Amyloidosis

    Directory of Open Access Journals (Sweden)

    Binod Dhakal

    2015-01-01

    Full Text Available Immunoglobulin-derived light chain amyloidosis can occasionally be associated with localized disease. We present a patient with localized lymph node light chain amyloidosis without an underlying monoclonal protein or lymphoproliferative disorder and review the literature of lymph node amyloidosis discussing work-up and risk factors for systemic progression.

  20. Sentinel lymph node identification with magnetic nanoparticles

    NARCIS (Netherlands)

    Pouw, Joost Jacob

    2016-01-01

    Most solid malignancies have a tendency to spread through the lymphatic system to locoregional lymph nodes. Presence of metastasis is an important prognostic factor, and is used to determine the optimal treatment of the patient. The sentinel lymph nodes (SLNs) receive direct lymphatic drainage from

  1. Testnodes: a Lightweight node-testing infrastructure

    International Nuclear Information System (INIS)

    Fay, R; Bland, J

    2014-01-01

    A key aspect of ensuring optimum cluster reliability and productivity lies in keeping worker nodes in a healthy state. Testnodes is a lightweight node testing solution developed at Liverpool. While Nagios has been used locally for general monitoring of hosts and services, Testnodes is optimised to answer one question: is there any reason this node should not be accepting jobs? This tight focus enables Testnodes to inspect nodes frequently with minimal impact and provide a comprehensive and easily extended check with each inspection. On the server side, Testnodes, implemented in python, interoperates with the Torque batch server to control the nodes production status. Testnodes remotely and in parallel executes client-side test scripts and processes the return codes and output, adjusting the node's online/offline status accordingly to preserve the integrity of the overall batch system. Testnodes reports via log, email and Nagios, allowing a quick overview of node status to be reviewed and specific node issues to be identified and resolved quickly. This presentation will cover testnodes design and implementation, together with the results of its use in production at Liverpool, and future development plans.

  2. Contrast enhanced ultrasound of sentinel lymph nodes

    Directory of Open Access Journals (Sweden)

    XinWu Cui

    2013-03-01

    Full Text Available Sentinel lymph nodes are the first lymph nodes in the region that receive lymphatic drainage from a primary tumor. The detection or exclusion of sentinel lymph node micrometastases is critical in the staging of cancer, especially breast cancer and melanoma because it directly affects patient’s prognosis and surgical management. Currently, intraoperative sentinel lymph node biopsies using blue dye and radioisotopes are the method of choice for the detection of sentinel lymph node with high identification rate. In contrast, conventional ultrasound is not capable of detecting sentinel lymph nodes in most cases. Contrast enhanced ultrasound with contrast specific imaging modes has been used for the evaluation and diagnostic work-up of peripherally located suspected lymphadenopathy. The method allows for real-time analysis of all vascular phases and the visualization of intranodal focal “avascular” areas that represent necrosis or deposits of neoplastic cells. In recent years, a number of animal and human studies showed that contrast enhanced ultrasound can be also used for the detection of sentinel lymph node, and may become a potential application in clinical routine. Several contrast agents have been used in those studies, including albumin solution, hydroxyethylated starch, SonoVue®, Sonazoid® and Definity®. This review summarizes the current knowledge about the use of ultrasound techniques in detection and evaluation of sentinel lymph node.

  3. High Energy Colliders and Hidden Sectors

    Science.gov (United States)

    Dror, Asaf Jeff

    This thesis explores two dominant frontiers of theoretical physics, high energy colliders and hidden sectors. The Large Hadron Collider (LHC) is just starting to reach its maximum operational capabilities. However, already with the current data, large classes of models are being put under significant pressure. It is crucial to understand whether the (thus far) null results are a consequence of a lack of solution to the hierarchy problem around the weak scale or requires expanding the search strategy employed at the LHC. It is the duty of the current generation of physicists to design new searches to ensure that no stone is left unturned. To this end, we study the sensitivity of the LHC to the couplings in the Standard Model top sector. We find it can significantly improve the measurements on ZtRtR coupling by a novel search strategy, making use of an implied unitarity violation in such models. Analogously, we show that other couplings in the top sector can also be measured with the same technique. Furthermore, we critically analyze a set of anomalies in the LHC data and how they may appear from consistent UV completions. We also propose a technique to measure lifetimes of new colored particles with non-trivial spin. While the high energy frontier will continue to take data, it is likely the only collider of its kind for the next couple decades. On the other hand, low-energy experiments have a promising future with many new proposed experiments to probe the existence of particles well below the weak scale but with small couplings to the Standard Model. In this work we survey the different possibilities, focusingon the constraints as well as possible new hidden sector dynamics. In particular, we show that vector portals which couple to an anomalous current, e.g., baryon number, are significantly constrained from flavor changing meson decays and rare Z decays. Furthermore, we present a new mechanism for dark matter freezeout which depletes the dark sector through an

  4. Alleviating hidden hunger. Approaches that work

    International Nuclear Information System (INIS)

    Kennedy, E.; Mannar, V.; Iyengar, V.

    2003-01-01

    The world has come a long way in understanding the nature, magnitude and range of solutions to micronutrient malnutrition - often called 'hidden hunger'. The most sustainable solutions - that is those that are likely to be maintained in the long term - almost surely will include food-based approaches including diet diversity, food fortification and biofortification. Food fortification and biofortification could be some of the most cost-effective of all public health interventions and thus within the economic reach of even the world's poorest. In order to implement them in a sustainable manner, a combination of technical, operational, economic, behavioural and political factors need to be addressed. In some ways the technological issues are the easiest. Because of attention to research, we now have a variety of ways for both single and multiple micronutrients to reach the target population. We also know what is needed in order to ensure delivery systems. The key factor for continued success in reducing micronutrient malnutrition through fortification is a political commitment at the national and international level and creating effective public-private partnerships at the national level. The payoff for eliminating hidden hunger through nutrient fortification is enormous and few other public health interventions offer such a promising health, nutrition and economic success story. Nuclear and isotopic techniques are valuable tools in helping to meet the multifaceted challenges posed by nutritional disorders affecting the entire human life span (embryonic to elderly). Among the numerous applications available, isotopic techniques are uniquely well suited for targeting and tracking progress in food and nutrition development programmes (See box: How Nutrients are Tracked). These include: use of the stable isotopes of iron (Fe) and zinc (Zn) as a kind of gold standard in studies of their bioavailability from foods; trace element bioavailability and pool sizes for

  5. Advanced CMOS device technologies for 45 nm node and below

    Directory of Open Access Journals (Sweden)

    A. Veloso, T. Hoffmann, A. Lauwers, H. Yu, S. Severi, E. Augendre, S. Kubicek, P. Verheyen, N. Collaert, P. Absil, M. Jurczak and S. Biesemans

    2007-01-01

    Full Text Available We review and discuss the latest developments and technology options for 45 nm node and below, with scaled planar bulk MOSFETs and MuGFETs as emerging devices. One of the main metal gate (MG candidates for scaled CMOS technologies are fully silicided (FUSI gates. In this work, by means of a selective and controlled poly etch-back integration process, dual work-function Ni-based FUSI/HfSiON CMOS circuits with record ring oscillator performance (high-VT are reported (17 ps at VDD=1.1 V and 20 pA/μm Ioff, meeting the ITRS 45 nm node requirement for low-power (LP CMOS. Compatibility of FUSI and other MG with known stress boosters like stressed CESL (contact-etch-stop-layer with high intrinsic stress or embedded SiGe in the pMOS S/D regions is validated. To obtain MuGFET devices that are competitive, as compared to conventional planar bulk devices, and that meet the stringent drive and leakage current requirements for the 32 nm node and beyond, higher channel mobilities are required. Results obtained by several strain engineering methods are presented here.

  6. Sentinel lymph node imaging in breast cancer

    International Nuclear Information System (INIS)

    Kim, Byung Tae

    1999-01-01

    Currently, dissection of the axillary or regional lymph nodes is considered the standard staging procedure in breast cancer. However, accumulating evidence is becoming available that the sentinel node concept may provide the same or even better staging information. In the case of melanoma, it is proven that the histological characteristics of the sentinel node reflect the histological characteristics of the distal part of the lymphatic basin. Morbidity can be reduced significantly by the use of sentinel node dissection as several authors have reported successful introduction of this technique into clinical practice. But in breast cancer patients, there are significant differences in practice relating to the technology, such as radiopharmaceuticals, injection sites, volume of injectate, combination with vital blue dye, preoperative lymphoscintigraphy, etc. Valuable reports on these topics appeared in recent journals. This review is a summary of those reports for nuclear physicians interested in sentinel node detection by lymphoscintigraphy in breast cancer patients

  7. Prediction of Annual Rainfall Pattern Using Hidden Markov Model ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Hidden Markov model is very influential in stochastic world because of its ... the earth from the clouds. The usual ... Rainfall modelling and ... Markov Models have become popular tools ... environment sciences, University of Jos, plateau state,.

  8. New limits on hidden photons from past electron beam dumps

    International Nuclear Information System (INIS)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-01

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  9. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  10. Cosmological abundance of the QCD axion coupled to hidden photons

    Science.gov (United States)

    Kitajima, Naoya; Sekiguchi, Toyokazu; Takahashi, Fuminobu

    2018-06-01

    We study the cosmological evolution of the QCD axion coupled to hidden photons. For a moderately strong coupling, the motion of the axion field leads to an explosive production of hidden photons by tachyonic instability. We use lattice simulations to evaluate the cosmological abundance of the QCD axion. In doing so, we incorporate the backreaction of the produced hidden photons on the axion dynamics, which becomes significant in the non-linear regime. We find that the axion abundance is suppressed by at most O (102) for the decay constant fa =1016GeV, compared to the case without the coupling. For a sufficiently large coupling, the motion of the QCD axion becomes strongly damped, and as a result, the axion abundance is enhanced. Our results show that the cosmological upper bound on the axion decay constant can be relaxed by a few hundred for a certain range of the coupling to hidden photons.

  11. Dopamine reward prediction errors reflect hidden state inference across time

    Science.gov (United States)

    Starkweather, Clara Kwon; Babayan, Benedicte M.; Uchida, Naoshige; Gershman, Samuel J.

    2017-01-01

    Midbrain dopamine neurons signal reward prediction error (RPE), or actual minus expected reward. The temporal difference (TD) learning model has been a cornerstone in understanding how dopamine RPEs could drive associative learning. Classically, TD learning imparts value to features that serially track elapsed time relative to observable stimuli. In the real world, however, sensory stimuli provide ambiguous information about the hidden state of the environment, leading to the proposal that TD learning might instead compute a value signal based on an inferred distribution of hidden states (a ‘belief state’). In this work, we asked whether dopaminergic signaling supports a TD learning framework that operates over hidden states. We found that dopamine signaling exhibited a striking difference between two tasks that differed only with respect to whether reward was delivered deterministically. Our results favor an associative learning rule that combines cached values with hidden state inference. PMID:28263301

  12. Optimisation of Hidden Markov Model using Baum–Welch algorithm ...

    Indian Academy of Sciences (India)

    The present work is a part of development of Hidden Markov Model. (HMM) based ... the Himalaya. In this work, HMMs have been developed for forecasting of maximum and minimum ..... data collection teams of Snow and Avalanche Study.

  13. On the LHC sensitivity for non-thermalised hidden sectors

    Science.gov (United States)

    Kahlhoefer, Felix

    2018-04-01

    We show under rather general assumptions that hidden sectors that never reach thermal equilibrium in the early Universe are also inaccessible for the LHC. In other words, any particle that can be produced at the LHC must either have been in thermal equilibrium with the Standard Model at some point or must be produced via the decays of another hidden sector particle that has been in thermal equilibrium. To reach this conclusion, we parametrise the cross section connecting the Standard Model to the hidden sector in a very general way and use methods from linear programming to calculate the largest possible number of LHC events compatible with the requirement of non-thermalisation. We find that even the HL-LHC cannot possibly produce more than a few events with energy above 10 GeV involving states from a non-thermalised hidden sector.

  14. Risk from the frontlines of a hidden epidemic sexuality, masculinities ...

    African Journals Online (AJOL)

    Risk from the frontlines of a hidden epidemic sexuality, masculinities and social pressures ... It frames risk in the context of the dynamics governing sexuality, underlined ... MSM risk and practice, in these contexts, are consequently shaped by ...

  15. New limits on hidden photons from past electron beam dumps

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-15

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  16. Thermal imaging method to visualize a hidden painting thermally excited by far infrared radiations

    Science.gov (United States)

    Davin, T.; Wang, X.; Chabane, A.; Pawelko, R.; Guida, G.; Serio, B.; Hervé, P.

    2015-06-01

    The diagnosis of hidden painting is a major issue for cultural heritage. In this paper, a non-destructive active infrared thermographic technique was considered to reveal paintings covered by a lime layer. An extended infrared spectral range radiation was used as the excitation source. The external long wave infrared energy source delivered to the surface is then propagated through the material until it encounters a painting zone. Due to several thermal effects, the sample surface then presents non-uniformity patterns. Using a high sensitive infrared camera, the presence of covered pigments can thus be highlighted by the analysis of the non-stationary phenomena. Reconstituted thermal contrast images of mural samples covered by a lime layer are shown.

  17. A Novel Method for Decoding Any High-Order Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Fei Ye

    2014-01-01

    Full Text Available This paper proposes a novel method for decoding any high-order hidden Markov model. First, the high-order hidden Markov model is transformed into an equivalent first-order hidden Markov model by Hadar’s transformation. Next, the optimal state sequence of the equivalent first-order hidden Markov model is recognized by the existing Viterbi algorithm of the first-order hidden Markov model. Finally, the optimal state sequence of the high-order hidden Markov model is inferred from the optimal state sequence of the equivalent first-order hidden Markov model. This method provides a unified algorithm framework for decoding hidden Markov models including the first-order hidden Markov model and any high-order hidden Markov model.

  18. Sentinel lymph node biopsy: clinical relevance

    International Nuclear Information System (INIS)

    Howman-Giles, R.

    2002-01-01

    Sentinel lymph node biopsy (SLNB) has become an important technique in the management of patients with intermediate level melanoma, clinical operable breast cancer and some other cancers. The technique relies on lymphatic mapping to define the lymph drainage from a primary tumour with the premise that the lymph nodes, which directly drain from that area, will reflect the tumour status of the remainder of the node field. Current techniques use lymphoscintigraphy where a radioactive labelled particle and / or blue dye are injected intradermally or intraparenchymally to map the lymph drainage, often in conjunction with a radioactive gamma probe at surgery. In patients with melanoma the SLNB has improved the staging and prognostic information by more accurate determination of whether regional lymph nodes have metastatic spread. This has a major impact on patient management as those patients with negative nodes do not require regional lymph node dissection and have a significantly better prognosis. In our experience of over 3000 patients the combined sentinel node biopsy technique localised accurately 98% of sentinel lymph nodes. Lymphoscintigraphy in patients with melanoma to locate the sentinel lymph nodes involves the intradermal injection of a radiocolloid around the melanoma site or the excision biopsy site. Injections of 5 -10 MBq in 0.05-0.1ml/inj are used and typically 4 injections are usually required. Following tracer injection dynamic imaging is performed to follow the lymphatic collecting vessels until they reach the draining sentinel nodes. An image should be acquired as the vessels reach the node field so that the sentinel nodes directly receiving the channels can be identified and distinguished from any second tier nodes which may sometimes be seen. Delayed scans are performed 2 hours later at which time all regions which can possible drain the primary melanoma site are examined with 5-10 minute static images. The surface location of all sentinel nodes is

  19. A two particle hidden sector and the oscillations with photons

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Pedro D. [Universidad de Antofagasta, Departamento de Fisica, Antofagasta (Chile); Arias, Paola; Maldonado, Carlos [Universidad de Santiago de Chile, Departmento de Fisica, Santiago (Chile)

    2018-01-15

    We present a detailed study of the oscillations and optical properties for vacuum, in a model for the dark sector that contains axion-like particles and hidden photons. We provide bounds for the couplings versus the mass, using current results from ALPS-I and PVLAS. We also discuss the challenges for the detection of models with more than one hidden particle in light shining trough wall-like experiments. (orig.)

  20. Rare Z boson decays to a hidden sector

    Science.gov (United States)

    Blinov, Nikita; Izaguirre, Eder; Shuve, Brian

    2018-01-01

    We demonstrate that rare decays of the Standard Model Z boson can be used to discover and characterize the nature of new hidden-sector particles. We propose new searches for these particles in soft, high-multiplicity leptonic final states at the Large Hadron Collider. The proposed searches are sensitive to low-mass particles produced in Z decays, and we argue that these striking signatures can shed light on the hidden-sector couplings and mechanism for mass generation.

  1. Anticipating hidden text salting in emails (extended abstract)

    OpenAIRE

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  2. Hidden twelve-dimensional super Poincare symmetry in eleven dimensions

    International Nuclear Information System (INIS)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2004-01-01

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional super Poincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven-dimensional superparticle, taken off-shell, we discover a hidden twelve-dimensional super Poincare symmetry that governs the theory

  3. Hidden charged dark matter and chiral dark radiation

    Science.gov (United States)

    Ko, P.; Nagata, Natsumi; Tang, Yong

    2017-10-01

    In the light of recent possible tensions in the Hubble constant H0 and the structure growth rate σ8 between the Planck and other measurements, we investigate a hidden-charged dark matter (DM) model where DM interacts with hidden chiral fermions, which are charged under the hidden SU(N) and U(1) gauge interactions. The symmetries in this model assure these fermions to be massless. The DM in this model, which is a Dirac fermion and singlet under the hidden SU(N), is also assumed to be charged under the U(1) gauge symmetry, through which it can interact with the chiral fermions. Below the confinement scale of SU(N), the hidden quark condensate spontaneously breaks the U(1) gauge symmetry such that there remains a discrete symmetry, which accounts for the stability of DM. This condensate also breaks a flavor symmetry in this model and Nambu-Goldstone bosons associated with this flavor symmetry appear below the confinement scale. The hidden U(1) gauge boson and hidden quarks/Nambu-Goldstone bosons are components of dark radiation (DR) above/below the confinement scale. These light fields increase the effective number of neutrinos by δNeff ≃ 0.59 above the confinement scale for N = 2, resolving the tension in the measurements of the Hubble constant by Planck and Hubble Space Telescope if the confinement scale is ≲1 eV. DM and DR continuously scatter with each other via the hidden U(1) gauge interaction, which suppresses the matter power spectrum and results in a smaller structure growth rate. The DM sector couples to the Standard Model sector through the exchange of a real singlet scalar mixing with the Higgs boson, which makes it possible to probe our model in DM direct detection experiments. Variants of this model are also discussed, which may offer alternative ways to investigate this scenario.

  4. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  5. Hidden Structural Codes in Protein Intrinsic Disorder.

    Science.gov (United States)

    Borkosky, Silvia S; Camporeale, Gabriela; Chemes, Lucía B; Risso, Marikena; Noval, María Gabriela; Sánchez, Ignacio E; Alonso, Leonardo G; de Prat Gay, Gonzalo

    2017-10-17

    Intrinsic disorder is a major structural category in biology, accounting for more than 30% of coding regions across the domains of life, yet consists of conformational ensembles in equilibrium, a major challenge in protein chemistry. Anciently evolved papillomavirus genomes constitute an unparalleled case for sequence to structure-function correlation in cases in which there are no folded structures. E7, the major transforming oncoprotein of human papillomaviruses, is a paradigmatic example among the intrinsically disordered proteins. Analysis of a large number of sequences of the same viral protein allowed for the identification of a handful of residues with absolute conservation, scattered along the sequence of its N-terminal intrinsically disordered domain, which intriguingly are mostly leucine residues. Mutation of these led to a pronounced increase in both α-helix and β-sheet structural content, reflected by drastic effects on equilibrium propensities and oligomerization kinetics, and uncovers the existence of local structural elements that oppose canonical folding. These folding relays suggest the existence of yet undefined hidden structural codes behind intrinsic disorder in this model protein. Thus, evolution pinpoints conformational hot spots that could have not been identified by direct experimental methods for analyzing or perturbing the equilibrium of an intrinsically disordered protein ensemble.

  6. Dietary phytate, zinc and hidden zinc deficiency.

    Science.gov (United States)

    Sandstead, Harold H; Freeland-Graves, Jeanne H

    2014-10-01

    Epidemiological data suggest at least one in five humans are at risk of zinc deficiency. This is in large part because the phytate in cereals and legumes has not been removed during food preparation. Phytate, a potent indigestible ligand for zinc prevents it's absorption. Without knowledge of the frequency of consumption of foods rich in phytate, and foods rich in bioavailable zinc, the recognition of zinc deficiency early in the illness may be difficult. Plasma zinc is insensitive to early zinc deficiency. Serum ferritin concentration≤20μg/L is a potential indirect biomarker. Early effects of zinc deficiency are chemical, functional and may be "hidden". The clinical problem is illustrated by 2 studies that involved US Mexican-American children, and US premenopausal women. The children were consuming home diets that included traditional foods high in phytate. The premenopausal women were not eating red meat on a regular basis, and their consumption of phytate was mainly from bran breakfast cereals. In both studies the presence of zinc deficiency was proven by functional responses to controlled zinc treatment. In the children lean-mass, reasoning, and immunity were significantly affected. In the women memory, reasoning, and eye-hand coordination were significantly affected. A screening self-administered food frequency questionnaire for office might help caregiver's identify patients at risk of zinc deficiency. Copyright © 2014 Elsevier GmbH. All rights reserved.

  7. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  8. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  9. Gauging hidden symmetries in two dimensions

    International Nuclear Information System (INIS)

    Samtleben, Henning; Weidner, Martin

    2007-01-01

    We initiate the systematic construction of gauged matter-coupled supergravity theories in two dimensions. Subgroups of the affine global symmetry group of toroidally compactified supergravity can be gauged by coupling vector fields with minimal couplings and a particular topological term. The gauge groups typically include hidden symmetries that are not among the target-space isometries of the ungauged theory. The gaugings constructed in this paper are described group-theoretically in terms of a constant embedding tensor subject to a number of constraints which parametrizes the different theories and entirely encodes the gauged Lagrangian. The prime example is the bosonic sector of the maximally supersymmetric theory whose ungauged version admits an affine e 9 global symmetry algebra. The various parameters (related to higher-dimensional p-form fluxes, geometric and non-geometric fluxes, etc.) which characterize the possible gaugings, combine into an embedding tensor transforming in the basic representation of e 9 . This yields an infinite-dimensional class of maximally supersymmetric theories in two dimensions. We work out and discuss several examples of higher-dimensional origin which can be systematically analyzed using the different gradings of e 9

  10. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  11. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M; Aarnio, P [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T; Tiilikainen, H [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1998-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  12. Hidden-Sector Dynamics and the Supersymmetric Seesaw

    CERN Document Server

    Campbell, Bruce A; Maybury, David W

    2008-01-01

    In light of recent analyses that have shown that nontrivial hidden-sector dynamics in models of supersymmetry breaking can lead to a significant impact on the predicted low-energy supersymmetric spectrum, we extend these studies to consider hidden-sector effects in extensions of the MSSM to include a seesaw model for neutrino masses. A dynamical hidden sector in an interval of mass scales below the seesaw scale would yield renormalization-group running involving both the anomalous dimension from the hidden sector and the seesaw-extended MSSM renormalization group equations (RGEs). These effects interfere in general, altering the generational mixing of the sleptons, and allowing for a substantial change to the expected level of charged-lepton flavour violation in seesaw-extended MSSM models. These results provide further support for recent theoretical observations that knowledge of the hidden sector is required in order to make concrete low-energy predictions, if the hidden sector is strongly coupled. In parti...

  13. Isolated perifacial lymph node metastasis in oral squamous cell carcinoma with clinically node-negative neck.

    Science.gov (United States)

    Agarwal, Sangeet Kumar; Arora, Sowrabh Kumar; Kumar, Gopal; Sarin, Deepak

    2016-10-01

    The incidence of occult perifacial nodal disease in oral cavity squamous cell carcinoma is not well reported. The purpose of this study was to evaluate the incidence of isolated perifacial lymph node metastasis in patients with oral squamous cell carcinoma with a clinically node-negative neck. The study will shed light on current controversies and will provide valuable clinical and pathological information in the practice of routine comprehensive removal of these lymph node pads in selective neck dissection in the node-negative neck. Prospective analysis. This study was started in August 2011 when intraoperatively we routinely separated the lymph node levels from the main specimen for evaluation of the metastatic rate to different lymph node levels in 231 patients of oral squamous cell cancer with a clinically node-negative neck. The current study demonstrated that 19 (8.22%) out of 231 patients showed ipsilateral isolated perifacial lymph node involvement. The incidence of isolated perifacial nodes did not differ significantly between the oral tongue (7.14%) and buccal mucosa (7.75%). Incidence was statistically significant in cases with lower age group (oral squamous cell carcinoma with a clinically node-negative neck. The incidence of isolated perifacial involvement is high in cases of buccal mucosal and tongue cancers. A meticulous dissection of the perifacial nodes seems prudent when treating the neck in oral cavity squamous cell carcinoma. 4 Laryngoscope, 126:2252-2256, 2016. © 2016 The American Laryngological, Rhinological and Otological Society, Inc.

  14. Node Immunization with Time-Sensitive Restrictions

    Directory of Open Access Journals (Sweden)

    Wen Cui

    2016-12-01

    Full Text Available When we encounter a malicious rumor or an infectious disease outbreak, immunizing k nodes of the relevant network with limited resources is always treated as an extremely effective method. The key challenge is how we can insulate limited nodes to minimize the propagation of those contagious things. In previous works, the best k immunised nodes are selected by learning the initial status of nodes and their strategies even if there is no feedback in the propagation process, which eventually leads to ineffective performance of their solutions. In this paper, we design a novel vaccines placement strategy for protecting much more healthy nodes from being infected by infectious nodes. The main idea of our solution is that we are not only utilizing the status of changing nodes as auxiliary knowledge to adjust our scheme, but also comparing the performance of vaccines in various transmission slots. Thus, our solution has a better chance to get more benefit from these limited vaccines. Extensive experiments have been conducted on several real-world data sets and the results have shown that our algorithm has a better performance than previous works.

  15. Defining nodes in complex brain networks

    Directory of Open Access Journals (Sweden)

    Matthew Lawrence Stanley

    2013-11-01

    Full Text Available Network science holds great promise for expanding our understanding of the human brain in health, disease, development, and aging. Network analyses are quickly becoming the method of choice for analyzing functional MRI data. However, many technical issues have yet to be confronted in order to optimize results. One particular issue that remains controversial in functional brain network analyses is the definition of a network node. In functional brain networks a node represents some predefined collection of brain tissue, and an edge measures the functional connectivity between pairs of nodes. The characteristics of a node, chosen by the researcher, vary considerably in the literature. This manuscript reviews the current state of the art based on published manuscripts and highlights the strengths and weaknesses of three main methods for defining nodes. Voxel-wise networks are constructed by assigning a node to each, equally sized brain area (voxel. The fMRI time-series recorded from each voxel is then used to create the functional network. Anatomical methods utilize atlases to define the nodes based on brain structure. The fMRI time-series from all voxels within the anatomical area are averaged and subsequently used to generate the network. Functional activation methods rely on data from traditional fMRI activation studies, often from databases, to identify network nodes. Such methods identify the peaks or centers of mass from activation maps to determine the location of the nodes. Small (~10-20 millimeter diameter spheres located at the coordinates of the activation foci are then applied to the data being used in the network analysis. The fMRI time-series from all voxels in the sphere are then averaged, and the resultant time series is used to generate the network. We attempt to clarify the discussion and move the study of complex brain networks forward. While the correct method to be used remains an open, possibly unsolvable question that

  16. Axillary Lymph Node Evaluation Utilizing Convolutional Neural Networks Using MRI Dataset.

    Science.gov (United States)

    Ha, Richard; Chang, Peter; Karcich, Jenika; Mutasa, Simukayi; Fardanesh, Reza; Wynn, Ralph T; Liu, Michael Z; Jambawalikar, Sachin

    2018-04-25

    The aim of this study is to evaluate the role of convolutional neural network (CNN) in predicting axillary lymph node metastasis, using a breast MRI dataset. An institutional review board (IRB)-approved retrospective review of our database from 1/2013 to 6/2016 identified 275 axillary lymph nodes for this study. Biopsy-proven 133 metastatic axillary lymph nodes and 142 negative control lymph nodes were identified based on benign biopsies (100) and from healthy MRI screening patients (42) with at least 3 years of negative follow-up. For each breast MRI, axillary lymph node was identified on first T1 post contrast dynamic images and underwent 3D segmentation using an open source software platform 3D Slicer. A 32 × 32 patch was then extracted from the center slice of the segmented tumor data. A CNN was designed for lymph node prediction based on each of these cropped images. The CNN consisted of seven convolutional layers and max-pooling layers with 50% dropout applied in the linear layer. In addition, data augmentation and L2 regularization were performed to limit overfitting. Training was implemented using the Adam optimizer, an algorithm for first-order gradient-based optimization of stochastic objective functions, based on adaptive estimates of lower-order moments. Code for this study was written in Python using the TensorFlow module (1.0.0). Experiments and CNN training were done on a Linux workstation with NVIDIA GTX 1070 Pascal GPU. Two class axillary lymph node metastasis prediction models were evaluated. For each lymph node, a final softmax score threshold of 0.5 was used for classification. Based on this, CNN achieved a mean five-fold cross-validation accuracy of 84.3%. It is feasible for current deep CNN architectures to be trained to predict likelihood of axillary lymph node metastasis. Larger dataset will likely improve our prediction model and can potentially be a non-invasive alternative to core needle biopsy and even sentinel lymph node

  17. Efficient Graph Computation for Node2Vec

    OpenAIRE

    Zhou, Dongyan; Niu, Songjie; Chen, Shimin

    2018-01-01

    Node2Vec is a state-of-the-art general-purpose feature learning method for network analysis. However, current solutions cannot run Node2Vec on large-scale graphs with billions of vertices and edges, which are common in real-world applications. The existing distributed Node2Vec on Spark incurs significant space and time overhead. It runs out of memory even for mid-sized graphs with millions of vertices. Moreover, it considers at most 30 edges for every vertex in generating random walks, causin...

  18. Checkpointing for a hybrid computing node

    Science.gov (United States)

    Cher, Chen-Yong

    2016-03-08

    According to an aspect, a method for checkpointing in a hybrid computing node includes executing a task in a processing accelerator of the hybrid computing node. A checkpoint is created in a local memory of the processing accelerator. The checkpoint includes state data to restart execution of the task in the processing accelerator upon a restart operation. Execution of the task is resumed in the processing accelerator after creating the checkpoint. The state data of the checkpoint are transferred from the processing accelerator to a main processor of the hybrid computing node while the processing accelerator is executing the task.

  19. Hidden burden of malaria in Indian women

    Directory of Open Access Journals (Sweden)

    Sharma Vinod P

    2009-12-01

    Full Text Available Abstract Malaria is endemic in India with an estimated 70-100 million cases each year (1.6-1.8 million reported by NVBDCP; of this 50-55% are Plasmodium vivax and 45-50% Plasmodium falciparum. A recent study on malaria in pregnancy reported from undivided Madhya Pradesh state (includes Chhattisgarh state, that an estimated over 220,000 pregnant women contract malaria infection each year. Malaria in pregnancy caused- abortions 34.5%; stillbirths 9%; and maternal deaths 0.45%. Bulk of this tragic outcome can be averted by following the Roll Back Malaria/WHO recommendations of the use of malaria prevention i.e. indoor residual spraying (IRS/insecticide-treated bed nets (ITN preferably long-lasting treated bed nets (LLIN; intermittent preventive therapy (IPT; early diagnosis, prompt and complete treatment using microscopic/malaria rapid diagnostics test (RDT and case management. High incidence in pregnancy has arisen because of malaria surveillance lacking coverage, lack of age and sex wise data, staff shortages, and intermittent preventive treatment (IPT applicable in high transmission states/pockets is not included in the national drug policy- an essential component of fighting malaria in pregnancy in African settings. Inadequate surveillance and gross under-reporting has been highlighted time and again for over three decades. As a result the huge problem of malaria in pregnancy reported occasionally by researchers has remained hidden. Malaria in pregnancy may quicken severity in patients with drug resistant parasites, anaemia, endemic poverty, and malnutrition. There is, therefore, urgent need to streamline malaria control strategies to make a difference in tackling this grim scenario in human health.

  20. Hydrogeophysical investigations at Hidden Dam, Raymond, California

    Science.gov (United States)

    Minsley, Burke J.; Burton, Bethany L.; Ikard, Scott; Powers, Michael H.

    2011-01-01

    Self-potential and direct current resistivity surveys are carried out at the Hidden Dam site in Raymond, California to assess present-day seepage patterns and better understand the hydrogeologic mechanisms that likely influence seepage. Numerical modeling is utilized in conjunction with the geophysical measurements to predict variably-saturated flow through typical two-dimensional dam cross-sections as a function of reservoir elevation. Several different flow scenarios are investigated based on the known hydrogeology, as well as information about typical subsurface structures gained from the resistivity survey. The flow models are also used to simulate the bulk electrical resistivity in the subsurface under varying saturation conditions, as well as the self-potential response using petrophysical relationships and electrokinetic coupling equations.The self-potential survey consists of 512 measurements on the downstream area of the dam, and corroborates known seepage areas on the northwest side of the dam. Two direct-current resistivity profiles, each approximately 2,500 ft (762 m) long, indicate a broad sediment channel under the northwest side of the dam, which may be a significant seepage pathway through the foundation. A focusing of seepage in low-topography areas downstream of the dam is confirmed from the numerical flow simulations, which is also consistent with past observations. Little evidence of seepage is identified from the self-potential data on the southeast side of the dam, also consistent with historical records, though one possible area of focused seepage is identified near the outlet works. Integration of the geophysical surveys, numerical modeling, and observation well data provides a framework for better understanding seepage at the site through a combined hydrogeophysical approach.

  1. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  2. phylo-node: A molecular phylogenetic toolkit using Node.js.

    Science.gov (United States)

    O'Halloran, Damien M

    2017-01-01

    Node.js is an open-source and cross-platform environment that provides a JavaScript codebase for back-end server-side applications. JavaScript has been used to develop very fast and user-friendly front-end tools for bioinformatic and phylogenetic analyses. However, no such toolkits are available using Node.js to conduct comprehensive molecular phylogenetic analysis. To address this problem, I have developed, phylo-node, which was developed using Node.js and provides a stable and scalable toolkit that allows the user to perform diverse molecular and phylogenetic tasks. phylo-node can execute the analysis and process the resulting outputs from a suite of software options that provides tools for read processing and genome alignment, sequence retrieval, multiple sequence alignment, primer design, evolutionary modeling, and phylogeny reconstruction. Furthermore, phylo-node enables the user to deploy server dependent applications, and also provides simple integration and interoperation with other Node modules and languages using Node inheritance patterns, and a customized piping module to support the production of diverse pipelines. phylo-node is open-source and freely available to all users without sign-up or login requirements. All source code and user guidelines are openly available at the GitHub repository: https://github.com/dohalloran/phylo-node.

  3. Increased taxon sampling reveals thousands of hidden orthologs in flatworms

    Science.gov (United States)

    2017-01-01

    Gains and losses shape the gene complement of animal lineages and are a fundamental aspect of genomic evolution. Acquiring a comprehensive view of the evolution of gene repertoires is limited by the intrinsic limitations of common sequence similarity searches and available databases. Thus, a subset of the gene complement of an organism consists of hidden orthologs, i.e., those with no apparent homology to sequenced animal lineages—mistakenly considered new genes—but actually representing rapidly evolving orthologs or undetected paralogs. Here, we describe Leapfrog, a simple automated BLAST pipeline that leverages increased taxon sampling to overcome long evolutionary distances and identify putative hidden orthologs in large transcriptomic databases by transitive homology. As a case study, we used 35 transcriptomes of 29 flatworm lineages to recover 3427 putative hidden orthologs, some unidentified by OrthoFinder and HaMStR, two common orthogroup inference algorithms. Unexpectedly, we do not observe a correlation between the number of putative hidden orthologs in a lineage and its “average” evolutionary rate. Hidden orthologs do not show unusual sequence composition biases that might account for systematic errors in sequence similarity searches. Instead, gene duplication with divergence of one paralog and weak positive selection appear to underlie hidden orthology in Platyhelminthes. By using Leapfrog, we identify key centrosome-related genes and homeodomain classes previously reported as absent in free-living flatworms, e.g., planarians. Altogether, our findings demonstrate that hidden orthologs comprise a significant proportion of the gene repertoire in flatworms, qualifying the impact of gene losses and gains in gene complement evolution. PMID:28400424

  4. Assessment of Lymph Node Metastasis of the Stomach Cancer by {sup 99m}Tc Phytate Lymphoscintigraphy

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Hyung Sik; Lee, Jong Tae; Park, Chang Yun; Min, Jin Sik; Kim, Choong Bai [Yonsei University College of Medicine, Seoul (Korea, Republic of)

    1985-09-15

    Prospective study of lymph node imaging of twenty stomach cancer cases with dissected lymph nodes being injected into the submucosa layer of stomach under surgical field was done. Total dose of 5 mCi in 5 cc of volume was injected along the multiple sites of the lesser and greater curvature of stomach and collected lymph nodes within 2 hour of surgical time were placed under gamma camera and lymph node imagings were obtained, Pathological invasion of tumor and correlation of cold defect or hot uptake was compared each other. Tumor invasion of nodes revealed cold defect area which was correlated well with the pathological specimen. Correlation rate was 84.6%. We are planning to extend these procedures and trying endoscopic injection of positive imaging agents such as GR-73-3 Ig{sub 2} alpha in future.

  5. ARC Code TI: NodeMon

    Data.gov (United States)

    National Aeronautics and Space Administration — NodeMon is a resource utilization monitor tailored to the Altix architecture, but is applicable to any Linux system or cluster. It allows distributed resource...

  6. Resilience against Misbehaving Nodes in Asynchronous Networks

    OpenAIRE

    Senejohnny, D.; Sundaram, S.; De Persis, C.; Tesi, P.

    2018-01-01

    Network systems are one of the most active research areas in the engineering community as they feature a paradigm shift from centralized to distributed control and computation. When dealing with network systems, a fundamental challenge is to ensure their functioning even when some of the network nodes do not operate as intended due to faults or attacks. The objective of this paper is to address the problem of resilient consensus in a context where the nodes have their own clocks, possibly ope...

  7. PROTOCOLS FOR INCREASING THE LIFETIME OF NODES OF AD HOC WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    B.Malarkodi

    2010-03-01

    Full Text Available Power consumption of nodes in ad hoc networks is a critical issue as they predominantly operate on batteries. In order to improve the lifetime of an ad hoc network, all the nodes must be utilized evenly and the power required for connections must be minimized. Energy management deals with the process of managing energy resources by means of controlling the battery discharge, adjusting the transmission power and scheduling of power sources so as to increase the lifetime of the nodes of an ad hoc wireless network. In this paper, two protocols are proposed to improve the lifetime of the nodes. The first protocol assumes smart battery packages with L cells and uses dynamic programming (DP to optimally select the set of cells used to satisfy a request for power. The second one proposes a MAC layer protocol denoted as Power Aware medium Access Control (PAMAC protocol which enables the network layer to select a route with minimum total power requirement among the possible routes between a source and a destination provided all nodes in the routes have battery capacity above a threshold. The life time of the nodes using the DP based scheduling policy is found through simulation and compared with that obtained using the techniques reported in the literature. It is found that DP based policy increases the lifetime of the mobile nodes by a factor of 1.15 to 1.8. The life expectancy, the average power consumption and throughput of the network using PAMAC protocol are computed through simulation and compared with that of the other MAC layer protocols 802.11, MACA, and CSMA. Besides this, the life expectancy and average power consumption of the network for different values of threshold are also compared. From the simulation results, it is observed that PAMAC consumes the least power and provides the longest lifetime among the various MAC Layer protocols. Moreover, using PAMAC as the MAC layer protocol, the performance obtained using different routing layer

  8. Lymph Node Micrometastases are Associated with Worse Survival in Patients with Otherwise Node-Negative Hilar Cholangiocarcinoma

    NARCIS (Netherlands)

    Mantel, Hendrik T. J.; Wiggers, Jim K.; Verheij, Joanne; Doff, Jan J.; Sieders, Egbert; van Gulik, Thomas M.; Gouw, Annette S. H.; Porte, Robert J.

    2015-01-01

    Background. Lymph node metastases on routine histology are a strong negative predictor for survival after resection of hilar cholangiocarcinoma. Additional immunohistochemistry can detect lymph node micrometastases in patients who are otherwise node negative, but the prognostic value is unsure. The

  9. Dynamically reassigning a connected node to a block of compute nodes for re-launching a failed job

    Science.gov (United States)

    Budnik, Thomas A [Rochester, MN; Knudson, Brant L [Rochester, MN; Megerian, Mark G [Rochester, MN; Miller, Samuel J [Rochester, MN; Stockdell, William M [Byron, MN

    2012-03-20

    Methods, systems, and products for dynamically reassigning a connected node to a block of compute nodes for re-launching a failed job that include: identifying that a job failed to execute on the block of compute nodes because connectivity failed between a compute node assigned as at least one of the connected nodes for the block of compute nodes and its supporting I/O node; and re-launching the job, including selecting an alternative connected node that is actively coupled for data communications with an active I/O node; and assigning the alternative connected node as the connected node for the block of compute nodes running the re-launched job.

  10. Lymph Node Yield as a Predictor of Survival in Pathologically Node Negative Oral Cavity Carcinoma.

    Science.gov (United States)

    Lemieux, Aaron; Kedarisetty, Suraj; Raju, Sharat; Orosco, Ryan; Coffey, Charles

    2016-03-01

    Even after a pathologically node-negative (pN0) neck dissection for oral cavity squamous cell carcinoma (SCC), patients may develop regional recurrence. In this study, we (1) hypothesize that an increased number of lymph nodes removed (lymph node yield) in patients with pN0 oral SCC predicts improved survival and (2) explore predictors of survival in these patients using a multivariable model. Case series with chart review. Administrative database analysis. The SEER database was queried for patients diagnosed with all-stage oral cavity SCC between 1988 and 2009 who were determined to be pN0 after elective lymph node dissection. Demographic and treatment variables were extracted. The association of lymph node yield with 5-year all-cause survival was studied with multivariable survival analyses. A total of 4341 patients with pN0 oral SCC were included in this study. The 2 highest lymph node yield quartiles (representing >22 nodes removed) were found to be significant predictors of overall survival (22-35 nodes: hazard ratio [HR] = 0.854, P = .031; 36-98 nodes: HR = 0.827, P = .010). Each additional lymph node removed during neck dissection was associated with increased survival (HR = 0.995, P = .022). These data suggest that patients with oral SCC undergoing elective neck dissection may experience an overall survival benefit associated with greater lymph node yield. Mechanisms behind the demonstrated survival advantage are unknown. Larger nodal dissections may remove a greater burden of microscopic metastatic disease, diminishing the likelihood of recurrence. Lymph node yield may serve as an objective measure of the adequacy of lymphadenectomy. © American Academy of Otolaryngology—Head and Neck Surgery Foundation 2015.

  11. Infinite hidden conditional random fields for human behavior analysis.

    Science.gov (United States)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja

    2013-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF), which is a nonparametric model based on hierarchical Dirichlet processes and is capable of automatically learning the optimal number of hidden states for a classification task. We show how we learn the model hyperparameters with an effective Markov-chain Monte Carlo sampling technique, and we explain the process that underlines our iHCRF model with the Restaurant Franchise Rating Agencies analogy. We show that the iHCRF is able to converge to a correct number of represented hidden states, and outperforms the best finite HCRFs--chosen via cross-validation--for the difficult tasks of recognizing instances of agreement, disagreement, and pain. Moreover, the iHCRF manages to achieve this performance in significantly less total training, validation, and testing time.

  12. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  13. Implementation of Multiple Host Nodes in Wireless Sensing Node Network System for Landslide Monitoring

    International Nuclear Information System (INIS)

    Bin Abas, Faizulsalihin; Takayama, Shigeru

    2015-01-01

    This paper proposes multiple host nodes in Wireless Sensing Node Network System (WSNNS) for landslide monitoring. As landslide disasters damage monitoring system easily, one major demand in landslide monitoring is the flexibility and robustness of the system to evaluate the current situation in the monitored area. For various reasons WSNNS can provide an important contribution to reach that aim. In this system, acceleration sensors and GPS are deployed in sensing nodes. Location information by GPS, enable the system to estimate network topology and enable the system to perceive the location in emergency by monitoring the node mode. Acceleration sensors deployment, capacitate this system to detect slow mass movement that can lead to landslide occurrence. Once deployed, sensing nodes self-organize into an autonomous wireless ad hoc network. The measurement parameter data from sensing nodes is transmitted to Host System via host node and ''Cloud'' System. The implementation of multiple host nodes in Local Sensing Node Network System (LSNNS), improve risk- management of the WSNNS for real-time monitoring of landslide disaster

  14. Implementation of Multiple Host Nodes in Wireless Sensing Node Network System for Landslide Monitoring

    Science.gov (United States)

    Abas, Faizulsalihin bin; Takayama, Shigeru

    2015-02-01

    This paper proposes multiple host nodes in Wireless Sensing Node Network System (WSNNS) for landslide monitoring. As landslide disasters damage monitoring system easily, one major demand in landslide monitoring is the flexibility and robustness of the system to evaluate the current situation in the monitored area. For various reasons WSNNS can provide an important contribution to reach that aim. In this system, acceleration sensors and GPS are deployed in sensing nodes. Location information by GPS, enable the system to estimate network topology and enable the system to perceive the location in emergency by monitoring the node mode. Acceleration sensors deployment, capacitate this system to detect slow mass movement that can lead to landslide occurrence. Once deployed, sensing nodes self-organize into an autonomous wireless ad hoc network. The measurement parameter data from sensing nodes is transmitted to Host System via host node and "Cloud" System. The implementation of multiple host nodes in Local Sensing Node Network System (LSNNS), improve risk- management of the WSNNS for real-time monitoring of landslide disaster.

  15. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  16. The node-weighted Steiner tree approach to identify elements of cancer-related signaling pathways.

    Science.gov (United States)

    Sun, Yahui; Ma, Chenkai; Halgamuge, Saman

    2017-12-28

    Cancer constitutes a momentous health burden in our society. Critical information on cancer may be hidden in its signaling pathways. However, even though a large amount of money has been spent on cancer research, some critical information on cancer-related signaling pathways still remains elusive. Hence, new works towards a complete understanding of cancer-related signaling pathways will greatly benefit the prevention, diagnosis, and treatment of cancer. We propose the node-weighted Steiner tree approach to identify important elements of cancer-related signaling pathways at the level of proteins. This new approach has advantages over previous approaches since it is fast in processing large protein-protein interaction networks. We apply this new approach to identify important elements of two well-known cancer-related signaling pathways: PI3K/Akt and MAPK. First, we generate a node-weighted protein-protein interaction network using protein and signaling pathway data. Second, we modify and use two preprocessing techniques and a state-of-the-art Steiner tree algorithm to identify a subnetwork in the generated network. Third, we propose two new metrics to select important elements from this subnetwork. On a commonly used personal computer, this new approach takes less than 2 s to identify the important elements of PI3K/Akt and MAPK signaling pathways in a large node-weighted protein-protein interaction network with 16,843 vertices and 1,736,922 edges. We further analyze and demonstrate the significance of these identified elements to cancer signal transduction by exploring previously reported experimental evidences. Our node-weighted Steiner tree approach is shown to be both fast and effective to identify important elements of cancer-related signaling pathways. Furthermore, it may provide new perspectives into the identification of signaling pathways for other human diseases.

  17. Gauge mediation scenario with hidden sector renormalization in MSSM

    International Nuclear Information System (INIS)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-01-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5 minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  18. Gauge mediation scenario with hidden sector renormalization in MSSM

    Science.gov (United States)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-02-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5¯ minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  19. Multivariate longitudinal data analysis with mixed effects hidden Markov models.

    Science.gov (United States)

    Raffa, Jesse D; Dubin, Joel A

    2015-09-01

    Multiple longitudinal responses are often collected as a means to capture relevant features of the true outcome of interest, which is often hidden and not directly measurable. We outline an approach which models these multivariate longitudinal responses as generated from a hidden disease process. We propose a class of models which uses a hidden Markov model with separate but correlated random effects between multiple longitudinal responses. This approach was motivated by a smoking cessation clinical trial, where a bivariate longitudinal response involving both a continuous and a binomial response was collected for each participant to monitor smoking behavior. A Bayesian method using Markov chain Monte Carlo is used. Comparison of separate univariate response models to the bivariate response models was undertaken. Our methods are demonstrated on the smoking cessation clinical trial dataset, and properties of our approach are examined through extensive simulation studies. © 2015, The International Biometric Society.

  20. Applications of hidden symmetries to black hole physics

    International Nuclear Information System (INIS)

    Frolov, Valeri

    2011-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  1. Discovering Hidden Controlling Parameters using Data Analytics and Dimensional Analysis

    Science.gov (United States)

    Del Rosario, Zachary; Lee, Minyong; Iaccarino, Gianluca

    2017-11-01

    Dimensional Analysis is a powerful tool, one which takes a priori information and produces important simplifications. However, if this a priori information - the list of relevant parameters - is missing a relevant quantity, then the conclusions from Dimensional Analysis will be incorrect. In this work, we present novel conclusions in Dimensional Analysis, which provide a means to detect this failure mode of missing or hidden parameters. These results are based on a restated form of the Buckingham Pi theorem that reveals a ridge function structure underlying all dimensionless physical laws. We leverage this structure by constructing a hypothesis test based on sufficient dimension reduction, allowing for an experimental data-driven detection of hidden parameters. Both theory and examples will be presented, using classical turbulent pipe flow as the working example. Keywords: experimental techniques, dimensional analysis, lurking variables, hidden parameters, buckingham pi, data analysis. First author supported by the NSF GRFP under Grant Number DGE-114747.

  2. Supersymmetry, p-brane duality, and hidden spacetime dimensions

    International Nuclear Information System (INIS)

    Bars, I.

    1996-01-01

    A global superalgebra with 32 supercharges and all possible central extensions is studied in order to extract some general properties of duality and hidden dimensions in a theory that treats p-branes democratically. The maximal number of dimensions is 12, with signature (10,2), containing one space and one time dimension that are hidden from the point of view of perturbative ten-dimensional string theory or its compactifications. When the theory is compactified on R d-1,1 circle-times T c+1,1 with d+c+2=12, there are isometry groups that relate to the hidden dimensions as well as to duality. Their combined intersecting classification schemes provide some properties of nonperturbative states and their couplings. copyright 1996 The American Physical Society

  3. Clustering network layers with the strata multilayer stochastic block model.

    Science.gov (United States)

    Stanley, Natalie; Shai, Saray; Taylor, Dane; Mucha, Peter J

    2016-01-01

    Multilayer networks are a useful data structure for simultaneously capturing multiple types of relationships between a set of nodes. In such networks, each relational definition gives rise to a layer. While each layer provides its own set of information, community structure across layers can be collectively utilized to discover and quantify underlying relational patterns between nodes. To concisely extract information from a multilayer network, we propose to identify and combine sets of layers with meaningful similarities in community structure. In this paper, we describe the "strata multilayer stochastic block model" (sMLSBM), a probabilistic model for multilayer community structure. The central extension of the model is that there exist groups of layers, called "strata", which are defined such that all layers in a given stratum have community structure described by a common stochastic block model (SBM). That is, layers in a stratum exhibit similar node-to-community assignments and SBM probability parameters. Fitting the sMLSBM to a multilayer network provides a joint clustering that yields node-to-community and layer-to-stratum assignments, which cooperatively aid one another during inference. We describe an algorithm for separating layers into their appropriate strata and an inference technique for estimating the SBM parameters for each stratum. We demonstrate our method using synthetic networks and a multilayer network inferred from data collected in the Human Microbiome Project.

  4. Role of the technologist in the lymphoscintigraphy and the identification of sentinel node in malignant skin melanoma

    International Nuclear Information System (INIS)

    Barbier, D.

    2002-01-01

    The biopsy of the first tumor-draining lymph node (sentinel node) is bound to become the procedure of choice in regional staging of skin melanoma patients. In our department, we do successively: lymphoscintigraphy; identification of sentinel node by γ probe before surgery; identification during surgery of sentinel node with γ probe. During those different steps, the technologist has an important role. The different steps of the technologist's work are: Preparation of radiopharmaceutical Tc 99m Nanocolloides (Nanocis Cis Bio Int); Control of radio chemical purity(RCP) by thin-layer chromatography (TLC); Programming of acquisition protocol on the γ camera; Acquisition of dynamic and static images; Identification percutaneous of the sentinel node with the γ probe and Co 57 pencil; Processing of scintigraphic images; At least identification with surgeon of the sentinel node. After excision of the lymph node, we have to verify the disappearing of radioactivity. Those steps will be illustrated by different clinical cases. Conclusion: Sentinel node identification is: New useful technique for patient: not very much invasive; screening of patients with high risk factors; great parameters of prognosis; Interest for technologist: narrow collaboration with nuclearist and surgeon; psychological role close to the patient; various competency of technologist; diagnostic and therapeutic participations

  5. Analysing the hidden curriculum: use of a cultural web.

    Science.gov (United States)

    Mossop, Liz; Dennick, Reg; Hammond, Richard; Robbé, Iain

    2013-02-01

    Major influences on learning about medical professionalism come from the hidden curriculum. These influences can contribute positively or negatively towards the professional enculturation of clinical students. The fact that there is no validated method for identifying the components of the hidden curriculum poses problems for educators considering professionalism. The aim of this study was to analyse whether a cultural web, adapted from a business context, might assist in the identification of elements of the hidden curriculum at a UK veterinary school. A qualitative approach was used. Seven focus groups consisting of three staff groups and four student groups were organised. Questioning was framed using the cultural web, which is a model used by business owners to assess their environment and consider how it affects their employees and customers. The focus group discussions were recorded, transcribed and analysed thematically using a combination of a priori and emergent themes. The cultural web identified elements of the hidden curriculum for both students and staff. These included: core assumptions; routines; rituals; control systems; organisational factors; power structures, and symbols. Discussions occurred about how and where these issues may affect students' professional identity development. The cultural web framework functioned well to help participants identify elements of the hidden curriculum. These aspects aligned broadly with previously described factors such as role models and institutional slang. The influence of these issues on a student's development of a professional identity requires discussion amongst faculty staff, and could be used to develop learning opportunities for students. The framework is promising for the analysis of the hidden curriculum and could be developed as an instrument for implementation in other clinical teaching environments. © Blackwell Publishing Ltd 2013.

  6. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  7. Low-intensity interference effects and hidden-variable theories

    Energy Technology Data Exchange (ETDEWEB)

    Buonomano, V [Universidade Estadual de Campinas (Brazil). Inst. de Matematica

    1978-05-11

    The double-slit interference experiment and other similar experiments in the low-intensity limit (that is, one photon in the apparatus at a time) are examined in the spirit of Bell's work from the point of view of hidden-variable theories. It is found that there exists a class of hidden-variable theories which disagrees with quantum mechanics for a certain type of interference experiment. A manufactured conceptualization of this class, which is a particle view of interference, is described. An experiment, which appears to be feasible, is proposed to examine this disagreement.

  8. Application of Hidden Markov Models in Biomolecular Simulations.

    Science.gov (United States)

    Shukla, Saurabh; Shamsi, Zahra; Moffett, Alexander S; Selvam, Balaji; Shukla, Diwakar

    2017-01-01

    Hidden Markov models (HMMs) provide a framework to analyze large trajectories of biomolecular simulation datasets. HMMs decompose the conformational space of a biological molecule into finite number of states that interconvert among each other with certain rates. HMMs simplify long timescale trajectories for human comprehension, and allow comparison of simulations with experimental data. In this chapter, we provide an overview of building HMMs for analyzing bimolecular simulation datasets. We demonstrate the procedure for building a Hidden Markov model for Met-enkephalin peptide simulation dataset and compare the timescales of the process.

  9. Enhanced axion-photon coupling in GUT with hidden photon

    Science.gov (United States)

    Daido, Ryuji; Takahashi, Fuminobu; Yokozaki, Norimi

    2018-05-01

    We show that the axion coupling to photons can be enhanced in simple models with a single Peccei-Quinn field, if the gauge coupling unification is realized by a large kinetic mixing χ = O (0.1) between hypercharge and unbroken hidden U(1)H. The key observation is that the U(1)H gauge coupling should be rather strong to induce such large kinetic mixing, leading to enhanced contributions of hidden matter fields to the electromagnetic anomaly. We find that the axion-photon coupling is enhanced by about a factor of 10-100 with respect to the GUT-axion models with E / N = 8 / 3.

  10. Hidden Neural Networks: A Framework for HMM/NN Hybrids

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric; Krogh, Anders Stærmose

    1997-01-01

    This paper presents a general framework for hybrids of hidden Markov models (HMM) and neural networks (NN). In the new framework called hidden neural networks (HNN) the usual HMM probability parameters are replaced by neural network outputs. To ensure a probabilistic interpretation the HNN is nor...... HMMs on TIMIT continuous speech recognition benchmarks. On the task of recognizing five broad phoneme classes an accuracy of 84% is obtained compared to 76% for a standard HMM. Additionally, we report a preliminary result of 69% accuracy on the TIMIT 39 phoneme task...

  11. Search for hidden Higgs decay in ATLAS detector

    International Nuclear Information System (INIS)

    Gabrielli, A.

    2013-01-01

    In this paper, a brief overview of the search for the Higgs boson in Hidden Valley models is given. Hidden Valley models predict Higgs decays to neutral particles, which can be also long lived with decay paths comparable to the LHC detectors dimensions. Decay final states consist of collimated leptons (Lepton Jets). Results are presented of a search for Higgs decays to long lived particles in the ATLAS detector at the LHC, based on 1.92 fb −1 data collected during 2011 at a 7TeV center-of-mass energy.

  12. Detecting Faults By Use Of Hidden Markov Models

    Science.gov (United States)

    Smyth, Padhraic J.

    1995-01-01

    Frequency of false alarms reduced. Faults in complicated dynamic system (e.g., antenna-aiming system, telecommunication network, or human heart) detected automatically by method of automated, continuous monitoring. Obtains time-series data by sampling multiple sensor outputs at discrete intervals of t and processes data via algorithm determining whether system in normal or faulty state. Algorithm implements, among other things, hidden first-order temporal Markov model of states of system. Mathematical model of dynamics of system not needed. Present method is "prior" method mentioned in "Improved Hidden-Markov-Model Method of Detecting Faults" (NPO-18982).

  13. From the solar system fo hidden cosmic structures

    Energy Technology Data Exchange (ETDEWEB)

    Benes, K

    1987-01-01

    The development of experimental astrophysics showed that in the evolution of planets, natural processes of a common nature take place. They include, e.g., radiogenic heat, the production of magmas, volcanic activity, degassing, etc. The solar system is a cosmic formation in an advanced stage of development and it is a realistic assumption that in the Galaxy other hidden planetary systems in various stages of development exist. The views on the possibility of the origination of life in other systems differ; life, however, is seen as a hidden property of cosmic matter. (M.D.).

  14. Hidden Pair of Supermassive Black Holes

    Science.gov (United States)

    Kohler, Susanna

    2015-08-01

    Could a pair of supermassive black holes (SMBHs) be lurking at the center of the galaxy Mrk 231? A recent study finds that this may be the case and the unique spectrum of this galaxy could be the key to discovering more hidden binary SMBH systems.Where Are the Binary Supermassive Black Holes?Its believed that most, if not all, galaxies have an SMBH at their centers. As two galaxies merge, the two SMBHs should evolve into a closely-bound binary system before they eventually merge. Given the abundance of galaxy mergers, we would expect to see the kinematic and visual signatures of these binary SMBHs among observed active galactic nuclei yet such evidence for sub-parsec binary SMBH systems remains scarce and ambiguous. This has led researchers to wonder: is there another way that we might detect these elusive systems?A collaboration led by Chang-Shuo Yan (National Astronomical Observatories, Chinese Academy of Sciences) thinks that there is. The group suggests that these systems might have distinct signatures in their optical-to-UV spectra, and they identify a system that might be just such a candidate: Mrk 231.A Binary CandidateProposed model of Mrk 231. Two supermassive black holes, each with their own mini-disk, orbit each other in the center of a circumbinary disk. The secondary black hole has cleared gap in the circumbinary disk as a result of its orbit around the primary black hole. [Yan et al. 2015]Mrk 231 is a galaxy with a disturbed morphology and tidal tails strong clues that it might be in the final stages of a galactic merger. In addition to these signs, Mrk 231 also has an unusual spectrum for a quasar: its continuum emission displays an unexpected drop in the near-UV band.Yan and her collaborators propose that the odd behavior of Mrk 231s spectrum can be explained if the center of the galaxy houses a pair of SMBHs each with its own mini accretion disk surrounded by a circumbinary accretion disk. As the secondary SMBH orbits the primary SMBH (with a

  15. Value of irradiation of neck nodes metastases. Pt. 1. Treatment of palpable nodes

    International Nuclear Information System (INIS)

    Bujko, K.

    1993-01-01

    Medical records of 222 patients with neck nodes metastases from squamous cell carcinoma of supraglottic larynx, tonsil and base of tongue were analyzed. All cases were treated with definitive irradiation. 110 patients were treated with orthovoltage technique with total doses of 5000-6000 rads, 150-10 rads per fraction; 112 patients with Co-60 with total doses 6000-7000 rads, 180-230 rads per fraction. Local-regional control was achieved in 28% of cases. Failures in the neck nodes with primary tumor controlled, were recorded in 10% of patients. Failures in a primary tumor alone were observed in 26% of patients, in primary tumor and neck nodes in 36%. Radiocurability of primary tumor and involved neck nodes was similar. In cases with primary tumor controlled, the probability of eradication of neck nodes metastases is high, even in N3 stage patients. Residual neck nodes palpable 1 to 3 months after irradiation were unfavorable prognostic factor indicated 50% risk of neck recurrence. In patients with complete regression of primary and nodal disease, failure in neck nodes was recorded in 5% of cases. The role of surgery following irradiation in patients with cervical nodes metastases is discussed. (author)

  16. Reinforcement learning for dpm of embedded visual sensor nodes

    International Nuclear Information System (INIS)

    Khani, U.; Sadhayo, I. H.

    2014-01-01

    This paper proposes a RL (Reinforcement Learning) based DPM (Dynamic Power Management) technique to learn time out policies during a visual sensor node's operation which has multiple power/performance states. As opposed to the widely used static time out policies, our proposed DPM policy which is also referred to as OLTP (Online Learning of Time out Policies), learns to dynamically change the time out decisions in the different node states including the non-operational states. The selection of time out values in different power/performance states of a visual sensing platform is based on the workload estimates derived from a ML-ANN (Multi-Layer Artificial Neural Network) and an objective function given by weighted performance and power parameters. The DPM approach is also able to dynamically adjust the power-performance weights online to satisfy a given constraint of either power consumption or performance. Results show that the proposed learning algorithm explores the power-performance tradeoff with non-stationary workload and outperforms other DPM policies. It also performs the online adjustment of the tradeoff parameters in order to meet a user-specified constraint. (author)

  17. SpicyNodes Radial Map Engine

    Science.gov (United States)

    Douma, M.; Ligierko, G.; Angelov, I.

    2008-10-01

    The need for information has increased exponentially over the past decades. The current systems for constructing, exploring, classifying, organizing, and searching information face the growing challenge of enabling their users to operate efficiently and intuitively in knowledge-heavy environments. This paper presents SpicyNodes, an advanced user interface for difficult interaction contexts. It is based on an underlying structure known as a radial map, which allows users to manipulate and interact in a natural manner with entities called nodes. This technology overcomes certain limitations of existing solutions and solves the problem of browsing complex sets of linked information. SpicyNodes is also an organic system that projects users into a living space, stimulating exploratory behavior and fostering creative thought. Our interactive radial layout is used for educational purposes and has the potential for numerous other applications.

  18. Node-based analysis of species distributions

    DEFF Research Database (Denmark)

    Borregaard, Michael Krabbe; Rahbek, Carsten; Fjeldså, Jon

    2014-01-01

    overrepresentation score (SOS) and the geographic node divergence (GND) score, which together combine ecological and evolutionary patterns into a single framework and avoids many of the problems that characterize community phylogenetic methods in current use.This approach goes through each node in the phylogeny...... with case studies on two groups with well-described biogeographical histories: a local-scale community data set of hummingbirds in the North Andes, and a large-scale data set of the distribution of all species of New World flycatchers. The node-based analysis of these two groups generates a set...... of intuitively interpretable patterns that are consistent with current biogeographical knowledge.Importantly, the results are statistically tractable, opening many possibilities for their use in analyses of evolutionary, historical and spatial patterns of species diversity. The method is implemented...

  19. Experimental characterization of a new multicasting node architecture based on space splitters and wavelength converters

    Science.gov (United States)

    He, Hao; Su, Yikai; Hu, Peigang; Hu, Weisheng

    2005-11-01

    IPTV-based broadband services such as interactive multimedia and video conferencing are considered as promising revenue-adding services, and multicast is proven to be a good supplier to support these applications for its reduced consumption of network bandwidth. Generally there are two approaches to implement optical layer multicast. One is space-domain multicast using space-splitter which is low cost but has wavelength continuity constraint, the other is frequency-domain multicast using wavelength converter which resolves the wavelength continuity but with high costs. A new multicasting node which adopts both space-domain multicast and frequency-domain multicast is recently discussed. In this paper we present an experimental demonstration of the new multicasting node architecture based on space splitters and wavelength converters, measurements to characterize such a node are provided.

  20. [Radiotherapy in node-positive prostate cancer].

    Science.gov (United States)

    Bottke, D; Bartkowiak, D; Bolenz, C; Wiegel, T

    2016-03-01

    There are numerous randomized trials to guide the management of patients with localized (and metastatic) prostate cancer, but only a few (mostly retrospective) studies have specifically addressed node-positive patients. Therefore, there is uncertainty regarding optimal treatment in this situation. Current guidelines recommend long-term androgen deprivation therapy (ADT) alone or radiotherapy plus long-term ADT as treatment options. This overview summarizes the existing literature on the use of radiotherapy for node-positive prostate cancer as definitive treatment and as adjuvant or salvage therapy after radical prostatectomy. In this context, we also discuss several PET tracers in the imaging evaluation of patients with biochemical recurrence of prostate cancer after radical prostatectomy. As for definitive treatment, retrospective studies suggest that ADT plus radiotherapy improves overall survival compared with ADT alone. These studies also consistently demonstrated that many patients with node-positive prostate cancer can achieve long-term survival - and are likely curable - with aggressive therapy. The beneficial impact of adjuvant radiotherapy on survival in patients with pN1 prostate cancer seems to be highly influenced by tumor characteristics. Men with ≤ 2 positive lymph nodes in the presence of intermediate- to high-grade disease, or positive margins, and those with 3 or 4 positive lymph nodes are the ideal candidates for adjuvant radiotherapy (plus long-term ADT) after surgery. There is a need for randomized trials to further examine the potential role of radiotherapy as either definitive or adjuvant treatment, for patients with node-positive prostate cancer.

  1. Hidden but important parameters in Ga{sub 0.5}In{sub 0.5}P cell growth

    Energy Technology Data Exchange (ETDEWEB)

    Kurtz, S.R.; Olson, J.M.; Bertness, K.A. [National Renewable Energy Lab., Golden, CO (United States)] [and others

    1996-05-01

    Despite their best intentions, authors often omit from publications many important technical details. These omissions can lead to contradictions in the literature and inhibit {open_quotes}researchers{close_quotes} abilities to duplicate published results. Here, the authors explore {open_quote}hidden{close_quote} parameters that are usually not reported, either because they are unknown (e.g., impurity levels) or because they are considered to be of little importance. Specifically the authors focus on the effects - and how to reduce the effects - of growth parameters in nearby layers (diffusion), impurities (oxygen), and the cooldown atmosphere (hydrogen passivation).

  2. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  3. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    International Nuclear Information System (INIS)

    Itoh, H.; Okada, N.; Yamashita, T.

    2007-01-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden. (author)

  4. Towards Interactive, Incremental Programming of ROS Nodes

    DEFF Research Database (Denmark)

    Adam, Marian Sorin; Schultz, Ulrik Pagh

    Writing software for controlling robots is a complex task, usually demanding command of many programming languages and requiring significant experimentation. We believe that a bottom-up development process that complements traditional component- and MDSD-based approaches can facilitate...... experimentation. We propose the use of an internal DSL providing both a tool to interactively create ROS nodes and a behaviour-replacement mechanism to interactively reshape existing ROS nodes by wrapping the external interfaces (the publish/subscribe topics), dynamically controlled using the Python command line...

  5. Refining Nodes and Edges of State Machines

    DEFF Research Database (Denmark)

    Hallerstede, Stefan; Snook, Colin

    2011-01-01

    State machines are hierarchical automata that are widely used to structure complex behavioural specifications. We develop two notions of refinement of state machines, node refinement and edge refinement. We compare the two notions by means of examples and argue that, by adopting simple conventions...... refinement theory and UML-B state machine refinement influences the style of node refinement. Hence we propose a method with direct proof of state machine refinement avoiding the detour via Event-B that is needed by UML-B....

  6. Simultaneous dual pathology in lymph node

    Directory of Open Access Journals (Sweden)

    Prakas Kumar Mandal

    2014-05-01

    Full Text Available [Abstract] Tubercuous lymphadenitis and Non Hodgkins’ Lymphoma are common in India. As both diseases can occur in elderly persons there is a definite chance of co-existence of both diseases; but that coexistence has not been reported. Here we present a unique case in an elderly woman who had synchronous double pathology of tuberculosis (TB and Diffuse Large B cell Lymphoma (DLBCL of the lymph nodes.     Key words:- lymph nodes, tuberculosis (TB, Diffuse Large B cell Lymphoma (DLBCL.

  7. Magnetization of topological line-node semimetals

    Science.gov (United States)

    Mikitik, G. P.; Sharlai, Yu. V.

    2018-02-01

    Using an approximate expression for the Landau levels of the electrons located near a nodal line of a topological line-node semimetal, we obtain formulas for the magnetization of this semimetal at an arbitrary shape of its line. It is also shown that the dependence of the chemical potential on the magnetic field can be strong in these materials, and this dependence can essentially influence the de Haas-van Alphen oscillations. The obtained results are applied to the rhombohedral graphite, which is one of the line-node semimetals. For this material, we find temperature and magnetic field dependencies of its magnetic susceptibility.

  8. On the hidden maxwell superalgebra underlying D = 4 supergravity

    Energy Technology Data Exchange (ETDEWEB)

    Penafiel, D.M. [Departamento de Fisica, Universidad de Concepcion (Chile); DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy); Ravera, L. [DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy)

    2017-09-15

    In this work, we expand the hidden AdS-Lorentz superalgebra underlying D = 4 supergravity, reaching a (hidden) Maxwell superalgebra. The latter can be viewed as an extension involving cosmological constant of the superalgebra underlying D = 4 supergravity in flat spacetime. We write the Maurer-Cartan equations in this context and we find some interesting extensions of the antisymmetric 3-form A{sup (3)} appearing in the Free Differential Algebra in Minkowski space. The structure of Free Differential Algebras is obtained by considering the zero curvature equations. We write the parametrization of A{sup (3)} in terms of 1-forms and we rend the topological features of its extensions manifest. We interestingly find out that the structure of these extensions, and consequently the structure of the corresponding boundary contribution dA{sup (3)}, strongly depends on the form of the extra fermionic generator appearing in the hidden Maxwell superalgebra. The model we develop in this work is defined in an enlarged superspace with respect to the ordinary one, and the extra bosonic and fermionic 1-forms required for the closure of the hidden Maxwell superalgebra must be considered as physical fields in this enlarged superspace. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  9. Generalized inequalities for quantum correlations with hidden variables

    International Nuclear Information System (INIS)

    Vinduska, M.

    1991-01-01

    Renowned inequalities for quantum correlations are generalized for the case when quantum system cannot be described with an absolute independent measure of the probability. Such a formulation appears to be suitable for the formulation of the hidden variables theory in terms of non-Euclidean geometry. 10 refs

  10. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated

  11. Measurement problem and local hidden variables with entangled photons

    Directory of Open Access Journals (Sweden)

    Muchowski Eugen

    2017-12-01

    Full Text Available It is shown that there is no remote action with polarization measurements of photons in singlet state. A model is presented introducing a hidden parameter which determines the polarizer output. This model is able to explain the polarization measurement results with entangled photons. It is not ruled out by Bell’s Theorem.

  12. The incompatibility between local hidden variable theories and the ...

    Indian Academy of Sciences (India)

    I discuss in detail the result that the Bell's inequalities derived in the context of local hidden variable theories for discrete quantized observables can be satisfied only if a fundamental conservation law is violated on the average. This result shows that such theories are physically nonviable, and makes the demarcating criteria ...

  13. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  14. Hidden symmetries of the Principal Chiral Model unveiled

    International Nuclear Information System (INIS)

    Devchand, C.; Schiff, J.

    1996-12-01

    By relating the two-dimensional U(N) Principal Chiral Model to a Simple linear system we obtain a free-field parametrization of solutions. Obvious symmetry transformations on the free-field data give symmetries of the model. In this way all known 'hidden symmetries' and Baecklund transformations, as well as a host of new symmetries, arise. (author). 21 refs

  15. A hidden bias in a common calorimeter calibration scheme

    International Nuclear Information System (INIS)

    Lincoln, Don; Morrow, Greg; Kasper, Peter

    1994-01-01

    In this paper, a common calorimeter calibration scheme is explored and a hidden bias found. Since this bias mimics a non-linearity in response in the calorimeter, it must be understood and removed from the calibration before true non-linearities are investigated. The effect and its removal are explored and understood through straightforward calculus and algebra. ((orig.))

  16. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a

  17. Crisis Entrepreneurs and Hidden Crises : Illustrative Examples of Interactional

    NARCIS (Netherlands)

    Prof. Cees van Woerkum; dr. Annette Klarenbeek

    2012-01-01

    We examine the ways in which a hidden crisis can be exposed from a communication point of view. In which way can organisations create general awareness of a crisis and try to understand the dynamic nature of interactions? With the help of discourse analysis, we have examined the interactional

  18. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...... functions are also discussed....

  19. Duality and hidden symmetries in interacting particle systems

    NARCIS (Netherlands)

    Giardinà, C.; Kurchan, J.; Redig, F.H.J.; Vafayi, K.

    2009-01-01

    In the context of Markov processes, both in discrete and continuous setting, we show a general relation between duality functions and symmetries of the generator. If the generator can be written in the form of a Hamiltonian of a quantum spin system, then the "hidden" symmetries are easily derived.

  20. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving ...

  1. Is There Hidden Potential for Rural Population Growth in Sweden?

    Science.gov (United States)

    Niedomysl, Thomas; Amcoff, Jan

    2011-01-01

    Rural depopulation is a concern in many countries, and various policy initiatives have been taken to combat such trends. This article examines whether hidden potential for rural population growth can be found in Sweden. If such potential exists, it implies that the development prospects for many rural areas are not as unpromising as they may seem…

  2. Optimisation of Hidden Markov Model using Baum–Welch algorithm

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 126; Issue 1. Optimisation of Hidden Markov Model using Baum–Welch algorithm for prediction of maximum and minimum temperature over Indian Himalaya. J C Joshi Tankeshwar Kumar Sunita Srivastava Divya Sachdeva. Volume 126 Issue 1 February 2017 ...

  3. Hidden Markov Model for quantitative prediction of snowfall

    Indian Academy of Sciences (India)

    A Hidden Markov Model (HMM) has been developed for prediction of quantitative snowfall in Pir-Panjal and Great Himalayan mountain ranges of Indian Himalaya. The model predicts snowfall for two days in advance using daily recorded nine meteorological variables of past 20 winters from 1992–2012. There are six ...

  4. Light hidden-sector U(1)s in string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, Mark; Ringwald, Andreas

    2010-02-15

    We review the case for light U(1) gauge bosons in the hidden-sector of heterotic and type II string compactifications, present estimates of the size of their kinetic mixing with the visible-sector hypercharge U(1), and discuss their possibly very interesting phenomenological consequences in particle physics and cosmology. (orig.)

  5. Book Review: "Hidden Markov Models for Time Series: An ...

    African Journals Online (AJOL)

    Hidden Markov Models for Time Series: An Introduction using R. by Walter Zucchini and Iain L. MacDonald. Chapman & Hall (CRC Press), 2009. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.4314/saaj.v10i1.61717 · AJOL African Journals Online.

  6. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  7. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  8. Hidden and generalized conformal symmetry of Kerr–Sen spacetimes

    International Nuclear Information System (INIS)

    Ghezelbash, A M; Siahaan, H M

    2013-01-01

    It is recently conjectured that generic non-extremal Kerr black hole could be holographically dual to a hidden conformal field theory (CFT) in two dimensions. Moreover, it is known that there are two CFT duals (pictures) to describe the charged rotating black holes which correspond to angular momentum J and electric charge Q of the black hole. Furthermore these two pictures can be incorporated by the CFT duals (general picture) that are generated by SL(2,Z) modular group. The general conformal structure can be revealed by looking at charged scalar wave equation in some appropriate values of frequency and charge. In this regard, we consider the wave equation of a charged massless scalar field in the background of Kerr–Sen black hole and show that in the ‘near region’, the wave equation can be reproduced by the Casimir operator of a local SL(2,R) L ×SL(2,R) R hidden conformal symmetry. We find the exact agreement between macroscopic and microscopic physical quantities like entropy and absorption cross section of scalars for Kerr–Sen black hole. We then find an extension of vector fields that in turn yields an extended local family of SL(2,R) L ×SL(2,R) R hidden conformal symmetry, parameterized by one parameter. For some special values of the parameter, we find a copy of SL(2,R) hidden conformal algebra for the charged Gibbons–Maeda–Garfinkle–Horowitz–Strominger black hole in the strong deflection limit. (paper)

  9. Light hidden-sector U(1)s in string compactifications

    International Nuclear Information System (INIS)

    Goodsell, Mark; Ringwald, Andreas

    2010-02-01

    We review the case for light U(1) gauge bosons in the hidden-sector of heterotic and type II string compactifications, present estimates of the size of their kinetic mixing with the visible-sector hypercharge U(1), and discuss their possibly very interesting phenomenological consequences in particle physics and cosmology. (orig.)

  10. Securing Localization With Hidden and Mobile Base Stations

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Srivastava, Mani; Cagalj, Mario

    2006-01-01

    localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure nodecentric...

  11. Optimal Number of States in Hidden Markov Models and its ...

    African Journals Online (AJOL)

    In this paper, Hidden Markov Model is applied to model human movements as to facilitate an automatic detection of the same. A number of activities were simulated with the help of two persons. The four movements considered are walking, sitting down-getting up, fall while walking and fall while standing. The data is ...

  12. Book review: Troubling possibility, hidden fires and secret drawers ...

    African Journals Online (AJOL)

    Book review: Troubling possibility, hidden fires and secret drawers: Tiyambe Zeleza's smouldering charcoal. H.F. Ross. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL.

  13. Charm and Hidden Charm Scalar Resonances in Nuclear Matter

    NARCIS (Netherlands)

    Tolos, Laura; Molina, Raquel; Gamermann, Daniel; Oset, Eulogio

    2009-01-01

    We study the properties of the scalar charm resonances D(s0)(2317) and D(0)(2400), and the theoretical hidden charm state X(3700) in nuclear matter. We find that for the D(s0)(2317) and X(3700) resonances, with negligible and small width at zero density, respectively, the width becomes about 100 MeV

  14. Hidden Markov model for improved ultrasound-based presence detection

    NARCIS (Netherlands)

    Jaramillo Garcia, P.A.; Linnartz, J.P.M.G.

    2015-01-01

    Adaptive lighting systems typically use a presence detector to save energy by switching off lights in unoccupied rooms. However, it is highly annoying when lights are erroneously turned off while a user is present (false negative, FN). This paper focuses on the estimation of presence, using a Hidden

  15. Job Clubs: Getting into the Hidden Labor Market.

    Science.gov (United States)

    Kimeldorf, Martin; Tornow, Janice A.

    1984-01-01

    A job club approach for secondary disabled youth focuses on mastering job seeking skills by behaviorally sequenced steps learned in situational experiences within a self-help group process framework. Students learn to penetrate the hidden job market, to use social networking via the telephone, and to participate successfully in job interviews. (CL)

  16. Unpacking the Hidden Efficacies of Learning in Productive Failure

    Science.gov (United States)

    Hung, David; Chen, Victor; Lim, Seo Hong

    2009-01-01

    This paper describes a framework for learning where learners undergo experimentations with the phenomena at hand according to progressive and staged goals. Bowling is used as a case study in this paper. The premise for experimentations is that learners can experience hidden efficacies, including the formation of "bad habits." A distinction is made…

  17. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  18. Detection of sentinel nodes with radiopharmaceuticals

    International Nuclear Information System (INIS)

    Yokoyama, Kunihiko; Michigishi, Takatoshi; Kinuya, Seigo; Konishi, Shota; Nakajima, Kenichi; Tonami, Norihisa

    2000-01-01

    Sentinel lymph nodes have been found to be an indicator of lymph node metastasis in breast cancer. In Japan, the theory and concept of sentinel lymph nodes in breast cancer have begun to be applied to carcinomas of the digestive system. Based on clinical experience in the detection of sentinel lymph nodes with radiopharmaceuticals, differences and similarities between the radiopharmaceuticals, methods, and techniques used to detect sentinel lymph nodes have been assessed in relation to breast cancer and carcinomas of the digestive system (including carcinomas of the esophagus and large intestine). The greatest difference between the methods used for breast and digestive cancers is the site of administration of the radiopharmaceutical. In breast cancer, the radiopharmaceutical is administered into a superficial organ (i.e., the mammary gland), whereas in carcinomas of the digestive system, it is administered into a deep organ (i.e., digestive tract). Another obvious difference is in lymph flow, i.e., the flow of the mammary glands is subcutaneous whereas lymph flow in the digestive tract is submucosal. Two radionuclide diagnostic methods are available to detect sentinel lymph nodes: sentinel lymphoscintigraphy with a gamma camera and a method that involves the use of a gamma probe intraoperatively. Radiopharmaceuticals used to detect sentinel lymph nodes must be smoothly transferred from the site of administration into the lymph, and uptake by the sentinel lymph node must continue for a long time without excessive flowing to lower reaches. The optimal particle size remains a matter of controversy, and no radiopharmaceuticals appropriate for lymphoscintigraphy have ever been approved in Japan. The authors compared the pharmacokinetics of three different radiopharmaceuticals used for sentinel lymphoscintigraphy in breast cancer ( 99m Tc-labeled albumin, 99m Tc-labeled tin colloid, and 99m Tc-labeled phytic acid) and founded that the detection rate was lowest with

  19. Lymphatic drainage and sentinel node location in breast cancer

    International Nuclear Information System (INIS)

    Uren, R.F.; Howman-Giles, R.B.; Roberts, J.; Renwick, S.; Gillett, D.; Neische, F.; Ramsay-Stewart, G.

    1999-01-01

    Full text: Mammary lymphoscintigraphy using small volume (0.1-0.2 ml) peritumoral injections of 99 Tc m -antimony sulphide colloid provided a map of the lymph drainage of a breast cancer to its draining sentinel lymph nodes in 92 of 102 patients (over 90%). Non-migration of tracer is reduced by post-injection massage for 5 min but may occur especially if the lymphatics are blocked by metastases. Drainage included the axilla in 92%, internal mammary nodes in 43%, supraclavicular nodes in 12% and intramammary interval nodes in 10% of patients. One patient drained to an interpectoral node. Drainage across the centre-line of the breast occurred in 46% of patients but direct drainage to the contralateral side of the patient was not seen. Lymphatic drainage occurred to 1 node field in 52 patients, 2 node fields in 34 patients and 3 node fields in 6 patients, so that 43% of patients had multiple draining node fields. Drainage to non-axillary sites occurred in 51% of patients. In conclusion, mammary lymphoscintigraphy accurately maps sentinel node location in breast cancer. Approximately half of the patients will have sentinel nodes outside the axilla. To achieve complete lymph node staging in patients with breast cancer, it is logical to biopsy these non-axillary sentinel nodes as well as the sentinel nodes in the axilla. Failure to do so will potentially understage the node status in 50% of patients

  20. The Keck keyword layer

    Science.gov (United States)

    Conrad, A. R.; Lupton, W. F.

    1992-01-01

    Each Keck instrument presents a consistent software view to the user interface programmer. The view consists of a small library of functions, which are identical for all instruments, and a large set of keywords, that vary from instrument to instrument. All knowledge of the underlying task structure is hidden from the application programmer by the keyword layer. Image capture software uses the same function library to collect data for the image header. Because the image capture software and the instrument control software are built on top of the same keyword layer, a given observation can be 'replayed' by extracting keyword-value pairs from the image header and passing them back to the control system. The keyword layer features non-blocking as well as blocking I/O. A non-blocking keyword write operation (such as setting a filter position) specifies a callback to be invoked when the operation is complete. A non-blocking keyword read operation specifies a callback to be invoked whenever the keyword changes state. The keyword-callback style meshes well with the widget-callback style commonly used in X window programs. The first keyword library was built for the two Keck optical instruments. More recently, keyword libraries have been developed for the infrared instruments and for telescope control. Although the underlying mechanisms used for inter-process communication by each of these systems vary widely (Lick MUSIC, Sun RPC, and direct socket I/O, respectively), a basic user interface has been written that can be used with any of these systems. Since the keyword libraries are bound to user interface programs dynamically at run time, only a single set of user interface executables is needed. For example, the same program, 'xshow', can be used to display continuously the telescope's position, the time left in an instrument's exposure, or both values simultaneously. Less generic tools that operate on specific keywords, for example an X display that controls optical

  1. An efficient algorithm for the detection of exposed and hidden wormhole attack

    International Nuclear Information System (INIS)

    Khan, Z.A.; Rehman, S.U.; Islam, M.H.

    2016-01-01

    MANETs (Mobile Ad Hoc Networks) are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time) and RSSI (Received Signal Strength Indicator) for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead. (author)

  2. Baryon states with hidden charm in the extended local hidden gauge approach

    International Nuclear Information System (INIS)

    Uchino, T.; Oset, E.; Liang, Wei-Hong

    2016-01-01

    The s-wave interaction of anti DΛ c , anti DΣ c , anti D * Λ c , anti D * Σ c and anti DΣ c * , anti D * Σ c * , is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ c - anti D * Σ c with J = 1/2, and two of anti DΣ c * - anti D * Σ c * with J = 3/2. Moreover, we find a anti D * Σ c resonance which couples to the anti DΛ c channel and one spin degenerated bound state of anti D * Σ c * with J = 1/2,5/2. (orig.)

  3. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  4. A multicenter study of using carbon nanoparticles to show sentinel lymph nodes in early gastric cancer.

    Science.gov (United States)

    Yan, Jun; Zheng, Xiaoling; Liu, Zhangyuanzhu; Yu, Jiang; Deng, Zhenwei; Xue, Fangqing; Zheng, Yu; Chen, Feng; Shi, Hong; Chen, Gang; Lu, Jianping; Cai, Lisheng; Cai, Mingzhi; Xiang, Gao; Hong, Yunfeng; Chen, Wenbo; Li, Guoxin

    2016-04-01

    Lymph node metastasis occurs in approximately 10% of early gastric cancer. Preoperative or intra-operative identification of lymph node metastasis in early gastric cancer is crucial for surgical planning. The purpose of this study was to evaluate the feasibility of using carbon nanoparticles to show sentinel lymph nodes (SLNs) in early gastric cancer. A multicenter study was performed between July 2012 and November 2014. Ninety-one patients with early gastric cancer identified by preoperative endoscopic ultrasonography were recruited. One milliliter carbon nanoparticles suspension, which is approved by Chinese Food and Drug Administration, was endoscopically injected into the submucosal layer at four points around the site of the primary tumor 6-12 h before surgery. Laparoscopic radical resection with D2 lymphadenectomy was performed. SLNs were defined as nodes that were black-dyed by carbon nanoparticles in greater omentum and lesser omentum near gastric cancer. Lymph node status and SLNs accuracy were confirmed by pathological analysis. All patients had black-dyed SLNs lying in greater omentum and/or lesser omentum. SLNs were easily found under laparoscopy. The mean number of SLNs was 4 (range 1-9). Carbon nanoparticles were around cancer in specimen. After pathological analysis, 10 patients (10.99%) had lymph node metastasis in 91 patients with early gastric cancer. SLNs were positive in 9 cases and negative in 82 cases. In pathology, carbon nanoparticles were seen in lymphatic vessels, lymphoid sinus, and macrophages in SLNs. When SLNs were positive, cancer cells were seen in lymph nodes. The sensitivity, specificity, and accuracy of black-dyed SLNs in early gastric cancers were 90, 100, and 98.9 %, respectively. No patient had any side effects of carbon nanoparticles in this study. It is feasible to use carbon nanoparticles to show SLNs in early gastric cancer. Carbon nanoparticles suspension is safe for submucosal injection.

  5. A new approach to laparoscopic lymph node excision in cases of transverse colon cancer.

    Science.gov (United States)

    Nakanishi, Masayoshi; Kokuba, Yukihito; Murayama, Yasutoshi; Komatsu, Shuhei; Shiozaki, Atsushi; Kuriu, Yoshiaki; Ikoma, Hisashi; Ichikawa, Daisuke; Fujiwara, Hitoshi; Okamoto, Kazuma; Ochiai, Toshiya; Otsuji, Eigo

    2012-01-01

    Treatment of transverse colon cancer by laparoscopic surgery is difficult, and this surgery has been excluded in many randomized control trials. Difficulty in excising lymph nodes around the middle colonic artery has been the main factor responsible for the complexity of this surgery. Herein, we describe a new approach to overcome this difficulty in lymph node excision in cases of transverse colon cancer. We adopted the following steps to collect information that was otherwise difficult to obtain from two-dimensional images displayed on the monitor screen, in order to ensure safety during laparoscopic surgery. (1) The omental bursa was opened by directly visualizing it through a small incision created in the median epigastric region, and the cranial side of the transverse colon mesentery was then freed. (2) The colonic drainage vein entering the right gastroepiploic vein was dissected, and a gauze was inserted into the freed layer. (3) Under laparoscopic guidance, the freed layer was fixed, with the inserted gauze serving as a landmark. The lymph nodes were then excised making full use of the horizontal view. Utilization of a small incision in the abdomen enables full use of the horizontal view for manipulations during laparoscopy, allowing safe manipulations for lymph node excision. Copyright © 2012 S. Karger AG, Basel.

  6. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-01-01

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches. PMID:29439439

  7. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks.

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-02-10

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches.

  8. Effects in the network topology due to node aggregation: Empirical evidence from the domestic maritime transportation in Greece

    Science.gov (United States)

    Tsiotas, Dimitrios; Polyzos, Serafeim

    2018-02-01

    This article studies the topological consistency of spatial networks due to node aggregation, examining the changes captured between different network representations that result from nodes' grouping and they refer to the same socioeconomic system. The main purpose of this study is to evaluate what kind of topological information remains unalterable due to node aggregation and, further, to develop a framework for linking the data of an empirical network with data of its socioeconomic environment, when the latter are available for hierarchically higher levels of aggregation, in an effort to promote the interdisciplinary research in the field of complex network analysis. The research question is empirically tested on topological and socioeconomic data extracted from the Greek Maritime Network (GMN) that is modeled as a non-directed multilayer (bilayer) graph consisting of a port-layer, where nodes represent ports, and a prefecture-layer, where nodes represent coastal and insular prefectural groups of ports. The analysis highlights that the connectivity (degree) of the GMN is the most consistent aspect of this multilayer network, which preserves both the topological and the socioeconomic information through node aggregation. In terms of spatial analysis and regional science, such effects illustrate the effectiveness of the prefectural administrative division for the functionality of the Greek maritime transportation system. Overall, this approach proposes a methodological framework that can enjoy further applications about the grouping effects induced on the network topology, providing physical, technical, socioeconomic, strategic or political insights.

  9. Network Design with Node Degree Balance Constraints

    DEFF Research Database (Denmark)

    Pedersen, Michael Berliner; Crainic, Teodor Gabriel

    This presentation discusses an extension to the network design model where there in addition to the flow conservation constraints also are constraints that require design conservation. This means that the number of arcs entering and leaving a node must be the same. As will be shown the model has ...

  10. Penile lymphoscintigraphy for sentinel node identification

    International Nuclear Information System (INIS)

    Valdes Olmos, R.A.; Hoefnagel, C.A.; Tanis, P.J.; Jansen, L.; Nieweg, O.E.; Meinhardt, W.; Horenblas, S.

    2001-01-01

    Lymphoscintigraphy for sentinel node (SN) identification has been extensively validated in breast cancer and melanoma. The aim of this study was to evaluate the findings of lymphoscintigraphy for SN identification in carcinoma of the penis. Lymphoscintigraphy was performed in 74 consecutive patients (mean age 62.2 years, range 28-87 years) with clinically lymph node-negative squamous cell carcinoma of the penis (stage T2 or greater). Following local anaesthesia by xy-locaine 10% spray, technetium-99m nanocolloid (mean dose 64.8 MBq, range 40-131 MBq) in a volume of 0.3-0.4 ml was injected intradermally around the tumour. Shortly after injection, a 20-min dynamic study was performed with a dual-head gamma camera; subsequently, static anterior and lateral images were obtained at 30 min and 2 h using simultaneous cobalt-57 flood source transmission scanning. 57 Co-assisted skin marking defined SN location for gamma probe/blue dye-guided biopsy, which was performed the next day. The SN visualization rate was 97% (72/74). Lymphatic drainage was bilateral in 81% of the cases (58/72), exclusively to the left groin in 13% (9/72) and only to the right groin in 6%. Bilateral lymph node drainage was synchronous in 38% (22/58) and asynchronous in 62% (in 18 patients the initial route was the left groin, and in the other 18, the right groin). Visualization before 30 min occurred in 66 patients (93%), in 64 of them (88%) already during the dynamic study. A total of 173 SNs were visualized (85 in the right groin, 88 in the left groin). Pitfalls were caused by inguinal skin contamination during injection (four patients) and intracavernous administration (one patient). At surgery, a total of 161 SNs were identified and removed. Sixteen patients (22%) had a tumour-positive SN and underwent standard regional lymph node dissection subsequently. During follow-up (median 28 months, range 3-74 months), two patients with a negative SN developed lymph node metastases in the mapped basin

  11. Penile lymphoscintigraphy for sentinel node identification

    Energy Technology Data Exchange (ETDEWEB)

    Valdes Olmos, R.A.; Hoefnagel, C.A. [Netherlands Cancer Inst., Amsterdam (Netherlands). Dept. of Nuclear Medicine; Tanis, P.J.; Jansen, L.; Nieweg, O.E. [Netherlands Cancer Inst., Amsterdam (Netherlands). Dept. of Surgery; Meinhardt, W.; Horenblas, S. [Netherlands Cancer Inst., Amsterdam (Netherlands). Dept. of Urology

    2001-05-01

    Lymphoscintigraphy for sentinel node (SN) identification has been extensively validated in breast cancer and melanoma. The aim of this study was to evaluate the findings of lymphoscintigraphy for SN identification in carcinoma of the penis. Lymphoscintigraphy was performed in 74 consecutive patients (mean age 62.2 years, range 28-87 years) with clinically lymph node-negative squamous cell carcinoma of the penis (stage T2 or greater). Following local anaesthesia by xy-locaine 10% spray, technetium-99m nanocolloid (mean dose 64.8 MBq, range 40-131 MBq) in a volume of 0.3-0.4 ml was injected intradermally around the tumour. Shortly after injection, a 20-min dynamic study was performed with a dual-head gamma camera; subsequently, static anterior and lateral images were obtained at 30 min and 2 h using simultaneous cobalt-57 flood source transmission scanning. {sup 57}Co-assisted skin marking defined SN location for gamma probe/blue dye-guided biopsy, which was performed the next day. The SN visualization rate was 97% (72/74). Lymphatic drainage was bilateral in 81% of the cases (58/72), exclusively to the left groin in 13% (9/72) and only to the right groin in 6%. Bilateral lymph node drainage was synchronous in 38% (22/58) and asynchronous in 62% (in 18 patients the initial route was the left groin, and in the other 18, the right groin). Visualization before 30 min occurred in 66 patients (93%), in 64 of them (88%) already during the dynamic study. A total of 173 SNs were visualized (85 in the right groin, 88 in the left groin). Pitfalls were caused by inguinal skin contamination during injection (four patients) and intracavernous administration (one patient). At surgery, a total of 161 SNs were identified and removed. Sixteen patients (22%) had a tumour-positive SN and underwent standard regional lymph node dissection subsequently. During follow-up (median 28 months, range 3-74 months), two patients with a negative SN developed lymph node metastases in the mapped

  12. Mining Important Nodes in Directed Weighted Complex Networks

    Directory of Open Access Journals (Sweden)

    Yunyun Yang

    2017-01-01

    Full Text Available In complex networks, mining important nodes has been a matter of concern by scholars. In recent years, scholars have focused on mining important nodes in undirected unweighted complex networks. But most of the methods are not applicable to directed weighted complex networks. Therefore, this paper proposes a Two-Way-PageRank method based on PageRank for further discussion of mining important nodes in directed weighted complex networks. We have mainly considered the frequency of contact between nodes and the length of time of contact between nodes. We have considered the source of the nodes (in-degree and the whereabouts of the nodes (out-degree simultaneously. We have given node important performance indicators. Through numerical examples, we analyze the impact of variation of some parameters on node important performance indicators. Finally, the paper has verified the accuracy and validity of the method through empirical network data.

  13. Hidden photons in beam dump experiments and in connection with dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-12-15

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  14. Hidden photons in beam dump experiments and in connection with dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah

    2012-12-01

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  15. Sentinel node biopsy before neoadjuvant chemotherapy spares breast cancer patients axillary lymph node dissection

    NARCIS (Netherlands)

    van Rijk, Maartje C.; Nieweg, Omgo E.; Rutgers, Emiel J. T.; Oldenburg, Hester S. A.; Valdés Olmos, Renato; Hoefnagel, Cornelis A.; Kroon, Bin B. R.

    2006-01-01

    BACKGROUND: Neoadjuvant chemotherapy in breast cancer patients is a valuable method to determine the efficacy of chemotherapy and potentially downsize the primary tumor, which facilitates breast-conserving therapy. In 18 studies published about sentinel node biopsy after neoadjuvant chemotherapy,

  16. Beginning Amazon Web Services with Node.js

    CERN Document Server

    Shackelford, Adam

    2015-01-01

    Beginning Amazon Web Services with Node.js teaches any novice Node.js developer to configure, deploy, and maintain scalable small to large scale Node.js applications in Amazon Web Services. Hosting a Node.js application in a production environment usually means turning to PaaS hosting, but this approach brings problems. Deploying Node.js directly to AWS solves the problems you encounter in these situations, enabling you to cut out the middle man. You will begin with a basic RESTful web service in Node.js, using the popular Express.js framework, pre-built and ready to run in your local env

  17. A stochastic learning algorithm for layered neural networks

    International Nuclear Information System (INIS)

    Bartlett, E.B.; Uhrig, R.E.

    1992-01-01

    The random optimization method typically uses a Gaussian probability density function (PDF) to generate a random search vector. In this paper the random search technique is applied to the neural network training problem and is modified to dynamically seek out the optimal probability density function (OPDF) from which to select the search vector. The dynamic OPDF search process, combined with an auto-adaptive stratified sampling technique and a dynamic node architecture (DNA) learning scheme, completes the modifications of the basic method. The DNA technique determines the appropriate number of hidden nodes needed for a given training problem. By using DNA, researchers do not have to set the neural network architectures before training is initiated. The approach is applied to networks of generalized, fully interconnected, continuous perceptions. Computer simulation results are given

  18. An impossibility theorem for parameter independent hidden variable theories

    Science.gov (United States)

    Leegwater, Gijs

    2016-05-01

    Recently, Roger Colbeck and Renato Renner (C&R) have claimed that '[n]o extension of quantum theory can have improved predictive power' (Colbeck & Renner, 2011, 2012b). If correct, this is a spectacular impossibility theorem for hidden variable theories, which is more general than the theorems of Bell (1964) and Leggett (2003). Also, C&R have used their claim in attempt to prove that a system's quantum-mechanical wave function is in a one-to-one correspondence with its 'ontic' state (Colbeck & Renner, 2012a). C&R's claim essentially means that in any hidden variable theory that is compatible with quantum-mechanical predictions, probabilities of measurement outcomes are independent of these hidden variables. This makes such variables otiose. On closer inspection, however, the generality and validity of the claim can be contested. First, it is based on an assumption called 'Freedom of Choice'. As the name suggests, this assumption involves the independence of an experimenter's choice of measurement settings. But in the way C&R define this assumption, a no-signalling condition is surreptitiously presupposed, making the assumption less innocent than it sounds. When using this definition, any hidden variable theory violating parameter independence, such as Bohmian Mechanics, is immediately shown to be incompatible with quantum-mechanical predictions. Also, the argument of C&R is hard to follow and their mathematical derivation contains several gaps, some of which cannot be closed in the way they suggest. We shall show that these gaps can be filled. The issue with the 'Freedom of Choice' assumption can be circumvented by explicitly assuming parameter independence. This makes the result less general, but better founded. We then obtain an impossibility theorem for hidden variable theories satisfying parameter independence only. As stated above, such hidden variable theories are impossible in the sense that any supplemental variables have no bearing on outcome probabilities

  19. Detection of hydrogen in hidden and spalled layers of turbine blade coatings

    Energy Technology Data Exchange (ETDEWEB)

    Zschau, H.-E. [DECHEMA e. V., Karl-Winnacker-Institut, Theodor-Heuss-Allee 25, D-60486 Frankfurt (Germany)]. E-mail: zschau@dechema.de; Dietrich, M. [DECHEMA e. V., Karl-Winnacker-Institut, Theodor-Heuss-Allee 25, D-60486 Frankfurt (Germany); Renusch, D. [DECHEMA e. V., Karl-Winnacker-Institut, Theodor-Heuss-Allee 25, D-60486 Frankfurt (Germany); Schuetze, M. [DECHEMA e. V., Karl-Winnacker-Institut, Theodor-Heuss-Allee 25, D-60486 Frankfurt (Germany); Meijer, J. [Ruhr-Universitaet-Bochum, Dynamitron-Tandem-Labor, Universitaetsstr. 150, D-44801 Bochum (Germany); Becker, H.-W. [Ruhr-Universitaet-Bochum, Dynamitron-Tandem-Labor, Universitaetsstr. 150, D-44801 Bochum (Germany)

    2006-08-15

    Gas turbine blades are covered with an outer ceramic top coat and an inner metallic bond coat, namely a thermal barrier coating system (TBC). The stability of the TBC is strongly influenced by the thermally growing oxide (TGO) which forms between the top and bond coat during turbine operation. This work is focused on the role of hydrogen in the adhesion of the top coat after oxidation at 1100 deg. C in dry and wet air at various time steps between 75 and 1150 h. To obtain the essential hydrogen information from the TGO the nuclear reaction {sup 1}H({sup 15}N, {alpha}{gamma}){sup 12}C is used with a unique scattering chamber (SDIBA). This equipment combines the defined exfoliation of the top coat by using a 4-points bending mechanism followed by IBA. This allows the determination of hydrogen concentration depth profiles at the TGO and first results are presented.

  20. Challenging the dogma: the hidden layer of non-protein-coding RNAs in complex organisms.

    Science.gov (United States)

    Mattick, John S

    2003-10-01

    The central dogma of biology holds that genetic information normally flows from DNA to RNA to protein. As a consequence it has been generally assumed that genes generally code for proteins, and that proteins fulfil not only most structural and catalytic but also most regulatory functions, in all cells, from microbes to mammals. However, the latter may not be the case in complex organisms. A number of startling observations about the extent of non-protein-coding RNA (ncRNA) transcription in the higher eukaryotes and the range of genetic and epigenetic phenomena that are RNA-directed suggests that the traditional view of the structure of genetic regulatory systems in animals and plants may be incorrect. ncRNA dominates the genomic output of the higher organisms and has been shown to control chromosome architecture, mRNA turnover and the developmental timing of protein expression, and may also regulate transcription and alternative splicing. This paper re-examines the available evidence and suggests a new framework for considering and understanding the genomic programming of biological complexity, autopoietic development and phenotypic variation. Copyright 2003 Wiley Periodicals, Inc.

  1. Exploiting Hidden Layer Responses of Deep Neural Networks for Language Recognition

    Science.gov (United States)

    2016-09-08

    Target Languages Arabic (ara) Egyptian , Iraqi, Levantine, Maghrebi,Modern Standard Chinese (chi) Cantonese, Mandarin, Min, Wu English (eng) British...Frame-by-frame DNN classification x1 x2 x3 xT-­1xT Figure 1: Frame-by-frame DNN Language Identification Figure 1 shows the architecture of the DNN...compare direct DNN system with proposed DNN I-vector system, we trained a single neural network to classify all 20 languages. The architecture of this

  2. Short interspersed DNA elements and miRNAs: a novel hidden gene regulation layer in zebrafish?

    Science.gov (United States)

    Scarpato, Margherita; Angelini, Claudia; Cocca, Ennio; Pallotta, Maria M; Morescalchi, Maria A; Capriglione, Teresa

    2015-09-01

    In this study, we investigated by in silico analysis the possible correlation between microRNAs (miRNAs) and Anamnia V-SINEs (a superfamily of short interspersed nuclear elements), which belong to those retroposon families that have been preserved in vertebrate genomes for millions of years and are actively transcribed because they are embedded in the 3' untranslated region (UTR) of several genes. We report the results of the analysis of the genomic distribution of these mobile elements in zebrafish (Danio rerio) and discuss their involvement in generating miRNA gene loci. The computational study showed that the genes predicted to bear V-SINEs can be targeted by miRNAs with a very high hybridization E-value. Gene ontology analysis indicates that these genes are mainly involved in metabolic, membrane, and cytoplasmic signaling pathways. Nearly all the miRNAs that were predicted to target the V-SINEs of these genes, i.e., miR-338, miR-9, miR-181, miR-724, miR-735, and miR-204, have been validated in similar regulatory roles in mammals. The large number of genes bearing a V-SINE involved in metabolic and cellular processes suggests that V-SINEs may play a role in modulating cell responses to different stimuli and in preserving the metabolic balance during cell proliferation and differentiation. Although they need experimental validation, these preliminary results suggest that in the genome of D. rerio, as in other TE families in vertebrates, the preservation of V-SINE retroposons may also have been favored by their putative role in gene network modulation.

  3. Flood forecasting for the upper reach of the Red River Basin, North ...

    African Journals Online (AJOL)

    This is a multilayer feed forward neural network with a back- ... 2 with the input layer, one hidden layer, andthe output layer with only one node . Theactivation ..... Thepaper is aresult of theresearch project entitled FLOod Control. Decision ...

  4. Node clustering for wireless sensor networks

    International Nuclear Information System (INIS)

    Bhatti, S.; Qureshi, I.A.; Memon, S.

    2012-01-01

    Recent years have witnessed considerable growth in the development and deployment of clustering methods which are not only used to maintain network resources but also increases the reliability of the WSNs (Wireless Sensor Network) and the facts manifest by the wide range of clustering solutions. Node clustering by selecting key parameters to tackle the dynamic behaviour of resource constraint WSN is a challenging issue. This paper highlights the recent progress which has been carried out pertaining to the development of clustering solutions for the WSNs. The paper presents classification of node clustering methods and their comparison based on the objectives, clustering criteria and methodology. In addition, the potential open issues which need to be considered for future work are high lighted. Keywords: Clustering, Sensor Network, Static, Dynamic

  5. Source and sink nodes in absence seizures.

    Science.gov (United States)

    Rodrigues, Abner C; Machado, Birajara S; Caboclo, Luis Otavio S F; Fujita, Andre; Baccala, Luiz A; Sameshima, Koichi

    2016-08-01

    As opposed to focal epilepsy, absence seizures do not exhibit a clear seizure onset zone or focus since its ictal activity rapidly engages both brain hemispheres. Yet recent graph theoretical analysis applied to absence seizures EEG suggests the cortical focal presence, an unexpected feature for this type of epilepsy. In this study, we explore the characteristics of absence seizure by classifying the nodes as to their source/sink natures via weighted directed graph analysis based on connectivity direction and strength estimation using information partial directed coherence (iPDC). By segmenting the EEG signals into relatively short 5-sec-long time windows we studied the evolution of coupling strengths from both sink and source nodes, and the network dynamics of absence seizures in eight patients.

  6. Primary lymph node responses to mosquito bites.

    Science.gov (United States)

    Mellink, J J; Vos, B J

    1977-03-29

    Post-auricular lymph node responses and changes in fresh weight of thymus and spleen of hamsters and mice at 4 and 8 days after primary exposure of both ears to 20 bites by the mosquito Aedes aegypti were studied quantitatively. In both hosts lymph node changes characteristic of the development of cell-mediated immune responses and those which are believed to lead to antibody production occurred, with the emphasis on the latter phenomena. No reactions of thymus and spleen were observed. The responses recorded are considered to be immunologically specific. In hamsters, but not in mice, the responses related to humoral sensitization coincided in time to a large extent with those of the cell-mediated immune processes. The stronger humoral responses in mice were probably in the first place the result of the relatively higher dosages applied.

  7. Heavy superpartners with less tuning from hidden sector renormalisation

    International Nuclear Information System (INIS)

    Hardy, Edward

    2014-01-01

    In supersymmetric extensions of the Standard Model, superpartner masses consistent with collider bounds typically introduce significant tuning of the electroweak scale. We show that hidden sector renormalisation can greatly reduce such a tuning if the supersymmetry breaking, or mediating, sector runs through a region of strong coupling not far from the weak scale. In the simplest models, only the tuning due to the gaugino masses is improved, and a weak scale gluino mass in the region of 5 TeV may be obtained with an associated tuning of only one part in ten. In models with more complex couplings between the visible and hidden sectors, the tuning with respect to sfermions can also be reduced. We give an example of a model, with low scale gauge mediation and superpartner masses allowed by current LHC bounds, that has an overall tuning of one part in twenty

  8. Hidden order and disorder effects in URu2Si2

    Science.gov (United States)

    Bernal, O. O.; Moroz, M. E.; Ishida, K.; Murakawa, H.; Reyes, A. P.; Kuhns, P. L.; MacLaughlin, D. E.; Mydosh, J. A.; Gortenmulder, T. J.

    2006-05-01

    NMR experiments at ambient pressure in URu 2Si 2 demonstrate a linewidth enhancement effect below the hidden order transition temperature T0. We present single-crystal 29Si NMR parameters for various temperatures and for an applied magnetic field perpendicular to the crystal c-axis. By comparing oriented-powder and single-crystal data, we observe that the size of the linewidth enhancement below T0 correlates with the size of the high- T broadening. We measure a 29Si up-field line shift below T0 which indicates the presence of an internal-field average for the entire crystal. This shift also correlates with the high-temperature width. The 101Ru NQR frequency as a function of temperature was also measured. No strong effect on the NQR frequency is observed at T0. Both NMR and NQR measurements suggest a connection between linewidth/disorder effects and the transition to hidden order.

  9. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De......_different are integrated. We experimentally validate our approach on the biologically motivated problem of global pairwise alignment.......A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference...

  10. Hidden Valley Higgs Decays in the ATLAS detector

    CERN Document Server

    Ciapetti, G

    2009-01-01

    A number of extensions of the Standard Model result in particles that are neutral, weakly-coupled and have macroscopic decay lengths that can be comparable with LHC detector dimensions. These particles represent, from an experimental point of view, a challenge both for the trigger and for the reconstruction capabilities of the ATLAS apparatus. For the purpose of exploring the challenges to the trigger posed by long-lived particles, the Hidden Valley scenario serves as an excellent setting. In this note we present the results of a first study of ATLAS detector performance for some Hidden Valley processes with long-lived, neutral states that decay throughout the detector volume to multi heavy-flavor jets, mainly b-bbar.

  11. HMMEditor: a visual editing tool for profile hidden Markov model

    Directory of Open Access Journals (Sweden)

    Cheng Jianlin

    2008-03-01

    Full Text Available Abstract Background Profile Hidden Markov Model (HMM is a powerful statistical model to represent a family of DNA, RNA, and protein sequences. Profile HMM has been widely used in bioinformatics research such as sequence alignment, gene structure prediction, motif identification, protein structure prediction, and biological database search. However, few comprehensive, visual editing tools for profile HMM are publicly available. Results We develop a visual editor for profile Hidden Markov Models (HMMEditor. HMMEditor can visualize the profile HMM architecture, transition probabilities, and emission probabilities. Moreover, it provides functions to edit and save HMM and parameters. Furthermore, HMMEditor allows users to align a sequence against the profile HMM and to visualize the corresponding Viterbi path. Conclusion HMMEditor provides a set of unique functions to visualize and edit a profile HMM. It is a useful tool for biological sequence analysis and modeling. Both HMMEditor software and web service are freely available.

  12. Hidden magnetism in periodically modulated one dimensional dipolar fermions

    Science.gov (United States)

    Fazzini, S.; Montorsi, A.; Roncaglia, M.; Barbiero, L.

    2017-12-01

    The experimental realization of time-dependent ultracold lattice systems has paved the way towards the implementation of new Hubbard-like Hamiltonians. We show that in a one-dimensional two-components lattice dipolar Fermi gas the competition between long range repulsion and correlated hopping induced by periodically modulated on-site interaction allows for the formation of hidden magnetic phases, with degenerate protected edge modes. The magnetism, characterized solely by string-like nonlocal order parameters, manifests in the charge and/or in the spin degrees of freedom. Such behavior is enlighten by employing Luttinger liquid theory and numerical methods. The range of parameters for which hidden magnetism is present can be reached by means of the currently available experimental setups and probes.

  13. Interactive Graph Layout of a Million Nodes

    OpenAIRE

    Peng Mi; Maoyuan Sun; Moeti Masiane; Yong Cao; Chris North

    2016-01-01

    Sensemaking of large graphs, specifically those with millions of nodes, is a crucial task in many fields. Automatic graph layout algorithms, augmented with real-time human-in-the-loop interaction, can potentially support sensemaking of large graphs. However, designing interactive algorithms to achieve this is challenging. In this paper, we tackle the scalability problem of interactive layout of large graphs, and contribute a new GPU-based force-directed layout algorithm that exploits graph to...

  14. Sentinel lymph node concept in oral cancer

    International Nuclear Information System (INIS)

    Hasegawa, Shogo; Omura, Ken; Harada, Hiroyuki; Shimamoto, Hiroaki; Yoshida, Yoshihiko; Uekusa, Masaru; Togawa, Takashi

    2005-01-01

    The cervical lymph node (CLN) status is one of the most important prognostic factors in oral cancer. However, the main method of addressing the CLN depends on diagnostic imaging. Sentinel lymph node (SN) biopsy combined with lymphoscintigraphy may be a minimally invasive technique that samples first-echelon lymph node to predict the need for neck dissection. Focused analysis of the SN is highly accurate in identifying metastases. In this study, we investigate the possibility of identifying the SN in oral cancer and the detection of metastases in SN by HE stain, cytokeratin IHC and cytokeratin 17 reverse transcription polymerase chain reaction (RT-PCR). Twenty-four consecutive patients who had clinically negative CLN underwent SN biopsy, followed by elective neck dissection. SNs were detected by means of mapping with isotope labeling 99m Tc-phytate. All lymph nodes were examined by conventional HE staining for evaluating metastasis. In addition, each SN was cut into multiple sections for cytokeratin IHC staining and for RT-PCR for cytokeratin 17. SNs were identified in 24 (100%) of 24 patients by lymphoscintigraphy and gamma probe. One to seven SNs were identified in each patient. Both HE and immunohistochemical staining of SN identified metastasis in 7 patients (29.2%), and the expression of cytokeratin 17 by RT-PCR of SN was positive in 8 patients (34.8%). No metastases were identified using HE, cytokeratin IHC staining in non-SNs. Neck failure has not developed in 23 (95.8%) of 24 patients. The results strongly suggest the usefulness of the SN concept in oral cancer and for better assessing the status of the CLN. (author)

  15. What are the Hidden Quantum Processes Behind Newton's Laws?

    OpenAIRE

    Ostoma, Tom; Trushyk, Mike

    1999-01-01

    We investigate the hidden quantum processes that are responsible for Newton's laws of motion and Newton's universal law of gravity. We apply Electro-Magnetic Quantum Gravity or EMQG to investigate Newtonian classical physics. EQMG is a quantum gravity theory that is manifestly compatible with Cellular Automata (CA) theory, a new paradigm for physical reality. EMQG is also based on a theory of inertia proposed by R. Haisch, A. Rueda, and H. Puthoff, which we modified and called Quantum Inertia...

  16. Uncovering Hidden Mathematics of the Multiplication Table Using Spreadsheets

    Directory of Open Access Journals (Sweden)

    Sergei Abramovich

    2007-05-01

    Full Text Available This paper reveals a number of learning activities emerging from a spreadsheetgenerated multiplication table. These activities are made possible by using such features of the software as conditional formatting, circular referencing, calculation through iteration, scroll bars, and graphing. The paper is a reflection on a mathematics content course designed for prospective elementary teachers using the hidden mathematics curriculum framework. It is written in support of standards for teaching and recommendations for teachers in North America.

  17. Sterile neutrino, hidden dark matter and their cosmological signatures

    International Nuclear Information System (INIS)

    Das, Subinoy

    2012-01-01

    Though thermal dark matter has been the central idea behind the dark matter candidates, it is highly possible that dark matter of the universe is non-thermal in origin or it might be in thermal contact with some hidden or dark sector but not with standard model. Here we explore the cosmological bounds as well as the signatures on two types of non-thermal dark matter candidates. First we discuss a hidden dark matter with almost no interaction (or very feeble) with standard model particles so that it is not in thermal contact with visible sector but we assume it is thermalized with in a hidden sector due to some interaction. While encompassing the standard cold WIMP scenario, we do not require the freeze-out process to be non-relativistic. Rather, freeze-out may also occur when dark matter particles are semi-relativistic or relativistic. Especially we focus on the warm dark matter scenario in this set up and find the constraints on the warm dark matter mass, cross-section and hidden to visible sector temperature ratio which accounts for the observed dark-matter density, satisfies the Tremaine-Gunn bound on dark-matter phase space density and has a free-streaming length consistent with cosmological constraints on the matter power spectrum. Our method can also be applied to keV sterile neutrino dark matter which is not thermalized with standard model but is thermalized with in a dark sector. The second part of this proceeding focuses on an exotic dark matter candidate which arises from the existence of eV mass sterile neutrino through a late phase transition. Due to existence of a strong scalar force the light sterile states get trapped into stable degenerate micro nuggets. We find that its signature in matter power spectra is close to a warm dark matter candidate.

  18. Pendidikan Anti Korupsi melalui Hidden Curriculum dan Pendidikan Moral

    Directory of Open Access Journals (Sweden)

    Dewi Salistina

    2015-11-01

    Full Text Available This article is intended to elaborate strategies in incorporating anti corruption awareness through hidden curriculum and morality education. It is of necessity to increase such kind of awareness among students so that they can avoid any action related to corruption. In this case, some practices such as good behavior, discipline, and good relationship among students-teachers are fostered in the daily activities at school. The effect is the increase of students’ honesty, responsibility, and solidarity across level of education.

  19. Hidden Markov models: the best models for forager movements?

    Science.gov (United States)

    Joo, Rocio; Bertrand, Sophie; Tam, Jorge; Fablet, Ronan

    2013-01-01

    One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs). We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs). They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour), while their behavioural modes (fishing, searching and cruising) were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines) for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%), significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  20. Einstein-Bohr controversy and theory of hidden variables

    Czech Academy of Sciences Publication Activity Database

    Lokajíček, Miloš V.

    2010-01-01

    Roč. 8, č. 4 (2010), s. 638-645 ISSN 1303-5150 R&D Projects: GA MŠk LA08015 Institutional research plan: CEZ:AV0Z10100502 Keywords : Schroedinger equation * EPR paradox * hidden variables Subject RIV: BF - Elementary Particles and High Energy Physics Impact factor: 0.697, year: 2010 http://arxiv.org/abs/1004.3005

  1. MOBILE APP FOR HIDDEN DATA ANALYTICS OF ONLINE MARKETPLACE SYSTEMS

    OpenAIRE

    Aqle, Aboubakr

    2016-01-01

    In this project, an extensive analysis and evaluation of the existing e-marketplaces is performed. The aim of this analysis is to improve the experience of end-users through an Android application that is capable of summarizing multiple heterogeneous hidden data sources and unify received responses to one single, structured and homogenous source. The proposed Android application is based on the multi-level conceptual analysis and modeling strategy. In which, the data is analyzed in a way ...

  2. About hidden influence of predictor variables: Suppressor and mediator variables

    Directory of Open Access Journals (Sweden)

    Milovanović Boško

    2013-01-01

    Full Text Available In this paper procedure for researching hidden influence of predictor variables in regression models and depicting suppressor variables and mediator variables is shown. It is also shown that detection of suppressor variables and mediator variables could provide refined information about the research problem. As an example for applying this procedure, relation between Atlantic atmospheric centers and air temperature and precipitation amount in Serbia is chosen. [Projekat Ministarstva nauke Republike Srbije, br. 47007

  3. Hidden Markov models: the best models for forager movements?

    Directory of Open Access Journals (Sweden)

    Rocio Joo

    Full Text Available One major challenge in the emerging field of movement ecology is the inference of behavioural modes from movement patterns. This has been mainly addressed through Hidden Markov models (HMMs. We propose here to evaluate two sets of alternative and state-of-the-art modelling approaches. First, we consider hidden semi-Markov models (HSMMs. They may better represent the behavioural dynamics of foragers since they explicitly model the duration of the behavioural modes. Second, we consider discriminative models which state the inference of behavioural modes as a classification issue, and may take better advantage of multivariate and non linear combinations of movement pattern descriptors. For this work, we use a dataset of >200 trips from human foragers, Peruvian fishermen targeting anchovy. Their movements were recorded through a Vessel Monitoring System (∼1 record per hour, while their behavioural modes (fishing, searching and cruising were reported by on-board observers. We compare the efficiency of hidden Markov, hidden semi-Markov, and three discriminative models (random forests, artificial neural networks and support vector machines for inferring the fishermen behavioural modes, using a cross-validation procedure. HSMMs show the highest accuracy (80%, significantly outperforming HMMs and discriminative models. Simulations show that data with higher temporal resolution, HSMMs reach nearly 100% of accuracy. Our results demonstrate to what extent the sequential nature of movement is critical for accurately inferring behavioural modes from a trajectory and we strongly recommend the use of HSMMs for such purpose. In addition, this work opens perspectives on the use of hybrid HSMM-discriminative models, where a discriminative setting for the observation process of HSMMs could greatly improve inference performance.

  4. Hidden mission of the psyche in abuse and addiction.

    Science.gov (United States)

    Gostecnik, Christian; Repic, Tanja; Cvetek, Mateja; Cvetek, Robert

    2010-09-01

    Traumatic experiences can become the central mental content in our psychic structure and can deeply mark all our later perceptions and experiences of our surroundings. We can claim something similar also for addictions of all kinds. In this article, we will demonstrate that recurring traumatic experiences and abuse as well as addiction represent a hidden mission of psyche for resolution and a great cry of longing for salvation.

  5. A preon model with hidden electric and magnetic type charges

    International Nuclear Information System (INIS)

    Pati, J.C.; Strathdee, J.

    1980-11-01

    The U(1) x U(1) binding forces in an earlier preonic composite model of quarks and leptons are interpreted as arising from hidden electric and magnetic type charges. The preons may possess intrinsic spin zero; the half-integer spins of the composites being contributed by the force field. The quark-lepton gauge symmetry is interpreted as an effective low-energy symmetry arising at the composite level. Some remarks are made regarding the possible composite nature of the graviton. (author)

  6. Node-Dependence-Based Dynamic Incentive Algorithm in Opportunistic Networks

    Directory of Open Access Journals (Sweden)

    Ruiyun Yu

    2014-01-01

    Full Text Available Opportunistic networks lack end-to-end paths between source nodes and destination nodes, so the communications are mainly carried out by the “store-carry-forward” strategy. Selfish behaviors of rejecting packet relay requests will severely worsen the network performance. Incentive is an efficient way to reduce selfish behaviors and hence improves the reliability and robustness of the networks. In this paper, we propose the node-dependence-based dynamic gaming incentive (NDI algorithm, which exploits the dynamic repeated gaming to motivate nodes relaying packets for other nodes. The NDI algorithm presents a mechanism of tolerating selfish behaviors of nodes. Reward and punishment methods are also designed based on the node dependence degree. Simulation results show that the NDI algorithm is effective in increasing the delivery ratio and decreasing average latency when there are a lot of selfish nodes in the opportunistic networks.

  7. Sentinel lymph node biopsy: An audit of intraoperative assessment ...

    African Journals Online (AJOL)

    2015-07-02

    Jul 2, 2015 ... Sentinel lymph node biopsy: An audit of ... cytotechnology service ... To audit results from intraoperative assessment of sentinel lymph node ..... out, and turnaround time in gynecologic cytology quality assurance: Findings.

  8. Simplified Dynamic Analysis of Grinders Spindle Node

    Science.gov (United States)

    Demec, Peter

    2014-12-01

    The contribution deals with the simplified dynamic analysis of surface grinding machine spindle node. Dynamic analysis is based on the use of the transfer matrix method, which is essentially a matrix form of method of initial parameters. The advantage of the described method, despite the seemingly complex mathematical apparatus, is primarily, that it does not require for solve the problem of costly commercial software using finite element method. All calculations can be made for example in MS Excel, which is advantageous especially in the initial stages of constructing of spindle node for the rapid assessment of the suitability its design. After detailing the entire structure of spindle node is then also necessary to perform the refined dynamic analysis in the environment of FEM, which it requires the necessary skills and experience and it is therefore economically difficult. This work was developed within grant project KEGA No. 023TUKE-4/2012 Creation of a comprehensive educational - teaching material for the article Production technique using a combination of traditional and modern information technology and e-learning.

  9. Hybrid tracers for sentinel node biopsy

    International Nuclear Information System (INIS)

    Van Den Berg, N. S.; Kleinjan, G. I.; Valdés-Olmos, R. A.; Buckle, T.; Van Leeuwen, F. I.; Klop, W. M.; Horenblas, S.; Van Der Poel, H. G.

    2014-01-01

    Conventional sentinel node (SN) mapping is performed by injection of a radiocolloid followed by lymphoscintigraphy to identify the number and location of the primary tumor draining lymph node(s), the so-called SN(s). Over the last decade research has focused on the introduction of new imaging agents that can further aid (surgical) SN identification. Different tracers for SN mapping, with varying sizes and isotopes have been reported, most of which have proven their value in a clinical setting. A major challenge lies in transferring this diagnostic information obtained at the nuclear medicine department to the operating theatre thereby providing the surgeon with (image) guidance. Conventionally, an intraoperative injection of vital blue dye or a fluorescence dye is given to allow intraoperative optical SN identification. However, for some indications, the radiotracer-based approach remains crucial. More recently, hybrid tracers, that contain both a radioactive and fluorescent label, were introduced to allow for direct integration of pre- and intraoperative guidance technologies. Their potential is especially high when they are used in combination with new surgical imaging modalities and navigation tools. Next to a description of the known tracers for SN mapping, this review discusses the application of hybrid tracers during SN biopsy and how the introduction of these new techniques can further aid in translation of nuclear medicine information into the operating theatre.

  10. The local lymph node assay (LLNA).

    Science.gov (United States)

    Rovida, Costanza; Ryan, Cindy; Cinelli, Serena; Basketter, David; Dearman, Rebecca; Kimber, Ian

    2012-02-01

    The murine local lymph node assay (LLNA) is a widely accepted method for assessing the skin sensitization potential of chemicals. Compared with other in vivo methods in guinea pig, the LLNA offers important advantages with respect to animal welfare, including a requirement for reduced animal numbers as well as reduced pain and trauma. In addition to hazard identification, the LLNA is used for determining the relative skin sensitizing potency of contact allergens as a pivotal contribution to the risk assessment process. The LLNA is the only in vivo method that has been subjected to a formal validation process. The original LLNA protocol is based on measurement of the proliferative activity of draining lymph node cells (LNC), as determined by incorporation of radiolabeled thymidine. Several variants to the original LLNA have been developed to eliminate the use of radioactive materials. One such alternative is considered here: the LLNA:BrdU-ELISA method, which uses 5-bromo-2-deoxyuridine (BrdU) in place of radiolabeled thymidine to measure LNC proliferation in draining nodes. © 2012 by John Wiley & Sons, Inc.

  11. Exploring inequality violations by classical hidden variables numerically

    International Nuclear Information System (INIS)

    Vongehr, Sascha

    2013-01-01

    There are increasingly suggestions for computer simulations of quantum statistics which try to violate Bell type inequalities via classical, common cause correlations. The Clauser–Horne–Shimony–Holt (CHSH) inequality is very robust. However, we argue that with the Einstein–Podolsky–Rosen setup, the CHSH is inferior to the Bell inequality, although and because the latter must assume anti-correlation of entangled photon singlet states. We simulate how often quantum behavior violates both inequalities, depending on the number of photons. Violating Bell 99% of the time is argued to be an ideal benchmark. We present hidden variables that violate the Bell and CHSH inequalities with 50% probability, and ones which violate Bell 85% of the time when missing 13% anti-correlation. We discuss how to present the quantum correlations to a wide audience and conclude that, when defending against claims of hidden classicality, one should demand numerical simulations and insist on anti-correlation and the full amount of Bell violation. -- Highlights: •The widely assumed superiority of the CHSH fails in the EPR problem. •We simulate Bell type inequalities behavior depending on the number of photons. •The core of Bell’s theorem in the EPR setup is introduced in a simple way understandable to a wide audience. •We present hidden variables that violate both inequalities with 50% probability. •Algorithms have been supplied in form of Mathematica programs

  12. In Brief: Hidden environment and health costs of energy

    Science.gov (United States)

    Showstack, Randy

    2009-10-01

    The hidden costs of energy production and use in the United States amounted to an estimated $120 billion in 2005, according to a 19 October report by the U.S. National Research Council. The report, “Hidden Costs of Energy: Unpriced Consequences of Energy Production and Use,” examines hidden costs, including the cost of air pollution damage to human health, which are not reflected in market prices of energy sources, electricity, or gasoline. The report found that in 2005, the total annual external damages from sulfur dioxide, nitrogen oxides, and particulate matter created by coal-burning power plants that produced 95% of the nation's coal-generated electricity were about $62 billion, with nonclimate damages averaging about 3.2 cents for every kilowatt-hour of energy produced. It is estimated that by 2030, nonclimate damages will fall to 1.7 cents per kilowatt-hour. The 2030 figure assumes that new policies already slated for implementation are put in place.

  13. Quasiparticle scattering image in hidden order phases and chiral superconductors

    Energy Technology Data Exchange (ETDEWEB)

    Thalmeier, Peter [Max Planck Institute for Chemical Physics of Solids, 01187 Dresden (Germany); Akbari, Alireza, E-mail: alireza@apctp.org [Asia Pacific Center for Theoretical Physics, Pohang, Gyeongbuk 790-784 (Korea, Republic of); Department of Physics, and Max Planck POSTECH Center for Complex Phase Materials, POSTECH, Pohang 790-784 (Korea, Republic of)

    2016-02-15

    The technique of Bogoliubov quasiparticle interference (QPI) has been successfully used to investigate the symmetry of unconventional superconducting gaps, also in heavy fermion compounds. It was demonstrated that QPI can distinguish between the d-wave singlet candidates in CeCoIn{sub 5}. In URu{sub 2}Si{sub 2} presumably a chiral d-wave singlet superconducting (SC) state exists inside a multipolar hidden order (HO) phase. We show that hidden order leaves an imprint on the symmetry of QPI pattern that may be used to determine the essential question whether HO in URu{sub 2}Si{sub 2} breaks the in-plane rotational symmetry or not. We also demonstrate that the chiral d-wave SC gap leads to a crossover to a quasi-2D QPI spectrum below T{sub c} which sharpens the HO features. Furthermore we investigate the QPI image of chiral p-wave multigap superconductor Sr{sub 2}RuO{sub 4}. - Highlights: • The chiral multigap structure of Sr{sub 2}RuO{sub 4} leads to rotation of QPI spectrum with bias voltage. • 5f band reconstruction in hidden order phase of URu{sub 2}Si{sub 2} is obtained from two orbital model. • The chiral superconductivity in URu{sub 2}Si{sub 2} leads to quasi-2D quasiparticle interference (QPI).

  14. Mass spectra of hidden-charm molecular pentaquarks states

    International Nuclear Information System (INIS)

    Patel, Smruti; Vinodkumar, P.C.

    2016-01-01

    Very recently, the LHCb Collaboration has reported two hidden-charmed resonances P_c(4380) and P_c(4450) consistent with pentaquark states in the Λ_b"0 → K"-J/Ψp process with masses (widths) (4380 ±8 ± 29) MeV ((205 ±18 ± 86) MeV) and (4449.8 ±1.7 ± 2.5) MeV ((39 ±5 ±19) MeV), respectively. The observation of the P_c states has aroused the theorist's strong interest in the hidden-charm pentaquark states. They have been studied in various frameworks, such as the molecule-like pentaquark states, the diquark-diquark-antiquark type pentaquark states, the diquark-triquark type pentaquark states, re-scattering effects, etc. An identification of pentaquark states as exotic hadron has been one of the long standing problems in the physics of strong interaction and quantum chromodynamics (QCD). A decade ago lots of discussion were made about pentaquarks states but due to lack of further experimental evidences the study of pentaquarks have been almost gone in the darkness. But, recent remarkable observation of two resonances i.e. P_c(4380) and P_c(4450) with hidden charm and the minimal quark content cc-baruud provided new impact for studies of pentaquark states and opens a new window to study the exotic hadronic matter

  15. Searching for confining hidden valleys at LHCb, ATLAS, and CMS

    Science.gov (United States)

    Pierce, Aaron; Shakya, Bibhushan; Tsai, Yuhsin; Zhao, Yue

    2018-05-01

    We explore strategies for probing hidden valley scenarios exhibiting confinement. Such scenarios lead to a moderate multiplicity of light hidden hadrons for generic showering and hadronization similar to QCD. Their decays are typically soft and displaced, making them challenging to probe with traditional LHC searches. We show that the low trigger requirements and excellent track and vertex reconstruction at LHCb provide a favorable environment to search for such signals. We propose novel search strategies in both muonic and hadronic channels. We also study existing ATLAS and CMS searches and compare them with our proposals at LHCb. We find that the reach at LHCb is generically better in the parameter space we consider here, even with optimistic background estimations for ATLAS and CMS searches. We discuss potential modifications at ATLAS and CMS that might make these experiments competitive with the LHCb reach. Our proposed searches can be applied to general hidden valley models as well as exotic Higgs boson decays, such as in twin Higgs models.

  16. The selection and implementation of hidden line algorithms

    International Nuclear Information System (INIS)

    Schneider, A.

    1983-06-01

    One of the most challenging problems in the field of computer graphics is the elimination of hidden lines in images of nontransparent bodies. In the real world the nontransparent material hinders the light ray coming from hidden regions to the observer. In the computer based image formation process there is no automatic visibility regulation of this kind. So many lines are created which result in a poor quality of the spacial representation. Therefore a three-dimensional representation on the screen is only meaningfull if the hidden lines are eliminated. For this process many algorithms have been developed in the past. A common feature of these codes is the large amount of computer time needed. In the first generation of algorithms, which are commonly used today, the bodies are modeled by plane polygons. More recently, however, also algorithms are in use, which are able to treat curved surfaces without discretisation by plane surfaces. In this paper the first group of algorithms is reviewed, and the most important codes are described. The experience obtained during the implementation of two algorithms is presented. (orig.) [de

  17. Experimental studies of metastases of esophageal carcinoma to lymph nodes

    International Nuclear Information System (INIS)

    Inoue, Kazumasa

    1977-01-01

    Marked progress has been made in surgery for esophageal carcinoma, however, when compared to results of surgery for other carcinomas of the digestive tract, much research remains to be done. The author transplanted VX2 carcinoma, a transplantable tumor of the rabbit, to the esophagus in attempt to determine the mode of metastases of esophageal carcinoma to lymph nodes and also to observe the effect of chemotherapy (Bleomycin) and radiotherapy (Betatron). Carcinoma of the cervical esophagus metastasized to the cervical lymph nodes and then to the paratracheal lymph nodes. Carcinoma of the upper thoracic esophagus metastasized to the paratracheal lymph nodes and then to the cervical lymph nodes. Carcinoma of the mid-thoracic esophagus metastasized to the intrathoracic lymph nodes and then to the intraperitoneal lymph nodes. Carcinoma of the abdominal esophagus metastasized to the intraperitoneal lymph nodes and then to the intrathoracic lymph nodes. Skipping metastasis was rarely observed. Carcinoma of the thoracic esophagus with metastases of lymph nodes in the cervical or abdominal portion was considerably advanced, therefore it is considered that cleaning of the intrathoracic lymph nodes and simultaneous chemotherapy are required when such cases are encountered clinically. Irradiation resulted in regression in the size of the tumor and metastases to lymph nodes and there was a decrease in metastases to the distant lymph nodes. Effects of irradiation were similar on tumors and lymph nodes with positive metastases located within the field of irradiation. Bleomycin medication resulted in regression in the size of tumor and metastases to lymph nodes. Effects of Bleomycin medication were similar on tumors and lymph nodes with positive metastases. (auth.)

  18. Layered materials

    Science.gov (United States)

    Johnson, David; Clarke, Simon; Wiley, John; Koumoto, Kunihito

    2014-06-01

    Layered compounds, materials with a large anisotropy to their bonding, electrical and/or magnetic properties, have been important in the development of solid state chemistry, physics and engineering applications. Layered materials were the initial test bed where chemists developed intercalation chemistry that evolved into the field of topochemical reactions where researchers are able to perform sequential steps to arrive at kinetically stable products that cannot be directly prepared by other approaches. Physicists have used layered compounds to discover and understand novel phenomena made more apparent through reduced dimensionality. The discovery of charge and spin density waves and more recently the remarkable discovery in condensed matter physics of the two-dimensional topological insulating state were discovered in two-dimensional materials. The understanding developed in two-dimensional materials enabled subsequent extension of these and other phenomena into three-dimensional materials. Layered compounds have also been used in many technologies as engineers and scientists used their unique properties to solve challenging technical problems (low temperature ion conduction for batteries, easy shear planes for lubrication in vacuum, edge decorated catalyst sites for catalytic removal of sulfur from oil, etc). The articles that are published in this issue provide an excellent overview of the spectrum of activities that are being pursued, as well as an introduction to some of the most established achievements in the field. Clusters of papers discussing thermoelectric properties, electronic structure and transport properties, growth of single two-dimensional layers, intercalation and more extensive topochemical reactions and the interleaving of two structures to form new materials highlight the breadth of current research in this area. These papers will hopefully serve as a useful guideline for the interested reader to different important aspects in this field and

  19. Charge Density Waves and the Hidden Nesting of Purple Bronze KMo6O17

    Science.gov (United States)

    Su, Lei; Pereira, Vitor

    The layered purple bronze KMo6O17, with its robust triple CDW phase up to high temperatures, became the emblematic example of the ''hidden nesting'' concept. Recent experiments suggest that, on the surface layers, its CDW phase can be stabilized at much higher temperatures, and with a tenfold increase in the electronic gap in comparison with the bulk. Despite such interesting fermiology and properties, the K and Na purple bronzes remain largely unexplored systems, most particularly so at the theoretical level. We introduce the first multi-orbital effective tight-binding model to describe the effect of electron-electron interactions in this system. Upon fixing all the effective hopping parameters in the normal state against an ab-initio band structure, and with only the overall scale of the interactions as sole adjustable parameter, we find that a self-consistent Hartree-Fock solution reproduces extremely well the experimental behavior of the charge density wave (CDW) order parameter in the full range 0 < T < Tc , as well as the precise reciprocal space locations of the partial gap opening and Fermi arc development. The interaction strengths extracted from fitting to the experimental CDW gap are consistent with those derived from an independent Stoner-type analysis This work was supported by the Singapore National Research Foundation under Grant NRF-CRP6-2010-05.

  20. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    Science.gov (United States)

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  1. Intraoperative examination of sentinel lymph nodes using scrape ...

    African Journals Online (AJOL)

    2014-08-03

    Aug 3, 2014 ... Background. In breast cancer, sentinel lymph node biopsy (SLNB) is widely used to assess the axilla when the nodes appear normal on palpation and ultrasonography. When the sentinel lymph nodes (SLNs) are negative, no further dissection is required. Surgical dissection or radiotherapy of the axilla is ...

  2. Intraoperative examination of sentinel lymph nodes using scrape ...

    African Journals Online (AJOL)

    Background. In breast cancer, sentinel lymph node biopsy (SLNB) is widely used to assess the axilla when the nodes appear normal on palpation and ultrasonography. When the sentinel lymph nodes (SLNs) are negative, no further dissection is required. Surgical dissection or radiotherapy of the axilla is indicated for ...

  3. A Longitudinal Comparison of Arm Morbidity in Stage I-II Breast Cancer Patients Treated with Sentinel Lymph Node Biopsy, Sentinel Lymph Node Biopsy Followed by Completion Lymph Node Dissection, or Axillary Lymph Node Dissection

    NARCIS (Netherlands)

    Kootstra, Jan J.; Hoekstra-Weebers, Josette E. H. M.; Rietman, Johan S.; de Vries, Jakob; Baas, Peter C.; Geertzen, Jan H. B.; Hoekstra, Harald J.

    Background. Long-term shoulder and arm function following sentinel lymph node biopsy (SLNB) may surpass that following complete axillary lymph node dissection (CLND) or axillary lymph node dissection (ALND). We objectively examined the morbidity and compared outcomes after SLNB, SLNB + CLND, and

  4. The histogenesis of lymph nodes in rat and rabbit

    NARCIS (Netherlands)

    Eikelenboom, P.; Nassy, J. J.; Post, J.; Versteeg, J. C.; Langevoort, H. L.

    1978-01-01

    The histogenesis of the popliteal lymph node in the rat and the popliteal and inguinal lymph nodes in the rabbit was examined by light microscopy. Special emphasis has been laid on the initial lymphocyte population in the lymph node anlage. In the rat on the seventeenth day of gestation lymphoid

  5. A longitudinal comparison of arm morbidity in stage I-II breast cancer patients treated with sentinel lymph node biopsy, sentinel lymph node biopsy followed by completion lymph node dissection, or axillary lymph node dissection

    NARCIS (Netherlands)

    Kootstra, Jan J.; Hoekstra-Weebers, Josette E.; Rietman, Johan Swanik; de Vries, Jakob; Baas, Peter C.; Geertzen, Jan H.B.; Hoekstra, Harald J.

    2010-01-01

    Background: Long-term shoulder and arm function following sentinel lymph node biopsy (SLNB) may surpass that following complete axillary lymph node dissection (CLND) or axillary lymph node dissection (ALND). We objectively examined the morbidity and compared outcomes after SLNB, SLNB + CLND, and

  6. The sentinel node concept in breast cancer: A commentary

    International Nuclear Information System (INIS)

    Canizales, A.L. . E-mail A.L.Canizales@qmul.ac.uk; Al-Yasi, A.; Gambhir, S.; Morris, G.; Granowska, M.; Britton, K.E.

    2004-01-01

    As there are multiple lymphatic pathways from the breast to the axilla with multiple possible choices for a cancer cell or a colloid, it appears intuitively unusual that one node is preferentially 'chosen'. The intuitive response would be that there is an equal chance for a breast cancer cell to travel by any lymphatic pathway to any axillary node at level 1. If this were true, then after a colloid injection into the peritumoural lymphatics or the periareolar lymphatic plexus, such a colloid has a similar chance to travel to any level 1 axillary node, be it an involved node or an uninvolved node. We have tried to resolve this conflict between intuition and practice. It was tested by identifying and measuring the activity of the radiolabelled colloid in the nodes removed in an axillary clearance and in the sentinel node or nodes after applying a sentinel node technique similar to that of Veronesi et al. The histology of all the nodes that were counted was analysed so that the colloid activity in each node was able to be correlated with its histology, whether it was involved with cancer or not involved. Measurements were obtained in those patients, in whom there were both involved and uninvolved nodes in the axillae. The colloid counts in cpm/g of each node were compared with the related sentinel node findings either involved with cancer or not involved. These were calculated either as the involved to uninvolved that is a 'positive' to 'negative' ratio. The results were that the activity ratio of all involved axillary nodes to uninvolved axillary nodes was about 4:1. The involved Sentinel nodes had on average over 25 times the uptake of the uninvolved Sentinel nodes. P value was <0.009 for a significant difference between colloid uptake in sentinel nodes with positive histology and those with negative histology. It is a new observation that involved axillary nodes show greater uptake of the colloid than uninvolved nodes in all patients where there are both involved

  7. Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

    Directory of Open Access Journals (Sweden)

    Shudong Li

    2013-01-01

    Full Text Available In the research on network security, distinguishing the vulnerable components of networks is very important for protecting infrastructures systems. Here, we probe how to identify the vulnerable nodes of complex networks in cascading failures, which was ignored before. Concerned with random attack (RA and highest load attack (HL on nodes, we model cascading dynamics of complex networks. Then, we introduce four kinds of weighting methods to characterize the nodes of networks including Barabási-Albert scale-free networks (SF, Watts-Strogatz small-world networks (WS, Erdos-Renyi random networks (ER, and two real-world networks. The simulations show that, for SF networks under HL attack, the nodes with small value of the fourth kind of weight are the most vulnerable and the ones with small value of the third weight are also vulnerable. Also, the real-world autonomous system with power-law distribution verifies these findings. Moreover, for WS and ER networks under both RA and HL attack, when the nodes have low tolerant ability, the ones with small value of the fourth kind of weight are more vulnerable and also the ones with high degree are easier to break down. The results give us important theoretical basis for digging the potential safety loophole and making protection strategy.

  8. A random network based, node attraction facilitated network evolution method

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2016-03-01

    Full Text Available In present study, I present a method of network evolution that based on random network, and facilitated by node attraction. In this method, I assume that the initial network is a random network, or a given initial network. When a node is ready to connect, it tends to link to the node already owning the most connections, which coincides with the general rule (Barabasi and Albert, 1999 of node connecting. In addition, a node may randomly disconnect a connection i.e., the addition of connections in the network is accompanied by the pruning of some connections. The dynamics of network evolution is determined of the attraction factor Lamda of nodes, the probability of node connection, the probability of node disconnection, and the expected initial connectance. The attraction factor of nodes, the probability of node connection, and the probability of node disconnection are time and node varying. Various dynamics can be achieved by adjusting these parameters. Effects of simplified parameters on network evolution are analyzed. The changes of attraction factor Lamda can reflect various effects of the node degree on connection mechanism. Even the changes of Lamda only will generate various networks from the random to the complex. Therefore, the present algorithm can be treated as a general model for network evolution. Modeling results show that to generate a power-law type of network, the likelihood of a node attracting connections is dependent upon the power function of the node's degree with a higher-order power. Matlab codes for simplified version of the method are provided.

  9. Lymph Node Micrometastases are Associated with Worse Survival in Patients with Otherwise Node-Negative Hilar Cholangiocarcinoma

    NARCIS (Netherlands)

    Mantel, Hendrik T. J.; Wiggers, Jim K.; Verheij, Joanne; Doff, Jan J.; Sieders, Egbert; van Gulik, Thomas M.; Gouw, Annette S. H.; Porte, Robert J.

    2015-01-01

    Lymph node metastases on routine histology are a strong negative predictor for survival after resection of hilar cholangiocarcinoma. Additional immunohistochemistry can detect lymph node micrometastases in patients who are otherwise node negative, but the prognostic value is unsure. The objective of

  10. Modular representation of layered neural networks.

    Science.gov (United States)

    Watanabe, Chihiro; Hiramatsu, Kaoru; Kashino, Kunio

    2018-01-01

    Layered neural networks have greatly improved the performance of various applications including image processing, speech recognition, natural language processing, and bioinformatics. However, it is still difficult to discover or interpret knowledge from the inference provided by a layered neural network, since its internal representation has many nonlinear and complex parameters embedded in hierarchical layers. Therefore, it becomes important to establish a new methodology by which layered neural networks can be understood. In this paper, we propose a new method for extracting a global and simplified structure from a layered neural network. Based on network analysis, the proposed method detects communities or clusters of units with similar connection patterns. We show its effectiveness by applying it to three use cases. (1) Network decomposition: it can decompose a trained neural network into multiple small independent networks thus dividing the problem and reducing the computation time. (2) Training assessment: the appropriateness of a trained result with a given hyperparameter or randomly chosen initial parameters can be evaluated by using a modularity index. And (3) data analysis: in practical data it reveals the community structure in the input, hidden, and output layers, which serves as a clue for discovering knowledge from a trained neural network. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Broadband Control of Topological Nodes in Electromagnetic Fields

    Science.gov (United States)

    Song, Alex Y.; Catrysse, Peter B.; Fan, Shanhui

    2018-05-01

    We study topological nodes (phase singularities) in electromagnetic wave interactions with structures. We show that, when the nodes exist, it is possible to bind certain nodes to a specific plane in the structure by a combination of mirror and time-reversal symmetry. Such binding does not rely on any resonances in the structure. As a result, the nodes persist on the plane over a wide wavelength range. As an implication of such broadband binding, we demonstrate that the topological nodes can be used for hiding of metallic objects over a broad wavelength range.

  12. Effects of node buffer and capacity on network traffic

    International Nuclear Information System (INIS)

    Ling Xiang; Ding Jian-Xun; Hu Mao-Bin

    2012-01-01

    In this paper, we study the optimization of network traffic by considering the effects of node buffer ability and capacity. Two node buffer settings are considered. The node capacity is considered to be proportional to its buffer ability. The node effects on network traffic systems are studied with the shortest path protocol and an extension of the optimal routing [Phys. Rev. E 74 046106 (2006)]. In the diagrams of flux—density relationships, it is shown that a nodes buffer ability and capacity have profound effects on the network traffic

  13. Partial axillary lymph node dissection inferior to the intercostobrachial nerves complements sentinel node biopsy in patients with clinically node-negative breast cancer.

    Science.gov (United States)

    Li, Jianyi; Jia, Shi; Zhang, Wenhai; Qiu, Fang; Zhang, Yang; Gu, Xi; Xue, Jinqi

    2015-06-30

    The practice of breast cancer diagnosis and treatment in China varies to that in western developed countries. With the unavailability of radioactive tracer technique for sentinel lymph nodes biopsy (SLNB), using blue dye alone has been the only option in China. Also, the diagnosis of breast malignant tumor in most Chinese centres heavily relies on intraoperative instant frozen histology which is normally followed by sentinel lymph nodes mapping, SLNB and the potential breast and axillary operations in one consecutive session. This practice appears to cause a high false negative rate (FNR) for SLNB. The present study aimed to investigate the impact of the current practice in China on the accuracy of SLNB, and whether partial axillary lymph node dissection (PALND), dissection of lymph nodes inferior to the intercostobrachial nerve (ICBN), was a good complementary procedure following SLNB using blue dye. 289 patients with clinically node-negative breast cancer were identified and recruited. Tumorectomy, intraoperative instant frozen histological diagnosis, SLNB using methylene blue dye, and PALND or complete axillary node dissection (ALND) were performed in one consecutive operative session. The choice of SLNB only, SLNB followed by PALND or by ALND was based on the pre-determined protocol and preoperative choice by the patient. Clinical parameters were analyzed and survival analysis was performed. 37% patients with clinically negative nodes were found nodes positive. 59 patients with positive SLN underwent ALND, including 47 patients with up to two positive nodes which were all located inferior to the ICBN. 9 patients had failed SLNB and underwent PALND. Among them, 3 (33.3%) patients were found to have one metastatic node. 149 patients showed negative SLNB but chose PALND. Among them, 30 (20.1%), 14 (9.4) and 1 (0.7%) patients were found to have one, two and three metastatic node(s), respectively. PALND detected 48 (30.4%) patients who had either failed SLNB or

  14. The generation of random directed networks with prescribed 1-node and 2-node degree correlations

    Energy Technology Data Exchange (ETDEWEB)

    Zamora-Lopez, Gorka; Kurths, Juergen [Institute of Physics, University of Potsdam, PO Box 601553, 14415 Potsdam (Germany); Zhou Changsong [Department of Physics, Hong Kong Baptist University, Kowloon Tong, Hong Kong (China); Zlatic, Vinko [Rudjer Boskovic Institute, PO Box 180, HR-10002 Zagreb (Croatia)

    2008-06-06

    The generation of random networks is a very common problem in complex network research. In this paper, we have studied the correlation nature of several real networks and found that, typically, a large number of links are deterministic, i.e. they cannot be randomized. This finding permits fast generation of ensembles of maximally random networks with prescribed 1-node and 2-node degree correlations. When the introduction of self-loops or multiple-links are not desired, random network generation methods typically reach blocked states. Here, a mechanism is proposed, the 'force-and-drop' method, to overcome such states. Our algorithm can be easily simplified for undirected graphs and reduced to account for any subclass of 2-node degree correlations.

  15. The generation of random directed networks with prescribed 1-node and 2-node degree correlations

    International Nuclear Information System (INIS)

    Zamora-Lopez, Gorka; Kurths, Juergen; Zhou Changsong; Zlatic, Vinko

    2008-01-01

    The generation of random networks is a very common problem in complex network research. In this paper, we have studied the correlation nature of several real networks and found that, typically, a large number of links are deterministic, i.e. they cannot be randomized. This finding permits fast generation of ensembles of maximally random networks with prescribed 1-node and 2-node degree correlations. When the introduction of self-loops or multiple-links are not desired, random network generation methods typically reach blocked states. Here, a mechanism is proposed, the 'force-and-drop' method, to overcome such states. Our algorithm can be easily simplified for undirected graphs and reduced to account for any subclass of 2-node degree correlations

  16. R2NA: Received Signal Strength (RSS Ratio-Based Node Authentication for Body Area Network

    Directory of Open Access Journals (Sweden)

    Yang Wu

    2013-12-01

    Full Text Available The body area network (BAN is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.

  17. Sentinel lymph node biopsy is indicated for patients with thick clinically lymph node-negative melanoma.

    Science.gov (United States)

    Yamamoto, Maki; Fisher, Kate J; Wong, Joyce Y; Koscso, Jonathan M; Konstantinovic, Monique A; Govsyeyev, Nicholas; Messina, Jane L; Sarnaik, Amod A; Cruse, C Wayne; Gonzalez, Ricardo J; Sondak, Vernon K; Zager, Jonathan S

    2015-05-15

    Sentinel lymph node biopsy (SLNB) is indicated for the staging of clinically lymph node-negative melanoma of intermediate thickness, but its use is controversial in patients with thick melanoma. From 2002 to 2012, patients with melanoma measuring ≥4 mm in thickness were evaluated at a single institution. Associations between survival and clinicopathologic characteristics were explored. Of 571 patients with melanomas measuring ≥4 mm in thickness and no distant metastases, the median age was 66 years and 401 patients (70.2%) were male. The median Breslow thickness was 6.2 mm; the predominant subtype was nodular (45.4%). SLNB was performed in 412 patients (72%) whereas 46 patients (8.1%) presented with clinically lymph node-positive disease and 113 patients (20%) did not undergo SLNB. A positive SLN was found in 161 of 412 patients (39.1%). For SLNB performed at the study institution, 14 patients with a negative SLNB developed disease recurrence in the mapped lymph node basin (false-negative rate, 12.3%). The median disease-specific survival (DSS), overall survival (OS), and recurrence-free survival (RFS) for the entire cohort were 62.1 months, 42.5 months, and 21.2 months, respectively. The DSS and OS for patients with a negative SLNB were 82.4 months and 53.4 months, respectively; 41.2 months and 34.7 months, respectively, for patients with positive SLNB; and 26.8 months and 22 months, respectively, for patients with clinically lymph node-positive disease (Pthick melanoma and a negative SLNB appear to have significantly prolonged RFS, DSS, and OS compared with those with a positive SLNB. Therefore, SLNB should be considered as indicated for patients with thick, clinically lymph node-negative melanoma. © 2015 American Cancer Society.

  18. Sentinel lymph node detection in canine oncological patients

    International Nuclear Information System (INIS)

    Balogh, L.; Andocs, G.; Mathe, D.

    2002-01-01

    Sentinel lymph node detection was investigated in dogs with spontaneously occurring tumours. In this pilot study, 24 client-owned spontaneously tumorous dogs presented for sentinel lymph node detection. A multiple method was used with a nuclear medicine technique (injection of 99mT c human serum albumin colloid) with scintigraphy and intraoperative guidance, and blue dye injection. Of the 35 lymph nodes histologically demonstrated to contain metastases, 34 (97%) were found by radioguided surgery, which means that one would have been missed in the intraoperative localisation process; 31 nodes (89%) were clearly visualised in the gamma camera images; only 27 (77%) were blue-stained by vital dye; a mere 8 lymph nodes (23%) were enlarged and therefore easily detectable by palpation. Data obtained from the harmless application of the sentinel node concept are useful for the radiopharmaceutist. The sentinel lymph node concept is well applicable in the veterinary clinic. (author)

  19. Diagnostic possibilities in lymphatic node diseases

    International Nuclear Information System (INIS)

    Radeva, M.

    1994-01-01

    A brief review of lymphoscintigraphy applied in Bulgarian medical practice is presented. The most widely used radiopharmaceuticals are listed: 9 m Tc-colloid and 113 In-colloid; 67 Ga-citrate, 75 Se-methionine, 51 Cr-bleomycin, 201 Tl-chloride; monoclonal antibodies labelled with 125 I, 131 I, 111 In, 99 Tc. Some pathological changes occurring during indirect colloid lymphoscintigraphy re mentioned. Except for diagnostic purposes, lymphoscintigraphy is also used in following up the development of malignant lymphomas. A combination of indirect lymphoscintigraphy with succeeding radioimmunoscintigraphy of lymph nodes gives maximal reliable and precise data about the disease process and its distribution. 9 refs. (orig.)

  20. Functional Testing of Wireless Sensor Node Designs

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Madsen, Jan

    2007-01-01

    Wireless sensor networks are networked embedded computer systems with stringent power, performance, cost and form-factor requirements along with numerous other constraints related to their pervasiveness and ubiquitousness. Therefore, only a systematic design methdology coupled with an efficient...... test approach can enable their conformance to design and deployment specifications. We discuss off-line, hierarchical, functional testing of complete wireless sensor nodes containing configurable logic through a combination of FPGA-based board test and Software-Based Self-Test (SBST) techniques...

  1. Hidden Markov Model Application to Transfer The Trader Online Forex Brokers

    Directory of Open Access Journals (Sweden)

    Farida Suharleni

    2012-05-01

    Full Text Available Hidden Markov Model is elaboration of Markov chain, which is applicable to cases that can’t directly observe. In this research, Hidden Markov Model is used to know trader’s transition to broker forex online. In Hidden Markov Model, observed state is observable part and hidden state is hidden part. Hidden Markov Model allows modeling system that contains interrelated observed state and hidden state. As observed state in trader’s transition to broker forex online is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online, whereas as hidden state is broker forex online Marketiva, Masterforex, Instaforex, FBS and Others. First step on application of Hidden Markov Model in this research is making construction model by making a probability of transition matrix (A from every broker forex online. Next step is making a probability of observation matrix (B by making conditional probability of five categories, that is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online and also need to determine an initial state probability (π from every broker forex online. The last step is using Viterbi algorithm to find hidden state sequences that is broker forex online sequences which is the most possible based on model and observed state that is the five categories. Application of Hidden Markov Model is done by making program with Viterbi algorithm using Delphi 7.0 software with observed state based on simulation data. Example: By the number of observation T = 5 and observed state sequences O = (2,4,3,5,1 is found hidden state sequences which the most possible with observed state O as following : where X1 = FBS, X2 = Masterforex, X3 = Marketiva, X4 = Others, and X5 = Instaforex.

  2. Invisible axion in the hidden sector of no-scale supergravity

    International Nuclear Information System (INIS)

    Sato, Hikaru

    1987-01-01

    We propose a new axion model which incorporates the U(1) PQ symmetry into a hidden sector, as well as an observable sector, of no-scale supergravity models. The axion is a spin-zero field in the hidden sector. The U(1) PQ symmetry is naturally embedded in the family symmetry of the no-scale models. Invisible axions live in the gravity hidden sector without conflict with the cosmological and astrophysical constraints. (orig.)

  3. Complicated basins and the phenomenon of amplitude death in coupled hidden attractors

    Energy Technology Data Exchange (ETDEWEB)

    Chaudhuri, Ushnish [Department of Physics, Sri Venkateswara College, University of Delhi, New Delhi 110021 (India); Department of Physics, National University of Singapore, Singapore 117551 (Singapore); Prasad, Awadhesh, E-mail: awadhesh@physics.du.ac.in [Department of Physics and Astrophysics, University of Delhi, Delhi 110007 (India)

    2014-02-07

    Understanding hidden attractors, whose basins of attraction do not contain the neighborhood of equilibrium of the system, are important in many physical applications. We observe riddled-like complicated basins of coexisting hidden attractors both in coupled and uncoupled systems. Amplitude death is observed in coupled hidden attractors with no fixed point using nonlinear interaction. A new route to amplitude death is observed in time-delay coupled hidden attractors. Numerical results are presented for systems with no or one stable fixed point. The applications are highlighted.

  4. Incremental discovery of hidden structure: Applications in theory of elementary particles

    International Nuclear Information System (INIS)

    Zytkow, J.M.; Fischer, P.J.

    1996-01-01

    Discovering hidden structure is a challenging, universal research task in Physics, Chemistry, Biology, and other disciplines. Not only must the elements of hidden structure be postulated by the discoverer, but they can only be verified by indirect evidence, at the level of observable objects. In this paper we describe a framework for hidden structure discovery, built on a constructive definition of hidden structure. This definition leads to operators that build models of hidden structure step by step, postulating hidden objects, their combinations and properties, reactions described in terms of hidden objects, and mapping between the hidden and the observed structure. We introduce the operator dependency diagram, which shows the order of operator application and model evaluation. Different observational knowledge supports different evaluation criteria, which lead to different search systems with verifiable sequences of operator applications. Isomorph-free structure generation is another issue critical for efficiency of search. We apply our framework in the system GELL-MANN, that hypothesizes hidden structure for elementary particles and we present the results of a large scale search for quark models

  5. Interactive Graph Layout of a Million Nodes

    Directory of Open Access Journals (Sweden)

    Peng Mi

    2016-12-01

    Full Text Available Sensemaking of large graphs, specifically those with millions of nodes, is a crucial task in many fields. Automatic graph layout algorithms, augmented with real-time human-in-the-loop interaction, can potentially support sensemaking of large graphs. However, designing interactive algorithms to achieve this is challenging. In this paper, we tackle the scalability problem of interactive layout of large graphs, and contribute a new GPU-based force-directed layout algorithm that exploits graph topology. This algorithm can interactively layout graphs with millions of nodes, and support real-time interaction to explore alternative graph layouts. Users can directly manipulate the layout of vertices in a force-directed fashion. The complexity of traditional repulsive force computation is reduced by approximating calculations based on the hierarchical structure of multi-level clustered graphs. We evaluate the algorithm performance, and demonstrate human-in-the-loop layout in two sensemaking case studies. Moreover, we summarize lessons learned for designing interactive large graph layout algorithms on the GPU.

  6. Initiating a Human Variome Project Country Node.

    Science.gov (United States)

    AlAama, Jumana; Smith, Timothy D; Lo, Alan; Howard, Heather; Kline, Alexandria A; Lange, Matthew; Kaput, Jim; Cotton, Richard G H

    2011-05-01

    Genetic diseases are a pressing global health problem that requires comprehensive access to basic clinical and genetic data to counter. The creation of regional and international databases that can be easily accessed by clinicians and diagnostic labs will greatly improve our ability to accurately diagnose and treat patients with genetic disorders. The Human Variome Project is currently working in conjunction with human genetics societies to achieve this by establishing systems to collect every mutation reported by a diagnostic laboratory, clinic, or research laboratory in a country and store these within a national repository, or HVP Country Node. Nodes have already been initiated in Australia, Belgium, China, Egypt, Malaysia, and Kuwait. Each is examining how to systematically collect and share genetic, clinical, and biochemical information in a country-specific manner that is sensitive to local ethical and cultural issues. This article gathers cases of genetic data collection within countries and takes recommendations from the global community to develop a procedure for countries wishing to establish their own collection system as part of the Human Variome Project. We hope this may lead to standard practices to facilitate global collection of data and allow efficient use in clinical practice, research and therapy. © 2011 Wiley-Liss, Inc.

  7. Discriminative training of self-structuring hidden control neural models

    DEFF Research Database (Denmark)

    Sørensen, Helge Bjarup Dissing; Hartmann, Uwe; Hunnerup, Preben

    1995-01-01

    This paper presents a new training algorithm for self-structuring hidden control neural (SHC) models. The SHC models were trained non-discriminatively for speech recognition applications. Better recognition performance can generally be achieved, if discriminative training is applied instead. Thus...... we developed a discriminative training algorithm for SHC models, where each SHC model for a specific speech pattern is trained with utterances of the pattern to be recognized and with other utterances. The discriminative training of SHC neural models has been tested on the TIDIGITS database...

  8. The "Hidden Homeless" in Japan’s Contemporary Mobile Culture

    Directory of Open Access Journals (Sweden)

    Miya Yoshida

    2014-04-01

    Full Text Available Mobile telephony and all it ensues has frequently gained incredible attention due to the massive impacts, which has had on the organization of daily life as well as on popular and youth cultures. This has been widely discussed in recent years as one significant aspect of the changes brought by the device; however that is not all. Attributed to capitalism, there are other, very contemporary socio-political issues at stake around the mobile telephone, especially among the younger people. In my article, I will focus on one specific phenomenon in Japanese society where the media have taken to speaking of so-called "hidden homeless".

  9. Everyday calculus discovering the hidden math all around us

    CERN Document Server

    Fernandez, Oscar E

    2014-01-01

    Calculus. For some of us, the word conjures up memories of ten-pound textbooks and visions of tedious abstract equations. And yet, in reality, calculus is fun, accessible, and surrounds us everywhere we go. In Everyday Calculus, Oscar Fernandez shows us how to see the math in our coffee, on the highway, and even in the night sky. Fernandez uses our everyday experiences to skillfully reveal the hidden calculus behind a typical day's events. He guides us through how math naturally emerges from simple observations-how hot coffee cools down, for example-and in discussions of over fifty familia

  10. Overcoming the Law of the Hidden in Cyberinfrastructures.

    Science.gov (United States)

    Bucksch, Alexander; Das, Abhiram; Schneider, Hannah; Merchant, Nirav; Weitz, Joshua S

    2017-02-01

    Cyberinfrastructure projects (CIPs) are complex, integrated systems that require interaction and organization amongst user, developer, hardware, technical infrastructure, and funding resources. Nevertheless, CIP usability, functionality, and growth do not scale with the sum of these resources. Instead, growth and efficient usage of CIPs require access to 'hidden' resources. These include technical resources within CIPs as well as social and functional interactions among stakeholders. We identify approaches to overcome resource limitations following the conceptual basis of Liebig's Law of the Minimum. In so doing, we recommend practical steps towards efficient and scaleable resource use, taking the iPlant/CyVerse CIP as an example. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Hidden symmetries in one-dimensional quantum Hamiltonians

    International Nuclear Information System (INIS)

    Curado, E.M.F.; Rego-Monteiro, M.A.; Nazareno, H.N.

    2000-11-01

    We construct a Heisenberg-like algebra for the one dimensional infinite square-well potential in quantum mechanics. The number-type and ladder operators are realized in terms of physical operators of the system as in the harmonic oscillator algebra. These physical operators are obtained with the help of variables used in a recently developed non commutative differential calculus. This square-well algebra is an example of an algebra in large class of generalized Heisenberg algebras recently constructed. This class of algebras also contains q-oscillators as a particular case. We also show here how this general algebra can address hidden symmetries present in several quantum systems. (author)

  12. New ALPS results on hidden-sector lightweights

    Energy Technology Data Exchange (ETDEWEB)

    Ehret, Klaus [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Frede, Maik [Laser Zentrum Hannover e.V., Hollerithallee 8, D-30419 Hannover (Germany); Ghazaryan, Samvel [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Hildebrandt, Matthias [Laser Zentrum Hannover e.V., Hollerithallee 8, D-30419 Hannover (Germany); Knabbe, Ernst-Axel [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Kracht, Dietmar [Laser Zentrum Hannover e.V., Hollerithallee 8, D-30419 Hannover (Germany); Lindner, Axel, E-mail: axel.lindner@desy.d [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); List, Jenny [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Meier, Tobias [Max-Planck-Institute for Gravitational Physics, Albert-Einstein-Institute, Institut fuer Gravitationsphysik, Leibniz Universitaet, Hannover, Callinstrasse 38, D-30167 Hannover (Germany); Meyer, Niels; Notz, Dieter; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron DESY, Notkestrasse 85, D-22607 Hamburg (Germany); Wiedemann, Guenter [Hamburger Sternwarte, Gojenbergsweg 112, D-21029 Hamburg (Germany); Willke, Benno [Max-Planck-Institute for Gravitational Physics, Albert-Einstein-Institute, Institut fuer Gravitationsphysik, Leibniz Universitaet, Hannover, Callinstrasse 38, D-30167 Hannover (Germany)

    2010-05-31

    The ALPS Collaboration runs a 'Light Shining through a Wall' (LSW) experiment to search for photon oscillations into 'Weakly Interacting Sub-eV Particles' (WISPs) often predicted by extensions of the Standard Model. The experiment is set up around a superconducting HERA dipole magnet at the site of DESY. Due to several upgrades of the experiment we are able to place limits on the probability of photon-WISP-photon conversions of a fewx10{sup -25}. These limits result in today's most stringent laboratory constraints on the existence of low mass axion-like particles, hidden photons and minicharged particles.

  13. Multistability and hidden attractors in a relay system with hysteresis

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.

    2015-01-01

    with the neighborhood of that cycle. We show how the equilibrium point of a relay system disappears in a boundary-equilibrium bifurcation as the system enters the region of autonomous switching dynamics and demonstrate experimentally how a relay system can exhibit large amplitude chaotic oscillations at high values...... of the supply voltage. By investigating a four-dimensional model of the experimental relay system we finally show how a variety of hidden periodic, quasiperiodic and chaotic attractors arise, transform and disappear through different bifurcations. (C) 2015 Elsevier B.V. All rights reserved....

  14. Hidden vortex lattices in a thermally paired superfluid

    International Nuclear Information System (INIS)

    Dahl, E. K.; Sudboe, A.; Babaev, E.

    2008-01-01

    We study the evolution of rotational response of a statistical mechanical model of two-component superfluid with a nondissipative drag interaction as the system undergoes a transition into a paired superfluid phase at finite temperature. The transition manifests itself in a change of (i) vortex-lattice symmetry and (ii) nature of the vortex state. Instead of a vortex lattice, the system forms a highly disordered tangle which constantly undergoes merger and reconnecting processes involving different types of vortices with a 'hidden' breakdown of translation symmetry

  15. Abdominal candidiasis is a hidden reservoir of echinocandin resistance.

    Science.gov (United States)

    Shields, Ryan K; Nguyen, M Hong; Press, Ellen G; Clancy, Cornelius J

    2014-12-01

    FKS mutant Candida isolates were recovered from 24% (6/25) of abdominal candidiasis patients exposed to echinocandin. Candida glabrata (29%) and Candida albicans (14%) mutants were identified. Multidrug-resistant bacteria were recovered from 83% of FKS mutant infections. Mutations were associated with prolonged echinocandin exposure (P = 0.01), breakthrough infections (P = 0.03), and therapeutic failures despite source control interventions (100%). Abdominal candidiasis is a hidden reservoir for the emergence of echinocandin-resistant Candida. Copyright © 2014, American Society for Microbiology. All Rights Reserved.

  16. How to Align the Hidden Curriculum of RM Education?

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2015-01-01

    Graduates are reputedly still leaving business school with poor morals, despite considerable focus on responsible management education? The ‘hidden curriculum’ (HC) directs the attention to the idea that what is taught in educational institutions is not necessarily what is actually learned. The HC...... operates through many areas of business schools, most notably in i) formal curriculum; ii) interaction; and iii) school governance. This means recognizing that changing curricula alone is not enough to bring about transformation in students’ moral attitudes because signals about appropriate conduct...

  17. Hidden Markov processes theory and applications to biology

    CERN Document Server

    Vidyasagar, M

    2014-01-01

    This book explores important aspects of Markov and hidden Markov processes and the applications of these ideas to various problems in computational biology. The book starts from first principles, so that no previous knowledge of probability is necessary. However, the work is rigorous and mathematical, making it useful to engineers and mathematicians, even those not interested in biological applications. A range of exercises is provided, including drills to familiarize the reader with concepts and more advanced problems that require deep thinking about the theory. Biological applications are t

  18. APPLICATION OF HIDDEN MARKOV CHAINS IN QUALITY CONTROL

    Directory of Open Access Journals (Sweden)

    Hanife DEMIRALP

    2013-01-01

    Full Text Available The ever growing technological innovations and sophistication in industrial processes require adequate checks on quality. Thus, there is an increasing demand for simple and efficient quality control methods. In this regard the control charts stand out in simplicity and efficiency. In this paper, we propose a method of controlling quality based on the theory of hidden Markov chains. Based on samples drawn at different times from the production process, the method obtains the state of the process probabilistically. The main advantage of the method is that it requires no assumption on the normality of the process output.

  19. Hidden long evolutionary memory in a model biochemical network

    Science.gov (United States)

    Ali, Md. Zulfikar; Wingreen, Ned S.; Mukhopadhyay, Ranjan

    2018-04-01

    We introduce a minimal model for the evolution of functional protein-interaction networks using a sequence-based mutational algorithm, and apply the model to study neutral drift in networks that yield oscillatory dynamics. Starting with a functional core module, random evolutionary drift increases network complexity even in the absence of specific selective pressures. Surprisingly, we uncover a hidden order in sequence space that gives rise to long-term evolutionary memory, implying strong constraints on network evolution due to the topology of accessible sequence space.

  20. Quantum interference of probabilities and hidden variable theories

    International Nuclear Information System (INIS)

    Srinivas, M.D.

    1984-01-01

    One of the fundamental contributions of Louis de Broglie, which does not get cited often, has been his analysis of the basic difference between the calculus of the probabilities as predicted by quantum theory and the usual calculus of probabilities - the one employed by most mathematicians, in its standard axiomatised version due to Kolmogorov. This paper is basically devoted to a discussion of the 'quantum interference of probabilities', discovered by de Broglie. In particular, it is shown that it is this feature of the quantum theoretic probabilities which leads to some serious constraints on the possible 'hidden-variable formulations' of quantum mechanics, including the celebrated theorem of Bell. (Auth.)