WorldWideScience

Sample records for hidden object locator

  1. Orthogonal coding of object location.

    Science.gov (United States)

    Knutsen, Per Magne; Ahissar, Ehud

    2009-02-01

    It has been argued whether internal representations are encoded using a universal ('the neural code') or multiple codes. Here, we review a series of experiments that demonstrate that tactile encoding of object location via whisking employs an orthogonal, triple-code scheme. Rats, and other rodents, actively move the whiskers back and forth to localize and identify objects. Neural recordings from primary sensory afferents, along with behavioral observations, demonstrate that vertical coordinates of contacted objects are encoded by the identity of activated afferents, horizontal coordinates by the timing of activation and radial coordinates by the intensity of activation. Because these codes are mutually independent, the three-dimensional location of an object could, in principle, be encoded by individual afferents during single whisker-object contacts. One advantage of such a same-neuron-different-codes scheme over the traditionally assumed same-code-different-neurons scheme is a reduction of code ambiguity that, in turn, simplifies decoding circuits.

  2. Home-Explorer: Ontology-Based Physical Artifact Search and Hidden Object Detection System

    Directory of Open Access Journals (Sweden)

    Bin Guo

    2008-01-01

    Full Text Available A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses sensors attached to the everyday artifacts (called smart objects in the real world. This paper makes two main contributions: First, it addresses, the robustness of the embedded sensors, which is seldom discussed in previous smart artifact research. Because sensors may sometimes be broken or fail to work under certain conditions, smart objects become hidden ones. However, current systems provide no mechanism to detect and manage objects when this problem occurs. Second, there is no common context infrastructure for building smart artifact systems, which makes it difficult for separately developed applications to interact with each other and uneasy for them to share and reuse knowledge. Unlike previous systems, Home-Explorer builds on an ontology-based knowledge infrastructure named Sixth-Sense, which makes it easy for the system to interact with other applications or agents also based on this ontology. The hidden object problem is also reflected in our ontology, which enables Home-Explorer to deal with both smart objects and hidden objects. A set of rules for deducing an object's status or location information and for locating hidden objects are described and evaluated.

  3. Use of Hidden Markov Mobility Model for Location Based Services

    Directory of Open Access Journals (Sweden)

    Bhakti D. Shelar

    2014-07-01

    Full Text Available These days people prefer to use portable and wireless devices such as laptops, mobile phones, They are connected through satellites. As user moves from one point to other, task of updating stored information becomes difficult. Provision of Location based services to users, faces some challenges like limited bandwidth and limited client power. To optimize data accessibility and to minimize access cost, we can store frequently accessed data item in cache of client. So small size of cache is introduced in mobile devices. Data fetched from server is stored on cache. So requested data from user is provided from cache and not from remote server. Question arises that which data should be kept in the cache? Performance of cache majorly depends on the cache replacement policies which select data suitable for eviction from cache. This paper presents use of Hidden Markov Models(HMMs for prediction of user‟s future location. Then data item irrelevant to this predicted location is fetched out from the cache. The proposed approach clusters location histories according to their location characteristics and also it considers each user‟s previous actions. This results in producing high packet delivery ratio and minimum delay.

  4. 78 FR 17744 - Culturally Significant Objects Imported for Exhibition Determinations: “Maya: Hidden Worlds...

    Science.gov (United States)

    2013-03-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Culturally Significant Objects Imported for Exhibition Determinations: ``Maya: Hidden Worlds Revealed... determine that the objects to be included in the exhibition ``Maya: Hidden Worlds Revealed,'' imported...

  5. Multisensory memory for object identity and location

    NARCIS (Netherlands)

    Erp, J.B.F. van; Philippi, T.G.; Werkhoven, P.J.

    2014-01-01

    Researchers have reported that audiovisual object presentation improves memory encoding of object identity in comparison to either auditory or visual object presentation. However, multisensory memory effects on retrieval, on object location, and of other multisensory combinations are yet unknown. We

  6. Statistical patterns of visual search for hidden objects

    Science.gov (United States)

    Credidio, Heitor F.; Teixeira, Elisângela N.; Reis, Saulo D. S.; Moreira, André A.; Andrade, José S., Jr.

    2012-12-01

    The movement of the eyes has been the subject of intensive research as a way to elucidate inner mechanisms of cognitive processes. A cognitive task that is rather frequent in our daily life is the visual search for hidden objects. Here we investigate through eye-tracking experiments the statistical properties associated with the search of target images embedded in a landscape of distractors. Specifically, our results show that the twofold process of eye movement, composed of sequences of fixations (small steps) intercalated by saccades (longer jumps), displays characteristic statistical signatures. While the saccadic jumps follow a log-normal distribution of distances, which is typical of multiplicative processes, the lengths of the smaller steps in the fixation trajectories are consistent with a power-law distribution. Moreover, the present analysis reveals a clear transition between a directional serial search to an isotropic random movement as the difficulty level of the searching task is increased.

  7. Detection versus location judgments in a hidden pattern task: functional MRI and behavioral correlates.

    Science.gov (United States)

    Bolster, R Bruce; D'Arcy, Ryan C N; Song, Xiaowei; Runke, Dwayne S; Ryner, Lawrence

    2011-08-01

    We used functional magnetic resonance imaging (fMRI) to assess cortical involvement in a hidden pattern task. The experimental and control conditions involved judgment of the presence/absence versus the position of a complex pattern. Activation specific to hidden pattern identification was concentrated on frontal, dorsal parietal, and mesolimbic cortex. This was consistent not only across individual subjects, but with hidden figures tasks used in previous fMRI investigations. Results suggest that pattern identification relies on a relatively stable neural network controlling selective attention. In combination with fMRI, hidden pattern tasks may be useful in neuropsychological assessment of visual search and object identification.

  8. Adobe Boxes: Locating Object Proposals Using Object Adobes.

    Science.gov (United States)

    Fang, Zhiwen; Cao, Zhiguo; Xiao, Yang; Zhu, Lei; Yuan, Junsong

    2016-09-01

    Despite the previous efforts of object proposals, the detection rates of the existing approaches are still not satisfactory enough. To address this, we propose Adobe Boxes to efficiently locate the potential objects with fewer proposals, in terms of searching the object adobes that are the salient object parts easy to be perceived. Because of the visual difference between the object and its surroundings, an object adobe obtained from the local region has a high probability to be a part of an object, which is capable of depicting the locative information of the proto-object. Our approach comprises of three main procedures. First, the coarse object proposals are acquired by employing randomly sampled windows. Then, based on local-contrast analysis, the object adobes are identified within the enlarged bounding boxes that correspond to the coarse proposals. The final object proposals are obtained by converging the bounding boxes to tightly surround the object adobes. Meanwhile, our object adobes can also refine the detection rate of most state-of-the-art methods as a refinement approach. The extensive experiments on four challenging datasets (PASCAL VOC2007, VOC2010, VOC2012, and ILSVRC2014) demonstrate that the detection rate of our approach generally outperforms the state-of-the-art methods, especially with relatively small number of proposals. The average time consumed on one image is about 48 ms, which nearly meets the real-time requirement.

  9. Location of geographical objects in crisis situations

    Science.gov (United States)

    Rybansky, M.; Kratochvil, V.

    2014-02-01

    This article summarizes the various expressions of object positioning using different coordinate data and different methods, such as use of maps, exploiting the properties of digital Global System for Mobile Communications (GSM) networks, Global Navigational Satellite Systems (GNSS), Inertial Navigation Systems (INS), Inertial Measurement Systems (IMS), hybrid methods and non-contact (remote sensing) methods; all with varying level of accuracy. Furthermore, the article describes some geographical identifiers and verbal means to describe location of geographical objects such as settlements, rivers, forest, roads, etc. All of the location methods have some advantages and disadvantages, especially in emergency situations, when usually the crisis management has a lack of time in a decision process.

  10. Mining Object Similarity for Predicting Next Locations

    Institute of Scientific and Technical Information of China (English)

    Meng Chen; Xiaohui Yu; Yang Liu

    2016-01-01

    Next location prediction is of great importance for many location-based applications. With the virtue of solid theoretical foundations, Markov-based approaches have gained success along this direction. In this paper, we seek to enhance the prediction performance by understanding the similarity between objects. In particular, we propose a novel method, called weighted Markov model (weighted-MM), which exploits both the sequence of just-passed locations and the object similarity in mining the mobility patterns. To this end, we first train a Markov model for each object with its own trajectory records, and then quantify the similarities between different objects from two aspects: spatial locality similarity and trajectory similarity. Finally, we incorporate the object similarity into the Markov model by considering the similarity as the weight of the probability of reaching each possible next location, and return the top-rankings as results. We have conducted extensive experiments on a real dataset, and the results demonstrate significant improvements in prediction accuracy over existing solutions.

  11. Segmentation and Location Computation of Bin Objects

    Directory of Open Access Journals (Sweden)

    C.R. Hema

    2008-11-01

    Full Text Available In this paper we present a stereo vision based system for segmentation and location computation of partially occluded objects in bin picking environments. Algorithms to segment partially occluded objects and to find the object location [midpoint,x, y and z coordinates] with respect to the bin area are proposed. The z co ordinate is computed using stereo images and neural networks. The proposed algorithms is tested using two neural network architectures namely the Radial Basis Function nets and Simple Feedforward nets. The training results fo feedforward nets are found to be more suitable for the current application.The proposed stereo vision system is interfaced with an Adept SCARA Robot to perform bin picking operations. The vision system is found to be effective for partially occluded objects, in the absence of albedo effects. The results are validated through real time bin picking experiments on the Adept Robot.

  12. Examining object location and object recognition memory in mice.

    Science.gov (United States)

    Vogel-Ciernia, Annie; Wood, Marcelo A

    2014-10-08

    This unit is designed to provide sufficient instruction for the setup and execution of tests for object location and object recognition in adult mice. This task is ideally suited for the study of a variety of mouse models that examine disease mechanisms and novel therapeutic targets. By altering several key parameters, the experimenter can investigate short-term or long-term memory and look for either memory impairments or enhancements. Object location and object recognition memory tasks rely on a rodent's innate preference for novelty, and can be conducted sequentially in the same cohort of animals. These two tasks avoid the inherent stress induced with other common measures of rodent memory such as fear conditioning and the Morris water maze. This protocol covers detailed instructions on conducting both tasks, as well as key points concerning data collection, analysis, and interpretation.

  13. Water Institutional Reforms in Scotland: Contested Objectives and Hidden Disputes

    Directory of Open Access Journals (Sweden)

    Antonio A.R. Ioris

    2008-10-01

    Full Text Available One fundamental limitation of the contemporary debate over water institutional reforms has been the excessive concentration on scientific assessments and management techniques, with insufficient consideration of the underlying politics of decision-making and socio-economic asymmetries. This article examines the 'sociology of water regulation' to demonstrate how the implementation of the European Water Framework Directive (WFD in Scotland is profoundly influenced by broader political and economic circumstances. The ongoing reforms of regulatory institutions became entangled in the reorganisation of a devolved Scottish Administration in the late 1990s, which has directly influenced the channels of representation and the overall decision-making processes. It is claimed here that, despite a discursive construction around sustainability and public participation, the new institutional landscape has so far failed to improve long-term patterns of water use and conservation. The article also analyses how the exacerbation of the economic dimension of water management has permeated the entire experience, serving as a political filter for the assessment of impacts and formulation of solutions. The ultimate conclusion is that formal changes in the legislation created a positive space for institutional reforms, but the effective improvement of water policy and catchment management has been curtailed by political inertia and the hidden balance of power.

  14. Aligning Body and World: Stable Reference Frames Improve Young Children's Search for Hidden Objects

    Science.gov (United States)

    Perry, Lynn K.; Samuelson, Larissa K.; Spencer, John P.

    2009-01-01

    This study investigated how young children's increasingly flexible use of spatial reference frames enables accurate search for hidden objects by using a task that 3-year-olds have been shown to perform with great accuracy and 2-year-olds have been shown to perform inaccurately. Children watched as an object was rolled down a ramp, behind a panel…

  15. Computer simulation of time-resolved optical imaging of objects hidden in turbid media

    NARCIS (Netherlands)

    Michielsen, K.; Raedt, H. De; Przeslawski, J.; Garcia, N.

    1998-01-01

    We review research on time-resolved optical imaging of objects hidden in strongly scattering media, with emphasis on the application to breast cancer detection. A method is presented to simulate the propagation of light in turbid media. Based on a numerical algorithm to solve the time-dependent diff

  16. Large distance 3D imaging of hidden objects

    Science.gov (United States)

    Rozban, Daniel; Aharon Akram, Avihai; Kopeika, N. S.; Abramovich, A.; Levanon, Assaf

    2014-06-01

    Imaging systems in millimeter waves are required for applications in medicine, communications, homeland security, and space technology. This is because there is no known ionization hazard for biological tissue, and atmospheric attenuation in this range of the spectrum is low compared to that of infrared and optical rays. The lack of an inexpensive room temperature detector makes it difficult to give a suitable real time implement for the above applications. A 3D MMW imaging system based on chirp radar was studied previously using a scanning imaging system of a single detector. The system presented here proposes to employ a chirp radar method with Glow Discharge Detector (GDD) Focal Plane Array (FPA of plasma based detectors) using heterodyne detection. The intensity at each pixel in the GDD FPA yields the usual 2D image. The value of the I-F frequency yields the range information at each pixel. This will enable 3D MMW imaging. In this work we experimentally demonstrate the feasibility of implementing an imaging system based on radar principles and FPA of inexpensive detectors. This imaging system is shown to be capable of imaging objects from distances of at least 10 meters.

  17. Video object's behavior analyzing based on motion history image and hidden markov model

    Institute of Scientific and Technical Information of China (English)

    Meng Fanfeng; Qu Zhenshen; Zeng Qingshuang; Li li

    2009-01-01

    A novel method was proposed, which extracted video object's track and analyzed video object's behavior. Firstly, this method tracked the video object based on motion history image, and obtained the coordinate-based track sequence and orientation-based track sequence of the video object. Then the proposed hidden markov model (HMM) based algorithm was used to analyze the behavior of video object with the track sequence as input. Experimental results on traffic object show that this method can achieve the statistics of a mass of traffic objects' behavior efficiently, can acquire the reasonable velocity behavior curve of traffic object, and can recognize traffic object's various behaviors accurately. It provides a base for further research on video object behavior.

  18. Three-dimensional imaging of hidden objects using positron emission backscatter

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Dongwon [Los Alamos National Laboratory; Cowee, Misa [Los Alamos National Laboratory; Fenimore, Ed [Los Alamos National Laboratory; Galassi, Mark [Los Alamos National Laboratory; Looker, Quinn [Los Alamos National Laboratory; Mcneil, Wendy V [Los Alamos National Laboratory; Stonehill, Laura [Los Alamos National Laboratory; Wallace, Mark [Los Alamos National Laboratory

    2009-01-01

    Positron emission backscatter imaging is a technique for interrogation and three-dimensional (3-D) reconstruction of hidden objects when we only have access to the objects from one side. Using time-of-flight differences in detected direct and backscattered positron-emitted photons, we construct 3-D images of target objects. Recently at Los Alamos National Laboratory, a fully three-dimensional imaging system has been built and the experimental results are discussed in this paper. Quantitative analysis of images reconstructed in both two- and three-dimensions are also presented.

  19. Topography of hidden objects using THz digital holography with multi-beam interferences.

    Science.gov (United States)

    Valzania, Lorenzo; Zolliker, Peter; Hack, Erwin

    2017-05-15

    We present a method for the separation of the signal scattered from an object hidden behind a THz-transparent sample in the framework of THz digital holography in reflection. It combines three images of different interference patterns to retrieve the amplitude and phase distribution of the object beam. Comparison of simulated with experimental images obtained from a metallic resolution target behind a Teflon plate demonstrates that the interference patterns can be described in the simple form of three-beam interference. Holographic reconstructions after the application of the method show a considerable improvement compared to standard reconstructions exclusively based on Fourier transform phase retrieval.

  20. New algorithm for detection of dangerous objects hidden on a human body using passive THz camera

    Science.gov (United States)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.; Shestakov, Ivan L.

    2016-10-01

    We discuss a correlation function using for developing of new algorithm that allows us to detect a hidden object without analyzing of image captured by the passive THz camera. Main idea of this approach concludes in correlation calculating between the image characteristics and corresponding characteristics of standard image. Obviously, a difference in temperature between a person body and object hidden under clothes takes place always. However, this difference can be invisible for human eyes. Using the correlation function we can increase a contrast between two objects and this allows to see an object or to produce alarm by computer. We discuss a choice of standard image characteristics for an achievement of correlation function for high contrast. Other feature of our approach arises from a possibility of a person image coming to the THz camera by using a computer processing of the image only. It means that we can "decrease" a distance between a person and the passive THz camera. This algorithm is very convenient for using and has a high performance.

  1. Location performance objectives for the NNWSI area-to-location screening activity

    Energy Technology Data Exchange (ETDEWEB)

    Sinnock, S.; Fernandez, J.A.

    1984-01-01

    Fifty-four objectives were identified to guide the screening of the Nevada Research and Development Area of the Nevada Test Site for relatively favorable locations for the disposal of nuclear waste in a mined geologic repository. The objectives were organized as a hierarchy composed of 4 upper-level, 12 middle-level, and 38 lower-level objectives. The four upper-level objectives account for broad national goals to contain and isolate nuclear waste in an environmentally sound and economically acceptable manner. The middle-level objectives correspond to topical categories that logically relate the upper-level objectives to site-specific concerns such as seismicity, sensitive species, and flooding hazards (represented by the lower-level objectives). The relative merits of alternative locations were compared by an application of decision analysis based on standard utility theory. The relative favorabilities of pertinent physical conditions at each alternative location were weighted in relation to the importance of objectives, and summed to produce maps indicating the most and the least favorable locations. Descriptions of the objectives were organized by the hierarchical format; they detail the applicability of each objective to geologic repository siting, previously published siting criteria corresponding to each objective, and the rationale for the weight assigned to each objective, and the pertinent attributes for evaluating locations with respect to each objective. 51 references, 47 figures, 4 tables.

  2. Locative view: visualizing geo-referenced objects in space

    Science.gov (United States)

    Carlotto, Mark; Nebrich, Mark; Hylton, Paul

    2010-04-01

    Locative Viewing is a method for visualizing geographically-referenced 3-D objects in the local coordinate system of a geographically-referenced observer. A computer-graphics rendering of nearby geo-objects is superimposed over the visual surroundings of the observer as seen by a camera. This rendering changes as the observer moves. Locative viewing can be accomplished with a mobile device that 1) is able to determine its geographic location, and orientation, 2) contains a camera and image display, and 3) can project and overlay objects within the field of view of the camera with the camera image. A preliminary implementation of a locative viewer using Apple's iPhone is described and results presented.

  3. KEY ROLE OF METALLOGENIC THEORY OF POLYGENETIC COMPOUND ORE DEPOSITS IN LOCATION PREDICTION OF HIDDEN ORE DEPOSITS IN DIWA REGIONS

    Institute of Scientific and Technical Information of China (English)

    PENG; Sheng-lin; LIU; Liang-ming; LAI; Jian-qing

    2001-01-01

    The metallogenic theory of polygenetic compound ore deposit is the Important basis for location prediction of hidden ore deposits in diwa regions.It can play an important role in each step of prediction research,targeting procedure,acquiring information and integrating information.In this paper,the authors discusses how to construct geological concept by using of the metallogenic theory of polygenetic ore deposits for predicting targeting area,to arrange investigation and detection for getting enough useful information,and to analyze and integrate information for reaching a trustful prediction conclusion.According to these strategies,we conduct a successful prediction of location of hidden ore bodies in the outer of the Fenghuangshan copper mine,a principal producing mine in Tongling Cu-Au district.

  4. Modeling of Location Estimation for Object Tracking in WSN

    Directory of Open Access Journals (Sweden)

    Hung-Chi Chu

    2013-01-01

    Full Text Available Location estimation for object tracking is one of the important topics in the research of wireless sensor networks (WSNs. Recently, many location estimation or position schemes in WSN have been proposed. In this paper, we will propose the procedure and modeling of location estimation for object tracking in WSN. The designed modeling is a simple scheme without complex processing. We will use Matlab to conduct the simulation and numerical analyses to find the optimal modeling variables. The analyses with different variables will include object moving model, sensing radius, model weighting value α, and power-level increasing ratio k of neighboring sensor nodes. For practical consideration, we will also carry out the shadowing model for analysis.

  5. [Location selection for Shenyang urban parks based on GIS and multi-objective location allocation model].

    Science.gov (United States)

    Zhou, Yuan; Shi, Tie-Mao; Hu, Yuan-Man; Gao, Chang; Liu, Miao; Song, Lin-Qi

    2011-12-01

    Based on geographic information system (GIS) technology and multi-objective location-allocation (LA) model, and in considering of four relatively independent objective factors (population density level, air pollution level, urban heat island effect level, and urban land use pattern), an optimized location selection for the urban parks within the Third Ring of Shenyang was conducted, and the selection results were compared with the spatial distribution of existing parks, aimed to evaluate the rationality of the spatial distribution of urban green spaces. In the location selection of urban green spaces in the study area, the factor air pollution was most important, and, compared with single objective factor, the weighted analysis results of multi-objective factors could provide optimized spatial location selection of new urban green spaces. The combination of GIS technology with LA model would be a new approach for the spatial optimizing of urban green spaces.

  6. Locating hidden channels for placer gold exploration in the Cariboo District, British Columbia, Canada: A case study

    Science.gov (United States)

    Eberle, Detlef; Bastian, Dennis; Ebel, Norbert; Schwarz, Rüdiger

    2017-01-01

    During the past 150 years, most of the modern day creeks were the target of miners roaming the Cariboo Mountains, British Columbia, in the search for placer gold. In these days, the probability to locate new placer gold occurrence in recent river beds is therefore substantially reduced. New, promising exploration targets appear to be channels mostly buried under alluvial cover sediments. It is airborne geophysical methods that can reveal hidden channels fast and cost-effectively as these penetrate the sub-surface contactless and reflect physical properties of the sub-surface, such as electric conductivity and magnetic susceptibility or magnetization, respectively. We applied the airborne geophysical exploration approach on four exploration areas in the Cariboo gold district. Helicopter-borne transient electromagnetic (TEM) and magnetic data were flown using the SkyTEM system. To our knowledge, it has been innovatory to apply high resolution, high density airborne geophysics in the search for placer gold deposited in pre-Holocene sedimentary channel fills of the Cariboo Mountains. A particular effort of our studies aimed at the Mary creek claims which straddle the boundary of the Quesnel and Kootenay terranes of the Canadian Cordillera and include the dormant Toop mine situated in the Mary creek area known for many finds of coarse nugget from the pre-glacial buried Toop channel. Our objective was to locate the southbound extension of the channel buried in Pleistocene sediments of the Toop plateau. Careful analysis of the airborne geophysical data sets provided indications from both the TEM and magnetic data sets favouring the existence of a hidden channel beneath the plateau. The evaluation of seven reverse circulation (RC) drill holes sunk into a promising elongated narrow conductor beneath the plateau was not conclusive as not clearly showing the sedimentary pattern of a channel with gravels typically at its bottom. Only electric conductivity-depth sections

  7. Explorations of Object and Location Memory using fMRI

    Directory of Open Access Journals (Sweden)

    Antony D Passaro

    2013-08-01

    Full Text Available Content-specific sub-systems of visual working memory (VWM have been explored in many neuroimaging studies with inconsistent findings and procedures across experiments. The present study employed functional magnetic resonance imaging (fMRI and a change detection task using a high number of trials and matched stimulus displays across object and location change ("what" vs "where" conditions. Furthermore, individual task periods were studied independently across conditions to identify period-specific differences. Importantly, this combination of task controls has not previously been described in the fMRI literature. Composite results revealed differential frontoparietal activation during each task period. A separation of object and location conditions yielded a distributed system of dorsal and ventral streams during the encoding of information corresponding to bilateral inferior parietal lobule (IPL and lingual gyrus activation, respectively. Differential activity was also shown during the maintenance of information in middle frontal structures bilaterally for objects and the right IPL and left insula for locations. Together, these results reflect a domain-specific dissociation spanning several cortices and task periods. Furthermore, differential activations suggest a general caudal-rostral separation corresponding to object and location memory, respectively.

  8. Sex Differences in Object Location Memory: Some Further Methodological Considerations

    Science.gov (United States)

    Gallagher, Peter; Neave, Nick; Hamilton, Colin; Gray, John M.

    2006-01-01

    Previously it has been reported that female performance on the recall of objects and their locations in a spatial array is superior to that of males. This may reflect underlying information-processing biases whereby males organize information in a self-referential manner while females adopt a more comprehensive approach. The known female advantage…

  9. Object trajectory-based activity classification and recognition using hidden Markov models.

    Science.gov (United States)

    Bashir, Faisal I; Khokhar, Ashfaq A; Schonfeld, Dan

    2007-07-01

    Motion trajectories provide rich spatiotemporal information about an object's activity. This paper presents novel classification algorithms for recognizing object activity using object motion trajectory. In the proposed classification system, trajectories are segmented at points of change in curvature, and the subtrajectories are represented by their principal component analysis (PCA) coefficients. We first present a framework to robustly estimate the multivariate probability density function based on PCA coefficients of the subtrajectories using Gaussian mixture models (GMMs). We show that GMM-based modeling alone cannot capture the temporal relations and ordering between underlying entities. To address this issue, we use hidden Markov models (HMMs) with a data-driven design in terms of number of states and topology (e.g., left-right versus ergodic). Experiments using a database of over 5700 complex trajectories (obtained from UCI-KDD data archives and Columbia University Multimedia Group) subdivided into 85 different classes demonstrate the superiority of our proposed HMM-based scheme using PCA coefficients of subtrajectories in comparison with other techniques in the literature.

  10. Detection of hidden objects using a real-time 3-D millimeter-wave imaging system

    Science.gov (United States)

    Rozban, Daniel; Aharon, Avihai; Levanon, Assaf; Abramovich, Amir; Yitzhaky, Yitzhak; Kopeika, N. S.

    2014-10-01

    Millimeter (mm)and sub-mm wavelengths or terahertz (THz) band have several properties that motivate their use in imaging for security applications such as recognition of hidden objects, dangerous materials, aerosols, imaging through walls as in hostage situations, and also in bad weather conditions. There is no known ionization hazard for biological tissue, and atmospheric degradation of THz radiation is relatively low for practical imaging distances. We recently developed a new technology for the detection of THz radiation. This technology is based on very inexpensive plasma neon indicator lamps, also known as Glow Discharge Detector (GDD), that can be used as very sensitive THz radiation detectors. Using them, we designed and constructed a Focal Plane Array (FPA) and obtained recognizable2-dimensional THz images of both dielectric and metallic objects. Using THz wave it is shown here that even concealed weapons made of dielectric material can be detected. An example is an image of a knife concealed inside a leather bag and also under heavy clothing. Three-dimensional imaging using radar methods can enhance those images since it can allow the isolation of the concealed objects from the body and environmental clutter such as nearby furniture or other people. The GDDs enable direct heterodyning between the electric field of the target signal and the reference signal eliminating the requirement for expensive mixers, sources, and Low Noise Amplifiers (LNAs).We expanded the ability of the FPA so that we are able to obtain recognizable 2-dimensional THz images in real time. We show here that the THz detection of objects in three dimensions, using FMCW principles is also applicable in real time. This imaging system is also shown here to be capable of imaging objects from distances allowing standoff detection of suspicious objects and humans from large distances.

  11. Coding of object location in the vibrissal thalamocortical system.

    Science.gov (United States)

    Yu, Chunxiu; Horev, Guy; Rubin, Naama; Derdikman, Dori; Haidarliu, Sebastian; Ahissar, Ehud

    2015-03-01

    In whisking rodents, object location is encoded at the receptor level by a combination of motor and sensory related signals. Recoding of the encoded signals can result in various forms of internal representations. Here, we examined the coding schemes occurring at the first forebrain level that receives inputs necessary for generating such internal representations--the thalamocortical network. Single units were recorded in 8 thalamic and cortical stations in artificially whisking anesthetized rats. Neuronal representations of object location generated across these stations and expressed in response latency and magnitude were classified based on graded and binary coding schemes. Both graded and binary coding schemes occurred across the entire thalamocortical network, with a general tendency of graded-to-binary transformation from thalamus to cortex. Overall, 63% of the neurons of the thalamocortical network coded object position in their firing. Thalamocortical responses exhibited a slow dynamics during which the amount of coded information increased across 4-5 whisking cycles and then stabilized. Taken together, the results indicate that the thalamocortical network contains dynamic mechanisms that can converge over time on multiple coding schemes of object location, schemes which essentially transform temporal coding to rate coding and gradual to labeled-line coding.

  12. Accurate location estimation of moving object In Wireless Sensor network

    Directory of Open Access Journals (Sweden)

    Vinay Bhaskar Semwal

    2011-12-01

    Full Text Available One of the central issues in wirless sensor networks is track the location, of moving object which have overhead of saving data, an accurate estimation of the target location of object with energy constraint .We do not have any mechanism which control and maintain data .The wireless communication bandwidth is also very limited. Some field which is using this technique are flood and typhoon detection, forest fire detection, temperature and humidity and ones we have these information use these information back to a central air conditioning and ventilation.In this research paper, we propose protocol based on the prediction and adaptive based algorithm which is using less sensor node reduced by an accurate estimation of the target location. We had shown that our tracking method performs well in terms of energy saving regardless of mobility pattern of the mobile target. We extends the life time of network with less sensor node. Once a new object is detected, a mobile agent will be initiated to track the roaming path of the object.

  13. Working memory contributes to the encoding of object location associations: Support for a 3-part model of object location memory.

    Science.gov (United States)

    Gillis, M Meredith; Garcia, Sarah; Hampstead, Benjamin M

    2016-09-15

    A recent model by Postma and colleagues posits that the encoding of object location associations (OLAs) requires the coordination of several cognitive processes mediated by ventral (object perception) and dorsal (spatial perception) visual pathways as well as the hippocampus (feature binding) [1]. Within this model, frontoparietal network recruitment is believed to contribute to both the spatial processing and working memory task demands. The current study used functional magnetic resonance imaging (fMRI) to test each step of this model in 15 participants who encoded OLAs and performed standard n-back tasks. As expected, object processing resulted in activation of the ventral visual stream. Object in location processing resulted in activation of both the ventral and dorsal visual streams as well as a lateral frontoparietal network. This condition was also the only one to result in medial temporal lobe activation, supporting its role in associative learning. A conjunction analysis revealed areas of shared activation between the working memory and object in location phase within the lateral frontoparietal network, anterior insula, and basal ganglia; consistent with prior working memory literature. Overall, findings support Postma and colleague's model and provide clear evidence for the role of working memory during OLA encoding.

  14. Processing ser and estar to locate objects and events

    Science.gov (United States)

    Dussias, Paola E.; Contemori, Carla; Román, Patricia

    2016-01-01

    In Spanish locative constructions, a different form of the copula is selected in relation to the semantic properties of the grammatical subject: sentences that locate objects require estar while those that locate events require ser (both translated in English as ‘to be’). In an ERP study, we examined whether second language (L2) speakers of Spanish are sensitive to the selectional restrictions that the different types of subjects impose on the choice of the two copulas. Twenty-four native speakers of Spanish and two groups of L2 Spanish speakers (24 beginners and 18 advanced speakers) were recruited to investigate the processing of ‘object/event + estar/ser’ permutations. Participants provided grammaticality judgments on correct (object + estar; event + ser) and incorrect (object + ser; event + estar) sentences while their brain activity was recorded. In line with previous studies (Leone-Fernández, Molinaro, Carreiras, & Barber, 2012; Sera, Gathje, & Pintado, 1999), the results of the grammaticality judgment for the native speakers showed that participants correctly accepted object + estar and event + ser constructions. In addition, while ‘object + ser’ constructions were considered grossly ungrammatical, ‘event + estar’ combinations were perceived as unacceptable to a lesser degree. For these same participants, ERP recording time-locked to the onset of the critical word ‘en’ showed a larger P600 for the ser predicates when the subject was an object than when it was an event (*La silla es en la cocina vs. La fiesta es en la cocina). This P600 effect is consistent with syntactic repair of the defining predicate when it does not fit with the adequate semantic properties of the subject. For estar predicates (La silla está en la cocina vs. *La fiesta está en la cocina), the findings showed a central-frontal negativity between 500–700 ms. Grammaticality judgment data for the L2 speakers of Spanish showed that beginners were significantly less

  15. Determinants of novel object and location recognition during development.

    Science.gov (United States)

    Jablonski, S A; Schreiber, W B; Westbrook, S R; Brennan, L E; Stanton, M E

    2013-11-01

    In the novel object recognition (OR) paradigm, rats are placed in an arena where they encounter two sample objects during a familiarization phase. A few minutes later, they are returned to the same arena and are presented with a familiar object and a novel object. The object location recognition (OL) variant involves the same familiarization procedure but during testing one of the familiar objects is placed in a novel location. Normal adult rats are able to perform both the OR and OL tasks, as indicated by enhanced exploration of the novel vs. the familiar test item. Rats with hippocampal lesions perform the OR but not OL task indicating a role of spatial memory in OL. Recently, these tasks have been used to study the ontogeny of spatial memory but the literature has yielded conflicting results. The current experiments add to this literature by: (1) behaviorally characterizing these paradigms in postnatal day (PD) 21, 26 and 31-day-old rats; (2) examining the role of NMDA systems in OR vs. OL; and (3) investigating the effects of neonatal alcohol exposure on both tasks. Results indicate that normal-developing rats are able to perform OR and OL by PD21, with greater novelty exploration in the OR task at each age. Second, memory acquisition in the OL but not OR task requires NMDA receptor function in juvenile rats [corrected]. Lastly, neonatal alcohol exposure does not disrupt performance in either task. Implications for the ontogeny of incidental spatial learning and its disruption by developmental alcohol exposure are discussed.

  16. PREDICTION OF LOCATION OF HIDDEN ORE DEPOSITS IN THE AGED ORE FIELDS:AN EXAMPLE FROM FENGHUANGSHAN ORE FIELD,TONGLING,CHINA

    Institute of Scientific and Technical Information of China (English)

    LIU; Liang-ming; PENG; Sheng-lin; YIANG; Qun-zhou; SHAO; Yong-jun; WANG; Zhi-qiang

    2001-01-01

    This paper discusses the strategy for successfully predicting the location of potential hidden ore bodies in aged ore field,and presents the result of location prediction of hidden ore bodies in Fenghuangshan ore field,Tongling.Innovative conceptual targeting procedures based on a genetic understanding of mineralization systems,carefully geological investigation and correct deduction,together with new geochemical and geophysical technology and integrating of comprehensive information are all very important for the successful prediction.In the aged Fenghuangshan ore field,through researching by application of the metallogenic theory of polygenetic compound ore deposits and triple-frequency induced polarization method and exploration tectono-geochemical method,we predicted location and quality of hidden ore bodies.According to the prediction,hidden high quality Cu-Au ore bodies of skarn type and porphyry type have been discovered.

  17. Estimating distribution of hidden objects with drones: from tennis balls to manatees.

    Directory of Open Access Journals (Sweden)

    Julien Martin

    Full Text Available Unmanned aerial vehicles (UAV, or drones, have been used widely in military applications, but more recently civilian applications have emerged (e.g., wildlife population monitoring, traffic monitoring, law enforcement, oil and gas pipeline threat detection. UAV can have several advantages over manned aircraft for wildlife surveys, including reduced ecological footprint, increased safety, and the ability to collect high-resolution geo-referenced imagery that can document the presence of species without the use of a human observer. We illustrate how geo-referenced data collected with UAV technology in combination with recently developed statistical models can improve our ability to estimate the distribution of organisms. To demonstrate the efficacy of this methodology, we conducted an experiment in which tennis balls were used as surrogates of organisms to be surveyed. We used a UAV to collect images of an experimental field with a known number of tennis balls, each of which had a certain probability of being hidden. We then applied spatially explicit occupancy models to estimate the number of balls and created precise distribution maps. We conducted three consecutive surveys over the experimental field and estimated the total number of balls to be 328 (95%CI: 312, 348. The true number was 329 balls, but simple counts based on the UAV pictures would have led to a total maximum count of 284. The distribution of the balls in the field followed a simulated environmental gradient. We also were able to accurately estimate the relationship between the gradient and the distribution of balls. Our experiment demonstrates how this technology can be used to create precise distribution maps in which discrete regions of the study area are assigned a probability of presence of an object. Finally, we discuss the applicability and relevance of this experimental study to the case study of Florida manatee distribution at power plants.

  18. Estimating Distribution of Hidden Objects with Drones: From Tennis Balls to Manatees

    Science.gov (United States)

    Martin, Julien; Edwards, Holly H.; Burgess, Matthew A.; Percival, H. Franklin; Fagan, Daniel E.; Gardner, Beth E.; Ortega-Ortiz, Joel G.; Ifju, Peter G.; Evers, Brandon S.; Rambo, Thomas J.

    2012-01-01

    Unmanned aerial vehicles (UAV), or drones, have been used widely in military applications, but more recently civilian applications have emerged (e.g., wildlife population monitoring, traffic monitoring, law enforcement, oil and gas pipeline threat detection). UAV can have several advantages over manned aircraft for wildlife surveys, including reduced ecological footprint, increased safety, and the ability to collect high-resolution geo-referenced imagery that can document the presence of species without the use of a human observer. We illustrate how geo-referenced data collected with UAV technology in combination with recently developed statistical models can improve our ability to estimate the distribution of organisms. To demonstrate the efficacy of this methodology, we conducted an experiment in which tennis balls were used as surrogates of organisms to be surveyed. We used a UAV to collect images of an experimental field with a known number of tennis balls, each of which had a certain probability of being hidden. We then applied spatially explicit occupancy models to estimate the number of balls and created precise distribution maps. We conducted three consecutive surveys over the experimental field and estimated the total number of balls to be 328 (95%CI: 312, 348). The true number was 329 balls, but simple counts based on the UAV pictures would have led to a total maximum count of 284. The distribution of the balls in the field followed a simulated environmental gradient. We also were able to accurately estimate the relationship between the gradient and the distribution of balls. Our experiment demonstrates how this technology can be used to create precise distribution maps in which discrete regions of the study area are assigned a probability of presence of an object. Finally, we discuss the applicability and relevance of this experimental study to the case study of Florida manatee distribution at power plants. PMID:22761712

  19. Estimating distribution of hidden objects with drones: from tennis balls to manatees.

    Science.gov (United States)

    Martin, Julien; Edwards, Holly H; Burgess, Matthew A; Percival, H Franklin; Fagan, Daniel E; Gardner, Beth E; Ortega-Ortiz, Joel G; Ifju, Peter G; Evers, Brandon S; Rambo, Thomas J

    2012-01-01

    Unmanned aerial vehicles (UAV), or drones, have been used widely in military applications, but more recently civilian applications have emerged (e.g., wildlife population monitoring, traffic monitoring, law enforcement, oil and gas pipeline threat detection). UAV can have several advantages over manned aircraft for wildlife surveys, including reduced ecological footprint, increased safety, and the ability to collect high-resolution geo-referenced imagery that can document the presence of species without the use of a human observer. We illustrate how geo-referenced data collected with UAV technology in combination with recently developed statistical models can improve our ability to estimate the distribution of organisms. To demonstrate the efficacy of this methodology, we conducted an experiment in which tennis balls were used as surrogates of organisms to be surveyed. We used a UAV to collect images of an experimental field with a known number of tennis balls, each of which had a certain probability of being hidden. We then applied spatially explicit occupancy models to estimate the number of balls and created precise distribution maps. We conducted three consecutive surveys over the experimental field and estimated the total number of balls to be 328 (95%CI: 312, 348). The true number was 329 balls, but simple counts based on the UAV pictures would have led to a total maximum count of 284. The distribution of the balls in the field followed a simulated environmental gradient. We also were able to accurately estimate the relationship between the gradient and the distribution of balls. Our experiment demonstrates how this technology can be used to create precise distribution maps in which discrete regions of the study area are assigned a probability of presence of an object. Finally, we discuss the applicability and relevance of this experimental study to the case study of Florida manatee distribution at power plants.

  20. Functional Evaluation of Hidden Figures Object Analysis in Children with Autistic Disorder

    Science.gov (United States)

    Malisza, Krisztina L.; Clancy, Christine; Shiloff, Deborah; Foreman, Derek; Holden, Jeanette; Jones, Cheryl; Paulson, K.; Summers, Randy; Yu, C. T.; Chudley, Albert E.

    2011-01-01

    Functional magnetic resonance imaging (fMRI) during performance of a hidden figures task (HFT) was used to compare differences in brain function in children diagnosed with autism disorder (AD) compared to children with attention-deficit/hyperactivity disorder (ADHD) and typical controls (TC). Overall greater functional MRI activity was observed in…

  1. Can domestic dogs (Canis familiaris) use referential emotional expressions to locate hidden food?

    Science.gov (United States)

    Buttelmann, David; Tomasello, Michael

    2013-01-01

    Although many studies have investigated domestic dogs' (Canis familiaris) use of human communicative cues, little is known about their use of humans' emotional expressions. We conducted a study following the general paradigm of Repacholi in Dev Psychol 34:1017-1025, (1998) and tested four breeds of dogs in the laboratory and another breed in the open air. In our study, a human reacted emotionally (happy, neutral or disgust) to the hidden contents of two boxes, after which the dog was then allowed to choose one of the boxes. Dogs tested in the laboratory distinguished between the most distinct of the expressed emotions (Happy-Disgust condition) by choosing appropriately, but performed at chance level when the two emotions were less distinct (Happy-Neutral condition). The breed tested in the open air passed both conditions, but this breed's differing testing setup might have been responsible for their success. Although without meaningful emotional expressions, when given a choice, these subjects chose randomly, their performance did not differ from that in the experimental conditions. Based on the findings revealed in the laboratory, we suggest that some domestic dogs recognize both the directedness and the valence of some human emotional expressions.

  2. Ventral and dorsal visual stream contributions to the perception of object shape and object location.

    Science.gov (United States)

    Zachariou, Valentinos; Klatzky, Roberta; Behrmann, Marlene

    2014-01-01

    Growing evidence suggests that the functional specialization of the two cortical visual pathways may not be as distinct as originally proposed. Here, we explore possible contributions of the dorsal "where/how" visual stream to shape perception and, conversely, contributions of the ventral "what" visual stream to location perception in human adults. Participants performed a shape detection task and a location detection task while undergoing fMRI. For shape detection, comparable BOLD activation in the ventral and dorsal visual streams was observed, and the magnitude of this activation was correlated with behavioral performance. For location detection, cortical activation was significantly stronger in the dorsal than ventral visual pathway and did not correlate with the behavioral outcome. This asymmetry in cortical profile across tasks is particularly noteworthy given that the visual input was identical and that the tasks were matched for difficulty in performance. We confirmed the asymmetry in a subsequent psychophysical experiment in which participants detected changes in either object location or shape, while ignoring the other, task-irrelevant dimension. Detection of a location change was slowed by an irrelevant shape change matched for difficulty, but the reverse did not hold. We conclude that both ventral and dorsal visual streams contribute to shape perception, but that location processing appears to be essentially a function of the dorsal visual pathway.

  3. Impact location of objects hitting the water surface

    Science.gov (United States)

    Kadri, Usama

    2017-04-01

    Analysis of data, recorded on March 8th 2014 at the Comprehensive Test ban Treaty Organisation's hydroacoustic station off Cape Leeuwin Western Australia, reveal pressure signatures of objects impacting at the sea surface which could be associated with falling meteorites as well as the missing Malaysian MH370 airplane. The location of the sources are identified analytically by an inverse solution based on acoustic-gravity wave theory (e.g. see references below) which have been developed and validated experimentally. Apart from the direct contribution to the search efforts after the missing airplane, the method we describe here is very efficient for identifying the location of sources that result in a sudden change in the water pressure in general. References 1. T.Yamamoto,1982.Gravity waves and acoustic waves generated by submarine earthquakes, Soil Dyn. Earthquake Eng., 1, 75-82. 2. M. Stiassnie, 2010. Tsunamis and acoustic-gravity waves from underwater earthquakes, J. Eng. Math., 67, 23-32, doi:10.1007/s10665-009-9323-x. 3. U. Kadri and M. Staissnie, 2012. Acoustic-gravity waves interacting with the shelf break. J. Geophys. Res., 117, C03035, doi: 10.1029/2011JC007674. 4. E. Eyov, A. Klar, U. Kadri and M. Stiassnie, 2013. Progressive waves in a compressible ocean with elastic bottom, Wave Motion 50, 929-939. doi: 10.1016/j.wavemoti.2013.03.003 5. G. Hendin and M. Stiassnie, 2013. Tsunami and acoustic-gravity waves in water of constant depth, Phys. Fluids 25, 086103, doi: 10.1063/1.481799. 6. U. Kadri, 2016. Acoustic-gravity waves from an oscillating ice-block in arctic zones. Advances in Acoustics and Vibration, 8076108, http://dx.doi.org/10.1155/2016/8076108 7. T.C.A. Oliveira, U. Kadri, 2016. Acoustic-gravity waves from the 2004 Indian Ocean earthquake and tsunami. Journal of Geophysical Research: Oceans. doi: 10.1002/2016JC011742

  4. Neural Network Approach to Locating Cryptography in Object Code

    Energy Technology Data Exchange (ETDEWEB)

    Jason L. Wright; Milos Manic

    2009-09-01

    Finding and identifying cryptography is a growing concern in the malware analysis community. In this paper, artificial neural networks are used to classify functional blocks from a disassembled program as being either cryptography related or not. The resulting system, referred to as NNLC (Neural Net for Locating Cryptography) is presented and results of applying this system to various libraries are described.

  5. Geophysics-based method of locating a stationary earth object

    Science.gov (United States)

    Daily, Michael R.; Rohde, Steven B.; Novak, James L.

    2008-05-20

    A geophysics-based method for determining the position of a stationary earth object uses the periodic changes in the gravity vector of the earth caused by the sun- and moon-orbits. Because the local gravity field is highly irregular over a global scale, a model of local tidal accelerations can be compared to actual accelerometer measurements to determine the latitude and longitude of the stationary object.

  6. Distributed multi-dimensional hidden Markov model: theory and application in multiple-object trajectory classification and recognition

    Science.gov (United States)

    Ma, Xiang; Schonfeld, Dan; Khokhar, Ashfaq

    2008-01-01

    In this paper, we propose a novel distributed causal multi-dimensional hidden Markov model (DHMM). The proposed model can represent, for example, multiple motion trajectories of objects and their interaction activities in a scene; it is capable of conveying not only dynamics of each trajectory, but also interactions information between multiple trajectories, which can be critical in many applications. We firstly provide a solution for non-causal, multi-dimensional hidden Markov model (HMM) by distributing the non-causal model into multiple distributed causal HMMs. We approximate the simultaneous solution of multiple HMMs on a sequential processor by an alternate updating scheme. Subsequently we provide three algorithms for the training and classification of our proposed model. A new Expectation-Maximization (EM) algorithm suitable for estimation of the new model is derived, where a novel General Forward-Backward (GFB) algorithm is proposed for recursive estimation of the model parameters. A new conditional independent subset-state sequence structure decomposition of state sequences is proposed for the 2D Viterbi algorithm. The new model can be applied to many other areas such as image segmentation and image classification. Simulation results in classification of multiple interacting trajectories demonstrate the superior performance and higher accuracy rate of our distributed HMM in comparison to previous models.

  7. Differential effects of spaced vs. massed training in long-term object-identity and object-location recognition memory.

    Science.gov (United States)

    Bello-Medina, Paola C; Sánchez-Carrasco, Livia; González-Ornelas, Nadia R; Jeffery, Kathryn J; Ramírez-Amaya, Víctor

    2013-08-01

    Here we tested whether the well-known superiority of spaced training over massed training is equally evident in both object identity and object location recognition memory. We trained animals with objects placed in a variable or in a fixed location to produce a location-independent object identity memory or a location-dependent object representation. The training consisted of 5 trials that occurred either on one day (Massed) or over the course of 5 consecutive days (Spaced). The memory test was done in independent groups of animals either 24h or 7 days after the last training trial. In each test the animals were exposed to either a novel object, when trained with the objects in variable locations, or to a familiar object in a novel location, when trained with objects in fixed locations. The difference in time spent exploring the changed versus the familiar objects was used as a measure of recognition memory. For the object-identity-trained animals, spaced training produced clear evidence of recognition memory after both 24h and 7 days, but massed-training animals showed it only after 24h. In contrast, for the object-location-trained animals, recognition memory was evident after both retention intervals and with both training procedures. When objects were placed in variable locations for the two types of training and the test was done with a brand-new location, only the spaced-training animals showed recognition at 24h, but surprisingly, after 7 days, animals trained using both procedures were able to recognize the change, suggesting a post-training consolidation process. We suggest that the two training procedures trigger different neural mechanisms that may differ in the two segregated streams that process object information and that may consolidate differently.

  8. Binding Objects to Locations: The Relationship between Object Files and Visual Working Memory

    Science.gov (United States)

    Hollingworth, Andrew; Rasmussen, Ian P.

    2010-01-01

    The relationship between object files and visual working memory (VWM) was investigated in a new paradigm combining features of traditional VWM experiments (color change detection) and object-file experiments (memory for the properties of moving objects). Object-file theory was found to account for a key component of object-position binding in VWM:…

  9. Anderson's absolute objects and constant timelike vector hidden in Dirac matrices

    OpenAIRE

    2001-01-01

    Anderson's theorem asserting, that symmetry of dynamic equations written in the relativisitically covariant form is determined by symmetry of its absolute objects, is applied to the free Dirac equation. Dirac matrices are the only absolute objects of the Dirac equation. There are two ways of the Dirac matrices transformation: (1) Dirac matrices form a 4-vector and wave function is a scalar, (2) Dirac matrices are scalars and the wave function is a spinor. In the first case the Dirac equation ...

  10. The visual extent of an object: suppose we know the object locations

    NARCIS (Netherlands)

    Uijlings, J.R.R.; Smeulders, A.W.M.; Scha, R.J.H.

    2012-01-01

    The visual extent of an object reaches beyond the object itself. This is a long standing fact in psychology and is reflected in image retrieval techniques which aggregate statistics from the whole image in order to identify the object within. However, it is unclear to what degree and how the visual

  11. Location and acquisition of objects in unpredictable locations. [a teleoperator system with a computer for manipulator control

    Science.gov (United States)

    Sword, A. J.; Park, W. T.

    1975-01-01

    A teleoperator system with a computer for manipulator control to combine the capabilities of both man and computer to accomplish a task is described. This system allows objects in unpredictable locations to be successfully located and acquired. By using a method of characterizing the work-space together with man's ability to plan a strategy and coarsely locate an object, the computer is provided with enough information to complete the tedious part of the task. In addition, the use of voice control is shown to be a useful component of the man/machine interface.

  12. Multi-sensor millimeter-wave system for hidden objects detection by non-collaborative screening

    Science.gov (United States)

    Zouaoui, Rhalem; Czarny, Romain; Diaz, Frédéric; Khy, Antoine; Lamarque, Thierry

    2011-05-01

    In this work, we present the development of a multi-sensor system for the detection of objects concealed under clothes using passive and active millimeter-wave (mmW) technologies. This study concerns both the optimization of a commercial passive mmW imager at 94 GHz using a phase mask and the development of an active mmW detector at 77 GHz based on synthetic aperture radar (SAR). A first wide-field inspection is done by the passive imager while the person is walking. If a suspicious area is detected, the active imager is switched-on and focused on this area in order to obtain more accurate data (shape of the object, nature of the material ...).

  13. Anderson's absolute objects and constant timelike vector hidden in Dirac matrices

    CERN Document Server

    Rylov, Yu A

    2001-01-01

    Anderson's theorem asserting, that symmetry of dynamic equations written in the relativisitically covariant form is determined by symmetry of its absolute objects, is applied to the free Dirac equation. Dirac matrices are the only absolute objects of the Dirac equation. There are two ways of the Dirac matrices transformation: (1) Dirac matrices form a 4-vector and wave function is a scalar, (2) Dirac matrices are scalars and the wave function is a spinor. In the first case the Dirac equation is nonrelativistic, in the second one it is relativistic. Transforming Dirac equation to another scalar-vector variables, one shows that the first way of transformation is valid, and the Dirac equation is not relativistic

  14. Feature or location? Infants and adults adopt different strategies to search for a hidden toy in an ambiguous task.

    Science.gov (United States)

    Oláh, Katalin; Kupán, Krisztina; Csík, Andor; Király, Ildikó; Topál, József

    2015-11-01

    Evidence suggests that infants and adults attribute different importance to certain object properties when performing object-directed actions. Namely, infants tend to rely on information about an object's location, whereas adults are more likely to base their actions on its features. In this study, we tested whether the strategic choices of infants (aged 13 months) and adults would be modified by the context of the demonstration. Participants watched as an experimenter hid a ball under one of two different coloured containers, using either a communicative or a non-communicative manner. Then, the locations of the two containers were changed out of sight of the participant. During the test, participants were encouraged to look for the ball under one of the containers. We found that adults were more likely to follow a feature-based strategy than infants. However, there was no effect of the context of the demonstration, suggesting that communication may play different roles in encoding object properties and directing overt behaviour. Copyright © 2015 Elsevier Inc. All rights reserved.

  15. 基于标记树对象抽取技术的Hidden Web获取研究%Research on the Hidden Web Retrieval with Tag-Tree-based Object Extraction Technique

    Institute of Scientific and Technical Information of China (English)

    宋晖; 张岭; 叶允明; 马范援

    2002-01-01

    目前标准的搜索引擎能够检索的仅仅是World Wide Web提供的小部分称为可索引的Web信息.大量的Hidden Web信息(估计容量是可索引Web的500倍)对这些搜索引擎是不可见的.这些信息隐藏在Web页面的搜索表单后面,保存在大型的动态数据库中.该文提出了一套检索Hidden Web信息的方法,给出了系统的框架结构,并详细讨论了实现的关键技术.系统采用新的基于标记树的对象抽取(Tag-Tree-based Object Extraction)方法自动地从Web页面中抽取Hidden Web信息,然后在此基础上给出了结构化的Hidden Web信息查询算法.文章最后对实验结果进行了讨论.

  16. Non-invasive, near-field terahertz imaging of hidden objects using a single pixel detector

    CERN Document Server

    Stantchev, R I; Hornett, S M; Hobson, P A; Gibson, G M; Padgett, M J; Hendry, E

    2015-01-01

    Terahertz (THz) imaging has the ability to see through otherwise opaque materials. However, due to the long wavelengths of THz radiation ({\\lambda}=300{\\mu}m at 1THz), far-field THz imaging techniques are heavily outperformed by optical imaging in regards to the obtained resolution. In this work we demonstrate near-field THz imaging with a single-pixel detector. We project a time-varying optical mask onto a silicon wafer which is used to spatially modulate a pulse of THz radiation. The far-field transmission corresponding to each mask is recorded by a single element detector and this data is used to reconstruct the image of an object placed on the far side of the silicon wafer. We demonstrate a proof of principal application where we image a printed circuit board on the underside of a 115{\\mu}m thick silicon wafer with ~100{\\mu}m ({\\lambda}/4) resolution. With subwavelength resolution and the inherent sensitivity to local conductivity provided by the THz probe frequencies, we show that it is possible to detec...

  17. The Dense Plasma Focus Opportunities in Detection of Hidden Objects by Using Nanosecond Impulse Neutron Inspection System (NINIS)

    Science.gov (United States)

    Gribkov, V.; Dubrovsky, A.; Karpiński, L.; Miklaszewski, R.; Paduch, M.; Scholz, M.; StrzyŻewski, P.; Tomaszewski, K.

    2006-12-01

    Dense Plasma Focus device is proposed for use as a neutron source to generate very powerful pulses of neutrons in the nanosecond (ns) range of its duration. Our devices PF-6, recently put into operation at the Institute of Plasma Physics and Laser Microfusion, Warsaw, Poland, and PF-10 belonging to the Institute for Theoretical and Experimental Physics, Moscow, Russia, have energy storages in its capacitor banks 7.4 kJ and 13 kJ as a maximum. Operated with the DPF chambers of a special design they have a current maximum up to ˜760 kA with a quarter period of the discharge equal to 1 microsecond. They generate circa 109 of 2.5-MeV neutrons in one pulse of ≅ 10-ns duration when working with deuterium, what permit to expect 1011 14-MeV neutrons at their operation with DT-mixture. This feature gives a principal possibility to create a "single-shot detection system" for interrogation of hidden objects. It means that all necessary information will be received during a single bright pulse of neutrons having duration in a nanosecond range by means of the time-of-flight technique with a short flight base. It might be a base for the creation of the Nanosecond Impulse Neutron Inspection System (NINIS). These characteristics of the neutron source open a number of opportunities while interrogation time in this case would now depend only on the data-processing system.

  18. The roles of scene priming and location priming in object-scene consistency effects.

    Science.gov (United States)

    Heise, Nils; Ansorge, Ulrich

    2014-01-01

    Presenting consistent objects in scenes facilitates object recognition as compared to inconsistent objects. Yet the mechanisms by which scenes influence object recognition are still not understood. According to one theory, consistent scenes facilitate visual search for objects at expected places. Here, we investigated two predictions following from this theory: If visual search is responsible for consistency effects, consistency effects could be weaker (1) with better-primed than less-primed object locations, and (2) with less-primed than better-primed scenes. In Experiments 1 and 2, locations of objects were varied within a scene to a different degree (one, two, or four possible locations). In addition, object-scene consistency was studied as a function of progressive numbers of repetitions of the backgrounds. Because repeating locations and backgrounds could facilitate visual search for objects, these repetitions might alter the object-scene consistency effect by lowering of location uncertainty. Although we find evidence for a significant consistency effect, we find no clear support for impacts of scene priming or location priming on the size of the consistency effect. Additionally, we find evidence that the consistency effect is dependent on the eccentricity of the target objects. These results point to only small influences of priming to object-scene consistency effects but all-in-all the findings can be reconciled with a visual-search explanation of the consistency effect.

  19. Ontogeny of object versus location recognition in the rat: acquisition and retention effects.

    Science.gov (United States)

    Westbrook, Sara R; Brennan, Lauren E; Stanton, Mark E

    2014-11-01

    Novel object and location recognition tasks harness the rat's natural tendency to explore novelty (Berlyne, 1950) to study incidental learning. The present study examined the ontogenetic profile of these two tasks and retention of spatial learning between postnatal day (PD) 17 and 31. Experiment 1 showed that rats ages PD17, 21, and 26 recognize novel objects, but only PD21 and PD26 rats recognize a novel location of a familiar object. These results suggest that novel object recognition develops before PD17, while object location recognition emerges between PD17 and PD21. Experiment 2 studied the ontogenetic profile of object location memory retention in PD21, 26, and 31 rats. PD26 and PD31 rats retained the object location memory for both 10-min and 24-hr delays. PD21 rats failed to retain the object location memory for the 24-hr delay, suggesting differential development of short- versus long-term memory in the ontogeny of object location memory.

  20. Accurate location estimation of moving object with energy constraint & adaptive update algorithms to save data

    CERN Document Server

    Semwal, Vijay Bhaskar; Bhaskar, Vinay S; Sati, Meenakshi

    2011-01-01

    In research paper "Accurate estimation of the target location of object with energy constraint & Adaptive Update Algorithms to Save Data" one of the central issues in sensor networks is track the location, of moving object which have overhead of saving data, an accurate estimation of the target location of object with energy constraint .We do not have any mechanism which control and maintain data .The wireless communication bandwidth is also very limited. Some field which is using this technique are flood and typhoon detection, forest fire detection, temperature and humidity and ones we have these information use these information back to a central air conditioning and ventilation system. In this research paper, we propose protocol based on the prediction and adaptive based algorithm which is using less sensor node reduced by an accurate estimation of the target location. we are using minimum three sensor node to get the accurate position .We can extend it upto four or five to find more accurate location ...

  1. Microwave determination of location and speed of an object inside a pipe

    Science.gov (United States)

    Sinha, Dipen N.

    2010-12-14

    Apparatus and method are described for measuring the location and speed of an object, such as instrumentation on a movable platform, disposed within a pipe, using continuous-wave, amplitude-modulated microwave radiation.

  2. Object-location memory: A lesion-behavior mapping study in stroke patients

    NARCIS (Netherlands)

    Asselen, M. van; Kessels, R.P.C.; Frijns, C.J.M.; Kappelle, L.J.; Neggers, S.F.W.; Postma, A.

    2009-01-01

    Object-location memory is an important form of spatial memory, comprising different subcomponents that each process specific types of information within memory, i.e. remembering objects, remembering positions and binding these features in memory. In the current study we investigated the neural

  3. Enhancement of the visibility of objects located below the surface of a scattering medium

    Science.gov (United States)

    Demos, Stavros

    2013-11-19

    Techniques are provided for enhancing the visibility of objects located below the surface of a scattering medium such as tissue, water and smoke. Examples of such an object include a vein located below the skin, a mine located below the surface of the sea and a human in a location covered by smoke. The enhancement of the image contrast of a subsurface structure is based on the utilization of structured illumination. In the specific application of this invention to image the veins in the arm or other part of the body, the issue of how to control the intensity of the image of a metal object (such as a needle) that must be inserted into the vein is also addressed.

  4. Enhancement of the visibility of objects located below the surface of a scattering medium

    Energy Technology Data Exchange (ETDEWEB)

    Demos, Stavros

    2013-11-19

    Techniques are provided for enhancing the visibility of objects located below the surface of a scattering medium such as tissue, water and smoke. Examples of such an object include a vein located below the skin, a mine located below the surface of the sea and a human in a location covered by smoke. The enhancement of the image contrast of a subsurface structure is based on the utilization of structured illumination. In the specific application of this invention to image the veins in the arm or other part of the body, the issue of how to control the intensity of the image of a metal object (such as a needle) that must be inserted into the vein is also addressed.

  5. A bi-objective model for emergency services location-allocation problem with maximum distance constraint

    Directory of Open Access Journals (Sweden)

    Mansoureh Haj Mohammad Hosseini

    2011-04-01

    Full Text Available In this paper, a bi-objective mathematical model for emergency services location-allocation problem on a tree network considering maximum distance constraint is presented. The first objective function called centdian is a weighted mean of a minisum and a minimax criterion and the second one is a maximal covering criterion. For the solution of the bi-objective optimization problem, the problem is split in two sub problems: the selection of the best set of locations, and a demand assignment problem to evaluate each selection of locations. We propose a heuristic algorithm to characterize the efficient location point set on the network. Finally, some numerical examples are presented to illustrate the effectiveness of the proposed algorithms.

  6. Effects of healthy ageing on precision and binding of object location in visual short term memory.

    Science.gov (United States)

    Pertzov, Yoni; Heider, Maike; Liang, Yuying; Husain, Masud

    2015-03-01

    Visual short term memory (STM) declines as people get older, but the nature of this deterioration is not well understood. We tested 139 healthy subjects (19-83 years) who were first required to identify a previously seen object and then report its location using a touchscreen. Results demonstrated an age-related decline in both object identification and localization. Deterioration in localization performance was apparent even when only 1 item had to be remembered, worsening disproportionately with increasing memory load. Thus, age-dependent memory degradation cannot be explained simply by a decrease in the number of items that can be held in visual STM but rather by the precision with which they are recalled. More important, there was no evidence for a significant decrease in object-location binding with increasing age. Thus, although precision for object identity and location declines with age, the ability to associate object identity to its location seems to remain unimpaired. As it has been reported that binding deficits in STM might be the first cognitive signs of early Alzheimer's disease (AD), the finding that object-location binding processes are relatively intact with normal aging supports the possible suitability of using misbinding as an index measures for probing early diagnosis of AD.

  7. 3D-Web-GIS RFID location sensing system for construction objects.

    Science.gov (United States)

    Ko, Chien-Ho

    2013-01-01

    Construction site managers could benefit from being able to visualize on-site construction objects. Radio frequency identification (RFID) technology has been shown to improve the efficiency of construction object management. The objective of this study is to develop a 3D-Web-GIS RFID location sensing system for construction objects. An RFID 3D location sensing algorithm combining Simulated Annealing (SA) and a gradient descent method is proposed to determine target object location. In the algorithm, SA is used to stabilize the search process and the gradient descent method is used to reduce errors. The locations of the analyzed objects are visualized using the 3D-Web-GIS system. A real construction site is used to validate the applicability of the proposed method, with results indicating that the proposed approach can provide faster, more accurate, and more stable 3D positioning results than other location sensing algorithms. The proposed system allows construction managers to better understand worksite status, thus enhancing managerial efficiency.

  8. Efficient Top-k Locality Search for Co-located Spatial Web Objects

    DEFF Research Database (Denmark)

    Qu, Qiang; Liu, Siyuan; Yang, Bin

    2014-01-01

    In step with the web being used widely by mobile users, user location is becoming an essential signal in services, including local intent search. Given a large set of spatial web objects consisting of a geographical location and a textual description (e.g., online business directory entries...... of restaurants, bars, and shops), how can we find sets of objects that are both spatially and textually relevant to a query? Most of existing studies solve the problem by requiring that all query keywords are covered by the returned objects and then rank the sets by spatial proximity. The needs for identifying...

  9. Quantifying the perceived interest of objects in images: effects of size, location, blur, and contrast

    Science.gov (United States)

    Kadiyala, Vamsi; Pinneli, Srivani; Larson, Eric C.; Chandler, Damon M.

    2008-02-01

    This paper presents the results of two psychophysical experiments designed to investigate the effects of size, location, blur, and contrast on the perceived visual interest of objects within images. In the first experiment, digital composting was used to create images containing objects (humans, animals, and non-living objects) which varied in controlled increments of size, location, blur, and contrast. Ratings of perceived interest were then measured for each object. We found that: (1) As object size increases, perceived interest increases but exhibits diminished gains for larger sizes; (2) As an object moves from the center of the image toward the image's edge, perceived interest decreases nearly linearly with distance; (3) Blurring imposes a substantial initial decrease in perceived interest, but this drop is relatively lessened for highly blurred objects; (4) As an object's RMS contrast is increased, perceived interest increases nearly linearly. Furthermore, these trends were quite similar for all three categories (human, animal, non-living object). To determine whether these data can predict the perceived interest of objects in real, non-composited images, a second experiment was performed in which subjects rated the visual interest of each of 562 objects in 150 images. Based on these results, an algorithm is presented which, given a segmented image, attempts to generate an object-level interest map.

  10. Narrow Artificial Intelligence with Machine Learning for Real-Time Estimation of a Mobile Agent’s Location Using Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Cédric Beaulac

    2017-01-01

    Full Text Available We propose to use a supervised machine learning technique to track the location of a mobile agent in real time. Hidden Markov Models are used to build artificial intelligence that estimates the unknown position of a mobile target moving in a defined environment. This narrow artificial intelligence performs two distinct tasks. First, it provides real-time estimation of the mobile agent’s position using the forward algorithm. Second, it uses the Baum–Welch algorithm as a statistical learning tool to gain knowledge of the mobile target. Finally, an experimental environment is proposed, namely, a video game that we use to test our artificial intelligence. We present statistical and graphical results to illustrate the efficiency of our method.

  11. The Female Advantage in Object Location Memory According to the Foraging Hypothesis: A Critical Analysis.

    Science.gov (United States)

    Ecuyer-Dab, Isabelle; Robert, Michèle

    2007-12-01

    According to the evolutionary hypothesis of Silverman and Eals (1992, Sex differences in spatial abilities: Evolutionary theory and data. In J. H. Barkow, L. Cosmides, & J. Tooby (Eds.), The adapted mind: Evolutionary psychology and the generation of culture (pp. 533-549). Oxford: Oxford University Press), women evolutionary hypothesis, women surpass men in object location memory as a result of a sexual division in foraging activities among early humans. After surveying the main anthropological information on ancestral sex-related foraging, we review the evidence on how robust women's advantage in object location memory is. This leads us to suggest that the functional understanding of this type of memory would benefit from comparing men and women in carefully designed and ecologically meaningful cognitive contexts involving, for instance, incidental versus intentional settings that call for either the absolute or relative encoding of the locations of common versus uncommon objects.

  12. Wireless Location Determination for Mobile Objects Based on GSM in Intelligent Transportation Systems

    Institute of Scientific and Technical Information of China (English)

    徐志扬; 施鹏飞

    2003-01-01

    The mobile object (MO) location determination technologies which can be used in intelligent transportation system (ITS) are studied in this paper. The principles and characteristics of wireless location determination technologies are introduced and the characteristics of GSM useful for location determination are also summarized. An experimental positioning system based on GSM is proposed, and the architecture is described. TOA method based on GSM signals and TDOA method are used in the experimental system. Moreover, the methods are simulated. The performance of the positioning methods is assessed in the simulation environment, and the accuracy for 67% mobile stations (MS) is 70m in urban areas.

  13. A New Location Estimation System for Wireless Networks Based on Linear Discriminant Functions and Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Páez-Borrallo José M

    2006-01-01

    Full Text Available Location estimation is a recent interesting research area that 0exploits the possibilities of modern communication technology. In this paper, we present a new location system for wireless networks that is especially suitable for indoor terminal-based architectures, as it improves both the speed and the memory requirements. The algorithm is based on the application of linear discriminant functions and Markovian models and its performance has been compared with other systems presented in the literature. Simulation results show a very good performance in reducing the computing time and memory space and displaying an adequate behavior under conditions of few a priori calibration points per position.

  14. Acute fasting inhibits central caspase-1 activity reducing anxiety-like behavior and increasing novel object and object location recognition.

    Science.gov (United States)

    Towers, Albert E; Oelschlager, Maci L; Patel, Jay; Gainey, Stephen J; McCusker, Robert H; Freund, Gregory G

    2017-06-01

    Inflammation within the central nervous system (CNS) is frequently comorbid with anxiety. Importantly, the pro-inflammatory cytokine most commonly associated with anxiety is IL-1β. The bioavailability and activity of IL-1β are regulated by caspase-1-dependent proteolysis vis-a-vis the inflammasome. Thus, interventions regulating the activation or activity of caspase-1 should reduce anxiety especially in states that foster IL-1β maturation. Male C57BL/6j, C57BL/6j mice treated with the capase-1 inhibitor biotin-YVAD-cmk, caspase-1 knockout (KO) mice and IL-1R1 KO mice were fasted for 24h or allowed ad libitum access to food. Immediately after fasting, caspase-1 activity was measured in brain region homogenates while activated caspase-1 was localized in the brain by immunohistochemistry. Mouse anxiety-like behavior and cognition were tested using the elevated zero maze and novel object/object location tasks, respectively. A 24h fast in mice reduced the activity of caspase-1 in whole brain and in the prefrontal cortex, amygdala, hippocampus, and hypothalamus by 35%, 25%, 40%, 40%, and 40% respectively. A 24h fast also reduced anxiety-like behavior by 40% and increased novel object and object location recognition by 21% and 31%, respectively. IL-1β protein, however, was not reduced in the brain by fasting. ICV administration of YVAD decreased caspase-1 activity in the prefrontal cortex and amygdala by 55%, respectively leading to a 64% reduction in anxiety like behavior. Importantly, when caspase-1 KO or IL1-R1 KO mice are fasted, no fasting-dependent reduction in anxiety-like behavior was observed. Results indicate that fasting decrease anxiety-like behavior and improves memory by a mechanism tied to reducing caspase-1 activity throughout the brain. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Object Location and Object Recognition Memory Impairments, Motivation Deficits and Depression in a Model of Gulf War Illness

    Directory of Open Access Journals (Sweden)

    Bharathi eHattiangady

    2014-03-01

    Full Text Available Memory and mood deficits are the enduring brain-related symptoms in Gulf War illness (GWI. Both animal model and epidemiological investigations have indicated that these impairments in a majority of GW veterans are linked to exposures to chemicals such as pyridostigmine bromide (PB, an anti nerve gas drug, permethrin (PM, an insecticide and DEET (a mosquito repellant encountered during the Persian Gulf War-1. Our previous study in a rat model has shown that combined exposures to low doses of GWI-related (GWIR chemicals PB, PM and DEET with or without 5-minutes of restraint stress (a mild stress paradigm causes hippocampus-dependent spatial memory dysfunction in a water maze test and increased depressive-like behavior in a forced swim test. In this study, using a larger cohort of rats exposed to GWIR-chemicals and stress, we investigated whether the memory deficiency identified earlier in a water maze test is reproducible with an alternative and stress free hippocampus-dependent memory test such as the object location test. We also ascertained the possible co-existence of hippocampus-independent memory dysfunction using a novel object recognition test, and alterations in mood function with additional tests for motivation and depression. Our results provide new evidence that exposure to low doses of GWIR-chemicals and stress for four weeks causes deficits in hippocampus-dependent object location memory and perirhinal cortex-dependent novel object recognition memory. An open field test performed prior to other behavioral analyses revealed that memory impairments were not associated with increased anxiety or deficits in general motor ability. However, behavioral tests for mood function such as a voluntary physical exercise paradigm and a novelty suppressed feeding test showed decreased motivation and depression. Thus, exposure to GWIR-chemicals and stress causes both hippocampus-dependent and hippocampus-independent memory impairments as well as

  16. Object location and object recognition memory impairments, motivation deficits and depression in a model of Gulf War illness.

    Science.gov (United States)

    Hattiangady, Bharathi; Mishra, Vikas; Kodali, Maheedhar; Shuai, Bing; Rao, Xiolan; Shetty, Ashok K

    2014-01-01

    Memory and mood deficits are the enduring brain-related symptoms in Gulf War illness (GWI). Both animal model and epidemiological investigations have indicated that these impairments in a majority of GW veterans are linked to exposures to chemicals such as pyridostigmine bromide (PB, an antinerve gas drug), permethrin (PM, an insecticide) and DEET (a mosquito repellant) encountered during the Persian Gulf War-1. Our previous study in a rat model has shown that combined exposures to low doses of GWI-related (GWIR) chemicals PB, PM, and DEET with or without 5-min of restraint stress (a mild stress paradigm) causes hippocampus-dependent spatial memory dysfunction in a water maze test (WMT) and increased depressive-like behavior in a forced swim test (FST). In this study, using a larger cohort of rats exposed to GWIR-chemicals and stress, we investigated whether the memory deficiency identified earlier in a WMT is reproducible with an alternative and stress free hippocampus-dependent memory test such as the object location test (OLT). We also ascertained the possible co-existence of hippocampus-independent memory dysfunction using a novel object recognition test (NORT), and alterations in mood function with additional tests for motivation and depression. Our results provide new evidence that exposure to low doses of GWIR-chemicals and mild stress for 4 weeks causes deficits in hippocampus-dependent object location memory and perirhinal cortex-dependent novel object recognition memory. An open field test performed prior to other behavioral analyses revealed that memory impairments were not associated with increased anxiety or deficits in general motor ability. However, behavioral tests for mood function such as a voluntary physical exercise paradigm and a novelty suppressed feeding test (NSFT) demonstrated decreased motivation levels and depression. Thus, exposure to GWIR-chemicals and stress causes both hippocampus-dependent and hippocampus-independent memory

  17. Humans use visual and remembered information about object location to plan pointing movements

    NARCIS (Netherlands)

    Brouwer, A.-M.; Knill, D.C.

    2009-01-01

    We investigated whether humans use a target's remembered location to plan reaching movements to targets according to the relative reliabilities of visual and remembered information. Using their index finger, subjects moved a virtual object from one side of a table to the other, and then went back to

  18. ChordPlus:a scalable,decentralized object location and routing algorithm

    Institute of Scientific and Technical Information of China (English)

    柏海寰; 蒋俊杰; 汪为农

    2004-01-01

    Object location is a fundamental problem in distributed system such as grid computing and peer-to-peer environment. Chord is one of the typical scalable object location algorithms for peer-to-peer network. The simplicity, provable correctness and provable performance of Chord make it an attractive option for distributed lookup. However its lookup performance is not satisfying. Based on the decentralized object location mathematical model. This paper proposes ChordPlus, an improved Chord algorithm, by enlarging dimension size of space M (M = 2 in Chord) and utilizing data redundancy technology. ChordPlus is a scalable, fault-tolerant, completely decentralized and self-organizing object location and routing algorithm for overlay network. Results from theoretical analysis and simulation experiments show that increasing the dimension size of space or neighborhood set length can enhance the routing performance of ChordPlus. In a simulation network with 5 000 nodes, the average routing path length of ChordPlus is only as many as half that of Chord algorithm.

  19. A multi-objective location routing problem using imperialist competitive algorithm

    Directory of Open Access Journals (Sweden)

    Amir Mohammad Golmohammadi

    2016-06-01

    Full Text Available Nowadays, most manufacturing units try to locate their requirements and the depot vehicle routing in order to transport the goods at optimum cost. Needless to mention that the locations of the required warehouses influence on the performance of vehicle routing. In this paper, a mathematical programming model to optimize the storage location and vehicle routing are presented. The first objective function of the model minimizes the total cost associated with the transportation and storage, and the second objective function minimizes the difference distance traveled by vehicles. The study uses Imperialist Competitive Algorithm (ICA to solve the resulted problems in different sizes. The preliminary results have indicated that the proposed study has performed better than NSGA-II and PAES methods in terms of Quality metric and Spacing metric.

  20. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  1. A multi-objective imperialist competitive algorithm for a capacitated hub covering location problem

    Directory of Open Access Journals (Sweden)

    M. Mohammadi

    2011-01-01

    Full Text Available The hub location problem appears in a variety of applications, including airline systems, cargo delivery systems and telecommunication network design. Hub location problems deal with finding the location of hub facilities and the allocation of demand nodes to these located hub facilities. In this paper, a new model for the capacitated single allocation hub covering location problem is presented. Instead of using capacity constraints to limit the amount of flow received by the hubs, the second objective function is introduced to minimize service times in the hubs. The service time in the hubs includes the waiting time of received flows in a queue and the time to get services. Due to the NP-hardness of the problem, a new weight-based multi-objective imperialist competitive algorithm (MOICA is designed to find near-optimal solutions. To validate the performance of the proposed algorithm, the solutions obtained by the MOICA are compared by the exact solutions of the mathematical programming model.

  2. A guide to hubble space telescope objects their selection, location, and significance

    CERN Document Server

    Chen, James L

    2015-01-01

    From the authors of "How to Find the Apollo Landing Sites," this is a guide to connecting the view above with the history of recent scientific discoveries from the Hubble Space Telescope. Each selected HST photo is shown with a sky map and a photograph or drawing to illustrate where to find it and how it should appear from a backyard telescope. Here is the casual observer's chance to locate the deep space objects visually, and appreciate the historic Hubble photos in comparison to what is visible from a backyard telescope. HST objects of all types are addressed, from Messier objects, Caldwell objects, and NGC objects, and are arranged in terms of what can be seen during the seasons. Additionally, the reader is given an historical perspective on the work of Edwin Hubble, while locating and viewing the deep space objects that changed astronomy forever.  Countless people have seen the amazing photographs taken by the Hubble Space Telescope. But how many people can actually point out where in the sky ...

  3. Learning object location predictors with boosting and grammar-guided feature extraction

    Energy Technology Data Exchange (ETDEWEB)

    Eads, Damian Ryan [Los Alamos National Laboratory; Rosten, Edward [UNIV OF CAMBRIDGE; Helmbold, David [UC/SANTA CRUZ

    2009-01-01

    The authors present BEAMER: a new spatially exploitative approach to learning object detectors which shows excellent results when applied to the task of detecting objects in greyscale aerial imagery in the presence of ambiguous and noisy data. There are four main contributions used to produce these results. First, they introduce a grammar-guided feature extraction system, enabling the exploration of a richer feature space while constraining the features to a useful subset. This is specified with a rule-based generative grammer crafted by a human expert. Second, they learn a classifier on this data using a newly proposed variant of AdaBoost which takes into account the spatially correlated nature of the data. Third, they perform another round of training to optimize the method of converting the pixel classifications generated by boosting into a high quality set of (x,y) locations. lastly, they carefully define three common problems in object detection and define two evaluation criteria that are tightly matched to these problems. Major strengths of this approach are: (1) a way of randomly searching a broad feature space, (2) its performance when evaluated on well-matched evaluation criteria, and (3) its use of the location prediction domain to learn object detectors as well as to generate detections that perform well on several tasks: object counting, tracking, and target detection. They demonstrate the efficacy of BEAMER with a comprehensive experimental evaluation on a challenging data set.

  4. Endomorphin-1 attenuates Aβ42 induced impairment of novel object and object location recognition tasks in mice.

    Science.gov (United States)

    Zhang, Rui-san; Xu, Hong-jiao; Jiang, Jin-hong; Han, Ren-wen; Chang, Min; Peng, Ya-li; Wang, Yuan; Wang, Rui

    2015-12-10

    A growing body of evidence suggests that the agglomeration of amyloid-β (Aβ) may be a trigger for Alzheimer׳s disease (AD). Central infusion of Aβ42 can lead to memory impairment in mice. Inhibiting the aggregation of Aβ has been considered a therapeutic strategy for AD. Endomorphin-1 (EM-1), an endogenous agonist of μ-opioid receptors, has been shown to inhibit the aggregation of Aβ in vitro. In the present study, we investigated whether EM-1 could alleviate the memory-impairing effects of Aβ42 in mice using novel object recognition (NOR) and object location recognition (OLR) tasks. We showed that co-administration of EM-1 was able to ameliorate Aβ42-induced amnesia in the lateral ventricle and the hippocampus, and these effects could not be inhibited by naloxone, an antagonist of μ-opioid receptors. Infusion of EM-1 or naloxone separately into the lateral ventricle had no influence on memory in the tasks. These results suggested that EM-1 might be effective as a drug for AD preventative treatment by inhibiting Aβ aggregation directly as a molecular modifier.

  5. Location estimation of approaching objects is modulated by the observer's inherent and momentary action capabilities.

    Science.gov (United States)

    Kandula, Manasa; Hofman, Dennis; Dijkerman, H Chris

    2016-08-01

    Action capability may be one of the factors that can influence our percept of the world. A distinction can be made between momentary action capability (action capability at that particular moment) and inherent action capability (representing a stable action capability). In the current study, we investigated whether there was a biasing effect of these two forms of action capability on visual perception of location. In a virtual reality room, subjects had to stop a moving ball from hitting a pillar. On some trials, the ball disappeared automatically during its motion. Subjects had to estimate the location of the ball's disappearance in these trials. We expected that if action is necessary but action capability (inherent or momentary) is limiting performance, the location of approaching objects with respect to the observer is underestimated. By judging the objects to be nearer than they really are, the need to select and execute the appropriate action increases, thereby facilitating quick action (Cole et al. in Psychol Sci 24(1):34-40, 2013. doi: 10.1177/0956797612446953 ). As a manipulation of inherent action capability in a virtual environment, two groups of participants (video game players vs. non-video game players) were entered into the study (high and low action capability). Momentary action capability was manipulated by using two difficulty levels in the experiment (Easy vs. Difficult). Results indicated that inherent and momentary action capabilities interacted together to influence online location judgments: Non-players underestimated locations when the task was Difficult. Taken together, our data suggest that both inherent and momentary action capabilities influence location judgments.

  6. Extrinsic reference frames modify the neural substrates of object-location representations.

    Science.gov (United States)

    Chan, Edgar; Baumann, Oliver; Bellgrove, Mark A; Mattingley, Jason B

    2013-04-01

    The ability to form spatial representations of object locations is an important component of successful spatial navigation. Evidence from behavioral studies suggests that environmental features that have a salient coordinate axis (e.g., a rectangular building or a geometrical room) may provide a reference frame for the encoding of object-location information. Here we used functional magnetic resonance imaging (fMRI) to determine the brain networks engaged when object-location representations are stored with respect to an extrinsic reference frame. Participants learned the layout of an object array in an active, virtual-navigation paradigm. A square mat positioned on the floor of the virtual arena acted as the extrinsic reference frame. Knowledge of the spatial arrangement of the object array was probed while participants underwent fMRI, using a spatial judgment task that required them to imagine orientations of the learned array that were either aligned or misaligned with the geometry of the mat. Consistent with previous findings, participants responded faster and were more accurate when the imagined orientation was aligned, as opposed to misaligned, with the extrinsic reference frame. Analysis of the fMRI data revealed important differences in brain activity between the two conditions. Significantly greater activity was observed in the aligned condition compared with the misaligned condition across a bilateral network of brain areas that included the inferior occipital gyri, inferior and middle temporal gyri, and fusiform gyri. By contrast, activity in the misaligned condition was significantly greater than in the aligned condition in bilateral dorsolateral prefrontal and anterior cingulate cortex, and in the right anterior prefrontal and anterior insular cortex. These results suggest that retrieval of spatial locations that are aligned with an extrinsic reference frame involve direct access to detailed and accurate representations within the ventral visual

  7. Object-location training elicits an overlapping but temporally distinct transcriptional profile from contextual fear conditioning.

    Science.gov (United States)

    Poplawski, Shane G; Schoch, Hannah; Wimmer, Mathieu E; Hawk, Joshua D; Walsh, Jennifer L; Giese, Karl P; Abel, Ted

    2014-12-01

    Hippocampus-dependent learning is known to induce changes in gene expression, but information on gene expression differences between different learning paradigms that require the hippocampus is limited. The bulk of studies investigating RNA expression after learning use the contextual fear conditioning task, which couples a novel environment with a footshock. Although contextual fear conditioning has been useful in discovering gene targets, gene expression after spatial memory tasks has received less attention. In this study, we used the object-location memory task and studied gene expression at two time points after learning in a high-throughput manner using a microfluidic qPCR approach. We found that expression of the classic immediate-early genes changes after object-location training in a fashion similar to that observed after contextual fear conditioning. However, the temporal dynamics of gene expression are different between the two tasks, with object-location memory producing gene expression changes that last at least 2 hours. Our findings indicate that different training paradigms may give rise to distinct temporal dynamics of gene expression after learning.

  8. Any effects of social orientation priming on object-location memory are smaller than initially reported.

    Science.gov (United States)

    Drouin, Héloïse; Davidson, Patrick S R

    2015-12-01

    It has previously been reported that priming a collectivistic social orientation (compared with an individualistic one) boosts object-location memory (Kühnen & Oyserman, 2002; Oyserman, Sorensen, Reber, & Chen, 2009). We conducted 4 experiments to replicate this reported effect, using the same methods as in those initial reports. In Experiment 1 (n = 145), we found a hint of a priming effect on object-location memory, but also an unanticipated interaction between priming and gender. In Experiment 2 (n = 90), we included gender as a formal factor and doubled the "dosage" of the priming, yet did not see any priming effects on memory. In Experiment 3 (n = 101), we octupled the priming "dosage" and again saw no significant effects on memory. Finally, in Experiment 4 (n = 102), we performed an exact replication of the methods of the original reports and again found no priming effects on memory. Any effects of this type of social orientation priming on object-location memory appear to be smaller and/or less robust than initially thought. (c) 2015 APA, all rights reserved).

  9. Feasibility study to objectively assess activity and location of Hispanic preschoolers: a short communication

    Directory of Open Access Journals (Sweden)

    Teresia M. O’Connor

    2013-05-01

    Full Text Available Both physical and social environmental factors influence young children’s physical activity, yet little is known about where Hispanic children are more likely to be active. We assessed the feasibility of simultaneously measuring, then processing objective measures of location and physical activity among Hispanic preschool children. Preschool-aged Hispanic children (n = 15 simultaneously wore QStarz BT100X global positioning system (GPS data loggers and Actigraph GT3X accelerometers for a 24- to 36-hour period, during which time their parents completed a location and travel diary. Data were aggregated to the minute and processed using the personal activity location measurement system (PALMS. Children successfully wore the GPS data loggers and accelerometers simultaneously, 12 of which yielded data that met quality standards. The average percent correspondence between GPS- and diary-based estimates of types of location was high and Kappa statistics were moderate to excellent, ranging from 0.49-0.99. The between-method (GPS monitor, parent-reported diary correlations of estimated participant-aggregated minutes spent on vehicle-based trips were strong. The simultaneous use of GPS and accelerometers to assess Hispanic preschool children’s location and physical activity is feasible. This methodology has the potential to provide more precise findings to inform environmental interventions and policy changes to promote physical activity among Hispanic preschool children.

  10. Dense Plasma Focus: physics and applications (radiation material science, single-shot disclosure of hidden illegal objects, radiation biology and medicine, etc.)

    Science.gov (United States)

    Gribkov, V. A.; Miklaszewski, R.; Paduch, M.; Zielinska, E.; Chernyshova, M.; Pisarczyk, T.; Pimenov, V. N.; Demina, E. V.; Niemela, J.; Crespo, M.-L.; Cicuttin, A.; Tomaszewski, K.; Sadowski, M. J.; Skladnik-Sadowska, E.; Pytel, K.; Zawadka, A.; Giannini, G.; Longo, F.; Talab, A.; Ul'yanenko, S. E.

    2015-03-01

    The paper presents some outcomes obtained during the year of 2013 of the activity in the frame of the International Atomic Energy Agency Co-ordinated research project "Investigations of Materials under High Repetition and Intense Fusion-Relevant Pulses". The main results are related to the effects created at the interaction of powerful pulses of different types of radiation (soft and hard X-rays, hot plasma and fast ion streams, neutrons, etc. generated in Dense Plasma Focus (DPF) facilities) with various materials including those that are counted as perspective ones for their use in future thermonuclear reactors. Besides we discuss phenomena observed at the irradiation of biological test objects. We examine possible applications of nanosecond powerful pulses of neutrons to the aims of nuclear medicine and for disclosure of hidden illegal objects. Special attention is devoted to discussions of a possibility to create extremely large and enormously diminutive DPF devices and probabilities of their use in energetics, medicine and modern electronics.

  11. Reconstruction of surface impedance of an object located over a planar PEC surface

    Energy Technology Data Exchange (ETDEWEB)

    Uenal, Guel Seda; Cayoeren, Mehmet; Tetik, Evrim [Istanbul Technical University Electrical and Electronics Engineering Faculty Maslak 34469 Istanbul (Turkey)], E-mail: unalgu@itu.edu.tr, E-mail: mehmet@cayoren.com, E-mail: tetike@itu.edu.tr

    2008-11-01

    A method for the determination of inhomogeneous surface impedance of an arbitrary shaped cylindrical object located over a perfectly conducting (PEC) plane is presented. The problem is reduced to the solution of an ill-posed integral equation by the use of single layer representation which is handled by Truncated Singular Value Decomposition (TSVD). The total field and its normal derivative on the boundary of the object which are required for the evaluation of the surface impedance are obtained through Nystroem method. The method can also be used in shape reconstruction by using the relation between the shape of a PEC object and its equivalent one in terms of the surface impedance. The numerical implementations yield quite satisfactory results.

  12. SKF 83566 attenuates the effects of ghrelin on performance in the object location memory task.

    Science.gov (United States)

    Jacoby, Sarah M; Currie, Paul J

    2011-10-31

    Increasing research implicates ghrelin, a metabolic signaling peptide, in memory processes including acquisition, consolidation, and retention. The present study investigated the effects of ghrelin on spatial memory acquisition by utilizing the object location memory task paradigm. Given the co-expression of ghrelin and dopamine D(1) receptors within hippocampal neurons, we examined a potential interaction between these two systems on memory performance. When injected into the dorsal third ventricle (D3V) of male Sprague-Dawley rats, proximal to hippocampal tissue, ghrelin (500 pmol) increased the amount of time spent with objects in novel locations. This effect was completely reversed by the D(1) antagonist SKF 83566 (100 μg/kg IP), although when administered alone, the antagonist had no effect on task performance (10-100 μg/kg). We also examined the feeding effects of D3V ghrelin and found that the peptide reliably increased food intake (500 pmol) but that this effect was not blocked by SKF 83566 (100 μg/kg). When given alone, SKF 83566 did not alter food intake (10-100 μg/kg). Our findings indicate that, in addition to an orexigenic effect, ghrelin improves acquisition of spatial location memories. Furthermore, D(1) receptor activation is necessary for ghrelin to improve the encoding of spatial memories but does not impact the increase in food intake elicited by the peptide.

  13. Inferring Groups of Objects, Preferred Routes, and Facility Locations from Trajectories

    DEFF Research Database (Denmark)

    Ceikute, Vaida

    on empirical studies with real route usage data and an existing online routing service. Finally, we use GPS trajectories as customer flows in a modern formulation of the facility location problem. We propose a practical framework that, given a road network, a set of trajectories, and a set of existing......In today’s society, GPS-enabled devices are used widely. A broad range of location-based services (LBS) allow users to receive and share information related to their positions. Thus, it is possible to accumulate GPS data, and it is expected that the amount of available GPS data will increase very...... substantially in the years to come. The availability of such GPS data holds huge potential to improve existing LBS or lead to the creation of new ones. This thesis investigates the use of GPS data in three different areas. Specifically, from GPS data we obtain trajectories of moving objects, from which we can...

  14. Method for locating a small magnetic object in the human body

    Energy Technology Data Exchange (ETDEWEB)

    Kaufman, L.; Williamson, S.J.; Ilmoniemi, R.J.; Weinberg, H.; Boyd, A.D.

    1988-02-29

    A piece of a thin acupuncture needle lodged under the right scapula of a patient could not be found in surgical procedures accompanied by studies of 30 standard x-ray images. To locate it, the authors mapped the magnetic-field component normal to a plane lying above the object, using a superconducting quantum interference device (SQUID). Assuming that the needle could be modeled as a magnetic dipole, the authors were able to infer its lateral position, depth, orientation, and magnetic moment. With this information, directed CT scans, high-resolution x-ray films, and the subsequent surgical removal of the needle proved that it could be located in the body with an accuracy of about three millimeters.

  15. Ontology-Based Retrieval of Spatially Related Objects for Location Based Services

    Science.gov (United States)

    Haav, Hele-Mai; Kaljuvee, Aivi; Luts, Martin; Vajakas, Toivo

    Advanced Location Based Service (LBS) applications have to integrate information stored in GIS, information about users' preferences (profile) as well as contextual information and information about application itself. Ontology engineering provides methods to semantically integrate several data sources. We propose an ontology-driven LBS development framework: the paper describes the architecture of ontologies and their usage for retrieval of spatially related objects relevant to the user. Our main contribution is to enable personalised ontology driven LBS by providing a novel approach for defining personalised semantic spatial relationships by means of ontologies. The approach is illustrated by an industrial case study.

  16. Re-Configurable Antenna & Transmission Power for Location Aware MANET Routing with Multiple Objective Optimization

    Directory of Open Access Journals (Sweden)

    Sanjaya Gajurel

    2008-03-01

    Full Text Available In this paper we develop a Directional Antenna Multi-path Location Aided Routing (DA-MLAR scheme with On Demand Transmission Power (ODTP support. The routing approach is based on multiple objectives. DAMLAR is a reactive routing protocol that minimizes the protocol overhead of other reactive routing protocols. DAMLAR also improves the packet delivery ratio and end-toend delay. The targeted application contexts include MANET with energy awareness, and communications in space networks, where efficient and reliable packet delivery is very challenging due to the high bit error rate, intermittent connectivity, limited bandwidth, and energy. By using different transmission power based on the calculated distance from the current sender node to the destination node or the next hop node, DA-MLAR-ODTP gets the best of the directional and omni-directional modes. Compared to DA-MLAR, on demand transmission power mode further improves the packet delivery ratio by up to 37% and dwindles end-to-end delay by up to 57% with approximately the same amount of energy consumption. The multiple objective optimization is based on using a Normalized Weighted Additive Utility Function (NWAUF approach that shows comparison of different objective performances with and without on demand transmission power capability. Simulation experiments were conducted. They show that is the developed technique strengthens the reliability of communication systems for given targeted objectives.

  17. Learning Object Location Predictors with Boosting and Grammar-Guided Feature Extraction

    CERN Document Server

    Eads, Damian; Helmbold, David

    2009-01-01

    We present BEAMER: a new spatially exploitative approach to learning object detectors which shows excellent results when applied to the task of detecting objects in greyscale aerial imagery in the presence of ambiguous and noisy data. There are four main contributions used to produce these results. First, we introduce a grammar-guided feature extraction system, enabling the exploration of a richer feature space while constraining the features to a useful subset. This is specified with a rule-based generative grammar crafted by a human expert. Second, we learn a classifier on this data using a newly proposed variant of AdaBoost which takes into account the spatially correlated nature of the data. Third, we perform another round of training to optimize the method of converting the pixel classifications generated by boosting into a high quality set of (x, y) locations. Lastly, we carefully define three common problems in object detection and define two evaluation criteria that are tightly matched to these proble...

  18. Differential roles for Nr4a1 and Nr4a2 in object location vs. object recognition long-term memory.

    Science.gov (United States)

    McNulty, Susan E; Barrett, Ruth M; Vogel-Ciernia, Annie; Malvaez, Melissa; Hernandez, Nicole; Davatolhagh, M Felicia; Matheos, Dina P; Schiffman, Aaron; Wood, Marcelo A

    2012-11-16

    Nr4a1 and Nr4a2 are transcription factors and immediate early genes belonging to the nuclear receptor Nr4a family. In this study, we examine their role in long-term memory formation for object location and object recognition. Using siRNA to block expression of either Nr4a1 or Nr4a2, we found that Nr4a2 is necessary for both long-term memory for object location and object recognition. In contrast, Nr4a1 appears to be necessary only for object location. Indeed, their roles in these different types of long-term memory may be dependent on their expression in the brain, as NR4A2 was found to be expressed in hippocampal neurons (associated with object location memory) as well as in the insular and perirhinal cortex (associated with object recognition memory), whereas NR4A1 showed minimal neuronal expression in these cortical areas. These results begin to elucidate how NR4A1 and NR4A2 differentially contribute to object location versus object recognition memory.

  19. From detection to deflection: Mitigation techniques for hidden global threats of natural space objects with short warning time

    Science.gov (United States)

    Hussein, Alaa; Rozenheck, Oshri; Entrena Utrilla, Carlos Manuel

    2016-09-01

    Throughout recorded history, hundreds of Earth impacts have been reported, with some catastrophic localized consequences. Based on the International Space University (ISU) Planetary Defense project named READI, we address the impact event problem by giving recommendations for the development of a planetary defense program. This paper reviews the current detection and tracking techniques and gives a set of recommendations for a better preparation to shield Earth from asteroid and cometary impacts. We also extend the use of current deflection techniques and propose a new compilation of those to deflect medium-sized potentially hazardous objects (PHOs). Using an array of techniques from high-energy lasers to defensive missiles, we present a set of protective layers to defend our planet. The paper focused on threats with a short warning period from discovery to impact with Earth, within few years.

  20. Determination of the magnetic polarizability tensor and three dimensional object location for multiple objects using a walk-through metal detector

    Science.gov (United States)

    Marsh, Liam A.; Ktistis, Christos; Järvi, Ari; Armitage, David W.; Peyton, Anthony J.

    2014-05-01

    A previously reported tomographic metal detector which is capable of inverting the location and magnetic polarizability tensor for a single object has been modified such that it is capable of inverting the location and magnetic polarizability tensor for multiple objects. In this paper, the term ‘multiple objects’ refers to up to three independent metallic objects. The results from this paper show that the algorithm works well for objects vertically separated by greater than 40 cm, however the reliability varies as objects are brought closer together, or are at the same vertical height; the estimation of position for multiple objects tends to perform well, but the estimation of the magnetic polarizability tensor becomes poorer. Interactions taking place between objects is presented as one possible explanation for this.

  1. An All-Time-Domain Moving Object Data Model, Location Updating Strategy, and Position Estimation

    National Research Council Canada - National Science Library

    Wu, Qunyong; Huang, Junyi; Luo, Jianping; Yang, Jianjun

    2015-01-01

    .... Secondly, we proposed a new dynamic threshold location updating strategy. The location updating threshold was given dynamically in accordance with the velocity, accuracy, and azimuth positioning information from the GPS...

  2. Distributed solar photovoltaic array location and extent dataset for remote sensing object identification

    Science.gov (United States)

    Bradbury, Kyle; Saboo, Raghav; L. Johnson, Timothy; Malof, Jordan M.; Devarajan, Arjun; Zhang, Wuming; M. Collins, Leslie; G. Newell, Richard

    2016-12-01

    Earth-observing remote sensing data, including aerial photography and satellite imagery, offer a snapshot of the world from which we can learn about the state of natural resources and the built environment. The components of energy systems that are visible from above can be automatically assessed with these remote sensing data when processed with machine learning methods. Here, we focus on the information gap in distributed solar photovoltaic (PV) arrays, of which there is limited public data on solar PV deployments at small geographic scales. We created a dataset of solar PV arrays to initiate and develop the process of automatically identifying solar PV locations using remote sensing imagery. This dataset contains the geospatial coordinates and border vertices for over 19,000 solar panels across 601 high-resolution images from four cities in California. Dataset applications include training object detection and other machine learning algorithms that use remote sensing imagery, developing specific algorithms for predictive detection of distributed PV systems, estimating installed PV capacity, and analysis of the socioeconomic correlates of PV deployment.

  3. Distributed solar photovoltaic array location and extent dataset for remote sensing object identification.

    Science.gov (United States)

    Bradbury, Kyle; Saboo, Raghav; L Johnson, Timothy; Malof, Jordan M; Devarajan, Arjun; Zhang, Wuming; M Collins, Leslie; G Newell, Richard

    2016-12-06

    Earth-observing remote sensing data, including aerial photography and satellite imagery, offer a snapshot of the world from which we can learn about the state of natural resources and the built environment. The components of energy systems that are visible from above can be automatically assessed with these remote sensing data when processed with machine learning methods. Here, we focus on the information gap in distributed solar photovoltaic (PV) arrays, of which there is limited public data on solar PV deployments at small geographic scales. We created a dataset of solar PV arrays to initiate and develop the process of automatically identifying solar PV locations using remote sensing imagery. This dataset contains the geospatial coordinates and border vertices for over 19,000 solar panels across 601 high-resolution images from four cities in California. Dataset applications include training object detection and other machine learning algorithms that use remote sensing imagery, developing specific algorithms for predictive detection of distributed PV systems, estimating installed PV capacity, and analysis of the socioeconomic correlates of PV deployment.

  4. A Moving-Object Index for Efficient Query Processing with PeerWise Location Privacy

    DEFF Research Database (Denmark)

    Lin, Dan; Jensen, Christian S.; Zhang, Rui

    2011-01-01

    With the growing use of location-based services, location privacy attracts increasing attention from users, industry, and the research community. While considerable effort has been devoted to inventing techniques that prevent service providers from knowing a user’s exact location, relatively little...... attention has been paid to enabling so-called peer-wise privacy—the protection of a user’s location from unauthorized peer users. This paper identifies an important efficiency problem in existing peer-privacy approaches that simply apply a filtering step to identify users that are located in a query range......, but that do not want to disclose their location to the querying peer. To solve this problem, we propose a novel, privacy-policy enabled index called the PEB-tree that seamlessly integrates location proximity and policy compatibility. We propose efficient algorithms that use the PEB-tree for processing privacy...

  5. Effect of Unilateral Temporal Lobe Resection on Short‐Term Memory for Auditory Object and Sound Location

    National Research Council Canada - National Science Library

    LANCELOT, CÉLINE; SAMSON, SÉVERINE; AHAD, PIERRE; BAULAC, MICHEL

    2003-01-01

    A bstract : To investigate auditory spatial and nonspatial short‐term memory, a sound location discrimination task and an auditory object discrimination task were used in patients with medial temporal lobe resection...

  6. Reducing multisensor satellite monthly mean aerosol optical depth uncertainty: 1. Objective assessment of current AERONET locations

    Science.gov (United States)

    Li, Jing; Li, Xichen; Carlson, Barbara E.; Kahn, Ralph A.; Lacis, Andrew A.; Dubovik, Oleg; Nakajima, Teruyuki

    2016-11-01

    Various space-based sensors have been designed and corresponding algorithms developed to retrieve aerosol optical depth (AOD), the very basic aerosol optical property, yet considerable disagreement still exists across these different satellite data sets. Surface-based observations aim to provide ground truth for validating satellite data; hence, their deployment locations should preferably contain as much spatial information as possible, i.e., high spatial representativeness. Using a novel Ensemble Kalman Filter (EnKF)-based approach, we objectively evaluate the spatial representativeness of current Aerosol Robotic Network (AERONET) sites. Multisensor monthly mean AOD data sets from Moderate Resolution Imaging Spectroradiometer, Multiangle Imaging Spectroradiometer, Sea-viewing Wide Field-of-view Sensor, Ozone Monitoring Instrument, and Polarization and Anisotropy of Reflectances for Atmospheric Sciences coupled with Observations from a Lidar are combined into a 605-member ensemble, and AERONET data are considered as the observations to be assimilated into this ensemble using the EnKF. The assessment is made by comparing the analysis error variance (that has been constrained by ground-based measurements), with the background error variance (based on satellite data alone). Results show that the total uncertainty is reduced by 27% on average and could reach above 50% over certain places. The uncertainty reduction pattern also has distinct seasonal patterns, corresponding to the spatial distribution of seasonally varying aerosol types, such as dust in the spring for Northern Hemisphere and biomass burning in the fall for Southern Hemisphere. Dust and biomass burning sites have the highest spatial representativeness, rural and oceanic sites can also represent moderate spatial information, whereas the representativeness of urban sites is relatively localized. A spatial score ranging from 1 to 3 is assigned to each AERONET site based on the uncertainty reduction

  7. Designing a location update strategy for free-moving and network-constrained objects with varying velocity

    Institute of Scientific and Technical Information of China (English)

    Yuan-Ko HUANG; Lien-Fa LIN

    2014-01-01

    Spatio-temporal databases aim at appropriately managing moving objects so as to support various types of queries. While much research has been conducted on developing query processing techniques, less effort has been made to address the issue of when and how to update location information of moving objects. Previous work shifts the workload of processing updates to each object which usually has limited CPU and battery capacities. This results in a tremendous processing overhead for each moving object. In this paper, we focus on designing efficient update strategies for two important types of moving objects, free-moving objects (FMOs) and network-constrained objects (NCOs), which are classified based on object movement models. For FMOs, we develop a novel update strategy, namely the FMO update strategy (FMOUS), to explicitly indicate a time point at which the object needs to update location information. As each object knows in advance when to update (meaning that it does not have to continuously check), the processing overhead can be greatly reduced. In addition, the FMO update procedure (FMOUP) is designed to efficiently process the updates issued from moving objects. Similarly, for NCOs, we propose the NCO update strategy (NCOUS) and the NCO update procedure (NCOUP) to inform each object when and how to update location information. Exten-sive experiments are conducted to demonstrate the effectiveness and efficiency of the proposed update strategies.

  8. Influence of object location in different FOVs on trabecular bone microstructure measurements of human mandible: a cone beam CT study

    NARCIS (Netherlands)

    Ibrahim, N.; Parsa, A.; Hassan, B.; van der Stelt, P.; Aartman, I.H.A.; Nambiar, P.

    2014-01-01

    The aim of this study was to assess the influence of different object locations in different fields of view (FOVs) of two cone beam CT (CBCT) systems on trabecular bone microstructure measurements of a human mandible. A block of dry human mandible was scanned at five different locations (centre,

  9. Influence of object location in different FOVs on trabecular bone microstructure measurements of human mandible: a cone beam CT study

    NARCIS (Netherlands)

    Ibrahim, N.; Parsa, A.; Hassan, B.; van der Stelt, P.; Aartman, I.H.A.; Nambiar, P.

    2014-01-01

    The aim of this study was to assess the influence of different object locations in different fields of view (FOVs) of two cone beam CT (CBCT) systems on trabecular bone microstructure measurements of a human mandible. A block of dry human mandible was scanned at five different locations (centre, lef

  10. Differential Roles for "Nr4a1" and "Nr4a2" in Object Location vs. Object Recognition Long-Term Memory

    Science.gov (United States)

    McNulty, Susan E.; Barrett, Ruth M.; Vogel-Ciernia, Annie; Malvaez, Melissa; Hernandez, Nicole; Davatolhagh, M. Felicia; Matheos, Dina P.; Schiffman, Aaron; Wood, Marcelo A.

    2012-01-01

    "Nr4a1" and "Nr4a2" are transcription factors and immediate early genes belonging to the nuclear receptor Nr4a family. In this study, we examine their role in long-term memory formation for object location and object recognition. Using siRNA to block expression of either "Nr4a1" or "Nr4a2", we found that "Nr4a2" is necessary for both long-term…

  11. Differential Roles for "Nr4a1" and "Nr4a2" in Object Location vs. Object Recognition Long-Term Memory

    Science.gov (United States)

    McNulty, Susan E.; Barrett, Ruth M.; Vogel-Ciernia, Annie; Malvaez, Melissa; Hernandez, Nicole; Davatolhagh, M. Felicia; Matheos, Dina P.; Schiffman, Aaron; Wood, Marcelo A.

    2012-01-01

    "Nr4a1" and "Nr4a2" are transcription factors and immediate early genes belonging to the nuclear receptor Nr4a family. In this study, we examine their role in long-term memory formation for object location and object recognition. Using siRNA to block expression of either "Nr4a1" or "Nr4a2", we found that "Nr4a2" is necessary for both long-term…

  12. Inferring Groups of Objects, Preferred Routes, and Facility Locations from Trajectories

    DEFF Research Database (Denmark)

    Ceikute, Vaida

    In today’s society, GPS-enabled devices are used widely. A broad range of location-based services (LBS) allow users to receive and share information related to their positions. Thus, it is possible to accumulate GPS data, and it is expected that the amount of available GPS data will increase very...... on empirical studies with real route usage data and an existing online routing service. Finally, we use GPS trajectories as customer flows in a modern formulation of the facility location problem. We propose a practical framework that, given a road network, a set of trajectories, and a set of existing...... facilities, computes the optimal segment(s) for the location of a new facility. Customer flows are scored, and the score of a flow is distributed among the road segments that the flow covers according to a score distribution model. We propose two algorithms that adopt different approaches to compute...

  13. An Approximation Algorithm for the Facility Location Problem with Lexicographic Minimax Objective

    Directory of Open Access Journals (Sweden)

    Ľuboš Buzna

    2014-01-01

    Full Text Available We present a new approximation algorithm to the discrete facility location problem providing solutions that are close to the lexicographic minimax optimum. The lexicographic minimax optimum is a concept that allows to find equitable location of facilities serving a large number of customers. The algorithm is independent of general purpose solvers and instead uses algorithms originally designed to solve the p-median problem. By numerical experiments, we demonstrate that our algorithm allows increasing the size of solvable problems and provides high-quality solutions. The algorithm found an optimal solution for all tested instances where we could compare the results with the exact algorithm.

  14. Study on Multi-objective Location of Distribution Center Based on Covering

    Directory of Open Access Journals (Sweden)

    QU Hui

    2013-01-01

    Full Text Available Distribution center is an important part of modern logistics system. In the process of designing distribution center, running expense can be greatly reduced by selecting appropriate location of distribution center. In this paper, the covering method was used twice to choose the distribution center and minimize the total cost. At last, a case was given to test the model.

  15. Estimation of the Optimal Location of Metallic Objects Inside a Mobile Phone

    DEFF Research Database (Denmark)

    Thaysen, Jesper; Jakobsen, Kaj Bjarne

    2005-01-01

    Planar near-field measurements of the electric field components are used to determine where to place external components, such as a loudspeaker or camera, without significantly affecting the radiated field. The location of the peak value of the electric field is discussed. The three principal ele...

  16. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main...... the ill parent. These findings contribute to a deeper understanding of the traumatic process of parental ABI that some children experience and emphasize the importance of family-centred interventions that include the children....

  17. Application of Multi-Objective Optimization on the Basis of Ratio Analysis (MOORA Method for Bank Branch Location Selection

    Directory of Open Access Journals (Sweden)

    Ali Gorener

    2013-04-01

    Full Text Available Location selection problem in banking is an important issue for the commercial success in competitive environment. There is a strategic fit between the location selection decision and overall performance of a new branch. Providing physical service in requested location as well as alternative distribution channels to meet profitable client needs is the current problematic to achieve the competitive advantage over the rivalry in financial system. In this paper, an integrated model has been developed to support in the decision of branch location selection for a new bank branch. Analytic Hierarchy Process (AHP technique has been conducted to prioritize of evaluation criteria, and multi-objective optimization on the basis of ratio analysis (MOORA method has been applied to rank location alternatives of bank branch.   

  18. Contribution of harmonicity and location to auditory object formation in free field: Evidence from event-related brain potentials

    Science.gov (United States)

    McDonald, Kelly L.; Alain, Claude

    2005-09-01

    The contribution of location and harmonicity cues in sound segregation was investigated using behavioral reports and source waveforms derived from the scalp-recorded evoked potentials. Participants were presented with sounds composed of multiple harmonics in a free-field environment. The third harmonic was either tuned or mistuned and could be presented from the same or different location from the remaining harmonics. Presenting the third harmonic at a different location than the remaining harmonics increased the likelihood of hearing the tuned or slightly (i.e., 2%) mistuned harmonic as a separate object. Partials mistuned by 16% of their original value ``pop out'' of the complex and were paralleled by an object-related negativity (ORN) that superimposed the N1 and P2 components. For the 2% mistuned stimuli, the ORN was present only when the mistuned harmonic was presented at a different location than the remaining harmonics. Presenting the tuned harmonic at a different location also yielded changes in neural activity between 150 and 250 ms after sound onset. The behavioral and electrophysiological results indicate that listeners can segregate sounds based on harmonicity or location alone. The results also indicate that a conjunction of harmonicity and location cues contribute to sound segregation primarily when harmonicity is ambiguous.

  19. Detection, Location and Grasping Objects Using a Stereo Sensor on UAV in Outdoor Environments.

    Science.gov (United States)

    Ramon Soria, Pablo; Arrue, Begoña C; Ollero, Anibal

    2017-01-07

    The article presents a vision system for the autonomous grasping of objects with Unmanned Aerial Vehicles (UAVs) in real time. Giving UAVs the capability to manipulate objects vastly extends their applications, as they are capable of accessing places that are difficult to reach or even unreachable for human beings. This work is focused on the grasping of known objects based on feature models. The system runs in an on-board computer on a UAV equipped with a stereo camera and a robotic arm. The algorithm learns a feature-based model in an offline stage, then it is used online for detection of the targeted object and estimation of its position. This feature-based model was proved to be robust to both occlusions and the presence of outliers. The use of stereo cameras improves the learning stage, providing 3D information and helping to filter features in the online stage. An experimental system was derived using a rotary-wing UAV and a small manipulator for final proof of concept. The robotic arm is designed with three degrees of freedom and is lightweight due to payload limitations of the UAV. The system has been validated with different objects, both indoors and outdoors.

  20. Detection, Location and Grasping Objects Using a Stereo Sensor on UAV in Outdoor Environments

    Science.gov (United States)

    Ramon Soria, Pablo; Arrue, Begoña C.; Ollero, Anibal

    2017-01-01

    The article presents a vision system for the autonomous grasping of objects with Unmanned Aerial Vehicles (UAVs) in real time. Giving UAVs the capability to manipulate objects vastly extends their applications, as they are capable of accessing places that are difficult to reach or even unreachable for human beings. This work is focused on the grasping of known objects based on feature models. The system runs in an on-board computer on a UAV equipped with a stereo camera and a robotic arm. The algorithm learns a feature-based model in an offline stage, then it is used online for detection of the targeted object and estimation of its position. This feature-based model was proved to be robust to both occlusions and the presence of outliers. The use of stereo cameras improves the learning stage, providing 3D information and helping to filter features in the online stage. An experimental system was derived using a rotary-wing UAV and a small manipulator for final proof of concept. The robotic arm is designed with three degrees of freedom and is lightweight due to payload limitations of the UAV. The system has been validated with different objects, both indoors and outdoors. PMID:28067851

  1. Detection, Location and Grasping Objects Using a Stereo Sensor on UAV in Outdoor Environments

    Directory of Open Access Journals (Sweden)

    Pablo Ramon Soria

    2017-01-01

    Full Text Available The article presents a vision system for the autonomous grasping of objects with Unmanned Aerial Vehicles (UAVs in real time. Giving UAVs the capability to manipulate objects vastly extends their applications, as they are capable of accessing places that are difficult to reach or even unreachable for human beings. This work is focused on the grasping of known objects based on feature models. The system runs in an on-board computer on a UAV equipped with a stereo camera and a robotic arm. The algorithm learns a feature-based model in an offline stage, then it is used online for detection of the targeted object and estimation of its position. This feature-based model was proved to be robust to both occlusions and the presence of outliers. The use of stereo cameras improves the learning stage, providing 3D information and helping to filter features in the online stage. An experimental system was derived using a rotary-wing UAV and a small manipulator for final proof of concept. The robotic arm is designed with three degrees of freedom and is lightweight due to payload limitations of the UAV. The system has been validated with different objects, both indoors and outdoors.

  2. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  3. COORDINATED LOCATION, DISTRIBUTION AND INVENTORY DECISIONS IN SUPPLY CHAIN NETWORK DESIGN: A MULTI-OBJECTIVE APPROACH

    Directory of Open Access Journals (Sweden)

    G. Reza Nasiri

    2012-01-01

    Full Text Available

    ENGLISH ABSTRACT: This research presents an integrated multi-objective distribution model for use in simultaneous strategic and operational food supply chain (SC planning. The proposed method is adopted to allow use of a performance measurement system that includes conflicting objectives such as distribution costs, customer service level (safety stock holding, resource utilisation, and the total delivery time, with reference to multiple warehouse capacities and uncertain forecast demands. To deal with these objectives and enable the decision makers (DMs to evaluate a greater number of alternative solutions, three different approaches are implemented in the proposed solution procedure. A detailed case study derived from food industrial data is used to illustrate the preference of the proposed approach. The proposed method yields an efficient solution and an overall degree of DMs’ satisfaction with the determined objective values.

    AFRIKAANSE OPSOMMING: Die navorsing behandel ’n geïntegreerde multidoelwit distribusiemodel vir strategiese beplanning van ’n voedseltoevoerketting. Om met die model doelmatig te werk, moet ’n versameling van randvoorwaardes hanteer word om die saamgestelde optimiseringsdoelwit te bereik teen ’n agtergrond van uiteenlopende sienings.

  4. Fuzzy Multi-Objective Programming Model for Facility Location in an Integrated Supply Chain Network

    Directory of Open Access Journals (Sweden)

    Hüseyin Ali Sarıkaya

    2014-05-01

    Full Text Available Traditional supply chain network design problems are often taken as a single objective. However, supply chains are complex networks formed by organizations having conflicting objectives with each other in real life. In this study, a multi-product, multi-stage and multi-period planning model is proposed to achieve multiple incommensurable goals in an integrated supply chain network with uncertain market demands. The supply chain planning model is constructed as a mixed-integer nonlinear programming problem to satisfy several conflicting objectives with each other. The proposed model consists of two objective functions. The first one is minimizing the fixed opening and operating costs with transportation costs determined depending on distances. Second one is minimizing the purchasing, ordering, inventory and backlogging costs according to Economic Production Quantity (EPQ model. Fuzzy goal programming approach is used in order to include decision maker's imprecise goal values in proposed model. The model is solved using GAMS optimization program. The application results presented in this study, demonstrates that fuzzy modeling and solution approaches could be used in the creation of more realistic models of the supply chain.

  5. Recognizing familiar objects by hand and foot: Haptic shape perception generalizes to inputs from unusual locations and untrained body parts.

    Science.gov (United States)

    Lawson, Rebecca

    2014-02-01

    The limits of generalization of our 3-D shape recognition system to identifying objects by touch was investigated by testing exploration at unusual locations and using untrained effectors. In Experiments 1 and 2, people found identification by hand of real objects, plastic 3-D models of objects, and raised line drawings placed in front of themselves no easier than when exploration was behind their back. Experiment 3 compared one-handed, two-handed, one-footed, and two-footed haptic object recognition of familiar objects. Recognition by foot was slower (7 vs. 13 s) and much less accurate (9 % vs. 47 % errors) than recognition by either one or both hands. Nevertheless, item difficulty was similar across hand and foot exploration, and there was a strong correlation between an individual's hand and foot performance. Furthermore, foot recognition was better with the largest 20 of the 80 items (32 % errors), suggesting that physical limitations hampered exploration by foot. Thus, object recognition by hand generalized efficiently across the spatial location of stimuli, while object recognition by foot seemed surprisingly good given that no prior training was provided. Active touch (haptics) thus efficiently extracts 3-D shape information and accesses stored representations of familiar objects from novel modes of input.

  6. Atmosphere Refraction Effects in Object Locating for Optical Satellite Remote Sensing Images

    Directory of Open Access Journals (Sweden)

    YAN Ming

    2015-09-01

    Full Text Available The collinear rigorous geometric model contains the atmosphere refraction geometric error in off-nadir observation. In order to estimate and correct the atmosphere refraction geometric error, the ISO international standard atmospheric model and Owens atmosphere refractive index algorithm are applied to calculate the index of atmosphere refraction in different latitude and altitude. The paper uses the weighted mean algorithm to reduce the eight layers ISO standard atmospheric model into a simple troposphere and stratosphere two layers spherical atmosphere. And the LOS vector track geometric algorithm is used to estimate the atmosphere refraction geometric error in different observation off-nadir angle. The results show that the atmosphere refraction will introduce about 2.5 m or 9 m geometric displacement in 30 or 45 degree off-nadir angle individual. Therefore, during geo-location processing of agile platform and extra wide high spatial resolution imagery, there is need to take into account the influence of atmosphere refraction and correct the atmosphere refraction geometric error to enhance the geo-location precision without GCPs.

  7. The Locations of Short Gamma-ray Bursts as Evidence for Compact Object Binary Progenitors

    CERN Document Server

    Fong, Wen-fai

    2013-01-01

    We present a detailed investigation of Hubble Space Telescope (HST) rest-frame UV/optical observations of 22 short gamma-ray burst (GRB) host galaxies and sub-galactic environments. Utilizing the high angular resolution and depth of HST, we characterize the host galaxy morphologies, measure precise projected physical and host-normalized offsets between the bursts and host centers, and calculate the locations of the bursts with respect to their host light distributions (rest-frame UV and optical). We calculate a median short GRB projected physical offset of 4.5 kpc, about 3.5 times larger than that for long GRBs, and find that ~25% of short GRBs have offsets of >10 kpc. When compared to their host sizes, the median offset is 1.5 half-light radii (r_e), about 1.5 times larger than the values for long GRBs, core-collapse supernovae, and Type Ia supernovae. In addition, ~20% of short GRBs having offsets of >5 r_e, and only ~25% are located within 1 r_e. We further find that short GRBs severely under-represent the...

  8. A multi-objective possibilistic programming approach for locating distribution centers and allocating customers demands in supply chains

    Directory of Open Access Journals (Sweden)

    Seyed Ahmad Yazdian

    2011-01-01

    Full Text Available In this paper, we present a multi-objective possibilistic programming model to locate distribution centers (DCs and allocate customers' demands in a supply chain network design (SCND problem. The SCND problem deals with determining locations of facilities (DCs and/or plants, and also shipment quantities between each two consecutive tier of the supply chain. The primary objective of this study is to consider different risk factors which are involved in both locating DCs and shipping products as an objective function. The risk consists of various components: the risks related to each potential DC location, the risk associated with each arc connecting a plant to a DC and the risk of shipment from a DC to a customer. The proposed method of this paper considers the risk phenomenon in fuzzy forms to handle the uncertainties inherent in these factors. A possibilistic programming approach is proposed to solve the resulted multi-objective problem and a numerical example for three levels of possibility is conducted to analyze the model.

  9. Categorical spatial memory in patients with mild cognitive impairment and Alzheimer dementia: Positional versus object-location recall

    NARCIS (Netherlands)

    Kessels, R.P.C.; Rijken, S.; Joosten-Weyn Banningh, L.W.A.; Schuylenborgh-van Es, N. van; Olde Rikkert, M.G.M.

    2010-01-01

    Memory for object locations, as part of spatial memory function, has rarely been Studied in patients with Alzheimer dementia (AD), while Studies in patients with Mild Cognitive Impairment (MCI) patients are lacking altogether. The present study examined categorical spatial memory function using the

  10. Categorical spatial memory in patients with mild cognitive impairment and Alzheimer dementia: positional versus object-location recall.

    NARCIS (Netherlands)

    Kessels, R.P.C.; Rijken, S.; Joosten-Weyn Banningh, L.W.A.; Schuylenborgh-van Es, N. van; Olde Rikkert, M.G.M.

    2010-01-01

    Memory for object locations, as part of spatial memory function, has rarely been studied in patients with Alzheimer dementia (AD), while studies in patients with Mild Cognitive Impairment (MCI) patients are lacking altogether. The present study examined categorical spatial memory function using the

  11. Equations of the Problem of Determining the Location of a Moving Object by Gyroscopes and Accelerometers,

    Science.gov (United States)

    1980-06-13

    tue outer ring of Cardan joints for the suspension of this gyroscope can be attached to a stabilizing platform. Let the intrinsic Kinetic momant of...type of stabilization. The plane of the platform P, which is connected with the object by a three-dimensional cardan suspension (not shown in the figure...of the outer ring of this DOC = 0925 PAGE 15 gyroscope’s cardan suspension are arranged on the stabilized platform so that the axis itself lies in tn

  12. RETRACTION: Surface impedance determination of an object located over a planar PEC surface and its use in shape reconstruction Surface impedance determination of an object located over a planar PEC surface and its use in shape reconstruction

    Science.gov (United States)

    Seda Ünal, Gül; Yapar, Ali; Akduman, Ibrahim

    2009-06-01

    This paper has substantial overlap with the paper 'Reconstruction of surface impedance of an object located over a planar PEC surface' by Gül Seda Ünal, Mehmet Çayören and Evrim Tetik (2008 Journal of Physics: Conference Series 135 012099). Therefore this article has been retracted by IOP Publishing and by the authors, Gül Seda Ünal, Ali Yapar and Ibrahim Akduman.

  13. True-3D accentuating of grids and streets in urban topographic maps enhances human object location memory.

    Directory of Open Access Journals (Sweden)

    Dennis Edler

    Full Text Available Cognitive representations of learned map information are subject to systematic distortion errors. Map elements that divide a map surface into regions, such as content-related linear symbols (e.g. streets, rivers, railway systems or additional artificial layers (coordinate grids, provide an orientation pattern that can help users to reduce distortions in their mental representations. In recent years, the television industry has started to establish True-3D (autostereoscopic displays as mass media. These modern displays make it possible to watch dynamic and static images including depth illusions without additional devices, such as 3D glasses. In these images, visual details can be distributed over different positions along the depth axis. Some empirical studies of vision research provided first evidence that 3D stereoscopic content attracts higher attention and is processed faster. So far, the impact of True-3D accentuating has not yet been explored concerning spatial memory tasks and cartography. This paper reports the results of two empirical studies that focus on investigations whether True-3D accentuating of artificial, regular overlaying line features (i.e. grids and content-related, irregular line features (i.e. highways and main streets in official urban topographic maps (scale 1/10,000 further improves human object location memory performance. The memory performance is measured as both the percentage of correctly recalled object locations (hit rate and the mean distances of correctly recalled objects (spatial accuracy. It is shown that the True-3D accentuating of grids (depth offset: 5 cm significantly enhances the spatial accuracy of recalled map object locations, whereas the True-3D emphasis of streets significantly improves the hit rate of recalled map object locations. These results show the potential of True-3D displays for an improvement of the cognitive representation of learned cartographic information.

  14. True-3D accentuating of grids and streets in urban topographic maps enhances human object location memory.

    Science.gov (United States)

    Edler, Dennis; Bestgen, Anne-Kathrin; Kuchinke, Lars; Dickmann, Frank

    2015-01-01

    Cognitive representations of learned map information are subject to systematic distortion errors. Map elements that divide a map surface into regions, such as content-related linear symbols (e.g. streets, rivers, railway systems) or additional artificial layers (coordinate grids), provide an orientation pattern that can help users to reduce distortions in their mental representations. In recent years, the television industry has started to establish True-3D (autostereoscopic) displays as mass media. These modern displays make it possible to watch dynamic and static images including depth illusions without additional devices, such as 3D glasses. In these images, visual details can be distributed over different positions along the depth axis. Some empirical studies of vision research provided first evidence that 3D stereoscopic content attracts higher attention and is processed faster. So far, the impact of True-3D accentuating has not yet been explored concerning spatial memory tasks and cartography. This paper reports the results of two empirical studies that focus on investigations whether True-3D accentuating of artificial, regular overlaying line features (i.e. grids) and content-related, irregular line features (i.e. highways and main streets) in official urban topographic maps (scale 1/10,000) further improves human object location memory performance. The memory performance is measured as both the percentage of correctly recalled object locations (hit rate) and the mean distances of correctly recalled objects (spatial accuracy). It is shown that the True-3D accentuating of grids (depth offset: 5 cm) significantly enhances the spatial accuracy of recalled map object locations, whereas the True-3D emphasis of streets significantly improves the hit rate of recalled map object locations. These results show the potential of True-3D displays for an improvement of the cognitive representation of learned cartographic information.

  15. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  16. Locating distribution/service centers based on multi objective decision making using set covering and proximity to stock market

    Directory of Open Access Journals (Sweden)

    Mazyar Dabibi

    2016-09-01

    Full Text Available In the present competitive world, facility location is an important aspect of the supply chain (sc optimization. It involves selecting specific locations for facility construction and allocation of the distribution channel among different SC levels. In fact, it is a strategic issue which directly affects many operational/tactical decisions. Besides the accessibility, which results in customer satisfaction, the present paper optimizes the establishment costs of a number of distribution channels by considering their proximity to the stock market of the goods they distribute, and proposes mathematical models for two objective functions using the set covering problem. Then, two objective functions are proposed into one through the ε-constraint method and solved by the metaheuristic Genetic Algorithm (GA. To test the resulted model, a smaller scale problem is solved. Results from running the algorithm with different ε-values show that, on average, a 10% increase in ε, which increases the value of the second objective function - distance covered by customers will cause a 2% decrease in the value of the first objective function including the costs of establishing distribution centers. The repeatability and solution convergence of the two-objective model presented by the GA are other results obtained in this study.

  17. Statins enhance cognitive performance in object location test in albino Swiss mice: involvement of beta-adrenoceptors.

    Science.gov (United States)

    Vandresen-Filho, Samuel; França, Lucas Moreira; Alcantara-Junior, José; Nogueira, Lucas Caixeta; de Brito, Thiago Marques; Lopes, Lousã; Junior, Fernando Mesquita; Vanzeler, Maria Luzinete; Bertoldo, Daniela Bohn; Dias, Paula Gomes; Colla, André R S; Hoeller, Alexandre; Duzzioni, Marcelo; Rodrigues, Ana Lúcia S; de Lima, Thereza C M; Tasca, Carla Inês; Viola, Giordano Gubert

    2015-05-01

    Statins are inhibitors of the 3-hydroxy-3-methylglutaryl-coenzyme A (HMG-CoA) reductase, thereby inhibiting cell synthesis of cholesterol and isoprenoids. Moreover, several studies have been evaluating pleiotropic effects of statins, mainly because they present neuroprotective effects in various pathological conditions. However, knowledge about behavioral effects of statins per se is relatively scarce. Considering these facts, we aimed to analyze behavioral responses of atorvastatin or simvastatin-treated mice in the open field test, elevated plus maze and object location test. Atorvastatin treatment for 7 consecutive days at 1 mg/kg or 10 mg/kg (v.o.) or simvastatin 10 mg/kg or 20 mg/kg enhanced cognitive performance in object location test when compared to control group (saline-treated mice). Simvastatin effects on mice performance in the object location test was abolished by post-training infusion of the beta-adrenoceptor antagonist propranolol. Atorvastatin and simvastatin did not change the behavioral response in open field and elevated plus-maze (EPM) tests in any of the used doses. These data demonstrate the positive effects of both statins in cognitive processes in mice, without any alteration in locomotor parameters in the open field test or anxiolytic-like behavior in EPM. In conclusion, we demonstrate that atorvastatin and simvastatin per se improve the cognitive performance in a rodent model of spatial memory and this effect is related to beta-adrenergic receptors modulation.

  18. Solving a multi-objective location routing problem for infectious waste disposal using hybrid goal programming and hybrid genetic algorithm

    Directory of Open Access Journals (Sweden)

    Narong Wichapa

    2018-01-01

    Full Text Available Infectious waste disposal remains one of the most serious problems in the medical, social and environmental domains of almost every country. Selection of new suitable locations and finding the optimal set of transport routes for a fleet of vehicles to transport infectious waste material, location routing problem for infectious waste disposal, is one of the major problems in hazardous waste management. Determining locations for infectious waste disposal is a difficult and complex process, because it requires combining both intangible and tangible factors. Additionally, it depends on several criteria and various regulations. This facility location problem for infectious waste disposal is complicated, and it cannot be addressed using any stand-alone technique. Based on a case study, 107 hospitals and 6 candidate municipalities in Upper-Northeastern Thailand, we considered criteria such as infrastructure, geology and social & environmental criteria, evaluating global priority weights using the fuzzy analytical hierarchy process (Fuzzy AHP. After that, a new multi-objective facility location problem model which hybridizes fuzzy AHP and goal programming (GP, namely the HGP model, was tested. Finally, the vehicle routing problem (VRP for a case study was formulated, and it was tested using a hybrid genetic algorithm (HGA which hybridizes the push forward insertion heuristic (PFIH, genetic algorithm (GA and three local searches including 2-opt, insertion-move and interexchange-move. The results show that both the HGP and HGA can lead to select new suitable locations and to find the optimal set of transport routes for vehicles delivering infectious waste material. The novelty of the proposed methodologies, HGP, is the simultaneous combination of relevant factors that are difficult to interpret and cost factors in order to determine new suitable locations, and HGA can be applied to determine the transport routes which provide a minimum number of vehicles

  19. An Improved Multi-Objective Programming with Augmented ε-Constraint Method for Hazardous Waste Location-Routing Problems

    Directory of Open Access Journals (Sweden)

    Hao Yu

    2016-05-01

    Full Text Available Hazardous waste location-routing problems are of importance due to the potential risk for nearby residents and the environment. In this paper, an improved mathematical formulation is developed based upon a multi-objective mixed integer programming approach. The model aims at assisting decision makers in selecting locations for different facilities including treatment plants, recycling plants and disposal sites, providing appropriate technologies for hazardous waste treatment, and routing transportation. In the model, two critical factors are taken into account: system operating costs and risk imposed on local residents, and a compensation factor is introduced to the risk objective function in order to account for the fact that the risk level imposed by one type of hazardous waste or treatment technology may significantly vary from that of other types. Besides, the policy instruments for promoting waste recycling are considered, and their influence on the costs and risk of hazardous waste management is also discussed. The model is coded and calculated in Lingo optimization solver, and the augmented ε-constraint method is employed to generate the Pareto optimal curve of the multi-objective optimization problem. The trade-off between different objectives is illustrated in the numerical experiment.

  20. An Improved Multi-Objective Programming with Augmented ε-Constraint Method for Hazardous Waste Location-Routing Problems

    Science.gov (United States)

    Yu, Hao; Solvang, Wei Deng

    2016-01-01

    Hazardous waste location-routing problems are of importance due to the potential risk for nearby residents and the environment. In this paper, an improved mathematical formulation is developed based upon a multi-objective mixed integer programming approach. The model aims at assisting decision makers in selecting locations for different facilities including treatment plants, recycling plants and disposal sites, providing appropriate technologies for hazardous waste treatment, and routing transportation. In the model, two critical factors are taken into account: system operating costs and risk imposed on local residents, and a compensation factor is introduced to the risk objective function in order to account for the fact that the risk level imposed by one type of hazardous waste or treatment technology may significantly vary from that of other types. Besides, the policy instruments for promoting waste recycling are considered, and their influence on the costs and risk of hazardous waste management is also discussed. The model is coded and calculated in Lingo optimization solver, and the augmented ε-constraint method is employed to generate the Pareto optimal curve of the multi-objective optimization problem. The trade-off between different objectives is illustrated in the numerical experiment. PMID:27258293

  1. An Improved Multi-Objective Programming with Augmented ε-Constraint Method for Hazardous Waste Location-Routing Problems.

    Science.gov (United States)

    Yu, Hao; Solvang, Wei Deng

    2016-05-31

    Hazardous waste location-routing problems are of importance due to the potential risk for nearby residents and the environment. In this paper, an improved mathematical formulation is developed based upon a multi-objective mixed integer programming approach. The model aims at assisting decision makers in selecting locations for different facilities including treatment plants, recycling plants and disposal sites, providing appropriate technologies for hazardous waste treatment, and routing transportation. In the model, two critical factors are taken into account: system operating costs and risk imposed on local residents, and a compensation factor is introduced to the risk objective function in order to account for the fact that the risk level imposed by one type of hazardous waste or treatment technology may significantly vary from that of other types. Besides, the policy instruments for promoting waste recycling are considered, and their influence on the costs and risk of hazardous waste management is also discussed. The model is coded and calculated in Lingo optimization solver, and the augmented ε-constraint method is employed to generate the Pareto optimal curve of the multi-objective optimization problem. The trade-off between different objectives is illustrated in the numerical experiment.

  2. Processing ser and estar to locate objects and events: An ERP study with L2 speakers of Spanish.

    Science.gov (United States)

    Dussias, Paola E; Contemori, Carla; Román, Patricia

    2014-01-01

    In Spanish locative constructions, a different form of the copula is selected in relation to the semantic properties of the grammatical subject: sentences that locate objects require estar while those that locate events require ser (both translated in English as 'to be'). In an ERP study, we examined whether second language (L2) speakers of Spanish are sensitive to the selectional restrictions that the different types of subjects impose on the choice of the two copulas. Twenty-four native speakers of Spanish and two groups of L2 Spanish speakers (24 beginners and 18 advanced speakers) were recruited to investigate the processing of 'object/event + estar/ser' permutations. Participants provided grammaticality judgments on correct (object + estar; event + ser) and incorrect (object + ser; event + estar) sentences while their brain activity was recorded. In line with previous studies (Leone-Fernández, Molinaro, Carreiras, & Barber, 2012; Sera, Gathje, & Pintado, 1999), the results of the grammaticality judgment for the native speakers showed that participants correctly accepted object + estar and event + ser constructions. In addition, while 'object + ser' constructions were considered grossly ungrammatical, 'event + estar' combinations were perceived as unacceptable to a lesser degree. For these same participants, ERP recording time-locked to the onset of the critical word 'en' showed a larger P600 for the ser predicates when the subject was an object than when it was an event (*La silla es en la cocina vs. La fiesta es en la cocina). This P600 effect is consistent with syntactic repair of the defining predicate when it does not fit with the adequate semantic properties of the subject. For estar predicates (La silla está en la cocina vs. *La fiesta está en la cocina), the findings showed a central-frontal negativity between 500-700 ms. Grammaticality judgment data for the L2 speakers of Spanish showed that beginners were significantly less accurate than native

  3. A multi-objective model for locating distribution centers in a supply chain network considering risk and inventory decisions

    Directory of Open Access Journals (Sweden)

    Sara Gharegozloo Hamedani

    2013-04-01

    Full Text Available This paper presents a multi-objective location problem in a three level supply chain network under uncertain environment considering inventory decisions. The proposed model of this paper considers uncertainty for different parameters including procurement, transportation costs, supply, demand and the capacity of various facilities. The proposed model presents a robust optimization model, which specifies locations of distribution centers to be opened, inventory control parameters (r, Q, and allocation of supply chain components, concurrently. The resulted mixed-integer nonlinear programming minimizes the expected total cost of such a supply chain network comprising location, procurement, transportation, holding, ordering, and shortage costs. The model also minimizes the variability of the total cost of relief chain and minimizes the financial risk or the probability of not meeting a certain budget. We use the ε-constraint method, which is a multi-objective technique with implicit trade-off information given, to solve the problem and using a couple of numerical instances, we examine the performance of the proposed approach.

  4. Effects of acute restraint stress on different components of memory as assessed by object-recognition and object-location tasks in mice.

    Science.gov (United States)

    Li, Song; Fan, Ya-Xin; Wang, Wei; Tang, Yi-Yuan

    2012-02-01

    Studies on how acute stress and the stress-related hormones affect learning and memory have yielded inconsistent findings, which might be due to some variables such as the properties of stressors, the nature of memory, the protocols for behavioral tasks and the characteristics of the subjects. However, the impacts of acute stress on different memory components have not been clearly demonstrated within one single experiment. The aim of present study was to evaluate the effects of 1-h restraint stress and the stress-induced plasma corticosterone elevation on memory acquisition, consolidation, and retrieval in mice, using object-recognition task (ORT) and object-location task (OLT) with a 4-h or 24-h intertrial interval (ITI). The results showed that, regardless of ITI, the recognition memory retrieval was significantly disrupted by acute restraint stress exposure, which started 75 min before the test session of both ORT and OLT. Acute restraint stress performed immediately after memory acquisition interrupted the consolidation of short-term recognition memories (4-h ITI) into long-term ones (24-h ITI). Moreover, the disrupted memory retrieval or consolidation was strongly related to the stress-induced plasma corticosterone elevation in a negative manner. These preliminary results clarified that acute restraint stress differently impacts three memory components, and the enhanced plasma corticosterone level under stressful situation plays critical roles in the information processing of memory under the stressful situation.

  5. A experiment on radio location of objects in the near-Earth space with VLBI in 2012

    Science.gov (United States)

    Nechaeva, M.; Antipenko, A.; Bezrukovs, V.; Bezrukov, D.; Dementjev, A.; Dugin, N.; Konovalenko, A.; Kulishenko, V.; Liu, X.; Nabatov, A.; Nesteruk, V.; Pupillo, G.; Reznichenko, A.; Salerno, E.; Shmeld, I.; Shulga, O.; Sybiryakova, Y.; Tikhomirov, Yu.; Tkachenko, A.; Volvach, A.; Yang, W.-J.

    An experiment on radar location of space debris objects using of the method of VLBI was carried out in April, 2012. The radar VLBI experiment consisted in irradiation of some space debris objects (4 rocket stages and 5 inactive satellites) with a signal of the transmitter with RT-70 in Evpatoria, Ukraine. Reflected signals were received by a complex of radio telescopes in the VLBI mode. The following VLBI stations took part in the observations: Ventspils (RT-32), Urumqi (RT-25), Medicina (RT-32) and Simeiz (RT-22). The experiment included measurements of the Doppler frequency shift and the delay for orbit refining, and measurements of the rotation period and sizes of objects by the amplitudes of output interferometer signals. The cross-correlation of VLBI-data is performed at a correlator NIRFI-4 of Radiophysical Research Institute (Nizhny Novgorod). Preliminary data processing resulted in the series of Doppler frequency shifts, which comprised the information on radial velocities of the objects. Some results of the experiment are presented.

  6. Bi-objective approach for placing ground and air ambulance base and helipad locations in order to optimize EMS response.

    Science.gov (United States)

    Shahriari, Milad; Bozorgi-Amiri, Ali; Tavakoli, Shayan; Yousefi-Babadi, Abolghasem

    2017-06-15

    Shortening the travel time of patient transfer has clinical implications for many conditions such as cardiac arrest, trauma, stroke and STEMI. As resources are often limited precise calculations are needed. In this paper we consider the location problem for both ground and aerial emergency medical services. Given the uncertainty of when patients are in need of prompt medical attention we consider these demand points to be uncertain. We consider various ways in which ground and helicopter ambulances can work together to make the whole process go faster. We develop a mathematical model that minimizes travel time and maximizes service level. We use a compromising programming method to solve this bi-objective mathematical model. For numerical experiments we apply our model to a case study in Lorestan, Iran, using geographical and population data, and the location of the actual hospital based in the capital of the province. Results show that low-accessibility locations are the main focus of the proposed problem and with mathematical modeling access to a hospital is vastly improved. We also found out that once the budget reaches a certain point which suffices for building certain ambulance bases more investments does not necessarily result in less travel time. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  8. ACCURACY EVALUATION OF THE OBJECT LOCATION VISUALIZATION FOR GEO-INFORMATION AND DISPLAY SYSTEMS OF MANNED AIRCRAFTS NAVIGATION COMPLEXES

    Directory of Open Access Journals (Sweden)

    M. O. Kostishin

    2014-01-01

    Full Text Available The paper deals with the issue of accuracy estimating for the object location display in the geographic information systems and display systems of manned aircrafts navigation complexes. Application features of liquid crystal screens with a different number of vertical and horizontal pixels are considered at displaying of geographic information data on different scales. Estimation display of navigation parameters values on board the aircraft is done in two ways: a numeric value is directly displayed on the screen of multi-color indicator, and a silhouette of the object is formed on the screen on a substrate background, which is a graphical representation of area map in the flight zone. Various scales of area digital map display currently used in the aviation industry have been considered. Calculation results of one pixel scale interval, depending on the specifications of liquid crystal screen and zoom of the map display area on the multifunction digital display, are given. The paper contains experimental results of the accuracy evaluation for area position display of the aircraft based on the data from the satellite navigation system and inertial navigation system, obtained during the flight program run of the real object. On the basis of these calculations a family of graphs was created for precision error display of the object reference point position using the onboard indicators with liquid crystal screen with different screen resolutions (6 "×8", 7.2 "×9.6", 9"×12" for two map display scales (1:0 , 25 km, 1-2 km. These dependency graphs can be used both to assess the error value of object area position display in existing navigation systems and to calculate the error value in upgrading facilities.

  9. Tet1 oxidase regulates neuronal gene transcription, active DNA hydroxymethylation, object location memory, and threat recognition memory

    Directory of Open Access Journals (Sweden)

    Dinesh Kumar

    2015-10-01

    Full Text Available A dynamic equilibrium between DNA methylation and demethylation of neuronal activity-regulated genes is crucial for memory processes. However, the mechanisms underlying this equilibrium remain elusive. Tet1 oxidase has been shown to play a key role in the active DNA demethylation in the central nervous system. In this study, we used Tet1 gene knockout (Tet1KO mice to examine the involvement of Tet1 in memory consolidation and storage in the adult brain. We found that Tet1 ablation leads to altered expression of numerous neuronal activity-regulated genes, compensatory upregulation of active demethylation pathway genes, and upregulation of various epigenetic modifiers. Moreover, Tet1KO mice showed an enhancement in the consolidation and storage of threat recognition (cued and contextual fear conditioning and object location memories. We conclude that Tet1 plays a critical role in regulating neuronal transcription and in maintaining the epigenetic state of the brain associated with memory consolidation and storage.

  10. Incorporating location, routing, and inventory decisions in a bi-objective supply chain design problem with risk-pooling

    Science.gov (United States)

    Tavakkoli-Moghaddam, Reza; Forouzanfar, Fateme; Ebrahimnejad, Sadoullah

    2013-07-01

    This paper considers a single-sourcing network design problem for a three-level supply chain. For the first time, a novel mathematical model is presented considering risk-pooling, the inventory existence at distribution centers (DCs) under demand uncertainty, the existence of several alternatives to transport the product between facilities, and routing of vehicles from distribution centers to customer in a stochastic supply chain system, simultaneously. This problem is formulated as a bi-objective stochastic mixed-integer nonlinear programming model. The aim of this model is to determine the number of located distribution centers, their locations, and capacity levels, and allocating customers to distribution centers and distribution centers to suppliers. It also determines the inventory control decisions on the amount of ordered products and the amount of safety stocks at each opened DC, selecting a type of vehicle for transportation. Moreover, it determines routing decisions, such as determination of vehicles' routes starting from an opened distribution center to serve its allocated customers and returning to that distribution center. All are done in a way that the total system cost and the total transportation time are minimized. The Lingo software is used to solve the presented model. The computational results are illustrated in this paper.

  11. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  12. Hidden Women

    NARCIS (Netherlands)

    Jolanda Bosch; René Moelker

    2008-01-01

    Discussing the visibility and cultural factors that inf luence the position of women in the armed forces is the object of the study that is presented here. The Netherlands do not have a martial tradition and are believed to have a feminine ‘soft’ culture , but nevertheless women have always been

  13. Location, location, location

    NARCIS (Netherlands)

    Anderson, S.P.; Goeree, J.K.; Ramer, R.

    1997-01-01

    We analyze the canonical location-then-price duopoly game with general log- concave consumer densities. A unique pure-strategy equilibrium to the two-stage game exists if the density is not "too asymmetric" and not "too concave." These criteria are satisfied by many commonly used densities. Equilibr

  14. Effect of object location on the density measurement in cone-beam computed tomography versus multislice computed tomography.

    Science.gov (United States)

    Eskandarloo, Amir; Abdinian, Mehrdad; Salemi, Fatemeh; Hashemzadeh, Zahra; Safaei, Mehran

    2012-12-01

    Bone density measurement in a radiographic view is a valuable method for evaluating the density of bone quality before performing some dental procedures such as, dental implant placements. It seems that Cone-Beam Computed Tomography (CBCT) can be used as a diagnostic tool for evaluating the density of the bone, prior to any treatment, as the reported radiation dose in this method is minimal. The aim of this study is to investigate the effect of object location on the density measurement in CBCT versus Multislice computed tomography (CT). In an experimental study, three samples with similar dimensions, but different compositions, different densities (Polyethylene, Polyamide, Polyvinyl Chloride), and three bone pieces of different parts of the mandibular bone were imaged in three different positions by CBCT and Multislice CT sets. The average density value was computed for each sample in each position. Then the data obtained from each CBCT was converted to a Hounsfield unit and evaluated using a single variable T analysis. A P value <0.05 was considered to be significant. The density in a Multislice CT is stable in the form of a Hounsfield Number, but this density is variable in the images acquired through CBCT, and the change in the position results in significant changes in the density. In this study, a statistically significant difference (P value = 0.000) has been observed for the position of the sample and its density in CBCT in comparison to Multislice CT. Density values in CBCT are not real because they are affected by the position of the object in the machine.

  15. 客体及其位置记忆的眼动研究%Eye Movements and Memory for Objects and Their Locations

    Institute of Scientific and Technical Information of China (English)

    Simon P. Liversedge; Katie L. Meadmore; David Corck-Adelman; Shui-I Shih; Alexander Pollatsek

    2011-01-01

    @@ In this paper we briefly describe preliminary data from two experiments that we have carried out to investigate the relationship be- tween visual encoding and memory for objects and their locations within scenes.In these experiments, we recorded participants' eye movements as they viewed a photograph of a cubicle with 12 objects positioned pseudo-randomly on a desk and shelves.After view- ing the photograph, participants were taken to the actual cubicle where they undertook two memory tests.Participants were asked to identify the 12 target objects (from the photograph) presented amongst 12 distractors.They were then required to place each of the objects in the location that they occupied in the photograph.These tests assessed participants' memory for identity of the objects and their locations.In Experiment 1, we assessed the influence of the encoding period and the test delay on object identity and location memory.In Experiment 2 we manipulated scanning behaviour during encoding by "boxing" some of the objects in the photo.We showed that using boxes to change eye movement behaviour during encoding directly affected the nature of memory for the scene.The results of these studies indicate a fundamental relationship between visual encoding and memory for objects and their locations.We explain our findings in terms of the Visual Memory Model (Hollingworth & Henderson, 2002).

  16. Directional location of buried objects using three-component magnetic borehole data demonstrated for the case of a drill string

    Science.gov (United States)

    Ehmann, S.; Virgil, C.; Hördt, A.; Leven, M.

    2016-06-01

    One of the main applications of magnetic field measurements in boreholes is the detection of unexploded ordnance or buried utility structures like pipes or tiebacks. Even though the advantage of fully oriented magnetic vector measurements have long been recognized and could significantly reduce costs and risks, the tools used for those purposes typically measure only the total magnetic field, the vertical and horizontal components or gradients thereof. The Göttingen Bohrloch Magnetometer uses three fibre optic gyros to record its orientation and thus enables us to compute high-quality three-component magnetic vector data regardless of borehole orientation. The measurements described in this paper were run in the scientific borehole Cuxhaven Lüdingworth 1/1A, which was drilled as a part of the `Coastal Aquifer Test field' project to study the dynamics of the saltwater/freshwater interface. As the drill string got stuck during drilling of the first borehole, a second hole was drilled in the immediate vicinity. The drill string lies at a depth between 80 and 114 m at a distance of only 2.5 m southeast of the borehole used for the measurements, making it an ideal target to demonstrate the benefits of vector magnetic surveys. Although the theories to calculate magnetic fields of objects with different shapes is well established and do not need to be tested, they almost exclusively include approximations of the geometry. It is not obvious whether these approximations are suited to describe real data, or whether additional effects or refinements have to be considered. We use both a simplified monopole model and a cylinder model to fit the data and are able to determine the position of the drill string within a statistical error of approximately 10 cm. Additionally, we show that the location of the drill string could not have been determined by measurements of the total field or its horizontal and vertical component alone and that those methods would require the drilling

  17. Influence of object location in cone beam computed tomography (NewTom 5G and 3D Accuitomo 170) on gray value measurements at an implant site

    NARCIS (Netherlands)

    Parsa, A.; Ibrahim, N.; Hassan, B.; van der Stelt, P.; Wismeijer, D.

    2014-01-01

    Objectives The aim of this study was to determine the gray value variation at an implant site with different object location within the selected field of view (FOV) in two cone beam computed tomography (CBCT) scanners. Methods A 1-cm-thick section from the edentulous region of a dry human mandible

  18. Influence of object location in cone beam computed tomography (NewTom 5G and 3D Accuitomo 170) on gray value measurements at an implant site

    NARCIS (Netherlands)

    Parsa, A.; Ibrahim, N.; Hassan, B.; van der Stelt, P.; Wismeijer, D.

    2014-01-01

    Objectives The aim of this study was to determine the gray value variation at an implant site with different object location within the selected field of view (FOV) in two cone beam computed tomography (CBCT) scanners. Methods A 1-cm-thick section from the edentulous region of a dry human mandible w

  19. Influence of object location in cone beam computed tomography (NewTom 5G and 3D Accuitomo 170) on gray value measurements at an implant site

    NARCIS (Netherlands)

    Parsa, A.; Ibrahim, N.; Hassan, B.; van der Stelt, P.; Wismeijer, D.

    2014-01-01

    Objectives The aim of this study was to determine the gray value variation at an implant site with different object location within the selected field of view (FOV) in two cone beam computed tomography (CBCT) scanners. Methods A 1-cm-thick section from the edentulous region of a dry human mandible w

  20. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression wher...

  1. Designing Multi Objective Facility Location Models Based on Multiple Type Facility Dispersion and Data Envelopment Analysis Using Fuzzy Goal Programing Approach

    OpenAIRE

    Mahdi Karbasian1; Mahdi Dashti

    2013-01-01

    In this paper, four different multiple-type dispersion facilities location modeling formulations have been developed, which utilize efficiency measures of Data Envelopment Analysis to find optimal and efficient facility location patterns. While the problems studied previously do not clearly indicate which candidate is elected by a unit, simultaneous DEA approach has been used for analysis. In these models, existing facilities are considered. These models with two objectives, considerabely mat...

  2. A multi-objective location-inventory model for 3PL providers with sustainable considerations under uncertainty

    Directory of Open Access Journals (Sweden)

    R. Daghigh

    2016-09-01

    Full Text Available In recent years, logistics development is considered as an important aspect of any country’s development. Outsourcing logistics activities to third party logistics (3PL providers is a common way to achieve logistics development. On the other hand, globalization and increasing customers’ concern about the environmental impact of activities as well as the appearance of the issue of social responsibility have led companies employ sustainable supply chain management, which considers economic, environmental and social benefits, simultaneously. This paper proposes a multi-objective model to design logistics network for 3PL providers by considering sustainable objectives under uncertainty. Objective functions include minimizing the total cost, minimizing greenhouse gas emission and maximizing social responsibility subject to fair access to products, number of created job opportunities and local community development. It is worth mentioning that in the present paper the perishability of products is also considered. A numerical example is provided to solve and validate model using augmented Epsilon-Constraint method. The results show that three sustainable objectives were in conflict and as the one receives more desirable values, the others fall into more undesirable values. In addition, by increasing maximum perishable time periods and by considering lateral transshipment among facilities of a level one can improve sustainability indices of the problem, which indicates the necessity of such policy in improving network sustainability.

  3. Discrete capacity limits and neuroanatomical correlates of visual short-term memory for objects and spatial locations.

    Science.gov (United States)

    Konstantinou, Nikos; Constantinidou, Fofi; Kanai, Ryota

    2017-02-01

    Working memory is responsible for keeping information in mind when it is no longer in view, linking perception with higher cognitive functions. Despite such crucial role, short-term maintenance of visual information is severely limited. Research suggests that capacity limits in visual short-term memory (VSTM) are correlated with sustained activity in distinct brain areas. Here, we investigated whether variability in the structure of the brain is reflected in individual differences of behavioral capacity estimates for spatial and object VSTM. Behavioral capacity estimates were calculated separately for spatial and object information using a novel adaptive staircase procedure and were found to be unrelated, supporting domain-specific VSTM capacity limits. Voxel-based morphometry (VBM) analyses revealed dissociable neuroanatomical correlates of spatial versus object VSTM. Interindividual variability in spatial VSTM was reflected in the gray matter density of the inferior parietal lobule. In contrast, object VSTM was reflected in the gray matter density of the left insula. These dissociable findings highlight the importance of considering domain-specific estimates of VSTM capacity and point to the crucial brain regions that limit VSTM capacity for different types of visual information. Hum Brain Mapp 38:767-778, 2017. © 2016 Wiley Periodicals, Inc.

  4. Entanglement without hidden nonlocality

    Science.gov (United States)

    Hirsch, Flavien; Túlio Quintino, Marco; Bowles, Joseph; Vértesi, Tamás; Brunner, Nicolas

    2016-11-01

    We consider Bell tests in which the distant observers can perform local filtering before testing a Bell inequality. Notably, in this setup, certain entangled states admitting a local hidden variable model in the standard Bell scenario can nevertheless violate a Bell inequality after filtering, displaying so-called hidden nonlocality. Here we ask whether all entangled states can violate a Bell inequality after well-chosen local filtering. We answer this question in the negative by showing that there exist entangled states without hidden nonlocality. Specifically, we prove that some two-qubit Werner states still admit a local hidden variable model after any possible local filtering on a single copy of the state.

  5. 模糊对象的空间Co-location模式挖掘研究%Mining Spatial Co-Location Patterns for Fuzzy Objects

    Institute of Scientific and Technical Information of China (English)

    欧阳志平; 王丽珍; 陈红梅

    2011-01-01

    空间co-location模式表示的是空间对象的实例在一个相同的区域内频繁地空间并置.过去人们已经对确定及不确定数据的co-location模式挖掘问题进行了一些研究,但是针对模糊对象上进行的研究还没有.模糊对象在许多领域里都有着非常重要的应用,比如生物医学图像数据库和GIS.该文研究模糊对象的空间co-location模式挖掘问题.首先,定义模糊对象上空间co-location模式挖掘的相关概念,包括模糊参与率、模糊参与度等.其次,提出FB算法挖掘模糊对象的co-location模式.接着,提出了3种改进算法,包括剪枝对象、减少实例间连接、改进剪枝步,以提高挖掘性能、加快co-location规则的产生.最后通过大量的实验说明FB算法及其改进算法的效果和效率.%A spatial co-location pattern is a group or spatial objects whose instances are frequently located in the same region. The mining co-location pattern problem for certain and uncertain data had been investigated in the past, but not for fuzzy objects. Fuzzy objects could be applied to many areas such as biomedical image databases, GIS and more. This paper investigates the spatial co-location pattern mining problem for fuzzy objects. Firstly, it defines the related concepts of spatial co-location patterns mining on fuzzy objects, including fuzzy participation ratio, fuzzy participation index, etc. Secondly, this paper proposes an FB algorithm to mine co-location patterns from fuzzy objects. Then, three kinds of the improved algorithms, the pruning objects, reducing of the operation joining between spatial instances and optimizing the pruning steps, are put forward so as to improve the mining performance and accelerate the co-location rule generation. Finally, by extensive experiments, the efficiency and effectiveness of the algorithms are verified.

  6. Solving a bi-objective location routing problem by a NSGA-II combined with clustering approach: application in waste collection problem

    Science.gov (United States)

    Rabbani, Masoud; Farrokhi-Asl, Hamed; Asgarian, Bahare

    2017-10-01

    It is observed that the separated design of location for depots and routing for servicing customers often reach a suboptimal solution. So, solving location and routing problem simultaneously could achieve better results. In this paper, waste collection problem is considered with regard to economic and societal objective functions. A non-dominated sorting genetic algorithm (NSGA-II) is used to locate depots and treatment facilities and design the routes starting from depots to serve customers. A new mathematical model is proposed and two objective functions including economic objective (opening cost of depots and treatment facility and transportation cost) and societal objective; that is, negative impact of treatment facilities which are close to towns are addressed in this study. A straightforward order based solution representation is applied for coding solutions of the problem and clustering approach is used to generate appropriate initial solutions. Moreover, three multi-objective decomposition methods including weighted sum, goal programming, and goal attainment are applied to validate the performance of the proposed algorithm. Number of test problems are conducted and the results obtained by algorithms are compared with respect to some comparison metrics. Finally, the experimental results show that the proposed hybrid NSGA-II outperforms all decomposition methods, but the computational times for decomposition methods are less than NSGA-II.

  7. Solving a bi-objective location routing problem by a NSGA-II combined with clustering approach: application in waste collection problem

    Science.gov (United States)

    Rabbani, Masoud; Farrokhi-Asl, Hamed; Asgarian, Bahare

    2016-10-01

    It is observed that the separated design of location for depots and routing for servicing customers often reach a suboptimal solution. So, solving location and routing problem simultaneously could achieve better results. In this paper, waste collection problem is considered with regard to economic and societal objective functions. A non-dominated sorting genetic algorithm (NSGA-II) is used to locate depots and treatment facilities and design the routes starting from depots to serve customers. A new mathematical model is proposed and two objective functions including economic objective (opening cost of depots and treatment facility and transportation cost) and societal objective; that is, negative impact of treatment facilities which are close to towns are addressed in this study. A straightforward order based solution representation is applied for coding solutions of the problem and clustering approach is used to generate appropriate initial solutions. Moreover, three multi-objective decomposition methods including weighted sum, goal programming, and goal attainment are applied to validate the performance of the proposed algorithm. Number of test problems are conducted and the results obtained by algorithms are compared with respect to some comparison metrics. Finally, the experimental results show that the proposed hybrid NSGA-II outperforms all decomposition methods, but the computational times for decomposition methods are less than NSGA-II.

  8. Hidden circuits and argumentation

    Science.gov (United States)

    Leinonen, Risto; Kesonen, Mikko H. P.; Hirvonen, Pekka E.

    2016-11-01

    Despite the relevance of DC circuits in everyday life and schools, they have been shown to cause numerous learning difficulties at various school levels. In the course of this article, we present a flexible method for teaching DC circuits at lower secondary level. The method is labelled as hidden circuits, and the essential idea underlying hidden circuits is in hiding the actual wiring of DC circuits, but to make their behaviour evident for pupils. Pupils are expected to find out the wiring of the circuit which should enhance their learning of DC circuits. We present two possible ways to utilise hidden circuits in a classroom. First, they can be used to test and enhance pupils’ conceptual understanding when pupils are expected to find out which one of the offered circuit diagram options corresponds to the actual circuit shown. This method aims to get pupils to evaluate the circuits holistically rather than locally, and as a part of that aim this method highlights any learning difficulties of pupils. Second, hidden circuits can be used to enhance pupils’ argumentation skills with the aid of argumentation sheet that illustrates the main elements of an argument. Based on the findings from our co-operating teachers and our own experiences, hidden circuits offer a flexible and motivating way to supplement teaching of DC circuits.

  9. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  10. Where did I put that? Patients with amnestic mild cognitive impairment demonstrate widespread reductions in activity during the encoding of ecologically relevant object-location associations

    Science.gov (United States)

    Hampstead, Benjamin M.; Stringer, Anthony Y.; Stilla, Randall F.; Amaraneni, Akshay; Sathian, K.

    2011-01-01

    Remembering the location of objects in the environment is both important in everyday life and difficult for patients with amnestic mild cognitive impairment (aMCI), a clinical precursor to Alzheimer’s disease. To test the hypothesis that memory impairment for object location in aMCI reflects hippocampal dysfunction, we used an event-related functional magnetic resonance imaging paradigm to compare patients with aMCI and healthy elderly controls (HEC) as they encoded 90 ecologically-relevant object-location associations (OLAs). Two additional OLAs, repeated a total of 45 times, served as control stimuli. Memory for these OLAs was assessed following a 1-hour delay. The groups were well matched on demographics and brain volumetrics. Behaviorally, HEC remembered significantly more OLAs than did aMCI patients. Activity differences were assessed by contrasting activation for successfully encoded novel stimuli vs. repeated stimuli. The HEC demonstrated activity within object-related (ventral visual stream), spatial location-related (dorsal visual stream), and feature binding-related cortical regions (hippocampus and other memory-related regions) as well as in frontal cortex and associated subcortical structures. Activity in most of these regions correlated with memory test performance. Although the aMCI patients demonstrated a similar activation pattern, the HEC showed significantly greater activity within each of these regions. Memory test performance in aMCI patients, in contrast to the HEC, was correlated with activity in regions involved in sensorimotor processing. We conclude that aMCI patients demonstrate widespread cerebral dysfunction, not limited to the hippocampus, and rely on encoding-related mechanisms that differ substantially from healthy individuals. PMID:21530556

  11. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  12. Solar Hidden Photon Search

    CERN Document Server

    Schwarz, Matthias; Redondo, Javier; Ringwald, Andreas; Wiedemann, Guenter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope.

  13. Solar Hidden Photon Search

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Max-Planck-Institut fuer Physik und Astrophysik, Muenchen (Germany)

    2011-11-15

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope. (orig.)

  14. Three-dimensional object location and inversion of the magnetic polarizability tensor at a single frequency using a walk-through metal detector

    Science.gov (United States)

    Marsh, Liam A.; Ktistis, Christos; Järvi, Ari; Armitage, David W.; Peyton, Anthony J.

    2013-04-01

    A tomographic metal detection and characterization system has been designed and built for recovering information about magnetic and/or conductive objects within the detector space. This information is gathered as a result of a ‘walk-through’ scan of a candidate in the same manner as for a typical security metal detector archway. Following the passage of the candidate, the system uses measurements from an array of coils to calculate the polarizability tensor, which describes the low frequency electromagnetic characteristic of a small metallic object when it interacts with an ac magnetic field. In addition to the magnetic polarizability dyadic tensor, the position of the perturbation is also determined as a product of the inversion algorithm. The system has been tested and is capable of inverting object tensors with <20% typical parameter variation, and determines three-dimensional object location with a typical error of less than ±3 cm. In this paper, results are shown from a set of four different test object examples, each with a different magnetic polarizability tensor. This object set consists of a ferrite sphere, a ferrite rod and phantom aluminium and steel handgun shapes.

  15. Study on Location Privacy Protection Scheme for Moving Objects%移动用户位置隐私保护方案研究

    Institute of Scientific and Technical Information of China (English)

    史敏仪; 李玲娟

    2014-01-01

    With the rapid development of Location-Based Service ( LBS) ,how to ensure the users' privacy security has become an ur-gent problem when they use LBS. In this paper,several primary location privacy protection technologies are analyzed and compared,and a central server-based location privacy protection scheme is proposed for protecting mobile user's location privacy. This scheme consid-ers the sensitive level of area according to different privacy protection needs,uses K-anonymity and pseudonyms to protect location priva-cy in sensitive areas,and applies footprint to assist anonymity. This scheme can effectively protect location privacy of moving object with-out reducing the quality of service.%随着基于位置的服务( LBS)的发展,如何保证用户在使用位置服务时的隐私安全,已成为一个亟待解决的问题。文中对主流的位置隐私保护技术进行了分析和比较。在此基础上,针对移动用户的位置隐私保护,提出了一种基于中心服务器的位置隐私保护方案。该方案针对隐私保护需求的差异性,考虑区域的敏感等级,对敏感区域采用K-匿名和假名进行保护,同时运用脚印来辅助匿名。该方案能在不降低位置服务质量的前提下,有效地保护移动用户位置隐私。

  16. Designing Multi Objective Facility Location Models Based on Multiple Type Facility Dispersion and Data Envelopment Analysis Using Fuzzy Goal Programing Approach

    Directory of Open Access Journals (Sweden)

    Mahdi Karbasian

    2013-01-01

    Full Text Available In this paper, four different multiple-type dispersion facilities location modeling formulations have been developed, which utilize efficiency measures of Data Envelopment Analysis to find optimal and efficient facility location patterns. While the problems studied previously do not clearly indicate which candidate is elected by a unit, simultaneous DEA approach has been used for analysis. In these models, existing facilities are considered. These models with two objectives, considerabely match the real world problems. Since these four models are multiobjective, a fuzzy goal programming approach has been applied to solve the four problems. In this paper, after introducing the proposed models, an example, with the results of numerical calculations has been presented.

  17. 基于Harris-SIFT算法的双目立体视觉定位%Object Location Technique for Binocular Stereo Vision Based on Harris-SIFT Algorithm

    Institute of Scientific and Technical Information of China (English)

    李耀云; 贾敏智

    2013-01-01

    针对基于尺度空间对图象保持不变性的SIFT算法在双目立体视觉应用时实时性差、误匹配等问题,提出一种运用Harris-SIFT算法进行双目立体视觉定位方法.通过介绍双目立体视觉的模型原理,利用Harris-SIFT算法从左右摄像机分别获取的图像中检测目标,并获取匹配目标的特征点,对两幅图像中目标物体的坐标标定,通过计算可得到目标物体的深度距离,还原其三维信息.实验证明,运用Harris-SIFT算法使该系统的实时性能和距离精度得到提高.%The object location technique for binocular stereo vision has some problems of the poor real-time performance and the mismatching based on the SIFT algorithm of the scale space to image keep invariance.A method of the object location technique for binocular stereo vision developed based on the Harris-SIFT algorithm is presented.Through the introduction of the binocular stereo vision model principle,adopting new Harris-SIFT algorithm to get the camera image form the two detection target,and for matching the feature points of the target,according to the target object coordinate calibration two images of the two images.Through the calculation can get the depth of the object distance,reducing the 3d information.The experiments improve the real-time performance and the accuracy distance based on the Harris-SIFT algorithm.

  18. Analysis of the Bayesian Cramer-Rao lower bound in astrometry: Studying the impact of prior information in the location of an object

    CERN Document Server

    Echeverria, Alex; Mendez, Rene A; Orchard, Marcos

    2016-01-01

    Context. The best precision that can be achieved to estimate the location of a stellar-like object is a topic of permanent interest in the astrometric community. Aims. We analyse bounds for the best position estimation of a stellar-like object on a CCD detector array in a Bayesian setting where the position is unknown, but where we have access to a prior distribution. In contrast to a parametric setting where we estimate a parameter from observations, the Bayesian approach estimates a random object (i.e., the position is a random variable) from observations that are statistically dependent on the position. Methods. We characterize the Bayesian Cramer-Rao (CR) that bounds the minimum mean square error (MMSE) of the best estimator of the position of a point source on a linear CCD-like detector, as a function of the properties of detector, the source, and the background. Results. We quantify and analyse the increase in astrometric performance from the use of a prior distribution of the object position, which is ...

  19. The metabotropic glutamate 2/3 receptor agonist LY379268 counteracted ketamine-and apomorphine-induced performance deficits in the object recognition task, but not object location task, in rats.

    Science.gov (United States)

    Pitsikas, Nikolaos; Markou, Athina

    2014-10-01

    Experimental evidence indicates that the non competitive N-methyl-d-aspartate (NMDA) receptor antagonist ketamine and the mixed dopamine (DA) D1/D2 receptor agonist apomorphine induce schizophrenia-like symptoms in rodents, including cognitive deficits. Activation of Group II metabotropic glutamate 2/3 (mGlu2/3) receptors reduces the excessive glutamate release that is hypothesized to be associated with psychiatric disorders. Thus, mGlu2/3 receptor agonists may reverse deficits induced by excessive glutamate or DA release induced by administration of NMDA receptor antagonists and DA receptor agonists, respectively, and potentially those seen in schizophrenia. LY379268 is a selective mGlu2/3 receptor agonist that has shown to be effective in several animal models of stroke, epilepsy, and drug abuse. The present study investigated whether LY379268 antagonizes non-spatial and spatial recognition memory deficits induced by ketamine and apomorphine administration in rats. To assess the effects of the compounds on non-spatial and spatial recognition memory, the object recognition task and object location task were used. Post-training administration of LY379268 (1-3 mg/kg, i.p.) counteracted ketamine (3 mg/kg, i.p.) and apomorphine (1 mg/kg, i.p.)-induced performance deficits in the object recognition task. In contrast, LY379268 (1-3 mg/kg, i.p.) did not attenuate spatial recognition memory deficits produced by ketamine (3 mg/kg, i.p.) or apomorphine (1 mg/kg, i.p.) in the object location task. The present data show that the mGlu2/3 receptor agonist LY379268 reversed non-spatial, but not spatial, recognition memory deficits induced by NMDA receptor blockade or DA receptor agonism in rodents. Thus, such mGlu2/3 receptor agonists may be efficacious in reversing some memory deficits seen in schizophrenia patients.

  20. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  1. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  2. Solving a bi-objective mathematical model for location-routing problem with time windows in multi-echelon reverse logistics using metaheuristic procedure

    Science.gov (United States)

    Ghezavati, V. R.; Beigi, M.

    2016-06-01

    During the last decade, the stringent pressures from environmental and social requirements have spurred an interest in designing a reverse logistics (RL) network. The success of a logistics system may depend on the decisions of the facilities locations and vehicle routings. The location-routing problem (LRP) simultaneously locates the facilities and designs the travel routes for vehicles among established facilities and existing demand points. In this paper, the location-routing problem with time window (LRPTW) and homogeneous fleet type and designing a multi-echelon, and capacitated reverse logistics network, are considered which may arise in many real-life situations in logistics management. Our proposed RL network consists of hybrid collection/inspection centers, recovery centers and disposal centers. Here, we present a new bi-objective mathematical programming (BOMP) for LRPTW in reverse logistic. Since this type of problem is NP-hard, the non-dominated sorting genetic algorithm II (NSGA-II) is proposed to obtain the Pareto frontier for the given problem. Several numerical examples are presented to illustrate the effectiveness of the proposed model and algorithm. Also, the present work is an effort to effectively implement the ɛ-constraint method in GAMS software for producing the Pareto-optimal solutions in a BOMP. The results of the proposed algorithm have been compared with the ɛ-constraint method. The computational results show that the ɛ-constraint method is able to solve small-size instances to optimality within reasonable computing times, and for medium-to-large-sized problems, the proposed NSGA-II works better than the ɛ-constraint.

  3. Analysis of the Bayesian Cramér-Rao lower bound in astrometry. Studying the impact of prior information in the location of an object

    Science.gov (United States)

    Echeverria, Alex; Silva, Jorge F.; Mendez, Rene A.; Orchard, Marcos

    2016-10-01

    Context. The best precision that can be achieved to estimate the location of a stellar-like object is a topic of permanent interest in the astrometric community. Aims: We analyze bounds for the best position estimation of a stellar-like object on a CCD detector array in a Bayesian setting where the position is unknown, but where we have access to a prior distribution. In contrast to a parametric setting where we estimate a parameter from observations, the Bayesian approach estimates a random object (i.e., the position is a random variable) from observations that are statistically dependent on the position. Methods: We characterize the Bayesian Cramér-Rao (CR) that bounds the minimum mean square error (MMSE) of the best estimator of the position of a point source on a linear CCD-like detector, as a function of the properties of detector, the source, and the background. Results: We quantify and analyze the increase in astrometric performance from the use of a prior distribution of the object position, which is not available in the classical parametric setting. This gain is shown to be significant for various observational regimes, in particular in the case of faint objects or when the observations are taken under poor conditions. Furthermore, we present numerical evidence that the MMSE estimator of this problem tightly achieves the Bayesian CR bound. This is a remarkable result, demonstrating that all the performance gains presented in our analysis can be achieved with the MMSE estimator. Conclusions: The Bayesian CR bound can be used as a benchmark indicator of the expected maximum positional precision of a set of astrometric measurements in which prior information can be incorporated. This bound can be achieved through the conditional mean estimator, in contrast to the parametric case where no unbiased estimator precisely reaches the CR bound.

  4. Hidden variables and hidden time in quantum theory

    OpenAIRE

    Kurakin, Pavel V.

    2005-01-01

    Bell's theorem proves only that hidden variables evolving in true physical time can't exist; still the theorem's meaning is usually interpreted intolerably wide. The concept of hidden time (and, in general, hidden space-time) is introduced. Such concept provides a whole new class of physical theories, fully compatible with current knowledge, but giving new tremendous possibilities. Those theories do not violate Bell's theorem.

  5. Maternal separation enhances object location memory and prevents exercise-induced MAPK/ERK signalling in adult Sprague-Dawley rats.

    Science.gov (United States)

    Makena, Nokuthula; Bugarith, Kishor; Russell, Vivienne A

    2012-09-01

    Early life stress increases the risk of developing psychopathology accompanied by reduced cognitive function in later life. Maternal separation induces anxiety-like behaviours and is associated with impaired memory. On the other hand, exercise has been shown to diminish anxiety-like behaviours and improve cognitive function. The effects of maternal separation and exercise on anxiety, memory and hippocampal proteins were investigated in male Sprague-Dawley rats. Maternal separation produced anxiety-like behaviours which were reversed by exercise. Maternal separation also enhanced object location memory which was not affected by exercise. Exercise did, however, increase synaptophysin and phospho-extracellular signal-regulated kinase (p-ERK) in the hippocampus of non-separated rats and this effect was not observed in maternally separated rats. These findings show that maternal separation selectively enhanced n memory and prevented activation of the MAPK/ERK signalling pathway in the adult rat hippocampus.

  6. Tactile Sensing with Whiskers of Various Shapes: Determining the Three-Dimensional Location of Object Contact Based on Mechanical Signals at the Whisker Base.

    Science.gov (United States)

    Huet, Lucie A; Rudnicki, John W; Hartmann, Mitra J Z

    2017-06-01

    Almost all mammals use their mystacial vibrissae (whiskers) as important tactile sensors. There are no sensors along the length of a whisker: all sensing is performed by mechanoreceptors at the whisker base. To use artificial whiskers as a sensing tool in robotics, it is essential to be able to determine the three-dimensional (3D) location at which a whisker has made contact with an object. With the assumption of quasistatic, frictionless, single-point contact, previous work demonstrated that the 3D contact point can be uniquely determined if all six components of force and moment are measured at the whisker base, but these measurements require a six-axis load cell. Here, we perform simulations to investigate the extent to which each of the 20 possible "triplet" combinations of the six mechanical signals at the whisker base uniquely determine 3D contact point location. We perform this analysis for four different whisker profiles (shapes): tapered with and without intrinsic curvature, and cylindrical with and without intrinsic curvature. We show that whisker profile has a strong influence on the particular triplet(s) of signals that uniquely map to the 3D contact point. The triplet of bending moment, bending moment direction, and axial force produces unique mappings for tapered whiskers. Four different mappings are unique for a cylindrical whisker without intrinsic curvature, but only when large deflections are excluded. These results inform the neuroscience of vibrissotactile sensing and represent an important step toward the development of artificial whiskers for robotic applications.

  7. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The locations of the breaks are subsequently obtained by assigning states to data points according to the Maximum Posterior Mode (MPM) algorithm. The Integrated Classification Likelihood-Bayesian Information Criterion (ICL-BIC) allows for the determination of the number of regimes by taking into account...... in the monetary policy of United States, the dierent functional form being variants of the Taylor (1993) rule....

  8. Objective Display and Discrimination of Floral Odors from Amorphophallus titanum, Bloomed on Different Dates and at Different Locations, Using an Electronic Nose

    Directory of Open Access Journals (Sweden)

    Keiichi Ikeda

    2012-02-01

    Full Text Available As olfactory perceptions vary from person to person, it is difficult to describe smells objectively. In contrast, electronic noses also detect smells with their sensors, but in addition describe those using electronic signals. Here we showed a virtual connection method between a human nose perceptions and electronic nose responses with the smell of standard gases. In this method, Amorphophallus titanum flowers, which emit a strong carrion smell, could objectively be described using an electronic nose, in a way resembling the skill of sommeliers. We could describe the flower smell to be close to that of a mixture of methyl mercaptan and propionic acid, by calculation of the dilution index from electronic resistances. In other words, the smell resembled that of “decayed cabbage, garlic and pungent sour” with possible descriptors. Additionally, we compared the smells of flowers which bloomed on different dates and at different locations and showed the similarity of odor intensities visually, in standard gas categories. We anticipate our assay to be a starting point for a perceptive connection between our noses and electronic noses.

  9. Location of the Gamma-Ray Flaring Emission in the Parse-Scale Jet of the BL Lac Object AO 0235+164

    CERN Document Server

    Agudo, Ivan; Jorstad, Svetlana G; Larionov, Valeri M; Gomez, Jose L; Lahteenmaki, Anne; Smith, Paul S; Nilsson, Kari; Readhead, Anthony C S; Aller, Margo F; Heidt, Jochen; Gurwell, Mark; Thum, Clemens; Wehrle, Ann E; Kurtanidze, Omar M

    2011-01-01

    We locate the gamma-ray and lower frequency emission in flares of the BL Lac object AO 0235+164 at >12pc in the jet of the source from the central engine. We employ time-dependent multi-spectral-range flux and linear polarization monitoring observations, as well as ultra-high resolution (~0.15 milliarcsecond) imaging of the jet structure at lambda=7mm. The time coincidence in the end of 2008 of the propagation of the brightest superluminal feature detected in AO 0235+164 (Qs) with an extreme multi-spectral-range (gamma-ray to radio) outburst, and an extremely high optical and 7mm (for Qs) polarization degree provides strong evidence supporting that all these events are related. This is confirmed at high significance by probability arguments and Monte-Carlo simulations. These simulations show the unambiguous correlation of the gamma-ray flaring state in the end of 2008 with those in the optical, millimeter, and radio regime, as well as the connection of a prominent X-ray flare in October 2008, and of a series ...

  10. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  11. Defining of the 2-D surface of the anomaly stressed magnetic hierarchical object located in the layered blocked geological medium using the data of acoustic and electromagnetic monitoring

    Science.gov (United States)

    Hachay, Olga; Khachay, Andrey

    2017-04-01

    Geological medium is an open system which is influenced by outer and inner factors that can lead it to an unstable state. Such non stability usually occurred locally in zones, which we name as dynamically active elements. They can be indicators of potential catastrophic events. These zones differ from the surrounding geological medium by their structural forms, which are often of hierarchical type. The process of their activization can be researched with use of wave fields monitoring. For that purpose we had earlier developed algorithms of modeling wave field propagation through the local objects with hierarchical structure. This paper concerns a new approach for interpretation of the distribution of wave fields for determining of the contours of these local hierarchical objects. In this work we consider an algorithm for constructing of two equations of theoretical inverse problem for 2D linear polarized transverse elastic wave and transverse electromagnetic field by excitation of the N-layered elastic and conductive medium with hierarchic elastic, anomaly stressed and magnetic inclusion located in the ν-th layer with the density and conductivity equal to the density and conductivity of the layer. An iteration process of solving the inverse problem for the case of certain configurations of hierarchical 2-D inclusions of k-th rank is elaborated. When interpreting the results of the monitoring it is needed to use the data of such systems that are configured to study the hierarchical structure of the medium. Findings. From the theory it is obviously that for such complicated medium each wave field contains its own information about the inner structure of the hierarchical inclusion. Therefore it is needed to interpret the monitoring data for each wave field apart, and not mixes the data base. Practical value/implications. These results will be the base for constructing new systems of monitoring observations of dynamical geological systems. Especially it is needed to

  12. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  13. On the Location of the gamma-Ray Outburst Emission in the BL Lacertae Object AO 0235 + 164 Through Observations Across the Electromagnetic Spectrum

    Science.gov (United States)

    Agudo, Ivan; Marscher, Alan P.; Jorstad, Svetlana G.; Larionov, Valeri M.; Gomez, Jose L.; Laehteenmaeki, Anne; Smith, Paul S.; Nilsson, Kari; Readhead, Anthony C. S.; Aller, Margo F.; Heidt, Jochien; Gurwell, Mark; Thum, Clemens; Wehrle, Ann E.; Nikolashvili, Maria G.; Aller, Hugh D.; Benitez, Erika; Blinov, Dmitriy A.; Hagen-Thorn, Vladimir A.; Hiriart, David; Jannuzi, Buell T.; Joshi, Manasvita; Kimeridze, Givi N.; Kurtanidze, Omar M.; Kurtanidze, Sofia O.

    2011-01-01

    We present observations of a major outburst at centimeter, millimeter, optical, X-ray, and gamma-ray wavelengths of the BL Lacertae object AO 0235+164. We analyze the timing of multi-waveband variations in the flux and linear polarization, as well as changes in Very Long Baseline Array images at A = 7 mm with approx.0.15 milliarcsec resolution. The association of the events at different wavebands is confirmed at high statistical significance by probability arguments and Monte Carlo simulations. A series of sharp peaks in optical linear polarization, as well as a pronounced maximum in the 7 mm polarization of a superluminal jet knot, indicate rapid fluctuations in the degree of ordering of the magnetic field. These results lead us to conclude that the outburst occurred in the jet both in the quasi-stationary "core" and in the superluminal knot, both parsecs downstream of the supermassive black hole. We interpret the outburst as a consequence of the propagation of a disturbance, elongated along the line of sight by light-travel time delays, that passes through a standing recollimation shock in the core and propagates down the jet to create the superluminal knot. The multi-wavelength light curves vary together on long timescales (months/ years), but the correspondence is poorer on shorter timescales. This, as well as the variability of the polarization and the dual location of the outburst, agrees with the expectations of a multi-zone emission model in which turbulence plays a major role in modulating the synchrotron and inverse Compton fluxes.

  14. On the Location of the gamma-Ray Outburst Emission in the BL Lacertae Object AO 0235 + 164 Through Observations Across the Electromagnetic Spectrum

    Science.gov (United States)

    Agudo, Ivan; Marscher, Alan P.; Jorstad, Svetlana G.; Larionov, Valeri M.; Gomez, Jose L.; Laehteenmaeki, Anne; Smith, Paul S.; Nilsson, Kari; Readhead, Anthony C. S.; Aller, Margo F.; hide

    2011-01-01

    We present observations of a major outburst at centimeter, millimeter, optical, X-ray, and gamma-ray wavelengths of the BL Lacertae object AO 0235+164. We analyze the timing of multi-waveband variations in the flux and linear polarization, as well as changes in Very Long Baseline Array images at A = 7 mm with approx.0.15 milliarcsec resolution. The association of the events at different wavebands is confirmed at high statistical significance by probability arguments and Monte Carlo simulations. A series of sharp peaks in optical linear polarization, as well as a pronounced maximum in the 7 mm polarization of a superluminal jet knot, indicate rapid fluctuations in the degree of ordering of the magnetic field. These results lead us to conclude that the outburst occurred in the jet both in the quasi-stationary "core" and in the superluminal knot, both parsecs downstream of the supermassive black hole. We interpret the outburst as a consequence of the propagation of a disturbance, elongated along the line of sight by light-travel time delays, that passes through a standing recollimation shock in the core and propagates down the jet to create the superluminal knot. The multi-wavelength light curves vary together on long timescales (months/ years), but the correspondence is poorer on shorter timescales. This, as well as the variability of the polarization and the dual location of the outburst, agrees with the expectations of a multi-zone emission model in which turbulence plays a major role in modulating the synchrotron and inverse Compton fluxes.

  15. Effects of the cannabinoid 1 receptor peptide ligands hemopressin, (m)RVD-hemopressin(α) and (m)VD-hemopressin(α) on memory in novel object and object location recognition tasks in normal young and Aβ1-42-treated mice.

    Science.gov (United States)

    Zhang, Rui-San; He, Zhen; Jin, Wei-Dong; Wang, Rui

    2016-10-01

    The cannabinoid system plays an important role in memory processes, many studies have indicated that cannabinoid receptor ligands have ability to modulate memory in rodents. A nonapeptide hemopressin (Hp) derived from rat brain, acts as a peptide antagonist or selective inverse peptide agonist of cannabinoid 1 (CB1) receptor. N-terminally extended forms of Hp isolated from mouse brain, (m)RVD-hemopressin(α) (RVD) and (m)VD-hemopressin(α) (VD) also bind CB1 receptor, however, as peptide agonists. Here, we investigated the roles of Hp, RVD, and VD on memory in mice using novel object recognition (NOR) and object location recognition (OLR) tasks. In normal young mice, intracerebroventricular (i.c.v.) infusion of Hp before training not only improved memory formation, but also prolonged memory retention in the tasks, these effects could be inhibited by RVD or VD at the same dose and intraperitoneal (i.p.) injection of a small molecule agonist of CB1 receptor WIN55, 212-2 15min before administration of Hp inhibited the memory-improving effect of Hp. In addition, under the same experimental conditions, i.c.v. RVD or VD displayed memory-impairing effects, which could be prevented by Hp (i.c.v.) or AM251 (i.p.), a small molecule antagonist of CB1 receptor. Infusion of amyloid-β (1-42) (Aβ1-42) 14days before training resulted in impairment of memory in mice which could be used as animal model of Alzheimer's disease (AD). In these mice, RVD or VD (i.c.v.) reversed the memory impairment induced by Aβ1-42, and the effects of RVD and VD could be suppressed by Hp (i.c.v.) or AM251 (2mg/kg, i.p.). Separate administration of Hp had no effect in Aβ1-42-treated mice. The above results suggested that Hp, RVD and VD, as CB1 receptor peptide ligands, may be potential drugs to treatment of the memory deficit-involving disease, just as AD. Copyright © 2016 Elsevier Inc. All rights reserved.

  16. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  17. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  18. Microgenetic analysis of hidden figures

    OpenAIRE

    Marković Slobodan S.; Gvozdenović Vasilije P.

    2006-01-01

    In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenes...

  19. The Hidden Subgroup Problem

    CERN Document Server

    Wang, Frédéric

    2010-01-01

    We give an overview of the Hidden Subgroup Problem (HSP) as of July 2010, including new results discovered since the survey of arXiv:quant-ph/0411037v1. We recall how the problem provides a framework for efficient quantum algorithms and present the standard methods based on coset sampling. We study the Dihedral and Symmetric HSPs and how they relate to hard problems on lattices and graphs. Finally, we conclude with the known solutions and techniques, describe connections with efficient algorithms as well as miscellaneous variants of HSP. We also bring various contributions to the topic. We show that in theory, we can solve HSP over a given group inductively: the base case is solving HSP over its simple factor groups and the inductive step is building efficient oracles over a normal subgroup N and over the factor group G/N. We apply this analysis to the Dedekindian HSP to get an alternative abelian HSP algorithm based on a change of the underlying group. We also propose a quotient reduction by the normal group...

  20. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs. In......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group.......This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  1. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs of offshor...... of our study is to suggest how hidden costs of offshoring can be mitigated through an explicit orientation towards improving organizational processes and structures as well as experience with offshoring.......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  2. Location anonymity method of mobile objects continuous query%移动对象连续查询位置匿名策略

    Institute of Scientific and Technical Information of China (English)

    赵洪斌; 马志强; 印桂生; 韩启龙

    2015-01-01

    Location-based services applications are increasingly entering people’s daily lives. Although a location-based service is quite convenient, privacy protection has received considerable attention in location-based services. Currently, there have been numerous studies on protecting location privacy and many methods have been proposed. However, most existing location anonymous method is for a snapshot query, without considering the location privacy leak in continuous LBS queries. This paper proposes a dummy-based anonymizing method based on user history location to protect location privacy in continuous LBS queries.%用户位置隐私保护已经成为基于位置服务领域研究的热点问题之一,现有的方法多是只针对用户单独一次查询的隐私保护,没有考虑移动过程中由于连续查询而造成的位置隐私泄露问题。主要针对连续查询下的移动对象位置隐私保护提出一种基于历史用户的虚假用户生成的位置匿名方法,该方法结合用户历史数据,通过确定合理的假用户生成区域及假用户生成时刻其空间位置,使虚假用户能够实时对真实用户位置进行保护,通过实验验证其可行性和有效性。

  3. Uncovering the Hidden Web, Part II: Resources for Your Classroom. ERIC Digest.

    Science.gov (United States)

    Mardis, Marcia

    Too often, search engines don't see and directories can overlook clearinghouses, digital libraries, full-text databases, and learning objects. In contrast, the hidden Web is rich with these high quality and cutting-edge learning materials. By integrating resources from the hidden Web into the classroom, educators extend their instruction in new…

  4. What's the object of object working memory in infancy? Unraveling 'what' and 'how many'.

    Science.gov (United States)

    Kibbe, Melissa M; Leslie, Alan M

    2013-06-01

    Infants have a bandwidth-limited object working memory (WM) that can both individuate and identify objects in a scene, (answering 'how many?' or 'what?', respectively). Studies of infants' WM for objects have typically looked for limits on either 'how many' or 'what', yielding different estimates of infant capacity. Infants can keep track of about three individuals (regardless of identity), but appear to be much more limited in the number of specific identities they can recall. Why are the limits on 'how many' and 'what' different? Are the limits entirely separate, do they interact, or are they simply two different aspects of the same underlying limit? We sought to unravel these limits in a series of experiments which tested 9- and 12-month-olds' WM for object identities under varying degrees of difficulty. In a violation-of-expectation looking-time task, we hid objects one at a time behind separate screens, and then probed infants' WM for the shape identity of the penultimate object in the sequence. We manipulated the difficulty of the task by varying both the number of objects in hiding locations and the number of means by which infants could detect a shape change to the probed object. We found that 9-month-olds' WM for identities was limited by the number of hiding locations: when the probed object was one of two objects hidden (one in each of two locations), 9-month-olds succeeded, and they did so even though they were given only one means to detect the change. However, when the probed object was one of three objects hidden (one in each of three locations), they failed, even when they were given two means to detect the shape change. Twelve-month-olds, by contrast, succeeded at the most difficult task level. Results show that WM for 'how many' and for 'what' are not entirely separate. Individuated objects are tracked relatively cheaply. Maintaining bindings between indexed objects and identifying featural information incurs a greater attentional/memory cost

  5. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  6. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  7. Hidden Variables or Positive Probabilities?

    CERN Document Server

    Rothman, T; Rothman, Tony

    2001-01-01

    Despite claims that Bell's inequalities are based on the Einstein locality condition, or equivalent, all derivations make an identical mathematical assumption: that local hidden-variable theories produce a set of positive-definite probabilities for detecting a particle with a given spin orientation. The standard argument is that because quantum mechanics assumes that particles are emitted in a superposition of states the theory cannot produce such a set of probabilities. We examine a paper by Eberhard who claims to show that a generalized Bell inequality, the CHSH inequality, can be derived solely on the basis of the locality condition, without recourse to hidden variables. We point out that he nonetheless assumes a set of positive-definite probabilities, which supports the claim that hidden variables or "locality" is not at issue here, positive-definite probabilities are. We demonstrate that quantum mechanics does predict a set of probabilities that violate the CHSH inequality; however these probabilities ar...

  8. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    2014-01-01

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated S-lemma

  9. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  10. Hidden symmetries in jammed systems

    Science.gov (United States)

    Morse, Peter K.; Corwin, Eric I.

    2016-07-01

    There are deep, but hidden, geometric structures within jammed systems, associated with hidden symmetries. These can be revealed by repeated transformations under which these structures lead to fixed points. These geometric structures can be found in the Voronoi tesselation of space defined by the packing. In this paper we examine two iterative processes: maximum inscribed sphere (MIS) inversion and a real-space coarsening scheme. Under repeated iterations of the MIS inversion process we find invariant systems in which every particle is equal to the maximum inscribed sphere within its Voronoi cell. Using a real-space coarsening scheme we reveal behavior in geometric order parameters which is length-scale invariant.

  11. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  12. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  13. Modeling Multiple Risks: Hidden Domain of Attraction

    CERN Document Server

    Mitra, Abhimanyu

    2011-01-01

    Hidden regular variation is a sub-model of multivariate regular variation and facilitates accurate estimation of joint tail probabilities. We generalize the model of hidden regular variation to what we call hidden domain of attraction. We exhibit examples that illustrate the need for a more general model and discuss detection and estimation techniques.

  14. Pentaquark states with hidden charm

    Science.gov (United States)

    Bijker, Roelof

    2017-07-01

    I develop an extension of the usual three-flavor quark model to four flavors (u, d, s and c), and discuss the classification of pentaquark states with hidden charm. This work is motivated by the recent observation of such states by the LHCb Collatoration at CERN.

  15. Microgenetic analysis of hidden figures

    Directory of Open Access Journals (Sweden)

    Marković Slobodan S.

    2006-01-01

    Full Text Available In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenesis of the perception of hidden figures was investigated. The primed matching paradigm and the same-different task were used. In each experiment two types of test figures were contrasted: the more frequent and the less frequent ones. There were two prime types: identical (equal to test figures and complex (the pattern with hidden test figures. The prime duration was varied, 50 ms and 400 ms. The main result indicates that in the case of complex priming the more frequent test figures were processed significantly faster than the less frequent ones in both prime duration conditions. These results suggest that the faster the processing of a figure, the more probable the perceptual generation of this figure.

  16. Performance based analysis of hidden beams in reinforced concrete structures

    Directory of Open Access Journals (Sweden)

    Helou Samir H.

    2014-01-01

    Full Text Available Local and perhaps regional vernacular reinforced concrete building construction leans heavily against designing slabs with imbedded hidden beams for flooring systems in most structures including major edifices. The practice is distinctive in both framed and in shear wall structures. Hidden beams are favoured structural elements due to their many inherent features that characterize them; they save on floor height clearance; they also save on formwork, labour and material cost. Moreover, hidden beams form an acceptable aesthetic appearance that does not hinder efficient interior space partitioning. Such beams have the added advantage of clearing the way for horizontal electromechanical ductwork. However, seismic considerations, in all likelihood, are seldom seriously addressed. The mentioned structural system of shallow beams is adopted in ribbed slabs, waffle slabs and at times with solid slabs. Ribbed slabs and waffle slabs are more prone to hidden beam inclusion due to the added effective height of the concrete section. Due to the presence of a relatively high reinforcement ratio at the joints the sections at such location tend to become less ductile with unreliable contribution to spandrel force resistance. In the following study the structural influence of hidden beams within slabs is investigated. With the primary focus on a performance based analysis of such elements within a structure. This is investigated with due attention to shear wall contribution to the overall behaviour of such structures. Numerical results point in the direction that the function of hidden beams is not as adequate as desired. Therefore it is strongly believed that they are generally superfluous and maybe eliminated altogether. Conversely, shallow beams seem to render the overall seismic capacity of the structure unreliable. Since such an argument is rarely manifested within the linear analysis domain; a pushover analysis exercise is thus mandatory for behaviour

  17. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  18. Locatives in Kpelle.

    Science.gov (United States)

    Kuha, Mai

    This paper examines the differences between locative expressions in Kpelle and English, based on the dialect of one native speaker of Kpelle. It discusses the crucial role of the reference object in defining the meaning of locatives in Kpelle, in contrast to English, where the characteristics of the object to be located are less important. An…

  19. Quantum Hidden Subgroup Problems A Mathematical Perspective

    CERN Document Server

    Lomonaco, S J; Lomonaco, Samuel J.; Kauffman, Louis H.

    2002-01-01

    The ultimate objective of this paper is to create a stepping stone to the development of new quantum algorithms. The strategy chosen is to begin by focusing on the class of abelian quantum hidden subgroup algorithms, i.e., the class of abelian algorithms of the Shor/Simon genre. Our strategy is to make this class of algorithms as mathematically transparent as possible. By the phrase "mathematically transparent" we mean to expose, to bring to the surface, and to make explicit the concealed mathematical structures that are inherently and fundamentally a part of such algorithms. In so doing, we create symbolic abelian quantum hidden subgroup algorithms that are analogous to the those symbolic algorithms found within such software packages as Axiom, Cayley, Maple, Mathematica, and Magma. As a spin-off of this effort, we create three different generalizations of Shor's quantum factoring algorithm to free abelian groups of finite rank. We refer to these algorithms as wandering (or vintage Z_Q) Shor algorithms. They...

  20. Location of gamma-ray Flare Emission in the Jet of the BL Lacertae Object OJ287 more than 14pc from the Central Engine

    CERN Document Server

    Agudo, Ivan; Marscher, Alan P; Larionov, Valeri M; Gomez, Jose L; Lahteenmaki, Anne; Gurwell, Mark A; Smith, Paul S; Wiesemeyer, Helmut; Thum, Clemens; Heidt, Jochen; Blinov, Dmitriy A; D'Arcangelo, Francesca D; Hagen-Thorn, Vladimir A; Morozova, Daria A; Nieppola, Elina; Roca-Sogorb, Mar; Schmidt, Gary D; Taylor, Brian; Tornikoski, Merja; Troitsky, Ivan S

    2010-01-01

    We combine time-dependent multi-waveband flux and linear polarization observations with sub-milliarcsecond-scale polarimetric images at lambda=7mm of the BL Lacertae-type blazar OJ287 to locate the gamma-ray emission in prominent flares in the jet of the source >14pc from the central engine. We demonstrate a highly significant correlation between the strongest gamma-ray and millimeter-wave flares through Monte-Carlo simulations. The two reported gamma-ray peaks occurred near the beginning of two major mm-wave outbursts, each of which is associated with a linear polarization maximum at millimeter wavelengths. Our Very Long Baseline Array observations indicate that the two mm-wave flares originated in the second of two features in the jet that are separated by >14 pc. The simultaneity of the peak of the higher-amplitude gamma-ray flare and the maximum in polarization of the second jet feature implies that the gamma-ray and mm-wave flares are co-spatial and occur >14 pc from the central engine. We also associate...

  1. Nonintentional behavioural responses to psi : hidden targets and hidden observers

    OpenAIRE

    Anderson, Mary-Jane Charlotte

    2012-01-01

    Psi is the phenomenon of apparently responding to or receiving information by means other than the recognised senses. Psi information may influence human behaviour, without the individual intending this or even being aware of it. This thesis seeks to investigate nonintentional behavioural responses to psi. We present five empirical studies that investigated nonintentional behavioural responses to psi information. In each study, the psi information was hidden from participants, ...

  2. Location of γ-ray Flare Emission in the Jet of the BL Lacertae Object OJ287 More than 14 pc from the Central Engine

    Science.gov (United States)

    Agudo, Iván; Jorstad, Svetlana G.; Marscher, Alan P.; Larionov, Valeri M.; Gómez, José L.; Lähteenmäki, Anne; Gurwell, Mark; Smith, Paul S.; Wiesemeyer, Helmut; Thum, Clemens; Heidt, Jochen; Blinov, Dmitriy A.; D'Arcangelo, Francesca D.; Hagen-Thorn, Vladimir A.; Morozova, Daria A.; Nieppola, Elina; Roca-Sogorb, Mar; Schmidt, Gary D.; Taylor, Brian; Tornikoski, Merja; Troitsky, Ivan S.

    2011-01-01

    We combine time-dependent multi-waveband flux and linear polarization observations with submilliarcsecond-scale polarimetric images at λ = 7 mm of the BL Lacertae type blazar OJ287 to locate the γ-ray emission in prominent flares in the jet of the source >14 pc from the central engine. We demonstrate a highly significant correlation between the strongest γ-ray and millimeter-wave flares through Monte Carlo simulations. The two reported γ-ray peaks occurred near the beginning of two major millimeter-wave outbursts, each of which is associated with a linear polarization maximum at millimeter wavelengths. Our very long baseline array observations indicate that the two millimeter-wave flares originated in the second of two features in the jet that are separated by >14 pc. The simultaneity of the peak of the higher-amplitude γ-ray flare and the maximum in polarization of the second jet feature implies that the γ-ray and millimeter-wave flares are cospatial and occur >14 pc from the central engine. We also associate two optical flares, accompanied by sharp polarization peaks, with the two γ-ray events. The multi-waveband behavior is most easily explained if the γ-rays arise from synchrotron self-Compton scattering of optical photons from the flares. We propose that flares are triggered by interaction of moving plasma blobs with a standing shock. The γ-ray and optical emission is quenched by inverse Compton losses as synchrotron photons from the newly shocked plasma cross the emission region. The millimeter-wave polarization is high at the onset of a flare, but decreases as the electrons emitting at these wavelengths penetrate less polarized regions.

  3. Object permanence in the food-storing coal tit (Periparus ater) and the non-storing great tit (Parus major): Is the mental representation required?

    Science.gov (United States)

    Marhounová, Lucie; Frynta, Daniel; Fuchs, Roman; Landová, Eva

    2017-05-01

    Object permanence is a cognitive ability that enables animals to mentally represent the continuous existence of temporarily hidden objects. Generally, it develops gradually through six qualitative stages, the evolution of which may be connected with some specific ecological and behavioral factors. In birds, the advanced object permanence skills were reported in several storing species of the Corvidae family. In order to test the association between food-storing and achieved performance within the stages, we compared food-storing coal tits (Periparus ater) and nonstoring great tits (Parus major) using an adapted version of Uzgiris & Hunt's Scale 1 tasks. The coal tits significantly outperformed the great tits in searching for completely hidden objects. Most of the great tits could not solve the task when the object disappeared completely. However, the upper limit for both species is likely to be Stage 4. The coal tits could solve problems with simply hidden objects, but they used alternative strategies rather than mental representation when searching for completely hidden objects, especially if choosing between two locations. Our results also suggest that neophobia did not affect the overall performance in the object permanence tasks. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  4. On the Location of the Gamma-ray Emission in the 2008 Outburst in the BL Lacertae Object AO 0235+164 through Observations across the Electromagnetic Spectrum

    CERN Document Server

    Agudo, Ivan; Jorstad, Svetlana G; Larionov, Valeri M; Gomez, Jose L; Lahteenmaki, Anne; Smith, Paul S; Nilsson, Kari; Readhead, Anthony C S; Aller, Margo F; Heidt, Jochen; Gurwell, Mark; Thum, Clemens; Wehrle, Ann E; Aller, Hugh D; Benitez, Erika; Blinov, Dmitriy A; Hagen-Thorn, Vladimir A; Hiriart, David; Jannuzi, Buell T; Joshi, Manasvita; Lindfors, Elina; Molina, Sol N; Morozova, Daria A; Nieppola, Elina; Olmstead, Alice R; Reinthal, Riho; Roca--Sogorb, Mar; Schmidt, Gary D; Sillanpaa, Aimo; Takalo, Leo; Taylor, Brian; Tornikoski, Merja; Troitsky, Ivan S; Zook, Alma C; Wiesemeyer, Helmut

    2011-01-01

    We present observations of a major outburst at centimeter, millimeter, optical, X-ray, and gamma-ray wavelengths of the BL Lacertae object AO 0235+164. We analyze the timing of multi-waveband variations in the flux and linear polarization, as well as changes in Very Long Baseline Array (VLBA) images at 7mm with 0.15 milliarcsecond resolution. The association of the events at different wavebands is confirmed at high statistical significance by probability arguments and Monte-Carlo simulations. A series of sharp peaks in optical linear polarization, as well as a pronounced maximum in the 7 mm polarization of a superluminal jet knot, indicate rapid fluctuations in the degree of ordering of the magnetic field. These results lead us to conclude that the outburst occurred in the jet both in the quasi-stationary "core" and in the superluminal knot, both parsecs downstream of the supermassive black hole. We interpret the outburst as a consequence of the propagation of a disturbance, elongated along the line of sight ...

  5. Drum Sound Detection in Polyphonic Music with Hidden Markov Models

    OpenAIRE

    Jouni Paulus; Anssi Klapuri

    2009-01-01

    This paper proposes a method for transcribing drums from polyphonic music using a network of connected hidden Markov models (HMMs). The task is to detect the temporal locations of unpitched percussive sounds (such as bass drum or hi-hat) and recognise the instruments played. Contrary to many earlier methods, a separate sound event segmentation is not done, but connected HMMs are used to perform the segmentation and recognition jointly. Two ways of using HMMs are studied: modelling combination...

  6. Deep generative learning of location-invariant visual word recognition.

    Science.gov (United States)

    Di Bono, Maria Grazia; Zorzi, Marco

    2013-01-01

    It is widely believed that orthographic processing implies an approximate, flexible coding of letter position, as shown by relative-position and transposition priming effects in visual word recognition. These findings have inspired alternative proposals about the representation of letter position, ranging from noisy coding across the ordinal positions to relative position coding based on open bigrams. This debate can be cast within the broader problem of learning location-invariant representations of written words, that is, a coding scheme abstracting the identity and position of letters (and combinations of letters) from their eye-centered (i.e., retinal) locations. We asked whether location-invariance would emerge from deep unsupervised learning on letter strings and what type of intermediate coding would emerge in the resulting hierarchical generative model. We trained a deep network with three hidden layers on an artificial dataset of letter strings presented at five possible retinal locations. Though word-level information (i.e., word identity) was never provided to the network during training, linear decoding from the activity of the deepest hidden layer yielded near-perfect accuracy in location-invariant word recognition. Conversely, decoding from lower layers yielded a large number of transposition errors. Analyses of emergent internal representations showed that word selectivity and location invariance increased as a function of layer depth. Word-tuning and location-invariance were found at the level of single neurons, but there was no evidence for bigram coding. Finally, the distributed internal representation of words at the deepest layer showed higher similarity to the representation elicited by the two exterior letters than by other combinations of two contiguous letters, in agreement with the hypothesis that word edges have special status. These results reveal that the efficient coding of written words-which was the model's learning objective

  7. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  8. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  9. Visual cues given by humans are not sufficient for Asian elephants (Elephas maximus) to find hidden food.

    Science.gov (United States)

    Plotnik, Joshua M; Pokorny, Jennifer J; Keratimanochaya, Titiporn; Webb, Christine; Beronja, Hana F; Hennessy, Alice; Hill, James; Hill, Virginia J; Kiss, Rebecca; Maguire, Caitlin; Melville, Beckett L; Morrison, Violet M B; Seecoomar, Dannah; Singer, Benjamin; Ukehaxhaj, Jehona; Vlahakis, Sophia K; Ylli, Dora; Clayton, Nicola S; Roberts, John; Fure, Emilie L; Duchatelier, Alicia P; Getz, David

    2013-01-01

    Recent research suggests that domesticated species--due to artificial selection by humans for specific, preferred behavioral traits--are better than wild animals at responding to visual cues given by humans about the location of hidden food. \\Although this seems to be supported by studies on a range of domesticated (including dogs, goats and horses) and wild (including wolves and chimpanzees) animals, there is also evidence that exposure to humans positively influences the ability of both wild and domesticated animals to follow these same cues. Here, we test the performance of Asian elephants (Elephas maximus) on an object choice task that provides them with visual-only cues given by humans about the location of hidden food. Captive elephants are interesting candidates for investigating how both domestication and human exposure may impact cue-following as they represent a non-domesticated species with almost constant human interaction. As a group, the elephants (n = 7) in our study were unable to follow pointing, body orientation or a combination of both as honest signals of food location. They were, however, able to follow vocal commands with which they were already familiar in a novel context, suggesting the elephants are able to follow cues if they are sufficiently salient. Although the elephants' inability to follow the visual cues provides partial support for the domestication hypothesis, an alternative explanation is that elephants may rely more heavily on other sensory modalities, specifically olfaction and audition. Further research will be needed to rule out this alternative explanation.

  10. Visual cues given by humans are not sufficient for Asian elephants (Elephas maximus to find hidden food.

    Directory of Open Access Journals (Sweden)

    Joshua M Plotnik

    Full Text Available Recent research suggests that domesticated species--due to artificial selection by humans for specific, preferred behavioral traits--are better than wild animals at responding to visual cues given by humans about the location of hidden food. \\Although this seems to be supported by studies on a range of domesticated (including dogs, goats and horses and wild (including wolves and chimpanzees animals, there is also evidence that exposure to humans positively influences the ability of both wild and domesticated animals to follow these same cues. Here, we test the performance of Asian elephants (Elephas maximus on an object choice task that provides them with visual-only cues given by humans about the location of hidden food. Captive elephants are interesting candidates for investigating how both domestication and human exposure may impact cue-following as they represent a non-domesticated species with almost constant human interaction. As a group, the elephants (n = 7 in our study were unable to follow pointing, body orientation or a combination of both as honest signals of food location. They were, however, able to follow vocal commands with which they were already familiar in a novel context, suggesting the elephants are able to follow cues if they are sufficiently salient. Although the elephants' inability to follow the visual cues provides partial support for the domestication hypothesis, an alternative explanation is that elephants may rely more heavily on other sensory modalities, specifically olfaction and audition. Further research will be needed to rule out this alternative explanation.

  11. Active terahertz wave imaging system for detecting hidden objects

    Science.gov (United States)

    Gan, Yuner; Liu, Ming; Zhao, Yuejin

    2016-11-01

    Terahertz wave can penetrate the common dielectric materials such as clothing, cardboard boxes, plastics and so on. Besides, the low photon energy and non-ionizing characteristic of the terahertz wave are especially suitable for the safety inspection of the human body. Terahertz imaging technology has a tremendous potential in the field of security inspection such as stations, airports and other public places. Terahertz wave imaging systems are divided into two categories: active terahertz imaging systems and passive terahertz imaging systems. So far, most terahertz imaging systems work at point to point mechanical scan pattern with the method of passive imaging. The imaging results of passive imaging tend to have low contrast and the image is not clear enough. This paper designs and implements an active terahertz wave imaging system combining terahertz wave transmitting and receiving with a Cassegrain antenna. The terahertz wave at the frequency of 94GHz is created by impact ionization avalanche transit time (IMPATT) diode, focused on the feed element for Cassegrain antenna by high density polyethylene (HDPE) lens, and transmitted to the human body by Cassegrain antenna. The reflected terahertz wave goes the same way it was emitted back to the feed element for Cassegrain antenna, focused on the horn antenna of detector by another high density polyethylene lens. The scanning method is the use of two-dimensional planar mirror, one responsible for horizontal scanning, and another responsible for vertical scanning. Our system can achieve a clear human body image, has better sensitivity and resolution than passive imaging system, and costs much lower than other active imaging system in the meantime.

  12. Matrix Determination of Reflectance of Hidden Object via Indirect Photography

    Science.gov (United States)

    2012-03-01

    resolution elements by method ............26 2. with laser spots 7.5” from C...because of the matrix nature of this research, a large amount of linear algebra is required, particularly relating to matrix inversion. For this...The principles used in developing a transport matrix will receive a fuller treatment here, however, as these were applied in the current research as

  13. 微地震震源定位中目标函数的研究与应用%Study and application of objective function in microseismic source location

    Institute of Scientific and Technical Information of China (English)

    张唤兰; 朱光明; 王保利

    2015-01-01

    针对常规微地震震源定位中走时目标函数的多解性问题,基于三分量微地震数据,建立了联合走时和三分量微震数据方位信息的矢量目标函数,把矢量目标函数运用于 Geiger 定位方法中,得到了改进的 Geiger 定位法。模型数据测试表明:该方法对震源的方位信息敏感,定位精度更高。%In order to overcome the multi-solution of microseismic source location using time-dependent objective function, for three-component microseismic data, we established a vector objective function combining travel time and azimuths. Applying the objective function to Geiger's method for location, an improved Geiger's method for location is introduced. Synthetic data verifies that the method is sensitive to azimuths and is more accurate.

  14. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  15. Old, New and Hidden Causes of Perioperative Hypersensitivity.

    Science.gov (United States)

    Garvey, Lene Heise

    2016-01-01

    Perioperative hypersensitivity reactions are rare, often life-threatening events, and subsequent investigations to identify the culprit are important to avoid re-exposure. All exposures in the perioperative setting may potentially be the cause of a hypersensitivity reaction, but drugs administered intravenously such as neuromuscular blocking agents (NMBA), induction agents and antibiotics have traditionally been reported to be implicated most commonly. It has recently become apparent that there are geographical differences in sensitization patterns related to variation in exposures, referral patterns and performance and interpretation of investigations. Differences in sensitization to NMBAs are partly explained by cross sensitization to pholcodine, an ingredient in cough-medicines available in some countries. While NMBAs are the most common causes of perioperative hypersensitivity in some countries, this may not necessarily be the case in all countries. New and hidden allergens have emerged as causes of perioperative hypersensitivity such as blue dyes, chlorhexidine and excipients. Detailed knowledge of the events at the time of reaction is necessary to identify potential culprits including rare and hidden allergens. Cooperation between allergists and anaesthetists, or other staff present perioperatively, is often needed to identify hidden or even undocumented exposures. The objectives of this review are to provide an overview of the history of investigation of perioperative hypersensitivity, to describe the differences in causes of perioperative hypersensitivity emerging over time and to increase awareness about the "hidden allergens" in the perioperative setting. Some practical advice on how to approach the patient testing negative on all initial investigations is also included.

  16. Multiple instance hidden Markov models for GPR-based landmine detection

    Science.gov (United States)

    Manandhar, Achut; Morton, Kenneth D.; Collins, Leslie M.; Torrione, Peter A.

    2013-06-01

    Ground Penetrating Radar (GPR) is a widely used technology for the detection of subsurface buried threats. Although GPR data contains a representation of 3D space, during training, target and false alarm locations are usually only provided in 2D space along the surface of the earth. To overcome uncertainty in target depth location, many algorithms simply extract features from multiple depth regions that are then independently used to make mine/non-mine decisions. A similar technique is employed in hidden Markov models (HMM) based landmine detection. In this approach, sequences of downtrack GPR responses over multiple depth regions are utilized to train an HMM, which learns the probability of a particular sequence of GPR responses being generated by a buried target. However, the uncertainty in object depth complicates learning for discriminating targets/non-targets since features at the (unknown) target depth can be significantly different from features at other depths but in the same volume. To mitigate the negative impact of the uncertainty in object depth, mixture models based on Multiple Instance Learning (MIL) have previously been developed. MIL is also applicable in the landmine detection problem using HMMs because features that are extracted independently from sequences of GPR signals over several depth bins can be viewed as a set of unlabeled time series, where the entire set either corresponds to a buried threat or a false alarm. In this work, a novel framework termed as multiple instance hidden Markov model (MIHMM) is developed. We show that the performance of the proposed approach for discriminating targets from non-targets in GPR data is promising.

  17. Deep generative learning of location-invariant visual word recognition

    Directory of Open Access Journals (Sweden)

    Maria Grazia eDi Bono

    2013-09-01

    Full Text Available It is widely believed that orthographic processing implies an approximate, flexible coding of letter position, as shown by relative-position and transposition priming effects in visual word recognition. These findings have inspired alternative proposals about the representation of letter position, ranging from noisy coding across the ordinal positions to relative position coding based on open bigrams. This debate can be cast within the broader problem of learning location-invariant representations of written words, that is, a coding scheme abstracting the identity and position of letters (and combinations of letters from their eye-centred (i.e., retinal locations. We asked whether location-invariance would emerge from deep unsupervised learning on letter strings and what type of intermediate coding would emerge in the resulting hierarchical generative model. We trained a deep network with three hidden layers on an artificial dataset of letter strings presented at five possible retinal locations. Though word-level information (i.e., word identity was never provided to the network during training, linear decoding from the activity of the deepest hidden layer yielded near-perfect accuracy in location-invariant word recognition. Conversely, decoding from lower layers yielded a large number of transposition errors. Analyses of emergent internal representations showed that word selectivity and location invariance increased as a function of layer depth. Conversely, there was no evidence for bigram coding. Finally, the distributed internal representation of words at the deepest layer showed higher similarity to the representation elicited by the two exterior letters than by other combinations of two contiguous letters, in agreement with the hypothesis that word edges have special status. These results reveal that the efficient coding of written words – which was the model’s learning objective – is largely based on letter-level information.

  18. On quantum algorithms for noncommutative hidden subgroups

    Energy Technology Data Exchange (ETDEWEB)

    Ettinger, M. [Los Alamos National Lab., NM (United States); Hoeyer, P. [Odense Univ. (Denmark)

    1998-12-01

    Quantum algorithms for factoring and discrete logarithm have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the possibility of extending this general viewpoint to finding hidden subgroups of noncommutative groups. The authors present a quantum algorithm for the special case of dihedral groups which determines the hidden subgroup in a linear number of calls to the input function. They also explore the difficulties of developing an algorithm to process the data to explicitly calculate a generating set for the subgroup. A general framework for the noncommutative hidden subgroup problem is discussed and they indicate future research directions.

  19. 从处所宾语看趋向动词与趋向结构%On the Recognition of the Directional Verb and the Directional Phrase According to the locative Object

    Institute of Scientific and Technical Information of China (English)

    单宝顺

    2012-01-01

    The traditional grammar rule for the directional verb has some unexclusive flaws and discrepancies. This paper proposes that the directional verb and the directional phrase are closely related to the locative object. We can define the extension and implications of the directional verb and the directional phrase from this perspective. The directional complement has two different types. According to the locative object, we can determine the relation between the semantic types and locative property.%传统语法对趋向动词的界定存在对内不一致、对外不排他的缺陷,趋向动词和趋向结构与处所宾语密切相关,以此为角度,重新界定趋向动词和趋向结构的外延和内涵.认为传统的趋向动词外延过窄,而趋向补语也存在着两类不同的结构.最后,根据处所宾语的语义性质对趋向动词和趋向结构进行了分类,发现了处所宾语的语义类别和处所性存在联系.

  20. Prediction of signal peptides and signal anchors by a hidden Markovmodel

    DEFF Research Database (Denmark)

    Nielsen, Henrik; Krogh, Anders Stærmose

    1998-01-01

    A hidden Markov model of signal peptides has been developed. It contains submodels for the N-terminal part, the hydrophobic region and the region around the cleavage site. For known signal peptides, the model can be used to assign objective boundaries between these three regions. Applied to our d...... is the poor discrimination between signal peptides and uncleaved signal anchors, but this is substantially improved by the hidden Markov model when expanding it with a very simple signal anchor model....

  1. Prediction of signal peptides and signal anchors by a hidden Markov model

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Nielsen, Henrik

    1998-01-01

    A hidden Markov model of signal peptides has been developed. It contains submodels for the N-terminal part, the hydrophobic region, and the region around the cleavage site. For known signal peptides, the model can be used to assign objective boundaries between these three regions. Applied to our ...... is the poor discrimination between signal peptides and uncleaved signal anchors, but this is substantially improved by the hidden Markov model when expanding it with a very simple signal anchor model....

  2. Object theatre

    DEFF Research Database (Denmark)

    Ryöppy, Merja; Heiberg, Andreas

    2015-01-01

    possibilities to emerge. We present a study in which the Object Theatre approach is applied to redesign socially shared everyday products that are located in public places. This project demonstrates how Object Theatre offers a broad perspective form which to explore and present product interactions....... In particular, it emphasises the understanding of a product by relating and changing perspectives, and takes into account context of use and diverse social settings....

  3. Perpetual points and hidden attractors in dynamical systems

    Energy Technology Data Exchange (ETDEWEB)

    Dudkowski, Dawid, E-mail: dawid.dudkowski@p.lodz.pl [Division of Dynamics, Technical University of Lodz, Stefanowskiego 1/15, 90-924 Lodz (Poland); Prasad, Awadhesh [Department of Physics and Astrophysics, University of Delhi, Delhi 110007 (India); Kapitaniak, Tomasz [Division of Dynamics, Technical University of Lodz, Stefanowskiego 1/15, 90-924 Lodz (Poland)

    2015-10-23

    We discuss the use of perpetual points for tracing the hidden and the rare attractors of dynamical systems. The analysis of perpetual points and their co-existence due to the parameters values is presented and the impact of these points on the behavior of the systems is shown. The results are obtained for single as well as coupled externally excited van der Pol–Duffing oscillators. The presented results can be generalized to other systems having different dynamics. - Highlights: • Computation of perpetual points in forced nonlinear dynamical systems. • Locating the hidden and rare attractors using perpetual points. • Analysis of states and different types of synchronization in coupled systems. • Understanding the complexity in coupled and uncoupled forced van der Pol–Duffing oscillator.

  4. Location Privacy

    Science.gov (United States)

    Meng, Xiaofeng; Chen, Jidong

    With rapid development of sensor and wireless mobile devices, it is easy to access mobile users' location information anytime and anywhere. On one hand, LBS is becoming more and more valuable and important. On the other hand, location privacy issues raised by such applications have also gained more attention. However, due to the specificity of location information, traditional privacy-preserving techniques in data publishing cannot be used. In this chapter, we will introduce location privacy, and analyze the challenges of location privacy-preserving, and give a survey of existing work including the system architecture, location anonymity and query processing.

  5. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  6. Estimating an Activity Driven Hidden Markov Model

    OpenAIRE

    Meyer, David A.; Shakeel, Asif

    2015-01-01

    We define a Hidden Markov Model (HMM) in which each hidden state has time-dependent $\\textit{activity levels}$ that drive transitions and emissions, and show how to estimate its parameters. Our construction is motivated by the problem of inferring human mobility on sub-daily time scales from, for example, mobile phone records.

  7. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  8. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  9. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  10. Hidden Web信息获取

    Institute of Scientific and Technical Information of China (English)

    陈珂; 陈小英; 徐科

    2007-01-01

    如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词.由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面.然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值.文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息.

  11. Precise Location of Suspicious Objects for Dual Perspectives Container Inspection System%双视角集装箱检测系统可疑物体的精确定位

    Institute of Scientific and Technical Information of China (English)

    苗积臣; 吴志芳

    2014-01-01

    From the large object images obtained by dual perspectives cobalt -60 container inspection can to be realization of virtual 3D display, but in the artificial dig container inspection, the locating accuracy is lower by 3D inspection.The relative position of the double perspective image of suspicious objects image difference, can be used to calculate the exact relative position of suspicious object in the container, greatly improve the positio-ning accuracy and the efficiency of digging container to check suspicious object.The method has been applied to China customs multiple sets of double perspective of cobalt -60 container inspection system.%双视角钴-60集装箱检查系统中虽可以对被检大型客体实现虚拟3D显示,但是在人工掏箱检查时,3 D检测的定位精度较低。利用双视角图像中可疑物体图像的相对位置差,计算出可疑物体在集装箱内的相对精确位置,大大提高了可疑物体的定位精度和掏箱检查的效率,该方法已应用到中国海关多套双视角钴-60集装箱检查系统中。

  12. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  13. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  14. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...

  15. Hidden scale in quantum mechanics

    CERN Document Server

    Giri, Pulak Ranjan

    2007-01-01

    We show that the intriguing localization of a free particle wave-packet is possible due to a hidden scale present in the system. Self-adjoint extensions (SAE) is responsible for introducing this scale in quantum mechanical models through the nontrivial boundary conditions. We discuss a couple of classically scale invariant free particle systems to illustrate the issue. In this context it has been shown that a free quantum particle moving on a full line may have localized wave-packet around the origin. As a generalization, it has also been shown that particles moving on a portion of a plane or on a portion of a three dimensional space can have unusual localized wave-packet.

  16. Library Locations

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — Carnegie Library of Pittsburgh locations including address, coordinates, phone number, square footage, and standard operating hours.

  17. PERBANDINGAN ALGORITMA HIDDEN SPACE REMOVAL: Z-UFFER DAN SCANLINE DILIHAT DARI PENGGUNAAN MEMORI DAN KECEPATAN

    Directory of Open Access Journals (Sweden)

    Djoni Haryadi Setiabudi

    2001-01-01

    Full Text Available Hidden surface removal is an algorithm used to hide part of the object which is blocked by the object in front of it. If there are two plane crossed each other displayed without Hidden surface removal algorithm, the crossing section is invisible, because one object will block another object without crossing. The crossing sections can be displayed using Hidden surface removal algorithm. Z buffer algorithm implements Hidden Surface Removal by entering color and depth of the visible plane into the buffer, then displays the result on the screen. Scan Line algorithm will scanning the screen row by row of each object surface in three dimension and then displays on the screen after each row scanning. Both of the algorithms will be compared based on the memory usage dan time needed to execute. The experiment shows that Scanline algorithm uses less memory compared with Z-Buffer algoritm. Furthermore, based on the speed, the Scanline is better than the Z-Buffer if the object is collected on the y row, but the Z-Buffer is better than the Scanline if the object scattered and used all rows on the drawing plane and has more surface do displayed. Abstract in Bahasa Indonesia : Hidden surface removal adalah suatu algoritma yang digunakan untuk menghilangkan penampilan bagian yang tertutup oleh objek yang didepannya. Apabila ada dua bidang yang berpotongan, apabila ditampilkan biasa tanpa menggunakan algoritma Hidden surface removal maka bagian yang berpotongan itu akan tidak kelihatan, oleh karena bidang yang satu ditutupi oleh bagian yang lain tanpa memotong. Oleh karena itu untuk menampilkan bidang perpotongan, diperlukan Algoritma Hidden surface removal. Algoritma Z buffer melaksanakan proses Hidden Surface Removal dengan memasukkan warna dan kedalaman bidang permukaan yang tampak ke dalam buffer, dan kemudian setelah selesai hasilnya ditampilkan ke layar. Algoritma Scan Line melakukan scanning untuk setiap baris dari layar bidang gambar untuk setiap

  18. Noise Source Location Optimization

    Directory of Open Access Journals (Sweden)

    Ed O’Keefe

    1994-01-01

    Full Text Available This article describes a method to determine locations of noise sources that minimize modal coupling in complex acoustic volumes. Using the acoustic source scattering capabilities of the boundary element method, predictions are made of mode shape and pressure levels due to various source locations. Combining knowledge of the pressure field with a multivariable function minimization technique, the source location generating minimum pressure levels can be determined. The analysis also allows for an objective comparison of “best/worst” locations. The technique was implemented on a personal computer for the U.S. Space Station, predicting 5–10 dB noise reduction using optimum source locations.

  19. Hidden torsion, 3-manifolds, and homology cobordism

    CERN Document Server

    Cha, Jae Choon

    2011-01-01

    This paper continues our exploration of homology cobordism of 3-manifolds using our recent results on Cheeger-Gromov rho-invariants associated to amenable representations. We introduce a new type of torsion in 3-manifold groups we call hidden torsion, and an algebraic approximation we call local hidden torsion. We construct infinitely many hyperbolic 3-manifolds which have local hidden torsion in the transfinite lower central subgroup. By realizing Cheeger-Gromov invariants over amenable groups, we show that our hyperbolic 3-manifolds are not pairwise homology cobordant, yet remain indistinguishable by any prior known homology cobordism invariants.

  20. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  1. Visible Effects of Invisible Hidden Valley Radiation

    CERN Document Server

    Carloni, Lisa

    2010-01-01

    Assuming there is a new gauge group in a Hidden Valley, and a new type of radiation, can we observe it through its effect on the kinematic distributions of recoiling visible particles? Specifically, what are the collider signatures of radiation in a hidden sector? We address these questions using a generic SU(N)-like Hidden Valley model that we implement in Pythia. We find that in both the e+e- and the LHC cases the kinematic distributions of the visible particles can be significantly affected by the valley radiation. Without a proper understanding of such effects, inferred masses of "communicators" and of invisible particles can be substantially off.

  2. 分离水平和空间位置对三维物体识别的影响%The Displacement-and Location-based Effect on Three-Dimensional Object Recognition

    Institute of Scientific and Technical Information of China (English)

    段海军; 连灵

    2012-01-01

    prime type:part and whole) within-subject design. The relative position of parts was manipulated by displacing one relative to the other. And Experiment 2 was conducted with a 2 (prime type:part and whole) ×3 (location prime:same position, close position, distance position) within-subject design. The relative location of objects was manipulated by displacing one relative to the other. The results are as follows:(1)the influence of displacement level and location is hierarchical. (2) On the no displacement and same location level , the speed of the whole prime was faster than the part prime. But on the full displacement and distance location level , the part prime was faster than the whole prime. These conclusions support that the "what" representation stage can be divided into part features and whole features, and the "where" representation stage can be divided into self-construction (displacement) and relative-construction(location).The findings not only extended the field of object recognition, but also shed light on the integration between the two object theories.

  3. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  4. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  5. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  6. Faddeev-Jackiw approach to hidden symmetries

    CERN Document Server

    Wotzasek, C

    1994-01-01

    The study of hidden symmetries within Dirac's formalism does not possess a systematic procedure due to the lack of first-class constraints to act as symmetry generators. On the other hand, in the Faddeev-Jackiw approach, gauge and reparametrization symmetries are generated by the null eigenvectors of the sympletic matrix and not by constraints, suggesting the possibility of dealing systematically with hidden symmetries through this formalism. It is shown in this paper that indeed hidden symmetries of noninvariant or gauge fixed systems are equally well described by null eigenvectors of the sympletic matrix, just as the explicit invariances. The Faddeev-Jackiw approach therefore provide a systematic algorithm for treating all sorts of symmetries in an unified way. This technique is illustrated here by the SL(2,R) Kac-Moody current algebra of the 2-D induced gravity proposed by Polyakov, which is a hidden symmetry in the canonical approach of constrained systems via Dirac's method, after conformal and reparamet...

  7. Fibroid Tumors in Women: A Hidden Epidemic?

    Science.gov (United States)

    ... Issue Past Issues Fibroid Tumors in Women: A Hidden Epidemic? Past Issues / Spring 2007 Table of Contents ... fibroids@rics.bwh.harvard.edu , or visit our Web site: www.fibroids.net . You may also write ...

  8. Hidden Regular Variation: Detection and Estimation

    CERN Document Server

    Mitra, Abhimanyu

    2010-01-01

    Hidden regular variation defines a subfamily of distributions satisfying multivariate regular variation on $\\mathbb{E} = [0, \\infty]^d \\backslash \\{(0,0, ..., 0) \\} $ and models another regular variation on the sub-cone $\\mathbb{E}^{(2)} = \\mathbb{E} \\backslash \\cup_{i=1}^d \\mathbb{L}_i$, where $\\mathbb{L}_i$ is the $i$-th axis. We extend the concept of hidden regular variation to sub-cones of $\\mathbb{E}^{(2)}$ as well. We suggest a procedure of detecting the presence of hidden regular variation, and if it exists, propose a method of estimating the limit measure exploiting its semi-parametric structure. We exhibit examples where hidden regular variation yields better estimates of probabilities of risk sets.

  9. African grey parrots (Psittacus erithacus) use inference by exclusion to find hidden food.

    Science.gov (United States)

    Mikolasch, Sandra; Kotrschal, Kurt; Schloegl, Christian

    2011-12-23

    Exclusion allows the detection of hidden food when confronted with the choice between an empty and a potentially baited food location. However, exclusion may be based on avoidance of the empty location without drawing inferences about the presence of the food in the baited location. So far, such inferences have been demonstrated in the great apes only: after seeing an experimenter eating one of two food types, which both had been hidden previously in two boxes, the apes were able to choose the box that still contained the other food type. African grey parrots are capable of exclusion, and we here assessed if they are capable of inference by exclusion. In our task, two different but equally preferred food items were hidden in full view of the birds under two opaque cups. Then, an experimenter secretly removed one food type and showed it to the bird. Similarly to the apes, one out of seven parrots significantly preferred the baited cup; control conditions rule out that its choice was based on associative learning or the use of olfactory cues. Thus, we conclude that-like the apes-some grey parrots are able to infer the location of a hidden food reward.

  10. Multistability and hidden attractors in a multilevel DC/DC converter

    DEFF Research Database (Denmark)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik

    2015-01-01

    for the hidden set in most cases has been so complicated that special analytic and/or numerical techniques have been required to locate the set. By simulating the model of a multilevel DC/DC converter that operates in the regime of high feedback gain, the paper illustrates how pulse-width modulated control can...

  11. Mining Hidden Gems Beneath the Surface: A Look At the Invisible Web.

    Science.gov (United States)

    Carlson, Randal D.; Repman, Judi

    2002-01-01

    Describes resources for researchers called the Invisible Web that are hidden from the usual search engines and other tools and contrasts them with those resources available on the surface Web. Identifies specialized search tools, databases, and strategies that can be used to locate credible in-depth information. (Author/LRW)

  12. Hidden figures are ever present.

    Science.gov (United States)

    Mens, L H; Leeuwenberg, E L

    1988-11-01

    Preference judgments about alternative interpretations of unambiguous patterns can be explained in terms of a rivalry between a preferred and a second-best interpretation (cf. Leeuwenberg & Buffart, 1983). We tested whether this second-best interpretation corresponds to a suppressed but concurrently present interpretation or whether it merely reflects an alternative view that happens to be preferred less often. Two patterns were present immediately following each other with a very short onset asynchrony: a complete pattern and one out of three possible subpatterns of it, corresponding to the best, the second best, or an odd interpretation of the complete pattern. Subjects indicated which subpattern was presented by choosing among the three subpatterns shown after each trial. The scores, corrected for response-bias effects, indicated a relative facilitation of the second-best interpretation, in agreement with its predicted "hidden" presence. This result is more in line with theories that capitalize on the quality of the finally selected representation than with processing models aimed at reaching one single solution as fast and as economically as possible.

  13. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  14. Hidden local symmetry and beyond

    Science.gov (United States)

    Yamawaki, Koichi

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here, I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H = SU(2)L × SU(2)R/SU(2)V with additional symmetry, the nonlinearly-realized scale symmetry. Then, the SM does have a dynamical gauge boson of the SU(2)V HLS, "SM ρ meson", in addition to the Higgs as a pseudo-dilaton as well as the NG bosons to be absorbed in to the W and Z. Based on the recent work done with Matsuzaki and Ohki, I discuss a novel possibility that the SM ρ meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "dark SM skyrmion (DSMS)".

  15. Constraining solar hidden photons using HPGe detector

    Energy Technology Data Exchange (ETDEWEB)

    Horvat, R.; Kekez, D., E-mail: Dalibor.Kekez@irb.hr; Krčmar, M.; Krečak, Z.; Ljubičić, A.

    2013-04-25

    In this Letter we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory. With our experimental setup we observe the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, entails both photon into hidden state oscillations and a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in Sun's interior as well as in the detector. We exclude hidden photons with kinetic couplings χ>(2.2×10{sup −13}–3×10{sup −7}) in the mass region 0.2 eV≲m{sub γ{sup ′}}≲30 keV. Our constraints on the mixing parameter χ in the mass region from 20 eV up to 15 keV prove even slightly better then those obtained recently by using data from the CAST experiment, albeit still somewhat weaker than those obtained from solar and HB stars lifetime arguments.

  16. Preexisting knowledge versus on-line learning: what do young infants really know about spatial location?

    Science.gov (United States)

    Newcombe, Nora S; Sluzenski, Julia; Huttenlocher, Janellen

    2005-03-01

    Contemporary knowledge of infant cognition relies heavily on violation-of-expectation experiments. However, there are two ways to conceptualize what occurs in such studies. Babies may react to anomalous test events because of preexisting world knowledge. Alternatively, they may react because they have learned about events during the familiarization period. One way to distinguish these possibilities is to contrast familiarization with everyday versus anomalous events. In the studies we report here, we used this method to probe the nature of 5-month-olds' expectations about the locations of objects hidden in sand and later revealed. In Experiment 1, infants who initially saw everyday events did react to anomalous ones, as found previously, whereas infants who initially saw anomalous events did not react to everyday events. In Experiment 2, two alternative explanations of this pattern were ruled out. We conclude that by the age of 5 months, infants have expectations regarding the location of objects in continuous space.

  17. Selecting a Reference Object

    Science.gov (United States)

    Miller, Jared E.; Carlson, Laura A.; Hill, Patrick L.

    2011-01-01

    One way to describe the location of an object is to relate it to another object. Often there are many nearby objects, each of which could serve as a candidate to be the reference object. A common theoretical assumption is that features that make a given object salient relative to the candidate set are instrumental in determining which is selected.…

  18. Frustration of total internal reflection by a hidden nanowire

    Science.gov (United States)

    Frumin, Leonid; Nemykin, Anton; Shapiro, David

    2016-12-01

    A metallic wire embedded in the dielectric substrate leads to frustration of the total internal reflection at the interface between dielectric and free space. The scattering by a gold cylinder is studied in order to exploit the light for hidden objects optical diagnostics. The p-wave incidenting by the angle close to total reflection with the frequency near plasmonic resonance is treated by the modified boundary elements method. The magnetic and electric fields at the interface are calculated. The scattering diagrams are found in near and far field.

  19. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  20. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  1. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  2. Probing Hidden Sector Photons through the Higgs Window.

    OpenAIRE

    Ahlers, M.; Jaeckel, J; Redondo, J.; Ringwald, A.

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light...

  3. Supersymmetric leptogenesis and light hidden sectors

    CERN Document Server

    Weniger, Christoph

    2010-01-01

    Thermal leptogenesis and supergravity are attractive scenarios for physics beyond the standard model. However, it is well known that the super-weak interaction of the gravitino often leads to problems with primordial nucleosynthesis in the standard scenario of matter parity conserving MSSM + three right-handed neutrinos. We will present and compare two related solutions to these problems: 1) The conflict between BBN and leptogenesis can be avoided in presence of a hidden sector with light supersymmetric particles which open new decay channels for the dangerous long-lived particles. 2) If there is a condensate in the hidden sector, such additional decay channels can be alternatively opened by dynamical breaking of matter parity in the hidden sector.

  4. Adding to the Students' Toolbox: Using Directories, Search Engines, and the Hidden Web in Search Processes.

    Science.gov (United States)

    Mardis, Marcia A.

    2002-01-01

    Discussion of searching for information on the Web focuses on resources that are not always found by traditional Web searches. Describes sources on the hidden Web, including full-text databases, clearinghouses, digital libraries, and learning objects; explains how search engines operate; and suggests that traditional print sources are still…

  5. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  6. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  7. Hidden simplicity of gauge theory amplitudes

    Science.gov (United States)

    Drummond, J. M.

    2010-11-01

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in \\ {N}=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  8. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...

  9. Dark Radiation from a hidden U(1)

    CERN Document Server

    Vogel, Hendrik

    2015-01-01

    We discuss the impact of a hidden sector consisting of Minicharged Particles (MCPs) and massless hidden photons on the expansion history of our Universe. We present parameter scans for the amount of extra relativistic particles (Neff) and the abundance of light nuclei for fermionic MCPs with masses between ~100 keV and 10 GeV and minicharges in the range 10^(-11)-1. Current CMB and BBN data significantly constrain the available parameter space of MCPs. The shown results are a valuable indicator for future experimental searches and are presented in a flexible way so that more accurate results on Neff can be easily interpreted.

  10. Hidden Symmetries, Central Charges and All That

    CERN Document Server

    de Wit, Bernard; Wit, Bernard de; Nicolai, Hermann

    2001-01-01

    In this review we discuss hidden symmetries of toroidal compactifications of eleven-dimensional supergravity. We recall alternative versions of this theory which exhibit traces of the hidden symmetries when still retaining the massive Kaluza-Klein states. We reconsider them in the broader perspective of M-theory which incorporates a more extended variety of BPS states. We also argue for a new geometry that may underly these theories. All our arguments point towards an extension of the number of space-time coordinates beyond eleven.

  11. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  12. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2015-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  13. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  14. The Corporate Illiterates: The Hidden Illiterates of Silicon Valley.

    Science.gov (United States)

    Chase, Sharon

    1991-01-01

    Describes the writing and business communication problems of college-educated workers in Silicon Valley. Discusses hidden illiterates in the universities and in the workplace. Offers solutions for professors and managers faced with the problem of hidden illiterates. (PRA)

  15. Conscientious objection in health care

    Directory of Open Access Journals (Sweden)

    Kuře Josef

    2016-12-01

    Full Text Available The paper deals with conscientious objection in health care, addressing the problems of scope, verification and limitation of such refusal, paying attention to ideological agendas hidden behind the right of conscience where the claimed refusal can cause harm or where such a claim is an attempt to impose certain moral values on society or an excuse for not providing health care. The nature of conscientious objection will be investigated and an ethical analysis of conscientious objection will be conducted. Finally some suggestions for health care policy will be proposed.

  16. Modeling Driver Behavior near Intersections in Hidden Markov Model.

    Science.gov (United States)

    Li, Juan; He, Qinglian; Zhou, Hang; Guan, Yunlin; Dai, Wei

    2016-12-21

    Intersections are one of the major locations where safety is a big concern to drivers. Inappropriate driver behaviors in response to frequent changes when approaching intersections often lead to intersection-related crashes or collisions. Thus to better understand driver behaviors at intersections, especially in the dilemma zone, a Hidden Markov Model (HMM) is utilized in this study. With the discrete data processing, the observed dynamic data of vehicles are used for the inference of the Hidden Markov Model. The Baum-Welch (B-W) estimation algorithm is applied to calculate the vehicle state transition probability matrix and the observation probability matrix. When combined with the Forward algorithm, the most likely state of the driver can be obtained. Thus the model can be used to measure the stability and risk of driver behavior. It is found that drivers' behaviors in the dilemma zone are of lower stability and higher risk compared with those in other regions around intersections. In addition to the B-W estimation algorithm, the Viterbi Algorithm is utilized to predict the potential dangers of vehicles. The results can be applied to driving assistance systems to warn drivers to avoid possible accidents.

  17. Design and Implementation of Domain based Semantic Hidden Web Crawler

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Web is a wide term which mainly consists of surface web and hidden web. One can easily access the surface web using traditional web crawlers, but they are not able to crawl the hidden portion of the web. These traditional crawlers retrieve contents from web pages, which are linked by hyperlinks ignoring the information hidden behind form pages, which cannot be extracted using simple hyperlink structure. Thus, they ignore large amount of data hidden behind search forms. This paper emphasizes o...

  18. Variational Hidden Conditional Random Fields with Coupled Dirichlet Process Mixtures

    NARCIS (Netherlands)

    Bousmalis, K.; Zafeiriou, S.; Morency, L.P.; Pantic, Maja; Ghahramani, Z.

    2013-01-01

    Hidden Conditional Random Fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An infinite HCRF is an HCRF with a countably infinite number of hidden states, which rids us not only of the necessit

  19. Perceptual consequences of "hidden" hearing loss.

    Science.gov (United States)

    Plack, Christopher J; Barker, Daphne; Prendergast, Garreth

    2014-09-09

    Dramatic results from recent animal experiments show that noise exposure can cause a selective loss of high-threshold auditory nerve fibers without affecting absolute sensitivity permanently. This cochlear neuropathy has been described as hidden hearing loss, as it is not thought to be detectable using standard measures of audiometric threshold. It is possible that hidden hearing loss is a common condition in humans and may underlie some of the perceptual deficits experienced by people with clinically normal hearing. There is some evidence that a history of noise exposure is associated with difficulties in speech discrimination and temporal processing, even in the absence of any audiometric loss. There is also evidence that the tinnitus experienced by listeners with clinically normal hearing is associated with cochlear neuropathy, as measured using Wave I of the auditory brainstem response. To date, however, there has been no direct link made between noise exposure, cochlear neuropathy, and perceptual difficulties. Animal experiments also reveal that the aging process itself, in the absence of significant noise exposure, is associated with loss of auditory nerve fibers. Evidence from human temporal bone studies and auditory brainstem response measures suggests that this form of hidden loss is common in humans and may have perceptual consequences, in particular, regarding the coding of the temporal aspects of sounds. Hidden hearing loss is potentially a major health issue, and investigations are ongoing to identify the causes and consequences of this troubling condition.

  20. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements

  1. Discovering Hidden Treasures with GPS Technology

    Science.gov (United States)

    Nagel, Paul; Palmer, Roger

    2014-01-01

    "I found it!" Addison proudly proclaimed, as she used an iPhone and Global Positioning System (GPS) software to find the hidden geocache along the riverbank. Others in Lisa Bostick's fourth grade class were jealous, but there would be other geocaches to find. With the excitement of movies like "Pirates of the Caribbean" and…

  2. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover...

  3. Dermatologic hazards from hidden contacts with penicillin

    Energy Technology Data Exchange (ETDEWEB)

    Boonk, W.J.

    1981-01-01

    The unbridled use of penicillin after its discovery by Fleming has resulted in possible hazards to human health due to traces of the drug being present in food and other hidden sources. These hazards may include toxic effects, hypersensitivity reactions and possibly a raising of the frequency and duration of allergy to penicillin.

  4. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements incr

  5. Computerized Testing: The Hidden Figures Test.

    Science.gov (United States)

    Jacobs, Ronald L.; And Others

    1985-01-01

    This study adapted the Hidden Figures Test for use on PLATO and determined the reliability of the computerized version compared to the paper and pencil version. Results indicate the test was successfully adapted with some modifications, and it was judged reliable although it may be measuring additional constructs. (MBR)

  6. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  7. Hidden Costs and Challenges of Servitization

    DEFF Research Database (Denmark)

    Yang, Yifan; Slepniov, Dmitrij

    of these labels, the potential benefits of servitization are often overshadowed by costs associated with it. By using the cases of Chinese and Danish manufacturing firms, this study takes a closer look at possible hidden costs of servitization and contributes to our understanding of servitization performance...

  8. Object and Objective Lost?

    DEFF Research Database (Denmark)

    Lopdrup-Hjorth, Thomas

    2015-01-01

    This paper explores the erosion and problematization of ‘the organization’ as a demarcated entity. Utilizing Foucault's reflections on ‘state-phobia’ as a source of inspiration, I show how an organization-phobia has gained a hold within Organization Theory (OT). By attending to the history...... of this organization-phobia, the paper argues that OT has become increasingly incapable of speaking about its core object. I show how organizations went from being conceptualized as entities of major importance to becoming theoretically deconstructed and associated with all kinds of ills. Through this history......, organizations as distinct entities have been rendered so problematic that they have gradually come to be removed from the center of OT. The costs of this have been rather significant. Besides undermining the grounds that gave OT intellectual credibility and legitimacy to begin with, the organization-phobia...

  9. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  10. PELACAKAN DAN PENGENALAN WAJAH MENGGUNAKAN METODE EMBEDDED HIDDEN MARKOV MODELS

    Directory of Open Access Journals (Sweden)

    Arie Wirawan Margono

    2004-01-01

    Full Text Available Tracking and recognizing human face becomes one of the important research subjects nowadays, where it is applicable in security system like room access, surveillance, as well as searching for person identity in police database. Because of applying in security case, it is necessary to have robust system for certain conditions such as: background influence, non-frontal face pose of male or female in different age and race. The aim of this research is to develop software which combines human face tracking using CamShift algorithm and face recognition system using Embedded Hidden Markov Models. The software uses video camera (webcam for real-time input, video AVI for dynamic input, and image file for static input. The software uses Object Oriented Programming (OOP coding style with C++ programming language, Microsoft Visual C++ 6.0® compiler, and assisted by some libraries of Intel Image Processing Library (IPL and Intel Open Source Computer Vision (OpenCV. System testing shows that object tracking based on skin complexion using CamShift algorithm comes out well, for tracking of single or even two face objects at once. Human face recognition system using Embedded Hidden Markov Models method has reach accuracy percentage of 82.76%, using 341 human faces in database that consists of 31 individuals with 11 poses and 29 human face testers. Abstract in Bahasa Indonesia : Pelacakan dan pengenalan wajah manusia merupakan salah satu bidang yang cukup berkembang dewasa ini, dimana aplikasi dapat diterapkan dalam bidang keamanan (security system seperti ijin akses masuk ruangan, pengawasan lokasi (surveillance, maupun pencarian identitas individu pada database kepolisian. Karena diterapkan dalam kasus keamanan, dibutuhkan sistem yang handal terhadap beberapa kondisi, seperti: pengaruh latar belakang, pose wajah non-frontal terhadap pria maupun wanita dalam perbedaan usia dan ras. Tujuan penelitiam ini adalah untuk membuat perangkat lunak yang menggabungkan

  11. A Context-Recognition-Aided PDR Localization Method Based on the Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Yi Lu

    2016-11-01

    Full Text Available Indoor positioning has recently become an important field of interest because global navigation satellite systems (GNSS are usually unavailable in indoor environments. Pedestrian dead reckoning (PDR is a promising localization technique for indoor environments since it can be implemented on widely used smartphones equipped with low cost inertial sensors. However, the PDR localization severely suffers from the accumulation of positioning errors, and other external calibration sources should be used. In this paper, a context-recognition-aided PDR localization model is proposed to calibrate PDR. The context is detected by employing particular human actions or characteristic objects and it is matched to the context pre-stored offline in the database to get the pedestrian’s location. The Hidden Markov Model (HMM and Recursive Viterbi Algorithm are used to do the matching, which reduces the time complexity and saves the storage. In addition, the authors design the turn detection algorithm and take the context of corner as an example to illustrate and verify the proposed model. The experimental results show that the proposed localization method can fix the pedestrian’s starting point quickly and improves the positioning accuracy of PDR by 40.56% at most with perfect stability and robustness at the same time.

  12. A Context-Recognition-Aided PDR Localization Method Based on the Hidden Markov Model.

    Science.gov (United States)

    Lu, Yi; Wei, Dongyan; Lai, Qifeng; Li, Wen; Yuan, Hong

    2016-11-30

    Indoor positioning has recently become an important field of interest because global navigation satellite systems (GNSS) are usually unavailable in indoor environments. Pedestrian dead reckoning (PDR) is a promising localization technique for indoor environments since it can be implemented on widely used smartphones equipped with low cost inertial sensors. However, the PDR localization severely suffers from the accumulation of positioning errors, and other external calibration sources should be used. In this paper, a context-recognition-aided PDR localization model is proposed to calibrate PDR. The context is detected by employing particular human actions or characteristic objects and it is matched to the context pre-stored offline in the database to get the pedestrian's location. The Hidden Markov Model (HMM) and Recursive Viterbi Algorithm are used to do the matching, which reduces the time complexity and saves the storage. In addition, the authors design the turn detection algorithm and take the context of corner as an example to illustrate and verify the proposed model. The experimental results show that the proposed localization method can fix the pedestrian's starting point quickly and improves the positioning accuracy of PDR by 40.56% at most with perfect stability and robustness at the same time.

  13. Topic Information Collection based on the Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Hai-yan Jiang

    2013-02-01

    Full Text Available Specific-subject oriented information collection is one of the key technologies of vertical search engines, which directly affects the speed and relevance of search results. The topic information collection algorithm is widely used for its accuracy. The Hidden Markov Model (HMM is used to learn and judge the relevance between the Uniform Resource Locator (URL and the topic information. The Rocchio method is used to construct the prototype vectors relevant to the topic information, and the HMM is used to learn the preferred browsing paths. The concept maps including the semantics of the webpage are constructed and the web's link structures can be decided. The validity of the algorithm is proved by the experiment at last. Comparing with the Best-First algorithm, this algorithm can get more information pages and has higher precision ratio.

  14. Understanding eye movements in face recognition using hidden Markov models.

    Science.gov (United States)

    Chuk, Tim; Chan, Antoni B; Hsiao, Janet H

    2014-09-16

    We use a hidden Markov model (HMM) based approach to analyze eye movement data in face recognition. HMMs are statistical models that are specialized in handling time-series data. We conducted a face recognition task with Asian participants, and model each participant's eye movement pattern with an HMM, which summarized the participant's scan paths in face recognition with both regions of interest and the transition probabilities among them. By clustering these HMMs, we showed that participants' eye movements could be categorized into holistic or analytic patterns, demonstrating significant individual differences even within the same culture. Participants with the analytic pattern had longer response times, but did not differ significantly in recognition accuracy from those with the holistic pattern. We also found that correct and wrong recognitions were associated with distinctive eye movement patterns; the difference between the two patterns lies in the transitions rather than locations of the fixations alone.

  15. Fuzzy hidden Markov chains segmentation for volume determination and quantitation in PET

    Energy Technology Data Exchange (ETDEWEB)

    Hatt, M [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Lamare, F [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609, (France); Boussion, N [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Turzo, A [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Collet, C [Ecole Nationale Superieure de Physique de Strasbourg (ENSPS), ULP, Strasbourg, F-67000 (France); Salzenstein, F [Institut d' Electronique du Solide et des Systemes (InESS), ULP, Strasbourg, F-67000 (France); Roux, C [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Jarritt, P [Medical Physics Agency, Royal Victoria Hospital, Belfast (United Kingdom); Carson, K [Medical Physics Agency, Royal Victoria Hospital, Belfast (United Kingdom); Rest, C Cheze-Le [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France); Visvikis, D [INSERM U650, Laboratoire du Traitement de l' Information Medicale (LaTIM), CHU Morvan, Bat 2bis (I3S), 5 avenue Foch, Brest, 29609 (France)

    2007-07-21

    Accurate volume of interest (VOI) estimation in PET is crucial in different oncology applications such as response to therapy evaluation and radiotherapy treatment planning. The objective of our study was to evaluate the performance of the proposed algorithm for automatic lesion volume delineation; namely the fuzzy hidden Markov chains (FHMC), with that of current state of the art in clinical practice threshold based techniques. As the classical hidden Markov chain (HMC) algorithm, FHMC takes into account noise, voxel intensity and spatial correlation, in order to classify a voxel as background or functional VOI. However the novelty of the fuzzy model consists of the inclusion of an estimation of imprecision, which should subsequently lead to a better modelling of the 'fuzzy' nature of the object of interest boundaries in emission tomography data. The performance of the algorithms has been assessed on both simulated and acquired datasets of the IEC phantom, covering a large range of spherical lesion sizes (from 10 to 37 mm), contrast ratios (4:1 and 8:1) and image noise levels. Both lesion activity recovery and VOI determination tasks were assessed in reconstructed images using two different voxel sizes (8 mm{sup 3} and 64 mm{sup 3}). In order to account for both the functional volume location and its size, the concept of % classification errors was introduced in the evaluation of volume segmentation using the simulated datasets. Results reveal that FHMC performs substantially better than the threshold based methodology for functional volume determination or activity concentration recovery considering a contrast ratio of 4:1 and lesion sizes of <28 mm. Furthermore differences between classification and volume estimation errors evaluated were smaller for the segmented volumes provided by the FHMC algorithm. Finally, the performance of the automatic algorithms was less susceptible to image noise levels in comparison to the threshold based techniques. The

  16. Detection and localisation of magnetic objects

    NARCIS (Netherlands)

    Barrell, Y.; Naus, H.W.L.

    2007-01-01

    Detection and localisation of hidden magnetic objects is studied. The concomitant disturbance of the earth magnetic field is exploited. Magnetic fields and or gradients are measured with a number of sensors. Two point models for magnetic fields are selected for the analysis: the magnetic dipole and

  17. Hidden penis release: adjunctive suprapubic lipectomy.

    Science.gov (United States)

    Horton, C E; Vorstman, B; Teasley, D; Winslow, B

    1987-08-01

    We believe the hidden penis may be caused and concealed by a prominent suprapubic fat pad in addition to the restrictive fibrous bands of the dartos fascia fixing the shaft of the penis proximally while loose skin folds prolapse distally over the phallus. A penis of inadequate length or appearance may affect body image. Patients with this problem often require psychological support. Hidden penis may be distinguished from micropenis by palpating adequate corpora and showing a stretched penile length within 2 SD of normal. Excision of suprapubic fat with sectioning of the tethering dartos bands will release and increase the length of the penis. Suprapubic fat pad resection may also be helpful to elongate a short penis in cases of adult microphallus, or after partial penectomy because of trauma or cancer. Circumcision is contraindicated.

  18. Laser experiments explore the hidden sector

    CERN Document Server

    Ahlers, M; Jaeckel, J; Redondo, J; Ringwald, A

    2007-01-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses <~0.05 eV, the charge is now restricted to be less than (3-4)x10^(-7) times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background.

  19. Hidden geometric correlations in real multiplex networks

    Science.gov (United States)

    Kleineberg, Kaj-Kolja; Boguñá, Marián; Ángeles Serrano, M.; Papadopoulos, Fragkiskos

    2016-11-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.

  20. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  1. A search for non-hidden broad-line region Seyfert 2 galaxies

    CERN Document Server

    Petrov, Georgi P

    2016-01-01

    According to the unified model of active galactic nuclei, Seyfert 2 galaxies are physically the same as Seyfert 1 objects and they possess a broad-line region (BLR), but it is hidden from the observer due to their orientation. In the past few years, various authors reported that not all Seyfert 2 galaxies harbor a BLR. We compiled a sample of 38 Seyfert 2 galaxies to find non-hidden broad-line region (non-HBLR) objects. Using the theory of Nicastro et al. which suggests the existence of a critical value of the Eddington ratio below which BLR can't be formed, we found 26 non-HBLR Seyfert 2 candidates. We found also that 5 of these 26 non-HBLR objects could be low-ionization nuclear emission-line regions (LINERs).

  2. Spitzer Digs Up Hidden Stars

    Science.gov (United States)

    2007-01-01

    [figure removed for brevity, see original site] 3-Panel Version Figure 1 [figure removed for brevity, see original site] [figure removed for brevity, see original site] [figure removed for brevity, see original site] Visible Light Figure 2 Infrared (IRAC) Figure 3 Combined Figure 4 Two rambunctious young stars are destroying their natal dust cloud with powerful jets of radiation, in an infrared image from NASA's Spitzer Space Telescope. The stars are located approximately 600 light-years away in a cosmic cloud called BHR 71. In visible light (left panel), BHR 71 is just a large black structure. The burst of yellow light toward the bottom of the cloud is the only indication that stars might be forming inside. In infrared light (center panel), the baby stars are shown as the bright yellow smudges toward the center. Both of these yellow spots have wisps of green shooting out of them. The green wisps reveal the beginning of a jet. Like a rainbow, the jet begins as green, then transitions to orange, and red toward the end. The combined visible-light and infrared composite (right panel) shows that a young star's powerful jet is responsible for the rupture at the bottom of the dense cloud in the visible-light image. Astronomers know this because burst of light in the visible-light image overlaps exactly with a jet spouting-out of the left star, in the infrared image. The jets' changing colors reveal a cooling effect, and may suggest that the young stars are spouting out radiation in regular bursts. The green tints at the beginning of the jet reveal really hot hydrogen gas, the orange shows warm gas, and the reddish wisps at the end represent the coolest gas. The fact that gas toward the beginning of the jet is hotter than gas near the middle suggests that the stars must give off regular bursts of energy -- and the material closest to the star is being heated by shockwaves from a recent stellar outburst. Meanwhile, the tints of orange reveal gas that is currently being

  3. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  4. Finite State Transducers Approximating Hidden Markov Models

    CERN Document Server

    Kempe, A

    1999-01-01

    This paper describes the conversion of a Hidden Markov Model into a sequential transducer that closely approximates the behavior of the stochastic model. This transformation is especially advantageous for part-of-speech tagging because the resulting transducer can be composed with other transducers that encode correction rules for the most frequent tagging errors. The speed of tagging is also improved. The described methods have been implemented and successfully tested on six languages.

  5. Hidden symmetries in dilaton-axion gravity

    CERN Document Server

    Kechkin, O V

    1996-01-01

    Four--dimensional Einstein--Maxwell--dilaton--axion system restricted to space--times with one non--null Killing symmetry is formulated as the three--dimensional gravity coupled sigma--model. Several alternative representations are discussed and the associated hidden symmetries are revealed. The action of target space isometries on the initial set of (non--dualized ) variables is found. New mulicenter solutions are obtained via generating technique based on the formulation in terms of the non--dualized variables.

  6. Caldera rim collapse: A hidden volcanic hazard

    OpenAIRE

    Merle, Olivier; Michon, Laurent; Bachèlery, Patrick

    2008-01-01

    International audience; Following the emblematic flank collapse of Mount St Helens in 1981, numerous models of flank sliding have been proposed. These models have allowed to largely improve the understanding of mechanisms involved in such landslides, which represent a tremendous risk for populations living around volcanoes. In this article, a new mode of landslide formation, related to buried calderas, is described. The model emphasizes the paramount importance of the hidden ring fault that, ...

  7. Killing and letting die: hidden value assumptions.

    Science.gov (United States)

    Atkinson, G

    1983-01-01

    In this paper I argue for several related theses: first, that the distinction between killing and letting die, as it is drawn by ordinary persons in ordinary contexts, is more complex than is generally understood; second, that the key feature of this complexity lies in the presence of a hidden normative component in what appears to be a straightforwardly descriptive distinction; and, third, that this complexity renders the killing/letting die distinction an inadequate and hazardous guide for moral reasoning.

  8. Online Learning in Discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2007-01-01

    We present and analyse three online algorithms for learning in discrete Hidden Markov Models (HMMs) and compare them with the Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalisation error we draw learning curves in simplified situations. The performance for learning drifting concepts of one of the presented algorithms is analysed and compared with the Baldi-Chauvin algorithm in the same situations. A brief discussion about learning and symmetry breaking b...

  9. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  10. Otoendoscopic treatment of hidden lesions in otomastoiditis

    Institute of Scientific and Technical Information of China (English)

    LIU Yang; SUN Jian-jun; LIN Yong-sheng; ZHAO Dan-heng; ZHAO Jing; LEI Fei

    2010-01-01

    Background Surgical treatments for chronic suppurative and cholesteatoma otitis media have been discussed for several decades, but recurrences still occur because of the complex dissection required and hidden lesions associated with otomastoiditis. This study investigated the technology and strategy behind the use of otoendoscopic-assisted otosurgery.Methods We reported on hidden lesions in 32 ears of patients with otomastoiditis between November 2006 and January 2009. All the patients were treated with the aid of an otoendoscope. The advantages of otoendoscopy, including multi-angle light scattering, aperture illumination, and magnification of the local operative field, were utilized in otologic microsurgery, and otoendoscopic operative techniques were introduced for operative sites such as the epitympanum, aditus of the antrum, facial recess, sinus tympani and the mastoid tip.Results All patients were followed up from 3 months to 2 years after surgery. All patients recovered well within 3 months following surgery, except for one case of epithelialization of the mastoid cavity occurring 6 months after surgery for cholesteatoma on the cerebellar surface and another case with Bezold's abscess, hyperplastic granulation tissue developed at the antrum.Conclusions Otoendoscopy can overcome the technical deficiency of rectilinearity of the visual axis associated with otomicroscopic illumination, which presents a problem when dealing with otomastoiditis lesions in hidden areas. This technique allows such lesions within the complex three-dimensional structure to be visualized and cleaned. Otoendoscopy thus has significant potential for improving the quality of surgery and reducing the risk of postoperative recurrence.

  11. Dark matter in the hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2014-01-01

    The cosmological scenario of the dark matter generated in the hidden gauge theory based on the grand unification is discussed. It is found that the stability of the dark matter halo of our Galaxy and the cosmic ray observation constrain, respectively, the dark matter mass and the unification scale between the standard model and the hidden gauge theory sectors. To obtain a phenomenologically consistent thermal evolution, the entropy of the standard model sector needs to be increased. We therefore propose a scenario where the mini-inflation is induced from the potential coupled to the Standard model sector, in particular the Higgs sector. This scenario makes consistent the current dark matter density as well as the baryon-to-photon ratio for the case of pion dark matter. For the glueball or heavy pion of hidden gauge theory, an additional mini-inflation in the standard model sector before the leptogenesis is required. We also propose the possibility to confirm this scenario by known prospective experimental app...

  12. Hidden laser communications through matter. An application of meV-scale hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-04-15

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  13. Landslide Displacement Prediction With Uncertainty Based on Neural Networks With Random Hidden Weights.

    Science.gov (United States)

    Lian, Cheng; Zeng, Zhigang; Yao, Wei; Tang, Huiming; Chen, Chun Lung Philip

    2016-12-01

    In this paper, we propose a new approach to establish a landslide displacement forecasting model based on artificial neural networks (ANNs) with random hidden weights. To quantify the uncertainty associated with the predictions, a framework for probabilistic forecasting of landslide displacement is developed. The aim of this paper is to construct prediction intervals (PIs) instead of deterministic forecasting. A lower-upper bound estimation (LUBE) method is adopted to construct ANN-based PIs, while a new single hidden layer feedforward ANN with random hidden weights for LUBE is proposed. Unlike the original implementation of LUBE, the input weights and hidden biases of the ANN are randomly chosen, and only the output weights need to be adjusted. Combining particle swarm optimization (PSO) and gravitational search algorithm (GSA), a hybrid evolutionary algorithm, PSOGSA, is utilized to optimize the output weights. Furthermore, a new ANN objective function, which combines a modified combinational coverage width-based criterion with one-norm regularization, is proposed. Two benchmark data sets and two real-world landslide data sets are presented to illustrate the capability and merit of our method. Experimental results reveal that the proposed method can construct high-quality PIs.

  14. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  15. Learning models of activities involving interacting objects

    DEFF Research Database (Denmark)

    Manfredotti, Cristina; Pedersen, Kim Steenstrup; Hamilton, Howard J.;

    2013-01-01

    We propose the LEMAIO multi-layer framework, which makes use of hierarchical abstraction to learn models for activities involving multiple interacting objects from time sequences of data concerning the individual objects. Experiments in the sea navigation domain yielded learned models that were...... then successfully applied to activity recognition, activity simulation and multi-target tracking. Our method compares favourably with respect to previously reported results using Hidden Markov Models and Relational Particle Filtering....

  16. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  17. Hidden History: A Mobile Application for Discovering Surrounding Landscapes

    OpenAIRE

    2016-01-01

    This thesis work describes the design, development and evaluation of a mobile application called Hidden History. This application lets users discover and explore three types of landscapes (Historic, Scenic and Cultural) using three different modes of discovery (Route, Explore and Tour). Before designing Hidden History, the feature set of other applications that help users explore surrounding landscapes were identified and analyzed. Hidden History was then designed to implement the best fea...

  18. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  19. ADAPTIVE LEARNING OF HIDDEN MARKOV MODELS FOR EMOTIONAL SPEECH

    Directory of Open Access Journals (Sweden)

    A. V. Tkachenia

    2014-01-01

    Full Text Available An on-line unsupervised algorithm for estimating the hidden Markov models (HMM parame-ters is presented. The problem of hidden Markov models adaptation to emotional speech is solved. To increase the reliability of estimated HMM parameters, a mechanism of forgetting and updating is proposed. A functional block diagram of the hidden Markov models adaptation algorithm is also provided with obtained results, which improve the efficiency of emotional speech recognition.

  20. Hidden Photons in Aharonov-Bohm-Type Experiments

    OpenAIRE

    Arias, Paola; Diaz, Christian; Diaz, Marco Aurelio; Jaeckel, Joerg; Koch, Benjamin; Redondo, Javier

    2016-01-01

    We discuss the Aharonov-Bohm effect in the presence of hidden photons kinetically mixed with the ordinary electromagnetic photons. The hidden photon field causes a slight phase shift in the observable interference pattern. It is then shown how the limited sensitivity of this experiment can be largely improved. The key observation is that the hidden photon field causes a leakage of the ordinary magnetic field into the supposedly field-free region. The direct measurement of this magnetic field ...

  1. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  2. 应急救援物流中物资分发点多目标排队选址优化%Multi-objective queuing location optimization for item distribution spots in emergency relief logistics

    Institute of Scientific and Technical Information of China (English)

    彭翀; 汪传旭; 郭胜童

    2011-01-01

    基于模糊数学、排队理论与选址理论,建立了应急救援物流中物资分发点的多目标模糊排队选址优化模型,其中:受灾点的需求率和物资分发点的服务率为模糊数,物资分发点建立成本最小和救援反应时间最短为目标函数.设计了模型的求解算法,确定了物资分发点的选址以及各个分发点所覆盖的受灾点区域范围.结合具体算例,验证了模型的实用性,并分析了物资分发点应急服务能力对救援效果的影响.%Based on fuzzy mathematics, queuing theory and location theory, a model is introduced into solving the problems about item distribution spots location optimization in emergency relief logistics where the demand rates of disaster spots and service rates of item distribution spots are fuzzy numbers. The proposed model aims at jointly minimi zing the setup costs for item distribution spots and relief response time. The algorithms are presented to set the proposed model to determine the location and covering scope of item distribution spots. A numerical example is given to demonstrate the effectiveness of the proposed model and the impact of service capacity of item distribution spots on re lief performance is analyzed.

  3. Does violence affect the use of contraception? Identifying the hidden factors from rural India

    Directory of Open Access Journals (Sweden)

    Nishikant Singh

    2017-01-01

    Full Text Available Purpose: The objective of this study is to investigates the relationship between domestic violence and use of contraception among married women in rural India. Data: Third round of National Family Health Survey (NFHS-III. Methodology: Cross tabulation as bivariate analysis and Binary Logistic Regression as multivariate analysis has been employed to fulfill the objective. Findings: The result shows that there are several hidden factors. between physical violence and contraception use. Alternate explanatory variables are significantly affected the use of contraception. With physical violence which reflects that there is a relationship between physical violence and socioeconomic status such as education, awareness, empowerment of women and subsequently the use of contraception. Originality/value: The paper throws light on the hidden factors which are obstacle in use of contraception with physical violence. Results of this study have potentially important implications for programs aimed at preventing violence and promoting family planning programs.

  4. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  5. Critical scaling in hidden state inference for linear Langevin dynamics

    OpenAIRE

    Bravi, Barbara; Sollich, Peter

    2016-01-01

    We consider the problem of inferring the dynamics of unknown (i.e. hidden) nodes from a set of observed trajectories and we study analytically the average prediction error given by the Extended Plefka Expansion applied to it, as presented in [1]. We focus on a stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings in the infinite network size limit. The expected error on the hidden time courses can be found as the equal-time hidden-to-hidden cova...

  6. Hidden Trigger for the Giant Starburst Arc in M 83?

    CERN Document Server

    Díaz, R J; Agüero, M P; Mediavilla, E; Rodrigues, I; Mast, D; Diaz, Ruben J.; Dottori, Horacio; Aguero, Maria P.; Mediavilla, Evencio; Rodrigues, Irapuan; Mast, Damian

    2006-01-01

    The huge star formation events that occur at some galactic centers do not provide enough clues as to their origin, since the morphological signatures of the triggering mechanism are smeared out in the timescale of a few orbital revolutions of the galaxy core. Our high spatial resolution three-dimensional near-infrared spectroscopy for the first time reveals that a previously known hidden mass concentration is located exactly at the youngest end of a giant star-forming arc. This location, the inferred average cluster ages, and the dynamical times clearly indicate that the interloper has left behind a spur of violent star formation in M 83, in a transient event lasting less than one orbital revolution. The study of the origin (bar funneling or cannibalized satellite) and fate (black hole merging or giant stellar cluster) of this system could provide clues to the question of core growing and morphological evolution in grand-design spiral galaxies. In particular, our TreeSPH numerical modeling suggests that the t...

  7. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  8. Error statistics of hidden Markov model and hidden Boltzmann model results

    Science.gov (United States)

    Newberg, Lee A

    2009-01-01

    Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results. PMID:19589158

  9. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  10. OFDM System Channel Estimation with Hidden Pilot

    Institute of Scientific and Technical Information of China (English)

    YANG Feng; LIN Cheng-yu; ZHANG Wen-jun

    2007-01-01

    Channel estimation using pilot is common used in OFDM system. The pilot is usually time division multiplexed with the informative sequence. One of the main drawbacks is bandwidth losing. In this paper, a new method was proposed to perform channel estimation in OFDM system. The pilot is arithmetically added to the output of OFDM modulator. Receiver uses the hidden pilot to get an accurate estimation of the channel. Then pilot is removed after channel estimation. The Cramer-Rao lower bound for this method was deprived. The performance of the algorithm is then shown. Compared with traditional methods, the proposed algorithm increases the bandwidth efficiency dramatically.

  11. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  12. Hidden photon CDM search at Tokyo

    CERN Document Server

    Suzuki, Jun'ya; Horie, Tomoki; Minowa, Makoto

    2015-01-01

    We report on a search for hidden photon cold dark matter (HP CDM) using a novel technique with a dish antenna. We constructed two independent apparatus: one is aiming at the detection of the HP with a mass of $\\sim\\,\\rm{eV}$ which employs optical instruments, and the other is for a mass of $\\sim5\\times10^{-5}\\, \\rm{eV}$ utilizing a commercially available parabolic antenna facing on a plane reflector. From the result of the measurements, we found no evidence for the existence of HP CDM and set upper limits on the photon-HP mixing parameter $\\chi$.

  13. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  14. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  15. Scaling dimensions in hidden Kerr/CFT

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2011-01-01

    It has been proposed that a hidden conformal field theory (CFT) governs the dynamics of low frequency scattering in a general Kerr black hole background. We further investigate this correspondence by mapping higher order corrections to the massless wave equations in a Kerr background to an expansion within the CFT in terms of higher dimension operators. This implies the presence of infinite towers of CFT primary operators with positive conformal dimensions compatible with unitarity. The exact Kerr background softly breaks the conformal symmetry and the scaling dimensions of these operators run with frequency. The scale-invariant fixed point is dual to a degenerate case of flat spacetime.

  16. Hidden Kerr/CFT at finite frequencies

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2013-01-01

    Massless fields propagating in a generic Kerr black hole background enjoy a hidden SL(2,R)xSL(2,R) symmetry. We determine how the exact mode functions decompose into representations of this symmetry group. This extends earlier results on the low frequency limit of the massless scalar case to finite frequencies and general spin. As an application, we numerically determine the parameters of the representations that appear in quasinormal modes. These results represent a first step to formulating a more precise mapping to a holographic dual conformal field theory for generic black holes.

  17. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  18. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  19. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  20. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  1. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  2. Analyzing Hidden Semantics in Social Bookmarking of Open Educational Resources

    Science.gov (United States)

    Minguillón, Julià

    Web 2.0 services such as social bookmarking allow users to manage and share the links they find interesting, adding their own tags for describing them. This is especially interesting in the field of open educational resources, as delicious is a simple way to bridge the institutional point of view (i.e. learning object repositories) with the individual one (i.e. personal collections), thus promoting the discovering and sharing of such resources by other users. In this paper we propose a methodology for analyzing such tags in order to discover hidden semantics (i.e. taxonomies and vocabularies) that can be used to improve descriptions of learning objects and make learning object repositories more visible and discoverable. We propose the use of a simple statistical analysis tool such as principal component analysis to discover which tags create clusters that can be semantically interpreted. We will compare the obtained results with a collection of resources related to open educational resources, in order to better understand the real needs of people searching for open educational resources.

  3. Women's hidden transcripts about abortion in Brazil.

    Science.gov (United States)

    Nations, M K; Misago, C; Fonseca, W; Correia, L L; Campbell, O M

    1997-06-01

    Two folk medical conditions, "delayed" (atrasada) and "suspended" (suspendida) menstruation, are described as perceived by poor Brazilian women in Northeast Brazil. Culturally prescribed methods to "regulate" these conditions and provoke menstrual bleeding are also described, including ingesting herbal remedies, patent drugs, and modern pharmaceuticals. The ingestion of such self-administered remedies is facilitated by the cognitive ambiguity, euphemisms, folklore, etc., which surround conception and gestation. The authors argue that the ethnomedical conditions of "delayed" and "suspended" menstruation and subsequent menstrual regulation are part of the "hidden reproductive transcript" of poor and powerless Brazilian women. Through popular culture, they voice their collective dissent to the official, public opinion about the illegality and immorality of induced abortion and the chronic lack of family planning services in Northeast Brazil. While many health professionals consider women's explanations of menstrual regulation as a "cover-up" for self-induced abortions, such popular justifications may represent either an unconscious or artful manipulation of hegemonic, anti-abortion ideology expressed in prudent, unobtrusive and veiled ways. The development of safer abortion alternatives should consider women's hidden reproductive transcripts.

  4. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  5. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  6. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  7. Hidden charm molecules in finite volume

    CERN Document Server

    Albaladejo, Miguel; Nieves, Juan; Oset, Eulogio

    2013-01-01

    In the present paper we address the interaction of pairs of charmed mesons with hidden charm in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and from them some synthetic data are generated. These data are then employed to study the inverse problem of getting the energies of the bound states and phase shifts for $D \\bar D$ or $D^* {\\bar D}^*$. Different strategies are investigated using the lowest two levels for different values of the box size, carrying a study of the errors produced. Starting from the upper level, fits to the synthetic data are carried out to determine the scattering length and effective range plus the binding energy of the ground state. A similar strategy using the effective range formula is considered with a simultaneous fit to the two levels, one above and the other one below threshold. This method turns out to be more...

  8. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  9. Bayesian structural inference for hidden processes.

    Science.gov (United States)

    Strelioff, Christopher C; Crutchfield, James P

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ε-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ε-machines, irrespective of estimated transition probabilities. Properties of ε-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  10. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    Decker, T.; Draisma, J.; Wocjan, P.

    2009-01-01

    We consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be m-variate po

  11. Hidden attractor in the Rabinovich system, Chua circuits and PLL

    Science.gov (United States)

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Seledzhi, S. M.

    2016-06-01

    In this report the existence of hidden attractors in Rabinovich system, phase-locked loop and coupled Chua circuits is considered. It is shown that the existence of hidden attractors may complicate the analysis of the systems and significantly affect the synchronization.

  12. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  13. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  14. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  15. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  16. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in Seuss's…

  17. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  18. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  19. Object crowding.

    Science.gov (United States)

    Wallace, Julian M; Tjan, Bosco S

    2011-05-25

    Crowding occurs when stimuli in the peripheral fields become harder to identify when flanked by other items. This phenomenon has been demonstrated extensively with simple patterns (e.g., Gabors and letters). Here, we characterize crowding for everyday objects. We presented three-item arrays of objects and letters, arranged radially and tangentially in the lower visual field. Observers identified the central target, and we measured contrast energy thresholds as a function of target-to-flanker spacing. Object crowding was similar to letter crowding in spatial extent but was much weaker. The average elevation in threshold contrast energy was in the order of 1 log unit for objects as compared to 2 log units for letters and silhouette objects. Furthermore, we examined whether the exterior and interior features of an object are differentially affected by crowding. We used a circular aperture to present or exclude the object interior. Critical spacings for these aperture and "donut" objects were similar to those of intact objects. Taken together, these findings suggest that crowding between letters and objects are essentially due to the same mechanism, which affects equally the interior and exterior features of an object. However, for objects defined with varying shades of gray, it is much easier to overcome crowding by increasing contrast.

  20. Performance Objectives

    Science.gov (United States)

    1978-12-01

    objectives may direct students’ learning (Duchastel and Merrill, 1973; Kapfer , 1970; Kibler et al., 1974), since such objectives may provide...matter learning. Journal of Educational Psychology, 62(1): 67-70 (1971). Kapfer , P. G. Behavioral objectives and the curriculum processor. Educational

  1. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  2. Secluded Dark Matter Coupled to a Hidden CFT

    CERN Document Server

    von Harling, Benedict

    2012-01-01

    Models of secluded dark matter offer a variant on the standard WIMP picture and can modify our expectations for hidden sector phenomenology and detection. In this work we extend a minimal model of secluded dark matter, comprised of a U(1)'-charged dark matter candidate, to include a confining hidden-sector CFT. This provides a technically natural explanation for the hierarchically small mediator-scale, with hidden-sector confinement generating m_{gamma'}>0. Furthermore, the thermal history of the universe can differ markedly from the WIMP picture due to (i) new annihilation channels, (ii) a (potentially) large number of hidden-sector degrees of freedom, and (iii) a hidden-sector phase transition at temperatures T << M_{dm} after freeze out. The mediator allows both the dark matter and the Standard Model to communicate with the CFT, thus modifying the low-energy phenomenology and cosmic-ray signals from the secluded sector.

  3. Abelian Hidden Sectors at a GeV

    Energy Technology Data Exchange (ETDEWEB)

    Morrissey, David E.; Poland, David; /Harvard U.; Zurek, Kathryn; /Fermilab /Michigan U.

    2009-04-16

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1){sub x} gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  4. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  5. Gauge Coupling Unification with Hidden Photon, and Minicharged Dark Matter

    CERN Document Server

    Daido, Ryuji; Yokozaki, Norimi

    2016-01-01

    We show that gauge coupling unification is realized with a greater accuracy in the presence of a massless hidden photon which has a large kinetic mixing with hypercharge. We solve the renormalization group equations at two-loop level and find that the GUT unification scale is around $10^{16.5}$ GeV which sufficiently suppresses the proton decay rate, and that the unification depends only on the kinetic mixing, but not on the hidden gauge coupling nor the presence of vector-like matter fields charged under U(1)$_H$ and/or SU(5). Matter fields charged under the unbroken hidden U(1)$_H$ are stable and they contribute to dark matter. Interestingly, they become minicharged dark matter which carries a small but non-zero electric charge, if the hidden gauge coupling is tiny. The minicharged dark matter is a natural outcome of the gauge coupling unification with a hidden photon.

  6. Atmosphere Refraction Effects in Object Locating for Optical Satellite Remote Sensing Images%大气折射对光学卫星遥感影像几何定位的影响分析

    Institute of Scientific and Technical Information of China (English)

    严明; 王智勇; 汪承义; 于冰洋

    2015-01-01

    采用 ISO国际标准大气模型和 Owens大气折射系数算法,根据大气层内不同纬度和海拔高度处的大气折射系数分布规律,把地球大气简化为对流层和同温层的双层均匀球形大气,从在轨光学卫星CCD探元视线出发,使用视线跟踪几何算法,计算不同侧视角下大气折射产生的几何位置偏差.结果表明,大气折射几何偏差随卫星观测角的增加而非线性迅速增加.当卫星运行在650 km 的太阳同步轨道,侧视30°成像时,大气折射产生约2.5 m 的几何偏差;卫星侧视45°成像时,大气折射产生约9 m 的几何偏差.在高分辨率敏捷卫星成像和宽视场卫星遥感图像的严密几何定位处理中,使用本文提出的大气折射几何偏差算法和严密几何定位大气折射校正模型,在地心地固坐标系下补偿严密几何模型中存在的大气折射偏差,能够进一步提升高分辨率卫星遥感图像的无控几何定位精度,应用于我国高分系列卫星遥感图像地面几何定位处理.%The collinear rigorous geometric model contains the atmosphere refraction geometric error in off-nadir observation.In order to estimate and correct the atmosphere refraction geometric error,the ISO international standard atmospheric model and Owens atmosphere refractive index algorithm are applied to calculate the index of atmosphere refraction in different latitude and altitude.The paper uses the weighted mean algorithm to reduce the eight layers ISO standard atmospheric model into a simple troposphere and stratosphere two layers spherical atmosphere.And the LOS vector track geometric algorithm is used to estimate the atmosphere refraction geometric error in different observation off-nadir angle.The results show that the atmosphere refraction will introduce about 2.5 m or 9 m geometric displacement in 30 or 45 degree off-nadir angle individual.Therefore,during geo-location processing of agile platform and

  7. An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2016-01-01

    Successful transmission of online multimedia streams in wireless multimedia sensor networks (WMSNs) is a big challenge due to their limited bandwidth and power resources. The existing WSN protocols are not completely appropriate for multimedia communication. The effectiveness of WMSNs varies, and it depends on the correct location of its sensor nodes in the field. Thus, maximizing the multimedia coverage is the most important issue in the delivery of multimedia contents. The nodes in WMSNs are either static or mobile. Thus, the node connections change continuously due to the mobility in wireless multimedia communication that causes an additional energy consumption, and synchronization loss between neighboring nodes. In this paper, we introduce an Optimized Hidden Node Detection (OHND) paradigm. The OHND consists of three phases: hidden node detection, message exchange, and location detection. These three phases aim to maximize the multimedia node coverage, and improve energy efficiency, hidden node detection capacity, and packet delivery ratio. OHND helps multimedia sensor nodes to compute the directional coverage. Furthermore, an OHND is used to maintain a continuous node– continuous neighbor discovery process in order to handle the mobility of the nodes. We implement our proposed algorithms by using a network simulator (NS2). The simulation results demonstrate that nodes are capable of maintaining direct coverage and detecting hidden nodes in order to maximize coverage and multimedia node mobility. To evaluate the performance of our proposed algorithms, we compared our results with other known approaches. PMID:27618048

  8. An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2016-09-07

    Successful transmission of online multimedia streams in wireless multimedia sensor networks (WMSNs) is a big challenge due to their limited bandwidth and power resources. The existing WSN protocols are not completely appropriate for multimedia communication. The effectiveness of WMSNs varies, and it depends on the correct location of its sensor nodes in the field. Thus, maximizing the multimedia coverage is the most important issue in the delivery of multimedia contents. The nodes in WMSNs are either static or mobile. Thus, the node connections change continuously due to the mobility in wireless multimedia communication that causes an additional energy consumption, and synchronization loss between neighboring nodes. In this paper, we introduce an Optimized Hidden Node Detection (OHND) paradigm. The OHND consists of three phases: hidden node detection, message exchange, and location detection. These three phases aim to maximize the multimedia node coverage, and improve energy efficiency, hidden node detection capacity, and packet delivery ratio. OHND helps multimedia sensor nodes to compute the directional coverage. Furthermore, an OHND is used to maintain a continuous node- continuous neighbor discovery process in order to handle the mobility of the nodes. We implement our proposed algorithms by using a network simulator (NS2). The simulation results demonstrate that nodes are capable of maintaining direct coverage and detecting hidden nodes in order to maximize coverage and multimedia node mobility. To evaluate the performance of our proposed algorithms, we compared our results with other known approaches.

  9. Hidden Markov Model-based Packet Loss Concealment for Voice over IP

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Murthi, Manohar N.; Andersen, Søren Vang

    2006-01-01

    As voice over IP proliferates, packet loss concealment (PLC) at the receiver has emerged as an important factor in determining voice quality of service. Through the use of heuristic variations of signal and parameter repetition and overlap-add interpolation to handle packet loss, conventional PLC...... systems largely ignore the dynamics of the statistical evolution of the speech signal, possibly leading to perceptually annoying artifacts. To address this problem, we propose the use of hidden Markov models for PLC. With a hidden Markov model (HMM) tracking the evolution of speech signal parameters, we...... demonstrate how PLC is performed within a statistical signal processing framework. Moreover, we show how the HMM is used to index a specially designed PLC module for the particular signal context, leading to signal-contingent PLC. Simulation examples, objective tests, and subjective listening tests...

  10. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  11. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  12. Pressure Transducer Locations

    Data.gov (United States)

    National Aeronautics and Space Administration — Files are located here, defining the locations of the pressure transducers on the HIRENASD model. These locations also correspond to the locations that analysts...

  13. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  14. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  15. Grand unified hidden-sector dark matter

    Science.gov (United States)

    Lonsdale, Stephen J.; Volkas, Raymond R.

    2014-10-01

    We explore G×G unified theories with the visible and the hidden or dark sectors paired under a Z2 symmetry. Developing a system of "asymmetric symmetry breaking" we motivate such models on the basis of their ability to generate dark baryons that are confined with a mass scale just above that of the proton, as motivated by asymmetric dark matter. This difference is achieved from the distinct but related confinement scales that develop in unified theories that have the two factors of G spontaneously breaking in an asymmetric manner. We show how Higgs potentials that admit different gauge group breaking chains in each sector can be constructed, and demonstrate the capacity for generating different fermion mass scales. Lastly we discuss supersymmetric extensions of such schemes.

  16. Hidden caries’ challenge diagnosis: case report

    Directory of Open Access Journals (Sweden)

    Fernanda Mara de Paiva Bertoli

    2013-06-01

    Full Text Available Introduction: Hidden caries is a term used to describe occlusal dentine caries that is missed on a visual examination, but is large and demineralised enough to be detected by another exam for example, radiographs. Case report: This article reports a case of large dentine caries, which presented as to be a small pit-and-fissure carious lesion on the occlusal surface of the right mandibular permanent first molar in a 10-year-old girl. The treatment included root canal treatment and the sealing of the cavity with composite resin. Conclusion: Careful visual examination, with cleaning and drying of teeth, associated to bitewing radiographs may improve occlusal caries detection. Dentists should examine bitewing radiographs carefully for proximal caries and occlusal demineralization. Radiographs are an effective method of caries diagnosis that can avoid large destruction and allows less invasive treatment.

  17. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  18. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  19. Nuclear scissors modes and hidden angular momenta

    CERN Document Server

    Balbutsev, E B; Schuck, P

    2016-01-01

    The coupled dynamics of low lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time Dependent Hartree-Fock-Bogoliubov equations. The model of the harmonic oscillator including spin-orbit potential plus quadrupole-quadrupole and spin-spin interactions is considered. New low lying spin dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  20. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school......Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...

  1. Hidden baryons: The physics of Compton composites

    Science.gov (United States)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  2. Hidden realities inside PBL design processes

    DEFF Research Database (Denmark)

    Pihl, Ole Verner

    2015-01-01

    Design Process, but is a group-based architecture and design education better than that which is individually based? How does PBL affect space, form, and creative processes? Hans Kiib, professor and one of the founders of the Department of Architecture and Design in Aalborg, describes his intentions...... within the group work, as it is closer related to the actual PBL process”. Is the Integrated Design Process (Knudstrup 2004) and is Colb (1975) still current and valid? Can we still use these methodologies when we must create “learning for an unknown future,” as Ronald Barnett (2004) claims that we...... investigates the creative processes of the collective and the individual and clarifies some of the hidden realities behind the PBL-based creative processes, both through an inquiry with the students and a more methodological and theoretical approach. The paper also explores how to integrate artistic...

  3. Aluminium Diphosphamethanides: Hidden Frustrated Lewis Pairs.

    Science.gov (United States)

    Styra, Steffen; Radius, Michael; Moos, Eric; Bihlmeier, Angela; Breher, Frank

    2016-07-04

    The synthesis and characterisation of two aluminium diphosphamethanide complexes, [Al(tBu)2 {κ(2) P,P'-Mes*PCHPMes*}] (3) and [Al(C6 F5 )2 {κ(2) P,P'-Mes*PCHPMes*}] (4), and the silylated analogue, Mes*PCHP(SiMe3 )Mes* (5), are reported. The aluminium complexes feature four-membered PCPAl core structures consisting of diphosphaallyl ligands. The silylated phosphine 5 was found to be a valuable precursor for the synthesis of 4 as it cleanly reacts with the diaryl aluminium chloride [(C6 F5 )2 AlCl]2 . The aluminium complex 3 reacts with molecular dihydrogen at room temperature under formation of the acyclic σ(2) λ(3) ,σ(3) λ(3) -diphosphine Mes*PCHP(H)Mes* and the corresponding dialkyl aluminium hydride [tBu2 AlH]3 . Thus, 3 belongs to the family of so-called hidden frustrated Lewis pairs.

  4. Wavelet domain hidden markovian bayesian document segmentation

    Institute of Scientific and Technical Information of China (English)

    Sun Junxi; Xiao Changyan; Zhang Su; Chen Yazhu

    2005-01-01

    A novel algorithm for Bayesian document segmentation is proposed based on the wavelet domain hidden Markov tree (HMT) model. Once the parameters of model are known, according to the sequential maximum a posterior probability (SMAP) rule, firstly, the likelihood probability of HMT model for each pattern is computed from fine to coarse procedure. Then, the interscale state transition probability is solved using Expectation Maximum (EM) algorithm based on hybrid-quadtree and multiscale context information is fused from coarse to fine procedure. In order to get pixellevel segmentation, the redundant wavelet domain Gaussian mixture model (GMM) is employed to formulate pixel-level statistical property. The experiment results show that the proposed scheme is feasible and robust.

  5. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  6. Hidden fungi, emergent properties: endophytes and microbiomes.

    Science.gov (United States)

    Porras-Alfaro, Andrea; Bayman, Paul

    2011-01-01

    Endophytes are microorganisms that live within plant tissues without causing symptoms of disease. They are important components of plant microbiomes. Endophytes interact with, and overlap in function with, other core microbial groups that colonize plant tissues, e.g., mycorrhizal fungi, pathogens, epiphytes, and saprotrophs. Some fungal endophytes affect plant growth and plant responses to pathogens, herbivores, and environmental change; others produce useful or interesting secondary metabolites. Here, we focus on new techniques and approaches that can provide an integrative understanding of the role of fungal endophytes in the plant microbiome. Clavicipitaceous endophytes of grasses are not considered because they have unique properties distinct from other endophytes. Hidden from view and often overlooked, endophytes are emerging as their diversity, importance for plant growth and survival, and interactions with other organisms are revealed.

  7. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  8. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  9. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments.

  10. Free energy and hidden barriers of the β-sheet structure of prion protein.

    Science.gov (United States)

    Paz, S Alexis; Abrams, Cameron F

    2015-10-13

    On-the-fly free-energy parametrization is a new collective variable biasing approach akin to metadynamics with one important distinction: rather than acquiring an accelerated distribution via a history-dependent bias potential, sampling on this distribution is achieved from the beginning of the simulation using temperature-accelerated molecular dynamics. In the present work, we compare the performance of both approaches to compute the free-energy profile along a scalar collective variable measuring the H-bond registry of the β-sheet structure of the mouse Prion protein. Both methods agree on the location of the free-energy minimum, but free-energy profiles from well-tempered metadynamics are subject to a much higher degree of statistical noise due to hidden barriers. The sensitivity of metadynamics to hidden barriers is shown to be a consequence of the history dependence of the bias potential, and we detail the nature of these barriers for the prion β-sheet. In contrast, on-the-fly parametrization is much less sensitive to these barriers and thus displays improved convergence behavior relative to that of metadynamics. While hidden barriers are a frequent and central issue in free-energy methods, on-the-fly free-energy parametrization appears to be a robust and preferable method to confront this issue.

  11. Religion, Spirituality, and the Hidden Curriculum: Medical Student and Faculty Reflections

    Science.gov (United States)

    Balboni, Michael J.; Bandini, Julia; Mitchell, Christine; Epstein-Peterson, Zachary D.; Amobi, Ada; Cahill, Jonathan; Enzinger, Andrea C.; Peteet, John; Balboni, Tracy

    2017-01-01

    Context Religion and spirituality play an important role in physicians’ medical practice, but little research has examined their influence within the socialization of medical trainees and the hidden curriculum. Objectives The objective is to explore the role of religion and spirituality as they intersect with aspects of medicine’s hidden curriculum. Methods Semiscripted, one-on-one interviews and focus groups (n = 33 respondents) were conducted to assess Harvard Medical School student and faculty experiences of religion/spirituality and the professionalization process during medical training. Using grounded theory, theme extraction was performed with interdisciplinary input (medicine, sociology, and theology), yielding a high inter-rater reliability score (kappa = 0.75). Results Three domains emerged where religion and spirituality appear as a factor in medical training. First, religion/spirituality may present unique challenges and benefits in relation to the hidden curriculum. Religious/spiritual respondents more often reported to struggle with issues of personal identity, increased self-doubt, and perceived medical knowledge inadequacy. However, religious/spiritual participants less often described relationship conflicts within the medical team, work-life imbalance, and emotional stress arising from patient suffering. Second, religion/spirituality may influence coping strategies during encounters with patient suffering. Religious/spiritual trainees described using prayer, faith, and compassion as means for coping whereas nonreligious/nonspiritual trainees discussed compartmentalization and emotional repression. Third, levels of religion/spirituality appear to fluctuate in relation to medical training, with many trainees experiencing an increase in religiousness/spirituality during training. Conclusion Religion/spirituality has a largely unstudied but possibly influential role in medical student socialization. Future study is needed to characterize its

  12. 集装箱堆场出口箱箱位分配多目标优化模型%Multi-objective optimization model for storage location allocation of outbound containers at container yard

    Institute of Scientific and Technical Information of China (English)

    刘婵娟; 胡志华

    2015-01-01

    In order to allocate the outbound containers in the yard reasonably,considering the randomness of export containers'time of arrival at yard and uncertainty of export containers'weight, a multi-objective optimization model is proposed.The model takes avoiding rehandling the containers, minimizing storage cost and making the number of each stack balance as goals.YALMIP toolbox in MATLAB software is used to solve this problem.For this model,three experiments are designed to analyze the relationship between the occupied slots and storage space allocation,as well as the number of each stack and storage cost.And the experimental results show that the model can achieve the goal to optimize the storage space allocation and avoid rehandling.%为了合理分配集装箱堆场出口箱箱位,考虑出口箱进场时间的随机性以及出口箱重量的不确定性,以取箱装船过程中尽量避免翻箱操作、最小化存储成本、使各堆栈中箱子数均衡为目标建立堆场出口箱箱位分配的多目标优化模型。应用 MATLAB 软件中 YALMIP 工具箱编程求解。针对此模型,设计3组实验,分析贝位中已占用箱位数对箱位分配的影响,以及各堆栈中箱子数均衡与存储成本之间的关系。结果表明该模型能够从总体上实现对出口箱箱位分配的优化并能尽量避免取箱装船过程出现翻箱操作。

  13. Landmine detection using discrete hidden Markov models with Gabor features

    Science.gov (United States)

    Frigui, Hichem; Missaoui, Oualid; Gader, Paul

    2007-04-01

    We propose a general method for detecting landmine signatures in vehicle mounted ground penetrating radar (GPR) using discrete hidden Markov models and Gabor wavelet features. Observation vectors are constructed based on the expansion of the signature's B-scan using a bank of scale and orientation selective Gabor filters. This expansion provides localized frequency description that gets encoded in the observation sequence. These observations do not impose an explicit structure on the mine model, and are used to naturally model the time-varying signatures produced by the interaction of the GPR and the landmines as the vehicle moves. The proposed method is evaluated on real data collected by a GPR mounted on a moving vehicle at three different geographical locations that include several lanes. The model parameters are optimized using the BaumWelch algorithm, and lane-based cross-validation, in which each mine lane is in turn treated as a test set with the rest of the lanes used for training, is used to train and test the model. Preliminary results show that observations encoded with Gabor wavelet features perform better than observation encoded with gradient-based edge features.

  14. Drum Sound Detection in Polyphonic Music with Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Jouni Paulus

    2009-01-01

    Full Text Available This paper proposes a method for transcribing drums from polyphonic music using a network of connected hidden Markov models (HMMs. The task is to detect the temporal locations of unpitched percussive sounds (such as bass drum or hi-hat and recognise the instruments played. Contrary to many earlier methods, a separate sound event segmentation is not done, but connected HMMs are used to perform the segmentation and recognition jointly. Two ways of using HMMs are studied: modelling combinations of the target drums and a detector-like modelling of each target drum. Acoustic feature parametrisation is done with mel-frequency cepstral coefficients and their first-order temporal derivatives. The effect of lowering the feature dimensionality with principal component analysis and linear discriminant analysis is evaluated. Unsupervised acoustic model parameter adaptation with maximum likelihood linear regression is evaluated for compensating the differences between the training and target signals. The performance of the proposed method is evaluated on a publicly available data set containing signals with and without accompaniment, and compared with two reference methods. The results suggest that the transcription is possible using connected HMMs, and that using detector-like models for each target drum provides a better performance than modelling drum combinations.

  15. Diurnal modulation signal from dissipative hidden sector dark matter

    Directory of Open Access Journals (Sweden)

    R. Foot

    2015-09-01

    Full Text Available We consider a simple generic dissipative dark matter model: a hidden sector featuring two dark matter particles charged under an unbroken U(1′ interaction. Previous work has shown that such a model has the potential to explain dark matter phenomena on both large and small scales. In this framework, the dark matter halo in spiral galaxies features nontrivial dynamics, with the halo energy loss due to dissipative interactions balanced by a heat source. Ordinary supernovae can potentially supply this heat provided kinetic mixing interaction exists with strength ϵ∼10−9. This type of kinetically mixed dark matter can be probed in direct detection experiments. Importantly, this self-interacting dark matter can be captured within the Earth and shield a dark matter detector from the halo wind, giving rise to a diurnal modulation effect. We estimate the size of this effect for detectors located in the Southern hemisphere, and find that the modulation is large (≳10% for a wide range of parameters.

  16. Diurnal modulation signal from dissipative hidden sector dark matter

    CERN Document Server

    Foot, R

    2014-01-01

    We consider a simple generic dissipative dark matter model: a hidden sector featuring two dark matter particles charged under an unbroken $U(1)'$ interaction. Previous work has shown that such a model has the potential to explain dark matter phenomena on both large and small scales. In this framework, the dark matter halo in spiral galaxies features nontrivial dynamics, with the halo energy loss due to dissipative interactions balanced by a heat source. Ordinary supernovae can potentially supply this heat provided kinetic mixing interaction exists with strength $\\epsilon \\sim 10^{-9}$. This type of kinetically mixed dark matter can be probed in direct detection experiments. Importantly, this self-interacting dark matter can be captured within the Earth and shield a dark matter detector from the halo wind, giving rise to a diurnal modulation effect. We estimate the size of this effect for detectors located in the Southern hemisphere, and find that the modulation is large ($\\gtrsim 10\\%$) for a wide range of pa...

  17. Locating Encrypted Data Hidden Among Non-Encrypted Data Using Statistical Tools

    Science.gov (United States)

    2007-03-01

    Cumulative Sums ( Cusum ) Test This test calculates the cumulative sums of the bit sequence to determine if it is consistent with a random bit sequence...test indicates a bit sequence with too many or too few ones in the first half where the backward cusum tests for too many or too few ones in the

  18. Agile Objects

    Science.gov (United States)

    German, Senta; Harris, Jim

    2017-01-01

    In this article, the authors argue that the art-historical canon, however it is construed, has little relevance to the selection of objects for museum-based teaching. Their contention is that all objects are fundamentally agile and capable of interrogation from any number of disciplinary standpoints, and that the canon of museum education,…

  19. Adaptive Multi-Objective Optimization Based on Feedback Design

    Institute of Scientific and Technical Information of China (English)

    窦立谦; 宗群; 吉月辉; 曾凡琳

    2010-01-01

    The problem of adaptive multi-objective optimization(AMOO) has received extensive attention due to its practical significance.An important issue in optimizing a multi-objective system is adjusting the weighting coefficients of multiple objectives so as to keep track of various conditions.In this paper,a feedback structure for AMOO is designed.Moreover,the reinforcement learning combined with hidden biasing information is applied to online tuning weighting coefficients of objective functions.Finally,the prop...

  20. Using HPGe detector for a solar hidden-photons search

    CERN Document Server

    Horvat, R; Krcmar, M; Krecak, Z; Ljubicic, A

    2012-01-01

    In this paper we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory, by observing the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, leads to both photon into hidden states oscillations and to a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in the Sun's interior. We exclude hidden photons with kinetic couplings chi > (1.5x10^{-6}-2.6x10^{-11}) for the mass region 1.7x10^{-4} eV < m_\\gamma' < 3.4 eV. Our constraints on the mixing parameter chi at sub-eV hidden-photon masses p...

  1. Hidden photon dark matter search with large metallic mirror

    Energy Technology Data Exchange (ETDEWEB)

    Doebrich, Babette; Lindner, Axel [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Daumiller, Kai; Engel, Ralph; Roth, Markus [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany); Kowalski, Marek [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Redondo, Javier [Zaragoza Univ. (Spain)

    2014-10-15

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  2. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  3. Suppressing the QCD axion abundance by hidden monopoles

    Directory of Open Access Journals (Sweden)

    Masahiro Kawasaki

    2016-02-01

    Full Text Available We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 1012GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei–Quinn symmetry is spontaneously broken after inflation.

  4. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  5. The Agency of Memory Objects

    DEFF Research Database (Denmark)

    Wiegand, Frauke Katharina

    2016-01-01

    and international tourists’ photographs and notes, especially their visual encounters with the exhibition, are understood as participatory interactions in the course of memory work. The article’s aim is twofold: introducing an ANT-inspired methodology to the field of memory studies, and mapping a Sowetan memory......This article analyses the multifarious acts of cultural memory taking place in the small, almost hidden, exhibition space of the famous Regina Mundi Church in Soweto, South Africa, home to the photographic exhibition “The Story of Soweto.” Next to the photographs (1950-2010) by well-known apartheid...... of action, examining the idea that objects, such as images, that leave a trace can act as mediators of memory. Starting from visitors’ appropriations of the exhibition space, the essay sheds light on the different life cycles of memory objects, in particular images, and their diverse mediations. Domestic...

  6. Trusted Objects

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.; PIERSON,LYNDON G.; WITZKE,EDWARD L.

    1999-10-27

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  7. Bayesian inversion of seismic attributes for geological facies using a Hidden Markov Model

    Science.gov (United States)

    Nawaz, Muhammad Atif; Curtis, Andrew

    2017-02-01

    Markov chain Monte-Carlo (McMC) sampling generates correlated random samples such that their distribution would converge to the true distribution only as the number of samples tends to infinity. In practice, McMC is found to be slow to converge, convergence is not guaranteed to be achieved in finite time, and detection of convergence requires the use of subjective criteria. Although McMC has been used for decades as the algorithm of choice for inference in complex probability distributions, there is a need to seek alternative approaches, particularly in high dimensional problems. Walker & Curtis (2014) developed a method for Bayesian inversion of 2-D spatial data using an exact sampling alternative to McMC which always draws independent samples of the target distribution. Their method thus obviates the need for convergence and removes the concomitant bias exhibited by finite sample sets. Their algorithm is nevertheless computationally intensive and requires large memory. We propose a more efficient method for Bayesian inversion of categorical variables, such as geological facies that requires no sampling at all. The method is based on a 2-D Hidden Markov Model (2D-HMM) over a grid of cells where observations represent localized data constraining each cell. The data in our example application are seismic attributes such as P- and S-wave impedances and rock density; our categorical variables are the hidden states and represent the geological rock types in each cell-facies of distinct subsets of lithology and fluid combinations such as shale, brine-sand and gas-sand. The observations at each location are assumed to be generated from a random function of the hidden state (facies) at that location, and to be distributed according to a certain probability distribution that is independent of hidden states at other locations - an assumption referred to as `localized likelihoods'. The hidden state (facies) at a location cannot be determined solely by the observation at that

  8. Bounds in the location-allocation problem

    DEFF Research Database (Denmark)

    Juel, Henrik

    1981-01-01

    Develops a family of stronger lower bounds on the objective function value of the location-allocation problem. Solution methods proposed to solve problems in location-allocation; Efforts to develop a more efficient bound solution procedure; Determination of the locations of the sources.......Develops a family of stronger lower bounds on the objective function value of the location-allocation problem. Solution methods proposed to solve problems in location-allocation; Efforts to develop a more efficient bound solution procedure; Determination of the locations of the sources....

  9. Hidden losses in financial reporting and the manner of hiding case Serbia: Part two

    Directory of Open Access Journals (Sweden)

    Kaluđerović Nenad

    2016-01-01

    Full Text Available There has always been a dilemma whether financial statements are a reflection of the real situation. When financial statements are subject to various conveniences in order to be presented according to the wish of the purchaser, it leads us to the dilemma when and how this happens. This thesis deals with the attempt to start to solve the dilemmas where and when manipulative actions in financial reporting occur. We have carried out researches on selected samples of money losing companies for the period from 2010 to 2013, on the example of financial indicators of the companies which operated in Serbia. Detection of manipulations by means of which loss is hidden in financial statements is very important for the state economy. Under these conditions, development of an adequate method in this area is limited with the international standards of financial reporting. Numerous qualitative and quantitative methods have been used for evaluation of the real and objective components of losses in order to reflect the level of losses in the economy much better. However, in our conditions, there is an universally accepted method which can foresee and evaluate all events and actions that detect hidden losses in financial statements. This thesis presents methods of evaluation (quantitative and qualitative data mining and how they may be applied in detection of hidden losses in financial statements, by trying to identify a combination of methods which satisfies real needs of a certain task best.

  10. Identification of hidden failures in process control systems through function-oriented system analysis

    Energy Technology Data Exchange (ETDEWEB)

    Jalashgar, A.

    1997-05-01

    The main subject of this thesis is to identify hidden failures in process control systems by developing and using a function-oriented system analysis method. Qualitative failure analysis and the characteristics of the classical failure analysis methods and function-oriented modelling methods are covered. The general limitations of the methods in connection with the identification and representation of hidden failures are discussed. The discussion has led to the justification of developing and using a function-oriented system analysis method to identify and represent the capabilities of the system components, which realize different sets of functions in connection with different sets of goals that the system must achieve. A terminology is introduced to define the basic aspects of technical systems including goals, functions, capabilities and physical structure. A function-oriented system analysis method using this terminology and a tailored combination of the two function-oriented modelling approaches, is also introduced. It is then explained how the method can be applied in the identification and representation of hidden failures. The building blocks of a knowledge-oriented system to perform the diagnosis on the basis of the developed method are equally described. A prototype of the knowledge-based system is developed to demonstrate the applicability of the function-oriented system analysis method and the knowledge-based system. The prototype is implemented within the object-oriented software environment G2. (au) 65 ills., 32 refs.

  11. Uncapacitated facility location problems: contributions

    Directory of Open Access Journals (Sweden)

    Galvão Roberto Diéguez

    2004-01-01

    Full Text Available The objective of the present paper is to review my personal contributions in the field of uncapacitated facility location problems. These contributions took place throughout my academic career, from the time I was a Ph.D. student at Imperial College to the present day. They cover approximately 30 years, from 1973 to 2003; they address: algorithms developed for the p-median problem and for a general formulation of uncapacitated location problems; the study of dynamic location models; covering and hierarchical location problems; queuing-based probabilistic location models. The contributions encompass theoretical developments, computational algorithms and practical applications. All work took place in an academic environment, with the invaluable collaboration of colleagues (both in Brazil and abroad and research students at COPPE. Each section in the paper is dedicated to a topic that involves a personal contribution. Every one of them is placed within the context of the existing literature.

  12. Detection of hidden sources. Prompt reports by airborne teams in Resume95

    Energy Technology Data Exchange (ETDEWEB)

    Toivonen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    An exercise to locate and identify lost radioactive sources was arranged near Padasjoki Auttoinen village. Ten sources, consisting of caesium, cobolt, iridium and technetium, were hidden. The teams (10) were asked to report their findings immediately after the landing and 24 h later. The teams that had a large NaI detector at their disposal could locate more sources than the teams with HPGe detectors. However, for source identification and activity calculation and HPGe detector is superior. Thus, it is highly recommended for operational purposes that both measuring systems are used simultaneously. The best location results were provided by the Danish Emergency Management Agency; the team reported four sources at landing and two other sources were found in prompt data processing after the landing. (au).

  13. Recognition of surgical skills using hidden Markov models

    Science.gov (United States)

    Speidel, Stefanie; Zentek, Tom; Sudra, Gunther; Gehrig, Tobias; Müller-Stich, Beat Peter; Gutt, Carsten; Dillmann, Rüdiger

    2009-02-01

    Minimally invasive surgery is a highly complex medical discipline and can be regarded as a major breakthrough in surgical technique. A minimally invasive intervention requires enhanced motor skills to deal with difficulties like the complex hand-eye coordination and restricted mobility. To alleviate these constraints we propose to enhance the surgeon's capabilities by providing a context-aware assistance using augmented reality techniques. To recognize and analyze the current situation for context-aware assistance, we need intraoperative sensor data and a model of the intervention. Characteristics of a situation are the performed activity, the used instruments, the surgical objects and the anatomical structures. Important information about the surgical activity can be acquired by recognizing the surgical gesture performed. Surgical gestures in minimally invasive surgery like cutting, knot-tying or suturing are here referred to as surgical skills. We use the motion data from the endoscopic instruments to classify and analyze the performed skill and even use it for skill evaluation in a training scenario. The system uses Hidden Markov Models (HMM) to model and recognize a specific surgical skill like knot-tying or suturing with an average recognition rate of 92%.

  14. Ladar System Identifies Obstacles Partly Hidden by Grass

    Science.gov (United States)

    Castano, Andres

    2003-01-01

    A ladar-based system now undergoing development is intended to enable an autonomous mobile robot in an outdoor environment to avoid moving toward trees, large rocks, and other obstacles that are partly hidden by tall grass. The design of the system incorporates the assumption that the robot is capable of moving through grass and provides for discrimination between grass and obstacles on the basis of geometric properties extracted from ladar readings as described below. The system (see figure) includes a ladar system that projects a range-measuring pulsed laser beam that has a small angular width of radians and is capable of measuring distances of reflective objects from a minimum of dmin to a maximum of dmax. The system is equipped with a rotating mirror that scans the beam through a relatively wide angular range of in a horizontal plane at a suitable small height above the ground. Successive scans are performed at time intervals of seconds. During each scan, the laser beam is fired at relatively small angular intervals of radians to make range measurements, so that the total number of range measurements acquired in a scan is Ne = / .

  15. Enzyme kinetics: the whole picture reveals hidden meanings.

    Science.gov (United States)

    Pinto, Maria F; Estevinho, Berta N; Crespo, Rosa; Rocha, Fernando A; Damas, Ana M; Martins, Pedro M

    2015-06-01

    The methodology adopted by Michaelis and Menten in 1913 is still routinely used to characterize the catalytic power and selectivity of enzymes. These kinetic measurements must be performed soon after the purified enzyme is mixed with a large excess of substrate. Other time scales and solution compositions are no less physiologically relevant, but fall outside the range of applicability of the classical formalism. Here we show that the complete picture of an enzyme's mode of function is critically obscured by the limited scope of conventional kinetic analysis, even in the simplest case of a single active site without inhibition. This picture is now unveiled in a mathematically closed form that remains valid over the reaction time for all combinations of enzyme/substrate concentrations and rate constants. Algebraic simplicity is maintained in the new formalism when stationary reaction phases are considered. By achieving this century-old objective, the otherwise hidden role of the reversible binding step is revealed and atypical kinetic profiles are explained. Most singular kinetic behaviors are identified in a critical region of conditions that coincide with typical cell conditions. Because it is not covered by the Michaelis-Menten model, the critical region has been missed until now by low- and high-throughput screenings of new drugs. New possibilities are therefore raised for novel and once-promising inhibitors to therapeutically target enzymes.

  16. Religion, Spirituality, and the Hidden Curriculum: Medical Student and Faculty Reflections.

    Science.gov (United States)

    Balboni, Michael J; Bandini, Julia; Mitchell, Christine; Epstein-Peterson, Zachary D; Amobi, Ada; Cahill, Jonathan; Enzinger, Andrea C; Peteet, John; Balboni, Tracy

    2015-10-01

    Religion and spirituality play an important role in physicians' medical practice, but little research has examined their influence within the socialization of medical trainees and the hidden curriculum. The objective is to explore the role of religion and spirituality as they intersect with aspects of medicine's hidden curriculum. Semiscripted, one-on-one interviews and focus groups (n = 33 respondents) were conducted to assess Harvard Medical School student and faculty experiences of religion/spirituality and the professionalization process during medical training. Using grounded theory, theme extraction was performed with interdisciplinary input (medicine, sociology, and theology), yielding a high inter-rater reliability score (kappa = 0.75). Three domains emerged where religion and spirituality appear as a factor in medical training. First, religion/spirituality may present unique challenges and benefits in relation to the hidden curriculum. Religious/spiritual respondents more often reported to struggle with issues of personal identity, increased self-doubt, and perceived medical knowledge inadequacy. However, religious/spiritual participants less often described relationship conflicts within the medical team, work-life imbalance, and emotional stress arising from patient suffering. Second, religion/spirituality may influence coping strategies during encounters with patient suffering. Religious/spiritual trainees described using prayer, faith, and compassion as means for coping whereas nonreligious/nonspiritual trainees discussed compartmentalization and emotional repression. Third, levels of religion/spirituality appear to fluctuate in relation to medical training, with many trainees experiencing an increase in religiousness/spirituality during training. Religion/spirituality has a largely unstudied but possibly influential role in medical student socialization. Future study is needed to characterize its function within the hidden curriculum. Copyright

  17. Isovector and hidden-beauty partners of the X(3872)

    Energy Technology Data Exchange (ETDEWEB)

    Høgaasen, Hallstein, E-mail: hallstein.hogasen@fys.uio.no [Department of Physics, University of Oslo, Box 1048, NO-0316 Oslo (Norway); Kou, Emi, E-mail: kou@lal.in2p3.fr [Laboratoire de l' Accélérateur Linéaire, Université Paris-Sud, IN2P3-CNRS, Centre Scientifique d' Orsay, 91898 Orsay Cedex (France); Richard, Jean-Marc, E-mail: j-m.richard@ipnl.in2p3.fr [Université de Lyon, Institut de Physique Nucléaire de Lyon, UCBL–IN2P3-CNRS, 4, rue Enrico Fermi, 69622 Villeurbanne Cedex (France); Sorba, Paul, E-mail: paul.sorba@lapth.cnrs.fr [LAPTh, Laboratoire d' Annecy-le-Vieux de Physique Théorique, CNRS, Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France)

    2014-05-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  18. Local clustering in scale-free networks with hidden variables.

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A J E M; van Leeuwaarden, Johan S H; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ∈(2,3), so that the degrees have infinite variance. The natural cutoff h_{c} characterizes the largest degrees in the hidden variable models, and a structural cutoff h_{s} introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N, as a function of h_{s} and h_{c}. For scale-free networks with exponent 2vanish only for networks as large as N=10^{9}.

  19. A Bell-type Theorem Without Hidden Variables

    CERN Document Server

    Stapp, Henry P

    2002-01-01

    Bell's theorem rules out local hidden-variable theories. The locality condition is the demand that what an experimenter freely chooses to measure in one space-time region has no influence in a second space-time region that is spacelike separated from the first. The hidden-variable stipulation means that this demand is implemented through requirements on an assumed-to-exist substructure involving hidden variables. The question thus arises whether the locality condition itself fails, or only its implementation by means of the assumed hidden-variable structure. This paper shows that any theory that satisfies two generally accepted features of orthodox quantum theory and that yields certain predictions of quantum theory cannot satisfy the afore-mentioned locality condition. These two features are that the choices made by the experimenters can be treated as localized free variables and that such free choices do not affect outcomes that have already occurred.

  20. Modelling proteins' hidden conformations to predict antibiotic resistance

    Science.gov (United States)

    Hart, Kathryn M.; Ho, Chris M. W.; Dutta, Supratik; Gross, Michael L.; Bowman, Gregory R.

    2016-10-01

    TEM β-lactamase confers bacteria with resistance to many antibiotics and rapidly evolves activity against new drugs. However, functional changes are not easily explained by differences in crystal structures. We employ Markov state models to identify hidden conformations and explore their role in determining TEM's specificity. We integrate these models with existing drug-design tools to create a new technique, called Boltzmann docking, which better predicts TEM specificity by accounting for conformational heterogeneity. Using our MSMs, we identify hidden states whose populations correlate with activity against cefotaxime. To experimentally detect our predicted hidden states, we use rapid mass spectrometric footprinting and confirm our models' prediction that increased cefotaxime activity correlates with reduced Ω-loop flexibility. Finally, we design novel variants to stabilize the hidden cefotaximase states, and find their populations predict activity against cefotaxime in vitro and in vivo. Therefore, we expect this framework to have numerous applications in drug and protein design.

  1. Recent Applications of Hidden Markov Models in Computational Biology

    Institute of Scientific and Technical Information of China (English)

    Khar Heng Choo; Joo Chuan Tong; Louxin Zhang

    2004-01-01

    This paper examines recent developments and applications of Hidden Markov Models (HMMs) to various problems in computational biology, including multiple sequence alignment, homology detection, protein sequences classification, and genomic annotation.

  2. Self-similarity of complex networks and hidden metric spaces

    CERN Document Server

    Serrano, M Angeles; Boguna, Marian

    2007-01-01

    We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.

  3. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  4. Dark matter in the nonabelian hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2015-01-01

    We discuss the dark matter in the hidden gauge theory. We propose a scenario where the mini-inflation dilutes the dark matter density. This scenario is consistent with the current baryon number asymmetry.

  5. Location perception: the X-Files parable.

    Science.gov (United States)

    Prinzmetal, William

    2005-01-01

    Three aspects of visual object location were investigated: (1) how the visual system integrates information for locating objects, (2) how attention operates to affect location perception, and (3) how the visual system deals with locating an object when multiple objects are present. The theories were described in terms of a parable (the X-Files parable). Then, computer simulations were developed. Finally, predictions derived from the simulations were tested. In the scenario described in the parable, we ask how a system of detectors might locate an alien spaceship, how attention might be implemented in such a spaceship detection system, and how the presence of one spaceship might influence the location perception of another alien spaceship. Experiment 1 demonstrated that location information is integrated with a spatial average rule. In Experiment 2, this rule was applied to a more-samples theory of attention. Experiment 3 demonstrated how the integration rule could account for various visual illusions.

  6. Utilizing Twitter to Locate or Track an Object of Interest

    Science.gov (United States)

    2012-06-01

    theory by (1) performing some combination of qualitative or quantitative analysis, (2) focusing on ontological structures to organize the contribution...http://www.dailypress.com/entertainment/dp-nws-bieber-poquoson- 20120520–14,0,3023878.story. [21] L. Altman, South Bay Crimes and Courts, “LAPD...announces milestone number of officers,” March 2009, http://www.insidesocal.com/ crime &courts/2009/03/lapd-announces- milestone-numbe.html. [22] CNN

  7. Fashion Objects

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2009-01-01

    This article attempts to create a framework for understanding modern fashion phenomena on the basis of Durkheim's sociology of religion. It focuses on Durkheim's conception of the relation between the cult and the sacred object, on his notion of 'exteriorisation', and on his theory of the social...... symbol in an attempt to describe the peculiar attraction of the fashion object and its social constitution. However, Durkheim's notions of cult and ritual must undergo profound changes if they are to be used in an analysis of fashion. The article tries to expand the Durkheimian cult, radically enlarging...... it without totally dispersing it; depicting it as held together exclusively by the sheer 'force' of the sacred object. Firstly, the article introduces the themes and problems surrounding Durkheim's conception of the sacred. Next, it briefly sketches an outline of fashion phenomena in Durkheimian categories...

  8. Hidden Symmetry from Supersymmetry in One-Dimensional Quantum Mechanics

    Directory of Open Access Journals (Sweden)

    Alexander A. Andrianov

    2009-06-01

    Full Text Available When several inequivalent supercharges form a closed superalgebra in Quantum Mechanics it entails the appearance of hidden symmetries of a Super-Hamiltonian. We examine this problem in one-dimensional QM for the case of periodic potentials and potentials with finite number of bound states. After the survey of the results existing in the subject the algebraic and analytic properties of hidden-symmetry differential operators are rigorously elaborated in the Theorems and illuminated by several examples.

  9. Stabilization of stochastic systems with hidden Markovian jumps

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper considers the adaptive control of discrete-time hybrid stochastic systems with unknown randomly jumping parameters described by a finite-state hidden Markov chain. An intuitive yet longstanding conjecture in this area is that such hybrid systems can be adaptively stabilized whenever the rate of transition of the hidden Markov chain is small enough. This paper provides a rigorous positive answer to this conjecture by establishing the global stability of a gradient-algorithm-based adaptive linear-quadratic control.

  10. Extracting hidden trails and roads under canopy using LIDAR

    OpenAIRE

    Krougios, Prokopios

    2008-01-01

    The field of Remote Sensing has been greatly benefited by the development of LIDAR. The extraction of bare earth under tree canopies and especially the identification of hidden trails are important tools for military and civilian operations in dense forests. LIDAR data from Sequoia National Park in California (2008) and Fort Belvoir Military Base in Virginia (2007) were two areas that were selected for analysis. Quick Terrain Modeler software was used in order to recognize hidden trails....

  11. Physical nature of a hidden mass in the Universe

    Energy Technology Data Exchange (ETDEWEB)

    Doroshkevich, A.G.; Khlopov, M.Yu. (AN SSSR, Moscow. Inst. Prikladnoj Matematiki)

    1984-04-01

    The problem of an origin of the hidden mass of the Universe is discussed. Observation astronomic data on large-scale Universe structure and hidden mass distribution within the framework of the adiabatic theory of galaxies formation point out the dominance in nowadays Universe of weakly-interacting particles with 15-60 eV mass. Restrictions are obtained for a possible admixture of other relict particles.

  12. Hidden Markov Models with Factored Gaussian Mixtures Densities

    Institute of Scientific and Technical Information of China (English)

    LI Hao-zheng; LIU Zhi-qiang; ZHU Xiang-hua

    2004-01-01

    We present a factorial representation of Gaussian mixture models for observation densities in Hidden Markov Models(HMMs), which uses the factorial learning in the HMM framework. We derive the reestimation formulas for estimating the factorized parameters by the Expectation Maximization (EM) algorithm. We conduct several experiments to compare the performance of this model structure with Factorial Hidden Markov Models(FHMMs) and HMMs, some conclusions and promising empirical results are presented.

  13. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...

  14. A Location Privacy Aware Friend Locator

    DEFF Research Database (Denmark)

    Siksnys, Laurynas; Thomsen, Jeppe Rishede; Saltenis, Simonas

    2009-01-01

    to trade their location privacy for quality of service, limiting the attractiveness of the services. The challenge is to develop a communication-efficient solution such that (i) it detects proximity between a user and the user’s friends, (ii) any other party is not allowed to infer the location of the user...

  15. Reduced-Rank Hidden Markov Models

    CERN Document Server

    Siddiqi, Sajid M; Gordon, Geoffrey J

    2009-01-01

    We introduce the Reduced-Rank Hidden Markov Model (RR-HMM), a generalization of HMMs that can model smooth state evolution as in Linear Dynamical Systems (LDSs) as well as non-log-concave predictive distributions as in continuous-observation HMMs. RR-HMMs assume an m-dimensional latent state and n discrete observations, with a transition matrix of rank k <= m. This implies the dynamics evolve in a k-dimensional subspace, while the shape of the set of predictive distributions is determined by m. Latent state belief is represented with a k-dimensional state vector and inference is carried out entirely in R^k, making RR-HMMs as computationally efficient as k-state HMMs yet more expressive. To learn RR-HMMs, we relax the assumptions of a recently proposed spectral learning algorithm for HMMs (Hsu, Kakade and Zhang 2009) and apply it to learn k-dimensional observable representations of rank-k RR-HMMs. The algorithm is consistent and free of local optima, and we extend its performance guarantees to cover the RR-...

  16. A hidden classical symmetry of QCD

    CERN Document Server

    Glozman, L Ya

    2016-01-01

    The classical part of the QCD partition function (the integrand) has, ignoring irrelevant exact zero modes of the Dirac operator, a local SU(2N_F) \\supset SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A symmetry which is absent at the Lagrangian level. This symmetry is broken anomalously and spontaneously. Effects of spontaneous breaking of chiral symmetry are contained in the near-zero modes of the Dirac operator. If physics of anomaly is also encoded in the same near-zero modes, then their truncation on the lattice should recover a hidden classical SU(2N_F) symmetry in correlators and spectra. This naturally explains observation on the lattice of a large degeneracy of hadrons, that is higher than the SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A chiral symmetry, upon elimination by hands of the lowest-lying modes of the Dirac operator. We also discuss an implication of this symmetry for the high temperature QCD.

  17. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  18. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  19. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  20. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  1. Stochastic precipitation generator with hidden state covariates

    Science.gov (United States)

    Kim, Yongku; Lee, GyuWon

    2017-08-01

    Time series of daily weather such as precipitation, minimum temperature and maximum temperature are commonly required for various fields. Stochastic weather generators constitute one of the techniques to produce synthetic daily weather. The recently introduced approach for stochastic weather generators is based on generalized linear modeling (GLM) with covariates to account for seasonality and teleconnections (e.g., with the El Niño). In general, stochastic weather generators tend to underestimate the observed interannual variance of seasonally aggregated variables. To reduce this overdispersion, we incorporated time series of seasonal dry/wet indicators in the GLM weather generator as covariates. These seasonal time series were local (or global) decodings obtained by a hidden Markov model of seasonal total precipitation and implemented in the weather generator. The proposed method is applied to time series of daily weather from Seoul, Korea and Pergamino, Argentina. This method provides a straightforward translation of the uncertainty of the seasonal forecast to the corresponding conditional daily weather statistics.

  2. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  3. Coulomb gauge model for hidden charm tetraquarks

    Science.gov (United States)

    Xie, W.; Mo, L. Q.; Wang, Ping; Cotanch, Stephen R.

    2013-08-01

    The spectrum of tetraquark states with hidden charm is studied within an effective Coulomb gauge Hamiltonian approach. Of the four independent color schemes, two are investigated, the (qcbar)1(cqbar)1 singlet-singlet (molecule) and the (qc)3(qbarcbar)3 triplet-triplet (diquark), for selected JPC states using a variational method. The predicted masses of triplet-triplet tetraquarks are roughly a GeV heavier than the singlet-singlet states. There is also an interesting flavor dependence with (qqbar)1 (ccbar1) states about half a GeV lighter than (qcbar)1(qbarc)1. The lightest 1++ and 1-- predictions are in agreement with the observed X (3872) and Y (4008) masses suggesting they are molecules with ωJ / ψ and ηhc, rather than D*Dbar* and DDbar, type structure, respectively. Similarly, the lightest isovector 1++ molecule, having a ρJ / ψ flavor composition, has mass near the recently observed charged Zc (3900) value. These flavor configurations are consistent with observed X, Y and Zc decays to ππJ / ψ.

  4. Hidden topological angles and Lefschetz thimbles

    CERN Document Server

    Behtash, Alireza; Schaefer, Thomas; Unsal, Mithat

    2015-01-01

    We demonstrate the existence of hidden topological angles (HTAs) in a large class of quantum field theories and quantum mechanical systems. HTAs are distinct from theta-parameters in the lagrangian. They arise as invariant angle associated with saddle points of the complexified path integral and their descent manifolds (Lefschetz thimbles). Physical effects of HTAs become most transparent upon analytic continuation in $n_f$ to non-integer number of flavors, reducing in the integer $n_f$ limit to a $\\mathbb Z_2$ valued phase difference between dominant saddles. In ${\\cal N}=1$ super Yang-Mills theory we demonstrate the microscopic mechanism for the vanishing of the gluon condensate. The same effect leads to an anomalously small condensate in a QCD-like $SU(N)$ gauge theory with fermions in the two-index representation. The basic phenomenon is that, contrary to folklore, the gluon condensate can receive both positive and negative contributions in a semi-classical expansion. In quantum mechanics, a HTA leads to ...

  5. Hidden Web Data Extraction Using Dynamic Rule Generation

    Directory of Open Access Journals (Sweden)

    Anuradha

    2011-08-01

    Full Text Available World Wide Web is a global information medium of interlinked hypertext documents accessed via computers connected to the internet. Most of the users rely on traditional search engines to search theinformation on the web. These search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called Hidden Web which is hidden to present-day search engines. It lies behind search forms and this part of the web containing an almost endless amount of sources providing high quality information stored in specialized databases can be found in the depths of the WWW. A large amount of this Hidden web is structured i.e Hidden websites contain the information in the form of lists and tables. However visiting dozens of these sites and analyzing the results is very much time consuming task for user. Hence, it is desirable to build a prototype which will minimize user’s effort and give him high quality information in integrated form. This paper proposes a novel method that extracts the data records from the lists and tables of various hidden web sites of same domain using dynamic rule generation and forms a repository which is used for later searching. By searching the data from this repository, user will find the desired data at one place. It reduces the user’s effort to look at various result pages of different hidden websites.

  6. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  7. QCD sum rule study of hidden-charm pentaquarks

    CERN Document Server

    Chen, Hua-Xing; Chen, Wei; Steele, T G; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    We study the mass spectra of hidden-charm pentaquarks having spin $J = {1\\over2},{3\\over2},{5\\over2}$ and quark contents $uud c \\bar c$. We systematically construct all the relevant local hidden-charm pentaquark currents, and select some of them to perform QCD sum rule analyses. We find that the $P_c(4380)$ and $P_c(4450)$ can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. We also find the lowest-lying hidden-charm $J^P = 1/2^-$ pentaquark state of mass $4.33^{+0.17}_{-0.13}$ GeV, while the $J^P = 1/2^+$ mass prediction of 4.7--4.9 GeV is significantly higher. Similarly, the lowest-lying hidden-charm $J^P = 3/2^-$ pentaquark state mass is $4.37^{+0.18}_{-0.13}$ GeV, consistent with the $J^P = 3/2^-$ $P_c(4380)$, while the $J^P = 3/2^+$ is also significantly higher with a mass above 4.6 GeV. The hidden-charm $J^P = 5/2^-$ pentaquark state mass is 4.5--4.6 GeV, slightly larger than the $J^P = 5/2^+$ $P_c(4450)$.

  8. Pan-information Location Map

    Science.gov (United States)

    Zhu, X. Y.; Guo, W.; Huang, L.; Hu, T.; Gao, W. X.

    2013-11-01

    A huge amount of information, including geographic, environmental, socio-economic, personal and social network information, has been generated from diverse sources. Most of this information exists separately and is disorderly even if some of it is about the same person, feature, phenomenon or event. Users generally need to collect related information from different sources and then utilize them in applications. An automatic mechanism, therefore, for establishing a connection between potentially-related information will profoundly expand the usefulness of this huge body of information. A connection tie is semantic location describing semantically concepts and attributes of locations as well as relationships between locations, since 80% of information contains some kind of geographic reference but not all of geographic reference has explicit geographic coordinates. Semantic location is an orthogonal form of location representation which can be represented as domain ontology or UML format. Semantic location associates various kinds of information about a same object to provide timely information services according to users' demands, habits, preferences and applications. Based on this idea, a Pan-Information Location Map (PILM) is proposed as a new-style 4D map to associates semantic location-based information dynamically to organize and consolidate the locality and characteristics of corresponding features and events, and delivers on-demand information with a User-Adaptive Smart Display (UASD).

  9. Was ist das Hidden Web? Die Entstehung, Eigenschaften und gesellschaftliche Bedeutung von anonymer Kommunikation im Hidden Web.

    OpenAIRE

    Papsdorf, Christian

    2016-01-01

    More than two-and-a-half million people currently use the Tor network to communicate anonymously via the Internet and gain access to online media that are not accessible using standard Internet technology. This sphere of communication can be described as the hidden web. In part because this phenomenon is very recent, the subject has scarcely been studied in the social sciences. It is therefore the purpose of this paper to answer four fundamental questions: What is the hidden web? What charact...

  10. Processing locational and orientational information.

    Science.gov (United States)

    Maki, R H; Maki, W S; Marsh, L G

    1977-09-01

    In choice reaction time (RT) tasks, college students verified the truth of displays expressing spatial relations between two objects. The relations werelocational (A is left of B) ororientational (A and B are horizontal). The objects were names of states in the United States, symbols, or letter arrays. The objects were memorized prior to the display (states and letters) or were presented as part of the display (symbols and letters). In the location tasks with both states and symbols, locatives were spatial (right, left, above, below) or compass (north, south, east, west). Distance between states was also varied. When location was judged, horizontally aligned stimuli resulted in slower responses than vertically aligned stimuli, independently of materials and locative set. Reaction time was inversely related to distance. When orientation was judged, responses to horizontal pairs of states were slower than responses to vertical pairs of states, responses to horizontal pairs of letters were faster than responses to vertical pairs, and RT did not depend upon the orientation of symbols. This pattern of results suggests that orientational judgments are influenced by type of materials and the entext to which the material has been encoded (i.e., memorized). Locational judgments reflect a potent source of difficulty not present in orientation tasks, namely, telling left from right. Alternative explanations of the right-left effect are discussed.

  11. Kuiper Binary Object Formation

    CERN Document Server

    Nazzario, R C; Covington, C; Kagan, D; Hyde, T W

    2005-01-01

    It has been observed that binary Kuiper Belt Objects (KBOs) exist contrary to theoretical expectations. Their creation presents problems to most current models. However, the inclusion of a third body (for example, one of the outer planets) may provide the conditions necessary for the formation of these objects. The presence of a third massive body not only helps to clear the primordial Kuiper Belt but can also result in long lived binary Kuiper belt objects. The gravitational interaction between the KBOs and the third body causes one of four effects; scattering into the Oort cloud, collisions with the growing protoplanets, formation of binary pairs, or creation of a single Kuiper belt object. Additionally, the initial location of the progenitors of the Kuiper belt objects also has a significant effect on binary formation.

  12. Objective becoming

    CERN Document Server

    Skow, Bradford

    2015-01-01

    Bradford Skow presents an original defense of the 'block universe' theory of time, often said to be a theory according to which time does not pass. Along the way, he provides in-depth discussions of alternative theories of time, including those in which there is 'robust passage' of time or 'objective becoming': presentism, the moving spotlight theory of time, the growing block theory of time, and the 'branching time' theory of time. Skow explains why the moving spotlight theory is the best of these arguments, and rebuts several popular arguments against the thesis that time passes. He surveys the problems that the special theory of relativity has been thought to raise for objective becoming, and suggests ways in which fans of objective becoming may reconcile their view with relativistic physics. The last third of the book aims to clarify and evaluate the argument that we should believe that time passes because, somehow, the passage of time is given to us in experience. He isolates three separate arguments thi...

  13. Locative Inversion in Cantonese.

    Science.gov (United States)

    Mok, Sui-Sang

    This study investigates the phenomenon of "Locative Inversion" in Cantonese. The term "Locative Inversion" indicates that the locative phrase (LP) syntactic process in Cantonese and the appears at the sentence-initial position and its logical subject occurs postverbally. It is demonstrated that this Locative Inversion is a…

  14. Hierarchical Object Parsing from Noisy Point Clouds

    CERN Document Server

    Barbu, Adrian

    2011-01-01

    Object parsing and segmentation from point clouds are challenging tasks because the relevant data is available only as thin structures along object boundaries or other object features and is corrupted by large amounts of noise. One way to handle this kind of data is by employing shape models that can accurately follow the object boundaries. Popular models such as Active Shape and Active Appearance models lack the necessary flexibility for this task. While more flexible models such as Recursive Compositional Models have been proposed, this paper builds on the Active Shape models and makes three contributions. First, it presents a flexible, mid-entropy, hierarchical generative model of object shape and appearance in images. The input data is explained by an object parsing layer, which is a deformation of a hidden PCA shape model with Gaussian prior. Second, it presents a novel efficient inference algorithm that uses a set of informed data-driven proposals to initialize local searches for the hidden variables. T...

  15. Nitrate ammonification in mangrove soils: A hidden source of nitrite?

    Directory of Open Access Journals (Sweden)

    Melike eBalk

    2015-03-01

    Full Text Available Nitrate reduction is considered to be a minor microbial pathway in the oxidation of mangrove-derived organic matter due to a limited supply of nitrate in mangrove soils. At a limited availability of this electron acceptor compared to the supply of degradable carbon, nitrate ammonification is thought to be the preferential pathway of nitrate reduction. Mangrove forest mutually differ in their productivity, which may lead to different available carbon to nitrate ratios in their soil. Hence, nitrate ammonification is expected to be of more importance in high- compared to low-productive forests.The hypothesis was tested in flow-through reactors that contain undisturbed mangrove soils from high-productive Avicennia germinans and Rhizophora mangle forests in Florida and low-productive Avicennia marina forests in Saudi Arabia. Nitrate was undetectable in the soils from both regions. It was assumed that a legacy of nitrate ammonification would be reflected by a higher ammonium production from these soils upon the addition of nitrate. Unexpectedly, the soils from the low-productive forests in Saudi Arabia produced considerably more ammonium than the soils from the high-productive forests in Florida. Hence, other environmental factors than productivity must govern the selection of nitrate ammonification or denitrification. A rather intriguing observation was the 1:1 production of nitrite and ammonium during the consumption of nitrate, more or less independent from sampling region, location, sampling depth, mangrove species and from the absence or presence of additional degradable carbon. This 1:1 ratio points to a coupled production of ammonium and nitrite by one group of nitrate-reducing microorganisms. Such a production of nitrite will be hidden under the nitrate-limited conditions of most mangrove forest soils.

  16. Nitrate ammonification in mangrove soils: a hidden source of nitrite?

    Science.gov (United States)

    Balk, Melike; Laverman, Anniet M; Keuskamp, Joost A; Laanbroek, Hendrikus J

    2015-01-01

    Nitrate reduction is considered to be a minor microbial pathway in the oxidation of mangrove-derived organic matter due to a limited supply of nitrate in mangrove soils. At a limited availability of this electron acceptor compared to the supply of degradable carbon, nitrate ammonification is thought to be the preferential pathway of nitrate reduction. Mangrove forest mutually differ in their productivity, which may lead to different available carbon to nitrate ratios in their soil. Hence, nitrate ammonification is expected to be of more importance in high- compared to low-productive forests. The hypothesis was tested in flow-through reactors that contain undisturbed mangrove soils from high-productive Avicennia germinans and Rhizophora mangle forests in Florida and low-productive Avicennia marina forests in Saudi Arabia. Nitrate was undetectable in the soils from both regions. It was assumed that a legacy of nitrate ammonification would be reflected by a higher ammonium production from these soils upon the addition of nitrate. Unexpectedly, the soils from the low-productive forests in Saudi Arabia produced considerably more ammonium than the soils from the high-productive forests in Florida. Hence, other environmental factors than productivity must govern the selection of nitrate ammonification or denitrification. A rather intriguing observation was the 1:1 production of nitrite and ammonium during the consumption of nitrate, more or less independent from sampling region, location, sampling depth, mangrove species and from the absence or presence of additional degradable carbon. This 1:1 ratio points to a coupled production of ammonium and nitrite by one group of nitrate-reducing microorganisms. Such a production of nitrite will be hidden by the presence of active nitrite-reducing microorganisms under the nitrate-limited conditions of most mangrove forest soils.

  17. Nitrate ammonification in mangrove soils: a hidden source of nitrite?

    KAUST Repository

    Balk, Melike

    2015-03-02

    Nitrate reduction is considered to be a minor microbial pathway in the oxidation of mangrove-derived organic matter due to a limited supply of nitrate in mangrove soils. At a limited availability of this electron acceptor compared to the supply of degradable carbon, nitrate ammonification is thought to be the preferential pathway of nitrate reduction. Mangrove forest mutually differ in their productivity, which may lead to different available carbon to nitrate ratios in their soil. Hence, nitrate ammonification is expected to be of more importance in high- compared to low-productive forests. The hypothesis was tested in flow-through reactors that contain undisturbed mangrove soils from high-productive Avicennia germinans and Rhizophora mangle forests in Florida and low-productive Avicennia marina forests in Saudi Arabia. Nitrate was undetectable in the soils from both regions. It was assumed that a legacy of nitrate ammonification would be reflected by a higher ammonium production from these soils upon the addition of nitrate. Unexpectedly, the soils from the low-productive forests in Saudi Arabia produced considerably more ammonium than the soils from the high-productive forests in Florida. Hence, other environmental factors than productivity must govern the selection of nitrate ammonification or denitrification. A rather intriguing observation was the 1:1 production of nitrite and ammonium during the consumption of nitrate, more or less independent from sampling region, location, sampling depth, mangrove species and from the absence or presence of additional degradable carbon. This 1:1 ratio points to a coupled production of ammonium and nitrite by one group of nitrate-reducing microorganisms. Such a production of nitrite will be hidden by the presence of active nitrite-reducing microorganisms under the nitrate-limited conditions of most mangrove forest soils.

  18. Bounds in the location-allocation problem

    DEFF Research Database (Denmark)

    Juel, Henrik

    1981-01-01

    Develops a family of stronger lower bounds on the objective function value of the location-allocation problem. Solution methods proposed to solve problems in location-allocation; Efforts to develop a more efficient bound solution procedure; Determination of the locations of the sources....

  19. Hidden markov model for the prediction of transmembrane proteins using MATLAB.

    Science.gov (United States)

    Chaturvedi, Navaneet; Shanker, Sudhanshu; Singh, Vinay Kumar; Sinha, Dhiraj; Pandey, Paras Nath

    2011-01-01

    Since membranous proteins play a key role in drug targeting therefore transmembrane proteins prediction is active and challenging area of biological sciences. Location based prediction of transmembrane proteins are significant for functional annotation of protein sequences. Hidden markov model based method was widely applied for transmembrane topology prediction. Here we have presented a revised and a better understanding model than an existing one for transmembrane protein prediction. Scripting on MATLAB was built and compiled for parameter estimation of model and applied this model on amino acid sequence to know the transmembrane and its adjacent locations. Estimated model of transmembrane topology was based on TMHMM model architecture. Only 7 super states are defined in the given dataset, which were converted to 96 states on the basis of their length in sequence. Accuracy of the prediction of model was observed about 74 %, is a good enough in the area of transmembrane topology prediction. Therefore we have concluded the hidden markov model plays crucial role in transmembrane helices prediction on MATLAB platform and it could also be useful for drug discovery strategy. The database is available for free at bioinfonavneet@gmail.comvinaysingh@bhu.ac.in.

  20. Ecological Hidden Troubles and Countermeasures under Reform of Collective Forest Tenure

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Three stages of reform of collective forest tenure after reform and opening up are reviewed.The reform of forest tenure brings sharp increase of economic benefit.However,due to forest farmers’ subjective pursuit for economic benefit and objective lack of necessary economic,financial and technical support,ecological hidden troubles are created.Based on these,we put forward countermeasures,including strengthening forest farmers’ awareness of ecological protection and solving ecological problems in accordance with actual conditions of the region.

  1. Disease surveillance using a hidden Markov model

    Directory of Open Access Journals (Sweden)

    Wright Graeme

    2009-08-01

    Full Text Available Abstract Background Routine surveillance of disease notification data can enable the early detection of localised disease outbreaks. Although hidden Markov models (HMMs have been recognised as an appropriate method to model disease surveillance data, they have been rarely applied in public health practice. We aimed to develop and evaluate a simple flexible HMM for disease surveillance which is suitable for use with sparse small area count data and requires little baseline data. Methods A Bayesian HMM was designed to monitor routinely collected notifiable disease data that are aggregated by residential postcode. Semi-synthetic data were used to evaluate the algorithm and compare outbreak detection performance with the established Early Aberration Reporting System (EARS algorithms and a negative binomial cusum. Results Algorithm performance varied according to the desired false alarm rate for surveillance. At false alarm rates around 0.05, the cusum-based algorithms provided the best overall outbreak detection performance, having similar sensitivity to the HMMs and a shorter average time to detection. At false alarm rates around 0.01, the HMM algorithms provided the best overall outbreak detection performance, having higher sensitivity than the cusum-based Methods and a generally shorter time to detection for larger outbreaks. Overall, the 14-day HMM had a significantly greater area under the receiver operator characteristic curve than the EARS C3 and 7-day negative binomial cusum algorithms. Conclusion Our findings suggest that the HMM provides an effective method for the surveillance of sparse small area notifiable disease data at low false alarm rates. Further investigations are required to evaluation algorithm performance across other diseases and surveillance contexts.

  2. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  3. Foundational Forces & Hidden Variables in Technology Commercialization

    Science.gov (United States)

    Barnett, Brandon

    2011-03-01

    The science of physics seems vastly different from the process of technology commercialization. Physics strives to understand our world through the experimental deduction of immutable laws and dependent variables and the resulting macro-scale phenomenon. In comparison, the~goal of business is to make a profit by addressing the needs, preferences, and whims of individuals in a market. It may seem that this environment is too dynamic to identify all the hidden variables and deduct the foundational forces that impact a business's ability to commercialize innovative technologies. One example of a business ``force'' is found in the semiconductor industry. In 1965, Intel co-founder Gordon Moore predicted that the number of transistors incorporated in a chip will approximately double every 24 months. Known as Moore's Law, this prediction has become the guiding principle for the semiconductor industry for the last 40 years. Of course, Moore's Law is not really a law of nature; rather it is the result of efforts by Intel and the entire semiconductor industry. A closer examination suggests that there are foundational principles of business that underlie the macro-scale phenomenon of Moore's Law. Principles of profitability, incentive, and strategic alignment have resulted in a coordinated influx of resources that has driven technologies to market, increasing the profitability of the semiconductor industry and optimizing the fitness of its participants. New innovations in technology are subject to these same principles. So, in addition to traditional market forces, these often unrecognized forces and variables create challenges for new technology commercialization. In this talk, I will draw from ethnographic research, complex adaptive theory, and industry data to suggest a framework with which to think about new technology commercialization. Intel's bio-silicon initiative provides a case study.

  4. Surviving Objects

    OpenAIRE

    Murjas, Teresa

    2012-01-01

    Surviving Objects (2012) is a devised multi-media practice-as-research performance based on extensive interviews conducted with my elderly mother and recorded on a hand-held device. Our conversations concern her experiences as a child refugee following violent deportation by the Soviet Army from Eastern Poland to Siberia (1941), and her subsequent route, via Persia, to a British-run refugee camp in Northern Rhodesia, where she remained for 6 years before arriving in the UK. In order to aid my...

  5. Location-Oblivious Data Transfer with Flying Entangled Qudits

    CERN Document Server

    ,

    2011-01-01

    We present a simple and practical quantum protocol involving two mistrustful agencies in Minkowski space, which allows Alice to transfer data to Bob at a spacetime location that neither can predict in advance. The location depends on both Alice's and Bob's actions. The protocol guarantees unconditionally to Alice that Bob learns the data at a randomly determined location; it guarantees to Bob that Alice will not learn the transfer location even after the protocol is complete. The task implemented, transferring data at a space-time location that remains hidden from the transferrer, has no precise analogue in non-relativistic quantum cryptography. It illustrates further the scope for novel cryptographic applications of relativistic quantum theory.

  6. Objective thermomechanics

    CERN Document Server

    Fülöp, Tamás

    2015-01-01

    An irreversible thermodynamical theory of solids is presented where the kinematic quantities are defined in an automatically objective way. Namely, auxiliary elements like reference frame, reference time and reference configuration are avoided by formulating the motion of the continuum on spacetime directly, utilizing the Weyl-Matolcsi description of spacetime. This restricts the range of definable kinematic quantities heavily. Solids are distinguished from fluids by possessing not only an instantaneous metric tensor but a relaxed metric, too, that represents the natural geometric structure of the solid. The comparison of the instantaneous metric to the relaxed one is the basis of the definition of the elastic state variable, the elastic deformedness tensor. Thermal expansion is conceived as the temperature dependence of the relaxed metric. As opposed to this reversible type of change, plasticity means an irreversible change in the relaxed metric, and is describable via a plastic change rate tensor. The relat...

  7. Hidden Gauge Structure of Supersymmetric Free Differential Algebras

    CERN Document Server

    Andrianopoli, L; Ravera, L

    2016-01-01

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q' introduced in Ref. [3] and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B^(2) and B^(3) in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of t...

  8. Backpropagation-Based Cooperative Localization of Primary User for Avoiding Hidden-Node Problem in Cognitive Networks

    Directory of Open Access Journals (Sweden)

    Lin Liu

    2010-01-01

    Full Text Available Cognitive radio (CR is a technology to implement opportunistic spectrum sharing to improve the spectrum utilization. However, there exists a hidden-node problem, which can be a big challenge to solve especially when the primary receiver is passive listening. We aim to provide a solution to the hidden-node problem for passive-listening receiver based on cooperation of multiple CRs. Specifically, we consider a cooperative GPS-enabled cognitive network. Once the existence of PU is detected, a localization algorithm will be employed to first estimate the path loss model for the environment based on backpropagation method and then to locate the position of PU. Finally, a disable region is identified taking into account the communication range of both the PU and the CR. The CRs within the disabled region are prohibited to transmit in order to avoid interfering with the primary receiver. Both analysis and simulation results are provided.

  9. Landmine detection using mixture of discrete hidden Markov models

    Science.gov (United States)

    Frigui, Hichem; Hamdi, Anis; Missaoui, Oualid; Gader, Paul

    2009-05-01

    We propose a landmine detection algorithm that uses a mixture of discrete hidden Markov models. We hypothesize that the data are generated by K models. These different models reflect the fact that mines and clutter objects have different characteristics depending on the mine type, soil and weather conditions, and burial depth. Model identification could be achieved through clustering in the parameters space or in the feature space. However, this approach is inappropriate as it is not trivial to define a meaningful distance metric for model parameters or sequence comparison. Our proposed approach is based on clustering in the log-likelihood space, and has two main steps. First, one HMM is fit to each of the R individual sequence. For each fitted model, we evaluate the log-likelihood of each sequence. This will result in an R×R log-likelihood distance matrix that will be partitioned into K groups using a hierarchical clustering algorithm. In the second step, we pool the sequences, according to which cluster they belong, into K groups, and we fit one HMM to each group. The mixture of these K HMMs would be used to build a descriptive model of the data. An artificial neural networks is then used to fuse the output of the K models. Results on large and diverse Ground Penetrating Radar data collections show that the proposed method can identify meaningful and coherent HMM models that describe different properties of the data. Each HMM models a group of alarm signatures that share common attributes such as clutter, mine type, and burial depth. Our initial experiments have also indicated that the proposed mixture model outperform the baseline HMM that uses one model for the mine and one model for the background.

  10. Law Enforcement Locations

    Data.gov (United States)

    Kansas Data Access and Support Center — Law Enforcement Locations in Kansas Any location where sworn officers of a law enforcement agency are regularly based or stationed. Law enforcement agencies "are...

  11. Evidence Feed Forward Hidden Markov Model: A New Type of Hidden Markov Model

    CERN Document Server

    DelRose, Michael; Frederick, Philip; 10.5121/ijaia.2011.2101

    2011-01-01

    The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM), and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important...

  12. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  13. Riboswitch Detection Using Profile Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Krishnamachari A

    2009-10-01

    Full Text Available Abstract Background Riboswitches are a type of noncoding RNA that regulate gene expression by switching from one structural conformation to another on ligand binding. The various classes of riboswitches discovered so far are differentiated by the ligand, which on binding induces a conformational switch. Every class of riboswitch is characterized by an aptamer domain, which provides the site for ligand binding, and an expression platform that undergoes conformational change on ligand binding. The sequence and structure of the aptamer domain is highly conserved in riboswitches belonging to the same class. We propose a method for fast and accurate identification of riboswitches using profile Hidden Markov Models (pHMM. Our method exploits the high degree of sequence conservation that characterizes the aptamer domain. Results Our method can detect riboswitches in genomic databases rapidly and accurately. Its sensitivity is comparable to the method based on the Covariance Model (CM. For six out of ten riboswitch classes, our method detects more than 99.5% of the candidates identified by the much slower CM method while being several hundred times faster. For three riboswitch classes, our method detects 97-99% of the candidates relative to the CM method. Our method works very well for those classes of riboswitches that are characterized by distinct and conserved sequence motifs. Conclusion Riboswitches play a crucial role in controlling the expression of several prokaryotic genes involved in metabolism and transport processes. As more and more new classes of riboswitches are being discovered, it is important to understand the patterns of their intra and inter genomic distribution. Understanding such patterns will enable us to better understand the evolutionary history of these genetic regulatory elements. However, a complete picture of the distribution pattern of riboswitches will emerge only after accurate identification of riboswitches across genomes

  14. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  15. Evidence Feed Forward Hidden Markov Model: A New Type Of Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Michael Del Rose

    2011-01-01

    Full Text Available The ability to predict the intentions of people based solely on their visual actions is a skill only performed by humans and animals. The intelligence of current computer algorithms has not reached this level of complexity, but there are several research efforts that are working towards it. With the number of classification algorithms available, it is hard to determine which algorithm works best for a particular situation. In classification of visual human intent data, Hidden Markov Models (HMM, and their variants, are leading candidates. The inability of HMMs to provide a probability in the observation to observation linkages is a big downfall in this classification technique. If a person is visually identifying an action of another person, they monitor patterns in the observations. By estimating the next observation, people have the ability to summarize the actions, and thus determine, with pretty good accuracy, the intention of the person performing the action. These visual cues and linkages are important in creating intelligent algorithms for determining human actions based on visual observations. The Evidence Feed Forward Hidden Markov Model is a newly developed algorithm which provides observation to observation linkages. The following research addresses the theory behind Evidence Feed Forward HMMs, provides mathematical proofs of their learning of these parameters to optimize the likelihood of observations with a Evidence Feed Forwards HMM, which is important in all computational intelligence algorithm, and gives comparative examples with standard HMMs in classification of both visual action data and measurement data; thus providing a strong base for Evidence Feed Forward HMMs in classification of many types of problems.

  16. Onderzoek location based marketing: Mobile = location = effect

    NARCIS (Netherlands)

    Gisbergen, M.S. van; Huhn, A.E.; Khan, V.J.; Ketelaar, P.E.

    2011-01-01

    Onderzoekers van de NHTV (Internationaa Hoger Onderwijs Breda, Radboud Universiteit, DVJ Insights en Popai Benelux lieten consumenten in een virtuele supermarkt advertenties via de smartphone ontvangen wanneer men langs het geadverteerde product liep. De uitkomsten laten zien dat 'location based adv

  17. Onderzoek location based marketing: Mobile = location = effect

    OpenAIRE

    Gisbergen, M.S. van; Huhn, A.E.; Khan, V.J.; Ketelaar, P.E.

    2011-01-01

    Onderzoekers van de NHTV (Internationaa Hoger Onderwijs Breda, Radboud Universiteit, DVJ Insights en Popai Benelux lieten consumenten in een virtuele supermarkt advertenties via de smartphone ontvangen wanneer men langs het geadverteerde product liep. De uitkomsten laten zien dat 'location based advertising' effectief is.

  18. Recent Progress in Search for Hidden/Dark Photon

    CERN Document Server

    Deliyergiyev, M A

    2015-01-01

    We will try to communicate the many difficulties that we encounter when attempting to pinpoint a common origin for the several observed anomalies, or assessing their tension with existing exclusion limits. These include systematics affecting the operation of the detectors, our knowledge of their response, astrophysical uncertainties, and the broad range of particle couplings that can mediate the interaction with a detector target. The interesting astrophysical evidence that motivates a search for dark-photon and focuses our attention on a Hidden Valleys model with a GeV-scale dark sector that produces the exciting signatures, which may include the possible constituent of dark matter, the possible existence of extra gauge groups. Results from the recent underground experiments are also considered. Many models of new physics beyond the Standard Model contain a 'light' hidden sector (dark sector) with a colorful spectrum of new particles. Recently, it has been shown that the hidden sector can give rise to unique...

  19. Applications of hidden symmetries to black hole physics

    Energy Technology Data Exchange (ETDEWEB)

    Frolov, Valeri, E-mail: vfrolov@ualberta.ca [Institute of Theoretical Physics, Department of Physics University of Alberta, Edmonton, Alberta, T6G 2G7 (Canada)

    2011-02-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  20. The hidden-charm pentaquark and tetraquark states

    CERN Document Server

    Chen, Hua-Xing; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    In the past decade many charmonium-like states were observed experimentally. Especially those charged charmonium-like $Z_c$ states and bottomonium-like $Z_b$ states can not be accommodated within the naive quark model. These charged $Z_c$ states are good candidates of either the hidden-charm tetraquark states or molecules composed of a pair of charmed mesons. Recently, the LHCb Collaboration discovered two hidden-charm pentaquark states, which are also beyond the quark model. In this work, we review the current experimental progress and investigate various theoretical interpretations of these candidates of the multiquark states. We list the puzzles and theoretical challenges of these models when confronted with the experimental data. We also discuss possible future measurements which may distinguish the theoretical schemes on the underlying structures of the hidden-charm multiquark states.