WorldWideScience

Sample records for hidden measurement formalism

  1. Measurements and mathematical formalism of quantum mechanics

    Science.gov (United States)

    Slavnov, D. A.

    2007-03-01

    A scheme for constructing quantum mechanics is given that does not have Hilbert space and linear operators as its basic elements. Instead, a version of algebraic approach is considered. Elements of a noncommutative algebra (observables) and functionals on this algebra (elementary states) associated with results of single measurements are used as primary components of the scheme. On the one hand, it is possible to use within the scheme the formalism of the standard (Kolmogorov) probability theory, and, on the other hand, it is possible to reproduce the mathematical formalism of standard quantum mechanics, and to study the limits of its applicability. A short outline is given of the necessary material from the theory of algebras and probability theory. It is described how the mathematical scheme of the paper agrees with the theory of quantum measurements, and avoids quantum paradoxes.

  2. A Mixed Generalized Multifractal Formalism For Vector Valued Measures

    OpenAIRE

    Mabrouk, Anouar Ben

    2012-01-01

    We introduce a mixed generalized multifractal formalism which extends the mixed multifractal formalism introduced by L. Olsen based on generalizations of the Hausdorff and packing measures. The validity of such a formalism is proved in some special cases.

  3. The Born rule from a consistency requirement on hidden measurements in complex Hilbert space

    CERN Document Server

    Aerts, S

    2002-01-01

    We formalize the hidden measurement approach within the very general notion of an interactive probability model. We narrow down the model by assuming the state space of a physical entity is a complex Hilbert space and introduce the principle of consistent interaction which effectively partitions the space of apparatus states. The normalized measure of the set of apparatus states that interact with a pure state giving rise to a fixed outcome is shown to be in accordance with the probability obtained using the Born rule.

  4. Permutation Complexity and Coupling Measures in Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Taichi Haruna

    2013-09-01

    Full Text Available Recently, the duality between values (words and orderings (permutations has been proposed by the authors as a basis to discuss the relationship between information theoretic measures for finite-alphabet stationary stochastic processes and their permutatio nanalogues. It has been used to give a simple proof of the equality between the entropy rate and the permutation entropy rate for any finite-alphabet stationary stochastic process and to show some results on the excess entropy and the transfer entropy for finite-alphabet stationary ergodic Markov processes. In this paper, we extend our previous results to hidden Markov models and show the equalities between various information theoretic complexity and coupling measures and their permutation analogues. In particular, we show the following two results within the realm of hidden Markov models with ergodic internal processes: the two permutation analogues of the transfer entropy, the symbolic transfer entropy and the transfer entropy on rank vectors, are both equivalent to the transfer entropy if they are considered as the rates, and the directed information theory can be captured by the permutation entropy approach.

  5. What do tests of formal reasoning actually measure?

    Science.gov (United States)

    Lawson, Anton E.

    Tests of formal operational reasoning derived from Piagetian theory have been found to be effective predictors of academic achievement. Yet Piaget's theory regarding the underlying nature of formal operations and their employment in specific contexts has run into considerable empirical difficulty. The primary purpose of this study was to present the core of an alternative theory of the nature of advanced scientific reasoning. That theory, referred to as the multiple-hypothesis theory, argues that tests of formal operational reasoning actually measure the extent to which persons have acquired the ability to initiate reasoning with more than one specific antecedent condition, or if they are unable to imagine more than one antecedent condition, they are aware that more than one is possible; therefore conclusions that are drawn are tempered by this possibility. As a test of this multiple-hypothesis theory of advanced reasoning and the contrasting Piagetian theory of formal operations, a sample of 922 college students were first classified as concrete operational, transitional, or formal operational, based upon responses to standard Piagetian measures of formal operational reasoning. They were then administered seven logic tasks. Actual response patterns to the tasks were analyzed and found to be similar to predicted response patterns derived from the multiple-hypothesis theory and were different from those predicted by Piagetian theory. Therefore, support was obtained for the multiple-hypothesis theory. The terms intuitive and reflective were suggested to replace the terms concrete operational and formal operational to refer to persons at varying levels of intellectual development.

  6. Measurement Theory in Lax-Phillips Formalism

    CERN Document Server

    Tasaki, S; Horwitz, L P

    1993-01-01

    It is shown that the application of Lax-Phillips scattering theory to quantum mechanics provides a natural framework for the realization of the ideas of the Many-Hilbert-Space theory of Machida and Namiki to describe the development of decoherence in the process of measurement. We show that if the quantum mechanical evolution is pointwise in time, then decoherence occurs only if the Hamiltonian is time-dependent. If the evolution is not pointwise in time (as in Liouville space), then the decoherence may occur even for closed systems. These conclusions apply as well to the general problem of mixing of states.

  7. Hidden variable problem for a family of continuously many spin 1 measurements

    OpenAIRE

    Kurzynski, Pawel; Soeda, Akihito; Bzdega, Bartlomiej; Kaszlikowski, Dagomir

    2012-01-01

    We study a continuous set of spin 1 measurements and show that for a special family of measurements parametrized by a single variable $\\theta$ the possibility of hidden-variable description is a discontinuous property.

  8. Slice-Based Formal Specification Measures -- Mapping Coupling and Cohesion Measures to Formal Z

    Science.gov (United States)

    Bollin, Andreas

    2010-01-01

    This paper demonstrates that existing slice-based measures can reasonably be mapped to the field of state-based specification languages. By making use of Z specifications this contribution renews the idea of slice-profiles and derives coupling and cohesion measures for them. The measures are then assessed by taking a critical look at their sensitiveness in respect to modifications on the specification source. The presented study shows that slice-based coupling and cohesion measures have the potential to be used as quality indicators for specifications as they reflect the changes in the structure of a specification as accustomed from their program-related pendants.

  9. Weak Measurements Beyond the Aharonov-Albert-Vaidman Formalism

    CERN Document Server

    Wu, Shengjun

    2010-01-01

    High-precision experiments via weak measurements require pre-selected and post-selected states (PPS) that are nearly orthogonal, the linear dependence of the measurement outcomes on the weak values quickly fails when the PPS become more and more orthogonal, the phenomena in this regime cannot be explained by the previous weak measurement formalism. In this paper we extend the idea of weak measurements to the most general case, provide a complete treatment and give results for both the regime when the PPS are almost orthogonal and the regime when they are exactly orthogonal. We surprisingly find that for a fixed interaction strength, there may exist a maximum signal amplification and a corresponding optimum overlap of PPS to achieve it. We also find interesting quantities, the orthogonal weak values, which play the role of weak values for the case when the PPS are exactly orthogonal.

  10. A New Measure of Text Formality: An Analysis of Discourse of Mao Zedong

    Science.gov (United States)

    Li, Haiying; Graesser, Arthur C.; Conley, Mark; Cai, Zhiqiang; Pavlik, Philip I., Jr.; Pennebaker, James W.

    2016-01-01

    Formality has long been of interest in the study of discourse, with periodic discussions of the best measure of formality and the relationship between formality and text categories. In this research, we explored what features predict formality as humans perceive the construct. We categorized a corpus consisting of 1,158 discourse samples published…

  11. For Distinguishing Conjugate Hidden Subgroups, the Pretty Good Measurement is as Good as it Gets

    CERN Document Server

    Moore, Cristopher; Moore, Cristopher; Russell, Alexander

    2005-01-01

    Recently Bacon, Childs and van Dam showed that the ``pretty good measurement'' (PGM) is optimal for the Hidden Subgroup Problem on the dihedral group D_n in the case where the hidden subgroup is chosen uniformly from the n involutions. We show that, for any group and any subgroup H, the PGM is the optimal one-register experiment in the case where the hidden subgroup is a uniformly random conjugate of H. We go on to show that when H forms a Gel'fand pair with its parent group, the PGM is the optimal measurement for any number of registers. In both cases we bound the probability that the optimal measurement succeeds. This generalizes the case of the dihedral group, and includes a number of other examples of interest.

  12. Explicit Multiregister Measurements for Hidden Subgroup Problems; or, Fourier Sampling Strikes Back

    CERN Document Server

    Moore, Cristopher; Moore, Cristopher; Russell, Alexander

    2005-01-01

    We present an explicit measurement in the Fourier basis that solves an important case of the Hidden Subgroup Problem, including the case to which Graph Isomorphism reduces. This entangled measurement uses k=log_2 |G| registers, and each of the 2^k subsets of the registers contributes some information.

  13. Thermodynamic Measurement of Angular Anisotropy at the Hidden Order Transition of URu2 Si2

    Science.gov (United States)

    Trinh, Jennifer; Brück, Ekkes; Siegrist, Theo; Flint, Rebecca; Chandra, Premala; Coleman, Piers; Ramirez, Arthur P.

    2016-10-01

    The heavy fermion compound URu2 Si2 continues to attract great interest due to the unidentified hidden order it develops below 17.5 K. The unique Ising character of the spin fluctuations and low-temperature quasiparticles is well established. We present detailed measurements of the angular anisotropy of the nonlinear magnetization that reveal a cos4θ Ising anisotropy both at and above the ordering transition. With Landau theory, we show this implies a strongly Ising character of the itinerant hidden order parameter.

  14. Combining Cattle Activity and Progesterone Measurements Using Hidden Semi-Markov Models

    DEFF Research Database (Denmark)

    O'Connell, Jared Michael; Tøgersen, Frede Aakmann; Friggens, Nic

    2011-01-01

    Hourly pedometer counts and irregularly measured concentration of the hormone progesterone were available for a large number of dairy cattle. A hidden semi-Markov was applied to this bivariate time-series data for the purposes of monitoring the reproductive status of cattle. In particular...

  15. Generalized formalisms of the radio interferometer measurement equation

    Science.gov (United States)

    Price, D. C.; Smirnov, O. M.

    2015-05-01

    The radio interferometer measurement equation (RIME) is a matrix-based mathematical model that describes the response of a radio interferometer. The Jones calculus it employs is not suitable for describing the analogue components of a telescope. This is because it does not consider the effect of impedance mismatches between components. This paper aims to highlight the limitations of Jones calculus, and suggests some alternative methods that are more applicable. We reformulate the RIME with a different basis that includes magnetic and mixed coherency statistics. We present a microwave network inspired 2N-port version of the RIME, and a tensor formalism based upon the electromagnetic tensor from special relativity. We elucidate the limitations of the Jones-matrix-based RIME for describing analogue components. We show how measured scattering parameters of analogue components can be used in a 2N-port version of the RIME. In addition, we show how motion at relativistic speed affects the observed flux. We present reformulations of the RIME that correctly account for magnetic field coherency. These reformulations extend the standard formulation, highlight its limitations, and may have applications in space-based interferometry and precise absolute calibration experiments.

  16. Generalized Formalisms of the Radio Interferometer Measurement Equation

    CERN Document Server

    Price, Danny C

    2015-01-01

    The Radio Interferometer Measurement Equation (RIME) is a matrix-based mathematical model that describes the response of a radio interferometer. The Jones calculus it employs is not suitable for describing the analogue components of a telescope. This is because it does not consider the effect of impedance mismatches between components. This paper aims to highlight the limitations of Jones calculus, and suggests some alternative methods that are more applicable. We reformulate the RIME with a different basis that includes magnetic and mixed coherency statistics. We present a microwave network inspired 2N-port version of the RIME, and a tensor formalism based upon the electromagnetic tensor from special relativity. We elucidate the limitations of the Jones-matrix-based RIME for describing analogue components. We show how measured scattering parameters of analogue components can be used in a 2N-port version of the RIME. In addition, we show how motion at relativistic speed affects the observed flux. We present r...

  17. Measuring the usefulness of hidden units in Boltzmann machines with mutual information.

    Science.gov (United States)

    Berglund, Mathias; Raiko, Tapani; Cho, Kyunghyun

    2015-04-01

    Restricted Boltzmann machines (RBMs) and deep Boltzmann machines (DBMs) are important models in deep learning, but it is often difficult to measure their performance in general, or measure the importance of individual hidden units in specific. We propose to use mutual information to measure the usefulness of individual hidden units in Boltzmann machines. The measure is fast to compute, and serves as an upper bound for the information the neuron can pass on, enabling detection of a particular kind of poor training results. We confirm experimentally that the proposed measure indicates how much the performance of the model drops when some of the units of an RBM are pruned away. We demonstrate the usefulness of the measure for early detection of poor training in DBMs. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Measuring a hidden coordinate: Rate-exchange kinetics from 3D correlation functions

    Science.gov (United States)

    Berg, Mark A.; Darvin, Jason R.

    2016-08-01

    Nonexponential kinetics imply the existence of at least one slow variable other than the observable, that is, the system has a "hidden" coordinate. We develop a simple, but general, model that allows multidimensional correlation functions to be calculated for these systems. Homogeneous and heterogeneous mechanisms are both included, and slow exchange of the rates is allowed. This model shows that 2D and 3D correlation functions of the observable measure the distribution and kinetics of the hidden coordinate controlling the rate exchange. Both the mean exchange time and the shape of the exchange relaxation are measurable. However, complications arise because higher correlation functions are sums of multiple "pathways," each of which measures different dynamics. Only one 3D pathway involves exchange dynamics. Care must be used to extract exchange dynamics without contamination from other processes.

  19. Measuring a hidden coordinate: Rate-exchange kinetics from 3D correlation functions.

    Science.gov (United States)

    Berg, Mark A; Darvin, Jason R

    2016-08-07

    Nonexponential kinetics imply the existence of at least one slow variable other than the observable, that is, the system has a "hidden" coordinate. We develop a simple, but general, model that allows multidimensional correlation functions to be calculated for these systems. Homogeneous and heterogeneous mechanisms are both included, and slow exchange of the rates is allowed. This model shows that 2D and 3D correlation functions of the observable measure the distribution and kinetics of the hidden coordinate controlling the rate exchange. Both the mean exchange time and the shape of the exchange relaxation are measurable. However, complications arise because higher correlation functions are sums of multiple "pathways," each of which measures different dynamics. Only one 3D pathway involves exchange dynamics. Care must be used to extract exchange dynamics without contamination from other processes.

  20. Revising the formal, retrieving the hidden: Undergraduate curricular reform in medicine and the scientific, institutional, & social transformation of the clinical training environment

    Science.gov (United States)

    Jagosh, Justin J.

    2009-12-01

    In 2004, members of the McGill University Faculty of Medicine began implementing a new curriculum for undergraduate medical education entitled, Physicianship: The Physician as Professional and Healer. The initiative underscores the idea that physician training entails cultivating not only scientific knowledge and technical skill, but a mindset guided by intrinsic principles of doctoring. Although the McGill case exemplifies a wide-spread paradigm shift in medical teaching, there is a dearth of analysis concerning the degree of congruency between the objectives of formal undergraduate curricular revision and the so-called 'hidden curriculum' of the hospital training environment. With Physicianship as a point of departure, this dissertation maps evolutionary patterns in clinical medicine and, using qualitative methods, analyzes the perspectives of twenty physician-educators on curricular reform and the transforming clinical training environment. Physicians interviewed were generally supportive of the new curricular initiative. Concerns were raised, however, that many recent changes within the teaching hospital environment interfere with students' cultivation of professional and healer attributes. These changes were organized into three main themes: scientific, institutional, and social. Physicians expressed concern that what is often considered beneficial for patients is often detrimental for medical training. For example, increased use of diagnostic technologies has improved patient care but reduces opportunities for trainees' clinical skill development. Concern was raised that the concept of selfless service has been undermined through recent shift-work regulations and a culture gap between older and younger generation physicians. Alternatively, some perceived new policies of the clinical environment to be more conducive to physicians' self-care and quality of life. Younger trainees were often described as more competent in managing medical information, more open

  1. Toward a formal theory of the measuring system

    Science.gov (United States)

    Battista Rossi, Giovanni; Crenna, Francesco

    2016-11-01

    Measurement aims at obtaining a numerical description of objects/events/persons in real world by means of a measuring system. Measurement is widely used as a key way for obtaining high quality information from the real world. across disciplines. In the present day. there is growing consensus in holding that measurement is characterized by the use of something that qualifies as a “measuring system”. Therefore. we discuss sufficient conditions for an empirical system to qualify as a measuring system.

  2. The Measurement Process in the Generalized Contexts Formalism for Quantum Histories

    Science.gov (United States)

    Losada, Marcelo; Vanni, Leonardo; Laura, Roberto

    2016-02-01

    In the interpretations of quantum mechanics involving quantum histories there is no collapse postulate and the measurement is considered as a quantum interaction between the measured system and the measured instrument. For two consecutive non ideal measurements on the same system, we prove that both pointer indications at the end of each measurement are compatible properties in our generalized context formalism for quantum histories. Inmediately after the first measurement an effective state for the measured system is deduced from the formalism, generalizing the state that would be obtained by applying the state collapse postulate.

  3. Hidden Markov Models Incorporating Fuzzy Measures and Integrals for Protein Sequence Identification and Alignment

    Institute of Scientific and Technical Information of China (English)

    Niranjan P.Bidargaddi; Madlhu Chetty; Joarder Kamruzzaman

    2008-01-01

    Profile hidden Markov models (HMMs) based on classical HMMs have been widely applied for protein sequence identification. The formulation of the forward and backward variables in profile HMMs is made under statistical independence assumption of the probability theory. We propose a fuzzy profile HMM to overcome the limitations of that assumption and to achieve an improved alignment for protein sequences belonging to a given family. The proposed model fuzzifies the forward and backward variables by incorporating Sugeno fuzzy measures and Choquet integrals, thus further extends the generalized HMM. Based on the fuzzified forwardand backward variables, we propose a fuzzy Baum-Welch parameter estimation al-gorithm for profiles. The strong correlations and the sequence preference involved in the protein structures make this fuzzy architecture based model as a suitable candidate for building profiles of a given family, since the fuzzy set can handle uncertainties better than classical methods.

  4. The Formal Elements Art Therapy Scale: A Measurement System for Global Variables in Art

    Science.gov (United States)

    Gantt, Linda M.

    2009-01-01

    The Formal Elements Art Therapy Scale (FEATS) is a measurement system for applying numbers to global variables in two-dimensional art (drawing and painting). While it was originally developed for use with the single-picture assessment ("Draw a person picking an apple from a tree" [PPAT]), researchers can also apply many of the 14 scales of the…

  5. Hidden photon measurements using the long-baseline cavity of laser interferometric gravitational-wave detector

    CERN Document Server

    Inoue, Yuki

    2015-01-01

    We suggest a new application for the long-baseline and high powered cavities in a laser-interferometric gravitational-wave~(GW) detector to search for WISPs (weakly interacting sub-eV particles), such as a hidden U(1) gauge boson, called the hidden-sector photon. It is based on the principle of a light shining through the wall experiment, adapted to the laser with a wavelength of 1064 or 532 nm. The transition edge sensor (TES) bolometer is assumed as a detector, which the dark rate and efficiency are assumed as $0.000001~\\mathrm{s^{-1}}$ and 0.75, respectively. The TES bolometer is sufficiently sensitive to search for the low-mass hidden-sector photons. We assume that the reconversion cavity is mounted on the reconversion region of hidden-sector photons, which number of reflection and length are assumed as 1000 and 10, 100, and 1000m. We found that the second-point-five and the second generation GW experiments, such as KAGRA and Advanced LIGO with a regeneration cavity and TES bolometers. The expected lower ...

  6. Distance expanding random mappings, thermodynamical formalism, Gibbs measures and fractal geometry

    CERN Document Server

    Mayer, Volker; Skorulski, Bartlomiej

    2011-01-01

    The theory of random dynamical systems originated from stochastic differential equations. It is intended to provide a framework and techniques to describe and analyze the evolution of dynamical systems when the input and output data are known only approximately, according to some probability distribution. The development of this field, in both the theory and applications, has gone in many directions. In this manuscript we introduce measurable expanding random dynamical systems, develop the thermodynamical formalism and establish, in particular, the exponential decay of correlations and analyticity of the expected pressure although the spectral gap property does not hold. This theory is then used to investigate fractal properties of conformal random systems. We prove a Bowen’s formula and develop the multifractal formalism of the Gibbs states. Depending on the behavior of the Birkhoff sums of the pressure function we arrive at a natural classification of the systems into two classes: quasi-deterministic syst...

  7. The form of the story: Measuring formal aspects of narrative activity in psychotherapy.

    Science.gov (United States)

    Habermas, Tilmann; Döll-Hentschker, Susanne

    2017-05-01

    We ask which are the clinically relevant qualities of narratives in psychotherapy and how they can be measured. On the background of psychoanalytic assumptions and narrative theory, we propose to measure formal narrative processes which stay close to the linguistic surface, because these escape conscious control. We propose five aspects of narratives to be especially sensitive to distortions and therefore prone to change in successful therapies: (1) The actual chronological, stepwise narrating of events, (2) the intentional structuring of events, or emplotment, (3) the immediate evaluation, (4) the reflected interpretation of events, and finally (5) the consistency and completeness of the narrative. For each aspect we discuss ways to measure them. Finally the aspects are illustrated with excerpts from a series of diagnostic interviews. Implications for the analysis of the co-narrative role of the therapist are suggested.

  8. Deciphering time measurement: the role of circadian 'clock' genes and formal experimentation in insect photoperiodism.

    Science.gov (United States)

    Saunders, D S; Bertossa, R C

    2011-05-01

    This review examines possible role(s) of circadian 'clock' genes in insect photoperiodism against a background of many decades of formal experimentation and model building. Since ovarian diapause in the genetic model organism Drosophila melanogaster has proved to be weak and variable, recent attention has been directed to species with more robust photoperiodic responses. However, no obvious consensus on the problem of time measurement in insect photoperiodism has yet to emerge and a variety of mechanisms are indicated. In some species, expression patterns of clock genes and formal experiments based on the canonical properties of the circadian system have suggested that a damped oscillator version of Pittendrigh's external coincidence model is appropriate to explain the measurement of seasonal changes in night length. In other species extreme dampening of constituent oscillators may give rise to apparently hourglass-like photoperiodic responses, and in still others there is evidence for dual oscillator (dawn and dusk) photoperiodic mechanisms of the internal coincidence type. Although the exact role of circadian rhythmicity and of clock genes in photoperiodism is yet to be settled, Bünning's general hypothesis (Bünning, 1936) remains the most persuasive unifying principle. Observed differences between photoperiodic clocks may be reflections of underlying differences in the clock genes in their circadian feedback loops. Copyright © 2011. Published by Elsevier Ltd.

  9. Similarity matrix analysis and divergence measures for statistical detection of unknown deterministic signals hidden in additive noise

    Energy Technology Data Exchange (ETDEWEB)

    Le Bot, O., E-mail: lebotol@gmail.com [Univ. Grenoble Alpes, GIPSA-Lab, F-38000 Grenoble (France); CNRS, GIPSA-Lab, F-38000 Grenoble (France); Mars, J.I. [Univ. Grenoble Alpes, GIPSA-Lab, F-38000 Grenoble (France); CNRS, GIPSA-Lab, F-38000 Grenoble (France); Gervaise, C. [Univ. Grenoble Alpes, GIPSA-Lab, F-38000 Grenoble (France); CNRS, GIPSA-Lab, F-38000 Grenoble (France); Chaire CHORUS, Foundation of Grenoble Institute of Technology, 46 Avenue Félix Viallet, 38031 Grenoble Cedex 1 (France)

    2015-10-23

    This Letter proposes an algorithm to detect an unknown deterministic signal hidden in additive white Gaussian noise. The detector is based on recurrence analysis. It compares the distribution of the similarity matrix coefficients of the measured signal with an analytic expression of the distribution expected in the noise-only case. This comparison is achieved using divergence measures. Performance analysis based on the receiver operating characteristics shows that the proposed detector outperforms the energy detector, giving a probability of detection 10% to 50% higher, and has a similar performance to that of a sub-optimal filter detector. - Highlights: • We model the distribution of the similarity matrix coefficients of a Gaussian noise. • We use divergence measures for goodness-of-fit test between a model and measured data. • We distinguish deterministic signal and Gaussian noise with similarity matrix analysis. • Similarity matrix analysis outperforms energy detector.

  10. Formal definitions of measurement bias and explanation bias clarify measurement and conceptual perspectives on response shift

    NARCIS (Netherlands)

    Oort, F.J.; Visser, M.R.M.; Sprangers, M.A.G.

    2009-01-01

    Objective: Response shift is generally associated with a change in the meaning of test scores, impeding the comparison of repeated measurements. Still, different researchers have different views of response shift. From a measurement perspective, response shift can be considered as bias in the measur

  11. Revisiting the radio interferometer measurement equation. I. A full-sky Jones formalism

    CERN Document Server

    Smirnov, Oleg M

    2011-01-01

    Since its formulation by Hamaker et al., the radio interferometer measurement equation (RIME) has provided a rigorous mathematical basis for the development of novel calibration methods and techniques, including various approaches to the problem of direction-dependent effects (DDEs). This series of papers aims to place recent developments in the treatment of DDEs into one RIME-based mathematical framework, and to demonstrate the ease with which the various effects can be described and understood. It also aims to show the benefits of a RIME-based approach to calibration. Paper I re-derives the RIME from first principles, extends the formalism to the full-sky case, and incorporates DDEs. Paper II then uses the formalism to describe self-calibration, both with a full RIME, and with the approximate equations of older software packages, and shows how this is affected by DDEs. It also gives an overview of real-life DDEs and proposed methods of dealing with them. Applying this to WSRT data (Paper III) results in a n...

  12. Thermodynamic Formalism of the Harmonic Measure of Diffusion Limited Aggregates: Phase Transition

    Science.gov (United States)

    Davidovitch, Benny; Jensen, Mogens H.; Levermann, Anders; Mathiesen, Joachim; Procaccia, Itamar

    2001-10-01

    We study the nature of the phase transition in the multifractal formalism of the harmonic measure of diffusion limited aggregates. Contrary to previous work that relied on random walk simulations or ad hoc models to estimate the low probability events of deep fjord penetration, we employ the method of iterated conformal maps to obtain an accurate computation of the probability of the rarest events. We resolve probabilities as small as 10-35. We show that the generalized dimensions Dq are infinite for q

  13. Weak Measurement and Two-State-Vector Formalism: Deficit of Momentum Transfer in Scattering Processes

    CERN Document Server

    Chatzidimitriou-Dreismann, C A

    2016-01-01

    The notions of weak measurement, weak value, and two-state-vector formalism provide a new quantum-theoretical frame for extracting additional information from a system in the limit of small disturbances to its state. Here, we provide an application to the case of two-body scattering with one body weakly interacting with an environment. The direct connection to real scattering experiments is pointed out by making contact with the field of impulsive incoherent neutron scattering from molecules and condensed systems. In particular, we predict a new quantum effect in neutron-atom collisions, namely an observable momentum transfer deficit; or equivalently, a reduction of effective mass below that of the free scattering atom. Two corroborative experimental findings are shortly presented. Implications for current and further experiments are mentioned. An interpretation of this effect and the associated experimental results within conventional theory is currently unavailable.

  14. Backward transfer entropy: Informational measure for detecting hidden Markov models and its interpretations in thermodynamics, gambling and causality

    Science.gov (United States)

    Ito, Sosuke

    2016-11-01

    The transfer entropy is a well-established measure of information flow, which quantifies directed influence between two stochastic time series and has been shown to be useful in a variety fields of science. Here we introduce the transfer entropy of the backward time series called the backward transfer entropy, and show that the backward transfer entropy quantifies how far it is from dynamics to a hidden Markov model. Furthermore, we discuss physical interpretations of the backward transfer entropy in completely different settings of thermodynamics for information processing and the gambling with side information. In both settings of thermodynamics and the gambling, the backward transfer entropy characterizes a possible loss of some benefit, where the conventional transfer entropy characterizes a possible benefit. Our result implies the deep connection between thermodynamics and the gambling in the presence of information flow, and that the backward transfer entropy would be useful as a novel measure of information flow in nonequilibrium thermodynamics, biochemical sciences, economics and statistics.

  15. The dynamics of stock exchange based on the formalism of weak continuous quantum measurement

    Science.gov (United States)

    Melnyk, S.; Tuluzov, I.

    2010-07-01

    The problem of measurement in economic models and the possibility of their quantum-mechanical description are considered. It is revealed that the apparent paradox of such a description is associated with a priori requirement of conformity of the model to all the alternatives of free choice of the observer. The measurement of the state of a trader on a stock exchange is formally defined as his responses to the proposals of sale at a fixed price. It is shown that an analogue of Bell's inequalities for this measurement model is violated at the most general assumptions related to the strategy of the trader and requires a quantum-mechanical description of the dynamics of his condition. In the framework of the theory of weak continuous quantum measurements, the equation of stock price dynamics and the quantum-mechanical generalization of the F. Black and M. Scholes model for pricing options are obtained. The fundamental distinctions between the obtained model and the classical one are discussed.

  16. Generation and Analysis of Hidden Optical-Polarization States

    CERN Document Server

    Singh, Ravi S

    2010-01-01

    A hybrid Optical-Device (Phase-Conjugating Mirror Michelson Interferometer), made up of Phase-conjugate mirror along with ordinary mirror and Polarization Beam-splitter, is formally designed and investigated for the generation of an unusual Optical-Polarization States. This weird yet 'essentially single-mode' optical-polarization state has non-random 'ratio of amplitudes' and non-random 'sum of phases' in orthogonal bases-modes contrary to usual 'truly single-mode' optical-polarization states of which non-random 'ratio of amplitudes' and non-random 'difference of phases' serves as optical-polarization characteristic parameters. Since it is seen not to be characterized by Stokes parameters, one may, therefore, assign the name 'Hidden Optical-Polarization States (HOPS)'. HOPS are characterized by a set of parameters, namely, Hidden Optical-Polarization parameters. Formal experimental schemes are presented to experimentally measure these parameters and, thus, offering characterization of HOPS.

  17. A metric measure for weight matrices of variable lengths—with applications to clustering and classification of hidden Markov models

    Science.gov (United States)

    Yu, Yi-Kuo

    2007-02-01

    We construct a metric measure among weight matrices that are commonly used in non-interacting statistical physics systems, computational biology problems, as well as in general applications such as hidden Markov models. The metric distance between two weight matrices is obtained via aligning the matrices and thus can be evaluated by dynamic programming. Capable of allowing reverse complements in distance evaluation, this metric accommodates both gapless and gapped alignments between two weight matrices. The distance statistics among random motifs is also studied. We find that the average square distance and its standard error grow with different powers of motif length, and the normalized square distance follows a Gaussian distribution for large motif lengths.

  18. SOCIAL NETWORK ANALYSIS FOR THE MEASUREMENT OF FORMAL AND INFORMAL STRUCTURES

    Directory of Open Access Journals (Sweden)

    Siomara Maria Pierangeli Pascotto,

    2013-03-01

    Full Text Available A discussion around the application of the social network analysis methodology has being helped to understand the social dynamic operation of organizations, including governments, which are subject to different management structures that have a high degree of functional hierarchy. This study was developed in a Federal School Institution in Sao Paulo State – Brazil searching to identify the link developed between Institution administrative support staff members and their social networks. The research objective is to establish a comparison between the link data facts with Social Networks Theories which says that the more ties (contacts exist in an informal group, the more the network promotes an open environment for exchanging knowledge and information. The research looked forward to identify how do the social networks are developed, how common objectives and subjects turns people closely connected, how do the focal points and main contacts emerge from this community and what are their influences in the rest of the group. It was applied social network measurement methodologies, combined with qualitative instrument analysis. As a conclusion, was found that the informal structure has influence over the formal structure providing an environment for exchanging knowledge and information, pointing out that some characters are actually responsible for the dynamic of networks, occupying driver and strategic position that gives them recognition as such by the other agents in the net.

  19. Measurement and Result of Soil Gas Radon and Soil Gas Mercury in the Exploration of Haihe Hidden Fault

    Institute of Scientific and Technical Information of China (English)

    Shao Yongxin; Yang Xulian; Li Yibing

    2008-01-01

    In the exploration of the hidden Haihe fault, radon and mercury in soil gas were measured by using FG-3017 radon detector and XG-4 mercury analyzer. In this paper, based on the measurement results of 12 fault gas profiles, and integrating with the exploration results of artificial seismic prospecting, the relationship between anomalous site of fault gas and fault location is analyzed. Using the relationship between anomalous strength of fault gas and fault activity, the activity of Haihe fault is studied, thus the location and activity segmentation of the Haihe fault in Tianjin region are presented. This study shows that the method of fault gas detection can not only identify the preliminary location of fault, but also make preliminary segmentation of fault activity. The fault detected by the method of fault gas measurement is shown as a hand. Through contrasting with exploration results of artificial seismic prospecting and analyzing, we find that the fault is located inside the band. According to the measurements of soil gas radon, the Haihe fault can be divided into east and west segments and the activity of the east segment of Haihe fault is stronger than that of the west segment. This is only a relative result, and it is difficult to judge whether the fault is active or not with this result.

  20. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main...... the ill parent. These findings contribute to a deeper understanding of the traumatic process of parental ABI that some children experience and emphasize the importance of family-centred interventions that include the children....

  1. Faddeev-Jackiw approach to hidden symmetries

    CERN Document Server

    Wotzasek, C

    1994-01-01

    The study of hidden symmetries within Dirac's formalism does not possess a systematic procedure due to the lack of first-class constraints to act as symmetry generators. On the other hand, in the Faddeev-Jackiw approach, gauge and reparametrization symmetries are generated by the null eigenvectors of the sympletic matrix and not by constraints, suggesting the possibility of dealing systematically with hidden symmetries through this formalism. It is shown in this paper that indeed hidden symmetries of noninvariant or gauge fixed systems are equally well described by null eigenvectors of the sympletic matrix, just as the explicit invariances. The Faddeev-Jackiw approach therefore provide a systematic algorithm for treating all sorts of symmetries in an unified way. This technique is illustrated here by the SL(2,R) Kac-Moody current algebra of the 2-D induced gravity proposed by Polyakov, which is a hidden symmetry in the canonical approach of constrained systems via Dirac's method, after conformal and reparamet...

  2. Behavioral manifestations of audiometrically-defined "slight" or "hidden" hearing loss revealed by measures of binaural detection.

    Science.gov (United States)

    Bernstein, Leslie R; Trahiotis, Constantine

    2016-11-01

    This study assessed whether audiometrically-defined "slight" or "hidden" hearing losses might be associated with degradations in binaural processing as measured in binaural detection experiments employing interaurally delayed signals and maskers. Thirty-one listeners participated, all having no greater than slight hearing losses (i.e., no thresholds greater than 25 dB HL). Across the 31 listeners and consistent with the findings of Bernstein and Trahiotis [(2015). J. Acoust. Soc. Am. 138, EL474-EL479] binaural detection thresholds at 500 Hz and 4 kHz increased with increasing magnitude of interaural delay, suggesting a loss of precision of coding with magnitude of interaural delay. Binaural detection thresholds were consistently found to be elevated for listeners whose absolute thresholds at 4 kHz exceeded 7.5 dB HL. No such elevations were observed in conditions having no binaural cues available to aid detection (i.e., "monaural" conditions). Partitioning and analyses of the data revealed that those elevated thresholds (1) were more attributable to hearing level than to age and (2) result from increased levels of internal noise. The data suggest that listeners whose high-frequency monaural hearing status would be classified audiometrically as being normal or "slight loss" may exhibit substantial and perceptually meaningful losses of binaural processing.

  3. Measuring with the heart's rhythm: hidden particles reveal flow in chicken embryo hearts

    NARCIS (Netherlands)

    Van de Graaf, A.

    2004-01-01

    Blood is said to be thicker than water, and it may come as a surprise to learn that red blood cells 8 micrometres across routinely manage to work their way through minute blood vessels no more than 5 micrometre in diameter. How they do so remains a mystery, but thanks to a noninvasive optical measur

  4. The hidden cost of investment: The impact of adjustment cost on firm performance measurement and regulation

    OpenAIRE

    Nick, Sebastian; Wetzel, Heike

    2014-01-01

    In this study, we address a major problem in the measurement of firm performance and the regulation of natural monopolies, namely the intertemporal character of long-term investment decisions. In specific, we focus on the impact of adjustment costs of investments on estimates of firms' technical and cost inefficiency. We apply nonparametric dynamic data envelopment analysis to investigate the dynamic inefficiency of electricity distribution and transmission companies in the US during the year...

  5. Exploring the hidden interior of the Earth with directional neutrino measurements

    Science.gov (United States)

    Leyton, Michael; Dye, Stephen; Monroe, Jocelyn

    2017-07-01

    Roughly 40% of the Earth's total heat flow is powered by radioactive decays in the crust and mantle. Geo-neutrinos produced by these decays provide important clues about the origin, formation and thermal evolution of our planet, as well as the composition of its interior. Previous measurements of geo-neutrinos have all relied on the detection of inverse beta decay reactions, which are insensitive to the contribution from potassium and do not provide model-independent information about the spatial distribution of geo-neutrino sources within the Earth. Here we present a method for measuring previously unresolved components of Earth's radiogenic heating using neutrino-electron elastic scattering and low-background, direction-sensitive tracking detectors. We calculate the exposures needed to probe various contributions to the total geo-neutrino flux, specifically those associated to potassium, the mantle and the core. The measurements proposed here chart a course for pioneering exploration of the veiled inner workings of the Earth.

  6. Hidden lignin in soils: What's left behind is probably more important than what's measured

    Science.gov (United States)

    Hernes, P.; Kaiser, K.; Dyda, R. Y.; Cerli, C.

    2013-12-01

    The relative importance of lignin toward stabilized soil organic matter has been a subject of much debate, with early paradigms based on supposed recalcitrance replaced by more recent studies in surface soils that suggest turnover times similar to bulk organic matter. A primary tool in these studies has been alkaline CuO oxidation in which soils are subjected to high temperatures and 2N basic conditions, which is presumed to extract all lignin from mineral soils. However, we conducted an experiment using plant litter leachates sorbed to various minerals to demonstrate that even the hot alkaline conditions of CuO oxidation are insufficient to extract all lignin. This irreversible lignin (determined by difference) is almost certainly more stable than the measured lignin in previous turnover studies, and compositionally quite distinct from either the parent litter leachates or what can be measured on the sorbed systems. Further, our optical characterizations of the leachate (carbon-specific absorbance in the UV range as a proxy for aromaticity) indicate that lignin may be more broadly representative of aromatic compounds in general, if not all surface active compounds. This has clear implications for deep-soil organic carbon as sorption of dissolved organic matter leached from upper layers is a primary mechanism for building up and stabilizing deep-soil carbon stores, namely that lignin and other aromatics may become increasingly important toward soil organic matter stabilization with depth, even if we cannot directly measure them.

  7. On complex Langevin dynamics and zeroes of the measure I: Formal proof and simple models

    CERN Document Server

    Aarts, Gert; Sexty, Denes; Stamatescu, Ion-Olimpiu

    2016-01-01

    In the complex Langevin approach to lattice simulations at nonzero density, zeroes of the fermion determinant lead to a meromorphic drift and hence a need to revisit the theoretical derivation. We discuss how poles in the drift affect the formal justification of the approach and then explore the various potential issues in simple models, in a manner that is applicable to heavy dense and full QCD.

  8. Numerical modeling of cold magmatic CO2 flux measurements for the exploration of hidden geothermal systems

    Science.gov (United States)

    Peiffer, Loïc.; Wanner, Christoph; Pan, Lehua

    2015-10-01

    The most accepted conceptual model to explain surface degassing of cold magmatic CO2 in volcanic-geothermal systems involves the presence of a gas reservoir. In this study, numerical simulations using the TOUGH2-ECO2N V2.0 package are performed to get quantitative insights into how cold CO2 soil flux measurements are related to reservoir and fluid properties. Although the modeling is based on flux data measured at a specific geothermal site, the Acoculco caldera (Mexico), some general insights have been gained. Both the CO2 fluxes at the surface and the depth at which CO2 exsolves are highly sensitive to the dissolved CO2 content of the deep fluid. If CO2 mainly exsolves above the reservoir within a fracture zone, the surface CO2 fluxes are not sensitive to the reservoir size but depend on the CO2 dissolved content and the rock permeability. For gas exsolution below the top of the reservoir, surface CO2 fluxes also depend on the gas saturation of the deep fluid as well as the reservoir size. The absence of thermal anomalies at the surface is mainly a consequence of the low enthalpy of CO2. The heat carried by CO2 is efficiently cooled down by heat conduction and to a certain extent by isoenthalpic volume expansion depending on the temperature gradient. Thermal anomalies occur at higher CO2 fluxes (>37,000 g m-2 d-1) when the heat flux of the rising CO2 is not balanced anymore. Finally, specific results are obtained for the Acoculco area (reservoir depth, CO2 dissolved content, and gas saturation state).

  9. FISHing Out the Hidden Enemy: Advances in Detecting and Measuring Latent HIV-Infected Cells.

    Science.gov (United States)

    Prasad, Vinayaka R; Kalpana, Ganjam V

    2017-09-19

    The indomitable aspect of HIV-1 infection is not that HIV-1 proviral DNA is integrated into host DNA but that it can also turn itself off, remaining invisible to drug or immune surveillance. Thus, the goals of eradication include ways to precisely excise HIV-1 DNA or wake up the silent HIV-1 provirus and eliminate the infected cells thus identified. Methods to identify and fish out the latently infected cells or to delineate their characteristics are being rapidly developed. In 2016, Baxter et al. (A. E. Baxter, J. Niessl, R. Fromentin, J. Richard, F. Porichis, R. Charlebois, M. Massanella, N. Brassard, N. Alsahafi, G. G. Delgado, J. P. Routy, B. D. Walker, A. Finzi, N. Chomont, and D. E. Kaufmann, Cell Host Microbe 20:368-380, 2016, https://doi.org/10.1016/j.chom.2016.07.015) and Martrus et al. (G. Martrus, A. Niehrs, R. Cornelis, A. Rechtien, W. García-Beltran, M. Lütgehetmann, C. Hoffmann, and M. Altfeld, J Virol 90:9018-9028, 2016, https://doi.org/10.1128/JVI.01448-16) reported using the fluorescence in situ hybridization-flow cytometry technique to identify and quantify cells expressing HIV-1 RNA and Gag protein, as well as bearing unique cell surface markers. In a recent article in mBio, Grau-Expósito et al. (J. Grau-Expósito, C. Serra-Peinado, L. Miguel, J. Navarro, A. Curran, J. Burgos, I. Ocaña, E. Ribera, A. Torrella, B. Planas, R. Badía, J. Castellví, V. Falcó, M. Crespo, and M. J. Buzon, mBio 8:e00876-17, 2017, https://doi.org/10.1128/mBio.00876-17) reported a similar method that they claim to be more sensitive. With these methods, researchers are one step closer to measuring latent reservoirs and eliminating critical barriers to HIV eradication. Copyright © 2017 Prasad and Kalpana.

  10. Semi-automatic liver tumor segmentation with hidden Markov measure field model and non-parametric distribution estimation.

    Science.gov (United States)

    Häme, Yrjö; Pollari, Mika

    2012-01-01

    A novel liver tumor segmentation method for CT images is presented. The aim of this work was to reduce the manual labor and time required in the treatment planning of radiofrequency ablation (RFA), by providing accurate and automated tumor segmentations reliably. The developed method is semi-automatic, requiring only minimal user interaction. The segmentation is based on non-parametric intensity distribution estimation and a hidden Markov measure field model, with application of a spherical shape prior. A post-processing operation is also presented to remove the overflow to adjacent tissue. In addition to the conventional approach of using a single image as input data, an approach using images from multiple contrast phases was developed. The accuracy of the method was validated with two sets of patient data, and artificially generated samples. The patient data included preoperative RFA images and a public data set from "3D Liver Tumor Segmentation Challenge 2008". The method achieved very high accuracy with the RFA data, and outperformed other methods evaluated with the public data set, receiving an average overlap error of 30.3% which represents an improvement of 2.3% points to the previously best performing semi-automatic method. The average volume difference was 23.5%, and the average, the RMS, and the maximum surface distance errors were 1.87, 2.43, and 8.09 mm, respectively. The method produced good results even for tumors with very low contrast and ambiguous borders, and the performance remained high with noisy image data.

  11. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  12. A formal model for measuring the effect of technological change on telecentre usage

    Science.gov (United States)

    Azizi, Azizi; Ahmad, Faudziah; Yusop, Nor Iadah; Aji, Zahurin Mat

    2016-08-01

    Technological change (TC), in general refers to continuous invention, innovation and diffusion of technology. In relation to telecentre, TC is seen as the driving force of the centre's operation. However, in recent years, telecentre's usage and operation is declining slowly and this leads to the question about the continued relevance of these centres as well as calls for evidence of impacts to justify further resources and program improvements. The paper aims to present the simulation results on an agent-based model that was developed to show the impact of TC on telecentre's usage. The model was constructed in four phases, Abstraction, Formalization, Simulation and Evaluation. Results showed that the computational model was able to show the effective usage of telecentre in different types of scenarios.

  13. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  14. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  15. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  16. Formal matrices

    CERN Document Server

    Krylov, Piotr

    2017-01-01

    This monograph is a comprehensive account of formal matrices, examining homological properties of modules over formal matrix rings and summarising the interplay between Morita contexts and K theory. While various special types of formal matrix rings have been studied for a long time from several points of view and appear in various textbooks, for instance to examine equivalences of module categories and to illustrate rings with one-sided non-symmetric properties, this particular class of rings has, so far, not been treated systematically. Exploring formal matrix rings of order 2 and introducing the notion of the determinant of a formal matrix over a commutative ring, this monograph further covers the Grothendieck and Whitehead groups of rings. Graduate students and researchers interested in ring theory, module theory and operator algebras will find this book particularly valuable. Containing numerous examples, Formal Matrices is a largely self-contained and accessible introduction to the topic, assuming a sol...

  17. Measurement uncertainties in the quantum formalism: quasi-realities of individual systems

    CERN Document Server

    Hofmann, Holger F

    2012-01-01

    The evaluation of uncertainties in quantum measurements is problematic since the correct value of an observable between state preparation and measurement is experimentally inaccessible. In Ozawa's formulation of uncertainty relations for quantum measurements, the correct value of an observable is represented by the operator of that observable. Here, I consider the implications of this operator-based assignment of values to individual systems and discuss the relation with weak values and weak measurement statistics.

  18. Formal selection of measures for a composite index of NICU quality of care: Baby-MONITOR

    Science.gov (United States)

    Profit, J; Gould, JB; Zupancic, JAF; Stark, AR; Wall, KM; Kowalkowski, MA; Mei, M; Pietz, K; Thomas, EJ; Petersen, LA

    2011-01-01

    Objective To systematically rate measures of care quality for very low birth weight infants for inclusion into Baby-MONITOR, a composite indicator of quality. Study Design Modified Delphi expert panelist process including electronic surveys and telephone conferences. Panelists considered 28 standard neonatal intensive care unit (NICU) quality measures and rated each on a 9-point scale taking into account pre-defined measure characteristics. In addition, panelists grouped measures into six domains of quality. We selected measures by testing for rater agreement using an accepted method. Result Of 28 measures considered, 13 had median ratings in the high range (7 to 9). Of these, 9 met the criteria for inclusion in the composite: antenatal steroids (median (interquartile range)) 9(0), timely retinopathy of prematurity exam 9(0), late onset sepsis 9(1), hypothermia on admission 8(1), pneumothorax 8(2), growth velocity 8(2), oxygen at 36 weeks postmenstrual age 7(2), any human milk feeding at discharge 7(2) and in-hospital mortality 7(2). Among the measures selected for the composite, the domains of quality most frequently represented included effectiveness (40%) and safety (30%). Conclusion A panel of experts selected 9 of 28 routinely reported quality measures for inclusion in a composite indicator. Panelists also set an agenda for future research to close knowledge gaps for quality measures not selected for the Baby-MONITOR. PMID:21350429

  19. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  20. Proposing a survey instrument for measuring operational, formal, information and strategic Internet skills

    NARCIS (Netherlands)

    Deursen, van A.J.A.M.; Dijk, van J.A.G.M.; Peters, O.

    2012-01-01

    Observational studies prove to be very suitable to provide a realistic view of people's Internet skills. However, their cost and time are a strong limitation for large-scale data gathering. A useful addition to the measurement of Internet skills would be the development of survey questions for measu

  1. Developing performance measurement systems as enabling formalization: A longitudinal field study of a logistics department.

    NARCIS (Netherlands)

    Wouters, Marc; Wilderom, Celeste P.M.

    2007-01-01

    This paper reports on a developmental approach to performance-measurement systems (PMS). In particular, we look at characteristics of a development process that result in the PMS being perceived by employees as enabling of their work, rather than as primarily a control device for use by senior manag

  2. Quantifying the dynamic of OSA brain using multifractal formalism: A novel measure for sleep fragmentation.

    Science.gov (United States)

    Raiesdana, Somayeh

    2017-01-01

    It is thought that the critical brain dynamics in sleep is modulated during frequent periods of wakefulness. This paper utilizes the capacity of EEG based scaling analysis to quantify sleep fragmentation in patients with obstructive sleep apnea. The scale-free (fractal) behavior refers to a state where no characteristic scale dominates the dynamics of the underlying process which is evident as long range correlations in a time series. Here, Multiscaling (multifractal) spectrum is utilized to quantify the disturbed dynamic of an OSA brain with fragmented sleep. The whole night multichannel sleep EEG recordings of 18 subjects were employed to compute and quantify variable power-law long-range correlations and singularity spectra. Based on this characteristic, a new marker for sleep fragmentation named ``scaling based sleep fragmentation'' was introduced. This measure takes into account the sleep run length and stage transition quality within a fuzzy inference system to improve decisions made on sleep fragmentation. The proposed index was implemented, validated with sleepiness parameters and compared to some common indexes including sleep fragmentation index, arousal index, sleep diversity index, and sleep efficiency index. Correlations were almost significant suggesting that the sleep characterizing measure, based on singularity spectra range, could properly detect fragmentations and quantify their rate. This method can be an alternative for quantifying the sleep fragmentation in clinical practice after being approved experimentally. Control of sleep fragmentation and, subsequently, suppression of excessive daytime sleepiness will be a promising outlook of this kind of researches.

  3. Hidden Riches

    Directory of Open Access Journals (Sweden)

    Denise Pumain

    2007-03-01

    Full Text Available La Bourse (the stock exchange, always ready to latch onto values from whatever source, has undertaken to list images, logos, brand names—in short, virtual values, which opens the way for speculation on these symbols, thereby acknowledging the value of a reputation. Scientific journals, even those that grant free access to their publications, like Cybergeo, are not totally exempt from the logic of the marketplace. In the stock exchange of scientific values, the quality of a journal is measure...

  4. Interpretability formalized

    NARCIS (Netherlands)

    Joosten, Joost Johannes

    2004-01-01

    The dissertation is in the first place a treatment of mathematical interpretations. Interpretations themselves will be studied, but also shall they be used to study formal theories. Interpretations, when used in comparing theories, tell us, in a natural way, something about proof-strength of form

  5. Rethinking Formalisms in Formal Education

    Science.gov (United States)

    Nathan, Mitchell J.

    2012-01-01

    I explore a belief about learning and teaching that is commonly held in education and society at large that nonetheless is deeply flawed. The belief asserts that mastery of "formalisms"--specialized representations such as symbolic equations and diagrams with no inherent meaning except that which is established by convention--is prerequisite to…

  6. Beyond formalism

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    The ongoing debate over the role of formalism and formal specifications in software features many speakers with diverse positions. Yet, in the end, they share the conviction that the requirements of a software system can be unambiguously specified, that acceptable software is a product demonstrably meeting the specifications, and that the design process can be carried out with little interaction between designers and users once the specification has been agreed to. This conviction is part of a larger paradigm prevalent in American management thinking, which holds that organizations are systems that can be precisely specified and optimized. This paradigm, which traces historically to the works of Frederick Taylor in the early 1900s, is no longer sufficient for organizations and software systems today. In the domain of software, a new paradigm, called user-centered design, overcomes the limitations of pure formalism. Pioneered in Scandinavia, user-centered design is spreading through Europe and is beginning to make its way into the U.S.

  7. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...

  8. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression wher...

  9. School Administrators' Beliefs that School Improvements Were Due to Formal School Registration: A Rasch Measurement

    Science.gov (United States)

    Witten, Harm; Waugh, Russell; Gray, Jan

    2012-01-01

    This paper presents the results of an investigation into the attitudes of School Administrators to the relationship between formal school registration and school improvement. It concerns a mandatory inspection-type registration process for all Non-Government Schools in Western Australia. Part of the aim of this registration process was to help…

  10. Hidden Regular Variation: Detection and Estimation

    CERN Document Server

    Mitra, Abhimanyu

    2010-01-01

    Hidden regular variation defines a subfamily of distributions satisfying multivariate regular variation on $\\mathbb{E} = [0, \\infty]^d \\backslash \\{(0,0, ..., 0) \\} $ and models another regular variation on the sub-cone $\\mathbb{E}^{(2)} = \\mathbb{E} \\backslash \\cup_{i=1}^d \\mathbb{L}_i$, where $\\mathbb{L}_i$ is the $i$-th axis. We extend the concept of hidden regular variation to sub-cones of $\\mathbb{E}^{(2)}$ as well. We suggest a procedure of detecting the presence of hidden regular variation, and if it exists, propose a method of estimating the limit measure exploiting its semi-parametric structure. We exhibit examples where hidden regular variation yields better estimates of probabilities of risk sets.

  11. Entanglement without hidden nonlocality

    Science.gov (United States)

    Hirsch, Flavien; Túlio Quintino, Marco; Bowles, Joseph; Vértesi, Tamás; Brunner, Nicolas

    2016-11-01

    We consider Bell tests in which the distant observers can perform local filtering before testing a Bell inequality. Notably, in this setup, certain entangled states admitting a local hidden variable model in the standard Bell scenario can nevertheless violate a Bell inequality after filtering, displaying so-called hidden nonlocality. Here we ask whether all entangled states can violate a Bell inequality after well-chosen local filtering. We answer this question in the negative by showing that there exist entangled states without hidden nonlocality. Specifically, we prove that some two-qubit Werner states still admit a local hidden variable model after any possible local filtering on a single copy of the state.

  12. Formal Phonology

    Directory of Open Access Journals (Sweden)

    Dave Odden

    2013-02-01

    Full Text Available Two problematic trends have dominated modern phonological theorizing: over-reliance on machinery of Universal Grammar, and reification of functional properties in grammar. The former trend leads to arbitrary postulation of grammatical principles because UG “has no cost”, which leads to a welter of contradictory and unresolvable claims. The latter trend amounts to rejection of phonology and indeed grammatical computation, as a legitimate independent area of scientific investigation. This paper outlines Formal Phonology, which is a metatheoretical approach rooted in an inductive epistemology, committed to seriously engaging the fundamental logic of the discipline, one which demands justification of claims and an integrated consideration of what is known about phonological grammars, eschewing ad libitum conjectures and isolated positing of novel claims without evaluating how the claim interacts with other aspects of phonology. Debate over the proper mechanism for apparent segment-transparency in harmony, or the binary vs. privative nature of features, is ultimately doomed if we do not have a clear awareness of what a “grammar” and a “phonology” are. Misconstruing the nature of a phonology as being a model of observed behavior negatively affects theoretical choices, leads to confusion over what could motivate a claim about the nature of grammar, and in general, a lack of developed epistemological foundation leads to confusion over how to approach theory-construction.

  13. Hidden Photons in Aharonov-Bohm-Type Experiments

    OpenAIRE

    Arias, Paola; Diaz, Christian; Diaz, Marco Aurelio; Jaeckel, Joerg; Koch, Benjamin; Redondo, Javier

    2016-01-01

    We discuss the Aharonov-Bohm effect in the presence of hidden photons kinetically mixed with the ordinary electromagnetic photons. The hidden photon field causes a slight phase shift in the observable interference pattern. It is then shown how the limited sensitivity of this experiment can be largely improved. The key observation is that the hidden photon field causes a leakage of the ordinary magnetic field into the supposedly field-free region. The direct measurement of this magnetic field ...

  14. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  15. Hidden circuits and argumentation

    Science.gov (United States)

    Leinonen, Risto; Kesonen, Mikko H. P.; Hirvonen, Pekka E.

    2016-11-01

    Despite the relevance of DC circuits in everyday life and schools, they have been shown to cause numerous learning difficulties at various school levels. In the course of this article, we present a flexible method for teaching DC circuits at lower secondary level. The method is labelled as hidden circuits, and the essential idea underlying hidden circuits is in hiding the actual wiring of DC circuits, but to make their behaviour evident for pupils. Pupils are expected to find out the wiring of the circuit which should enhance their learning of DC circuits. We present two possible ways to utilise hidden circuits in a classroom. First, they can be used to test and enhance pupils’ conceptual understanding when pupils are expected to find out which one of the offered circuit diagram options corresponds to the actual circuit shown. This method aims to get pupils to evaluate the circuits holistically rather than locally, and as a part of that aim this method highlights any learning difficulties of pupils. Second, hidden circuits can be used to enhance pupils’ argumentation skills with the aid of argumentation sheet that illustrates the main elements of an argument. Based on the findings from our co-operating teachers and our own experiences, hidden circuits offer a flexible and motivating way to supplement teaching of DC circuits.

  16. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  17. To the point: reviews in medical education-taking control of the hidden curriculum.

    Science.gov (United States)

    Chuang, Alice W; Nuthalapaty, Francis S; Casey, Petra M; Kaczmarczyk, Joseph M; Cullimore, Amie J; Dalrymple, John L; Dugoff, Lorraine; Espey, Eve L; Hammoud, Maya M; Hueppchen, Nancy A; Katz, Nadine T; Peskin, Edward G

    2010-10-01

    This article, the ninth in the "To the Point" series that is prepared by the Association of Professors of Gynecology and Obstetrics Undergraduate Medical Education Committee, discusses the role of the "hidden curriculum" in shaping the professional identity of doctors in training. The characteristics that distinguish the formal curriculum and hidden curriculum are defined. Specific examples of hidden curricula in clinical environments and the positive and negative impacts that may result are highlighted. Techniques to evaluate clinical training environments and to identify the hidden curriculum are provided and are followed by methods to promote its positive messages and lessen its negative ones.

  18. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  19. Solar Hidden Photon Search

    CERN Document Server

    Schwarz, Matthias; Redondo, Javier; Ringwald, Andreas; Wiedemann, Guenter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope.

  20. Solar Hidden Photon Search

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Max-Planck-Institut fuer Physik und Astrophysik, Muenchen (Germany)

    2011-11-15

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope. (orig.)

  1. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  2. Enzyme kinetics: the whole picture reveals hidden meanings.

    Science.gov (United States)

    Pinto, Maria F; Estevinho, Berta N; Crespo, Rosa; Rocha, Fernando A; Damas, Ana M; Martins, Pedro M

    2015-06-01

    The methodology adopted by Michaelis and Menten in 1913 is still routinely used to characterize the catalytic power and selectivity of enzymes. These kinetic measurements must be performed soon after the purified enzyme is mixed with a large excess of substrate. Other time scales and solution compositions are no less physiologically relevant, but fall outside the range of applicability of the classical formalism. Here we show that the complete picture of an enzyme's mode of function is critically obscured by the limited scope of conventional kinetic analysis, even in the simplest case of a single active site without inhibition. This picture is now unveiled in a mathematically closed form that remains valid over the reaction time for all combinations of enzyme/substrate concentrations and rate constants. Algebraic simplicity is maintained in the new formalism when stationary reaction phases are considered. By achieving this century-old objective, the otherwise hidden role of the reversible binding step is revealed and atypical kinetic profiles are explained. Most singular kinetic behaviors are identified in a critical region of conditions that coincide with typical cell conditions. Because it is not covered by the Michaelis-Menten model, the critical region has been missed until now by low- and high-throughput screenings of new drugs. New possibilities are therefore raised for novel and once-promising inhibitors to therapeutically target enzymes.

  3. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  4. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  5. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  6. Computerized Testing: The Hidden Figures Test.

    Science.gov (United States)

    Jacobs, Ronald L.; And Others

    1985-01-01

    This study adapted the Hidden Figures Test for use on PLATO and determined the reliability of the computerized version compared to the paper and pencil version. Results indicate the test was successfully adapted with some modifications, and it was judged reliable although it may be measuring additional constructs. (MBR)

  7. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  8. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  9. Safety Hidden Trouble and Prevention Measures in the Ophthalmology Nursing%眼科护理中的安全隐患及防范对策

    Institute of Scientific and Technical Information of China (English)

    伍群华; 张冬梅

    2016-01-01

    目的:研究探讨眼科护理中存在的不安全因素以及制定有效防范对策。方法在过往病例当中,选取2014年1月~2015年12月我院收治的80例眼科患者,随机分为对照组和观察组,各40例,根据护理措施不同,对照组用一般护理方式,观察组用综合护理干预。分析护理工作中潜在的不安全因素,并探讨有效的解决对策。结果眼科护理主要风险因素有视力模糊、睡眠障碍、体位不适、焦虑、便秘。观察组的护理满意度明显高于对照组,差异有统计学意义(<0.05),护理效果显著提高。结论应用科学的管理手段,健全各项护理安全管理制度,制定有效的安全防患措施,可使眼科护理引起的安全隐患得到根本控制,并保证患者的安全,提高患者护理满意度。%Objective To explorer the unsafe factors in the department of ophthalmology nursing and develop effective preventive measures. Methods In the past cases, select 80 cases of ophthalmic patients from the January 2014 to December 2015 in our hospital, randomly divided into the observation group and the control group,each of 40 cases. According to the different nursing measures. The control group was treated with general nursing,and the observation group was treated with comprehensive nursing intervention. To analyze the potential unsafe factors in nursing work, and to explore effective countermeasures. Results Major risk factors in eye care is a blurred vision, sleep disorders, postural discomfort, anxiety and constipation.The nursing satisfaction of observation group was significantly higher than that of the control group,the difference was statistically significant ( <0.05), and the nursing effect was significantly improved. Conclusion The application of scientific management methods, improve the nursing safety management system,formulate effective safety prevention measures, can make the department of ophthalmology nursing safety

  10. Raising awareness of the hidden curriculum in veterinary medical education: a review and call for research.

    Science.gov (United States)

    Whitcomb, Tiffany L

    2014-01-01

    The hidden curriculum is characterized by information that is tacitly conveyed to and among students about the cultural and moral environment in which they find themselves. Although the hidden curriculum is often defined as a distinct entity, tacit information is conveyed to students throughout all aspects of formal and informal curricula. This unconsciously communicated knowledge has been identified across a wide spectrum of educational environments and is known to have lasting and powerful impacts, both positive and negative. Recently, medical education research on the hidden curriculum of becoming a doctor has come to the forefront as institutions struggle with inconsistencies between formal and hidden curricula that hinder the practice of patient-centered medicine. Similarly, the complex ethical questions that arise during the practice and teaching of veterinary medicine have the potential to cause disagreement between what the institution sets out to teach and what is actually learned. However, the hidden curriculum remains largely unexplored for this field. Because the hidden curriculum is retained effectively by students, elucidating its underlying messages can be a key component of program refinement. A review of recent literature about the hidden curriculum in a variety of fields, including medical education, will be used to explore potential hidden curricula in veterinary medicine and draw attention to the need for further investigation.

  11. Masses of Formal Philosophy

    DEFF Research Database (Denmark)

    Masses of Formal Philosophy is an outgrowth of Formal Philosophy. That book gathered the responses of some of the most prominent formal philosophers to five relatively open and broad questions initiating a discussion of metaphilosophical themes and problems surrounding the use of formal methods...... in philosophy. Including contributions from a wide range of philosophers, Masses of Formal Philosophy contains important new responses to the original five questions....

  12. Perceptual consequences of "hidden" hearing loss.

    Science.gov (United States)

    Plack, Christopher J; Barker, Daphne; Prendergast, Garreth

    2014-09-09

    Dramatic results from recent animal experiments show that noise exposure can cause a selective loss of high-threshold auditory nerve fibers without affecting absolute sensitivity permanently. This cochlear neuropathy has been described as hidden hearing loss, as it is not thought to be detectable using standard measures of audiometric threshold. It is possible that hidden hearing loss is a common condition in humans and may underlie some of the perceptual deficits experienced by people with clinically normal hearing. There is some evidence that a history of noise exposure is associated with difficulties in speech discrimination and temporal processing, even in the absence of any audiometric loss. There is also evidence that the tinnitus experienced by listeners with clinically normal hearing is associated with cochlear neuropathy, as measured using Wave I of the auditory brainstem response. To date, however, there has been no direct link made between noise exposure, cochlear neuropathy, and perceptual difficulties. Animal experiments also reveal that the aging process itself, in the absence of significant noise exposure, is associated with loss of auditory nerve fibers. Evidence from human temporal bone studies and auditory brainstem response measures suggests that this form of hidden loss is common in humans and may have perceptual consequences, in particular, regarding the coding of the temporal aspects of sounds. Hidden hearing loss is potentially a major health issue, and investigations are ongoing to identify the causes and consequences of this troubling condition.

  13. Hidden variables and hidden time in quantum theory

    OpenAIRE

    Kurakin, Pavel V.

    2005-01-01

    Bell's theorem proves only that hidden variables evolving in true physical time can't exist; still the theorem's meaning is usually interpreted intolerably wide. The concept of hidden time (and, in general, hidden space-time) is introduced. Such concept provides a whole new class of physical theories, fully compatible with current knowledge, but giving new tremendous possibilities. Those theories do not violate Bell's theorem.

  14. How to Measure the Black Hole's Mass, Spin Parameter and Inclination Angle in Kerr Lens Effect 1: Principle and Formalism

    CERN Document Server

    Saida, Hiromi

    2016-01-01

    We propose the principle of measuring the Kerr BH's mass, spin parameter and the direction of the spin axis through observing two quantities of the spinning strong gravitational lens effect of the BH. Those observable quantities are generated by two rays emitted at the same time by a source near the BH; the primary and secondary rays which reach a distant observer, respectively, earliest and secondary temporally. The time delay between detection times and the ratio of observed specific fluxes of those rays are the observable quantities. Our numerical estimations imply a good detectability of those observable quantities by the present or near future telescope capability, and our proposal may be realizable in the near future. Also, the details of formulas for calculating the observable quantities are explained so that readers having interest in this paper can check our proposal quantitatively.

  15. Formalization in Philosophy

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The advantages and disadvantages of formalization in philosophy are summarized. It is concluded that formalized philosophy is an endangered speciality that needs to be revitalized and to increase its interactions with non-formalized philosophy. The enigmatic style that is common in philosophical logic must give way to explicit discussions of the problematic relationship between formal models and the philosophical concepts and issues that motivated their development.

  16. Cause analysis and preventive measures of nursing safety hidden trouble in gynaecology and obstetrics%妇产科护理安全隐患原因分析及防范措施

    Institute of Scientific and Technical Information of China (English)

    张琳

    2015-01-01

    Objective:To explore the causes and preventive measures of nursing safety hidden trouble in gynaecology and obstetrics.Methods:35 cases of nursing staff were selected as the research objects.The causes of nursing safety hidden trouble in gynaecology and obstetrics were analyzed,and according to the practical nursing,we developed scientific and feasible prevention programs.Results:The causes of nursing safety hidden trouble in gynaecology and obstetrics included the environmental factors, irregularity of hospital system,nurses lacking good communication consciousness.Conclusion:For the effective prevention of obstetrics and gynecology nursing safety hidden trouble,it needs to strictly follow the rules and regulations of the hospital,regulate the working procedures of nursing staff,and on the basis of reducing the incidence rate of nursing disputes,promote the harmonious construction and long-term development of hospital.%目的:探讨妇产科护理安全隐患的原因及防范措施。方法:选择35名护理人员为研究对象,对妇产科护理安全隐患存在的原因展开分析,并根据实际护理情况,制定出科学、可行的防范方案。结果:妇产科护理安全隐患的原因包括环境、医院制度的不规范性以及护理人员缺乏良好的沟通意识。结论:为有效防止妇产科护理安全隐患的产生,需要严格遵循医院的规章制度,对护理人员的工作程序进行规范,从而在降低护理纠纷发生率的基础上,促进医院和谐建设与长远发展。

  17. Pragmatics for formal semantics

    DEFF Research Database (Denmark)

    Danvy, Olivier

    2011-01-01

    This tech talk describes how to write and how to inter-derive formal semantics for sequential programming languages. The progress reported here is (1) concrete guidelines to write each formal semantics to alleviate their proof obligations, and (2) simple calculational tools to obtain a formal...

  18. Formal languages in dynamical systems

    CERN Document Server

    Troll, G

    1993-01-01

    We treat here the interrelation between formal languages and those dynamical systems that can be described by cellular automata (CA). There is a well-known injective map which identifies any CA-invariant subshift with a central formal language. However, in the special case of a symbolic dynamics, i.e. where the CA is just the shift map, one gets a stronger result: the identification map can be extended to a functor between the categories of symbolic dynamics and formal languages. This functor additionally maps topological conjugacies between subshifts to empty-string-limited generalized sequential machines between languages. If the periodic points form a dense set, a case which arises in a commonly used notion of chaotic dynamics, then an even more natural map to assign a formal language to a subshift is offered. This map extends to a functor, too. The Chomsky hierarchy measuring the complexity of formal languages can be transferred via either of these functors from formal languages to symbolic dynamics and p...

  19. 药房发药差错及其隐患的综合性防范措施%Hair medicine pharmacy errors and comprehensive preventive measures against hidden danger

    Institute of Scientific and Technical Information of China (English)

    杨志刚

    2014-01-01

    目的:对药房发药差错的综合性防范措施进行分析和探讨。方法:对我院2011年1月份到2012年1月份发生的发药差错进行统计和分析,并制定相应的综合性防范措施,观察和比较干预前后的发药差错以及隐患情况。结果:干预后的发药差错发生率和隐患率相比干预前明显下降,其中发药差错以药物种类差错居多,干预后发药差错下降率为78%;发药隐患以药物数量隐患居多,干预后发药隐患下降率为36.2%。结论:通过制定和实施综合性防范措施,有利于减少药房发药差错以及隐患的发生率,值得推广和普及。%objective: to send medicine pharmacy errors in the comprehensive preventive measures are analyzed and discussed. Methods: our hospital from January 2011 to January 2012 in the dispensing error statistics and analysis, and formulate the corresponding comprehensive preventive measures, observed and compared before and after the intervention of the dispensing errors and pitfals. Results: after the intervention of the dispensing error rate and hazard rate significantly decreased, compared with before, in which the dispensing errors in the majority with drug type error, drug intervention backwardness errors decline rate is 78%; Hair medicine to drug number mostly hidden trouble, the intervention of backwardness medicine hidden trouble faling at a rate of 36.2%. Conclusion: through formulating and implementing comprehensive preventive measures, to reduce the incidence of hair medicine pharmacy errors and hidden dangers, worthy of promotion and popularization.

  20. Online Learning in Discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2007-01-01

    We present and analyse three online algorithms for learning in discrete Hidden Markov Models (HMMs) and compare them with the Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalisation error we draw learning curves in simplified situations. The performance for learning drifting concepts of one of the presented algorithms is analysed and compared with the Baldi-Chauvin algorithm in the same situations. A brief discussion about learning and symmetry breaking b...

  1. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  2. Industrial use of formal methods formal verification

    CERN Document Server

    Boulanger, Jean-Louis

    2012-01-01

    At present the literature gives students and researchers of the very general books on the formal technics. The purpose of this book is to present in a single book, a return of experience on the used of the "formal technics" (such proof and model-checking) on industrial examples for the transportation domain. This book is based on the experience of people which are completely involved in the realization and the evaluation of safety critical system software based.  The implication of the industrialists allows to raise the problems of confidentiality which could appear and so allow

  3. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  4. Persian version of frontal assessment battery: Correlations with formal measures of ‎executive functioning and providing normative data for Persian population

    Directory of Open Access Journals (Sweden)

    Sina Asaadi

    2016-01-01

    Full Text Available Background: Cognitive impairment in patients with Parkinson’s disease (PD mainly involves executive function (EF. The frontal assessment battery (FAB is an efficient tool for the assessment of EFs. The aims of this study were to determine the validity and reliability of the psychometric properties of the Persian version of FAB and assess its correlation with formal measures of EFs to provide normative data for the Persian version of FAB in patients with PD.Methods: The study recruited 149 healthy participants and 49 patients with idiopathic PD. In PD patients, FAB results were compared to their performance on EF tests. Reliability analysis involved test-retest reliability and internal consistency, whereas validity analysis involved convergent validity approach. FAB scores compared in normal controls and in PD patients matched for age, education, and Mini-Mental State Examination (MMSE score.Results: In PD patients, FAB scores were significantly decreased compared to normal controls, and correlated with Stroop test and Wisconsin Card Sorting Test (WCST. In healthy subjects, FAB scores varied according to the age, education, and MMSE. In the FAB subtest analysis, the performances of PD patients were worse than the healthy participants on similarities, fluency tasks, and Luria’s motor series.Conclusions: Persian version of FAB could be used as a reliable scale for the assessment of frontal lobe functions in Iranian patients with PD. Furthermore, normative data provided for the Persian version of this test improve the accuracy and confidence in the clinical application of the FAB.

  5. 儿科门诊留观室医院感染隐患及干预措施%Hidden danger and intervention measures for nosocomial infections in pediatric observation room

    Institute of Scientific and Technical Information of China (English)

    田茂强; 任洋; 姚毅

    2012-01-01

    目的 调查、了解儿科门诊留观室医院感染的隐患,进一步探讨预防医院感染的干预措施.方法 调查医院儿科门诊留观室存在的医院感染隐患,制定相应的预防医院感染措施.结果 门诊及留观室的医师缺乏较详细的病史询问和仔细的体格检查、儿科门诊留观室空气质量差、医护人员预防感染的意识薄弱、手卫生重视不够、抗菌药物的不规则使用等方面存在着医院感染隐患.结论 积极采取相应的干预措施,加强健康卫生宣传教育工作,注重消毒、隔离与监测,合理使用抗菌药物等,以达到预防及控制医院感染的目的.%OBJECTIVE To investigate and study the hidden dangers for nosocomial infections in pediatric observation room, and to further explore the intervention measures to prevent nosocomial infections. METHODS The hidden dangers for nosocomial infections in pediatric observation room were investigated, the corresponding counlermeasures were enacted to prevent nosocomial infections. RESULTS The lack of detailed inquiry of medical history and the careful physical examination, the poor air quality in observation room, weak sense of the prevention of infections, insufficient attention to hand hygiene, and the unreasonable use of antibiotics were the hidden dangers for nosocomial infections. CONCLUSION Taking appropriate intervention measures, intensifying the propaganda of the healthcare education, stressing the sterilization, isolation and surveillance, and reasonably using antibiotics can achieve the purpose of preventing and controlling nosocomial infections.

  6. Sequential Pattern Mining Using Formal Language Tools

    Directory of Open Access Journals (Sweden)

    R. S. Jadon

    2012-09-01

    Full Text Available In present scenario almost every system and working is computerized and hence all information and data are being stored in Computers. Huge collections of data are emerging. Retrieval of untouched, hidden and important information from this huge data is quite tedious work. Data Mining is a great technological solution which extracts untouched, hidden and important information from vast databases to investigate noteworthy knowledge in the data warehouse. An important problem in data mining is to discover patterns in various fields like medical science, world wide web, telecommunication etc. In the field of Data Mining, Sequential pattern mining is one of the method in which we retrieve hidden pattern linked with instant or other sequences. In sequential pattern mining we extract those sequential patterns whose support count are greater than or equal to given minimum support threshold value. In current scenario users are interested in only specific and interesting pattern instead of entire probable sequential pattern. To control the exploration space users can use many heuristics which can be represented as constraints. Many algorithms have been developed in the fields of constraint mining which generate patterns as per user expectation. In the present work we will be exploring and enhancing the regular expression constraints .Regular expression is one of the constraint and number of algorithm developed for sequential pattern mining which uses regular expression as a constraint. Some constraints are neither regular nor context free like cross-serial pattern anbmcndm used in Swiss German Data. We cannot construct equivalent deterministic finite automata (DFA or Push down automata (PDA for such type of patterns. We have proposed a new algorithm PMFLT (Pattern Mining using Formal Language Tools for sequential pattern mining using formal language tools as constraints. The proposed algorithm finds only user specific frequent sequence in efficient

  7. “水产动物疾病学”实践教学的安全隐患与防范%Hidden Danger and Precaution Measures in Practice Teaching of"Diseases of Aquatic Animals"

    Institute of Scientific and Technical Information of China (English)

    陈言峰

    2014-01-01

    Much hidden danger in practice teaching of"Diseases of Aquatic Animals" in the university was elaborated and many precaution measures were brought out in this article. These could provide security guarantee for the practice teaching of this course and avoid some dispensable harm and losses.%本文对高等院校“水产动物疾病学”实践教学中存在的诸多安全隐患进行了阐述,并提出了相应的防范措施,旨在为今后该课程的实践教学提供安全保障,力求避免一些不必要的伤害和损失。

  8. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  9. A Bell-type Theorem Without Hidden Variables

    CERN Document Server

    Stapp, Henry P

    2002-01-01

    Bell's theorem rules out local hidden-variable theories. The locality condition is the demand that what an experimenter freely chooses to measure in one space-time region has no influence in a second space-time region that is spacelike separated from the first. The hidden-variable stipulation means that this demand is implemented through requirements on an assumed-to-exist substructure involving hidden variables. The question thus arises whether the locality condition itself fails, or only its implementation by means of the assumed hidden-variable structure. This paper shows that any theory that satisfies two generally accepted features of orthodox quantum theory and that yields certain predictions of quantum theory cannot satisfy the afore-mentioned locality condition. These two features are that the choices made by the experimenters can be treated as localized free variables and that such free choices do not affect outcomes that have already occurred.

  10. Self-similarity of complex networks and hidden metric spaces

    CERN Document Server

    Serrano, M Angeles; Boguna, Marian

    2007-01-01

    We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.

  11. Prevention Measures of Nursing Security Hidden Danger on Obstetrics and Gynecology nursing Department%妇产护理存在的安全隐患及防范对策

    Institute of Scientific and Technical Information of China (English)

    谢晓辉

    2015-01-01

    妇产科是医院所有科室中出现护理风险相对较高的科室,因此,妇产科护理工作中采取有效的防范措施,能够减少患者伤亡事故的发生,在提高患者疾病治疗效果的同时,树立良好的科室形象。鉴于此该文对妇产科护理存在的安全隐患进行分析,并提出相关防范措施,以降低妇产科护理安全隐患,为患者营造安全的治疗环境。%Nursing security hidden danger refers to the mental or body structure injury for nurses to patients nursing appeared when the law does not allow and even death. Department of Obstetrics and gynecology nursing department is relatively higher risk of hospital in all departments, affected by many factors such as the woman's individual difference, more security risks, prone to nursing process, therefore, effective prevention measures taken in obstetrics and gynecology nursing work, to reduce the occurrence of accidents in patients, improve patient disease treatment effect at the same time the Department, establish a good image of the. In view of this, this article carries on the analysis to the potential safety problems of maternity care, and puts forward relevant pre-vention measures, to reduce the nursing safety hidden danger for patients in Department of Obstetrics and Gynecology, create a safe environment for treatment.

  12. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  13. Microgenetic analysis of hidden figures

    OpenAIRE

    Marković Slobodan S.; Gvozdenović Vasilije P.

    2006-01-01

    In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenes...

  14. The Hidden Subgroup Problem

    CERN Document Server

    Wang, Frédéric

    2010-01-01

    We give an overview of the Hidden Subgroup Problem (HSP) as of July 2010, including new results discovered since the survey of arXiv:quant-ph/0411037v1. We recall how the problem provides a framework for efficient quantum algorithms and present the standard methods based on coset sampling. We study the Dihedral and Symmetric HSPs and how they relate to hard problems on lattices and graphs. Finally, we conclude with the known solutions and techniques, describe connections with efficient algorithms as well as miscellaneous variants of HSP. We also bring various contributions to the topic. We show that in theory, we can solve HSP over a given group inductively: the base case is solving HSP over its simple factor groups and the inductive step is building efficient oracles over a normal subgroup N and over the factor group G/N. We apply this analysis to the Dedekindian HSP to get an alternative abelian HSP algorithm based on a change of the underlying group. We also propose a quotient reduction by the normal group...

  15. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs. In......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group.......This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  16. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs of offshor...... of our study is to suggest how hidden costs of offshoring can be mitigated through an explicit orientation towards improving organizational processes and structures as well as experience with offshoring.......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  17. Detecting Malicious Tweets in Twitter Using Runtime Monitoring With Hidden Information

    Science.gov (United States)

    2016-06-01

    according to the choice of the specification language is required [14]. In TP, specification languages such as temporal logic are generally difficult to...by using natural language (NL) and associated formal specifications. We then specified visible and hidden parameters, which are used for subsequent...and verify the system. In the deterministic part, we determined assertions by using natural language (NL) and associated formal specifications. We

  18. Fear of the Formal

    DEFF Research Database (Denmark)

    du Gay, Paul; Lopdrup-Hjorth, Thomas

    Over recent decades, institutions exhibiting high degrees of formality have come in for severe criticism. From the private to the public sector, and across a whole spectrum of actors spanning from practitioners to academics, formal organization is viewed with increasing doubt and skepticism. In a...

  19. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  20. On local-hidden-variable no-go theorems

    Science.gov (United States)

    Methot, A. A.

    2006-06-01

    The strongest attack against quantum mechanics came in 1935 in the form of a paper by Einstein, Podolsky, and Rosen. It was argued that the theory of quantum mechanics could not be called a complete theory of Nature, for every element of reality is not represented in the formalism as such. The authors then put forth a proposition: we must search for a theory where, upon knowing everything about the system, including possible hidden variables, one could make precise predictions concerning elements of reality. This project was ultimately doomed in 1964 with the work of Bell, who showed that the most general local hidden variable theory could not reproduce correlations that arise in quantum mechanics. There exist mainly three forms of no-go theorems for local hidden variable theories. Although almost every physicist knows the consequences of these no-go theorems, not every physicist is aware of the distinctions between the three or even their exact definitions. Thus, we will discuss here the three principal forms of no-go theorems for local hidden variable theories of Nature. We will define Bell theorems, Bell theorems without inequalities, and pseudo-telepathy. A discussion of the similarities and differences will follow.

  1. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  2. Aligning the Hidden Curriculum of Management Education with PRME: An Inquiry-Based Framework

    Science.gov (United States)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals and content alone is not enough to improve students'…

  3. Necessity of Integral Formalism

    Institute of Scientific and Technical Information of China (English)

    陶勇

    2011-01-01

    To describe the physical reality, there are two ways of constructing the dynamical equation of field, differential formalism and integral formalism. The importance of this fact is firstly emphasized by Yang in case of gauge field [Phys. Rev. Lett. 33 (1974) 44fi], where the fact has given rise to a deeper understanding for Aharonov-Bohm phase and magnetic monopole [Phys. Rev. D 12 (1975) 3846]. In this paper we shall point out that such a fact also holds in general wave function of matter, it may give rise to a deeper understanding for Berry phase. Most importantly, we shall prove a point that, for general wave function of matter, in the adiabatic limit, there is an intrinsic difference between its integral formalism and differential formalism. It is neglect of this difference that leads to an inconsistency of quantum adiabatic theorem pointed out by Marzlin and Sanders [Phys. Rev. Lett. 93 (2004) 160408]. It has been widely accepted that there is no physical difference of using differential operator or integral operator to construct the dynamical equation of field. Nevertheless, our study shows that the Schroedinger differential equation (i.e., differential formalism for wave function) shall lead to vanishing Berry phase and that the Schroedinger integral equation (i.e., integral formalism for wave function), in the adiabatic limit, can satisfactorily give the Berry phase. Therefore, we reach a conclusion: There are two ways of describing physical reality, differential formalism and integral formalism; but the integral formalism is a unique way of complete description.

  4. Dependencies in Formal Mathematics

    CERN Document Server

    Alama, Jesse; Urban, Josef

    2011-01-01

    Dependencies in formal mathematical texts, large coherent formal libraries and proof assistants are introduced as an emerging research topic, analyzed from foundational, semantic, computational, and pragmatic perspectives, and put to practical use in computer-assisted mathematics. Two different approaches to dependency computation are implemented over two major proof assistants with different type disciplines, and a large-scale experimental comparison is provided based on large Coq and Mizar formal libraries. Apart from theoretical discussions, importance of dependency analysis for advanced automation of computer-assisted reasoning, and for efficient proof analysis and theory refactoring in substantial mathematical domains are experimentally demonstrated.

  5. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  6. Formal and Informal Styles

    Institute of Scientific and Technical Information of China (English)

    伍柳

    2002-01-01

    This article intends to discuss one fundamental aspect of style…differences between formal and informal English with concrete examples through some specific features that distinquish these two types of English.

  7. Formal genetic maps

    African Journals Online (AJOL)

    Mohammad Saad Zaghloul Salem

    2014-12-24

    Dec 24, 2014 ... Abstract Formal genetic maps are databases, represented as text or graphic figures, that can be ..... cantly, to our current vague and scanty knowledge of many, ...... similar to reverse engineering techniques, might be worthy of.

  8. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  9. Formal Semantics for SDL

    OpenAIRE

    Prinz, Andreas

    2001-01-01

    In dieser Habilitationsschrift wird die formale Semantik der standardisierten Spezifikationssprache SDL (Specification and Description Language) beschrieben. Da SDL eine sehr umfangreiche Sprache ist, wurde eine repräsentative eingeschränkte Sprache RSDL (Restricted SDL) ausgewählt, um die Konzepte der formalen Definition von SDL darzustellen. Die vorliegende Habilitationsschrift umfaßt zwei große Teile: die Definition der formalen Semantik von RSDL und ihre Implementierung. Die formale Def...

  10. Formalized Informal Learning

    DEFF Research Database (Denmark)

    Levinsen, Karin Tweddell; Sørensen, Birgitte Holm

    2013-01-01

    are examined and the relation between network society competences, learners’ informal learning strategies and ICT in formalized school settings over time is studied. The authors find that aspects of ICT like multimodality, intuitive interaction design and instant feedback invites an informal bricoleur approach....... When integrated into certain designs for teaching and learning, this allows for Formalized Informal Learning and support is found for network society competences building....

  11. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  12. Hidden Variables or Positive Probabilities?

    CERN Document Server

    Rothman, T; Rothman, Tony

    2001-01-01

    Despite claims that Bell's inequalities are based on the Einstein locality condition, or equivalent, all derivations make an identical mathematical assumption: that local hidden-variable theories produce a set of positive-definite probabilities for detecting a particle with a given spin orientation. The standard argument is that because quantum mechanics assumes that particles are emitted in a superposition of states the theory cannot produce such a set of probabilities. We examine a paper by Eberhard who claims to show that a generalized Bell inequality, the CHSH inequality, can be derived solely on the basis of the locality condition, without recourse to hidden variables. We point out that he nonetheless assumes a set of positive-definite probabilities, which supports the claim that hidden variables or "locality" is not at issue here, positive-definite probabilities are. We demonstrate that quantum mechanics does predict a set of probabilities that violate the CHSH inequality; however these probabilities ar...

  13. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  14. Hidden symmetries in jammed systems

    Science.gov (United States)

    Morse, Peter K.; Corwin, Eric I.

    2016-07-01

    There are deep, but hidden, geometric structures within jammed systems, associated with hidden symmetries. These can be revealed by repeated transformations under which these structures lead to fixed points. These geometric structures can be found in the Voronoi tesselation of space defined by the packing. In this paper we examine two iterative processes: maximum inscribed sphere (MIS) inversion and a real-space coarsening scheme. Under repeated iterations of the MIS inversion process we find invariant systems in which every particle is equal to the maximum inscribed sphere within its Voronoi cell. Using a real-space coarsening scheme we reveal behavior in geometric order parameters which is length-scale invariant.

  15. Higher Derivatives and Canonical Formalism

    OpenAIRE

    HAMAMOTO, Shinji

    1995-01-01

    A canonical formalism for higher-derivative theories is presented on the basis of Dirac's method for constrained systems. It is shown that this formalism shares a path integral expression with Ostrogradski's canonical formalism.

  16. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  17. Hidden photon CDM search at Tokyo

    CERN Document Server

    Suzuki, Jun'ya; Horie, Tomoki; Minowa, Makoto

    2015-01-01

    We report on a search for hidden photon cold dark matter (HP CDM) using a novel technique with a dish antenna. We constructed two independent apparatus: one is aiming at the detection of the HP with a mass of $\\sim\\,\\rm{eV}$ which employs optical instruments, and the other is for a mass of $\\sim5\\times10^{-5}\\, \\rm{eV}$ utilizing a commercially available parabolic antenna facing on a plane reflector. From the result of the measurements, we found no evidence for the existence of HP CDM and set upper limits on the photon-HP mixing parameter $\\chi$.

  18. Modeling Multiple Risks: Hidden Domain of Attraction

    CERN Document Server

    Mitra, Abhimanyu

    2011-01-01

    Hidden regular variation is a sub-model of multivariate regular variation and facilitates accurate estimation of joint tail probabilities. We generalize the model of hidden regular variation to what we call hidden domain of attraction. We exhibit examples that illustrate the need for a more general model and discuss detection and estimation techniques.

  19. Formal Institutions and Subjective Wellbeing

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Dreher, Axel; Fischer, Justina A.V.

    2010-01-01

    cross-country studies on the institution-happiness association. Our findings suggest that their conclusions are qualitatively rather insensitive to the specific measure of 'happiness' used, while the associations between formal institutions and subjective well-being differ among poor and rich countries....... Separating different types of institutional quality, we find that in low-income countries the effects of economic-judicial institutions on happiness dominate those of political institutions, while analyses restricted to middle- and high-income countries show strong support for an additional beneficial effect......A long tradition in economics explores the association between the quality of formal institutions and economic performance. The literature on the relationship between such institutions and happiness is, however, rather limited, and inconclusive. In this paper, we revisit the findings from recent...

  20. Analysis on hidden blood loss of total knee arthroplasty in treating knee osteoarthritis

    Institute of Scientific and Technical Information of China (English)

    SHEN Hui-liang; LI Zheng; FENG Ming-li; CAO Guang-le

    2011-01-01

    Background Total knee arthroplasty (TKA) is an important therapy for the treatment of various late-stage knee diseases. However, it has been observed that patients have lower hemoglobin (HB) counts postoperatively, which are significantly inconsistent with the measured blood loss. Although the concept of hidden blood loss has been presented in 2000, very little clinical attention has been paid since then. In this study, we investigated the characteristics and influential factor of hidden blood loss after TKA in treating knee osteoarthritis.Methods One hundred and eight patients, with 42 males and 66 females, were retrospectively analyzed. The perioperative blood loss and the hidden blood loss following TKA were calculated by Gross formula. Potential factors affecting perioperative and hidden blood loss included gender, surgical time, tourniquet time, hemostasis (during operation with deflating tourniquet), and reinfusion of salvaged blood.Results The average perioperative blood loss was found to be (1553±356) ml and the average hidden blood loss was (793±223) ml. The hidden blood loss of the male was significantly higher than that of the female, and was reduced by hemostasis during the operation with a deflating tourniquet. Hidden blood loss was not affected by postoperative blood salvage and reinfusion, surgical time, or tourniquet time.Conclusions When calculating the value of hidden blood loss by Gross formula, the lowest value of hematocrit should be chosen as the parameter so that hidden blood loss would not be underestimated. No significant differences could be found in hidden blood loss for males compared to females. Hidden blood loss can be reduced by hemostasis during operation with a deflating tourniquet. Although reinfusion of salvaged blood could not reduce the perioperative blood loss or hidden blood loss, it was still an effective method to reduce transfusion rate.

  1. Pentaquark states with hidden charm

    Science.gov (United States)

    Bijker, Roelof

    2017-07-01

    I develop an extension of the usual three-flavor quark model to four flavors (u, d, s and c), and discuss the classification of pentaquark states with hidden charm. This work is motivated by the recent observation of such states by the LHCb Collatoration at CERN.

  2. Microgenetic analysis of hidden figures

    Directory of Open Access Journals (Sweden)

    Marković Slobodan S.

    2006-01-01

    Full Text Available In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenesis of the perception of hidden figures was investigated. The primed matching paradigm and the same-different task were used. In each experiment two types of test figures were contrasted: the more frequent and the less frequent ones. There were two prime types: identical (equal to test figures and complex (the pattern with hidden test figures. The prime duration was varied, 50 ms and 400 ms. The main result indicates that in the case of complex priming the more frequent test figures were processed significantly faster than the less frequent ones in both prime duration conditions. These results suggest that the faster the processing of a figure, the more probable the perceptual generation of this figure.

  3. Formalizing Probabilistic Safety Claims

    Science.gov (United States)

    Herencia-Zapana, Heber; Hagen, George E.; Narkawicz, Anthony J.

    2011-01-01

    A safety claim for a system is a statement that the system, which is subject to hazardous conditions, satisfies a given set of properties. Following work by John Rushby and Bev Littlewood, this paper presents a mathematical framework that can be used to state and formally prove probabilistic safety claims. It also enables hazardous conditions, their uncertainties, and their interactions to be integrated into the safety claim. This framework provides a formal description of the probabilistic composition of an arbitrary number of hazardous conditions and their effects on system behavior. An example is given of a probabilistic safety claim for a conflict detection algorithm for aircraft in a 2D airspace. The motivation for developing this mathematical framework is that it can be used in an automated theorem prover to formally verify safety claims.

  4. INCISIVE FORMAL VERIFIER

    Institute of Scientific and Technical Information of China (English)

    Cadence公司

    2007-01-01

    Incisive Formal Verifier为您的工作平台带来了形式分析的强大性能,能够令生产力大幅提高,并提升设计质量。作为Incisive平台的全套断言式验证解决方案的一个关键组件,Incisive Formal Verifier让你能够提前几个月开始验证,降低了重新投片的风险,加快了上市时间。

  5. Ontology or formal ontology

    Science.gov (United States)

    Žáček, Martin

    2017-07-01

    Ontology or formal ontology? Which word is correct? The aim of this article is to introduce correct terms and explain their basis. Ontology describes a particular area of interest (domain) in a formal way - defines the classes of objects that are in that area, and relationships that may exist between them. Meaning of ontology consists mainly in facilitating communication between people, improve collaboration of software systems and in the improvement of systems engineering. Ontology in all these areas offer the possibility of unification of view, maintaining consistency and unambiguity.

  6. How to Align the Hidden Curriculum of RM Education?

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2015-01-01

    operates through many areas of business schools, most notably in i) formal curriculum; ii) interaction; and iii) school governance. This means recognizing that changing curricula alone is not enough to bring about transformation in students’ moral attitudes because signals about appropriate conduct......Graduates are reputedly still leaving business school with poor morals, despite considerable focus on responsible management education? The ‘hidden curriculum’ (HC) directs the attention to the idea that what is taught in educational institutions is not necessarily what is actually learned. The HC...... are communicated in so many subtle ways beyond formal curricular content. We should ask ourselves: “What are students really learning while I think I am teaching X?...

  7. On local-hidden-variable no-go theorems

    CERN Document Server

    Méthot, A A

    2005-01-01

    The strongest attack against quantum mechanics came in 1935 in the form of a paper by Einstein, Podolsky and Rosen. It was argued that the theory of quantum mechanics could not be called a complete theory of Nature, for every element of reality is not represented in the formalism as such. The authors then put forth a proposition: we must search for a theory where, upon knowing everything about the system, including possible hidden variables, one could make precise predictions concerning elements of reality. This project was ultimatly doomed in 1964 with the work of Bell Bell, who showed that the most general local hidden variable theory could not reproduce correlations that arise in quantum mechanics. There exist mainly three forms of no-go theorems for local hidden variable theories. Although almost every physicist knows the consequences of these no-go theorems, not every physicist is aware of the distinctions between the three or even their exact definitions. Thus we will discuss here the three principal fo...

  8. Fear of the Formal

    DEFF Research Database (Denmark)

    du Gay, Paul; Lopdrup-Hjorth, Thomas

    2016-01-01

    term this ‘fear of the formal’, outlining key elements of its genealogy and exploring its contemporary manifestation in relation to recent and ongoing reforms of organisational life in a range of contexts. At the same time, we seek to indicate the continuing constitutive significance of formality...

  9. Formality in Brackets

    DEFF Research Database (Denmark)

    Garsten, Christina; Nyqvist, Anette

    suits’ (Nyqvist 2013), and of doing ‘ethnography by failure’ (Garsten 2013). In this paper, we explore the layers of informality and formality in our fieldwork experiences among financial investors and policy experts, and discuss how to ethnographically represent embodied fieldwork practices. How do we...

  10. Formal synthesis of (+)-discodermolide.

    Science.gov (United States)

    Francavilla, Charles; Chen, Weichun; Kinder, Frederick R

    2003-04-17

    [structure: see text] Herein we report the formal total synthesis of (+)-discodermolide in 21 steps (longest linear sequence) from commercially available Roche ester. This synthesis features the assembly of C(9-18) and C(19-24) fragments via a metal-chelated aldol coupling reaction.

  11. The Benefits of Formalization

    DEFF Research Database (Denmark)

    Rand, John; Torm, Nina Elisabeth

    2012-01-01

    factors and observable time-variant factors that may simultaneously influence the decision to formalize and subsequent firm performance, we find evidence that becoming officially registered leads to an increase in profits and investments, and a decrease in the use of casual labor (improved contract...

  12. The hidden-charm pentaquark and tetraquark states

    CERN Document Server

    Chen, Hua-Xing; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    In the past decade many charmonium-like states were observed experimentally. Especially those charged charmonium-like $Z_c$ states and bottomonium-like $Z_b$ states can not be accommodated within the naive quark model. These charged $Z_c$ states are good candidates of either the hidden-charm tetraquark states or molecules composed of a pair of charmed mesons. Recently, the LHCb Collaboration discovered two hidden-charm pentaquark states, which are also beyond the quark model. In this work, we review the current experimental progress and investigate various theoretical interpretations of these candidates of the multiquark states. We list the puzzles and theoretical challenges of these models when confronted with the experimental data. We also discuss possible future measurements which may distinguish the theoretical schemes on the underlying structures of the hidden-charm multiquark states.

  13. Nonintentional behavioural responses to psi : hidden targets and hidden observers

    OpenAIRE

    Anderson, Mary-Jane Charlotte

    2012-01-01

    Psi is the phenomenon of apparently responding to or receiving information by means other than the recognised senses. Psi information may influence human behaviour, without the individual intending this or even being aware of it. This thesis seeks to investigate nonintentional behavioural responses to psi. We present five empirical studies that investigated nonintentional behavioural responses to psi information. In each study, the psi information was hidden from participants, ...

  14. Backward causation, hidden variables and the meaning of completeness

    Indian Academy of Sciences (India)

    Huw Price

    2001-02-01

    Bell’s theorem requires the assumption that hidden variables are independent of future measurement settings. This independence assumption rests on surprisingly shaky ground. In particular, it is puzzlingly time-asymmetric. The paper begins with a summary of the case for considering hidden variable models which, in abandoning this independence assumption, allow a degree of ‘backward causation’. The remainder of the paper clarifies the physical significance of such models, in relation to the issue as to whether quantum mechanics provides a complete description of physical reality.

  15. 儿童用药的隐患与防范措施%Hidden Troubles and Preventive Measures of Children's Medication

    Institute of Scientific and Technical Information of China (English)

    陈红梅

    2015-01-01

    This paper analyzes the risks and preventive measures of clinical pediatric proposed system through the estab-lishment of a relatively complete, timely education and training of relevant personnel and other measures to establish pedi-atric risk prevention system. Need doctors, nurses, pharmacy staff actively cooperate to improve drug safety, reduce medica-tion risks and guarantee an effective means children safe.%该文分析临床儿童用药的隐患与防范措施,提出通过建立相对完善的制度,及时教育和培训相关工作人员等措施建立儿童用药风险防范体系. 需医生、护士、药房工作人员积极配合,以提高用药安全性,减少用药风险、保障儿童安全的有效手段.

  16. Optical Test of Local Hidden-Variable Model

    Institute of Scientific and Technical Information of China (English)

    WU XiaoHua; ZONG HongShi; PANG HouRong

    2001-01-01

    An inequality is deduced from local realism and a supplementary assumption. This inequality defines an experiment that can be actually performed with the present technology to test local hidden-variable models, and it is violated by quantum mechanics with a factor 1.92, while it can be simplified into a form where just two measurements are required.``

  17. Bayesian online algorithms for learning in discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2008-01-01

    We propose and analyze two different Bayesian online algorithms for learning in discrete Hidden Markov Models and compare their performance with the already known Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalization we draw learning curves in simplified situations for these algorithms and compare their performances.

  18. Readings in Formal Epistemology

    DEFF Research Database (Denmark)

    Formal epistemology’ is a term coined in the late 1990s for a new constellation of interests in philosophy,the roots of which are found in earlier works of epistemologists, philosophers of science, and logicians. It addresses a growing agenda of problems concerning knowledge, belief, certainty......, rationality, deliberation, decision, strategy, action and agent interaction – and it does so using methods from logic, probability, computability, decision, and game theory. This volume presents 42 classic texts in formal epistemology, and strengthens the ties between research into this area of philosophy...... and its neighbouring intellectual disciplines. The editors provide introductions to five basic subsections: Bayesian Epistemology, Belief Change, Decision Theory, Interactive Epistemology and Logics of Knowledge and Belief. The volume also includes a thorough index and suggestions for further reading...

  19. {\\delta}M Formalism

    CERN Document Server

    Talebian-Ashkezari, Alireza; Abolhasani, Ali Akbar

    2016-01-01

    We study the evolution of the "non-perturbative" metric perturbations in a Bianchi background in the long-wavelength limit. By applying the gradient expansion to the equations of motion we exhibit a generalized "Separate Universe" approach to the cosmological perturbation theory. Having found this consistent separate universe picture, we introduce the "{\\delta}M formalism" for calculating the evolution of the tensor perturbations in anisotropic inflation models in almost similar way as the so-called {\\delta}N formula for the super-horizon dynamics of the curvature perturbations. Likewise its ancestor, {\\delta}N formalism, this new method can substantially reduce the amount of calculations related to the evolution of the tensor modes.

  20. Formal Institutions and Subjective Wellbeing

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Dreher, Axel; Fischer, Justina

    A long tradition in economics explores the association between the quality of formal institutions and economic performance. The literature on the relationship between such institutions and happiness is, however, rather limited. In this paper, we revisit the findings from recent cross......-country studies on the institutions-happiness association. Our findings suggest that the conclusions reached by previous studies are fairly sensitive to the specific measure of 'happiness' used. In addition, the results indicate that the welfare effects of policies may differ across phases of a country's economic...

  1. Formal groups and applications

    CERN Document Server

    Hazewinkel, Michiel

    2012-01-01

    This book is a comprehensive treatment of the theory of formal groups and its numerous applications in several areas of mathematics. The seven chapters of the book present basics and main results of the theory, as well as very important applications in algebraic topology, number theory, and algebraic geometry. Each chapter ends with several pages of historical and bibliographic summary. One prerequisite for reading the book is an introductory graduate algebra course, including certain familiarity with category theory.

  2. Detect and exploit hidden structure in fatty acid signature data

    Science.gov (United States)

    Budge, Suzanne; Bromaghin, Jeffrey; Thiemann, Gregory

    2017-01-01

    Estimates of predator diet composition are essential to our understanding of their ecology. Although several methods of estimating diet are practiced, methods based on biomarkers have become increasingly common. Quantitative fatty acid signature analysis (QFASA) is a popular method that continues to be refined and extended. Quantitative fatty acid signature analysis is based on differences in the signatures of prey types, often species, which are recognized and designated by investigators. Similarly, predator signatures may be structured by known factors such as sex or age class, and the season or region of sample collection. The recognized structure in signature data inherently influences QFASA results in important and typically beneficial ways. However, predator and prey signatures may contain additional, hidden structure that investigators either choose not to incorporate into an analysis or of which they are unaware, being caused by unknown ecological mechanisms. Hidden structure also influences QFASA results, most often negatively. We developed a new method to explore signature data for hidden structure, called divisive magnetic clustering (DIMAC). Our DIMAC approach is based on the same distance measure used in diet estimation, closely linking methods of data exploration and parameter estimation, and it does not require data transformation or distributional assumptions, as do many multivariate ordination methods in common use. We investigated the potential benefits of the DIMAC method to detect and subsequently exploit hidden structure in signature data using two prey signature libraries with quite different characteristics. We found that the existence of hidden structure in prey signatures can increase the confusion between prey types and thereby reduce the accuracy and precision of QFASA diet estimates. Conversely, the detection and exploitation of hidden structure represent a potential opportunity to improve predator diet estimates and may lead to new

  3. 老年保健护理管理存在的安全隐患及防范措施%Safety Hidden Trouble and Preventive Measures in the Management of Elderly Health Care

    Institute of Scientific and Technical Information of China (English)

    李建婷

    2015-01-01

    Elderly health care management for the protection of the elderly quality of life, prevent accidents, reduce the po-tential risk of disease, it has a positive meaning. However, in the actual management activities, there are many potential safety hazards in the elderly, physical, psychological, medicine, environment and so on, the threat to the elderly health care, need to expand the theoretical and practical aspects of analysis and research, to improve the health care management of the elderly. This article from the old people in the health care management work in the security hidden trouble, and then ex-plore the security risk prevention measures.%老年保健护理管理对于保障老年人生存质量,防止意外事故的发生,降低疾病的潜在风险具有积极意义。但是,在实际的管理活动中,在老年人自身疾病、生理、心理、药物、环境等方面存在很多的安全隐患,对老年人的保健护理产生威胁,需要展开理论与实践方面分析与研究,提升老年保健护理管理工作水平。该研究从老年人在保健护理管理工作中所遇到的安全隐患进行深入分析,进而探讨其安全隐患的防范措施。

  4. Formalisms for reuse and systems integration

    CERN Document Server

    Rubin, Stuart

    2015-01-01

    Reuse and integration are defined as synergistic concepts, where reuse addresses how to minimize redundancy in the creation of components; while, integration focuses on component composition. Integration supports reuse and vice versa. These related concepts support the design of software and systems for maximizing performance while minimizing cost. Knowledge, like data, is subject to reuse; and, each can be interpreted as the other. This means that inherent complexity, a measure of the potential utility of a system, is directly proportional to the extent to which it maximizes reuse and integration. Formal methods can provide an appropriate context for the rigorous handling of these synergistic concepts. Furthermore, formal languages allow for non ambiguous model specification; and, formal verification techniques provide support for insuring the validity of reuse and integration mechanisms.   This edited book includes 12 high quality research papers written by experts in formal aspects of reuse and integratio...

  5. Analysis of obstetric nursing safety hidden reasons and preventive measures%妇产科护理安全隐患原因分析及防范措施

    Institute of Scientific and Technical Information of China (English)

    卿立艳

    2015-01-01

    目的:对妇产科护理安全隐患原因及防范措施进行综合分析。方法:采取2013年5月份至2014年7月份期间本院妇产科收治的70例患者,对这70例患者的临床资料进行回顾性分析,综合妇产科护理安全隐患的原因以及防范措施。结果:妇产科护理安全隐患的主要原因有护理人员、患者以及医院制度,通过采取相应的防范措施后,妇产科护理安全隐患明显降低,护理质量有了显著的提高。结论:在妇产科护理工作中,找出护理隐患发生的原因,从而有针对性的采取措施,能有效地降低妇产科护理安全隐患的发生率,提高护理质量,为患者的健康提供保障。%objective to make a comprehensive analysis of the causes of nursing safety hazard and prevention measures of Obstetrics and gynecology.Methods from May to 2014during July 2013 to 70 cases in our hospital patients,the clinical data of70 patients were analyzed retrospectively,reasons of Obstetrics and gynecol-ogy nursing safety hazards and preventive measures.Results the major causes of nursing safety of obstetrics nursing staff,patients and hospital system,by taking appropriate preventive measures,safety andreduce risks of obstetric nursing,the nursing quality was improved significantly.Conclusionin obstetric care,find out the reasons of nursing hidden trouble occurred,and targeted measures,can effectively reduce the obstetrics nursing safety hazard occurrence rate,improve the quality of nursing care,to provide protection for the health of patients.

  6. Scenario testing using formal ontologies

    CSIR Research Space (South Africa)

    Harmse, HF

    2014-09-01

    Full Text Available . Recent research concerned with the formal validation of such UML class diagrams has focused on transforming UML class diagrams to various formalisms such as description logics. Description logics are desirable since they have reasoning support which can...

  7. Formalizing the concept of sound.

    Energy Technology Data Exchange (ETDEWEB)

    Kaper, H. G.; Tipei, S.

    1999-08-03

    The notion of formalized music implies that a musical composition can be described in mathematical terms. In this article we explore some formal aspects of music and propose a framework for an abstract approach.

  8. Diffusion formalism and applications

    CERN Document Server

    Dattagupta, Sushanta

    2013-01-01

    Within a unifying framework, Diffusion: Formalism and Applications covers both classical and quantum domains, along with numerous applications. The author explores the more than two centuries-old history of diffusion, expertly weaving together a variety of topics from physics, mathematics, chemistry, and biology. The book examines the two distinct paradigms of diffusion-physical and stochastic-introduced by Fourier and Laplace and later unified by Einstein in his groundbreaking work on Brownian motion. The author describes the role of diffusion in probability theory and stochastic calculus and

  9. Formal Methods in Industry

    Directory of Open Access Journals (Sweden)

    Alexei Serna A.

    2012-12-01

    Full Text Available The application of formal methods in industry has progressed extensively over the past decade and the results are promising. But despite these achievements and it have been documented in numerous studies, it is still very common the skepticism about its usefulness and applicability. The goal of this paper is to show that its evolution over the past decade exceeds all previous processes and each time they do a better job to satisfy industrial needs. This is achieved by the description of some experiments and the result of various applications in industry and through an analyzing of the needs of companies that must be satisfy the research community in this field.

  10. Formalized informal learning

    DEFF Research Database (Denmark)

    Levinsen, Karin; Sørensen, Birgitte Holm

    2011-01-01

    This paper presents findings from a large-scale longitudinal, qualitative study - Project ICT and Learning (PIL) - that engaged the participation of eight primary schools in Denmark, and was conducted between 2006 and 2008. The research design was based on action research, involving teachers and ...... in society, educational sector and technology....... and other relevant stakeholders, as well as participant observations in the classroom documented by thick descriptions, formal and informal interviews and focus group interviews. The aim of the study was to explore and identify relations between designs for teaching and learning and the students' learning...

  11. Intelligence in formal machines

    OpenAIRE

    Vieira, Paulo Alexandre Andrade

    2016-01-01

    [ES]El objetivo de este trabajo es encontrar una forma de definir y medir la inteligencia en los sistemas formales computacionales. Para hacer esto yo hice varios tipos de consideraciones: en primer lugar, el concepto de ¿ ser inteligente ¿ asume nociones claras y se mide de manera aceptable sólo en el ser humano; segundo, hay una creciendo y salvaje uso del concepto ¿ ser inteligente¿ para el comportamiento de otros seres biológicos; tercero, hoy en día la palabra ¿inteligencia¿ a menudo se ...

  12. On quantum algorithms for noncommutative hidden subgroups

    Energy Technology Data Exchange (ETDEWEB)

    Ettinger, M. [Los Alamos National Lab., NM (United States); Hoeyer, P. [Odense Univ. (Denmark)

    1998-12-01

    Quantum algorithms for factoring and discrete logarithm have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the possibility of extending this general viewpoint to finding hidden subgroups of noncommutative groups. The authors present a quantum algorithm for the special case of dihedral groups which determines the hidden subgroup in a linear number of calls to the input function. They also explore the difficulties of developing an algorithm to process the data to explicitly calculate a generating set for the subgroup. A general framework for the noncommutative hidden subgroup problem is discussed and they indicate future research directions.

  13. Formal Methods in Knowledge Engineering

    NARCIS (Netherlands)

    Harmelen, van F.A.H.; Fensel, D.

    1995-01-01

    This paper presents a general discussion of the role of formal methods in Knowledge Engineering. We give an historical account of the development of the field of Knowledge Engineering towards the use of formal methods. Subsequently, we discuss the pro's and cons of formal methods. We do this by summ

  14. Formal Methods in Knowledge Engineering

    NARCIS (Netherlands)

    Harmelen, van F.A.H.; Fensel, D.

    1995-01-01

    This paper presents a general discussion of the role of formal methods in Knowledge Engineering. We give an historical account of the development of the field of Knowledge Engineering towards the use of formal methods. Subsequently, we discuss the pro's and cons of formal methods. We do this by

  15. Feature Selection, Flaring Size and Time-to-Flare Prediction Using Support Vector Regression, and Automated Prediction of Flaring Behavior Based on Spatio-Temporal Measures Using Hidden Markov Models

    Science.gov (United States)

    Al-Ghraibah, Amani

    Solar flares release stored magnetic energy in the form of radiation and can have significant detrimental effects on earth including damage to technological infrastructure. Recent work has considered methods to predict future flare activity on the basis of quantitative measures of the solar magnetic field. Accurate advanced warning of solar flare occurrence is an area of increasing concern and much research is ongoing in this area. Our previous work 111] utilized standard pattern recognition and classification techniques to determine (classify) whether a region is expected to flare within a predictive time window, using a Relevance Vector Machine (RVM) classification method. We extracted 38 features which describing the complexity of the photospheric magnetic field, the result classification metrics will provide the baseline against which we compare our new work. We find a true positive rate (TPR) of 0.8, true negative rate (TNR) of 0.7, and true skill score (TSS) of 0.49. This dissertation proposes three basic topics; the first topic is an extension to our previous work [111, where we consider a feature selection method to determine an appropriate feature subset with cross validation classification based on a histogram analysis of selected features. Classification using the top five features resulting from this analysis yield better classification accuracies across a large unbalanced dataset. In particular, the feature subsets provide better discrimination of the many regions that flare where we find a TPR of 0.85, a TNR of 0.65 sightly lower than our previous work, and a TSS of 0.5 which has an improvement comparing with our previous work. In the second topic, we study the prediction of solar flare size and time-to-flare using support vector regression (SVR). When we consider flaring regions only, we find an average error in estimating flare size of approximately half a GOES class. When we additionally consider non-flaring regions, we find an increased average

  16. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  17. Covariant Bardeen perturbation formalism

    Science.gov (United States)

    Vitenti, S. D. P.; Falciano, F. T.; Pinto-Neto, N.

    2014-05-01

    In a previous work we obtained a set of necessary conditions for the linear approximation in cosmology. Here we discuss the relations of this approach with the so-called covariant perturbations. It is often argued in the literature that one of the main advantages of the covariant approach to describe cosmological perturbations is that the Bardeen formalism is coordinate dependent. In this paper we will reformulate the Bardeen approach in a completely covariant manner. For that, we introduce the notion of pure and mixed tensors, which yields an adequate language to treat both perturbative approaches in a common framework. We then stress that in the referred covariant approach, one necessarily introduces an additional hypersurface choice to the problem. Using our mixed and pure tensors approach, we are able to construct a one-to-one map relating the usual gauge dependence of the Bardeen formalism with the hypersurface dependence inherent to the covariant approach. Finally, through the use of this map, we define full nonlinear tensors that at first order correspond to the three known gauge invariant variables Φ, Ψ and Ξ, which are simultaneously foliation and gauge invariant. We then stress that the use of the proposed mixed tensors allows one to construct simultaneously gauge and hypersurface invariant variables at any order.

  18. Prediction of super-heavy N{sup Low-Asterisk} and {Lambda}{sup Low-Asterisk} resonances with hidden beauty

    Energy Technology Data Exchange (ETDEWEB)

    Wu Jiajun, E-mail: wujiajun@ihep.ac.cn [Institute of High Energy Physics, CAS, P.O. Box 918(4), Beijing 100049 (China); Zhao Lu [Institute of High Energy Physics, CAS, P.O. Box 918(4), Beijing 100049 (China); Zou, B.S. [Institute of High Energy Physics, CAS, P.O. Box 918(4), Beijing 100049 (China); Theoretical Physics Center for Science Facilities, CAS, Beijing 100049 (China)

    2012-03-13

    The meson-baryon coupled channel unitary approach with the local hidden gauge formalism is extended to the hidden beauty sector. A few narrow N{sup Low-Asterisk} and {Lambda}{sup Low-Asterisk} resonances around 11 GeV are predicted as dynamically generated states from the interactions of heavy beauty mesons and baryons. Production cross sections of these predicted resonances in pp and ep collisions are estimated as a guide for the possible experimental search at relevant facilities.

  19. Decoding the learning environment of medical education: a hidden curriculum perspective for faculty development.

    Science.gov (United States)

    Hafler, Janet P; Ownby, Allison R; Thompson, Britta M; Fasser, Carl E; Grigsby, Kevin; Haidet, Paul; Kahn, Marc J; Hafferty, Frederic W

    2011-04-01

    Medical student literature has broadly established the importance of differentiating between formal-explicit and hidden-tacit dimensions of the physician education process. The hidden curriculum refers to cultural mores that are transmitted, but not openly acknowledged, through formal and informal educational endeavors. The authors extend the concept of the hidden curriculum from students to faculty, and in so doing, they frame the acquisition by faculty of knowledge, skills, and values as a more global process of identity formation. This process includes a subset of formal, formative activities labeled "faculty development programs" that target specific faculty skills such as teaching effectiveness or leadership; however, it also includes informal, tacit messages that faculty absorb. As faculty members are socialized into faculty life, they often encounter conflicting messages about their role. In this article, the authors examine how faculty development programs have functioned as a source of conflict, and they ask how these programs might be retooled to assist faculty in understanding the tacit institutional culture shaping effective socialization and in managing the inconsistencies that so often dominate faculty life.

  20. Formal aspects of resilience

    Directory of Open Access Journals (Sweden)

    Diana-Maria Drigă

    2015-12-01

    Full Text Available The concept of resilience has represented during the recent years a leading concern both in Romania, within the European Union and worldwide. Specialists in economics, management, finance, legal sciences, political sciences, sociology, psychology, grant a particular interest to this concept. Multidisciplinary research of resilience has materialized throughout the time in multiple conceptualizations and theorizing, but without being a consensus between specialists in terms of content, specificity and scope. Through this paper it is intended to clarify the concept of resilience, achieving an exploration of the evolution of this concept in ecological, social and economic environment. At the same time, the paper presents aspects of feedback mechanisms and proposes a formalization of resilience using the logic and mathematical analysis.

  1. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  2. Estimating an Activity Driven Hidden Markov Model

    OpenAIRE

    Meyer, David A.; Shakeel, Asif

    2015-01-01

    We define a Hidden Markov Model (HMM) in which each hidden state has time-dependent $\\textit{activity levels}$ that drive transitions and emissions, and show how to estimate its parameters. Our construction is motivated by the problem of inferring human mobility on sub-daily time scales from, for example, mobile phone records.

  3. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  4. Hidden-variable models for the spin singlet: I. Non-local theories reproducing quantum mechanics

    CERN Document Server

    Di Lorenzo, Antonio

    2011-01-01

    A non-local hidden variable model reproducing the quantum mechanical probabilities for a spin singlet is presented. The non-locality is concentrated in the distribution of the hidden variables. The model otherwise satisfies both the hypothesis of outcome independence, made in the derivation of Bell inequality, and of compliance with Malus's law, made in the derivation of Leggett inequality. It is shown through the prescription of a protocol that the non-locality can be exploited to send information instantaneously provided that the hidden variables can be measured, even though they cannot be controlled.

  5. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  6. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  7. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  8. Hidden Web信息获取

    Institute of Scientific and Technical Information of China (English)

    陈珂; 陈小英; 徐科

    2007-01-01

    如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词.由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面.然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值.文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息.

  9. Charging transient in polyvinyl formal

    Indian Academy of Sciences (India)

    P K Khare; P L Jain; R K Pandey

    2001-08-01

    In the present paper charging and discharging transient currents in polyvinyl formal (PVF) were measured as a function of temperatures (40–80°C), poling fields (9.0 × 103–9.0 × 104 V/cm) and electrode combinations (Al–Al, Au–Al, Zn–Al, Bi–Al, Cu–Al and Ag–Al). The current–time characteristics have different values of slope lying between 0.42–0.56 and 1.42–1.63. The polarization is considered to be due to dipolar reorientation associated with structural motions and space charge relaxations due to trapping of injected charge carriers in energetically distributed traps.

  10. Formal connections in deformation quantization

    DEFF Research Database (Denmark)

    Masulli, Paolo

    attention on symplectic manifolds equipped with a family of star products, indexed by a parameter space. In this situation we can define a connection in the trivial bundle over the parameter space with fibres the formal smooth functions on the manifold, which relates the star products in the family...... and is called a formal connection. We study the question of classifying such formal connections. To each star product we can associate a certain cohomology class called the characteristic class. It turns out that a formal connection exists if and only if all the star products in the family have the same...... characteristic class, and that formal connections form an affine space over the derivations of the star products. Moreover, if the parameter space for the family of star products is contractible, we obtain that any two flat formal connections are gauge equivalent via a self-equivalence of the family of star...

  11. Deep First Formal Concept Search

    Directory of Open Access Journals (Sweden)

    Tao Zhang

    2014-01-01

    Full Text Available The calculation of formal concepts is a very important part in the theory of formal concept analysis (FCA; however, within the framework of FCA, computing all formal concepts is the main challenge because of its exponential complexity and difficulty in visualizing the calculating process. With the basic idea of Depth First Search, this paper presents a visualization algorithm by the attribute topology of formal context. Limited by the constraints and calculation rules, all concepts are achieved by the visualization global formal concepts searching, based on the topology degenerated with the fixed start and end points, without repetition and omission. This method makes the calculation of formal concepts precise and easy to operate and reflects the integrity of the algorithm, which enables it to be suitable for visualization analysis.

  12. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...

  13. Hidden scale in quantum mechanics

    CERN Document Server

    Giri, Pulak Ranjan

    2007-01-01

    We show that the intriguing localization of a free particle wave-packet is possible due to a hidden scale present in the system. Self-adjoint extensions (SAE) is responsible for introducing this scale in quantum mechanical models through the nontrivial boundary conditions. We discuss a couple of classically scale invariant free particle systems to illustrate the issue. In this context it has been shown that a free quantum particle moving on a full line may have localized wave-packet around the origin. As a generalization, it has also been shown that particles moving on a portion of a plane or on a portion of a three dimensional space can have unusual localized wave-packet.

  14. The Operator Manifold Formalism, 1

    CERN Document Server

    Ter-Kazarian, G T

    1998-01-01

    The suggested operator manifold formalism enables to develop an approach to the unification of the geometry and the field theory. We also elaborate the formalism of operator multimanifold yielding the multiworld geometry involving the spacetime continuum and internal worlds, where the subquarks are defined implying the Confinement and Gauge principles. This formalism in Part II (hep-th/9812182) is used to develop further the microscopic approach to some key problems of particle physics.

  15. Rhythmic Characteristics of Colloquial and Formal Tamil

    Science.gov (United States)

    Keane, Elinor

    2006-01-01

    Application of recently developed rhythmic measures to passages of read speech in colloquial and formal Tamil revealed some significant differences between the two varieties, which are in diglossic distribution. Both were also distinguished from a set of control data from British English speakers reading an equivalent passage. The findings have…

  16. A formal model for total quality management

    NARCIS (Netherlands)

    S.C. van der Made-Potuijt; H.B. Bertsch (Boudewijn); L.P.J. Groenewegen

    1996-01-01

    textabstractTotal Quality Management (TQM) is a systematic approach to managing a company. TQM is systematic in the sense that it is uses facts through observation, analysis and measurable goals. There are theoretical descriptions of this management concept, but there is no formal model of it. A for

  17. Towards a Formal Framework for Computational Trust

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl Kristian; Sassone, Vladimiro

    2006-01-01

    We define a mathematical measure for the quantitative comparison of probabilistic computational trust systems, and use it to compare a well-known class of algorithms based on the so-called beta model. The main novelty is that our approach is formal, rather than based on experimental simulation....

  18. A formal model for total quality management

    NARCIS (Netherlands)

    S.C. van der Made-Potuijt; H.B. Bertsch (Boudewijn); L.P.J. Groenewegen

    1996-01-01

    textabstractTotal Quality Management (TQM) is a systematic approach to managing a company. TQM is systematic in the sense that it is uses facts through observation, analysis and measurable goals. There are theoretical descriptions of this management concept, but there is no formal model of it. A

  19. Raman Tensor Formalism for Optically Anisotropic Crystals.

    Science.gov (United States)

    Kranert, Christian; Sturm, Chris; Schmidt-Grund, Rüdiger; Grundmann, Marius

    2016-03-25

    We present a formalism for calculating the Raman scattering intensity dependent on the polarization configuration for optically anisotropic crystals. It can be applied to crystals of arbitrary orientation and crystal symmetry measured in normal incidence backscattering geometry. The classical Raman tensor formalism cannot be used for optically anisotropic materials due to birefringence causing the polarization within the crystal to be depth dependent. We show that in the limit of averaging over a sufficiently large scattering depth, the observed Raman intensities converge and can be described by an effective Raman tensor given here. Full agreement with experimental results for uniaxial and biaxial crystals is demonstrated.

  20. Formalized Epistemology, Logic, and Grammar

    Science.gov (United States)

    Bitbol, Michel

    The task of a formal epistemology is defined. It appears that a formal epistemology must be a generalization of "logic" in the sense of Wittgenstein's Tractatus. The generalization is required because, whereas logic presupposes a strict relation between activity and language, this relation may be broken in some domains of experimental enquiry (e.g., in microscopic physics). However, a formal epistemology should also retain a major feature of Wittgenstein's "logic": It must not be a discourse about scientific knowledge, but rather a way of making manifest the structures usually implicit in knowledge-gaining activity. This strategy is applied to the formalism of quantum mechanics.

  1. 40 years of formal methods

    DEFF Research Database (Denmark)

    Bjørner, Dines; Havelund, Klaus

    2014-01-01

    In this "40 years of formal methods" essay we shall first delineate, Sect. 1, what we mean by method, formal method, computer science, computing science, software engineering, and model-oriented and algebraic methods. Based on this, we shall characterize a spectrum from specification-oriented met......In this "40 years of formal methods" essay we shall first delineate, Sect. 1, what we mean by method, formal method, computer science, computing science, software engineering, and model-oriented and algebraic methods. Based on this, we shall characterize a spectrum from specification...

  2. Formal, Non-Formal and Informal Learning in the Sciences

    Science.gov (United States)

    Ainsworth, Heather L.; Eaton, Sarah Elaine

    2010-01-01

    This research report investigates the links between formal, non-formal and informal learning and the differences between them. In particular, the report aims to link these notions of learning to the field of sciences and engineering in Canada and the United States, including professional development of adults working in these fields. It offers…

  3. Analysis of animal accelerometer data using hidden Markov models

    OpenAIRE

    2016-01-01

    Use of accelerometers is now widespread within animal biotelemetry as they provide a means of measuring an animal's activity in a meaningful and quantitative way where direct observation is not possible. In sequential acceleration data there is a natural dependence between observations of movement or behaviour, a fact that has been largely ignored in most analyses. Analyses of acceleration data where serial dependence has been explicitly modelled have largely relied on hidden Markov models (H...

  4. Hidden torsion, 3-manifolds, and homology cobordism

    CERN Document Server

    Cha, Jae Choon

    2011-01-01

    This paper continues our exploration of homology cobordism of 3-manifolds using our recent results on Cheeger-Gromov rho-invariants associated to amenable representations. We introduce a new type of torsion in 3-manifold groups we call hidden torsion, and an algebraic approximation we call local hidden torsion. We construct infinitely many hyperbolic 3-manifolds which have local hidden torsion in the transfinite lower central subgroup. By realizing Cheeger-Gromov invariants over amenable groups, we show that our hyperbolic 3-manifolds are not pairwise homology cobordant, yet remain indistinguishable by any prior known homology cobordism invariants.

  5. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  6. Visible Effects of Invisible Hidden Valley Radiation

    CERN Document Server

    Carloni, Lisa

    2010-01-01

    Assuming there is a new gauge group in a Hidden Valley, and a new type of radiation, can we observe it through its effect on the kinematic distributions of recoiling visible particles? Specifically, what are the collider signatures of radiation in a hidden sector? We address these questions using a generic SU(N)-like Hidden Valley model that we implement in Pythia. We find that in both the e+e- and the LHC cases the kinematic distributions of the visible particles can be significantly affected by the valley radiation. Without a proper understanding of such effects, inferred masses of "communicators" and of invisible particles can be substantially off.

  7. A Formalization of Linkage Analysis

    DEFF Research Database (Denmark)

    Ingolfsdottir, Anna; Christensen, A.I.; Hansen, Jens A.

    In this report a formalization of genetic linkage analysis is introduced. Linkage analysis is a computationally hard biomathematical method, which purpose is to locate genes on the human genome. It is rooted in the new area of bioinformatics and no formalization of the method has previously been ...

  8. A Formalization of Linkage Analysis

    DEFF Research Database (Denmark)

    Ingolfsdottir, Anna; Christensen, A.I.; Hansen, Jens A.

    In this report a formalization of genetic linkage analysis is introduced. Linkage analysis is a computationally hard biomathematical method, which purpose is to locate genes on the human genome. It is rooted in the new area of bioinformatics and no formalization of the method has previously been...

  9. New procedure for departure formalities

    CERN Multimedia

    HR & GS Departments

    2011-01-01

    As part of the process of simplifying procedures and rationalising administrative processes, the HR and GS Departments have introduced new personalised departure formalities on EDH. These new formalities have applied to students leaving CERN since last year and from 17 October 2011 this procedure will be extended to the following categories of CERN personnel: Staff members, Fellows and Associates. It is planned to extend this electronic procedure to the users in due course. What purpose do departure formalities serve? The departure formalities are designed to ensure that members of the personnel contact all the relevant services in order to return any necessary items (equipment, cards, keys, dosimeter, electronic equipment, books, etc.) and are aware of all the benefits to which they are entitled on termination of their contract. The new departure formalities on EDH have the advantage of tailoring the list of services that each member of the personnel must visit to suit his individual contractual and p...

  10. A TWO-STATE MIXED HIDDEN MARKOV MODEL FOR RISKY TEENAGE DRIVING BEHAVIOR

    Science.gov (United States)

    Jackson, John C.; Albert, Paul S.; Zhang, Zhiwei

    2016-01-01

    This paper proposes a joint model for longitudinal binary and count outcomes. We apply the model to a unique longitudinal study of teen driving where risky driving behavior and the occurrence of crashes or near crashes are measured prospectively over the first 18 months of licensure. Of scientific interest is relating the two processes and predicting crash and near crash outcomes. We propose a two-state mixed hidden Markov model whereby the hidden state characterizes the mean for the joint longitudinal crash/near crash outcomes and elevated g-force events which are a proxy for risky driving. Heterogeneity is introduced in both the conditional model for the count outcomes and the hidden process using a shared random effect. An estimation procedure is presented using the forward–backward algorithm along with adaptive Gaussian quadrature to perform numerical integration. The estimation procedure readily yields hidden state probabilities as well as providing for a broad class of predictors.

  11. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  12. Engineering of Algorithms for Hidden Markov models and Tree Distances

    DEFF Research Database (Denmark)

    Sand, Andreas

    grown exponentially because of drastic improvements in the technology behind DNA and RNA sequencing, and focus on the research field has increased due to its potential to expand our knowledge about biological mechanisms and to improve public health. There has therefore been a continuously growing demand...... of the algorithms to exploit the parallel architecture of modern computers. In this PhD dissertation, I present my work with algorithmic optimizations and parallelizations in primarily two areas in algorithmic bioinformatics: algorithms for analyzing hidden Markov models and algorithms for computing distance...... measures between phylogenetic trees. Hidden Markov models is a class of probabilistic models that is used in a number of core applications in bioinformatics such as modeling of proteins, gene finding and reconstruction of species and population histories. I show how a relatively simple parallelization can...

  13. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  14. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  15. Fibroid Tumors in Women: A Hidden Epidemic?

    Science.gov (United States)

    ... Issue Past Issues Fibroid Tumors in Women: A Hidden Epidemic? Past Issues / Spring 2007 Table of Contents ... fibroids@rics.bwh.harvard.edu , or visit our Web site: www.fibroids.net . You may also write ...

  16. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  17. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  18. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  19. Gestalt Algebra—A Proposal for the Formalization of Gestalt Perception and Rendering

    OpenAIRE

    Eckart Michaelsen

    2014-01-01

    Gestalt Algebra gives a formal structure suitable for describing complex patterns in the image plain. This can be useful for recognizing hidden structure in images. The work at hand refers to the laws of perceptual psychology. A manifold called the Gestalt Domain is defined. Next to the position in 2D it also contains an orientation and a scale component. Algebraic operations on it are given for mirror symmetry as well as organization into rows. Additionally the Gestalt Domain contains an ass...

  20. Making the Hidden Curriculum the Formal Curriculum: Vocational Training in South Africa.

    Science.gov (United States)

    Kraak, Andre

    1991-01-01

    Critical analysis of the ideological character of vocational training initiatives implemented in South Africa, 1976-89, and comparison to "new vocationalism" in Great Britain suggest that South African training programs aim to instill capitalist values and stabilize labor relations while doing little to improve Black participation in the…

  1. Uncovering the Hidden Structure of Platoons: Formal and Emergent Leaders’ Perceptions of Organizational Networks

    Science.gov (United States)

    2008-12-01

    tested by calculating the Quadratic Assignment Procedure ( QAP ) correlation between leadership ratings and advice network ties as well as the QAP ...correlation between leadership ratings and friendship network ties, in each of the three infantry platoons. QAP correlations (Hubert & Schultz, 1976...inflated estimates of statistical significance if ordinary least squares (OLS) regression is used. The QAP technique is designed to provide unbiased

  2. Cultural Competence in Medical Education: Aligning the Formal, Informal and Hidden Curricula

    Science.gov (United States)

    Paul, David; Ewen, Shaun C.; Jones, Rhys

    2014-01-01

    The concept of cultural competence has become reified by inclusion as an accreditation standard in the US and Canada, in New Zealand it is demanded through an Act of Parliament, and it pervades discussion in Australian medical education discourse. However, there is evidence that medical graduates feel poorly prepared to deliver cross-cultural care…

  3. Cultural Competence in Medical Education: Aligning the Formal, Informal and Hidden Curricula

    Science.gov (United States)

    Paul, David; Ewen, Shaun C.; Jones, Rhys

    2014-01-01

    The concept of cultural competence has become reified by inclusion as an accreditation standard in the US and Canada, in New Zealand it is demanded through an Act of Parliament, and it pervades discussion in Australian medical education discourse. However, there is evidence that medical graduates feel poorly prepared to deliver cross-cultural care…

  4. Hidden figures are ever present.

    Science.gov (United States)

    Mens, L H; Leeuwenberg, E L

    1988-11-01

    Preference judgments about alternative interpretations of unambiguous patterns can be explained in terms of a rivalry between a preferred and a second-best interpretation (cf. Leeuwenberg & Buffart, 1983). We tested whether this second-best interpretation corresponds to a suppressed but concurrently present interpretation or whether it merely reflects an alternative view that happens to be preferred less often. Two patterns were present immediately following each other with a very short onset asynchrony: a complete pattern and one out of three possible subpatterns of it, corresponding to the best, the second best, or an odd interpretation of the complete pattern. Subjects indicated which subpattern was presented by choosing among the three subpatterns shown after each trial. The scores, corrected for response-bias effects, indicated a relative facilitation of the second-best interpretation, in agreement with its predicted "hidden" presence. This result is more in line with theories that capitalize on the quality of the finally selected representation than with processing models aimed at reaching one single solution as fast and as economically as possible.

  5. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  6. Hidden local symmetry and beyond

    Science.gov (United States)

    Yamawaki, Koichi

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here, I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H = SU(2)L × SU(2)R/SU(2)V with additional symmetry, the nonlinearly-realized scale symmetry. Then, the SM does have a dynamical gauge boson of the SU(2)V HLS, "SM ρ meson", in addition to the Higgs as a pseudo-dilaton as well as the NG bosons to be absorbed in to the W and Z. Based on the recent work done with Matsuzaki and Ohki, I discuss a novel possibility that the SM ρ meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "dark SM skyrmion (DSMS)".

  7. Automatically Grading Customer Confidence in a Formal Specification.

    Science.gov (United States)

    Shukur, Zarina; Burke, Edmund; Foxley, Eric

    1999-01-01

    Describes an automatic grading system for a formal methods computer science course that is able to evaluate a formal specification written in the Z language. Quality is measured by considering first, specification correctness (syntax, semantics, and satisfaction of customer requirements), and second, specification maintainability (comparison of…

  8. Toward a mathematical formalism of performance, task difficulty, and activation

    Science.gov (United States)

    Samaras, George M.

    1988-01-01

    The rudiments of a mathematical formalism for handling operational, physiological, and psychological concepts are developed for use by the man-machine system design engineer. The formalism provides a framework for developing a structured, systematic approach to the interface design problem, using existing mathematical tools, and simplifying the problem of telling a machine how to measure and use performance.

  9. Constraining solar hidden photons using HPGe detector

    Energy Technology Data Exchange (ETDEWEB)

    Horvat, R.; Kekez, D., E-mail: Dalibor.Kekez@irb.hr; Krčmar, M.; Krečak, Z.; Ljubičić, A.

    2013-04-25

    In this Letter we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory. With our experimental setup we observe the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, entails both photon into hidden state oscillations and a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in Sun's interior as well as in the detector. We exclude hidden photons with kinetic couplings χ>(2.2×10{sup −13}–3×10{sup −7}) in the mass region 0.2 eV≲m{sub γ{sup ′}}≲30 keV. Our constraints on the mixing parameter χ in the mass region from 20 eV up to 15 keV prove even slightly better then those obtained recently by using data from the CAST experiment, albeit still somewhat weaker than those obtained from solar and HB stars lifetime arguments.

  10. Formal verification - Robust and efficient code: Introduction to Formal Verification

    CERN Document Server

    CERN. Geneva

    2016-01-01

    In general, FV means "proving that certain properties hold for a given system using formal mathematics". This definition can certainly feel daunting, however, as we will learn, we can reap benefits from the paradigm without digging too deep into ...

  11. Scale-invariant hidden local symmetry, topology change, and dense baryonic matter

    Science.gov (United States)

    Paeng, Won-Gi; Kuo, Thomas T. S.; Lee, Hyun Kyu; Rho, Mannque

    2016-05-01

    When scale symmetry is implemented into hidden local symmetry in low-energy strong interactions to arrive at a scale-invariant hidden local symmetric (HLS) theory, the scalar f0(500 ) may be interpreted as pseudo-Nambu-Goldstone (pNG) boson, i.e., dilaton, of spontaneously broken scale invariance, joining the pseudoscalar pNG bosons π and the matter fields V =(ρ ,ω ) as relevant degrees of freedom. Implementing the skyrmion-half-skyrmion transition predicted at large Nc in QCD at a density roughly twice the nuclear matter density found in the crystal simulation of dense skyrmion matter, we determine the intrinsically density-dependent "bare parameters" of the scale-invariant HLS Lagrangian matched to QCD at a matching scale ΛM. The resulting effective Lagrangian, with the parameters scaling with the density of the system, is applied to nuclear matter and dense baryonic matter relevant to massive compact stars by means of the double-decimation renormalization-group Vlow k formalism. We satisfactorily postdict the properties of normal nuclear matter and more significantly predict the equation of state of dense compact-star matter that quantitatively accounts for the presently available data coming from both the terrestrial and space laboratories. We interpret the resulting structure of compact-star matter as revealing how the combination of hidden-scale symmetry and hidden local symmetry manifests itself in compressed baryonic matter.

  12. Formal Component-Based Semantics

    CERN Document Server

    Madlener, Ken; van Eekelen, Marko; 10.4204/EPTCS.62.2

    2011-01-01

    One of the proposed solutions for improving the scalability of semantics of programming languages is Component-Based Semantics, introduced by Peter D. Mosses. It is expected that this framework can also be used effectively for modular meta theoretic reasoning. This paper presents a formalization of Component-Based Semantics in the theorem prover Coq. It is based on Modular SOS, a variant of SOS, and makes essential use of dependent types, while profiting from type classes. This formalization constitutes a contribution towards modular meta theoretic formalizations in theorem provers. As a small example, a modular proof of determinism of a mini-language is developed.

  13. Formal Verification of NTRUEncrypt Scheme

    Directory of Open Access Journals (Sweden)

    Gholam Reza Moghissi

    2016-04-01

    Full Text Available In this paper we explore a mechanized verification of the NTRUEncrypt scheme, with the formal proof system Isabelle/HOL. More precisely, the functional correctness of this algorithm, in its reduced form, is formally verified with computer support. We show that this scheme is correct what is a necessary condition for the usefulness of any cryptographic encryption scheme. Besides, we present a convenient and application specific formalization of the NTRUEncrypt scheme in the Isabelle/HOL system that can be used in further study around the functional and security analysis of NTRUEncrypt family.

  14. 40 years of formal methods

    DEFF Research Database (Denmark)

    Bjørner, Dines; Havelund, Klaus

    2014-01-01

    -oriented methods to analysis-oriented methods. Then, Sect. 2, we shall provide a "survey": which are the 'prerequisite works' that have enabled formal methods, Sect. 2.1, and which are, to us, the, by now, classical 'formal methods', Sect. 2.2. We then ask ourselves the question: have formal methods for software......" is complemented, in Sect. 3.4, by a "looking forward" at some promising developments-besides the alleviation of the (eighth or more) hindrances! © 2014 Springer International Publishing Switzerland....

  15. Scalable Techniques for Formal Verification

    CERN Document Server

    Ray, Sandip

    2010-01-01

    This book presents state-of-the-art approaches to formal verification techniques to seamlessly integrate different formal verification methods within a single logical foundation. It should benefit researchers and practitioners looking to get a broad overview of the spectrum of formal verification techniques, as well as approaches to combining such techniques within a single framework. Coverage includes a range of case studies showing how such combination is fruitful in developing a scalable verification methodology for industrial designs. This book outlines both theoretical and practical issue

  16. [Hidden allergens in processed food. The consumer perspective].

    Science.gov (United States)

    Schnadt, S

    2012-03-01

    Despite improved allergen-labeling and careful avoidance strategies, hidden allergens in food are a substantial risk for unintended reactions in food allergy sufferers. Unpublished data from a survey of the German Allergy and Asthma Association (Deutscher Allergie- und Asthmabund, DAAB) show that 85% of 738 questioned food allergic patients have experienced at least one allergic reaction from each prepacked products as well as food sold loose. Almost half of the participants said to have not received information of a food allergen as an ingredient or possible trace on the label. Different possibilities are discussed under which food allergens can be hidden in processed products, like incomprehensible labeling, labeling gaps, unexpected occurrence of allergens as well as cross contaminations or allergens in loose products. To each of the seven highlighted sources of hidden allergens in food, practical examples are given as well as proposals for the improvement of the situation from consumer view. The aim is to indicate possibilities and measures for politics and industry by which allergic consumers and their social circle are able to make an informed choice concerning the safe consumption of a certain product and to protect themselves from unintentional reactions.

  17. Quantum formalism to describe binocular rivalry.

    Science.gov (United States)

    Manousakis, Efstratios

    2009-11-01

    On the basis of the general character and operation of the process of perception, a formalism is sought to mathematically describe the subjective or abstract/mental process of perception. It is shown that the formalism of orthodox quantum theory of measurement, where the observer plays a key role, is a broader mathematical foundation which can be adopted to describe the dynamics of the subjective experience. The mathematical formalism describes the psychophysical dynamics of the subjective or cognitive experience as communicated to us by the subject. Subsequently, the formalism is used to describe simple perception processes and, in particular, to describe the probability distribution of dominance duration obtained from the testimony of subjects experiencing binocular rivalry. Using this theory and parameters based on known values of neuronal oscillation frequencies and firing rates, the calculated probability distribution of dominance duration of rival states in binocular rivalry under various conditions is found to be in good agreement with available experimental data. This theory naturally explains an observed marked increase in dominance duration in binocular rivalry upon periodic interruption of stimulus and yields testable predictions for the distribution of perceptual alteration in time.

  18. Locally probing the hidden order in URu2Si2 by impurity doping

    Energy Technology Data Exchange (ETDEWEB)

    Baek, Seung J [Los Alamos National Laboratory; Curro, Nicholas H [Los Alamos National Laboratory; Graf, Matthias J [Los Alamos National Laboratory; Balatsky, Alexander V [Los Alamos National Laboratory; Bauer, Eric C [Los Alamos National Laboratory; Cooley, Jason D [Los Alamos National Laboratory; Smith, James L [Los Alamos National Laboratory

    2008-01-01

    Impurity atoms in materials with strong electron-electron correlations can produce dramatic effects on the ground state electronic configuration. The strongly correlated system URu{sub 2}Si{sub 2} exhibits a broken symmetry ground state whose nature has eluded researchers for more than two decades. Below a transition temperature T{sub 0} {approx} 17.5 K, the electrons condense into a new phase of matter with a symmetry that does not couple to conventional spin or charge probes. The emergence of this hidden order parameter is accompanied by the development of a partial gap in the single particle density of states, which can be detected through measurements of the electronic specific heat. Here we report nuclear magnetic resonance spectra and spin lattice relaxation rates in URu{sub 2}Si{sub 2} doped with Rh impurities. Rh doping suppresses the hidden order and gives rise to local patches of antiferromagnetism, whose states have energies below the hidden order gap and are localized in regions where the hidden order parameter varies spatially. For sufficiently large Rh doping these local states percolate and completely suppress all long-range (hidden and antiferromagnetic) order. These observations of the local impurity states suggest that the hidden order is a spin pairing in the particle-hole channel.

  19. Concepts of formal concept analysis

    Science.gov (United States)

    Žáček, Martin; Homola, Dan; Miarka, Rostislav

    2017-07-01

    The aim of this article is apply of Formal Concept Analysis on concept of world. Formal concept analysis (FCA) as a methodology of data analysis, information management and knowledge representation has potential to be applied to a verity of linguistic problems. FCA is mathematical theory for concepts and concept hierarchies that reflects an understanding of concept. Formal concept analysis explicitly formalizes extension and intension of a concept, their mutual relationships. A distinguishing feature of FCA is an inherent integration of three components of conceptual processing of data and knowledge, namely, the discovery and reasoning with concepts in data, discovery and reasoning with dependencies in data, and visualization of data, concepts, and dependencies with folding/unfolding capabilities.

  20. El Salvador - Formal Technical Education

    Data.gov (United States)

    Millennium Challenge Corporation — With a budget of nearly $20 million, the Formal Technical Education Sub-Activity was designed to strengthen technical and vocational educational institutions in the...

  1. Readings in Formal Epistemology : Sourcebook

    NARCIS (Netherlands)

    Arló-Costa, H.; Hendricks, V.F.; van Benthem, J.

    2016-01-01

    This volume presents 38 classic texts in formal epistemology, and strengthens the ties between research into this area of philosophy and its neighbouring intellectual disciplines. The editors provide introductions to five subsections: Bayesian Epistemology, Belief Change, Decision Theory, Interactiv

  2. Readings in Formal Epistemology: sourcebook

    NARCIS (Netherlands)

    Arló-Costa, H.; Hendricks, V.F.; van Benthem, J.

    2016-01-01

    This volume presents 38 classic texts in formal epistemology, and strengthens the ties between research into this area of philosophy and its neighbouring intellectual disciplines. The editors provide introductions to five subsections: Bayesian Epistemology, Belief Change, Decision Theory, Interactiv

  3. Formal Verification of UML Profil

    DEFF Research Database (Denmark)

    Bhutto, Arifa; Hussain, Dil Muhammad Akbar

    2011-01-01

    The Unified Modeling Language (UML) is based on the Model Driven Development (MDD) approach which capturing the system functionality using the platform-independent model (PMI) and appropriate domain-specific languages. In UML base system notations, structural view is model by the class, components...... and object diagrams and behavioral view model by the activity, use case, state, and sequence diagram. However, UML does not provide the formal syntax, therefore its semantics is not formally definable, so for assure of correctness, we need to incorporate semantic reasoning through verification, specification......, refinement, and incorporate into the development process. Our motivation of research is to make an easy structural view and suggest formal technique/ method which can be best applied or used for the UML based development system. We investigate the tools and methods, which broadly used for the formal...

  4. Formal versus informal small businesses

    African Journals Online (AJOL)

    There is renewed interest in entrepreneurship, business formation and growth. ... acumen, while small formal businesses show higher levels of growth instigated by an ... Small business support strategies should focus on businesses with ...

  5. Exposing the hidden curriculum influencing medical education on the health of Indigenous people in Australia and New Zealand: the role of the Critical Reflection Tool.

    Science.gov (United States)

    Ewen, Shaun; Mazel, Odette; Knoche, Debra

    2012-02-01

    The disparity in health status between Indigenous and non-Indigenous people in Australia and New Zealand is widely known, and efforts to address this through medical education are evidenced by initiatives such as the Committee of Deans of Australian Medical Schools' Indigenous Health Curriculum Framework. These efforts have focused primarily on formal curriculum reform. In this article, the authors discuss the role of the hidden curriculum in influencing the teaching and learning of Indigenous health (i.e., the health of Indigenous people) during medical training and suggest that in order to achieve significant changes in learning outcomes, there needs to be better alignment of the formal and hidden curriculum. They describe the Critical Reflection Tool as a potential resource through which educators might begin to identify the dimensions of their institution's hidden curricula. If used effectively, the process may guide institutions to better equip medical school graduates with the training necessary to advance changes in Indigenous health.

  6. Formalism and functionalism in linguistics.

    Science.gov (United States)

    Newmeyer, Frederick J

    2010-05-01

    Formalism and functionalism in linguistics are often taken to be diametrically opposed approaches. However, close examination of the relevant phenomena reveals that the two are complementary, rather than being irrevocably in opposition to each other. One can be a formal linguist and a functional linguist at the same time, without there being any contradiction. Copyright © 2010 John Wiley & Sons, Ltd. For further resources related to this article, please visit the WIREs website.

  7. Skryté kurikulum vo svetle metodologického holizmu a metodologického individualizmu. / Hidden curriculum in the light of methodological holism and methodological individualism.

    Directory of Open Access Journals (Sweden)

    Lukáš Bomba

    2013-02-01

    Full Text Available The article analyses theoretical and methodological problem of hidden curriculum at school. It compares individualistic and holistic approach in connection to research, measurement and analysis of hidden curriculum. The goal of the study is to present the inconsistency in understanding and explaining the concept of hidden curriculum. The inconsistency is grounded in the absence of paradigmatical background. The theories of hidden curriculum are devided into two groups. The first group is grounded in individualistic approach and the second group is grounded in holistic approach. The examples of empirical studies are used as tools to grasp hidden curriculum at school. The study concludes that the deϐinitions and understanding of the concept of hidden curriculum are logical conclusions of methodologicalapproach and empirical investigation of hidden curriculum in research. The methodological approach and empirical investigation reversely constitute the theory of hidden curriculum. The individualistic paradigm grasps hidden curriculum as a an implicit socialization of a child through the actions of individuals in the school. The holistic paradigm understands hidden curriculum as institutionalized nature of ideology or the tool for reproduction of society.

  8. Evidence Feed Forward Hidden Markov Model: A New Type Of Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Michael Del Rose

    2011-01-01

    Full Text Available The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM, and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important in creating intelligent algorithms for determining human actions based on visual observations. The Evidence Feed Forward Hidden Markov Model is a newly developed algorithm which provides observation to observation linkages. The following research addresses the theory behind Evidence Feed Forward HMMs, provides mathematical proofs of their learning of these parameters to optimize the likelihood of observations with a Evidence Feed Forwards HMM, which is important in all computational intelligence algorithm, and gives comparative examples with standard HMMs in classification of both visual action data and measurement data; thus providing a strong base for Evidence Feed Forward HMMs in classification of many types of problems.

  9. Nonlinear hidden symmetries in General Relativity and String Theory: a matrix generalization of the Ernst potentials

    CERN Document Server

    Barbosa-Cendejas, Nandinii; Kanakoglou, Konstantinos; Paschalis, Joannis E

    2011-01-01

    In this paper we recall a simple formulation of the stationary electrovacuum theory in terms of the famous complex Ernst potentials, a pair of functions which allows one to generate new exact solutions from known ones by means of the so-called nonlinear hidden symmetries of Lie-Backlund type. This formalism turned out to be very useful to perform a complete classification of all 4D solutions which present two spacetime symmetries or possess two Killing vectors. Curiously enough, the Ernst formalism can be extended and applied to stationary General Relativity as well as the effective heterotic string theory reduced down to three spatial dimensions by means of a (real) matrix generalization of the Ernst potentials. Thus, in this theory one can also make use of nonlinear matrix hidden symmetries in order to generate new exact solutions from seed ones. Due to the explicit independence of the matrix Ernst potential formalism of the original theory (prior to dimensional reduction) on the dimension D, in the case wh...

  10. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  11. Probing Hidden Sector Photons through the Higgs Window.

    OpenAIRE

    Ahlers, M.; Jaeckel, J; Redondo, J.; Ringwald, A.

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light...

  12. Formalization of an environmental model using formal concept analysis - FCA

    Science.gov (United States)

    Bourdon-García, Rubén D.; Burgos-Salcedo, Javier D.

    2016-08-01

    Nowadays, there is a huge necessity to generate novel strategies for social-ecological systems analyses for resolving global sustainability problems. This paper has as main purpose the application of the formal concept analysis to formalize the theory of Augusto Ángel Maya, who without a doubt, was one of the most important environmental philosophers in South America; Ángel Maya proposed and established that Ecosystem-Culture relations, instead Human-Nature ones, are determinants in our understanding and management of natural resources. Based on this, a concept lattice, formal concepts, subconcept-superconcept relations, partially ordered sets, supremum and infimum of the lattice and implications between attributes (Duquenne-Guigues base), were determined for the ecosystem-culture relations.

  13. Supersymmetric leptogenesis and light hidden sectors

    CERN Document Server

    Weniger, Christoph

    2010-01-01

    Thermal leptogenesis and supergravity are attractive scenarios for physics beyond the standard model. However, it is well known that the super-weak interaction of the gravitino often leads to problems with primordial nucleosynthesis in the standard scenario of matter parity conserving MSSM + three right-handed neutrinos. We will present and compare two related solutions to these problems: 1) The conflict between BBN and leptogenesis can be avoided in presence of a hidden sector with light supersymmetric particles which open new decay channels for the dangerous long-lived particles. 2) If there is a condensate in the hidden sector, such additional decay channels can be alternatively opened by dynamical breaking of matter parity in the hidden sector.

  14. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  15. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  16. Hidden simplicity of gauge theory amplitudes

    Science.gov (United States)

    Drummond, J. M.

    2010-11-01

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in \\ {N}=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  17. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...

  18. Dark Radiation from a hidden U(1)

    CERN Document Server

    Vogel, Hendrik

    2015-01-01

    We discuss the impact of a hidden sector consisting of Minicharged Particles (MCPs) and massless hidden photons on the expansion history of our Universe. We present parameter scans for the amount of extra relativistic particles (Neff) and the abundance of light nuclei for fermionic MCPs with masses between ~100 keV and 10 GeV and minicharges in the range 10^(-11)-1. Current CMB and BBN data significantly constrain the available parameter space of MCPs. The shown results are a valuable indicator for future experimental searches and are presented in a flexible way so that more accurate results on Neff can be easily interpreted.

  19. Hidden Symmetries, Central Charges and All That

    CERN Document Server

    de Wit, Bernard; Wit, Bernard de; Nicolai, Hermann

    2001-01-01

    In this review we discuss hidden symmetries of toroidal compactifications of eleven-dimensional supergravity. We recall alternative versions of this theory which exhibit traces of the hidden symmetries when still retaining the massive Kaluza-Klein states. We reconsider them in the broader perspective of M-theory which incorporates a more extended variety of BPS states. We also argue for a new geometry that may underly these theories. All our arguments point towards an extension of the number of space-time coordinates beyond eleven.

  20. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  1. Formal Methods: Practice and Experience

    DEFF Research Database (Denmark)

    Woodcock, Jim; Larsen, Peter Gorm; Bicarregui, Juan

    2009-01-01

    Formal methods use mathematical models for analysis and verification at any part of the program life-cycle. We describe the state of the art in the industrial use of formal methods, concentrating on their increasing use at the earlier stages of specification and design. We do this by reporting...... on a new survey of industrial use, comparing the situation in 2009 with the most significant surveys carried out over the last 20 years. We describe some of the highlights of our survey by presenting a series of industrial projects, and we draw some observations from these surveys and records of experience....... Based on this, we discuss the issues surrounding the industrial adoption of formal methods. Finally, we look to the future and describe the development of a Verified Software Repository, part of the worldwide Verified Software Initiative. We introduce the initial projects being used to populate...

  2. Leibniz' First Formalization of Syllogistics

    DEFF Research Database (Denmark)

    Robering, Klaus

    2014-01-01

    In his Dissertatio de Arte Combinatoria from 1666 Leibniz provides a formal presentation of syllogistics within the framework of his general-combinatoric program. He does not set up an axiomatic system for the derivation of all valid syllogistic mode, rather he formulates a set of rules which...... distinguish the valid modes among all possible ones. Leibniz' coding of syllogistic modi by combinations of letters and his distinction between possible and useful ("utiles") modes suggests to reconstruct the characterization of the valid modes as the problem of determining among the possible combination...... of letters just those which belong to the useful, i.e., valid, modes. The set of codes of valid modes turns out to be a so-called "regular" language (in the sense of formal-language-theory). Leibniz' formalization of syllogistics in his Dissertatio thus contains an estimation of the computational complexity...

  3. Formal Women-only Networks

    DEFF Research Database (Denmark)

    Villesèche, Florence; Josserand, Emmanuel

    2017-01-01

    implications: The paper contributes to research showing that the social structure of interactions and context can impact women’s standing in the workplace. Originality/value: The paper sheds light on the under-studied and under-theorised phenomenon of formal women-only business networks. Beyond the individual...... internal and external women-only networks and use the broader social capital and network literature to frame their arguments and develop propositions. Findings: Propositions are developed regarding how both internal and external formal women-only business networks can be of value for members, firms....../organisations and the wider social group of women in business. Research limitations/implications: The authors focus on the distinction between external and internal formal women-only networks while also acknowledging the broader diversity that can characterise such networks. Their review provides the reader with an insight...

  4. On the equivalence between standard and sequentially ordered hidden Markov models

    CERN Document Server

    Chopin, Nicolas

    2012-01-01

    Chopin (2007) introduced a sequentially ordered hidden Markov model, for which states are ordered according to their order of appearance, and claimed that such a model is a re-parametrisation of a standard Markov model. This note gives a formal proof that this equivalence holds in Bayesian terms, as both formulations generate equivalent posterior distributions, but does not hold in Frequentist terms, as both formulations generate incompatible likelihood functions. Perhaps surprisingly, this shows that Bayesian re-parametrisation and Frequentist re-parametrisation are not identical concepts.

  5. Formal Definition of Artificial Intelligence

    OpenAIRE

    Dobrev, Dimiter

    2005-01-01

    * This publication is partially supported by the KT-DigiCult-Bg project. A definition of Artificial Intelligence (AI) was proposed in [1] but this definition was not absolutely formal at least because the word "Human" was used. In this paper we will formalize the definition from [1]. The biggest problem in this definition was that the level of intelligence of AI is compared to the intelligence of a human being. In order to change this we will introduce some parameters to which AI ...

  6. Formal Verification of UML Profil

    DEFF Research Database (Denmark)

    Bhutto, Arifa; Hussain, Dil Muhammad Akbar

    2011-01-01

    The Unified Modeling Language (UML) is based on the Model Driven Development (MDD) approach which capturing the system functionality using the platform-independent model (PMI) and appropriate domain-specific languages. In UML base system notations, structural view is model by the class, components...... and object diagrams and behavioral view model by the activity, use case, state, and sequence diagram. However, UML does not provide the formal syntax, therefore its semantics is not formally definable, so for assure of correctness, we need to incorporate semantic reasoning through verification, specification...

  7. Worldline Formalism and Noncommutative Theories

    CERN Document Server

    Franchino-Viñas, Sebastián A

    2015-01-01

    The objective of this Ph.D. thesis is the implementation of the Worldline Formalism in the frame of Noncommutative Quantum Field Theories. The result is a master formula for the 1-loop effective action that is applied to a number of scalar models -- among them the Grosse-Wulkenhaar model. As a byproduct we find an expression for the small propertime expansion of general nonlocal operators' Heat Kernel. As an introduction, basic notions of spectral functions, Quantum Field Theories --path integrals and renormalization by means of spectral functions-- and the Worldline Formalism for commutative theories are given.

  8. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2015-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  9. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  10. The Corporate Illiterates: The Hidden Illiterates of Silicon Valley.

    Science.gov (United States)

    Chase, Sharon

    1991-01-01

    Describes the writing and business communication problems of college-educated workers in Silicon Valley. Discusses hidden illiterates in the universities and in the workplace. Offers solutions for professors and managers faced with the problem of hidden illiterates. (PRA)

  11. Algorithmic Construction of Local Hidden Variable Models for Entangled Quantum States

    Science.gov (United States)

    Hirsch, Flavien; Quintino, Marco Túlio; Vértesi, Tamás; Pusey, Matthew F.; Brunner, Nicolas

    2016-11-01

    Constructing local hidden variable (LHV) models for entangled quantum states is a fundamental problem, with implications for the foundations of quantum theory and for quantum information processing. It is, however, a challenging problem, as the model should reproduce quantum predictions for all possible local measurements. Here we present a simple method for building LHV models, applicable to any entangled state and considering continuous sets of measurements. This leads to a sequence of tests which, in the limit, fully captures the set of quantum states admitting a LHV model. Similar methods are developed for local hidden state models. We illustrate the practical relevance of these methods with several examples.

  12. Algorithmic Construction of Local Hidden Variable Models for Entangled Quantum States.

    Science.gov (United States)

    Hirsch, Flavien; Quintino, Marco Túlio; Vértesi, Tamás; Pusey, Matthew F; Brunner, Nicolas

    2016-11-04

    Constructing local hidden variable (LHV) models for entangled quantum states is a fundamental problem, with implications for the foundations of quantum theory and for quantum information processing. It is, however, a challenging problem, as the model should reproduce quantum predictions for all possible local measurements. Here we present a simple method for building LHV models, applicable to any entangled state and considering continuous sets of measurements. This leads to a sequence of tests which, in the limit, fully captures the set of quantum states admitting a LHV model. Similar methods are developed for local hidden state models. We illustrate the practical relevance of these methods with several examples.

  13. The Research on Hidden Failures of Civil Aircraft

    Directory of Open Access Journals (Sweden)

    Lin Lie Shu

    2016-01-01

    Full Text Available The hidden failure is often appear on civil aircraft, and it is a big risk for normal safe operation. The reason for this failure is the instability of the resistance of the electrical contact. The study on electrical contact is applied science of the reliability, the contact resistance is an important parameter of the reliability of the electrical contact system. In this paper, It also Produces the latest research results from factors that affect contact resistance and contact resistance microscopic model, and then it produces the method of the calculating and measuring engineering about the contact resistance. Lastly, it is point out the future direction of the electrical contacts.

  14. Hidden Markov Modeling for Weigh-In-Motion Estimation

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Ferragut, Erik M [ORNL; Boone, Shane [ORNL

    2012-01-01

    This paper describes a hidden Markov model to assist in the weight measurement error that arises from complex vehicle oscillations of a system of discrete masses. Present reduction of oscillations is by a smooth, flat, level approach and constant, slow speed in a straight line. The model uses this inherent variability to assist in determining the true total weight and individual axle weights of a vehicle. The weight distribution dynamics of a generic moving vehicle were simulated. The model estimation converged to within 1% of the true mass for simulated data. The computational demands of this method, while much greater than simple averages, took only seconds to run on a desktop computer.

  15. METHODOLOGY FOR DETECTION OF HIDDEN RESERVES OF ENTERPRISE INNOVATION POTENTIAL

    Directory of Open Access Journals (Sweden)

    R. I. Barmutsky

    2010-01-01

    Full Text Available Formation of an enterprise innovation potential requires investments of rather large financial resources, creation of offices and services which are involved in introduction and approbation of state-of-the-art technologies in production process and all these measures are not always properly repaid.Search for efficient production methods, introduction of new technologies which do not presuppose large expenses and intense personnel drawing-away from their direct functional duties are directed on detection and activation of hidden (unused innovation potential at an enterprise.

  16. Design and Implementation of Domain based Semantic Hidden Web Crawler

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Web is a wide term which mainly consists of surface web and hidden web. One can easily access the surface web using traditional web crawlers, but they are not able to crawl the hidden portion of the web. These traditional crawlers retrieve contents from web pages, which are linked by hyperlinks ignoring the information hidden behind form pages, which cannot be extracted using simple hyperlink structure. Thus, they ignore large amount of data hidden behind search forms. This paper emphasizes o...

  17. Revealing hidden antiferromagnetic correlations in doped Hubbard chains via string correlators

    Science.gov (United States)

    Hilker, Timon A.; Salomon, Guillaume; Grusdt, Fabian; Omran, Ahmed; Boll, Martin; Demler, Eugene; Bloch, Immanuel; Gross, Christian

    2017-08-01

    Topological phases, like the Haldane phase in spin-1 chains, defy characterization through local order parameters. Instead, nonlocal string order parameters can be employed to reveal their hidden order. Similar diluted magnetic correlations appear in doped one-dimensional lattice systems owing to the phenomenon of spin-charge separation. Here we report on the direct observation of such hidden magnetic correlations via quantum gas microscopy of hole-doped ultracold Fermi-Hubbard chains. The measurement of nonlocal spin-density correlation functions reveals a hidden finite-range antiferromagnetic order, a direct consequence of spin-charge separation. Our technique, which measures nonlocal order directly, can be readily extended to higher dimensions to study the complex interplay between magnetic order and density fluctuations.

  18. Variational Hidden Conditional Random Fields with Coupled Dirichlet Process Mixtures

    NARCIS (Netherlands)

    Bousmalis, K.; Zafeiriou, S.; Morency, L.P.; Pantic, Maja; Ghahramani, Z.

    2013-01-01

    Hidden Conditional Random Fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An infinite HCRF is an HCRF with a countably infinite number of hidden states, which rids us not only of the necessit

  19. Correlates of formal reasoning: Content and problem effects

    Science.gov (United States)

    Linn, Marcia C.; Pulos, Steven; Gans, Adrienne

    Piaget's structural theory of formal thought suggests that a general construct of formal reasoning exists. The content of the task and type of problem employed are often ignored in Piagetian based studies but are important for generalizing findings to other studies and to educational problems. The study reported here examines content and problem effects of formal thought in 13-year-old adolescents. Specifically, three controlling variables tasks with different content and two question type tests (analysis and controlling questions) were administered to 120 seventh graders. Ability measures and personality dimensions associated with formal reasoning in the literature are used to clarify what formal reasoning is and how content and problem type are involved in formal reasoning. Significant main effects were found for problem and content effects (p = 0.001), and a significant interaction was found between the two (p = 0.001). Across the three tasks general ability, field dependency, and locus of control were consistently and significantly related to the controlling questions. However, only measures of field dependency were related to the analysis questions. Combinations of ability and personality factors were found to be uniquely related to each task, within each question type. Results have implications for a theory of formal thought and the teaching of the controlling variables strategy.

  20. Rational formality of mapping spaces

    CERN Document Server

    Felix, Yves

    2010-01-01

    Let X and Y be finite nilpotent CW complexes with dimension of X less than the connectivity of Y. Generalizing results of Vigu\\'e-Poirrier and Yamaguchi, we prove that the mapping space Map(X,Y) is rationally formal if and only if Y has the rational homotopy type of a finite product of odd dimensional spheres.

  1. The Role of Formal Instruction

    Institute of Scientific and Technical Information of China (English)

    Sun Yu

    2011-01-01

    This paper looks at second language acquisition in a classroom setting. It considers whether formal instruction makes a difference to SLA. This is an important issue, because it address the question of the role played by environmental factors in SLA. It is also an important educational issue, as language pedagogy has traditionally operated on the assumption that grammar can be taught.

  2. Formal systems for persuasion dialogue

    NARCIS (Netherlands)

    Prakken, Henry

    This article reviews formal systems that regulate persuasion dialogues. In such dialogues two or more participants aim to resolve a difference of opinion, each trying to persuade the other participants to adopt their point of view. Systems for persuasion dialogue have found application in various

  3. Formal Theories for Logspace Counting

    CERN Document Server

    Fontes, Lila

    2010-01-01

    We introduce two-sorted theories in the style of Cook and Nguyen for the complexity classes ParityL and DET, whose complete problems include determinants over GF(2) and Z, respectively. The definable functions in these theories are the functions in the corresponding complexity classes; thus each theory formalizes reasoning using concepts from its corresponding complexity class.

  4. Formal-informal economy linkages

    African Journals Online (AJOL)

    Andries du Toit

    poverty research and development of policy in South Africa and conclude the article .... disappear with development and growth, the informal sector has become a growing ...... the history and current challenges facing the economy. .... economy: including the more formal end of the SME”.50 Decent work is also a central.

  5. Formal law and customary change

    NARCIS (Netherlands)

    Cecchi, Francesco; Melesse, Mequanint Biset

    2016-01-01

    Do customary courts strategically adapt arbitration outcomes if they face increased competition by the formal law? Through a lab-in-field experiment with villagers and real customary judges in rural Ethiopia, we show that post-arbitration payouts to agents disfavored by the customary system are d

  6. General Recursion and Formal Topology

    Directory of Open Access Journals (Sweden)

    Silvio Valentini

    2010-12-01

    Full Text Available It is well known that general recursion cannot be expressed within Martin-Loef's type theory and various approaches have been proposed to overcome this problem still maintaining the termination of the computation of the typable terms. In this work we propose a new approach to this problem based on the use of inductively generated formal topologies.

  7. Automatic Testing with Formal Methods

    NARCIS (Netherlands)

    Tretmans, G.J.; Belinfante, Axel

    1999-01-01

    The use of formal system specifications makes it possible to automate the derivation of test cases from specifications. This allows to automate the whole testing process, not only the test execution part of it. This paper presents the state of the art and future perspectives in testing based on

  8. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements

  9. Discovering Hidden Treasures with GPS Technology

    Science.gov (United States)

    Nagel, Paul; Palmer, Roger

    2014-01-01

    "I found it!" Addison proudly proclaimed, as she used an iPhone and Global Positioning System (GPS) software to find the hidden geocache along the riverbank. Others in Lisa Bostick's fourth grade class were jealous, but there would be other geocaches to find. With the excitement of movies like "Pirates of the Caribbean" and…

  10. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover...

  11. Dermatologic hazards from hidden contacts with penicillin

    Energy Technology Data Exchange (ETDEWEB)

    Boonk, W.J.

    1981-01-01

    The unbridled use of penicillin after its discovery by Fleming has resulted in possible hazards to human health due to traces of the drug being present in food and other hidden sources. These hazards may include toxic effects, hypersensitivity reactions and possibly a raising of the frequency and duration of allergy to penicillin.

  12. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements incr

  13. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  14. Hidden Costs and Challenges of Servitization

    DEFF Research Database (Denmark)

    Yang, Yifan; Slepniov, Dmitrij

    of these labels, the potential benefits of servitization are often overshadowed by costs associated with it. By using the cases of Chinese and Danish manufacturing firms, this study takes a closer look at possible hidden costs of servitization and contributes to our understanding of servitization performance...

  15. Research of Relationship between Wealth Hidden abound People and Wealth Hidden abound County%藏富于民与藏富于国的关系研究

    Institute of Scientific and Technical Information of China (English)

    刘盖

    2014-01-01

    藏富于民与藏富于国历来是个争论不休的话题。通过系统阐述藏富于民与藏富于国的理论关系,以及对我国历史的反思,来分析统治阶级实行藏富于民的政策对其统治的影响。由欧美国家的经验、启示,来进一步探求藏富于民与藏富于国的关系。最终得出结论:要想实现藏富于国必须先藏富于民,从而实现国家的长治久安。同时,也为缩小我们国家的贫富差距提出合理性政策建议,通过有效的机制设计,来实现国民财富资源的合理配置。%Wealth hidden abound people and wealth hidden abound county have always been a subject of argument , Through formulating theoretical relationship between wealth hidden abound people and wealth hidden abound county , as well as the history in our country , analyzing the influence that the ruling class take measures to hide wealth abound people to his rule . By the experience and revelation of the European and American countries , to further explore the relationship between wealth hidden abound people and wealth hidden abound county . Eventually come to the conclusion :if achieved the aim of wealth hidden abound county it must wealth hidden abound people firstly , so as to realize the permanent stability of the country . At the same time , it puts forward reasonable policy and suggestions for narrowing the gap between the rich and the poor of our country , through effective mechanism design , and achieves the rational allocation of national wealth of resources .

  16. NA62: Hidden Sector Physics

    CERN Document Server

    Cesarotti, Carissa Joyce

    2016-01-01

    Modern experimental physics is often probing for new physics by either finding deviations from predictions on extremely precise measurements, or by looking for a new signal that cannot be explained with existing models. The NA62 experiment at CERN does the former by measuring the ultra-rare decay $K^+ \\rightarrow \\pi^+ \

  17. Experimental search for hidden photon CDM in the eV mass range with a dish antenna

    Energy Technology Data Exchange (ETDEWEB)

    Suzuki, J.; Horie, T. [Department of Physics, School of Science, The University of Tokyo,7-3-1 Hongo, Bunkyo-ku, Tokyo 113-0033 (Japan); Inoue, Y. [International Center for Elementary Particle Physics, The University of Tokyo,7-3-1 Hongo, Bunkyo-ku, Tokyo 113-0033 (Japan); Minowa, M. [Department of Physics, School of Science, The University of Tokyo,7-3-1 Hongo, Bunkyo-ku, Tokyo 113-0033 (Japan); Research Center for the Early Universe (RESCEU), School of Science,The University of Tokyo,7-3-1 Hongo, Bunkyo-ku, Tokyo 113-0033 (Japan)

    2015-09-15

    A search for hidden photon cold dark matter (HP CDM) using a new technique with a dish antenna is reported. From the result of the measurement, we found no evidence for the existence of HP CDM and set an upper limit on the photon-HP mixing parameter χ of ∼6×10{sup −12} for the hidden photon mass m{sub γ}=3.1±1.2 eV.

  18. Experimental Search for Hidden Photon CDM in the eV mass range with a Dish Antenna

    OpenAIRE

    Suzuki, J; Horie, T.; Inoue, Y.; Minowa, M.

    2015-01-01

    A search for hidden photon cold dark matter (HP CDM) using a new technique with a dish antenna is reported. From the result of the measurement, we found no evidence for the existence of HP CDM and set an upper limit on the photon-HP mixing parameter $\\chi$ of $\\sim 6\\times 10^{-12}$ for the hidden photon mass $m_\\gamma = 3.1 \\pm 1.2$ eV.

  19. Experimental Search for Hidden Photon CDM in the eV mass range with a Dish Antenna

    CERN Document Server

    Suzuki, J; Inoue, Y; Minowa, M

    2015-01-01

    A search for hidden photon cold dark matter (HP CDM) using a new technique with a dish antenna is reported. From the result of the measurement, we found no evidence for the existence of HP CDM and set an upper limit on the photon-HP mixing parameter $\\chi$ of $\\sim 6\\times 10^{-12}$ for the hidden photon mass $m_\\gamma = 3.1 \\pm 1.2$ eV.

  20. Proceedings of the Second NASA Formal Methods Symposium

    Science.gov (United States)

    Munoz, Cesar (Editor)

    2010-01-01

    This publication contains the proceedings of the Second NASA Formal Methods Symposium sponsored by the National Aeronautics and Space Administration and held in Washington D.C. April 13-15, 2010. Topics covered include: Decision Engines for Software Analysis using Satisfiability Modulo Theories Solvers; Verification and Validation of Flight-Critical Systems; Formal Methods at Intel -- An Overview; Automatic Review of Abstract State Machines by Meta Property Verification; Hardware-independent Proofs of Numerical Programs; Slice-based Formal Specification Measures -- Mapping Coupling and Cohesion Measures to Formal Z; How Formal Methods Impels Discovery: A Short History of an Air Traffic Management Project; A Machine-Checked Proof of A State-Space Construction Algorithm; Automated Assume-Guarantee Reasoning for Omega-Regular Systems and Specifications; Modeling Regular Replacement for String Constraint Solving; Using Integer Clocks to Verify the Timing-Sync Sensor Network Protocol; Can Regulatory Bodies Expect Efficient Help from Formal Methods?; Synthesis of Greedy Algorithms Using Dominance Relations; A New Method for Incremental Testing of Finite State Machines; Verification of Faulty Message Passing Systems with Continuous State Space in PVS; Phase Two Feasibility Study for Software Safety Requirements Analysis Using Model Checking; A Prototype Embedding of Bluespec System Verilog in the PVS Theorem Prover; SimCheck: An Expressive Type System for Simulink; Coverage Metrics for Requirements-Based Testing: Evaluation of Effectiveness; Software Model Checking of ARINC-653 Flight Code with MCP; Evaluation of a Guideline by Formal Modelling of Cruise Control System in Event-B; Formal Verification of Large Software Systems; Symbolic Computation of Strongly Connected Components Using Saturation; Towards the Formal Verification of a Distributed Real-Time Automotive System; Slicing AADL Specifications for Model Checking; Model Checking with Edge-valued Decision Diagrams

  1. Criteria of benchmark selection for efficient flexible multibody system formalisms

    Directory of Open Access Journals (Sweden)

    Valášek M.

    2007-10-01

    Full Text Available The paper deals with the selection process of benchmarks for testing and comparing efficient flexible multibody formalisms. The existing benchmarks are briefly summarized. The purposes for benchmark selection are investigated. The result of this analysis is the formulation of the criteria of benchmark selection for flexible multibody formalisms. Based on them the initial set of suitable benchmarks is described. Besides that the evaluation measures are revised and extended.

  2. Water Institutional Reforms in Scotland: Contested Objectives and Hidden Disputes

    Directory of Open Access Journals (Sweden)

    Antonio A.R. Ioris

    2008-10-01

    Full Text Available One fundamental limitation of the contemporary debate over water institutional reforms has been the excessive concentration on scientific assessments and management techniques, with insufficient consideration of the underlying politics of decision-making and socio-economic asymmetries. This article examines the 'sociology of water regulation' to demonstrate how the implementation of the European Water Framework Directive (WFD in Scotland is profoundly influenced by broader political and economic circumstances. The ongoing reforms of regulatory institutions became entangled in the reorganisation of a devolved Scottish Administration in the late 1990s, which has directly influenced the channels of representation and the overall decision-making processes. It is claimed here that, despite a discursive construction around sustainability and public participation, the new institutional landscape has so far failed to improve long-term patterns of water use and conservation. The article also analyses how the exacerbation of the economic dimension of water management has permeated the entire experience, serving as a political filter for the assessment of impacts and formulation of solutions. The ultimate conclusion is that formal changes in the legislation created a positive space for institutional reforms, but the effective improvement of water policy and catchment management has been curtailed by political inertia and the hidden balance of power.

  3. Bardeen variables and hidden gauge symmetries in linearized massive gravity

    CERN Document Server

    Jaccard, Maud; Mitsou, Ermis

    2012-01-01

    We give a detailed discussion of the use of the (3+1) decomposition and of Bardeen's variables in massive gravity linearized over a Minkowski as well as over a de Sitter background. In Minkowski space the Bardeen "potential" \\Phi, that in the massless case is a non-radiative degree of freedom, becomes radiative and describes the helicity-0 component of the massive graviton. Its dynamics is governed by a simple Klein-Gordon action, supplemented by a term (\\Box \\Phi)^2 if we do not make the Fierz-Pauli tuning of the mass term. In de Sitter the identification of the variable that describes the radiative degree of freedom in the scalar sector is more subtle, and even involves expressions non-local in time. The use of this new variable provides a simple and transparent derivation of the Higuchi bound and of the disappearance of the scalar degree of freedom at a special value of $m_g^2/H^2$. The use of this formalism also allows us to uncover the existence of a hidden gauge symmetry of the massive theory, that beco...

  4. Hidden Semi-Markov Models for Predictive Maintenance

    Directory of Open Access Journals (Sweden)

    Francesco Cartella

    2015-01-01

    Full Text Available Realistic predictive maintenance approaches are essential for condition monitoring and predictive maintenance of industrial machines. In this work, we propose Hidden Semi-Markov Models (HSMMs with (i no constraints on the state duration density function and (ii being applied to continuous or discrete observation. To deal with such a type of HSMM, we also propose modifications to the learning, inference, and prediction algorithms. Finally, automatic model selection has been made possible using the Akaike Information Criterion. This paper describes the theoretical formalization of the model as well as several experiments performed on simulated and real data with the aim of methodology validation. In all performed experiments, the model is able to correctly estimate the current state and to effectively predict the time to a predefined event with a low overall average absolute error. As a consequence, its applicability to real world settings can be beneficial, especially where in real time the Remaining Useful Lifetime (RUL of the machine is calculated.

  5. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  6. Algorithmic information theory and the hidden variable question

    Science.gov (United States)

    Fuchs, Christopher

    1992-01-01

    The admissibility of certain nonlocal hidden-variable theories are explained via information theory. Consider a pair of Stern-Gerlach devices with fixed nonparallel orientations that periodically perform spin measurements on identically prepared pairs of electrons in the singlet spin state. Suppose the outcomes are recorded as binary strings l and r (with l sub n and r sub n denoting their n-length prefixes). The hidden-variable theories considered here require that there exists a recursive function which may be used to transform l sub n into r sub n for any n. This note demonstrates that such a theory cannot reproduce all the statistical predictions of quantum mechanics. Specifically, consider an ensemble of outcome pairs (l,r). From the associated probability measure, the Shannon entropies H sub n and H bar sub n for strings l sub n and pairs (l sub n, r sub n) may be formed. It is shown that such a theory requires that the absolute value of H bar sub n - H sub n be bounded - contrasting the quantum mechanical prediction that it grow with n.

  7. Taxation and Societal Development in Nigeria: Tackling Kano’s Hidden Economy

    Directory of Open Access Journals (Sweden)

    Usman Sani Kofar Wambai

    2013-03-01

    Full Text Available This paper looks at taxation as a tool for societal development with a view to assessing the nature and size of Kano’s hidden economy; identify those in the hidden economy; and the appropriate approach to tackling such an economy. The survey method was used to administer questionnaire on 40 respondents to generate data which is measured on a simple majority or percentage of opinions. It was discovered that informality is a self-reported lack of tax compliance in a sample of individuals and businesses who also answered questions on a large set of issues. The study found that more tax compliance is significantly associated with adequate campaign and judicious utilization of tax funds. The paper recommends that the tax base should be expanded in order to bring the hidden economy into the tax net, the tax law shall also be simplified to get rid of ambiguity in the interpretation of its provisions.

  8. Constraints on hidden photons from current and future observations of CMB spectral distortions

    CERN Document Server

    Kunze, Kerstin E

    2015-01-01

    A variety of beyond the standard model scenarios contain very light hidden sector U(1) gauge bosons undergoing kinetic mixing with the photon. The resulting oscillation between ordinary and hidden photons leads to spectral distortions of the cosmic microwave background. We update the bounds on the mixing parameter $\\chi_0$ and the mass of the hidden photon $m_{\\gamma'}$ for future experiments measuring CMB spectral distortions, such as PIXIE and PRISM/COrE. For $10^{-14}\\;{\\rm eV}\\lesssim m_{\\gamma'}\\lesssim 10^{-13}\\;{\\rm eV}$, we find the kinetic mixing angle $\\chi_0$ has to be less than $10^{-8}$ at 95\\% CL. These bounds are more than an order of magnitude stronger than those derived from the COBE/FIRAS data.

  9. Model-Independent Indirect Detection Constraints on Hidden Sector Dark Matter

    CERN Document Server

    Elor, Gilly; Slatyer, Tracy R; Xue, Wei

    2015-01-01

    If dark matter inhabits an expanded "hidden sector", annihilations may proceed through sequential decays or multi-body final states. We map out the potential signals and current constraints on such a framework in indirect searches, using a model-independent setup based on multi-step hierarchical cascade decays. While remaining agnostic to the details of the hidden sector model, our framework captures the generic broadening of the spectrum of secondary particles (photons, neutrinos, e+e- and antiprotons) relative to the case of direct annihilation to Standard Model particles. We explore how indirect constraints on dark matter annihilation limit the parameter space for such cascade/multi-particle decays. We investigate limits from the cosmic microwave background by Planck, the Fermi measurement of photons from the dwarf galaxies, and positron data from AMS-02. The presence of a hidden sector can change the constraints on the dark matter annihilation cross section by up to an order of magnitude in either directi...

  10. A Search for Hidden Photon CDM in a Multi-Cathode Counter (MCC) data

    CERN Document Server

    Kopylov, A; Petukhov, V

    2016-01-01

    A search for hidden photon cold dark matter in a mass range from 5 to 500 eV in data collected during 60 days in November and December, 2015 by a Multi-Cathode Counter (MCC) is reported. From the analyses of this data we found no evidence for the existence of HP CDM and set an upper limit on the photon-HP mixing parameter $\\chi$. This is the first result obtained by direct measurements in this mass range for hidden photon CDM using a single electron event in MCC as a signature.

  11. A facility to Search for Hidden Particles (SHiP) at the CERN SPS

    OpenAIRE

    SHiP Collaboration; Anelli, M.; Aoki, S.; G. Arduini; J.J. Back; Bagulya, A.; W. Baldini(Sezione INFN di Ferrara, Ferrara, Italy); A. Baranov; Barker, G. J.; Barsuk, S.; Battistin, M.; Bauche, J.; Bay, A.; Bayliss, V; Bellagamba, L.

    2015-01-01

    A new general purpose fixed target facility is proposed at the CERN SPS accelerator which is aimed at exploring the domain of hidden particles and make measurements with tau neutrinos. Hidden particles are predicted by a large number of models beyond the Standard Model. The high intensity of the SPS 400~GeV beam allows probing a wide variety of models containing light long-lived exotic particles with masses below ${\\cal O}$(10)~GeV/c$^2$, including very weakly interacting low-energy SUSY stat...

  12. Contextual approach to quantum formalism

    CERN Document Server

    Khrennikov, Andrei

    2009-01-01

    The aim of this book is to show that the probabilistic formalisms of classical statistical mechanics and quantum mechanics can be unified on the basis of a general contextual probabilistic model. By taking into account the dependence of (classical) probabilities on contexts (i.e. complexes of physical conditions), one can reproduce all distinct features of quantum probabilities such as the interference of probabilities and the violation of Bell’s inequality. Moreover, by starting with a formula for the interference of probabilities (which generalizes the well known classical formula of total probability), one can construct the representation of contextual probabilities by complex probability amplitudes or, in the abstract formalism, by normalized vectors of the complex Hilbert space or its hyperbolic generalization. Thus the Hilbert space representation of probabilities can be naturally derived from classical probabilistic assumptions. An important chapter of the book critically reviews known no-go theorems...

  13. Informal work and formal plans

    DEFF Research Database (Denmark)

    Dalsted, Rikke Juul; Hølge-Hazelton, Bibi; Kousgaard, Marius Brostrøm

    2012-01-01

    trajectories. METHODS AND THEORY: An in-depth case study of patient trajectories at a Danish hospital and surrounding municipality using individual interviews with patients. Theory about trajectory and work by Strauss was included. RESULTS: Patients continuously took initiatives to organize their treatment...... and care. They initiated processes in the trajectories, and acquired information, which they used to form their trajectories. Patients presented problems to the healthcare professionals in order to get proper help when needed. DISCUSSION: Work done by patients was invisible and not perceived as work....... The patients' requests were not sufficiently supported in the professional organisation of work or formal planning. Patients' insertion and use of information in their trajectories challenged professional views and working processes. And the design of the formal pathway models limits the patients' active...

  14. Musical Formalism and Political Performances

    Directory of Open Access Journals (Sweden)

    Jonathan A. Neufeld

    2009-01-01

    Full Text Available Musical formalism, which strictly limits the type of thing any description of the music can tell us, is ill-equipped to account for contemporary performance practice. If performative interpretations are in a position to tell us something about musical works—that is if performance is a kind of description, as Peter Kivy argues—then we have to loosen the restrictions on notions of musical relevance to make sense of performance. I argue that musical formalism, which strictly limits the type of thing any description of the music can tell us, is inconsistent with Kivy's quite compelling account of performance. This shows the difficulty that actual performances pose to overly rigid conceptions of music. Daniel Barenboim's unannounced performance of Wagner in Israel in 2001 shows that the problem of the boundaries of musical relevance is no mere philosophical puzzle. It is a pressing problem in the musical public sphere.

  15. Informal work and formal plans

    DEFF Research Database (Denmark)

    Dalsted, Rikke Juul; Hølge-Hazelton, Bibi; Kousgaard, Marius Brostrøm;

    2012-01-01

    trajectories. METHODS AND THEORY: An in-depth case study of patient trajectories at a Danish hospital and surrounding municipality using individual interviews with patients. Theory about trajectory and work by Strauss was included. RESULTS: Patients continuously took initiatives to organize their treatment...... and care. They initiated processes in the trajectories, and acquired information, which they used to form their trajectories. Patients presented problems to the healthcare professionals in order to get proper help when needed. DISCUSSION: Work done by patients was invisible and not perceived as work....... The patients' requests were not sufficiently supported in the professional organisation of work or formal planning. Patients' insertion and use of information in their trajectories challenged professional views and working processes. And the design of the formal pathway models limits the patients' active...

  16. Formal Institutions and Subjective Well-Being

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Dreher, Axel; Fischer, Justina

    A long tradition in economics explores the association between the quality of formal institutions and economic performance. The literature on the relationship between such institutions and happiness is, however, rather limited. In this paper, we revisit the findings from recent cross-country...... studies on the institutions-happiness association. Our findings suggest that the conclusions reached by previous studies are fairly sensitive to the specific measure of 'happiness' used. In addition, the results indicate that the welfare effects of policies may differ across phases of a country's economic...

  17. Formal Institutions and Subjective Well-Being

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Dreher, Axel; Fischer, Justina

    A long tradition in economics explores the association between the quality of formal institutions and economic performance. The literature on the relationship between such institutions and happiness is, however, rather limited. In this paper, we revisit the findings from recent cross......-country studies on the institutions-happiness association. Our findings suggest that the conclusions reached by previous studies are fairly sensitive to the specific measure of 'happiness' used. In addition, the results indicate that the welfare effects of policies may differ across phases of a country's economic...

  18. Stroh formalism and Rayleigh waves

    CERN Document Server

    Tanuma, Kazumi

    2008-01-01

    Introduces a powerful and elegant mathematical method for the analysis of anisotropic elasticity equationsThe reader can grasp the essentials as quickly as possibleCan be used as a textbook, which presents compactly introduction and applications of the Stroh formalismAppeals to the people not only in mathematics but also in mechanics and engineering sciencePrerequisites are only basic linear algebra, calculus and fundamentals of differential equations

  19. Formal aspects of component software

    OpenAIRE

    Sun, Meng; Schatz, B.

    2014-01-01

    This issue includes extended versions of selected best papers from the 7th International Workshop on Formal Aspects of Component Software (FACS 2010) held in Guimarães, Portugal on October 14–16, 2010. The component-based software development approach has emerged as a promising paradigm to cope with an ever increasing complexity of present-day software solutions by bringing sound production and engineering principles into software engineering. However, many conceptual and technological iss...

  20. Formalizing Arrow’s theorem

    Indian Academy of Sciences (India)

    Freek Wiedijk

    2009-02-01

    A small project in which I encoded a proof of Arrow’s theorem—probably the most famous results in the economics field of social choice theory—in the computer using the Mizar system is presented here. The details of this specific project, as well as the process of formalization (encoding proofs in the computer) in general are discussed.

  1. Formal modelling of cognitive interpretation

    OpenAIRE

    Rukšenas, R.; Curzon, P; Back, J.; Blandford, A.

    2007-01-01

    We formally specify the interpretation stage in a dual state space human-computer interaction cycle. This is done by extending/reorganising our previous cognitive architecture. In particular, we focus on shape related aspects of the interpretation process associated with device input prompts. A cash-point example illustrates our approach. Using the SAL model checking environment, we show how the extended cognitive architecture facilitates detection of prompt-shape induced human error. © Sprin...

  2. Formal Verification under Unknown Constraints

    Institute of Scientific and Technical Information of China (English)

    LI Guang-hui; LI Xiao-wei

    2005-01-01

    We present a formal method of verifying designs with unknown constraints (e. g. , black boxes) using Boolean satisfiability (SAT). This method is based on a new encoding scheme of unknown constraints, and solves the corresponding conjunctive normal form (CNF) formulas. Furthermore, this method can avoid the potential memory explosion, which the binary decision diagram (BDD) based techniques maybe suffer from, thus it has the capacity of verifying large designs. Experimental results demonstrate the efficiency and feasibility of the proposed method.

  3. Formal description of board games

    OpenAIRE

    Nowak, Stanislav

    2011-01-01

    The aim of thesis was to design a mathematical formalism that allows describing and exploring the properties of board games. The work benefits from the findings of automata theory and logic programming. First part of thesis deals with finite automata and their possible applications for the needs of board games. The result is an extension of finite-state automaton covering the specifics of board games called game automaton. Board games are a complex domain hight level tools should be used. Suc...

  4. Formal Modeling of Communication Protocols.

    Science.gov (United States)

    1981-03-01

    problems have been developed. 4 FORMAL MODELING OF COMMUNICATION PROTOCOLS The state machine model is motivated by the observation that protocols may be...simplest types of state machine model because they have only a single state variable (the state) which takes on a relatively small range of values. For...grammar, this correspondence is very apparent. For each state of the state machine model , we define a nonterminal symbol in the grammar. The inputs

  5. Quantum Formalism: Brief Epistemological Considerations

    CERN Document Server

    Lynn, H; Caponigro, Michele; Lynn, Helen

    2006-01-01

    We argue about a conceptual approach to quantum formalism. Starting from philosophical conjectures (Platonism, Idealism and Realism) as basic ontic elements (namely: math world, data world, and state of matter), we will analyze the quantum superposition principle. This analysis bring us to demonstrate that the basic assumptions affect in different ways:(a) the general problem of the information and computability about a system, (b) the nature of the math tool utilized and (c) the correspondent physical reality.

  6. Filsafat Pendidikan dan Hidden Curriculum dalam Perspektif KH. Imam Zarkasyi (1910-1985

    Directory of Open Access Journals (Sweden)

    Abdurrahim Yapono

    2015-11-01

    Full Text Available KH. Imam Zarkasyi (1910-1985 of Gontor Ponorogo East Java along with his two other brothers called Trimurti (the three founders of Pondok Modern Gontor, both KH. Ahmad Sahal (1901-1977 and KH. Zainuddin Fannani (1905- 1967 were the most dedicated figures on the modern Indonesian Islamic boarding schools education system. Kiai Zarkasyi was not only well known in Indonesia but even in the Muslim world. This article attempts to gain a deeper understanding about Zarkasyi’s educational philosophy and his hidden curriculum; and how the patterns of its implementation in the educational system processes thus provides a significant influence on his discipliners, with a qualitative approach in the form of naturalistic phenomenology through literature study and empirical experience as a means of checking the validity of confirmatory data. The findings revealed that all educational activities in Pondok Modern Gontor has governed by a soul by design which maintained formal curriculum (intra-curricular and extra-curricular called written curriculum. On the top of all, the study discoveres the patterns of hidden curriculum applicable as the affect of edicational process under the formal curriculum. It took place in many models such as learning by instruction, learning by doing, and so on. Here, in fact, there is the strength and success of education in dormitories, such as in Pondok Modern Gontor which has a significant direct effect on the students, who in turn has an effect on the nation character building and the religion.

  7. Formal Analysis of Meaning in Natural Languages

    Directory of Open Access Journals (Sweden)

    Ljiljana Saric

    2006-06-01

    Full Text Available Broadly, the subject of this paper is the relation between logic and linguistics. More narrowly, it concentrates on formal semantics. The first part of the text discusses the topics and methods of formal semantics, and the second part the history of formal semantics. Formal semantic analysis has not been widely known and applied in our research community, and formal methods have been applied extremely rarely in linguistic analyses. This is why it is useful to point out the significant achievements of formal semantics. This inspiring interdisciplinary field of research has been successfully connecting research in linguistics, logic and philosophy since the early 1970s.

  8. Hidden penis release: adjunctive suprapubic lipectomy.

    Science.gov (United States)

    Horton, C E; Vorstman, B; Teasley, D; Winslow, B

    1987-08-01

    We believe the hidden penis may be caused and concealed by a prominent suprapubic fat pad in addition to the restrictive fibrous bands of the dartos fascia fixing the shaft of the penis proximally while loose skin folds prolapse distally over the phallus. A penis of inadequate length or appearance may affect body image. Patients with this problem often require psychological support. Hidden penis may be distinguished from micropenis by palpating adequate corpora and showing a stretched penile length within 2 SD of normal. Excision of suprapubic fat with sectioning of the tethering dartos bands will release and increase the length of the penis. Suprapubic fat pad resection may also be helpful to elongate a short penis in cases of adult microphallus, or after partial penectomy because of trauma or cancer. Circumcision is contraindicated.

  9. Laser experiments explore the hidden sector

    CERN Document Server

    Ahlers, M; Jaeckel, J; Redondo, J; Ringwald, A

    2007-01-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses <~0.05 eV, the charge is now restricted to be less than (3-4)x10^(-7) times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background.

  10. Hidden geometric correlations in real multiplex networks

    Science.gov (United States)

    Kleineberg, Kaj-Kolja; Boguñá, Marián; Ángeles Serrano, M.; Papadopoulos, Fragkiskos

    2016-11-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.

  11. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  12. Finite State Transducers Approximating Hidden Markov Models

    CERN Document Server

    Kempe, A

    1999-01-01

    This paper describes the conversion of a Hidden Markov Model into a sequential transducer that closely approximates the behavior of the stochastic model. This transformation is especially advantageous for part-of-speech tagging because the resulting transducer can be composed with other transducers that encode correction rules for the most frequent tagging errors. The speed of tagging is also improved. The described methods have been implemented and successfully tested on six languages.

  13. Hidden symmetries in dilaton-axion gravity

    CERN Document Server

    Kechkin, O V

    1996-01-01

    Four--dimensional Einstein--Maxwell--dilaton--axion system restricted to space--times with one non--null Killing symmetry is formulated as the three--dimensional gravity coupled sigma--model. Several alternative representations are discussed and the associated hidden symmetries are revealed. The action of target space isometries on the initial set of (non--dualized ) variables is found. New mulicenter solutions are obtained via generating technique based on the formulation in terms of the non--dualized variables.

  14. Caldera rim collapse: A hidden volcanic hazard

    OpenAIRE

    Merle, Olivier; Michon, Laurent; Bachèlery, Patrick

    2008-01-01

    International audience; Following the emblematic flank collapse of Mount St Helens in 1981, numerous models of flank sliding have been proposed. These models have allowed to largely improve the understanding of mechanisms involved in such landslides, which represent a tremendous risk for populations living around volcanoes. In this article, a new mode of landslide formation, related to buried calderas, is described. The model emphasizes the paramount importance of the hidden ring fault that, ...

  15. Killing and letting die: hidden value assumptions.

    Science.gov (United States)

    Atkinson, G

    1983-01-01

    In this paper I argue for several related theses: first, that the distinction between killing and letting die, as it is drawn by ordinary persons in ordinary contexts, is more complex than is generally understood; second, that the key feature of this complexity lies in the presence of a hidden normative component in what appears to be a straightforwardly descriptive distinction; and, third, that this complexity renders the killing/letting die distinction an inadequate and hazardous guide for moral reasoning.

  16. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  17. Otoendoscopic treatment of hidden lesions in otomastoiditis

    Institute of Scientific and Technical Information of China (English)

    LIU Yang; SUN Jian-jun; LIN Yong-sheng; ZHAO Dan-heng; ZHAO Jing; LEI Fei

    2010-01-01

    Background Surgical treatments for chronic suppurative and cholesteatoma otitis media have been discussed for several decades, but recurrences still occur because of the complex dissection required and hidden lesions associated with otomastoiditis. This study investigated the technology and strategy behind the use of otoendoscopic-assisted otosurgery.Methods We reported on hidden lesions in 32 ears of patients with otomastoiditis between November 2006 and January 2009. All the patients were treated with the aid of an otoendoscope. The advantages of otoendoscopy, including multi-angle light scattering, aperture illumination, and magnification of the local operative field, were utilized in otologic microsurgery, and otoendoscopic operative techniques were introduced for operative sites such as the epitympanum, aditus of the antrum, facial recess, sinus tympani and the mastoid tip.Results All patients were followed up from 3 months to 2 years after surgery. All patients recovered well within 3 months following surgery, except for one case of epithelialization of the mastoid cavity occurring 6 months after surgery for cholesteatoma on the cerebellar surface and another case with Bezold's abscess, hyperplastic granulation tissue developed at the antrum.Conclusions Otoendoscopy can overcome the technical deficiency of rectilinearity of the visual axis associated with otomicroscopic illumination, which presents a problem when dealing with otomastoiditis lesions in hidden areas. This technique allows such lesions within the complex three-dimensional structure to be visualized and cleaned. Otoendoscopy thus has significant potential for improving the quality of surgery and reducing the risk of postoperative recurrence.

  18. Dark matter in the hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2014-01-01

    The cosmological scenario of the dark matter generated in the hidden gauge theory based on the grand unification is discussed. It is found that the stability of the dark matter halo of our Galaxy and the cosmic ray observation constrain, respectively, the dark matter mass and the unification scale between the standard model and the hidden gauge theory sectors. To obtain a phenomenologically consistent thermal evolution, the entropy of the standard model sector needs to be increased. We therefore propose a scenario where the mini-inflation is induced from the potential coupled to the Standard model sector, in particular the Higgs sector. This scenario makes consistent the current dark matter density as well as the baryon-to-photon ratio for the case of pion dark matter. For the glueball or heavy pion of hidden gauge theory, an additional mini-inflation in the standard model sector before the leptogenesis is required. We also propose the possibility to confirm this scenario by known prospective experimental app...

  19. Modeling Driver Behavior near Intersections in Hidden Markov Model.

    Science.gov (United States)

    Li, Juan; He, Qinglian; Zhou, Hang; Guan, Yunlin; Dai, Wei

    2016-12-21

    Intersections are one of the major locations where safety is a big concern to drivers. Inappropriate driver behaviors in response to frequent changes when approaching intersections often lead to intersection-related crashes or collisions. Thus to better understand driver behaviors at intersections, especially in the dilemma zone, a Hidden Markov Model (HMM) is utilized in this study. With the discrete data processing, the observed dynamic data of vehicles are used for the inference of the Hidden Markov Model. The Baum-Welch (B-W) estimation algorithm is applied to calculate the vehicle state transition probability matrix and the observation probability matrix. When combined with the Forward algorithm, the most likely state of the driver can be obtained. Thus the model can be used to measure the stability and risk of driver behavior. It is found that drivers' behaviors in the dilemma zone are of lower stability and higher risk compared with those in other regions around intersections. In addition to the B-W estimation algorithm, the Viterbi Algorithm is utilized to predict the potential dangers of vehicles. The results can be applied to driving assistance systems to warn drivers to avoid possible accidents.

  20. Searching hidden-sector photons inside a superconducting box

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-06-15

    We propose an experiment to search for extra ''hidden-sector'' U(1) gauge bosons with gauge kinetic mixing with the ordinary photon, predicted by many extensions of the Standard Model. The setup consists of a highly sensitive magnetometer inside a superconducting shielding. This is then placed inside a strong (but sub-critical) magnetic field. In ordinary electrodynamics the magnetic field cannot permeate the superconductor and no field should register on the magnetometer. However, photon - hidden-sector photon - photon oscillations would allow to penetrate the superconductor and the magnetic field would ''leak'' into the shielded volume and register on the magnetometer. Although this setup resembles a classic ''light shining though a wall experiment'' there are two crucial differences. First, the fields are (nearly) static and the photons involved are virtual. Second, the magnetometer directly measures the field-strength and not a probability. This improves the dependence of the signal on the kinetic mixing {chi}<<1 to {chi}{sup 2} instead of {chi}{sup 4}. In the mass range 2 {mu}eV

  1. The Hidden Subgroup Problem in Affine Groups Basis Selection in Fourier Sampling

    CERN Document Server

    Moore, Cristopher; Russell, A; Schulman, L; Moore, Cristopher; Rockmore, Daniel; Russell, Alexander; Schulman, Leonard

    2002-01-01

    Some quantum algorithms, including Shor's celebrated factoring and discrete log algorithms, proceed by reduction to a hidden subgroup problem, in which a subgroup H of a group G must be determined from a quantum state uniformly supported on a left coset of H. These hidden subgroup problems are then solved by Fourier sampling: the quantum Fourier transform of the state is computed and measured. When the underlying group is non-Abelian, two important variants of the Fourier sampling paradigm have been identified: the weak standard method, where only representation names are measured, and the strong standard method, where full measurement occurs. It has remained open whether the strong standard method is indeed stronger, that is, whether there are hidden subgroups which can be reconstructed via the strong method by not by the weak, or any other known, method. In this article, we settle this question in the affirmative. We show that hidden subgroups of semidirect products of Z/p by Z/q, where q | (p-1) and q >= p...

  2. Formal Inspection: A Tool for TQM

    Science.gov (United States)

    Welz, L.; Kelly, J.

    1995-01-01

    The goal of the Formal Inspection Program at the Jet Propulsion Laboratory (JPL) is to support projects wishing to use Formal Inspections to improve the quality of software and system level engineering products.

  3. Hidden geometry of traffic jamming

    Science.gov (United States)

    Andjelković, Miroslav; Gupte, Neelima; Tadić, Bosiljka

    2015-05-01

    We introduce an approach based on algebraic topological methods that allow an accurate characterization of jamming in dynamical systems with queues. As a prototype system, we analyze the traffic of information packets with navigation and queuing at nodes on a network substrate in distinct dynamical regimes. A temporal sequence of traffic density fluctuations is mapped onto a mathematical graph in which each vertex denotes one dynamical state of the system. The coupling complexity between these states is revealed by classifying agglomerates of high-dimensional cliques that are intermingled at different topological levels and quantified by a set of geometrical and entropy measures. The free-flow, jamming, and congested traffic regimes result in graphs of different structure, while the largest geometrical complexity and minimum entropy mark the edge of the jamming region.

  4. The formal de Rham complex

    Science.gov (United States)

    Zharinov, V. V.

    2013-02-01

    We propose a formal construction generalizing the classic de Rham complex to a wide class of models in mathematical physics and analysis. The presentation is divided into a sequence of definitions and elementary, easily verified statements; proofs are therefore given only in the key case. Linear operations are everywhere performed over a fixed number field {F} = {R},{C}. All linear spaces, algebras, and modules, although not stipulated explicitly, are by definition or by construction endowed with natural locally convex topologies, and their morphisms are continuous.

  5. Teleparallel formalism of galilean gravity

    CERN Document Server

    Ulhoa, S C; Santana, A E

    2011-01-01

    A pseudo-Riemannian manifold is introduced, with light-cone coordinates in (4+1) dimensional space-time, to describe a Galilei covariant gravity. The notion of 5-bein and torsion are developed and a galilean version of teleparallelism is constructed in this manifold. The formalism is applied to two spherically symmetric configurations. The first one is an ansatz which is inferred by following the Schwarzschild solution in general relativity. The second one is a solution of galilean covariant equations. In addition, this Galilei teleparallel approach provides a prescription to couple the 5-bein field to the galilean covariant Dirac field.

  6. The Bondi-Sachs Formalism

    CERN Document Server

    Mädler, Thomas

    2016-01-01

    The Bondi-Sachs formalism of General Relativity is a metric-based treatment of the Einstein equations in which the coordinates are adapted to the null geodesics of the spacetime. It provided the first convincing evidence that gravitational radiation is a nonlinear effect of general relativity and that the emission of gravitational waves from an isolated system is accompanied by a mass loss from the system. The asymptotic behaviour of the Bondi-Sachs metric revealed the existence of the symmetry group at null infinity, the Bondi-Metzner-Sachs group, which turned out to be larger than the Poincare group.

  7. Formal Institutions and Subjective Wellbeing

    DEFF Research Database (Denmark)

    Bjørnskov, Christian; Dreher, Axel; Fischer, Justina A.V.

    2010-01-01

    A long tradition in economics explores the association between the quality of formal institutions and economic performance. The literature on the relationship between such institutions and happiness is, however, rather limited, and inconclusive. In this paper, we revisit the findings from recent....... Separating different types of institutional quality, we find that in low-income countries the effects of economic-judicial institutions on happiness dominate those of political institutions, while analyses restricted to middle- and high-income countries show strong support for an additional beneficial effect...

  8. Knowledge formalization of intelligent building

    Science.gov (United States)

    Žáček, Martin

    2016-06-01

    This article aim is understanding the basic knowledge about an intelligent building. The notion of the intelligent building can be called any building equipped with computer and communication technology, which can automatically respond to internal or external stimuli. The result of the intelligent building is an automated and foreseeing of activities that enable to reduce operating costs and increase comfort. The best way to use the intelligent building is for a low-energy building, a passive building, or for building with high savings. The output of this article is the formalization of basic knowledge of the intelligent building by RDF graph.

  9. On Vasyliunas's equivalent conductivity formalism

    Science.gov (United States)

    Pontius, D. H., Jr.

    1992-01-01

    The Vasyliunas's (1972) equivalent conductivity formalism (ECF) for representing the coupling of the ionosphere and the magnetosphere is discussed, and a new, simpler, derivation is presented of the ECF, in which certain of the underlying assumptions and their implications are made transparent. The derivation presented indicates that the only role of the ions in the ECF is to insure quasi-neutrality. It is shown that the ECF is not as robust as usually assumed and that caution must be used to insure that reasonable results are obtained.

  10. Formal analysis of design process dynamics

    NARCIS (Netherlands)

    Bosse, T.; Jonker, C.M.; Treur, J.

    2010-01-01

    This paper presents a formal analysis of design process dynamics. Such a formal analysis is a prerequisite to come to a formal theory of design and for the development of automated support for the dynamics of design processes. The analysis was geared toward the identification of dynamic design

  11. Fuzzy Set Approximations in Fuzzy Formal Contexts

    Institute of Scientific and Technical Information of China (English)

    Mingwen Shao; Shiqing Fan

    2006-01-01

    In this paper, a kind of multi-level formal concept is introduced. Based on the proposed multi-level formal concept, we present a pair of rough fuzzy set approximations within fuzzy formal contexts. By the proposed rough fuzzy set approximations, we can approximate a fuzzy set according to different precision level. We discuss the properties of the proposed approximation operators in detail.

  12. Formalizing the concept phase of product development

    NARCIS (Netherlands)

    Schuts, M.; Hooman, J.

    2015-01-01

    We discuss the use of formal techniques to improve the concept phase of product realisation. As an industrial application, a new concept of interventional X-ray systems has been formalized, using model checking techniques and the simulation of formal models. cop. Springer International Publishing Sw

  13. Formal analysis of design process dynamics

    NARCIS (Netherlands)

    Bosse, T.; Jonker, C.M.; Treur, J.

    2010-01-01

    This paper presents a formal analysis of design process dynamics. Such a formal analysis is a prerequisite to come to a formal theory of design and for the development of automated support for the dynamics of design processes. The analysis was geared toward the identification of dynamic design prope

  14. Hidden laser communications through matter. An application of meV-scale hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-04-15

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  15. Formal Proofs for Nonlinear Optimization

    Directory of Open Access Journals (Sweden)

    Victor Magron

    2015-01-01

    Full Text Available We present a formally verified global optimization framework. Given a semialgebraic or transcendental function f and a compact semialgebraic domain K, we use the nonlinear maxplus template approximation algorithm to provide a certified lower bound of f over K.This method allows to bound in a modular way some of the constituents of f by suprema of quadratic forms with a well chosen curvature. Thus, we reduce the initial goal to a hierarchy of semialgebraic optimization problems, solved by sums of squares relaxations. Our implementation tool interleaves  semialgebraic approximations with sums of squares witnesses to form certificates. It is interfaced with Coq and thus benefits from the trusted arithmetic available inside the proof assistant. This feature is used to produce, from the certificates, both valid underestimators and lower bounds for each approximated constituent.The application range for such a tool is widespread; for instance Hales' proof of Kepler's conjecture yields thousands of multivariate transcendental inequalities. We illustrate the performance of our formal framework on some of these inequalities as well as on examples from the global optimization literature.

  16. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  17. Extended Friedberg-Lee hidden symmetries, quark masses, and CP violation with four generations

    Science.gov (United States)

    Bar-Shalom, Shaouly; Oaknin, David; Soni, Amarjit

    2009-07-01

    Motivated in part by the several observed anomalies involving CP asymmetries of B and Bs decays, we consider the standard model with a 4th sequential family (SM4) which seems to offer a rather simple resolution. We initially assume T-invariance by taking the up and down-quark 4×4 mass matrix to be real. Following Friedberg and Lee (FL), we then impose a hidden symmetry on the unobserved (hidden) up and down-quark SU(2) states. The hidden symmetry for four generations ensures the existence of two zero-mass eigenstates, which we take to be the (u,c) and (d,s) states in the up and down-quark sectors, respectively. Then, we simultaneously break T-invariance and the hidden symmetry by introducing two phase factors in each sector. This breaking mechanism generates the small quark masses mu, mc and md, ms, which, along with the orientation of the hidden symmetry, determine the size of CP-violation in the SM4. For illustration we choose a specific physical picture for the hidden symmetry and the breaking mechanism that reproduces the observed quark masses, mixing angles and CP-violation, and at the same time allows us to further obtain very interesting relations/predictions for the mixing angles of t and t'. For example, with this choice we get Vtd˜(Vcb/Vcd-Vts/Vus)+O(λ2) and Vt'b˜Vt'd·(Vcb/Vcd), Vtb'˜Vt'd·(Vts/Vus), implying that Vt'd>Vt'b, Vtb'. We furthermore find that the Cabibbo angle is related to the orientation of the hidden symmetry and that the key CP-violating quantity of our model at high energies, JSM4≡Im(VtbVt'b⋆Vt'b'Vtb'⋆), which is the high-energy analogue of the Jarlskog invariant of the SM, is proportional to the light-quark masses and the measured Cabibbo-Kobayashi-Maskawa quark-mixing matrix angles: |JSM4|˜A3λ5×(mu/mt+mc/mt'-md/mb+ms/mb')˜10-5, where Ã0.81 and λ=0.2257 are the Wolfenstein parameters. Other choices for the orientation of the hidden symmetry and/or the breaking mechanism may lead to different physical outcomes. A

  18. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  19. Hidden History: A Mobile Application for Discovering Surrounding Landscapes

    OpenAIRE

    2016-01-01

    This thesis work describes the design, development and evaluation of a mobile application called Hidden History. This application lets users discover and explore three types of landscapes (Historic, Scenic and Cultural) using three different modes of discovery (Route, Explore and Tour). Before designing Hidden History, the feature set of other applications that help users explore surrounding landscapes were identified and analyzed. Hidden History was then designed to implement the best fea...

  20. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  1. ADAPTIVE LEARNING OF HIDDEN MARKOV MODELS FOR EMOTIONAL SPEECH

    Directory of Open Access Journals (Sweden)

    A. V. Tkachenia

    2014-01-01

    Full Text Available An on-line unsupervised algorithm for estimating the hidden Markov models (HMM parame-ters is presented. The problem of hidden Markov models adaptation to emotional speech is solved. To increase the reliability of estimated HMM parameters, a mechanism of forgetting and updating is proposed. A functional block diagram of the hidden Markov models adaptation algorithm is also provided with obtained results, which improve the efficiency of emotional speech recognition.

  2. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  3. A mathematical formalism for hyperspectral, multipoint plastic scintillation detectors.

    Science.gov (United States)

    Archambault, Louis; Therriault-Proulx, François; Beddar, Sam; Beaulieu, Luc

    2012-11-07

    The aim of this paper is to generalize and extend the mathematical formalism used with plastic scintillation detectors (PSDs). By doing so, we show the feasibility of multi-point PSD. The new formalism is based on the sole hypothesis that a PSD optical signal is a linear superposition of spectra. Two calibration scenarios were developed. Both involve solving a linear equation of the form Y = XB, but the process and input data depend on the information available on the detector system. Simulations were carried out to validate both scenarios and demonstrate the advantages of the new formalism. In this paper, we prove the following results. (1) Multi-point PSDs are feasible. Simulations have shown that six different spectra could be resolved accurately even in the presence of up to 10% Gaussian noise. (2) The new formalism leads to more precise PSD measurements. (3) By using the condition number of the measurement matrix, the ideal sets of calibration measurements can be identified. (4) By using principal component analysis it was possible to identify the best set of wavelength filters. We have shown through numerical simulations that multi-point detectors are feasible. This has potential for applications such as in vivo dose verification. Furthermore, our new formalism can be used to improve the robustness and ease of use of PSDs.

  4. Formal Methods at Intel - An Overview

    Science.gov (United States)

    Harrison, John

    2010-01-01

    Since the 1990s, Intel has invested heavily in formal methods, which are now deployed in several domains: hardware, software, firmware, protocols etc. Many different formal methods tools and techniques are in active use, including symbolic trajectory evaluation, temporal logic model checking, SMT-style combined decision procedures, and interactive higher-order logic theorem proving. I will try to give a broad overview of some of the formal methods activities taking place at Intel, and describe the challenges of extending formal verification to new areas and of effectively using multiple formal techniques in combination

  5. Formalism and Interpretation in Quantum Theory

    Science.gov (United States)

    Wilce, Alexander

    2010-04-01

    Quantum Mechanics can be viewed as a linear dynamical theory having a familiar mathematical framework but a mysterious probabilistic interpretation, or as a probabilistic theory having a familiar interpretation but a mysterious formal framework. These points of view are usually taken to be somewhat in tension with one another. The first has generated a vast literature aiming at a “realistic” and “collapse-free” interpretation of quantum mechanics that will account for its statistical predictions. The second has generated an at least equally large literature aiming to derive, or at any rate motivate, the formal structure of quantum theory in probabilistically intelligible terms. In this paper I explore, in a preliminary way, the possibility that these two programmes have something to offer one another. In particular, I show that a version of the measurement problem occurs in essentially any non-classical probabilistic theory, and ask to what extent various interpretations of quantum mechanics continue to make sense in such a general setting. I make a start on answering this question in the case of a rudimentary version of the Everett interpretation.

  6. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  7. Critical scaling in hidden state inference for linear Langevin dynamics

    OpenAIRE

    Bravi, Barbara; Sollich, Peter

    2016-01-01

    We consider the problem of inferring the dynamics of unknown (i.e. hidden) nodes from a set of observed trajectories and we study analytically the average prediction error given by the Extended Plefka Expansion applied to it, as presented in [1]. We focus on a stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings in the infinite network size limit. The expected error on the hidden time courses can be found as the equal-time hidden-to-hidden cova...

  8. A Comparison of Participation Patterns in Selected Formal, Non-Formal, and Informal Online Learning Environments

    Science.gov (United States)

    Schwier, Richard A.; Seaton, J. X.

    2013-01-01

    Does learner participation vary depending on the learning context? Are there characteristic features of participation evident in formal, non-formal, and informal online learning environments? Six online learning environments were chosen as epitomes of formal, non-formal, and informal learning contexts and compared. Transcripts of online…

  9. Enhancing System Realisation in Formal Model Development

    DEFF Research Database (Denmark)

    Tran-Jørgensen, Peter Würtz Vinther

    of formal methods tools into the software development life cycle, and which leverage the formal specification in the subsequent validation of the system. The tools developed use a new code generation infrastructure that has been built as part of this PhD project and implemented in the Overture tool...... of the steps involved in realising the formal specification. This PhD dissertation investigates ways to improve the automation of the steps involved in realising and validating a system based on a formal specification. The approach aims to develop properly designed software tools which support the integration......Software for mission-critical systems is sometimes analysed using formal specification to increase the chances of the system behaving as intended. When sufficient insights into the system have been obtained from the formal analysis, the formal specification is realised in the form of a software...

  10. The Relevance of the Preparation Concept in the Interpretation of Quantum Formalism

    CERN Document Server

    Ferrero, M; Salgado, D; Sánchez-Gómez, J L

    2013-01-01

    The preparation procedure, an undefined notion in quantum theory, has not had the relevance that it deserves in the interpretation of quantum mechanical formalism. Here we utilize the concepts of identical and similar preparation procedures to show the conceptual differences and mutual interconnections between the statistical and the conventional interpretation of quantum formalism. Although the statistical understanding, and its final logical consequence, hidden variables theories (this connexion being explained in the text), have a great intuitive appeal due to its fewer ontological difficulties, both recent experimental results and some theoretical developments seem to support an epistemic alternative closer to the conventional one. Nevertheless, we must not rule out the possibility that new theorems or new explanatory principles may modify the reigning supremacy of this interpretation.

  11. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  12. Error statistics of hidden Markov model and hidden Boltzmann model results

    Science.gov (United States)

    Newberg, Lee A

    2009-01-01

    Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results. PMID:19589158

  13. Formal Verification of Continuous Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer

    2012-01-01

    and the verification procedures should be algorithmically synthesizable. Autonomous control plays an important role in many safety-critical systems. This implies that a malfunction in the control system can have catastrophic consequences, e.g., in space applications where a design flaw can result in large economic...... losses. Furthermore, a malfunction in the control system of a surgical robot may cause death of patients. The previous examples involve complex systems that are required to operate according to complex specifications. The systems cannot be formally verified by modern verification techniques, due......The purpose of this thesis is to develop a method for verifying timed temporal properties of continuous dynamical systems, and to develop a method for verifying the safety of an interconnection of continuous systems. The methods must be scalable in the number of continuous variables...

  14. Formal Aspects of Grid Brokering

    Directory of Open Access Journals (Sweden)

    Attila Kertész

    2009-12-01

    Full Text Available Coordination in distributed environments, like Grids, involves selecting the most appropriate services, resources or compositions to carry out the planned activities. Such functionalities appear at various levels of the infrastructure and in various means forming a blurry domain, where it is hard to see how the participating components are related and what their relevant properties are. In this paper we focus on a subset of these problems: resource brokering in Grid middleware. This paper aims at establishing a semantical model for brokering and related activities by defining brokering agents at three levels of the Grid middleware for resource, host and broker selection. The main contribution of this paper is the definition and decomposition of different brokering components in Grids by providing a formal model using Abstract State Machines.

  15. A Formal Calculus for Categories

    DEFF Research Database (Denmark)

    Cáccamo, Mario José

    This dissertation studies the logic underlying category theory. In particular we present a formal calculus for reasoning about universal properties. The aim is to systematise judgements about functoriality and naturality central to categorical reasoning. The calculus is based on a language which...... extends the typed lambda calculus with new binders to represent universal constructions. The types of the languages are interpreted as locally small categories and the expressions represent functors. The logic supports a syntactic treatment of universality and duality. Contravariance requires a definition...... of universality generous enough to deal with functors of mixed variance. Ends generalise limits to cover these kinds of functors and moreover provide the basis for a very convenient algebraic manipulation of expressions. The equational theory of the lambda calculus is extended with new rules for the definitions...

  16. Formal calculus and umbral calculus

    CERN Document Server

    Robinson, Thomas J

    2009-01-01

    In this paper we use the viewpoint of the formal calculus underlying vertex operator algebra theory to study certain aspects of the classical umbral calculus and we introduce and study certain operators generalizing the classical umbral shifts. We begin by calculating the exponential generating function of the higher derivatives of a composite function, following a short, elementary proof which naturally arose as a motivating computation related to a certain crucial "associativity" property of an important class of vertex operator algebras. Very similar (somewhat forgotten) proofs had appeared by the 19-th century, of course without any motivation related to vertex operator algebras. Using this formula, we derive certain results, including especially the calculation of certain adjoint operators, of the classical umbral calculus. This is, roughly speaking, a reversal of the logical development of some standard treatments, which have obtained formulas for the higher derivatives of a composite function, most not...

  17. Formal analysis of electromagnetic optics

    Science.gov (United States)

    Khan-Afshar, Sanaz; Hasan, Osman; Tahar, Sofiène

    2014-09-01

    Optical systems are increasingly being used in safety-critical applications. Due to the complexity and sensitivity of optical systems, their verification raises many challenges for engineers. Traditionally, the analysis of such systems has been carried out by paper-and-pencil based proofs and numerical computations. However, these techniques cannot provide accurate results due to the risk of human error and inherent approximations of numerical algorithms. In order to overcome these limitations, we propose to use theorem proving (i.e., a computer-based technique that allows to express mathematical expressions and reason about their correctness by taking into account all the details of mathematical reasoning) as a complementary approach to improve optical system analysis. This paper provides a higher-order logic (a language used to express mathematical theories) formalization of electromagnetic optics in the HOL Light theorem prover. In order to demonstrate the practical effectiveness of our approach, we present the analysis of resonant cavity enhanced photonic devices.

  18. Informal work and formal plans

    DEFF Research Database (Denmark)

    Dalsted, Rikke Juul; Hølge-Hazelton, Bibi; Kousgaard, Marius Brostrøm

    2012-01-01

    INTRODUCTION: Formal pathways models outline that patients should receive information in order to experience a coherent journey but do not describe an active role for patients or their relatives. The aim of this is paper is to articulate and discuss the active role of patients during their cancer...... trajectories. METHODS AND THEORY: An in-depth case study of patient trajectories at a Danish hospital and surrounding municipality using individual interviews with patients. Theory about trajectory and work by Strauss was included. RESULTS: Patients continuously took initiatives to organize their treatment...... and care. They initiated processes in the trajectories, and acquired information, which they used to form their trajectories. Patients presented problems to the healthcare professionals in order to get proper help when needed. DISCUSSION: Work done by patients was invisible and not perceived as work...

  19. UML-ising formal techniques

    DEFF Research Database (Denmark)

    Bjørner, Dines; George, Chris W.; Haxthausen, Anne Elisabeth

    2004-01-01

    these different UML views are unified, integrated, correlated or merely co-located is for others to dispute. We also seek to support multiple views, but are also in no doubt that there must be sound, well defined relations between such views. We thus report on ways and means of integrating formal techniques...... Modeling Language [10,67,36,20] has caused, for one reason or another, the research community to try formalise one or another facet of UML. In this paper we report on another way to achieve what UML attempts to achieve: Broadness of application, convenience of notation, and multiplicity of views. Whether...... techniques, one that can be believably deployed for as wide a spectrum, or even a wider spectrum of software (and hardware) development, as, respectively than UML....

  20. Formal Aspects of Grid Brokering

    CERN Document Server

    Kertész, Attila; 10.4204/EPTCS.14.2

    2009-01-01

    Coordination in distributed environments, like Grids, involves selecting the most appropriate services, resources or compositions to carry out the planned activities. Such functionalities appear at various levels of the infrastructure and in various means forming a blurry domain, where it is hard to see how the participating components are related and what their relevant properties are. In this paper we focus on a subset of these problems: resource brokering in Grid middleware. This paper aims at establishing a semantical model for brokering and related activities by defining brokering agents at three levels of the Grid middleware for resource, host and broker selection. The main contribution of this paper is the definition and decomposition of different brokering components in Grids by providing a formal model using Abstract State Machines.

  1. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  2. OFDM System Channel Estimation with Hidden Pilot

    Institute of Scientific and Technical Information of China (English)

    YANG Feng; LIN Cheng-yu; ZHANG Wen-jun

    2007-01-01

    Channel estimation using pilot is common used in OFDM system. The pilot is usually time division multiplexed with the informative sequence. One of the main drawbacks is bandwidth losing. In this paper, a new method was proposed to perform channel estimation in OFDM system. The pilot is arithmetically added to the output of OFDM modulator. Receiver uses the hidden pilot to get an accurate estimation of the channel. Then pilot is removed after channel estimation. The Cramer-Rao lower bound for this method was deprived. The performance of the algorithm is then shown. Compared with traditional methods, the proposed algorithm increases the bandwidth efficiency dramatically.

  3. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  4. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  5. Scaling dimensions in hidden Kerr/CFT

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2011-01-01

    It has been proposed that a hidden conformal field theory (CFT) governs the dynamics of low frequency scattering in a general Kerr black hole background. We further investigate this correspondence by mapping higher order corrections to the massless wave equations in a Kerr background to an expansion within the CFT in terms of higher dimension operators. This implies the presence of infinite towers of CFT primary operators with positive conformal dimensions compatible with unitarity. The exact Kerr background softly breaks the conformal symmetry and the scaling dimensions of these operators run with frequency. The scale-invariant fixed point is dual to a degenerate case of flat spacetime.

  6. Hidden Kerr/CFT at finite frequencies

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2013-01-01

    Massless fields propagating in a generic Kerr black hole background enjoy a hidden SL(2,R)xSL(2,R) symmetry. We determine how the exact mode functions decompose into representations of this symmetry group. This extends earlier results on the low frequency limit of the massless scalar case to finite frequencies and general spin. As an application, we numerically determine the parameters of the representations that appear in quasinormal modes. These results represent a first step to formulating a more precise mapping to a holographic dual conformal field theory for generic black holes.

  7. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  8. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  9. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  10. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  11. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The locations of the breaks are subsequently obtained by assigning states to data points according to the Maximum Posterior Mode (MPM) algorithm. The Integrated Classification Likelihood-Bayesian Information Criterion (ICL-BIC) allows for the determination of the number of regimes by taking into account...... in the monetary policy of United States, the dierent functional form being variants of the Taylor (1993) rule....

  12. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  13. Contextualizing Concepts using a Mathematical Generalization of the Quantum Formalism

    CERN Document Server

    Gabora, L; Gabora, Liane; Aerts, Diederik

    2002-01-01

    We outline the rationale and preliminary results of using the State Context Property (SCOP) formalism, originally developed as a generalization of quantum mechanics, to describe the contextual manner in which concepts are evoked, used, and combined to generate meaning. The quantum formalism was developed to cope with problems arising in the description of (1) the measurement process, and (2) the generation of new states with new properties when particles become entangled. Similar problems arising with concepts motivated the formal treatment introduced here. Concepts are viewed not as fixed representations, but entities existing in states of potentiality that require interaction with a context--a stimulus or another concept--to 'collapse' to an instantiated form (e.g. exemplar, prototype, or other possibly imaginary instance). The stimulus situation plays the role of the measurement in physics, acting as context that induces a change of the cognitive state from superposition state to collapsed state. The colla...

  14. A first study of Hidden Valley models at the LHC

    CERN Document Server

    Seth, Morgan Svensson

    2011-01-01

    New stable particles with fairly low masses could exist if the coupling to the Standard Model is weak, and with suitable parameters they might be possible to produce at the LHC. Here we study a selection of models with the new particles being charged under a new gauge group, either U(1) or SU(N). In the Abelian case there will be radiation of gammavs, which decay back into the SM. In the non-Abelian case the particles will undergo hadronization into mesons like states piv/rhov that subsequently decays. We consider three different scenarios for interaction between the new sector and the SM sector and perform simulations using a Hidden Valley model previously implemented in PYTHIA. In this study we illustrate how one can distinguish the different models and measure different parameters of the models under conditions like those at the LHC.

  15. Shadow networks: Discovering hidden nodes with models of information flow

    CERN Document Server

    Bagrow, James P; Frank, Morgan R; Manukyan, Narine; Mitchell, Lewis; Reagan, Andrew; Bloedorn, Eric E; Booker, Lashon B; Branting, Luther K; Smith, Michael J; Tivnan, Brian F; Danforth, Christopher M; Dodds, Peter S; Bongard, Joshua C

    2013-01-01

    Complex, dynamic networks underlie many systems, and understanding these networks is the concern of a great span of important scientific and engineering problems. Quantitative description is crucial for this understanding yet, due to a range of measurement problems, many real network datasets are incomplete. Here we explore how accidentally missing or deliberately hidden nodes may be detected in networks by the effect of their absence on predictions of the speed with which information flows through the network. We use Symbolic Regression (SR) to learn models relating information flow to network topology. These models show localized, systematic, and non-random discrepancies when applied to test networks with intentionally masked nodes, demonstrating the ability to detect the presence of missing nodes and where in the network those nodes are likely to reside.

  16. Hidden blood loss after surgery for hip fracture

    DEFF Research Database (Denmark)

    Foss, Nicolai Bang; Kehlet, H

    2006-01-01

    with aspirin, intra-operative hypotension and gastro-intestinal bleeding or ulceration were all independent predictors of blood loss. We conclude that total blood loss after surgery for hip fracture is much greater than that observed intra-operatively. Frequent post-operative measurements of haemoglobin......Our aim was to determine the total blood loss associated with surgery for fracture of the hip and to identify risk factors for increased blood loss. We prospectively studied 546 patients with hip fracture. The total blood loss was calculated on the basis of the haemoglobin difference, the number...... of transfusions and the estimated blood volume. The hidden blood loss, in excess of that observed during surgery, varied from 547 ml (screws/ pins) to 1473 ml (intramedullary hip nail and screw) and was significantly associated with medical complications and increased hospital stay. The type of surgery, treatment...

  17. New Experimental Limit on Photon Hidden-Sector Paraphoton Mixing

    CERN Document Server

    Afanasev, A; Beard, K B; Biallas, G; Boyce, J; Minarni, M; Ramdon, R; Shinn, M; Slocum, P

    2008-01-01

    We report on the first results of a search for optical-wavelength photons mixing with hypothetical hidden-sector paraphotons in the mass range between 10^-5 and 10^-2 electron volts for a mixing parameter greater than 10^-7. This was a generation-regeneration experiment using the "light shining through a wall" technique in which regenerated photons are searched for downstream of an optical barrier that separates it from an upstream generation region. The new limits presented here are approximately three times more sensitive to this mixing than the best previous measurement. The present results indicate no evidence for photon-paraphoton mixing for the range of parameters investigated.

  18. Hidden blood loss after surgery for hip fracture

    DEFF Research Database (Denmark)

    Foss, N B; Kehlet, H

    2006-01-01

    Our aim was to determine the total blood loss associated with surgery for fracture of the hip and to identify risk factors for increased blood loss. We prospectively studied 546 patients with hip fracture. The total blood loss was calculated on the basis of the haemoglobin difference, the number...... of transfusions and the estimated blood volume. The hidden blood loss, in excess of that observed during surgery, varied from 547 ml (screws/ pins) to 1473 ml (intramedullary hip nail and screw) and was significantly associated with medical complications and increased hospital stay. The type of surgery, treatment...... with aspirin, intra-operative hypotension and gastro-intestinal bleeding or ulceration were all independent predictors of blood loss. We conclude that total blood loss after surgery for hip fracture is much greater than that observed intra-operatively. Frequent post-operative measurements of haemoglobin...

  19. The Inter-provincial Transfer of Transportation Hidden Carbon in China’s Provinces

    Science.gov (United States)

    Jiao, Ping; Wang, Jian Wei; Zhang, Shuai

    2017-01-01

    Recognize the characteristics of the inter-provincial transportation hidden carbon transfer scientifically, which is significant to evaluate regional carbon emission correctly and reasonably and make the regional carbon reduction policies. With the China’s interregional input-output tables in 2007 and 2010 years, this paper measures the transportation hidden carbon and researches the features of inter-provincial transportation hidden carbon transfer. The results show that: (1) The Shanxi, Hubei and et al in central-western regions is the major importer of carbon emission, and the Tianjin, Jiangsu, Fujian and et al in eastern regions is the net exporter; (2)The transfer size and density of the eastern, central and western regions present the decreasing tendency. The more advanced the economy, the higher the transportation hidden carbon emission. In China, the Beijing-Tianjin-Hebei Economic Band is the most cohesive region about size and density. As the results, the responsibility of provincial transportation carbon emission should be properly adjusted, and regional linkage carbon emission policies should be implemented.

  20. Model-independent indirect detection constraints on hidden sector dark matter

    Science.gov (United States)

    Elor, Gilly; Rodd, Nicholas L.; Slatyer, Tracy R.; Xue, Wei

    2016-06-01

    If dark matter inhabits an expanded ``hidden sector'', annihilations may proceed through sequential decays or multi-body final states. We map out the potential signals and current constraints on such a framework in indirect searches, using a model-independent setup based on multi-step hierarchical cascade decays. While remaining agnostic to the details of the hidden sector model, our framework captures the generic broadening of the spectrum of secondary particles (photons, neutrinos, e+e- and bar p p) relative to the case of direct annihilation to Standard Model particles. We explore how indirect constraints on dark matter annihilation limit the parameter space for such cascade/multi-particle decays. We investigate limits from the cosmic microwave background by Planck, the Fermi measurement of photons from the dwarf galaxies, and positron data from AMS-02. The presence of a hidden sector can change the constraints on the dark matter by up to an order of magnitude in either direction (although the effect can be much smaller). We find that generally the bound from the Fermi dwarfs is most constraining for annihilations to photon-rich final states, while AMS-02 is most constraining for electron and muon final states; however in certain instances the CMB bounds overtake both, due to their approximate independence on the details of the hidden sector cascade. We provide the full set of cascade spectra considered here as publicly available code with examples at http://web.mit.edu/lns/research/CascadeSpectra.html.

  1. Hidden Sector Dark Matter and the Galactic Center Gamma-Ray Excess: A Closer Look

    Energy Technology Data Exchange (ETDEWEB)

    Escudero, Miguel; Witte, Samuel J.; Hooper, Dan

    2017-09-20

    Stringent constraints from direct detection experiments and the Large Hadron Collider motivate us to consider models in which the dark matter does not directly couple to the Standard Model, but that instead annihilates into hidden sector particles which ultimately decay through small couplings to the Standard Model. We calculate the gamma-ray emission generated within the context of several such hidden sector models, including those in which the hidden sector couples to the Standard Model through the vector portal (kinetic mixing with Standard Model hypercharge), through the Higgs portal (mixing with the Standard Model Higgs boson), or both. In each case, we identify broad regions of parameter space in which the observed spectrum and intensity of the Galactic Center gamma-ray excess can easily be accommodated, while providing an acceptable thermal relic abundance and remaining consistent with all current constraints. We also point out that cosmic-ray antiproton measurements could potentially discriminate some hidden sector models from more conventional dark matter scenarios.

  2. Women's hidden transcripts about abortion in Brazil.

    Science.gov (United States)

    Nations, M K; Misago, C; Fonseca, W; Correia, L L; Campbell, O M

    1997-06-01

    Two folk medical conditions, "delayed" (atrasada) and "suspended" (suspendida) menstruation, are described as perceived by poor Brazilian women in Northeast Brazil. Culturally prescribed methods to "regulate" these conditions and provoke menstrual bleeding are also described, including ingesting herbal remedies, patent drugs, and modern pharmaceuticals. The ingestion of such self-administered remedies is facilitated by the cognitive ambiguity, euphemisms, folklore, etc., which surround conception and gestation. The authors argue that the ethnomedical conditions of "delayed" and "suspended" menstruation and subsequent menstrual regulation are part of the "hidden reproductive transcript" of poor and powerless Brazilian women. Through popular culture, they voice their collective dissent to the official, public opinion about the illegality and immorality of induced abortion and the chronic lack of family planning services in Northeast Brazil. While many health professionals consider women's explanations of menstrual regulation as a "cover-up" for self-induced abortions, such popular justifications may represent either an unconscious or artful manipulation of hegemonic, anti-abortion ideology expressed in prudent, unobtrusive and veiled ways. The development of safer abortion alternatives should consider women's hidden reproductive transcripts.

  3. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  4. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  5. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  6. Quantum Hidden Subgroup Problems A Mathematical Perspective

    CERN Document Server

    Lomonaco, S J; Lomonaco, Samuel J.; Kauffman, Louis H.

    2002-01-01

    The ultimate objective of this paper is to create a stepping stone to the development of new quantum algorithms. The strategy chosen is to begin by focusing on the class of abelian quantum hidden subgroup algorithms, i.e., the class of abelian algorithms of the Shor/Simon genre. Our strategy is to make this class of algorithms as mathematically transparent as possible. By the phrase "mathematically transparent" we mean to expose, to bring to the surface, and to make explicit the concealed mathematical structures that are inherently and fundamentally a part of such algorithms. In so doing, we create symbolic abelian quantum hidden subgroup algorithms that are analogous to the those symbolic algorithms found within such software packages as Axiom, Cayley, Maple, Mathematica, and Magma. As a spin-off of this effort, we create three different generalizations of Shor's quantum factoring algorithm to free abelian groups of finite rank. We refer to these algorithms as wandering (or vintage Z_Q) Shor algorithms. They...

  7. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  8. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  9. Hidden charm molecules in finite volume

    CERN Document Server

    Albaladejo, Miguel; Nieves, Juan; Oset, Eulogio

    2013-01-01

    In the present paper we address the interaction of pairs of charmed mesons with hidden charm in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and from them some synthetic data are generated. These data are then employed to study the inverse problem of getting the energies of the bound states and phase shifts for $D \\bar D$ or $D^* {\\bar D}^*$. Different strategies are investigated using the lowest two levels for different values of the box size, carrying a study of the errors produced. Starting from the upper level, fits to the synthetic data are carried out to determine the scattering length and effective range plus the binding energy of the ground state. A similar strategy using the effective range formula is considered with a simultaneous fit to the two levels, one above and the other one below threshold. This method turns out to be more...

  10. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  11. Bayesian structural inference for hidden processes.

    Science.gov (United States)

    Strelioff, Christopher C; Crutchfield, James P

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ε-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ε-machines, irrespective of estimated transition probabilities. Properties of ε-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  12. The formalization of innovative processes of food technology equipment

    Directory of Open Access Journals (Sweden)

    V. A. Panfilov

    2016-01-01

    Full Text Available Improving the efficiency of scientific and engineering work to develop methods for converting agricultural raw materials into food is the most important condition of output processing and food sectors of agriculture in the sixth technological structure. The purpose of this article is to formalize the process of creating a progressive technique of food technologies. The process of self-organizing technological systems, presents a model of dual mechanism of control with regard to the processes of food technology. It is shown that in the process of adaptation development of the technological system as purposefully improving the structure and functioning of the system: increases the efficiency of interaction with the external environment. This smoothed out the contradictions of the technological system and its the main thing, the main technical contradiction: «productivity – quality». The steps to be taken to ensure that the technological system of conditions for intensive development. It is concluded that the potential development of some technological systems is hidden in the perspective of automation, and others – is associated with adaptive development processes, in particular machines, devices and bioreactors. The paper shows that innovative and truly breakthrough developments leading to the creation of fundamentally new equipment and new generations of technological systems, possible only with the establishment of patterns of organization, structure, functioning and development of open systems, which are modern technologies of agriculture. The mechanism of control of technological object acts as a core of adaptive development, which implements the anti-entropic entity management object, formalizing the innovation process of innovative food processing technologies.

  13. Does formal research training lead to academic success in otolaryngology?

    Science.gov (United States)

    Bobian, Michael R; Shah, Noor; Svider, Peter F; Hong, Robert S; Shkoukani, Mahdi A; Folbe, Adam J; Eloy, Jean Anderson

    2017-01-01

    To evaluate whether formalized research training is associated with higher researcher productivity, academic rank, and acquisition of National Institutes of Health (NIH) grants within academic otolaryngology departments. Each of the 100 civilian otolaryngology program's departmental websites were analyzed to obtain a comprehensive list of faculty members credentials and characteristics, including academic rank, completion of a clinical fellowship, completion of a formal research fellowship, and attainment of a doctorate in philosophy (PhD) degree. We also recorded measures of scholarly impact and successful acquisition of NIH funding. A total of 1,495 academic physicians were included in our study. Of these, 14.1% had formal research training. Bivariate associations showed that formal research training was associated with a greater h-index, increased probability of acquiring NIH funding, and higher academic rank. Using a linear regression model, we found that otolaryngologists possessing a PhD had an associated h-index of 1.8 points higher, and those who completed a formal research fellowship had an h-index of 1.6 points higher. A PhD degree or completion of a research fellowship was not associated with a higher academic rank; however, a higher h-index and previous acquisition of an NIH grant were associated with a higher academic rank. The attainment of NIH funding was three times more likely for those with a formal research fellowship and 8.6 times more likely for otolaryngologists with a PhD degree. Formalized research training is associated with academic success in otolaryngology. Such dedicated research training accompanies greater scholarly impact, acquisition of NIH funding, and a higher academic rank. NA Laryngoscope, 127:E15-E21, 2017. © 2016 The American Laryngological, Rhinological and Otological Society, Inc.

  14. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    Decker, T.; Draisma, J.; Wocjan, P.

    2009-01-01

    We consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be m-variate po

  15. Hidden attractor in the Rabinovich system, Chua circuits and PLL

    Science.gov (United States)

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Seledzhi, S. M.

    2016-06-01

    In this report the existence of hidden attractors in Rabinovich system, phase-locked loop and coupled Chua circuits is considered. It is shown that the existence of hidden attractors may complicate the analysis of the systems and significantly affect the synchronization.

  16. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  17. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in Seuss's…

  18. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  19. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  20. Formalization of Function Matrix Theory in HOL

    Directory of Open Access Journals (Sweden)

    Zhiping Shi

    2014-01-01

    Full Text Available Function matrices, in which elements are functions rather than numbers, are widely used in model analysis of dynamic systems such as control systems and robotics. In safety-critical applications, the dynamic systems are required to be analyzed formally and accurately to ensure their correctness and safeness. Higher-order logic (HOL theorem proving is a promise technique to match the requirement. This paper proposes a higher-order logic formalization of the function vector and the function matrix theories using the HOL theorem prover, including data types, operations, and their properties, and further presents formalization of the differential and integral of function vectors and function matrices. The formalization is implemented as a library in the HOL system. A case study, a formal analysis of differential of quadratic functions, is presented to show the usefulness of the proposed formalization.

  1. Survey of Existing Tools for Formal Verification.

    Energy Technology Data Exchange (ETDEWEB)

    Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.; Jackson, Mayo

    2014-12-01

    Formal methods have come into wide use because of their effectiveness in verifying "safety and security" requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.

  2. Formalization of P Systems by Maude

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Rewriting logic is a unified model of concurrency, which provides a formal common framework of wellknown models of concurrent systems. A new formal method of the specification and execution of P systems using rewriting logic was proposed. The powerful tool Maude 2.0 is used to implement this specification. In order to present the general ideas in a concrete case study, a simple and classical example from the literature is adopted to present how to formally specify and execute a P system.

  3. M-Theory in the Gaugeon Formalism

    Institute of Scientific and Technical Information of China (English)

    Mir Faizal

    2012-01-01

    In this paper we will analyse the Aharony-Bergman-Jafferis-Maldacena (ABJM) theory in N = 1 superspace formalism. We then study the quantum gauge transformations for this ABJM theory in gaugeon formalism. We will also analyse the extended BRST symmetry for this ABJM theory in gaugeon formalism and show that these BRST transformations for this theory are nilpotent and this in turn leads to the unitary evolution of the S-matrix.

  4. NON-FORMAL EDUCATION, OVEREDUCATION AND WAGES

    OpenAIRE

    SANDRA NIETO; RAÚL RAMOS

    2013-01-01

    Why do overeducated workers participate in non-formal education activities? Do not they suffer from an excess of education? Using microdata from the Spanish sample of the 2007 Adult Education Survey, we have found that overeducated workers participate more than the rest in non-formal education and that they earn higher wages than overeducated workers who did not participate. This result can be interpreted as evidence that non-formal education allows overeducated workers to acquire new abiliti...

  5. Introducing Types into Elementary Formal Systems

    OpenAIRE

    Kiwata, Kazuhiro; Arikawa, Setsuo

    1994-01-01

    The elementary formal systems (EFS's for short) work as a theoretical basis in the various fields of computer science such as formal language theory, programming semantics, machine learning and so on. In this paper, we first define proof figures which illustrate proofs of EFS and show standard proof figures for ground atoms which are distinctive in the usage of inference rules. Then we formalize typed EFS, which is a natural extension of EFS obtained by replacing variables by typed variables ...

  6. CYCLIC CODES OVER FORMAL POWER SERIES RINGS

    Institute of Scientific and Technical Information of China (English)

    Dougherty Steven T.; Liu Hongwei

    2011-01-01

    In this article, cyclic codes and negacyclic codes over formal power series rings are studied. The structure of cyclic codes over this class of rings is given, and the relationship between these codes and cyclic codes over finite chain rings is obtained. Using an isomorphism between cyclic and negacyclic codes over formal power series rings, the structure of negacyclic codes over the formal power series rings is obtained.

  7. A robot control formalism based on an information quality concept

    Science.gov (United States)

    Ekman, A.; Torne, A.; Stromberg, D.

    1994-01-01

    A relevance measure based on Jaynes maximum entropy principle is introduced. Information quality is the conjunction of accuracy and relevance. The formalism based on information quality is developed for one-agent applications. The robot requires a well defined working environment where properties of each object must be accurately specified.

  8. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  9. Secluded Dark Matter Coupled to a Hidden CFT

    CERN Document Server

    von Harling, Benedict

    2012-01-01

    Models of secluded dark matter offer a variant on the standard WIMP picture and can modify our expectations for hidden sector phenomenology and detection. In this work we extend a minimal model of secluded dark matter, comprised of a U(1)'-charged dark matter candidate, to include a confining hidden-sector CFT. This provides a technically natural explanation for the hierarchically small mediator-scale, with hidden-sector confinement generating m_{gamma'}>0. Furthermore, the thermal history of the universe can differ markedly from the WIMP picture due to (i) new annihilation channels, (ii) a (potentially) large number of hidden-sector degrees of freedom, and (iii) a hidden-sector phase transition at temperatures T << M_{dm} after freeze out. The mediator allows both the dark matter and the Standard Model to communicate with the CFT, thus modifying the low-energy phenomenology and cosmic-ray signals from the secluded sector.

  10. Abelian Hidden Sectors at a GeV

    Energy Technology Data Exchange (ETDEWEB)

    Morrissey, David E.; Poland, David; /Harvard U.; Zurek, Kathryn; /Fermilab /Michigan U.

    2009-04-16

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1){sub x} gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  11. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  12. Gauge Coupling Unification with Hidden Photon, and Minicharged Dark Matter

    CERN Document Server

    Daido, Ryuji; Yokozaki, Norimi

    2016-01-01

    We show that gauge coupling unification is realized with a greater accuracy in the presence of a massless hidden photon which has a large kinetic mixing with hypercharge. We solve the renormalization group equations at two-loop level and find that the GUT unification scale is around $10^{16.5}$ GeV which sufficiently suppresses the proton decay rate, and that the unification depends only on the kinetic mixing, but not on the hidden gauge coupling nor the presence of vector-like matter fields charged under U(1)$_H$ and/or SU(5). Matter fields charged under the unbroken hidden U(1)$_H$ are stable and they contribute to dark matter. Interestingly, they become minicharged dark matter which carries a small but non-zero electric charge, if the hidden gauge coupling is tiny. The minicharged dark matter is a natural outcome of the gauge coupling unification with a hidden photon.

  13. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  14. Anyons in the operational formalism

    Energy Technology Data Exchange (ETDEWEB)

    Neori, Klil H.; Goyal, Philip [University at Albany, SUNY (United States)

    2015-01-13

    The operational formalism to quantum mechanics seeks to base the theory on a firm foundation of physically well-motivated axioms [1]. It has succeeded in deriving the Feynman rules [2] for general quantum systems. Additional elaborations have applied the same logic to the question of identical particles, confirming the so-called Symmetrization Postulate [3]: that the only two options available are fermions and bosons [4, 5]. However, this seems to run counter to results in two-dimensional systems, which allow for anyons, particles with statistics which interpolate between Fermi-Dirac and Bose-Einstein (see [6] for a review). In this talk we will show that the results in two dimensions can be made compatible with the operational results. That is, we will show that anyonic behavior is a result of the topology of the space in two dimensions [7], and does not depend on the particles being identical; but that nevertheless, if the particles are identical, the resulting system is still anyonic.

  15. Universal formalism of Fano resonance

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Liang [School of Physical Science and Technology and Key Laboratory for Magnetism and Magnetic Materials of MOE, Lanzhou University, Lanzhou, Gansu 730000 (China); Lai, Ying-Cheng [School of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, Arizona 85287 (United States); Department of Physics, Arizona State University, Tempe, Arizona 85287 (United States); Institute for Complex Systems and Mathematical Biology, King’s College, University of Aberdeen, Aberdeen AB24 3UE (United Kingdom); Luo, Hong-Gang [School of Physical Science and Technology and Key Laboratory for Magnetism and Magnetic Materials of MOE, Lanzhou University, Lanzhou, Gansu 730000 (China); Beijing Computational Science Research Center, Beijing 100084 (China); Grebogi, Celso [Institute for Complex Systems and Mathematical Biology, King’s College, University of Aberdeen, Aberdeen AB24 3UE (United Kingdom)

    2015-01-15

    The phenomenon of Fano resonance is ubiquitous in a large variety of wave scattering systems, where the resonance profile is typically asymmetric. Whether the parameter characterizing the asymmetry should be complex or real is an issue of great experimental interest. Using coherent quantum transport as a paradigm and taking into account of the collective contribution from all available scattering channels, we derive a universal formula for the Fano-resonance profile. We show that our formula bridges naturally the traditional Fano formulas with complex and real asymmetry parameters, indicating that the two types of formulas are fundamentally equivalent (except for an offset). The connection also reveals a clear footprint for the conductance resonance during a dephasing process. Therefore, the emergence of complex asymmetric parameter when fitting with experimental data needs to be properly interpreted. Furthermore, we have provided a theory for the width of the resonance, which relates explicitly the width to the degree of localization of the close-by eigenstates and the corresponding coupling matrices or the self-energies caused by the leads. Our work not only resolves the issue about the nature of the asymmetry parameter, but also provides deeper physical insights into the origin of Fano resonance. Since the only assumption in our treatment is that the transport can be described by the Green’s function formalism, our results are also valid for broad disciplines including scattering problems of electromagnetic waves, acoustics, and seismology.

  16. Universal formalism of Fano resonance

    Directory of Open Access Journals (Sweden)

    Liang Huang

    2015-01-01

    Full Text Available The phenomenon of Fano resonance is ubiquitous in a large variety of wave scattering systems, where the resonance profile is typically asymmetric. Whether the parameter characterizing the asymmetry should be complex or real is an issue of great experimental interest. Using coherent quantum transport as a paradigm and taking into account of the collective contribution from all available scattering channels, we derive a universal formula for the Fano-resonance profile. We show that our formula bridges naturally the traditional Fano formulas with complex and real asymmetry parameters, indicating that the two types of formulas are fundamentally equivalent (except for an offset. The connection also reveals a clear footprint for the conductance resonance during a dephasing process. Therefore, the emergence of complex asymmetric parameter when fitting with experimental data needs to be properly interpreted. Furthermore, we have provided a theory for the width of the resonance, which relates explicitly the width to the degree of localization of the close-by eigenstates and the corresponding coupling matrices or the self-energies caused by the leads. Our work not only resolves the issue about the nature of the asymmetry parameter, but also provides deeper physical insights into the origin of Fano resonance. Since the only assumption in our treatment is that the transport can be described by the Green’s function formalism, our results are also valid for broad disciplines including scattering problems of electromagnetic waves, acoustics, and seismology.

  17. Formalization of Matrix Theory in HOL4

    Directory of Open Access Journals (Sweden)

    Zhiping Shi

    2014-08-01

    Full Text Available Matrix theory plays an important role in modeling linear systems in engineering and science. To model and analyze the intricate behavior of complex systems, it is imperative to formalize matrix theory in a metalogic setting. This paper presents the higher-order logic (HOL formalization of the vector space and matrix theory in the HOL4 theorem proving system. Formalized theories include formal definitions of real vectors and matrices, algebraic properties, and determinants, which are verified in HOL4. Two case studies, modeling and verifying composite two-port networks and state transfer equations, are presented to demonstrate the applicability and effectiveness of our work.

  18. The Importance of Formalizing Computational Models of Face Adaptation Aftereffects

    Science.gov (United States)

    Ross, David A.; Palmeri, Thomas J.

    2016-01-01

    Face adaptation is widely used as a means to probe the neural representations that support face recognition. While the theories that relate face adaptation to behavioral aftereffects may seem conceptually simple, our work has shown that testing computational instantiations of these theories can lead to unexpected results. Instantiating a model of face adaptation not only requires specifying how faces are represented and how adaptation shapes those representations but also specifying how decisions are made, translating hidden representational states into observed responses. Considering the high-dimensionality of face representations, the parallel activation of multiple representations, and the non-linearity of activation functions and decision mechanisms, intuitions alone are unlikely to succeed. If the goal is to understand mechanism, not simply to examine the boundaries of a behavioral phenomenon or correlate behavior with brain activity, then formal computational modeling must be a component of theory testing. To illustrate, we highlight our recent computational modeling of face adaptation aftereffects and discuss how models can be used to understand the mechanisms by which faces are recognized. PMID:27378960

  19. The hidden X suture: a technical note on a novel suture technique for alveolar ridge preservation

    Science.gov (United States)

    2016-01-01

    Purpose The present study investigated the impact of 2 different suture techniques, the conventional crossed mattress suture (X suture) and the novel hidden X suture, for alveolar ridge preservation (ARP) with an open healing approach. Methods This study was a prospective randomized controlled clinical trial. Fourteen patients requiring extraction of the maxillary or mandibular posterior teeth were enrolled and allocated into 2 groups. After extraction, demineralized bovine bone matrix mixed with 10% collagen (DBBM-C) was grafted and the socket was covered by porcine collagen membrane in a double-layer fashion. No attempt to obtain primary closure was made. The hidden X suture and conventional X suture techniques were performed in the test and control groups, respectively. Cone-beam computed tomographic (CBCT) images were taken immediately after the graft procedure and before implant surgery 4 months later. Additionally, the change in the mucogingival junction (MGJ) position was measured and was compared after extraction, after suturing, and 4 months after the operation. Results All sites healed without any complications. Clinical evaluations showed that the MGJ line shifted to the lingual side immediately after the application of the X suture by 1.56±0.90 mm in the control group, while the application of the hidden X suture rather pushed the MGJ line slightly to the buccal side by 0.25±0.66 mm. It was demonstrated that the amount of keratinized tissue (KT) preserved on the buccal side was significantly greater in the hidden X suture group 4 months after the procedure (Pclinical and radiographic verification of the efficacy of the hidden X suture in preserving the width of KT and the dimensions of the alveolar ridge after ARP. PMID:28050319

  20. The Hidden Work of Women in Small Family Firms in Southern Spain

    Directory of Open Access Journals (Sweden)

    Paula Rodríguez-Modroño

    2017-01-01

    Full Text Available Women have historically played an important hidden role in family firms, and a great deal of research is now shedding light on this role. In spite of the more formal nature of female work at the present day, still a considerable volume of women’s contributions in family firms is unregistered and unpaid, even in developed regions. A questionnaire was administered to 396 women working in small and medium-sized family firms located in Andalucia, a southern European region, characterized by familialism and an important informal economy. Our results confirm the persistence of subordinate forms of unpaid family collaboration due to the neutrality assigned to female contributions under the traditional gendered division of work. But also this study shows how some of the women voluntarily embrace subordinate roles as a temporary way to gain professional experience, useful for their future work inside or outside the family firm.

  1. Recovering hidden signals of statistical anisotropy from a masked or partial CMB sky

    CERN Document Server

    Aluri, Pavan K; Rotti, Aditya; Souradeep, Tarun

    2015-01-01

    Any isotropy violating phenomena on cosmic microwave background (CMB) induces off-diagonal correlations in the two-point function. These correlations themselves can be used to estimate the underlying anisotropic signals. Masking due to residual foregrounds, or availability of partial sky due to survey limitation, are unavoidable circumstances in CMB studies. But, masking induces additional correlations, and thus complicates the recovery of such signals. In this work, we discuss a procedure based on bipolar spherical harmonic (BipoSH) formalism to comprehensively addresses any spurious correlations induced by masking and successfully recover hidden signals of anisotropy in observed CMB maps. This method is generic, and can be applied to recover a variety of isotropy violating phenomena. Here, we illustrate the procedure by recovering the subtle Doppler boost signal from simulated boosted CMB skies, which has become possible with the unprecedented full-sky sensitivity of PLANCK probe.

  2. Formal language constrained path problems

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C.; Jacob, R.; Marathe, M.

    1997-07-08

    In many path finding problems arising in practice, certain patterns of edge/vertex labels in the labeled graph being traversed are allowed/preferred, while others are disallowed. Motivated by such applications as intermodal transportation planning, the authors investigate the complexity of finding feasible paths in a labeled network, where the mode choice for each traveler is specified by a formal language. The main contributions of this paper include the following: (1) the authors show that the problem of finding a shortest path between a source and destination for a traveler whose mode choice is specified as a context free language is solvable efficiently in polynomial time, when the mode choice is specified as a regular language they provide algorithms with improved space and time bounds; (2) in contrast, they show that the problem of finding simple paths between a source and a given destination is NP-hard, even when restricted to very simple regular expressions and/or very simple graphs; (3) for the class of treewidth bounded graphs, they show that (i) the problem of finding a regular language constrained simple path between source and a destination is solvable in polynomial time and (ii) the extension to finding context free language constrained simple paths is NP-complete. Several extensions of these results are presented in the context of finding shortest paths with additional constraints. These results significantly extend the results in [MW95]. As a corollary of the results, they obtain a polynomial time algorithm for the BEST k-SIMILAR PATH problem studied in [SJB97]. The previous best algorithm was given by [SJB97] and takes exponential time in the worst case.

  3. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  4. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  5. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  6. Grand unified hidden-sector dark matter

    Science.gov (United States)

    Lonsdale, Stephen J.; Volkas, Raymond R.

    2014-10-01

    We explore G×G unified theories with the visible and the hidden or dark sectors paired under a Z2 symmetry. Developing a system of "asymmetric symmetry breaking" we motivate such models on the basis of their ability to generate dark baryons that are confined with a mass scale just above that of the proton, as motivated by asymmetric dark matter. This difference is achieved from the distinct but related confinement scales that develop in unified theories that have the two factors of G spontaneously breaking in an asymmetric manner. We show how Higgs potentials that admit different gauge group breaking chains in each sector can be constructed, and demonstrate the capacity for generating different fermion mass scales. Lastly we discuss supersymmetric extensions of such schemes.

  7. Hidden caries’ challenge diagnosis: case report

    Directory of Open Access Journals (Sweden)

    Fernanda Mara de Paiva Bertoli

    2013-06-01

    Full Text Available Introduction: Hidden caries is a term used to describe occlusal dentine caries that is missed on a visual examination, but is large and demineralised enough to be detected by another exam for example, radiographs. Case report: This article reports a case of large dentine caries, which presented as to be a small pit-and-fissure carious lesion on the occlusal surface of the right mandibular permanent first molar in a 10-year-old girl. The treatment included root canal treatment and the sealing of the cavity with composite resin. Conclusion: Careful visual examination, with cleaning and drying of teeth, associated to bitewing radiographs may improve occlusal caries detection. Dentists should examine bitewing radiographs carefully for proximal caries and occlusal demineralization. Radiographs are an effective method of caries diagnosis that can avoid large destruction and allows less invasive treatment.

  8. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  9. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  10. Nuclear scissors modes and hidden angular momenta

    CERN Document Server

    Balbutsev, E B; Schuck, P

    2016-01-01

    The coupled dynamics of low lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time Dependent Hartree-Fock-Bogoliubov equations. The model of the harmonic oscillator including spin-orbit potential plus quadrupole-quadrupole and spin-spin interactions is considered. New low lying spin dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  11. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school......Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...

  12. Hidden baryons: The physics of Compton composites

    Science.gov (United States)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  13. Hidden realities inside PBL design processes

    DEFF Research Database (Denmark)

    Pihl, Ole Verner

    2015-01-01

    Design Process, but is a group-based architecture and design education better than that which is individually based? How does PBL affect space, form, and creative processes? Hans Kiib, professor and one of the founders of the Department of Architecture and Design in Aalborg, describes his intentions...... within the group work, as it is closer related to the actual PBL process”. Is the Integrated Design Process (Knudstrup 2004) and is Colb (1975) still current and valid? Can we still use these methodologies when we must create “learning for an unknown future,” as Ronald Barnett (2004) claims that we...... investigates the creative processes of the collective and the individual and clarifies some of the hidden realities behind the PBL-based creative processes, both through an inquiry with the students and a more methodological and theoretical approach. The paper also explores how to integrate artistic...

  14. Aluminium Diphosphamethanides: Hidden Frustrated Lewis Pairs.

    Science.gov (United States)

    Styra, Steffen; Radius, Michael; Moos, Eric; Bihlmeier, Angela; Breher, Frank

    2016-07-04

    The synthesis and characterisation of two aluminium diphosphamethanide complexes, [Al(tBu)2 {κ(2) P,P'-Mes*PCHPMes*}] (3) and [Al(C6 F5 )2 {κ(2) P,P'-Mes*PCHPMes*}] (4), and the silylated analogue, Mes*PCHP(SiMe3 )Mes* (5), are reported. The aluminium complexes feature four-membered PCPAl core structures consisting of diphosphaallyl ligands. The silylated phosphine 5 was found to be a valuable precursor for the synthesis of 4 as it cleanly reacts with the diaryl aluminium chloride [(C6 F5 )2 AlCl]2 . The aluminium complex 3 reacts with molecular dihydrogen at room temperature under formation of the acyclic σ(2) λ(3) ,σ(3) λ(3) -diphosphine Mes*PCHP(H)Mes* and the corresponding dialkyl aluminium hydride [tBu2 AlH]3 . Thus, 3 belongs to the family of so-called hidden frustrated Lewis pairs.

  15. Wavelet domain hidden markovian bayesian document segmentation

    Institute of Scientific and Technical Information of China (English)

    Sun Junxi; Xiao Changyan; Zhang Su; Chen Yazhu

    2005-01-01

    A novel algorithm for Bayesian document segmentation is proposed based on the wavelet domain hidden Markov tree (HMT) model. Once the parameters of model are known, according to the sequential maximum a posterior probability (SMAP) rule, firstly, the likelihood probability of HMT model for each pattern is computed from fine to coarse procedure. Then, the interscale state transition probability is solved using Expectation Maximum (EM) algorithm based on hybrid-quadtree and multiscale context information is fused from coarse to fine procedure. In order to get pixellevel segmentation, the redundant wavelet domain Gaussian mixture model (GMM) is employed to formulate pixel-level statistical property. The experiment results show that the proposed scheme is feasible and robust.

  16. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  17. Hidden fungi, emergent properties: endophytes and microbiomes.

    Science.gov (United States)

    Porras-Alfaro, Andrea; Bayman, Paul

    2011-01-01

    Endophytes are microorganisms that live within plant tissues without causing symptoms of disease. They are important components of plant microbiomes. Endophytes interact with, and overlap in function with, other core microbial groups that colonize plant tissues, e.g., mycorrhizal fungi, pathogens, epiphytes, and saprotrophs. Some fungal endophytes affect plant growth and plant responses to pathogens, herbivores, and environmental change; others produce useful or interesting secondary metabolites. Here, we focus on new techniques and approaches that can provide an integrative understanding of the role of fungal endophytes in the plant microbiome. Clavicipitaceous endophytes of grasses are not considered because they have unique properties distinct from other endophytes. Hidden from view and often overlooked, endophytes are emerging as their diversity, importance for plant growth and survival, and interactions with other organisms are revealed.

  18. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  19. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments.

  20. 浅谈神经内科护理安全隐患与措施%Discussion on Department of internal medicine nursing safety hidden danger of nerve and measures

    Institute of Scientific and Technical Information of China (English)

    刘培培; 刘朝朋; 李晶晶

    2015-01-01

    With health care reform engaged in full swing nationwide, all health care workers should adhere to people-oriented and patient first care concept, in order to build a most safe and comfortable recovery environment for all patients. Especially for neurology care workers, the process of health care should be more careful. This paper analyzes the security risks which exist in the current nursing work in neurology, and provide some good improvement measures.%随着全国医改如火如荼的进行着,为了进一步促进医院构建一个安全舒适的康复环境,各医护人员应坚持以人为本的思想,以患者为中心的新型护理观念。尤其是神经内科的护理工作者,护理的过程更是要小心谨慎。本文针对目前神经内科护理工作中存在的安全隐患问题进行深入探讨分析,并提出相应的改善措施。

  1. Using a Multi-Cathode Counter (MCC) in the Search for Hidden Photon CDM

    CERN Document Server

    Kopylov, A V; Petukhov, V V

    2015-01-01

    We report on a new technique of a Multi-Cathode Counter (MCC) developed to search for hidden photon (HP) cold dark matter (CDM) with a mass from 5 to 10 eV. The method suggested in the assumption that hidden photons of the mass greater than a work function of the metal, the cathode of the counter is fabricated induce emission of single electrons from a cathode. Three configurations of the same counter are used to measure the count rates R1, R2 and R3 of the single electron events sequentially each week, where the difference R1- R2 measures the effect from HP and R3 is used as a reference sequence to monitor the counting process. At present the work is aimed to refine the procedure of data treatment and to look for long term variations which should be accounted for in the final analysis of data.

  2. Detection technology and application of electromagnetic method for hidden danger of water gushing at coal face

    Institute of Scientific and Technical Information of China (English)

    SHI Xian-xin; YAN Shu; CHEN Ming-sheng; FU Jun-mei

    2009-01-01

    The principles, methods, technologies and application effects of several elec-tromagnetic methods for the detection of the hidden danger of water gushing at the coal face were introduced. Also, emphasis was laid on expounding the methods, principles and effects of down-hole detections by electric transmission tomography and transient elec-tromagnetic method. The potential of point power supplied in the underground homoge-neous semi-space, as well as the response to a low-resistivity abnormal body in the ho-mogeneous semi-space, was simulated by adopting 3-D finite element method to interpret the basic theory of the electric transmission tomography. The results of actual measure-ment show that the mine electromagnetic method is sensitive to water-bearing low-resistivity bodies and can play a unique role in detecting the hidden danger of water gushing at the coal face.

  3. Ladar System Identifies Obstacles Partly Hidden by Grass

    Science.gov (United States)

    Castano, Andres

    2003-01-01

    A ladar-based system now undergoing development is intended to enable an autonomous mobile robot in an outdoor environment to avoid moving toward trees, large rocks, and other obstacles that are partly hidden by tall grass. The design of the system incorporates the assumption that the robot is capable of moving through grass and provides for discrimination between grass and obstacles on the basis of geometric properties extracted from ladar readings as described below. The system (see figure) includes a ladar system that projects a range-measuring pulsed laser beam that has a small angular width of radians and is capable of measuring distances of reflective objects from a minimum of dmin to a maximum of dmax. The system is equipped with a rotating mirror that scans the beam through a relatively wide angular range of in a horizontal plane at a suitable small height above the ground. Successive scans are performed at time intervals of seconds. During each scan, the laser beam is fired at relatively small angular intervals of radians to make range measurements, so that the total number of range measurements acquired in a scan is Ne = / .

  4. Rainbow metric formalism and Relative Locality

    CERN Document Server

    Loret, Niccoló

    2015-01-01

    This proceeding is based on a talk prepared for the XIII Marcell Grossmann meeting. We summarise some results of work in progress in collaboration with Giovanni Amelino-Camelia about momentum dependent (Rainbow) metrics in a Relative Locality framework and we show that this formalism is equivalent to the Hamiltonian formalization of Relative Locality obtained in arXiv:1102.4637.

  5. On Fitting a Formal Method into Practice

    DEFF Research Database (Denmark)

    Gmehlich, Rainer; Grau, Katrin; Hallerstede, Stefan

    2011-01-01

    . The interaction between the two proved to be crucial for the success of the case study. The heart of the problem was tracing informal requirements from Problem Frames descriptions to formal Event-B models. To a large degree, this issue dictated the approach that had to be used for formal modelling. A dedicated...

  6. Formalizing Evaluation in Music Information Retrieval

    DEFF Research Database (Denmark)

    Sturm, Bob L.

    2013-01-01

    We develop a formalism to disambiguate the evaluation of music information retrieval systems. We define a ``system,'' what it means to ``analyze'' one, and make clear the aims, parts, design, execution, interpretation, and assumptions of its ``evaluation.'' We apply this formalism to discuss...... the MIREX automatic mood classification task....

  7. The Formal Specifications for Protocols of Decoders

    Institute of Scientific and Technical Information of China (English)

    YUAN Meng-ting; WU Guo-qing; SHU Feng-di

    2004-01-01

    This paper presents a formal approach, FSPD (Formal Specifications for Protocols of Decoders), to specify decoder communication protocols. Based on axiomatic, FSPD is a precise language with which programmers could use only one suitable driver to handle various types of decoders. FSPD is helpful for programmers to get high adaptability and reusability of decoder-driver software.

  8. General Formalism for the BRST Symmetry

    Institute of Scientific and Technical Information of China (English)

    Suhail Ahmad

    2013-01-01

    In this paper we will discuss Faddeev-Popov method for gauge theories with a general form of gauge symmetry in an abstract way.We will then develope a general formalism for dealing with the BRST symmetry.This formalism will make it possible to analyse the BRST symmetry for any theory.

  9. Formal theory for differential-difference operators

    NARCIS (Netherlands)

    Faber, B.F.; Put, M. van der

    2001-01-01

    Differential-difference operators are linear operators involving both d/dz and the shift z ↦ z + 1 (or z(d/dz) and z ↦ qz). The aim is to give a formal classification and to provide solutions for these equations. Differential-difference operators can be considered as formal differential operators of

  10. Multiverse in the Third Quantized Formalism

    CERN Document Server

    Faizal, Mir

    2014-01-01

    In this paper we will analyze the third quantization of gravity in path integral formalism. We will use the time-dependent version of Wheeler-DeWitt equation to analyze the multiverse in this formalism. We will propose a mechanism for baryogenesis to occurs in the multiverse, without violating the baryon number conservation.

  11. Multiverse in the Third Quantized Formalism

    Science.gov (United States)

    Mir, Faizal

    2014-11-01

    In this paper we will analyze the third quantization of gravity in path integral formalism. We will use the time-dependent version of Wheeler—DeWitt equation to analyze the multiverse in this formalism. We will propose a mechanism for baryogenesis to occur in the multiverse, without violating the baryon number conservation.

  12. DNA expressions - A formal notation for DNA

    NARCIS (Netherlands)

    Vliet, Rudy van

    2015-01-01

    We describe a formal notation for DNA molecules that may contain nicks and gaps. The resulting DNA expressions denote formal DNA molecules. Different DNA expressions may denote the same molecule. Such DNA expressions are called equivalent. We examine which DNA expressions are minimal, which

  13. Interpretive and Formal Models of Discourse Processing.

    Science.gov (United States)

    Bulcock, Jeffrey W.; Beebe, Mona J.

    Distinguishing between interpretive and formal models of discourse processing and between qualitative and quantitative research, this paper argues that formal models are the analogues of interpretive models, and that the two are complementary. It observes that interpretive models of reading are being increasingly derived from qualitative research…

  14. Formal Reasoning in Adolescence: An Alternative View

    Science.gov (United States)

    Berzonsky, Michael D.

    1978-01-01

    According to Piaget's (1958) theory of cognitive development, the stage of Formal Operational Thinking, highly abstract, as opposed to concrete, thinking, emerges during the adolescent period. Recent research suggests that "all" adolescents, or even adults, "do not" develop complete formal reasoning. Attempts to integrate…

  15. DNA expressions - A formal notation for DNA

    NARCIS (Netherlands)

    Vliet, Rudy van

    2015-01-01

    We describe a formal notation for DNA molecules that may contain nicks and gaps. The resulting DNA expressions denote formal DNA molecules. Different DNA expressions may denote the same molecule. Such DNA expressions are called equivalent. We examine which DNA expressions are minimal, which

  16. Fundamentals of the pure spinor formalism

    NARCIS (Netherlands)

    Hoogeveen, J.

    2010-01-01

    This thesis presents recent developments within the pure spinor formalism, which has simplified amplitude computations in perturbative string theory, especially when spacetime fermions are involved. Firstly the worldsheet action of both the minimal and the non-minimal pure spinor formalism is derive

  17. Industrial Practice in Formal Methods : A Review

    DEFF Research Database (Denmark)

    Bicarregui, Juan C.; Fitzgerald, John; Larsen, Peter Gorm

    2009-01-01

    We examine the the industrial application of formal methods using data gathered in a review of 62 projects taking place over the last 25 years. The review suggests that formal methods are being applied in a wide range of application domains, with increasingly strong tool support. Significant chal...

  18. A survey of formal languages for contracts

    DEFF Research Database (Denmark)

    Hvitved, Tom

    2010-01-01

    In this short paper we present the current status on formal languages and models for contracts. By a formal model is meant an unambiguous and rigorous representation of contracts, in order to enable their automatic validation, execution, and analysis — activates that are collectively referred...

  19. 18 CFR 1b.5 - Formal investigations.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Formal investigations. 1b.5 Section 1b.5 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES RULES RELATING TO INVESTIGATIONS § 1b.5 Formal investigations....

  20. NOTE FOR EDITOR: Self-Efficacy Of Formally and Non-Formally Trained Public Sector Teachers

    OpenAIRE

    ANWAR, Muhammad Nadeem

    2009-01-01

    The main objective of the study was to compare the formally and non-formally trained in-service public sector teachers’ Self-efficacy. Five hypotheses were developed describing no difference in the self-efficacy of formally and non-formally trained teachers to influence decision making, influence school resources, instructional self-efficacy, disciplinary self-efficacy and create positive school climate. Teacher Efficacy Instrument (TSES) developed by Bandura (2001) consisting of thirty 9...

  1. SBME : Exploring boundaries between formal, non-formal, and informal learning

    OpenAIRE

    Shahoumian, Armineh; Parchoma, Gale; Saunders, Murray; Hanson, Jacky; Dickinson, Mike; Pimblett, Mark

    2013-01-01

    In medical education learning extends beyond university settings into practice. Non-formal and informal learning support learners’ efforts to meet externally set and learner-identified objectives. In SBME research, boundaries between formal, non-formal, and informal learning have not been widely explored. Whether SBME fits within or challenges these categories can make a contribution. Formal learning is described in relation to educational settings, planning, assessment, and accreditation. In...

  2. Students' Attitudes toward Formal Education, Non-Formal and Informal Learning

    OpenAIRE

    Plavšić, Marlena; Diković, Marina

    2016-01-01

    The purpose of the study was to contribute to the model of formal education, non-formal and informal learning (Coombs & Ahmed, 1974; European Commission, 2001) by exploring students’ attitudes towards these three types of education and learning. 553 students of educational sciences, humanities and economics filled in a scale of attitudes towards formal education, non-formal and informal learning. Data on their study year, knowledge about these three types of education/learning, monthly family...

  3. Bruggeman formalism vs. `Bruggeman formalism': Particulate composite materials comprising oriented ellipsoidal particles

    CERN Document Server

    Mackay, Tom G

    2012-01-01

    Two different formalisms for the homogenization of composite materials containing oriented ellipsoidal particles of isotropic dielectric materials are being named after Bruggeman. Numerical studies reveal clear differences between the two formalisms which may be exacerbated: (i) if the component particles become more aspherical, (ii) at mid-range values of the volume fractions, and (iii) if the homogenized component material is dissipative. The correct Bruggeman formalism uses the correct polarizability density dyadics of the component particles, but the other formalism does not.

  4. Formal-language-theoretic Optimal Path Planning For Accommodation of Amortized Uncertainties and Dynamic Effects

    CERN Document Server

    Chattopadhyay, Ishanu; Ray, Asok

    2010-01-01

    We report a globally-optimal approach to robotic path planning under uncertainty, based on the theory of quantitative measures of formal languages. A significant generalization to the language-measure-theoretic path planning algorithm $\

  5. Statistical Mechanics of Transcription-Factor Binding Site Discovery Using Hidden Markov Models

    OpenAIRE

    Mehta, Pankaj; Schwab, David J.; Sengupta, Anirvan M.

    2011-01-01

    Hidden Markov Models (HMMs) are a commonly used tool for inference of transcription factor (TF) binding sites from DNA sequence data. We exploit the mathematical equivalence between HMMs for TF binding and the "inverse" statistical mechanics of hard rods in a one-dimensional disordered potential to investigate learning in HMMs. We derive analytic expressions for the Fisher information, a commonly employed measure of confidence in learned parameters, in the biologically relevant limit where th...

  6. Using HPGe detector for a solar hidden-photons search

    CERN Document Server

    Horvat, R; Krcmar, M; Krecak, Z; Ljubicic, A

    2012-01-01

    In this paper we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory, by observing the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, leads to both photon into hidden states oscillations and to a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in the Sun's interior. We exclude hidden photons with kinetic couplings chi > (1.5x10^{-6}-2.6x10^{-11}) for the mass region 1.7x10^{-4} eV < m_\\gamma' < 3.4 eV. Our constraints on the mixing parameter chi at sub-eV hidden-photon masses p...

  7. Enhancing System Realisation in Formal Model Development

    DEFF Research Database (Denmark)

    Tran-Jørgensen, Peter Würtz Vinther

    – a formal methods tool that supports the Vienna Development Method. The development of the code generation infrastructure has involved the re-design of the software architecture of Overture. The new architecture brings forth the reuse and extensibility features of Overture to take into account the needs......Software for mission-critical systems is sometimes analysed using formal specification to increase the chances of the system behaving as intended. When sufficient insights into the system have been obtained from the formal analysis, the formal specification is realised in the form of a software...... implementation. One way to realise the system’s software is by automatically generating it from the formal specification – a technique referred to as code generation. However, in general it is difficult to make guarantees about the correctness of the generated code – especially while requiring automation...

  8. Teaching Formal Methods and Discrete Mathematics

    Directory of Open Access Journals (Sweden)

    Mathieu Jaume

    2014-04-01

    Full Text Available Despite significant advancements in the conception of (formal integrated development environments, applying formal methods in software industry is still perceived as a difficult task. To make the task easier, providing tools that help during the development cycle is essential but we think that education of computer scientists and software engineers is also an important challenge to take up. Indeed, we believe that formal methods courses do not appear sufficiently early in compter science curricula and thus are not widely used and perceived as a valid professional skill. In this paper, we claim that teaching formal methods could be done at the undergraduate level by mixing formal methods and discrete mathematics courses and we illustrate such an approach with a small develop- ment within FoCaLiZe. We also believe that this could considerably benefit the learning of discrete mathematics.

  9. Improving Learner Outcomes in Lifelong Education: Formal Pedagogies in Non-Formal Learning Contexts?

    Science.gov (United States)

    Zepke, Nick; Leach, Linda

    2006-01-01

    This article explores how far research findings about successful pedagogies in formal post-school education might be used in non-formal learning contexts--settings where learning may not lead to formal qualifications. It does this by examining a learner outcomes model adapted from a synthesis of research into retention. The article first…

  10. Modeling Movement Primitives with Hidden Markov Models for Robotic and Biomedical Applications.

    Science.gov (United States)

    Karg, Michelle; Kulić, Dana

    2017-01-01

    Movement primitives are elementary motion units and can be combined sequentially or simultaneously to compose more complex movement sequences. A movement primitive timeseries consist of a sequence of motion phases. This progression through a set of motion phases can be modeled by Hidden Markov Models (HMMs). HMMs are stochastic processes that model time series data as the evolution of a hidden state variable through a discrete set of possible values, where each state value is associated with an observation (emission) probability. Each motion phase is represented by one of the hidden states and the sequential order by their transition probabilities. The observations of the MP-HMM are the sensor measurements of the human movement, for example, motion capture or inertial measurements. The emission probabilities are modeled as Gaussians. In this chapter, the MP-HMM modeling framework is described and applications to motion recognition and motion performance assessment are discussed. The selected applications include parametric MP-HMMs for explicitly modeling variability in movement performance and the comparison of MP-HMMs based on the loglikelihood, the Kullback-Leibler divergence, the extended HMM-based F-statistic, and gait-specific reference-based measures.

  11. Experience of Using a Multi-Cathode Counter (MCC) in a Search for Hidden Photon CDM

    CERN Document Server

    Kopylov, A V; Petukhov, V V

    2015-01-01

    We report on a new technique of a Multi-Cathode Counter (MCC) developed to search for hidden photon (HP) cold dark matter (CDM) with a mass from 5 to 500 eV. The method suggested in the assumption that hidden photons of the mass greater than a work function of the metal, the cathode of the counter is fabricated induce emission of single electrons from a cathode. Three configurations of the same counter are used to measure the count rates R1, R2 and R3 of the single electron events during several weeks. As a measure of the effect from HP the difference R1-(R2-D3/D2xR3) has been used. Some preliminary results have been obtained on a first try to search for HP with a mass from 5 to 500 eV. The upper limit for mixing parameter X has been set on the level of 3.3x10-10 for hidden photon mass from 9 to 100 eV. In our plans is to refine the procedure of data treatment and to continue the measurements to collect more data.

  12. Hidden photon dark matter search with large metallic mirror

    Energy Technology Data Exchange (ETDEWEB)

    Doebrich, Babette; Lindner, Axel [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Daumiller, Kai; Engel, Ralph; Roth, Markus [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany); Kowalski, Marek [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Redondo, Javier [Zaragoza Univ. (Spain)

    2014-10-15

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  13. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  14. Suppressing the QCD axion abundance by hidden monopoles

    Directory of Open Access Journals (Sweden)

    Masahiro Kawasaki

    2016-02-01

    Full Text Available We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 1012GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei–Quinn symmetry is spontaneously broken after inflation.

  15. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  16. Predicting the Perceptual Consequences of Hidden Hearing Loss

    Directory of Open Access Journals (Sweden)

    Andrew J. Oxenham

    2016-12-01

    Full Text Available Recent physiological studies in several rodent species have revealed that permanent damage can occur to the auditory system after exposure to a noise that produces only a temporary shift in absolute thresholds. The damage has been found to occur in the synapses between the cochlea’s inner hair cells and the auditory nerve, effectively severing part of the connection between the ear and the brain. This synaptopathy has been termed hidden hearing loss because its effects are not thought to be revealed in standard clinical, behavioral, or physiological measures of absolute threshold. It is currently unknown whether humans suffer from similar deficits after noise exposure. Even if synaptopathy occurs in humans, it remains unclear what the perceptual consequences might be or how they should best be measured. Here, we apply a simple theoretical model, taken from signal detection theory, to provide some predictions for what perceptual effects could be expected for a given loss of synapses. Predictions are made for a number of basic perceptual tasks, including tone detection in quiet and in noise, frequency discrimination, level discrimination, and binaural lateralization. The model’s predictions are in line with the empirical observations that a 50% loss of synapses leads to changes in threshold that are too small to be reliably measured. Overall, the model provides a simple initial quantitative framework for understanding and predicting the perceptual effects of synaptopathy in humans.

  17. SELF-EFFICACY OF FORMALLY AND NON-FORMALLY TRAINED PUBLIC SECTOR TEACHERS

    Directory of Open Access Journals (Sweden)

    Muhammad Nadeem ANWAR

    2009-07-01

    Full Text Available The main objective of the study was to compare the formally and non-formally trained in-service public sector teachers’ Self-efficacy. Five hypotheses were developed describing no difference in the self-efficacy of formally and non-formally trained teachers to influence decision making, influence school resources, instructional self-efficacy, disciplinary self-efficacy and create positive school climate. Teacher Efficacy Instrument (TSES developed by Bandura (2001 consisting of thirty 9-point items was used in the study. 342 formally trained and 255 non-formally trained respondents’ questionnaires were received out of 1500 mailed. The analysis of data revealed that the formally trained public sector teachers are high in their self-efficacy on all the five categories: to influence decision making, to influence school resources, instructional self-efficacy, disciplinary self-efficacy and self-efficacy to create positive school climate.

  18. A 4-vector formalism for classical mechanics

    CERN Document Server

    Güémez, Julio

    2014-01-01

    We present a matrix formalism, inspired by the Minkowski four-vectors of special relativity, useful to solve classical physics problems related to both mechanics and thermodynamics. The formalism turns out to be convenient to deal with exercises involving non-conservative forces and production or destruction of mechanical energy. On the other hand, it provides a framework to treat straightforwardly changes of inertial reference frames, since it embodies the Principle of Relativity. We apply the formalism to a few cases to better show how it works.

  19. Thermodynamic Formalism and Applications to Dimension Theory

    CERN Document Server

    Barreira, Luis

    2011-01-01

    This self-contained monograph presents a unified exposition of the thermodynamic formalism and some of its main extensions, with emphasis on the relation to dimension theory and multifractal analysis of dynamical systems. In particular, the book considers three different flavors of the thermodynamic formalism, namely nonadditive, subadditive, and almost additive, and provides a detailed discussion of some of the most significant results in the area, some of them quite recent. It also includes a discussion of the most substantial applications of these flavors of the thermodynamic formalism to d

  20. Inter-rater Agreement on Sentence Formality

    CERN Document Server

    Lahiri, Shibamouli

    2011-01-01

    Formality is one of the most important dimensions of writing style variation. In this study we conducted an inter-rater reliability experiment for assessing sentence formality on a five-point Likert scale, and obtained good agreement results as well as different rating distributions for different sentence categories. We also performed a difficulty analysis to identify the bottlenecks of our rating procedure. Our main objective is to design an automatic scoring mechanism for sentence-level formality, and this study is important for that purpose.